facebookpixel

This Week at the Q

Archive

1. This week we published a new customer case study, Max Planck Society. Scientists from across the globe work and research at the Max Planck Institute in various scientific fields across natural sciences, life sciences, social sciences, and the humanities. Max Planck Institutes are involved in more than 4,500 cooperation projects in over 100 countries.

The Joint Network Center (GNZ) at the Fritz Haber Institute (FHI) provides technology services for Max Planck Society. To better protect large volumes of scientific data, the GNZ needed to accelerate their storage backup process and improve their archiving. Read this new case study to learn how they were able to shrink their backup window, reduce costs, help ensure the long-term integrity of their data, and gain scalability to support fast-growing scientific data volumes.

blog mp

2. We also announced the release of new DXi software with advanced features and capabilities for DXi backup appliances to significantly improve backup and restore system performance, as well as monitor systems remotely utilizing cloud-based analytics.

IDC’s Phil Goodwin, Research Director, Infrastructure Systems, Platforms and Technologies Group: “Traditional backup and recovery software remains strong, even as organizations add cloud-based backup to their data protection strategies. The combination of a Quantum DXi appliance and Veeam V10 shows great potential for enterprises seeking to protect their vital hybrid-cloud environments. Faster synthetic full backups enabled by this release means that organizations can backup more often, thereby reducing the risk of data loss and delivering a better RPO.”

Read more about this announcement in this Enterprise Talk press coverage .

blog dxi appliances

3. Check out this new blog by Eric Bassier, Quantum’s Sr. Director of Product Marketing, “Are You Experiencing Unstructured Data Sprawl?” He outlines how “unstructured data sprawl” is the emerging problem that many CIOs and large enterprises are dealing with, and the need to classify the data, how to work with it when you need it, and how to store it safely when you are not actively working with it. 

pb math

4. Speaking of unstructured data sprawl, the need for an archive strategy has never been greater. Check out this in-depth video with industry expert, Fred Moore of Horison Information Strategies, with Dave Vellante on theCUBE, covering the topic of “Reinventing Archives.”

blog fred moore

5. This new SearchStorage article, “On-premises STaaS Shifts Storage Buying to Opex Model,” is a great overview of the growing field of STaaS, and discusses the benefits of a pay-as-you-go subscription model, the flexibility STaaS offers, and the simplified management for customers.

Leave a comment if there are topics you’d like to see added to our weekly top 5 happenings!

Natasha

To view our Partner blog, click here

Quantum and Veeam V10: A Perspective from VeeamON 2020

Archive

In the last few weeks, we’ve had the opportunity to co-present with our partner Veeam at Quantum’s VirtualQ I Protect & Archive event, and also engage with Veeam customers at the recent VeeamON 2020 show. And even with so much focus on enabling remote work, enabling hybrid- and multi-cloud infrastructures, and all the new features in Veeam V10, we continue to see interest and engagement when it comes to these topics:

1.  Ransomware protection and 3-2-1-1 data protection practice

A long-time best practice more relevant today than ever, the 3-2-1-1 rule specifies three copies of your data, stored on two different types of media, where one copy is offsite, and one is offline, air-gapped, or immutable. There are a couple of new twists to this rule that we’ve been emphasizing:

  • The first is that the ‘offsite’ copy is increasingly in the cloud. Cloud services from AWS, Azure, and others are growing like crazy, and Veeam and other backup applications can now easily make an offsite copy to the cloud. This can replace recovering tapes from a vault in many cases, which can take a long time and is difficult. However, in this paradigm, tape still plays a role – as an on-premise “offline” copy of your data. Veeam and Quantum continue to advocate keeping a copy on tape, and with the Active Vault feature that Quantum introduced earlier this year as part of our Ransomware Protection Packages , administrators can store backup copies in a totally secure, offline environment without ever handling tapes.
  • The second nuance is this notion of an ‘immutable’ copy of data. LTO tape has had Write Once Read Many (“WORM”) functionality for many years, and combined with its inherent offline nature, AES-256-bit encryption, and it’s low cost and low power, tape is an ideal immutable data vault. But our customers are also looking to use object storage for long-term storage for compliance, and that’s why we are in the process of certifying our ActiveScale object storage system to be Veeam Ready. We expect to make that announcement in July.

2.  It’s all about availability of your production systems and applications

Even with all the new features and many different backup and protection technologies being employed, at the end-of-the-day, it is about maximizing the availability of your production environment. Even protecting applications that run in the cloud. And with Veeam V10 and Quantum DXi (a Veeam Integrated backup repository), we continue to improve performance so our customers can maximize availability with faster backups and restores.  One new feature in Veeam V10 is called Fast Clone, or Block Clone, and the latest version of Quantum DXi software can leverage this feature to dramatically speed up synthetic full backup performance.  Creating a synthetic full backup that use to take hours now can be completed in minutes, and we’ve reduced the strain on the network and Veeam backup infrastructure dramatically. This latest enhancement builds on the Veeam Data Mover Service (VDMS) integration that DXi has had for several years and makes DXi the clear best choice for a Veeam backup repository.

Achieving 3-2-1-1 Data Protection

And now that Quantum can bring together Veeam Integrated backup repositories with DXi, a soon-to-be-Veeam-Ready object store in ActiveScale, and industry-leading tape storage with unique Active Vault software, we are in a truly unique position to deliver infrastructures to Veeam customers, so they can achieve 3-2-1-1 data protection.

See these related resources for more information about Quantum & Veeam solutions:

To view our Partner blog, click here

Crisis Management Strategies for Your Remote Workforce

Archive

We salute all those IT folks working day and night to ensure their organizations continue to be secured and protected while getting ourselves through the current crisis. It is by far one of the most challenging times, but you have pulled us together, so that remote workers can stay connected, secured, and productive for keeping our economies moving forward – after all, we are all in this together.

Racing to Protect Remote Endpoints, Fast

We hit a crisis never seen before and one we are not quite out of it. IT managers all over the world went from zero to 100 mph in 6 seconds because the crisis caught most by surprise and bulldozed right into their data center. Next thing you know, most of your internal customers (employees) had to work remotely, throwing your finely tuned tools and processes off-track. IT managers now had to ensure the laptops assigned to employees were secure and all those endpoints and company data leaving the comfort and security of their four-walls were protected. Needless to say, security and data protectio n shot straight up to the top of the list of priorities and procedures to implement.

Crisis Management Strategies Rolled Up into One Guidebook

This brings me to the reason why we created this guidebook titled, “IT Manager’s Guidebook – Essential Strategies for Data Protection and Business Continuity in Times of Crisis.” It was designed with you in mind because we know when things go off-the-rails, sometimes going back to the basics is the most crucial step for not only recovery and protection, but for mitigating risk as well.

Strategies and Resources for Planning and Being Prepared

We took some of the most important topics that are top-of-mind and rolled them up into one neat handbook to help guide you while you are being pressed to do more with less. We understand you immediately jumped to a reactionary mode to enable your remote workers to do their jobs effectively from home. Ensuring you have the required resources, security/data protection, and cloud services in place to facilitate worker productivity is a monumental ask. We tried to make things easy for you to help you prepare for situations like these since our new normal is essentially planning and preparing for crisis as they arise.

In this guidebook, you will find topics related to what you as IT managers are going through. Topics range from:

Get the IT Manager’s Guidebook Now

We hope you take a moment to review the guidebook – download the IT Manager’s Guidebook .

We want to remind you that we can help you meet and exceed your RPO/RTO guidelines and with your object and cold storage needs, saving you power, cooling, and footprint costs. Learn more about our Enterprise Archive and Backup Solutions here .

To view our Partner blog, click here

Data Protection and Archive Strategies at Your Fingertips

Archive

We had a great turn out last week to our VirtualQ I Protect & Archive event of online sessions where we had an opportunity to discuss some of the latest data trends, challenges, strategies, and tactics needed for processing, storing, and protecting massive volumes of critical enterprise data, which continues to grow even as we are all working remotely. We want to thank our end users, partner community, and attendees for joining us. We thoroughly enjoyed sharing these important and relevant topics and look forward to bringing you more pressing topics again as we evolve and show you how Quantum is innovating.

vqpa blog sessions

How are You Preparing for Massive Data Growth?
Data has not stopped its progression towards those massive growth numbers as predicted by IDC market research, which indicates that about 80% of the world’s data will be unstructured by 2025. We began with our CEO, Jamie Lerner, whose Welcome Keynote set the tone by level setting on where he sees Quantum playing an important role in this unstructured world and how we are currently addressing those challenges head on with object storage . Some of the most pressing topics we discussed was how to prepare for a future where 80% of data is unstructured now so that your organization is not caught unprepared?

How Do You Backup Petabytes of Data? Answer: You Don’t
Another interesting topic had to do with questions that are coming up more and more in our data-driven world is how do you backup petabytes of files? If you didn’t already know the answer to that, it’s you don’t. It was a very interesting concept and highly encourage to check out what our experts are talking about in the context of petabyte/exabyte scenarios.

Reducing Backup Footprint and Spend
In the enterprise backup and archive realm we want to help you meet and exceed your SLAs, so we centered the discussion around Quantum’s high-performance purposely built backup appliances – DXi9000 and DXi4800 – the most dense PBBA out in the market today. With this solution, we’ve been able to help our customers reduce their footprint and spend by consolidating many PBBA’s into a single 10U rackspace totaling 1PB of capacity! When you’re thinking about consolidating without sacrificing performance, Quantum DXi9000 could be the answer you’ve been looking for.

Solving Data Protection Challenges with Veeam and WekaIO
Finally, we invited our partners WekaIO and Veeam to share with us some reference architectures for machine learning at scale and, of course, the ever-important best practice backup rule of 3-2-1-1 . With Veeam, we dove into the backup rule, that is nevertheless so important to protect your data against ransomware . The role of object store in today’s enterprise environments is on everyone’s mind and these open discussions are the best way to learn how you can evaluate and leverage this cool technology and see if it’s the right fit for your growing data needs.

Finally, we shared how to build archive storage at exabyte scale and found a surprising twist to this story and a very interesting topic of discussion among our attendees. With the ever-increasing amounts of data growth in video and video-like data, and all these other topics mentioned, surely there is a session that you will find very interesting, so be sure to check them out.

Watch Session Recordings on Demand
If you missed our VirtualQ I Protect & Archive event, we’ve made all the sessions available for you to watch on demand. Watch recordings now.

To view our Partner blog, click here

A Silver Lining of Innovation

Archive

It is been a long time coming. Two full days of sessions with our valued customers and those interested in our solutions. We’re excited to be hosting VirtualQ I Protect & Archive , a virtual event featuring live keynotes, educational sessions, and technology demonstrations, from June 9-10, 2020. Over the course of two days, we will present on the latest data protection and business continuity developments, as well as host virtual sessions featuring subject-matter experts and technology partners, including Veeam and WekaIO and we hope you can join us!

During this time, you can plan to learn about protecting and preserving your most critical data including:

  • Preparing for a future where 80% of data is unstructured
  • Best practices for backing up and managing immense amounts of data
  • Machine learning at scale (with WekaIO)
  • The role of object storage within Enterprise IT
  • Tactics to protect data from ransomware and cyber threats
  • The latest innovations to come from Quantum’s partnership with Veeam

With all these relevant topics, even during a pandemic like the one we are living through right now, data keeps growing. And there is no better way to face the future where 80% of data is unstructured than preparing for it. Though we stopped going to the office, we have not stopped creating data and, even more so, now that we are working remotely, these end points are creating data at immense speeds and in more ways than one. What is the silver lining in all this? It is driving our engineers to create new technology and enhancing our solutions to perform and deliver on our customer’s needs. The more we are pressed, the more innovation is squeezed out to improve our solutions and services. We are excited to share the latest with you during these sessions.

So, what is Quantum doing to help you? We are innovating. We are adding advanced features that will enable you to securely protect and archive your data cost-effectively whether you chose disk, tape, or object storage. We are driving with performance. Have you checked out the latest performance numbers on our flagship DXi backup appliance? We are also integrating tightly with our technology partners such as WekaIO and Veeam to meet or exceed your service level agreements (SLA’s). The discussion around object store is always an interesting one as organizations are still learning to navigate the murky waters of the cloud, given some of those hidden fees, security hazards, and how it is really meant to be used so that it doesn’t break the bank. Finally, we will discuss the latest ransomware tactics leveraged by criminals and why they are after your backup infrastructure. This and much more, and we hope you can join us.

Register Now. You can register for our virtual sessions at VirtualQ I Protect & Archive .

To view our Partner blog, click here

Business Continuity for the New Normal in IT Environments

CMMA Blog

With a remote workforce, endpoints will generate a lot of data and more IP will be leaving your premises.  Intellectual Property (IP), Financial Data, and Personnel Data are important data sets to be secured. What do you do? Clearly, it’s an open-ended question, but I want to lean in on this topic in the context of implementing security and protecting your data for continued operations in the midst of a crisis with nearly 100% remote workforce as we adjust to a rapidly evolving new normal for managing IT environments.

Maybe your IT organization is like Quantum’s in that you had a head start and prepared to weather this storm because you had previously established a business strategy that allowed your employees to work remotely as part of your normal business operations. If you did not have a head start, it’s understandable and you are now in a reactive mode. Nobody was ready for such a crisis nonetheless, preparedness is key. To deploy a remote workforce that is cost-effective, secure, reliable, and resilient, it takes time to develop and rollout as you prioritize hardware or software requirements within your infrastructure. Here are a few key insights from our own Quantum IT.

Enterprise Applications in the Cloud

At Quantum, every employee is issued a portable computer – either a Windows-based laptop or a MacBook, depending on the needs of the user. We also employ SaaS solutions like Microsoft 365. This provides us collaboration tools like Microsoft Teams and Exchange Online as well as business productivity tools either online or installed on the laptop. In addition, other of our Enterprise applications are SaaS based, meaning they are accessible from anywhere over the internet. Example:  CRM (SalesForce.com). Leveraging the public cloud in this scenario is a good cost-effective solution that enables a remote workforce effective and efficiently.

Protection – Encryption

You’ve heard the saying: “Safety First.” In the digital era the profile of this statement has never been more important than today. It begins with a secured foundation at the server level (normally at the core). If your foundation is weak the rest of your endpoints will probably resemble the same weak structure. Do not take the shortcut, when possible leverage solutions such as:

Data encryption at rest and in transit. In transit, web data should always be sent via https. Also look at the various encryption models: Client-side, Server-side with service-managed keys, Server-side with Customer-managed keys. Also consider using a Key Vault to securely store keys.

Client-side encryption

Client-side encryption is performed outside of Azure. It includes:

  • Data encrypted by an application that is running in the customer’s datacenter or by a service application.
  • Data that is already encrypted when it is received by Azure.

With client-side encryption, cloud service providers do not have access to the encryption keys and cannot decrypt this data. You maintain complete control of the keys.

Server-Side Encryption

The three server-side encryption models offer different key management characteristics, which you can choose according to your requirements:

  • Service-managed keys: Provides a combination of control and convenience with low overhead.
  • Customer-managed keys: Gives you control over the keys, including Bring Your Own Keys (BYOK) support, or allows you to generate new ones.
  • Service-managed keys in customer-controlled hardware: Enables you to manage keys in your proprietary repository, outside of Microsoft control. This characteristic is called Host Your Own Key (HYOK). However, configuration is complex, and most Azure services do not support this model.

Cybersecurity

 IDC research shows that 93% of organizations have been attacked within the past three years (source: https://dl.acronis.com/u/rc/WP_IDC_Acronis_Cyber_Protection_EN-US_200403.pdf ). It is time to tighten up the integration of data protection, disaster recovery, and data security operations within the cybersecurity strategy and think about backups as part of your cybersecurity approach. Threats from ransomware and other malware are prevalent and there are plenty more threats engineered with AI capabilities to infiltrate your datacenter. Whatever cyber-security software or backup method you choose, (Flash, SSDs, HDD, Tape) or environment (physical, virtual, multi-cloud) or, the goal is to integrate what used to be silos and build a resilient IT operation.

Availability & Resiliency

Because of an enterprise’s global reach, systems and application need to be ready and available 24/7. Backup applications need to be efficient and predictable across multiple platforms. Any threat such as natural, man-made or cyber is disruptive to an IT environment; a resilient system is key to recover quickly and efficiently to withstand unforeseen events and ensure data is secure and available at any moment in time. Employ a backup method that enables the replication to a DR site or cloud provider by employing on-prem, cloud or a hybrid approach to backup. Our current global situation has reset many priorities and all these topics are now top of mind.

VDI

As the threat to businesses continues, a large majority of organizations have turned to VDI to rapidly deploy virtual desktop infrastructures and release a mobile workforce that can be as productive as if they were in the office. Virtual desktop infrastructure (VDI) is defined as the hosting of desktop environments on a central server. In other words, it’s like having a structured office available on-demand allowing you the ability to access virtual data and applications and you are really just shifting the compute cost from the endpoint to the data center (if on premises) or the cloud. To us, this is a very cost-effective solution that helps keep the data centralized and off endpoints which are more susceptible to data loss. One of the cool things about VDI, is break/fix becomes a lot easier because you can quickly “spin up” a new desktop for a user if their current desktop becomes corrupt. Also makes things like patch management and OS updates easier as it is all centrally managed i.e. lower administrative overhead.

Flexibility

An important part of the equation is flexibility. Whatever strategy you chose that meets your organization’s business goals or in this case, an effective and secured remote workforce for business continuity (BC), your solution should be flexible to adjust as needed to meet the demands of current and future national or global events that can affect your datacenter. This current global crisis is a good example of how quickly organization learned if the were ahead of behind the curve. Technology by itself cannot meet the need alone, it needs a strategy built upon it to mitigate risks associated with ‘crisis’ type events and or simple business continuity.

Data Protection

It has never been more important to back up data on the regular. With Ransomware getting more sophisticated, we need to adapt and build IT environments to expect (and withstand) an attack – there are some strains out there that as far as we know, there are no decryption tools available so you must have alternative methods to recover your data. Let’s remember that criminals are no longer using mass campaigns, instead they are going for remote access – remote desktop protocol was the most used entry vector.

In our new normal, we hope our insight provides some guidance to building, securing and protecting your data, your remote workforce, your network and helps you build solid business continuity plans… no matter what disaster comes your way. Check out our QonQ business continuity webinar here .

To view our Partner blog, click here