But backup software demands a careful consideration of storage needs and objectives. Now that you've reviewed the essential issues involved in any backup acquisition, this guide focuses on the specific considerations of backup software products. You'll also find a series of specifications to help make on-the-spot product comparisons between vendors like Asigra Inc., BakBone Software Inc., CA, CommVault, EMC Corp., IBM, Yosemite Technologies Inc., and more.
Evaluate backup versus replication. The subtle difference between backup and replication will have a profound impact on the way that you protect data -- and the type of software that you select. Backups typically save files in a proprietary format, so the backup software must first restore data before it can be accessed. This makes backups suitable for protecting large volumes or entire systems that need not be immediately accessible. By comparison, replication typically makes a 1:1 copy of files in their native format, so replicated files can be restored on-demand; even accessed directly from their backup location.
Consider restorability over time. Backups are often version-sensitive, so it may be difficult to restore older backups once the backup software is updated. This can prove particularly troublesome when an organization is faced with a legal discovery request that demands a search of backups that may span multiple backup software versions. Before selecting a backup software platform, be sure to understand how it supports previous and future backups and interoperability with other manufacturer's backups. It may be necessary to maintain the older software on a standby backup server in case it may be necessary to restore an older backup.
Evaluate support for encryption and key management. Compliance requirements are putting a new focus on data security. Sensitive corporate data is now routinely encrypted before being sent to tape or remote disk arrays. If security is a priority, evaluate the encryption methods available in each backup software platform such as AES 256. The two main issues with encryption are performance and key management. The processing overhead required for encryption generally reduces backup performance, so consider the effect of encryption on your backup window. Encryption algorithms also rely on the use of a unique key to encode/decode the data. Remember that simply changing a key does nothing to protect backups made with a previous key, so understand how the key is managed to prevent loss and minimize the possibility of compromise.
Evaluate WAN support and bandwidth requirements. An increasing number of data copies are being made to off-site tape or disk. If you currently move data off-site -- or are considering off-site backups or replication in the future -- select software that specializes in support across a WAN and the Internet. Remote protection software typically has no mimunum bandwidth requirements, but you'll need to supply enough bandwidth to complete the backup cycle within the available backup window while staying within reasonable cost constraints.
Consider the availability of data reduction technologies. Compression and data de-duplication technologies are used to reduce backup sizes. Compression replaces repeating data patterns with much smaller data tokens. Data de-duplication (also called "single-instance storage) physically saves only one copy of redundant files or blocks. Both technologies can speed backup times, reduce the amount of space needed for the backup, and minimize the use of WAN bandwidth.
Evaluate management overhead and ease of use. When selecting a new backup or replication software product, consider the amount of time needed to manage the software. Some amount of time will be needed to install a new software product or an updated version, familiarize the IT staff with the new software, and transfer current policies. It's important for backup administrators to evaluate any new software and understand the ongoing impact of any software changes.