• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • IDC Says Disk-Based Data Protection Is Booming

    August 14, 2006 Timothy Prickett Morgan

    Predicting the demise of tape is something of a pastime in the computer industry, but the continued ubiquity of tape for archiving large data sets for the smallest amount of money possible does not mean that other backup and archiving technologies do not come along and find a place. And so it is with disk-based data protection.

    The thing about tape that is not so attractive is that it is orders of magnitude slower than disk technology, which is why the latter costs a lot more and has been used for the better part of three decades as the means of storing operating systems, application software, and their data sets. That’s why some storage vendors have created special disk arrays that look and act like tape drives–and even interface with tape archiving software–which are known as virtual tape libraries. And, because many compliance regulations require the archiving of email, instant messages, documents, and other business information–and to have the information easily accessible for the purposes of auditing the content and the security used to keep it safe from unauthorized access–other types of compliance appliances and storage solutions are causing the disk-based data protection market, as IDC calls it, to explode.

    By IDC’s market model math, the disk-based data protection market will grow from $8 billion in sales in 2006 to over $50 billion by 2010; those numbers include hardware and software acquisitions made as part of the solution. To put that in perspective, the current general-purpose server market–and we could make an argument that many modern disk arrays are really just tuned servers, but forget that for a moment–accounted for $51 billion in sales in 2005.

    “We have seldom seen so much unmet pent-up demand for a market that is already so large,” explained Robert Gray, vice president of worldwide storage systems research at IDC. “Latent demand is also high in the SMB market. However, traditional storage solutions are totally inadequate to meet current and future demand, creating significant opportunities for innovative suppliers.”

    IDC has just released a study called Disk-Based Data Protection–2006, which takes a look at established and emerging data protection methods such as backup to disk, replication, continuous data protection (CDP), and virtual tape libraries (VTL), and projects how these technologies will affect tape technologies and other practices for data protection, high availability, and security. If you want to know the secrets of the study, you need to give IDC some dough.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 15, Number 32 -- August 14, 2006

    Sponsored by
    Focal Point Solutions Group

    A CloudSAFE Company

    The Power of Services:
    IBM Cloud and Managed Solutions

    Upgrade your business processes, and save time and resources with specialized, best-in-class IT solutions.

    Managed, Cloud, and Custom Solutions

    Managed Services

    • Infrastructure Monitoring & Management
    • Server Patching
    • Application Patching
    • Managed Backup
    • High Availability/Disaster Recovery Monitoring
    • Cloud Environment Monitoring
    • Office 365 Management
    • Endpoint Management
    • Managed Colocation

    Cloud Infrastructure

    • IBM i Private Cloud
    • IBM AIX Private Cloud
    • VMware Private Cloud
    • VMware Cloud Director
    • Multi-Tenant Cloud
    • Desktop as a Service

    Data Protection & High Availability

    • Disaster Recovery as a Service
    • Backup as a Service
    • IBM i Vaulting

    Security

    • Security Consulting
    • Remote Security Awareness Training & Education
    • Onsite Security Awareness Training & Education
    • Phishing Tests
    • Penetration Tests
    • Mail Security
    • Managed Detection & Response
    • Managed Firewall
    • Endpoint Protection
    • Vulnerability Management
    • Vendor Risk Assessments
    • Security Risk Assessments

    Professional Services

    • Server Virtualization
    • Data & Infrastructure Migrations
    • Hardware & Software Installation
    • Microsoft Office 365 Implementation & Migration
    • Infrastructure Assessments
    • IBM i Consulting
    • IBM AIX Consulting

    Focal Point provides all the tools you need to protect your data, ensure the integrity of your IT infrastructure, and keep your business running.

    Contact Focal Point to Learn More About Our IBM Solutions and Partnerships

    Follow us on LinkedIn

    focalpointsg.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: Running Green-Screen Commands from OpsNav, Part 2 Bang for the Buck: Midrange i5 Servers Versus the Competition

    Leave a Reply Cancel reply

TFH Volume: 15 Issue: 32

This Issue Sponsored By

    Table of Contents

    • Russell to Stay on at COMMON as President, Contrary to Rumors
    • The PC at 25: If I Had a Time Machine, I Would Make One Small Change
    • Yankee Cases the Platform Vendors in the SMB Space
    • Big Blue Kills the ‘It Pays to Lease’ Deal
    • IDC Says Disk-Based Data Protection Is Booming
    • Russell to Stay on at COMMON as President, Contrary to Rumors
    • IBM Withdraws Various iSeries and System i5 Features
    • As I See It: Biology and Technology–the Uneasy Union
    • The System i Is the Top Banana for Fruit Producers
    • Software Hungry IBM Eats ECM Rival FileNet for $1.6 Billion

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • IBM i Development and Modernization is Getting A Fresche Start with Some Ground-Breaking Subscriptions
    • CloudSAFE And Focal Point Solutions Group Combine Services, Unify Brands
    • Guru: Partitioning Result Sets Using SQL
    • As I See It: Elusive Connections
    • IBM i PTF Guide, Volume 25, Number 47
    • AWS Inks Deal With Connectria To Have a Power Play
    • IBM i Shops Have Alternatives to Db2 Web Query
    • Eradani Lays Waste to API Payload Restrictions
    • Four Hundred Monitor, November 15
    • Old PHP and Other PASE Apps Break on IBM i 7.5

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2023 IT Jungle