Brightstor Arcserve Backup R11.5 for Windows Beta

Total Page:16

File Type:pdf, Size:1020Kb

Brightstor Arcserve Backup R11.5 for Windows Beta Data Sheet BrightStor® ARCserve® Backup r11.5 for Windows BrightStor® ARCserve® Backup for Windows offers world-class data protection for distributed servers, databases and applications, as well as clients for multiple environments, including Windows, UNIX, Linux, and NetWare. With its wide range of powerful, easy-to-use data protection tools, BrightStor ARCserve Backup ensures the integrity and availability of your most important asset—data Top Three Key Features As businesses grow, so do their Access to Information storage requirements, and data • Complete data protection solution Is Key to Success protection environments can become for Windows extremely complex. As a result, • Wide Platform and Application In an increasingly competitive businesses demand exceptional Support business environment, the availability flexibility from software tools. To meet • Centralized Management of the of information is often the differentiator the rising need to manage data growth Backup Environment between success and failure. The and provide around-the-clock proliferation of the Internet and the availability, many organizations are What’s New movement towards on-demand deploying the latest storage computing has only heightened the technologies, including Storage Area • Disk Staging Backup (D2D2T) need to effectively leverage Networks (SANs), Network-Attached • Microsoft SharePoint Agent information assets to increase revenue Storage (NAS) and Disk Arrays. • 64 bit platform support and profit opportunities. And at the heart of an organization’s information The ideal data protection solution must • Regulatory compliance assets are its data resources. address the business demands for enhancements high performance and availability, With all the potential disasters in scale with the environment and Supporting Environments today’s world — fire, flood, theft, leverage new storage paradigms such • Windows 2003/2000/XP hardware failure, human error, virus as SAN, NAS, snapshot capable disks • IBM AIX, SUN Solaris, HP-UX, attacks and so forth — every and cross-platform management Tru64 organization needs to protect its data across the entire enterprise, including and ensure its continued availability. multiple operating systems and • Redhat Enterprise Linux, SuSE applications. Linux Enterprise Server, TurboLinux, Red Flag, Miracle linux and Asianux • Novell NetWare Data Sheet 2 protect all of their data, including of Microsoft Exchange environment. Protecting the those from their distributed branch Single Instance Storage (SIS) Enterprise’s Critical offices from one centralized server. support ensures that only single Information Assets The advantage lies in that every copies of duplicate attachments are BrightStor ARCserve Backup option backed-up, improving backup and supports many configurations and restore performance as well as BrightStor ARCserve Backup ensures platforms, including Windows, Linux, reducing backup media usage. the protection and availability of critical NetWare and UNIX. business data. BrightStor ARCserve • VSS Snapshot Support. BrightStor Backup for Windows uses award- ARCserve Backup can backup any winning, innovative technology to Distinctive Features application that supports Microsoft deliver complete data protection VSS interface. This gives you out of across the enterprise for Windows, and Functionalities the box backup support for a large UNIX, Linux and NetWare systems. number of applications. In addition, Extensive Operating Platform and BrightStor ARCserve Backup provides Transportable VSS snapshot Application Support several key benefits, including: support provides zero impact backup and very fast restore • Protection of Critical Business Protection of Critical Application capabilities. Assets. BrightStor ARCserve Data. BrightStor ARCserve Backup Backup provides data protection for has application-specific agents to • Open File Agent. Using Open File Agent, all files, even those locked all leading operating systems, support all the leading applications, by running applications can be hardware platforms and such as Microsoft SQL Server, successfully backed with no applications. Microsoft Exchange Server, Microsoft application downtime. • High Performance. BrightStor SharePoint, Oracle, Lotus Domino, ARCserve Backup leverages SAP R/3, Sybase and many others. High Performance Backup and multiple methods, including backup They ensure data integrity by protecting the transaction log, archive Restore to disk, disk staging, multiplexing log and journal files along with the and multistreaming among others to • Integrated Backup to Disk. data, and also allows advanced provide high-performance, non- Backup to disk allows users to use operations such as tablespace disruptive backup and restore disk technology as an intermediate backups and restores. operations to mission-critical step in the backup process. Faster information and data assets. • Protection for all your Platforms. access speed and higher reliability • Simplified Administration. The BrightStor ARCserve Backup can of disk technologies ensures simple to use interface provides full protect remote servers running all reduced backup and restore time as automation and centralization of leading operating systems such as well as higher success rate for traditional data protection tasks for Microsoft Windows, Novell backups. distributed and enterprise NetWare, various Linux • Hardware Snapshot Support. environments. distributions, UNIX derivatives, BrightStor ARCserve Backup can • Scalability. BrightStor ARCserve AS400, MAC OS X, and VMS. leverage snapshot capabilities in Backup provides a complete backup • Microsoft Exchange Advanced disk arrays to provide instantaneous solution regardless of the size or Backup and Restore Support. data protection without impacting type of your organization. Even the BrightStor ARCserve Backup the production server. largest enterprises can use provides optimized BrightStor ARCserve Backup to document-level backup and restore Data Sheet 3 • Multiplexing Capabilities. • Multiple NIC Support. Multiple NIC • Integrated Antivirus Capabilities. Multiplexing enables up to 32 jobs cards can be installed to create a Integration with industry leading to write to the same tape media separate storage network without eTrust™ Antivirus solution ensures simultaneously. This technology not the costs associated with deploying the backed up data is reliable and only reduces backup window, but a SAN. This can help to avoid data virus free. also makes efficient use of tape bottlenecks and improve backup • Extensive Reporting Capabilities. libraries and media. performance. BrightStor ARCserve Backup • Multistreaming. Multistreaming • Off-Site Vaulting Integration. includes extensive list of predefined allows backing up large databases BrightStor ARCserve Backup is reports, including Real-Time to multiple tape drives designed to play a key role in your Backup/Restore Statistics, simultaneously, reducing backup overall disaster recovery plan. It Recovery Report which can also be time. provides advanced media sent via email. • Bare Metal Recovery. BrightStor management for Windows servers • Multiple Language Support. ARCserve Backup bare metal and integrates smoothly with your BrightStor ARCserve Backup is recovery that allow servers to be off-site vaulting provider (such as localized in most common recovered from catastrophic failures Iron Mountain and others). European, Asian and South quickly and easily, without the need • WORM Device Support. BrightStor American languages. for reinstalling operating system. ARCserve Backup supports a variety of Write-Once-Read-Many Extensive Device and Media (WORM) devices, making it easy to Support maintain a legal compliance. Supported • Cross-Platform SAN Support. • StorageTek Automated Cartridge Environments With BrightStor ARCserve Backup, System Library Software (ACSLS) multiple platforms (such as UNIX, and IBM 3494 Libraries support. • Microsoft Windows 2000, 2003, XP Linux and Windows) can share tape Through its corresponding agents, • Redhat Enterprise Linux, SuSE libraries and other storage devices BrightStor ARCserve Backup Linux Enterprise Server, on a SAN without the need to enables you to use these advanced TurboLinux, Red Flag, Miracle linux logically partition or zone the device libraries to protect your entire and Asianux reducing cost and management infrastructure. • IBM AIX, SUN Solaris, HP-UX, Tru64 overhead. Ease of Deployment and • Novell NetWare • Small Library Support BrightStor Administration ARCserve Backup r11.5 includes • Command Line Interface. For latest and detailed information on support for a tape libraries with one Common data protection functions supported environments please visit: drive and unlimited slots without the ® ® can be run directly from the http://ca.com/arcserve/winsupport need for BrightStor ARCserve command line, from scripts and also Backup Tape Library Option from other automation solutions like • NDMP Support. BrightStor Unicenter® Network and Systems ARCserve Backup can back up to Management. tape drive and libraries attached directly to NAS devices. Three-way NDMP support is also included. Data Sheet 4 What’s New in r11.5 • Disk Staging Backup (D2D2T). D2D2T shrinks backup time by allowing backup data to be staged to fast disk drives before it is automatically moved to tape. Restore requests are redirected to disks automatically, reducing recovery time. The whole operation is policy driven, reducing cost and management overhead. (See Figure 1) • Microsoft SharePoint
Recommended publications
  • Backup4all Take Full Control of Your Backup
    Backup4all Take full control of your backup Backup4all User Manual Copyright © 2016 Softland Backup4all User Manual for Backup4all version 6 by Softland This user manual presents all the features in the Professional edition. If you own Lite, Standard or Portable, some of the features presented in this user manual might not be available in your edition. The Professional edition includes all the features. For a comparison between editions, please check the feature matrix topic. The information in this document is subject to change without notice. Although every precaution has been taken in the preparation of this book, Softland assumes no responsibility for errors and omissions. Nor is any liability assumed for damages resulting from the information contained herein. This documentation contains proprietary information of Softland. All rights reserved. Contents 3 Table of Contents Part I Introduction 9 1 Product Description................................................................................................................................... 9 2 System Requirements................................................................................................................................... 10 3 Installation ................................................................................................................................... 10 Command Line Parameters.......................................................................................................................................................... 11 4 Features
    [Show full text]
  • Brightstor Arcserve Backup for Linux Administrator Guide
    BrightStor® ARCserve® Backup for Linux Administrator Guide r11.5 D01211-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end user's informational purposes only and is subject to change or withdrawal by Computer Associates International, Inc. ("CA") at any time. This documentation may not be copied, transferred, reproduced, disclosed or duplicated, in whole or in part, without the prior written consent of CA. This documentation is proprietary information of CA and protected by the copyright laws of the United States and international treaties. Notwithstanding the foregoing, licensed users may print a reasonable number of copies of this documentation for their own internal use, provided that all CA copyright notices and legends are affixed to each reproduced copy. Only authorized employees, consultants, or agents of the user who are bound by the confidentiality provisions of the license for the software are permitted to have access to such copies. This right to print copies is limited to the period during which the license for the product remains in full force and effect. Should the license terminate for any reason, it shall be the user's responsibility to return to CA the reproduced copies or to certify to CA that same have been destroyed. To the extent permitted by applicable law, CA provides this documentation "as is" without warranty of any kind, including without limitation, any implied warranties of merchantability, fitness for a particular purpose or noninfringement. In no event will CA be liable to the end user or any third party for any loss or damage, direct or indirect, from the use of this documentation, including without limitation, lost profits, business interruption, goodwill, or lost data, even if CA is expressly advised of such loss or damage.
    [Show full text]
  • Cumulus: Filesystem Backup to the Cloud
    Cumulus: Filesystem Backup to the Cloud Michael Vrable, Stefan Savage, and Geoffrey M. Voelker Department of Computer Science and Engineering University of California, San Diego Abstract uitous broadband now provides sufficient bandwidth re- In this paper we describe Cumulus, a system for effi- sources to offload the application. For small to mid-sized ciently implementing filesystem backups over the Inter- businesses, backup is rarely part of critical business pro- net. Cumulus is specifically designed under a thin cloud cesses and yet is sufficiently complex to “get right” that it assumption—that the remote datacenter storing the back- can consume significant IT resources. Finally, larger en- ups does not provide any special backup services, but terprises benefit from backing up to the cloud to provide only provides a least-common-denominator storage in- a business continuity hedge against site disasters. terface (i.e., get and put of complete files). Cumulus However, to price cloud-based backup services attrac- aggregates data from small files for remote storage, and tively requires minimizing the capital costs of data cen- uses LFS-inspired segment cleaning to maintain storage ter storage and the operational bandwidth costs of ship- efficiency. Cumulus also efficiently represents incremen- ping the data there and back. To this end, most exist- tal changes, including edits to large files. While Cumulus ing cloud-based backup services (e.g., Mozy, Carbonite, can use virtually any storage service, we show that its ef- Symantec’s Protection Network) implement integrated ficiency is comparable to integrated approaches. solutions that include backup-specific software hosted on both the client and at the data center (usually using 1 Introduction servers owned by the provider).
    [Show full text]
  • Tanium™ Appliance Deployment Guide
    Tanium™ Appliance Deployment Guide Version 1.6.2 October 16, 2020 The information in this document is subject to change without notice. Further, the information provided in this document is provided “as is” and is believed to be accurate, but is presented without any warranty of any kind, express or implied, except as provided in Tanium’s customer sales terms and conditions. Unless so otherwise provided, Tanium assumes no liability whatsoever, and in no event shall Tanium or its suppliers be liable for any indirect, special, consequential, or incidental damages, including without limitation, lost profits or loss or damage to data arising out of the use or inability to use this document, even if Tanium Inc. has been advised of the possibility of such damages. Any IP addresses used in this document are not intended to be actual addresses. Any examples, command display output, network topology diagrams, and other figures included in this document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. Please visit https://docs.tanium.com for the most current Tanium product documentation. This documentation may provide access to or information about content, products (including hardware and software), and services provided by third parties (“Third Party Items”). With respect to such Third Party Items, Tanium Inc. and its affiliates (i) are not responsible for such items, and expressly disclaim all warranties and liability of any kind related to such Third Party Items and (ii) will not be responsible for any loss, costs, or damages incurred due to your access to or use of such Third Party Items unless expressly set forth otherwise in an applicable agreement between you and Tanium.
    [Show full text]
  • Backup4all User Manual
    Backup4all Take full control of your backup Backup4all User Manual Copyright © 2017 Softland Backup4all User Manual for Backup4all version 7 by Softland This user manual presents all the features in the Professional edition. If you own Lite, Standard or Portable, some of the features presented in this user manual might not be available in your edition. The Professional edition includes all the features. For a comparison between editions, please check the feature matrix topic. The information in this document is subject to change without notice. Although every precaution has been taken in the preparation of this book, Softland assumes no responsibility for errors and omissions. Nor is any liability assumed for damages resulting from the information contained herein. This documentation contains proprietary information of Softland. All rights reserved. Contents 3 Table of Contents Part I Introduction 9 1 Product Description................................................................................................................................... 9 2 System Requirements................................................................................................................................... 10 3 Installation ................................................................................................................................... 10 Command Line.......................................................................................................................................................... Parameters 12 4 Features
    [Show full text]
  • Hitachi Data Ingestor
    Hitachi Data Ingestor 6.4.7 Cluster Administrator's Guide This manual describes how to operate a Hitachi Data Ingestor (HDI) system in a cluster configuration. MK-90HDI038-30 July 2019 © 2017- 2019 Hitachi Vantara Corporation. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including copying and recording, or stored in a database or retrieval system for commercial purposes without the express written permission of Hitachi, Ltd., or Hitachi Vantara Corporation (collectively “Hitachi”). Licensee may make copies of the Materials provided that any such copy is: (i) created as an essential step in utilization of the Software as licensed and is used in no other manner; or (ii) used for archival purposes. Licensee may not make any other copies of the Materials. “Materials” mean text, data, photographs, graphics, audio, video and documents. Hitachi reserves the right to make changes to this Material at any time without notice and assumes no responsibility for its use. The Materials contain the most current information available at the time of publication. Some of the features described in the Materials might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Vantara Corporation at https://support.hitachivantara.com/en_us/contact-us.html. Notice: Hitachi products and services can be ordered only under the terms and conditions of the applicable Hitachi agreements. The use of Hitachi products is governed by the terms of your agreements with Hitachi Vantara Corporation. By using this software, you agree that you are responsible for: 1.
    [Show full text]
  • Open BAR a New Approach to Mobile Backup and Restore
    Universit`adegli Studi di Roma “Tor Vergata” Facolt`adi Ingegneria Dottorato di Ricerca in Informatica ed Ingegneria dell’Automazione Ciclo XXIII Open BAR A New Approach to Mobile Backup And Restore Vittorio Ottaviani A.A. 2010/2011 Docente Guida/Tutor: Prof. Giuseppe F. Italiano Coordinatore: Prof. Daniel P. Bovet to my parents because an example is worth a thousand words Abstract Smartphone owners use to save always more information, and more impor- tant data into the internal memory of their devices. Mobile devices are prone to be lost, stolen or broken; this causes the loss of all the information contained in it if these data are not backed up. While many solutions for making back- ups and restoring data are known for servers and desktops, mobile devices pose several challenges, mainly due to the plethora of devices, vendors, oper- ating systems and versions available in the mobile market. In this thesis, we propose a new backup and restores approach for mobile devices, which helps to reduce the effort in saving and restoring personal data and migrate from a device to another. Our approach is platform independent: in particular, we present some prototypes based on different mobile operating systems: Google Android, Windows Mobile 5 and 6 and Symbian S60. The approach grants the security of the information backed up and restored using novel cryptographic techniques optimized for mobile. Another feature of our approach lies in the capability of offering additional services to the final user or to administrator of the system. As an example, for users, we provide a service enabling the shar- ing of information in mobile devices among a group of selected persons.
    [Show full text]
  • Cloud Storage: the Risks and Rewards
    Cloud Storage: The Risks and Rewards Jérémy Legendre Norwich University School of Business and Management IS340 – Introduction to Information Assurance 2012-11-14 Copyright © 2012 Jeremy Legendre. All rights reserved. Page 1 Cloud Storage: The Risks and Rewards Contents Introduction ............................................................................................................................................................ 3 Why has Cloud Storage Become Popular? ................................................................................................... 3 Risks ........................................................................................................................................................................... 4 DropBox Compromises .................................................................................................................................. 4 iCloud Compromise ......................................................................................................................................... 4 Google Drive Compromises .......................................................................................................................... 5 Security of Data Transfers ................................................................................................................................. 6 FTP ......................................................................................................................................................................... 6 SSL
    [Show full text]
  • And Linux Tools for Backup O P S E R
    e s u y n a r o f e l b i s n o p s e r d l e h e b t o n n a c n o i s s i m m o C e h t d n a , r o h t u a e h t f o y l n o s w e i v e h t s t c e HOGSKOLAN ISKOVDE(HIS) Content createdby: see theIMSdeployedinourMoodle platform. the sources in ELP format (ExeLearning) or enjoy this cisoss.eu content. to Visit download Remember: This is not the best format to l f e r n o i t a c i l b u p . ) s / i 0 h . T 4 / . a n s o - i y s s b i / s m e s PILOT VERSION PILOT m n o e c C i l / n a g r e o p . o s r n u o E m e m h t o c m e o v r i t f a t e r r o c p / / p : s u s p t t h t h i ( w ” l d a e n d o . i n t n u i a f e n r r n e e e t h e t n b I d s e 0 a . n i h 4 a ) t e 8 n k i 5 o l 8 c A 5 n e 1 r o 0 i a - t h a 2 S 0 - m 2 r n o o A f i t n K i u - b 1 e i 0 r h t t S t f E A o - s 1 e - n d 5 o a 1 m 0 m 2 m e ( o b t c C y e a e j v o m i r t p h a c e s i i r h h C T w “ e s u y n a r o f e l b i s n o Backup systems p s e r d l Backup systems e h e b t Content created by: o n n a c HOGSKOLAN I SKOVDE (HIS) n o i s s i m 1.
    [Show full text]
  • Pii041409 Arc 125 A&O Prod Brief
    PRODUCT SUMMARY: CA ARCSERVE BACKUP R12.5 AGENTS AND OPTIONS CA ARCserve® Backup r12.5 Agents and Options CA ARCSERVE® BACKUP R12.5 OFFERS WORLD-CLASS HIGH PERFORMANCE DATA PROTECTION THAT COMBINES INNOVATIVE DATA DEDUPLICATION AND POWERFUL STORAGE RESOURCE MANAGEMENT (SRM) REPORTING WITH INDUSTRY LEADING SOFTWARE VTL BACKUP (D2D2T) AND COMPREHENSIVE SECURITY TOOLS; MAKING IT ONE OF THE MOST SECURE, RELIABLE AND EFFICIENT “OUT-OF-THE-BOX” BACKUP SOLUTIONS OFFERED FOR BOTH PHYSICAL AND VIRTUAL SERVERS. WITH ITS WIDE RANGE OF POWERFUL, EASY-TO-USE AND SINGLE MANAGEMENT DATA PROTECTION TOOLS, CA ARCSERVE BACKUP ENSURES THE INTEGRITY AND AVAILABILITY OF YOUR MOST IMPORTANT ASSET — DATA. CA ARCserve Backup Agents and Options You can easily tailor CA ARCserve Backup to fit your company's storage needs. Just choose from several powerful agents and options to build a solution that is as unique as your business. CA ARCserve Backup Agents let you extend protection to the specific applications you need to support. CA ARCserve Backup Options let you add extensive data protection features, including central management, advanced device and media management, disaster recovery and SAN management capabilities. CA’s unique pricing models let you reduce the complexity of procuring, installing, managing and tracking software product licensing keys so you don’t need to buy each technology you need individually. Choose from a la carte, Simplified Pricing (SIP) or Managed Capacity Pricing (MCP) models. For more information on the best ways to procure these technologies, see Buying the Right Agents & Options on page 5. Overview CA ARCserve Backup Agents and Options help you customize your storage environment, whether you have one server or many servers, or have an email server that is based on Microsoft Exchange or Lotus Notes, or if your environment runs Windows, NetWare or Linux.
    [Show full text]
  • Single Node Administrator's Guide
    Hitachi Data Ingestor Single Node Administrator's Guide Product Version Getting Help Contents MK-90HDI039-21 © 2013- 2017 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for any purpose without the express written permission of Hitachi, Ltd. Hitachi, Ltd., reserves the right to make changes to this document at any time without notice and assumes no responsibility for its use. This document contains the most current information available at the time of publication. When new or revised information becomes available, this entire document will be updated and distributed to all registered users. Some of the features described in this document might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Data Systems Corporation at https://support.hds.com/en_us/documents.html. Notice: Hitachi, Ltd., products and services can be ordered only under the terms and conditions of the applicable Hitachi Data Systems Corporation agreements. The use of Hitachi, Ltd., products is governed by the terms of your agreements with Hitachi Data Systems Corporation. Hitachi is a registered trademark of Hitachi, Ltd., in the United States and other countries. Hitachi Data Systems is a registered trademark and service mark of Hitachi, Ltd., in the United States and other countries. Archivas, Essential NAS Platform, HiCommand, Hi-Track, ShadowImage, Tagmaserve, Tagmasoft, Tagmasolve, Tagmastore, TrueCopy, Universal Star Network, and Universal Storage Platform are registered trademarks of Hitachi Data Systems Corporation.
    [Show full text]
  • Reducing Size and Complexity of the Security-Critical Code Base of File Systems
    Reducing Size and Complexity of the Security-Critical Code Base of File Systems Dissertation zur Erlangung des akademischen Grades Doktoringenieur (Dr.-Ing.) vorgelegt an der Technischen Universität Dresden Fakultät Informatik eingereicht von Dipl.-Inf. Carsten Weinhold geboren am 30. September 1980 in Dresden Betreuender Hochschullehrer: Prof. Dr. rer. nat. Hermann Härtig Technische Universität Dresden Gutachter: Prof. Dr. Scott Brandt University of California, Santa Cruz Fachreferent: Prof. Dr. Christof Fetzer Technische Universität Dresden Korrigierte Version vom 2. Juli 2014 (eingereicht am 5. Juli 2013, verteidigt am 14. Januar 2014) 2 Acknowledgements I want to thank my advisor Prof. Dr. rer. nat. Hermann Härtig for all the support and guidance over the years and for encouraging me in my work. I warmly thank Björn Döbel, Michael Roitzsch, Anna Krasnova, and Dr. Claude-Joachim Hamann for all the time and effort they put into proof reading draft versions of this thesis and for giving me so much valuable feedback for improving it. Thanks also go to Adam Lackorzynski and Alexander Warg for maintaining and continuously improving the platform of my work and the work of so many others. Everybody in the coffee area: thank you for all the interesting discussions (not only about work). Finally, my greatest thanks go to my family and to my friends for all their help, support, and patience, but especially for being so much fun to be with. Thank you all! 3 4 Contents 1 Introduction 13 1.1 Motivation ........................................ 13 1.2 A Virtual Private File System .............................. 15 1.3 Thesis Goals ....................................... 16 1.4 Non-Goals ........................................
    [Show full text]