EMC Corp. today released a range of software and hardware products aimed at helping IT teams deal with the chaos data backup solutions arbitrarily implemented by various stakeholders such as application owners, virtual machine administrators as well as storage and server administrators.
When administrators or app owners implement their own solutions in order to enhance the control and visibility they have over the computing environments they manage the result is often an “accidental architecture,” according to EMC. For instance program managers may opt to create their own backup systems either on the cloud or using on-premise systems.
The practices could increase IT expenditures, create security issues and add to architectural complexity.
“Accidental architectures consist of a fragmented set of data protection processes and infrastructure silos, the ownership of which is often unclear,” the company said in statement.
Accidental architectures are an outgrowth of users addressing individual data protection challenges reactively as they arise, and applying costly siloed or ‘one size fits all’ products and solutions that become difficult to manage, optimize and pay for,” according to Guy Churchward, president of EMC’s data recovery systems division.
Deployment of EMC’s Protection Storage Architecture alleviates this problem by helping organizations integrate data sources to optimize data flows and user interfaces to data sources, improve data management by providing a catalog of all data copies and providing reporting and analytics compliance capability, and providing backup, data recovery and archiving capabilities. The products will be available in the third quarter of 2013.
“Deployment of a Protection Storage Architecture, which arrests the proliferation of the accidental architectures we talk so much about is the best strategy for ensuring effective data protection,” Churchward. “The products we’ve announced today pave the way for our customers to consolidate their data protection strategy and infrastructure and enable them to proactively prepare for the data protection challenges that accompany transformational IT initiatives.
The release includes: