SlideShare ist ein Scribd-Unternehmen logo
1 von 9
5 Pitfalls of Agent-based Solutions
The Problem With Agents 
The use of agents with a backup and recovery 
solution (either a tape or a disk-to-disk (D2D) 
product), has a direct impact on data security, 
recoverability, and costs. IT managers know the 
downsides that accompany agent-based 
solutions.
5 Pitfalls of Agent-based Solutions 
1. Compromised Security 
2. More pieces of software to manage and to fail 
3. Exorbitant licensing fees 
4. Mounting administrative costs 
5. Application disruption
Compromised Security 
A port in the firewall must be opened for every 
agent. Since almost every agent has 
administrative privileges, it effectively creates 
vulnerability in the server architecture. Hackers 
need only to tap into the agent to attack the 
server. With no in-flight encryption, agents put 
data at risk during transmission from the remote 
office to the data center. 
CC Image courtesy of Daniela on Flickr
More pieces of software 
to manage and to fail 
More sites, more data, more applications, more 
users, more systems, more agents—growth 
makes everything harder to manage—agents 
only compound the problem. As infrastructure 
expands in size and complexity, problem 
diagnosis takes longer. 
CC Image courtesy of Wheeler on Flickr
Exorbitant licensing fees 
Traditional software vendors charge for 
software based on the old per-system model. 
This is costly and requires customers to closely 
monitor their complex system and user 
landscapes. For many growing organizations, 
buying a site license is actually a simpler 
solution — albeit even more costly and often 
unnecessary — than trying to keep track of 
backup products installed across hundreds or 
thousands of machines. 
CC Image courtesy of johnr71 on Flickr
Mounting administrative costs 
Each time a data center administrator or service provider 
has to deploy an agent, or intervene to support it at a 
remote site, cost rolls back into the business model 
making it increasingly difficult to remain competitive. 
CC Image courtesy of 401(k) 2012 on Flickr
Application disruption 
Each time a hot fix or new version of the 
software is released, the agents must be 
upgraded too. This upgrade process requires a 
reboot of the server that the agent resides on. 
Unfortunately, this application disruption must 
be repeated for every affected server on the 
network. 
CC Image courtesy of Irma on Flickr
Download the 
white paper today 
416-736-8111 
www.asigra.com 
info@asigra.com 
@asigra

Weitere ähnliche Inhalte

Was ist angesagt?

Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...
Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...
Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...Sean King
 
Acquisition the great migration
Acquisition  the great migrationAcquisition  the great migration
Acquisition the great migrationincunabula
 
V mware cdcr-11-q3-en-case-study
V mware cdcr-11-q3-en-case-studyV mware cdcr-11-q3-en-case-study
V mware cdcr-11-q3-en-case-studyjoepanora
 
Backup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance GuideBackup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance GuideSymantec
 
228閉館公告.ppt
228閉館公告.ppt228閉館公告.ppt
228閉館公告.pptb4worker
 
Mohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsMohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsnooralmousa
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIvanti
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaSftculotta27
 
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...Jeff Fisher
 
Accenture Customer Story_CAST
Accenture Customer Story_CASTAccenture Customer Story_CAST
Accenture Customer Story_CASTCAST
 
AMB420: Data Center Licensing with License Optimizer
AMB420: Data Center Licensing with License OptimizerAMB420: Data Center Licensing with License Optimizer
AMB420: Data Center Licensing with License OptimizerIvanti
 
Managed Desktop Services
Managed Desktop ServicesManaged Desktop Services
Managed Desktop ServicesGss America
 
IT GRC with Symantec
IT GRC with SymantecIT GRC with Symantec
IT GRC with SymantecArrow ECS UK
 
Windows 10 Migration Tips, Tricks, and Strategies
Windows 10 Migration Tips, Tricks, and StrategiesWindows 10 Migration Tips, Tricks, and Strategies
Windows 10 Migration Tips, Tricks, and StrategiesIvanti
 
What's Really Different About Microservices
What's Really Different About MicroservicesWhat's Really Different About Microservices
What's Really Different About MicroservicesAmbassador Labs
 

Was ist angesagt? (20)

Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...
Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...
Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...
 
Acquisition the great migration
Acquisition  the great migrationAcquisition  the great migration
Acquisition the great migration
 
V mware cdcr-11-q3-en-case-study
V mware cdcr-11-q3-en-case-studyV mware cdcr-11-q3-en-case-study
V mware cdcr-11-q3-en-case-study
 
Backup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance GuideBackup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance Guide
 
Data Center Downtime
Data Center DowntimeData Center Downtime
Data Center Downtime
 
228閉館公告.ppt
228閉館公告.ppt228閉館公告.ppt
228閉館公告.ppt
 
Mohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsMohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environments
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better Together
 
Cloud resilience, provisioning
Cloud resilience, provisioning Cloud resilience, provisioning
Cloud resilience, provisioning
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaS
 
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
 
Accenture Customer Story_CAST
Accenture Customer Story_CASTAccenture Customer Story_CAST
Accenture Customer Story_CAST
 
Ch14 resilience engineering
Ch14 resilience engineeringCh14 resilience engineering
Ch14 resilience engineering
 
AMB420: Data Center Licensing with License Optimizer
AMB420: Data Center Licensing with License OptimizerAMB420: Data Center Licensing with License Optimizer
AMB420: Data Center Licensing with License Optimizer
 
Managed Desktop Services
Managed Desktop ServicesManaged Desktop Services
Managed Desktop Services
 
IT GRC with Symantec
IT GRC with SymantecIT GRC with Symantec
IT GRC with Symantec
 
Windows 10 Migration Tips, Tricks, and Strategies
Windows 10 Migration Tips, Tricks, and StrategiesWindows 10 Migration Tips, Tricks, and Strategies
Windows 10 Migration Tips, Tricks, and Strategies
 
It Budget Tips
It Budget TipsIt Budget Tips
It Budget Tips
 
What's Really Different About Microservices
What's Really Different About MicroservicesWhat's Really Different About Microservices
What's Really Different About Microservices
 
Unit5
Unit5Unit5
Unit5
 

Andere mochten auch

Asigra Cloud-to-Cloud Survey Results
Asigra Cloud-to-Cloud Survey ResultsAsigra Cloud-to-Cloud Survey Results
Asigra Cloud-to-Cloud Survey ResultsAsigra
 
Why Agentless Backup is More Secure
Why Agentless Backup is More SecureWhy Agentless Backup is More Secure
Why Agentless Backup is More SecureAsigra
 
Asigra AWS Snapshot Manager
Asigra AWS Snapshot ManagerAsigra AWS Snapshot Manager
Asigra AWS Snapshot ManagerAsigra
 
7 Reasons Users pick Asigra as Top Enterprise Backup Application
7 Reasons Users pick Asigra as Top Enterprise Backup Application7 Reasons Users pick Asigra as Top Enterprise Backup Application
7 Reasons Users pick Asigra as Top Enterprise Backup ApplicationAsigra
 
5 Backup Industry Predictions for 2015
5 Backup Industry Predictions for 20155 Backup Industry Predictions for 2015
5 Backup Industry Predictions for 2015Asigra
 
4 Keys of a Robust Data Recovery Strategy
4 Keys of a Robust Data Recovery Strategy 4 Keys of a Robust Data Recovery Strategy
4 Keys of a Robust Data Recovery Strategy Asigra
 

Andere mochten auch (6)

Asigra Cloud-to-Cloud Survey Results
Asigra Cloud-to-Cloud Survey ResultsAsigra Cloud-to-Cloud Survey Results
Asigra Cloud-to-Cloud Survey Results
 
Why Agentless Backup is More Secure
Why Agentless Backup is More SecureWhy Agentless Backup is More Secure
Why Agentless Backup is More Secure
 
Asigra AWS Snapshot Manager
Asigra AWS Snapshot ManagerAsigra AWS Snapshot Manager
Asigra AWS Snapshot Manager
 
7 Reasons Users pick Asigra as Top Enterprise Backup Application
7 Reasons Users pick Asigra as Top Enterprise Backup Application7 Reasons Users pick Asigra as Top Enterprise Backup Application
7 Reasons Users pick Asigra as Top Enterprise Backup Application
 
5 Backup Industry Predictions for 2015
5 Backup Industry Predictions for 20155 Backup Industry Predictions for 2015
5 Backup Industry Predictions for 2015
 
4 Keys of a Robust Data Recovery Strategy
4 Keys of a Robust Data Recovery Strategy 4 Keys of a Robust Data Recovery Strategy
4 Keys of a Robust Data Recovery Strategy
 

Ähnlich wie 5 Pitfalls of Agent Based Solutions

Advantages and disadvantages of cloud based manufacturing software
Advantages and disadvantages of cloud based manufacturing softwareAdvantages and disadvantages of cloud based manufacturing software
Advantages and disadvantages of cloud based manufacturing softwareMRPeasy
 
Whitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdf
Whitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdfWhitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdf
Whitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdfFINAP Worldwide
 
Esg solution showcase considerations for protecting converged systems and ...
Esg solution showcase  considerations for protecting converged systems   and ...Esg solution showcase  considerations for protecting converged systems   and ...
Esg solution showcase considerations for protecting converged systems and ...Fernando Alves
 
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISORINLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISORNeha Rana
 
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docxWeek 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docxhelzerpatrina
 
Pros and Cons of Cloud-Based and On-Premise CMMS Software
Pros and Cons of Cloud-Based and On-Premise CMMS SoftwarePros and Cons of Cloud-Based and On-Premise CMMS Software
Pros and Cons of Cloud-Based and On-Premise CMMS SoftwareCryotosCMMSSoftware
 
Cloud brings advantages such as flexibility and scalability cloud co.pdf
Cloud brings advantages such as flexibility and scalability cloud co.pdfCloud brings advantages such as flexibility and scalability cloud co.pdf
Cloud brings advantages such as flexibility and scalability cloud co.pdfanilgoelslg
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationCitrix
 
Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptxnischal52
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloudkairostech
 
2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging ThreatsLumension
 
Propalms Centralized Computing Solution Document
Propalms Centralized Computing   Solution DocumentPropalms Centralized Computing   Solution Document
Propalms Centralized Computing Solution DocumentVijender Yadav
 
Virtualization 2011 v1
Virtualization 2011 v1Virtualization 2011 v1
Virtualization 2011 v1Pini Cohen
 
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...Symantec
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...white paper
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application VirtualizationAmit Gatenyo
 

Ähnlich wie 5 Pitfalls of Agent Based Solutions (20)

Icomm agentless-architecture
Icomm agentless-architectureIcomm agentless-architecture
Icomm agentless-architecture
 
Advantages and disadvantages of cloud based manufacturing software
Advantages and disadvantages of cloud based manufacturing softwareAdvantages and disadvantages of cloud based manufacturing software
Advantages and disadvantages of cloud based manufacturing software
 
Whitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdf
Whitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdfWhitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdf
Whitepaper - Analyzing the Adoption of Cloud Computing For Banking & Finance.pdf
 
Esg solution showcase considerations for protecting converged systems and ...
Esg solution showcase  considerations for protecting converged systems   and ...Esg solution showcase  considerations for protecting converged systems   and ...
Esg solution showcase considerations for protecting converged systems and ...
 
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISORINLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
 
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docxWeek 7 - Choices in Systems Acquisition and Risks, Security,.docx
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
 
Pros and Cons of Cloud-Based and On-Premise CMMS Software
Pros and Cons of Cloud-Based and On-Premise CMMS SoftwarePros and Cons of Cloud-Based and On-Premise CMMS Software
Pros and Cons of Cloud-Based and On-Premise CMMS Software
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Lastline Case Study
Lastline Case StudyLastline Case Study
Lastline Case Study
 
Is it an internal affair
Is it an internal affairIs it an internal affair
Is it an internal affair
 
Cloud brings advantages such as flexibility and scalability cloud co.pdf
Cloud brings advantages such as flexibility and scalability cloud co.pdfCloud brings advantages such as flexibility and scalability cloud co.pdf
Cloud brings advantages such as flexibility and scalability cloud co.pdf
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application Virtualization
 
Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptx
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud
 
2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats
 
Propalms Centralized Computing Solution Document
Propalms Centralized Computing   Solution DocumentPropalms Centralized Computing   Solution Document
Propalms Centralized Computing Solution Document
 
Virtualization 2011 v1
Virtualization 2011 v1Virtualization 2011 v1
Virtualization 2011 v1
 
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application Virtualization
 

Mehr von Asigra

7 Benefits of Agentless Backup
7 Benefits of Agentless Backup 7 Benefits of Agentless Backup
7 Benefits of Agentless Backup Asigra
 
9 Reasons to Choose Asigra
9 Reasons to Choose Asigra9 Reasons to Choose Asigra
9 Reasons to Choose AsigraAsigra
 
8 Reasons for Data Loss
8 Reasons for Data Loss8 Reasons for Data Loss
8 Reasons for Data LossAsigra
 
Asigra Backup Modernization Survey Results
Asigra Backup Modernization Survey ResultsAsigra Backup Modernization Survey Results
Asigra Backup Modernization Survey ResultsAsigra
 
What is cloud backup?
What is cloud backup?What is cloud backup?
What is cloud backup?Asigra
 
3 ways to stretch your backup budget
3 ways to stretch your backup budget3 ways to stretch your backup budget
3 ways to stretch your backup budgetAsigra
 

Mehr von Asigra (6)

7 Benefits of Agentless Backup
7 Benefits of Agentless Backup 7 Benefits of Agentless Backup
7 Benefits of Agentless Backup
 
9 Reasons to Choose Asigra
9 Reasons to Choose Asigra9 Reasons to Choose Asigra
9 Reasons to Choose Asigra
 
8 Reasons for Data Loss
8 Reasons for Data Loss8 Reasons for Data Loss
8 Reasons for Data Loss
 
Asigra Backup Modernization Survey Results
Asigra Backup Modernization Survey ResultsAsigra Backup Modernization Survey Results
Asigra Backup Modernization Survey Results
 
What is cloud backup?
What is cloud backup?What is cloud backup?
What is cloud backup?
 
3 ways to stretch your backup budget
3 ways to stretch your backup budget3 ways to stretch your backup budget
3 ways to stretch your backup budget
 

Kürzlich hochgeladen

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

5 Pitfalls of Agent Based Solutions

  • 1. 5 Pitfalls of Agent-based Solutions
  • 2. The Problem With Agents The use of agents with a backup and recovery solution (either a tape or a disk-to-disk (D2D) product), has a direct impact on data security, recoverability, and costs. IT managers know the downsides that accompany agent-based solutions.
  • 3. 5 Pitfalls of Agent-based Solutions 1. Compromised Security 2. More pieces of software to manage and to fail 3. Exorbitant licensing fees 4. Mounting administrative costs 5. Application disruption
  • 4. Compromised Security A port in the firewall must be opened for every agent. Since almost every agent has administrative privileges, it effectively creates vulnerability in the server architecture. Hackers need only to tap into the agent to attack the server. With no in-flight encryption, agents put data at risk during transmission from the remote office to the data center. CC Image courtesy of Daniela on Flickr
  • 5. More pieces of software to manage and to fail More sites, more data, more applications, more users, more systems, more agents—growth makes everything harder to manage—agents only compound the problem. As infrastructure expands in size and complexity, problem diagnosis takes longer. CC Image courtesy of Wheeler on Flickr
  • 6. Exorbitant licensing fees Traditional software vendors charge for software based on the old per-system model. This is costly and requires customers to closely monitor their complex system and user landscapes. For many growing organizations, buying a site license is actually a simpler solution — albeit even more costly and often unnecessary — than trying to keep track of backup products installed across hundreds or thousands of machines. CC Image courtesy of johnr71 on Flickr
  • 7. Mounting administrative costs Each time a data center administrator or service provider has to deploy an agent, or intervene to support it at a remote site, cost rolls back into the business model making it increasingly difficult to remain competitive. CC Image courtesy of 401(k) 2012 on Flickr
  • 8. Application disruption Each time a hot fix or new version of the software is released, the agents must be upgraded too. This upgrade process requires a reboot of the server that the agent resides on. Unfortunately, this application disruption must be repeated for every affected server on the network. CC Image courtesy of Irma on Flickr
  • 9. Download the white paper today 416-736-8111 www.asigra.com info@asigra.com @asigra

Hinweis der Redaktion

  1. Flickr source:Daniela https://www.flickr.com/photos/_cinnamongirl_/4719955116/in/photolist-8c61du-8QidM5-8QhWjA-mCjpG1-6xiTW-9vhGNg-687b9t-8Lbbjn-4LgcRj-8P3so9-dmhTZV-66MoHs-4ukLnr-4tZwf3--aesK6B-7tFe45-nbGoYn-hEQkkp-5Yt3g9-8K3BwY-7yePHw-4qhPDN-ch8n3w-hnYDLw-ibRxGP-k4LALk-mKR78F-hEQkR4-as19Xy-hjG67k-bDtM2Q-9bH4ur-3dFgrb-6z4nLX-hsNMkM-6ud1af-nvXbCg-ntijbW-5W4jir-7T4B4H-7VjKCe-5xiEh1-hi8XRv-83pfyE-83pfow-83m9V2-83mapB-83pfSs-83m9Ne
  2. Flickr: Nick Wheeler https://www.flickr.com/photos/nickwheeleroz/2475011402/in/photolist-5QsoS4-68BdF7-nY5ghH-Byei-6xHg4D-4Yz9pX-bxTkFi-G3A6H-9uvLiX-6saNDt-2pJwNU-7vHV37-huVdVU-LtANW-4LH5Eo-7YfJEU-6iqkif-4kPZSy-n677G1-6fG3cA-otMiN-nGxoRF-Dbr24-dimsLA-bkn527-iqzsx-aDNoX3-4YujuD-5wHKde-bkrPGZ-6Cpndm-5mXZMK-aub54u-6mmvnf-9r1bkN-bgqRne-daE3nQ-niJXd9-4o3833-5PZ1uJ-9iAnWd-5hpS1J-fDbcL8-dNokoD-5r4pYU-dd9wDe-8FSgP7-7FVyM6-jDK8dZ-b8vXKp
  3. Flickr: johnr71 https://www.flickr.com/photos/werdinsel/3970430829/in/photolist-73RuKX-axpAZ3-dxd4X-bZvUDS-2Bvzr6-bta3kH-9wUujx-nmBKXo-dxuWAA-6RtATg-97a2EQ-a9JfVU-4PFxfL-6S5a4M-abWteX-58mdYr-QxcaH-7HKuTk-dAZ56a-4Z9qi7-7keDu6-5tzfK2-4kzsX8-gDEKZ-h3Hnof-brd1K2-7xzWSa-6G1cSn-5dTR5Y-4jADaG-fWMmdW-dTUAhR-k4eBP2-aRWoXr-2nn3Gn-4CW5zn-9tUy9S-3ijh8-MZLQA-onmVA-5p8w8o-5rzm-aosgi9-bq61RF-d9bVR-648c5A-dj5e9J-mbGHps-9um7iM-ddi5Gd
  4. Flickr source: 401(K) 2012 https://www.flickr.com/photos/68751915@N05/6551534889/in/photolist-aYWk56-aFAQEv-buW1s2-7M4MWJ-PNrwk-6u2TxZ-84wJAM-4mafw3-5k7qL3-4K9ZCw-buhrpp-6MMVrB-7jq9Cn-Qt2VW-5G4WCi-6uXAjv-cDWLKs-62QVKf-dm3GF5-8CCxH-29ocTv-a2i22S-egE3Qz-apUnh-7m9Y8g-3q1C3-buV6x-5tnxsi-82zjvr-73RuKX-axpAZ3-dxd4X-bZvUDS-2Bvzr6-bta3kH-9wUujx-nmBKXo-dxuWAA-6RtATg-97a2EQ-a9JfVU-4PFxfL-6S5a4M-abWteX-58mdYr-QxcaH-7HKuTk-dAZ56a-9um7iM-4Z9qi7
  5. Flickr: Irma https://www.flickr.com/photos/perikita/141716937/in/photolist-dwkvt-7aT28E-7kmzDZ-nkuXt6-9iGi4C-BmfPn-9b2saC-cKR3jL-nFiJcU-9S3veK-9aGSGd-bkDpUQ-9aJz2D-7ExN7B-9b4rDh-ho4LN7-au68o6-5ZWPmi-BXg8j-9aX6R8-8R1GmL-jk7D9A-bk5L6u-5FWC5z-apK4yb-3fyDpe-6pebQj-7vVqpm-6GNfF8-c9bp2w-6Fy4Nt-5ybW9F-jxSdAL-b83ZER-9zGAFj-9aWRr3-9nQ3fq-9xgr1i-BfTqt-4q7MvF-7JGFfF-7JZbmd-amHjyn-e6EzaH-7HdVGo-4Bip5j-eD1xS-99i2k-avQmmh-mCPdAL