SlideShare a Scribd company logo
1 of 7
Download to read offline
Agentless Backup is
Not a Myth.

Contents
Agentless Backup is Not a Myth

2

Why This Matters

2

The Problem With Agents

4

How does it work?

5

Why it works?

6

www.asigra.com
Agentless Backup is Not a Myth.
The Asigra solution requires no agents, which inherently makes it easier to install and
support than other backup and recovery solutions.
Backup and recovery software typically requires agents that are installed onto the servers that a system administrator wants to back up. Even in a modest-sized environment,
agent management can become extremely complex when an administrator is forced to
deal with different operating systems and revision levels. The complexity of agent management is further complicated by the growing number of applications that also require
agents running on the same servers. This proliferation of agents and its associated drain
on CPU resources is often referred to as “agent pollution”.
Asigra does not require any agents to be installed but instead reaches out over the
network to back up operating systems, file systems, and applications, using industrystandard programming interfaces. To understand how Asigra backs up data over a network without the use of agents, consider how a local hard drive on a typical PC can be
accessed remotely.
A system administrator only needs the right permissions to access that local hard
drive over the network. A disk-to-disk backup is performed by simply copying the contents of the hard drive to another hard drive on the network. Asigra software uses a
sophisticated extension of this idea, unlike other software that requires agents on every
machine. The Asigra solution is simple and elegant in concept, but required a lot of hard
work and years of development to get it right on a broad variety of operating systems
and data types.

Why This Matters
Dealing with backup software agents is a cumbersome
and mundane task that can be extremely time consuming.
Matching agent revisions with operating system levels,
researching compatibility issues, and other labor-intensive
tasks are non-existent when using the Asigra solution.
Additionally, many problems that occur while managing backup software in complex environments are due

to compatibility issues with agents. Compared to other
solutions, Asigra’s agentless design is inherently easier
to support and the risk of problems is reduced. Finally,
agents rob processing power from the core applications of
every machine on which they’re installed. Asigra makes no
such demands on the servers it is backing up. Multiplied
over thousands of machines, that extra power efficiency
can mean significant savings and greener operations.

Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
Tel: 0121 248 7931  Email: salesr@icomm.co.uk
TRADITIONAL AGENT BASED
BACKUP SOFTWARE.
Take the inventory
Share it with the partner/vendor
(Disclose network information)
Ensure the configuration is
accurate and buy the agents
Buy additional agents
when you add servers,
applications, databases
 upgrade all agents
frequently

Agent
SharePoint

Agent
Exchange
Agent
Oracle

Agent
Sybase
Backup
Media Server

CE

NTR

AL

OF

Agent
GroupWise

FIC

E

Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
Tel: 0121 248 7931  Email: salesr@icomm.co.uk

Agent
SQL
ASIGRA = AGENTLESS.
Multi-Site License (Capacity-based)
Add servers, applications, databases on the fly
Zero touch upgrades

SharePoint
Exchange
Oracle
SQL

Hyper-V
VMware
Laptop
DS-Client
DS-System

LOCAL
STORAGE

CE

NTR

AL

OF

IP
WAN

FIC

E

The Problem With Agents
The use of agents with a backup/recovery solution
(either a tape or a disk-to-disk (D2D) product), has a direct
impact on data security, recoverability, and costs. IT
managers know the downsides that accompany agentbased solutions:

Compromised security. A port in the firewall must be
opened for every agent. And, because almost every agent
has administrative privileges, it effectively creates vulnerability in the server architecture. Hackers need only to
tap into the agent to attack the server. With no “in-flight”
encryption, agents also put data at risk during transmission from the remote office to the data center.

More pieces of software to manage and to fail.
More sites, more data, more applications, more users, more
systems, more agents—growth makes everything harder

DISK
STORAGE

I NT
(PRE R N
A
M S IVAT L DA
E
T
(PUP DA CLO A CE
B L TA C U D NTE
)
IC
CL E NTE OR R
OU R
D)

to manage, and agents only compound the problem. As
infrastructure expands in size and complexity, problem
diagnosis takes longer. Every operating system upgrade
(now implemented monthly by many organizations) creates more opportunities for conflicts amongst applications,
including proliferating backup agents.
The fact is backup agents drain IT resources, cause disruptive downtime, and, ultimately, undermine the certainty of
data recoverability.

Exorbitant licensing fees. Traditional software vendors charge for software based on the old per-system
model. This is costly and requires customers to closely
monitor their complex system and user landscapes. For
many growing organizations, buying a site license is
actually a simpler solution — albeit even more costly and
often unnecessary — than trying to keep track of backup

Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
Tel: 0121 248 7931  Email: salesr@icomm.co.uk
products installed across hundreds or thousands of
machines. There are even consulting companies that now
do audits to help enterprises lower license fees.

print servers, email servers, databases, and workstations.
For large enterprises with thousands of backup agents,
licensing and support costs can quickly add up to millions
of dollars.

Mounting administrative costs. Heterogeneous applica-

Application Disruption. Each time a hot fix or new

tion environments can be administrative nightmares when
backup processes require the installation and management
of a different agent for every kind of database, application
and operating system. It takes time and a lot of ‘touching’
of remote-site systems to push agents and upgrades out
to every server. And each time a data center administrator
or service provider has to deploy an agent, or intervene
to support it at a remote site, that cost rolls back into the
business model making it increasingly difficult to
remain competitive.

version of the software is released, the agents must be
upgraded too. This upgrade process requires a reboot of
the server that the agent resides on. Unfortunately, this
application disruption must be repeated for every affected
server on the network. With Asigra, there is no application
disruption. Asigra agentless client software is dispatched
and upgraded silently with no need for a server reboot.

How does it work?
As the industry’s only agentless, multi-site backup and
recovery software solution, Asigra technology completely
eliminates the negative impact of agents. How does
it work?

To put licensing and administrative costs in perspective,
an enterprise with as few as five offices can easily spend
$50,000 to purchase and maintain backup agents for file/

CLOUD
STORAGE

Direct Attached
(SATA)
ARCHIVE
STORAGE

BLM Archiver

Cloud Storage

Production
DS-License
Archive Data
Destruction
with Certificate
Web Portal

DS-Billing

NAS
DS-System

MS

CU

STO

ME

PP

RIM

LO
TU

S

IN

T

HY ANG
PE E
RV
M AREPO
IB

MS

SH

F

Windows
DS-Client

IL
SQ E SER
EX L D VER
CH B

LOCAL/
LOCAL-ONLY

AR
YD
ATA
C

EN

TER

IP
WAN

RA

(PU

BL

IC

LOCAL/
LOCAL-ONLY

CL
OU

D)

Linux
DS-Client

RE

MO
TE

US

IB CL
Xe M 0 E
nS B2
erv
er

UN
VM IX

IB wa
M re
OR AS40
A
0

DS-Mobile Client

ER

(S)

CU

STO

ME

RB

Initial Backup
to External
Digital Media

Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
Tel: 0121 248 7931  Email: salesr@icomm.co.uk

ONLINE
STORAGE
The Asigra architecture consists of two software components: the DS-Client and the DS-System.
DS-Client software, installed on one server (Windows,
Macintosh, or Linux) at each local and remote site, captures data from its target backup machines. The DS-Client
then processes the data to reduce its size (compression
and deduplication), encrypts it for security, and then transmits the data via IP WAN to the DS-System at the
storage location.
The DS-Client does not require installation of any backup
agents on its target machines. The DS-Client fully integrates with NT domains, Trusts and Novell NDS trees, and
otherwise adopts the remote site’s existing LAN security
settings. Using standard APIs, the DS-Client can remotely
log in to target backup systems, capture requested
data, and securely manage transmissions to the central
site. Utilizing common data reduction technologies, the
DS-Client minimizes the amount of data transmitted and
stored at the onsite or off-site vault.
The DS-System manages the storage repository for backup
data transmitted from one or multiple DS-Clients. The
DS-System (configured as direct-attached disk, NAS or
SAN) can be installed on Linux and Windows platforms.
Asigra software integrates a comprehensive feature set
designed to maximize and accelerate data recoverability.
An Autonomic Healing module, for example, runs seamlessly in the background to identify and isolate corrupt or
otherwise problematic files. As an added value, if a corrupt
file is found to be irreparable, it is tagged to be re-transmitted on the next scheduled backup. Another feature, the
Local Restore tool, allows remote-office storage of backup
data. This ensures that local users can restore critical data
immediately and at LAN speed.
Additional Asigra tools include an Online File Summary,
Long Term Storage policy-making, a Discovery Tool to
automatically ascertain characteristics of primary data,
Email Message Level Restore, Bare Metal Restore capability, Client and System Monitoring, and SNMP Integration.

Why it works?
The Asigra software eliminates the requirement for locally
installed agents because it leverages the protocols, APIs,
methods and functionality that platform, operating system, database, and other application vendors utilize for
remotely managing their own systems. Other backup/
restore solutions require a unique backup agent (installed

on every target machine) for each type of system and
application. Asigra, however, supports all major platforms
and applications with a software system composed of just
two major components: the DS-Client (one installed at
each site) and the DS-System (installed at the
vaulting location).
Another advantage of the Asigra software is that it
enables multi-level access controls.

The Benefits of
Agentless:
Reduce Costs,
Robust Security,
Simpler Scaling.
At installation, the DS-Client is assigned privileges to
establish access rights that meet the requirements of the
site or organization. For example, the DS-Client might be
assigned multiple credentials for the same network to
allow the domain administrator to back up all systems,
including servers and workstations, while enabling users
to control the backups of individual workstations. The
Asigra software has also been highly optimized to conserve both LAN and target-system CPU resources.
Implementing an Asigra backup/recovery solution produces immediate and dramatic benefits.

Significant savings. Even if backup agents from other
vendors were free, the Asigra solution would still provide huge savings. First-year operating expenses alone
approach an estimated $150,000 for an enterprise environment with 1,000 server agents. Annual server maintenance
and operating expenses for this same configuration add up
to nearly $60,000. The agentless Asigra solution eliminates
those operating costs in addition to the purchase price of
the agents.

Simple licensing. DS-Client licenses ARE free. Asigra
offers businesses a unique pay-as-you-grow pricing model
based simply on the amount of compressed backup data

Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
Tel: 0121 248 7931  Email: salesr@icomm.co.uk
stored. Customers purchase Asigra software the same as
disk capacity — no license fees, no tracking, no overspending on site licenses — paying only for compressed storage
capacity consumed.

One piece of software to install, manage, and
diagnose. Asigra software even upgrades itself, so there
are no time-consuming and resource-draining updates
required for the hundreds or perhaps thousands of systems
on typical enterprise networks.

WAN/LAN/CPU resource conservation. Asigra
software runs with negligible impact on servers, workstations, and laptops, eliminating the drain on CPU resources
associated with agent-based solutions. Data reduction
technologies also minimize the impact on bandwidth and
storage resources. While traditional agent-based backup/
recovery solutions require implementation of high-speed
connections between the central data center and remote
offices, Asigra works with existing links such as DSL.

Robust, hardcoded security. Asigra software provides
extremely safe ‘in-flight’ and ‘at-rest’ data security utilizing up to 256 bit AES encryption. And it works within the

organization’s security framework—there are no agents
to open hacker-tempting ports in the firewall. With secure
data transmission across an IP WAN, the Asigra solution
helps businesses achieve compliance, minimize information-loss liabilities, and protect customer confidence.

‘Elegant’ scaling. The DS-System is capable of elegantly
scaling both in the dimensions of capacity and performance. This type of scalability is critical for environments
with large numbers of remote sites, high-capacity data
sets, and rapid data growth. While agent-based solutions
compound complexity in rapid growth environments, the
Asigra agentless backup/recovery solution easily accommodates new capacity, new applications, and new sites.
Features such as integrated load balancing ensure efficiency across multiple DS-System IP addresses.

Backup consistency, improved recoverability. The
simplicity, efficiency, and security of the Asigra system
makes it easy for remote sites to implement and maintain
consistent data backup programs. This means companies
can significantly boost data recoverability in locations
where success rates below 50% were once the norm.

About Asigra
Asigra transforms the way businesses manage and protect their data by
delivering market leading cloud backup solutions that seamlessly and
efficiently manage, scale and deliver data protection services. Asigra
Cloud Backup™ is built for new and existing MSPs/VARs who focus
on data protection, IT constrained organizations, and industries with
compliance mandates that are looking to improve their backup with a
secure, reliable and predictable data protection cloud backup model.
With 25 years of experience as backup/recovery pioneers, Asigra

technology protects more than 400,000 sites globally ranging from the
Global 100 to SMBs. The world’s largest and most profitable service
providers including CDW, HP and Terremark Worldwide power their
cloud backup services using Asigra technology. Asigra is headquartered in Toronto, Canada, with offices globally.

Tel: 416.736.8111
Email: info@asigra.com
Web: www.asigra.com

Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
Tel: 0121 248 7931  Email: salesr@icomm.co.uk

More Related Content

What's hot

5 Pitfalls of Agent Based Solutions
5 Pitfalls of Agent Based Solutions5 Pitfalls of Agent Based Solutions
5 Pitfalls of Agent Based Solutions
Asigra
 
Thin Provisioning Comparison
Thin Provisioning ComparisonThin Provisioning Comparison
Thin Provisioning Comparison
lneut03
 
Ehealth systemedge-product-brief-us
Ehealth systemedge-product-brief-usEhealth systemedge-product-brief-us
Ehealth systemedge-product-brief-us
gopi01
 

What's hot (20)

Boomerang Total Recall
Boomerang Total RecallBoomerang Total Recall
Boomerang Total Recall
 
Orion NTA Customer Training
Orion NTA Customer TrainingOrion NTA Customer Training
Orion NTA Customer Training
 
Desktop management and support
Desktop management and supportDesktop management and support
Desktop management and support
 
Managed Desktop Services
Managed Desktop ServicesManaged Desktop Services
Managed Desktop Services
 
Liberatore_Resume
Liberatore_ResumeLiberatore_Resume
Liberatore_Resume
 
Lanlogic IT White Paper
Lanlogic IT White PaperLanlogic IT White Paper
Lanlogic IT White Paper
 
The Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - PowertechThe Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - Powertech
 
Citrix command lines
Citrix command linesCitrix command lines
Citrix command lines
 
5 Pitfalls of Agent Based Solutions
5 Pitfalls of Agent Based Solutions5 Pitfalls of Agent Based Solutions
5 Pitfalls of Agent Based Solutions
 
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
SolarWinds Product Management Technical Drilldown on Deep Packet Inspection a...
 
how-to-get-ready-ebook-en
how-to-get-ready-ebook-enhow-to-get-ready-ebook-en
how-to-get-ready-ebook-en
 
Managing a virtual datacenter with System Center
Managing a virtual datacenter with System CenterManaging a virtual datacenter with System Center
Managing a virtual datacenter with System Center
 
Is it an internal affair
Is it an internal affairIs it an internal affair
Is it an internal affair
 
Thin Provisioning Comparison
Thin Provisioning ComparisonThin Provisioning Comparison
Thin Provisioning Comparison
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Troubleshoot Network Problems with Routing Rules
Troubleshoot Network Problems with Routing RulesTroubleshoot Network Problems with Routing Rules
Troubleshoot Network Problems with Routing Rules
 
NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud Computing
 
Ehealth systemedge-product-brief-us
Ehealth systemedge-product-brief-usEhealth systemedge-product-brief-us
Ehealth systemedge-product-brief-us
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
NSX on VMware Data Center
NSX on VMware Data CenterNSX on VMware Data Center
NSX on VMware Data Center
 

Similar to Icomm agentless-architecture

Tools of noc
Tools of nocTools of noc
Tools of noc
munawarul
 
Solution Brief - Cloud Backup Services
Solution Brief - Cloud Backup ServicesSolution Brief - Cloud Backup Services
Solution Brief - Cloud Backup Services
Caitlin Brittingham
 

Similar to Icomm agentless-architecture (20)

ApplicationPro Flyer English
ApplicationPro Flyer EnglishApplicationPro Flyer English
ApplicationPro Flyer English
 
EACS Cloud Backup
EACS Cloud BackupEACS Cloud Backup
EACS Cloud Backup
 
Building Secure Services in the Cloud
Building Secure Services in the CloudBuilding Secure Services in the Cloud
Building Secure Services in the Cloud
 
On premise vs cloud server
On premise vs cloud serverOn premise vs cloud server
On premise vs cloud server
 
PowerPro Flyer English
PowerPro Flyer EnglishPowerPro Flyer English
PowerPro Flyer English
 
Icomm cloud-backup-overview
Icomm cloud-backup-overviewIcomm cloud-backup-overview
Icomm cloud-backup-overview
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer English
 
ADC_ver-1.3
ADC_ver-1.3ADC_ver-1.3
ADC_ver-1.3
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
 
Tools of noc
Tools of nocTools of noc
Tools of noc
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
 
Cloud First Architecture
Cloud First ArchitectureCloud First Architecture
Cloud First Architecture
 
Service Models - Databas - Monitoring - Communication.ppt
Service Models - Databas - Monitoring - Communication.pptService Models - Databas - Monitoring - Communication.ppt
Service Models - Databas - Monitoring - Communication.ppt
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
 
Solution Brief - Cloud Backup Services
Solution Brief - Cloud Backup ServicesSolution Brief - Cloud Backup Services
Solution Brief - Cloud Backup Services
 
Deployment websese
Deployment webseseDeployment websese
Deployment websese
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
 
A Complete Guide to Cloud Computing, Everything You Need To Know.pdf
A Complete Guide to Cloud Computing, Everything You Need To Know.pdfA Complete Guide to Cloud Computing, Everything You Need To Know.pdf
A Complete Guide to Cloud Computing, Everything You Need To Know.pdf
 
Software Datasheet Template
Software Datasheet TemplateSoftware Datasheet Template
Software Datasheet Template
 

More from Icomm Technologies

More from Icomm Technologies (20)

The truth behind cyber attacks
The truth behind cyber attacks The truth behind cyber attacks
The truth behind cyber attacks
 
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
 
Anatomy of a cyber-attack
Anatomy of a cyber-attackAnatomy of a cyber-attack
Anatomy of a cyber-attack
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.
 
Swivel Secure and Office 365
Swivel Secure and Office 365Swivel Secure and Office 365
Swivel Secure and Office 365
 
Swivel Secure, ADFS and Office 365
Swivel Secure, ADFS and Office 365Swivel Secure, ADFS and Office 365
Swivel Secure, ADFS and Office 365
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Top 10 Trends in Telecommuting
Top 10 Trends in TelecommutingTop 10 Trends in Telecommuting
Top 10 Trends in Telecommuting
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate Networks
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Tackling consumerization of it
Tackling consumerization of it Tackling consumerization of it
Tackling consumerization of it
 
Office 365-technical-overview-deck
Office 365-technical-overview-deckOffice 365-technical-overview-deck
Office 365-technical-overview-deck
 
Icomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paper
 
Efficiently protect-virtual-machines
Efficiently protect-virtual-machinesEfficiently protect-virtual-machines
Efficiently protect-virtual-machines
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Beakbane safeguards future with ERP - ready infrastructure upgrade.
Beakbane safeguards future with ERP - ready infrastructure upgrade.Beakbane safeguards future with ERP - ready infrastructure upgrade.
Beakbane safeguards future with ERP - ready infrastructure upgrade.
 

Recently uploaded

Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
Nauman Safdar
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 

Recently uploaded (20)

Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial Wings
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 

Icomm agentless-architecture

  • 1. Agentless Backup is Not a Myth. Contents Agentless Backup is Not a Myth 2 Why This Matters 2 The Problem With Agents 4 How does it work? 5 Why it works? 6 www.asigra.com
  • 2. Agentless Backup is Not a Myth. The Asigra solution requires no agents, which inherently makes it easier to install and support than other backup and recovery solutions. Backup and recovery software typically requires agents that are installed onto the servers that a system administrator wants to back up. Even in a modest-sized environment, agent management can become extremely complex when an administrator is forced to deal with different operating systems and revision levels. The complexity of agent management is further complicated by the growing number of applications that also require agents running on the same servers. This proliferation of agents and its associated drain on CPU resources is often referred to as “agent pollution”. Asigra does not require any agents to be installed but instead reaches out over the network to back up operating systems, file systems, and applications, using industrystandard programming interfaces. To understand how Asigra backs up data over a network without the use of agents, consider how a local hard drive on a typical PC can be accessed remotely. A system administrator only needs the right permissions to access that local hard drive over the network. A disk-to-disk backup is performed by simply copying the contents of the hard drive to another hard drive on the network. Asigra software uses a sophisticated extension of this idea, unlike other software that requires agents on every machine. The Asigra solution is simple and elegant in concept, but required a lot of hard work and years of development to get it right on a broad variety of operating systems and data types. Why This Matters Dealing with backup software agents is a cumbersome and mundane task that can be extremely time consuming. Matching agent revisions with operating system levels, researching compatibility issues, and other labor-intensive tasks are non-existent when using the Asigra solution. Additionally, many problems that occur while managing backup software in complex environments are due to compatibility issues with agents. Compared to other solutions, Asigra’s agentless design is inherently easier to support and the risk of problems is reduced. Finally, agents rob processing power from the core applications of every machine on which they’re installed. Asigra makes no such demands on the servers it is backing up. Multiplied over thousands of machines, that extra power efficiency can mean significant savings and greener operations. Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom Tel: 0121 248 7931  Email: salesr@icomm.co.uk
  • 3. TRADITIONAL AGENT BASED BACKUP SOFTWARE. Take the inventory Share it with the partner/vendor (Disclose network information) Ensure the configuration is accurate and buy the agents Buy additional agents when you add servers, applications, databases upgrade all agents frequently Agent SharePoint Agent Exchange Agent Oracle Agent Sybase Backup Media Server CE NTR AL OF Agent GroupWise FIC E Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom Tel: 0121 248 7931  Email: salesr@icomm.co.uk Agent SQL
  • 4. ASIGRA = AGENTLESS. Multi-Site License (Capacity-based) Add servers, applications, databases on the fly Zero touch upgrades SharePoint Exchange Oracle SQL Hyper-V VMware Laptop DS-Client DS-System LOCAL STORAGE CE NTR AL OF IP WAN FIC E The Problem With Agents The use of agents with a backup/recovery solution (either a tape or a disk-to-disk (D2D) product), has a direct impact on data security, recoverability, and costs. IT managers know the downsides that accompany agentbased solutions: Compromised security. A port in the firewall must be opened for every agent. And, because almost every agent has administrative privileges, it effectively creates vulnerability in the server architecture. Hackers need only to tap into the agent to attack the server. With no “in-flight” encryption, agents also put data at risk during transmission from the remote office to the data center. More pieces of software to manage and to fail. More sites, more data, more applications, more users, more systems, more agents—growth makes everything harder DISK STORAGE I NT (PRE R N A M S IVAT L DA E T (PUP DA CLO A CE B L TA C U D NTE ) IC CL E NTE OR R OU R D) to manage, and agents only compound the problem. As infrastructure expands in size and complexity, problem diagnosis takes longer. Every operating system upgrade (now implemented monthly by many organizations) creates more opportunities for conflicts amongst applications, including proliferating backup agents. The fact is backup agents drain IT resources, cause disruptive downtime, and, ultimately, undermine the certainty of data recoverability. Exorbitant licensing fees. Traditional software vendors charge for software based on the old per-system model. This is costly and requires customers to closely monitor their complex system and user landscapes. For many growing organizations, buying a site license is actually a simpler solution — albeit even more costly and often unnecessary — than trying to keep track of backup Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom Tel: 0121 248 7931  Email: salesr@icomm.co.uk
  • 5. products installed across hundreds or thousands of machines. There are even consulting companies that now do audits to help enterprises lower license fees. print servers, email servers, databases, and workstations. For large enterprises with thousands of backup agents, licensing and support costs can quickly add up to millions of dollars. Mounting administrative costs. Heterogeneous applica- Application Disruption. Each time a hot fix or new tion environments can be administrative nightmares when backup processes require the installation and management of a different agent for every kind of database, application and operating system. It takes time and a lot of ‘touching’ of remote-site systems to push agents and upgrades out to every server. And each time a data center administrator or service provider has to deploy an agent, or intervene to support it at a remote site, that cost rolls back into the business model making it increasingly difficult to remain competitive. version of the software is released, the agents must be upgraded too. This upgrade process requires a reboot of the server that the agent resides on. Unfortunately, this application disruption must be repeated for every affected server on the network. With Asigra, there is no application disruption. Asigra agentless client software is dispatched and upgraded silently with no need for a server reboot. How does it work? As the industry’s only agentless, multi-site backup and recovery software solution, Asigra technology completely eliminates the negative impact of agents. How does it work? To put licensing and administrative costs in perspective, an enterprise with as few as five offices can easily spend $50,000 to purchase and maintain backup agents for file/ CLOUD STORAGE Direct Attached (SATA) ARCHIVE STORAGE BLM Archiver Cloud Storage Production DS-License Archive Data Destruction with Certificate Web Portal DS-Billing NAS DS-System MS CU STO ME PP RIM LO TU S IN T HY ANG PE E RV M AREPO IB MS SH F Windows DS-Client IL SQ E SER EX L D VER CH B LOCAL/ LOCAL-ONLY AR YD ATA C EN TER IP WAN RA (PU BL IC LOCAL/ LOCAL-ONLY CL OU D) Linux DS-Client RE MO TE US IB CL Xe M 0 E nS B2 erv er UN VM IX IB wa M re OR AS40 A 0 DS-Mobile Client ER (S) CU STO ME RB Initial Backup to External Digital Media Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom Tel: 0121 248 7931  Email: salesr@icomm.co.uk ONLINE STORAGE
  • 6. The Asigra architecture consists of two software components: the DS-Client and the DS-System. DS-Client software, installed on one server (Windows, Macintosh, or Linux) at each local and remote site, captures data from its target backup machines. The DS-Client then processes the data to reduce its size (compression and deduplication), encrypts it for security, and then transmits the data via IP WAN to the DS-System at the storage location. The DS-Client does not require installation of any backup agents on its target machines. The DS-Client fully integrates with NT domains, Trusts and Novell NDS trees, and otherwise adopts the remote site’s existing LAN security settings. Using standard APIs, the DS-Client can remotely log in to target backup systems, capture requested data, and securely manage transmissions to the central site. Utilizing common data reduction technologies, the DS-Client minimizes the amount of data transmitted and stored at the onsite or off-site vault. The DS-System manages the storage repository for backup data transmitted from one or multiple DS-Clients. The DS-System (configured as direct-attached disk, NAS or SAN) can be installed on Linux and Windows platforms. Asigra software integrates a comprehensive feature set designed to maximize and accelerate data recoverability. An Autonomic Healing module, for example, runs seamlessly in the background to identify and isolate corrupt or otherwise problematic files. As an added value, if a corrupt file is found to be irreparable, it is tagged to be re-transmitted on the next scheduled backup. Another feature, the Local Restore tool, allows remote-office storage of backup data. This ensures that local users can restore critical data immediately and at LAN speed. Additional Asigra tools include an Online File Summary, Long Term Storage policy-making, a Discovery Tool to automatically ascertain characteristics of primary data, Email Message Level Restore, Bare Metal Restore capability, Client and System Monitoring, and SNMP Integration. Why it works? The Asigra software eliminates the requirement for locally installed agents because it leverages the protocols, APIs, methods and functionality that platform, operating system, database, and other application vendors utilize for remotely managing their own systems. Other backup/ restore solutions require a unique backup agent (installed on every target machine) for each type of system and application. Asigra, however, supports all major platforms and applications with a software system composed of just two major components: the DS-Client (one installed at each site) and the DS-System (installed at the vaulting location). Another advantage of the Asigra software is that it enables multi-level access controls. The Benefits of Agentless: Reduce Costs, Robust Security, Simpler Scaling. At installation, the DS-Client is assigned privileges to establish access rights that meet the requirements of the site or organization. For example, the DS-Client might be assigned multiple credentials for the same network to allow the domain administrator to back up all systems, including servers and workstations, while enabling users to control the backups of individual workstations. The Asigra software has also been highly optimized to conserve both LAN and target-system CPU resources. Implementing an Asigra backup/recovery solution produces immediate and dramatic benefits. Significant savings. Even if backup agents from other vendors were free, the Asigra solution would still provide huge savings. First-year operating expenses alone approach an estimated $150,000 for an enterprise environment with 1,000 server agents. Annual server maintenance and operating expenses for this same configuration add up to nearly $60,000. The agentless Asigra solution eliminates those operating costs in addition to the purchase price of the agents. Simple licensing. DS-Client licenses ARE free. Asigra offers businesses a unique pay-as-you-grow pricing model based simply on the amount of compressed backup data Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom Tel: 0121 248 7931  Email: salesr@icomm.co.uk
  • 7. stored. Customers purchase Asigra software the same as disk capacity — no license fees, no tracking, no overspending on site licenses — paying only for compressed storage capacity consumed. One piece of software to install, manage, and diagnose. Asigra software even upgrades itself, so there are no time-consuming and resource-draining updates required for the hundreds or perhaps thousands of systems on typical enterprise networks. WAN/LAN/CPU resource conservation. Asigra software runs with negligible impact on servers, workstations, and laptops, eliminating the drain on CPU resources associated with agent-based solutions. Data reduction technologies also minimize the impact on bandwidth and storage resources. While traditional agent-based backup/ recovery solutions require implementation of high-speed connections between the central data center and remote offices, Asigra works with existing links such as DSL. Robust, hardcoded security. Asigra software provides extremely safe ‘in-flight’ and ‘at-rest’ data security utilizing up to 256 bit AES encryption. And it works within the organization’s security framework—there are no agents to open hacker-tempting ports in the firewall. With secure data transmission across an IP WAN, the Asigra solution helps businesses achieve compliance, minimize information-loss liabilities, and protect customer confidence. ‘Elegant’ scaling. The DS-System is capable of elegantly scaling both in the dimensions of capacity and performance. This type of scalability is critical for environments with large numbers of remote sites, high-capacity data sets, and rapid data growth. While agent-based solutions compound complexity in rapid growth environments, the Asigra agentless backup/recovery solution easily accommodates new capacity, new applications, and new sites. Features such as integrated load balancing ensure efficiency across multiple DS-System IP addresses. Backup consistency, improved recoverability. The simplicity, efficiency, and security of the Asigra system makes it easy for remote sites to implement and maintain consistent data backup programs. This means companies can significantly boost data recoverability in locations where success rates below 50% were once the norm. About Asigra Asigra transforms the way businesses manage and protect their data by delivering market leading cloud backup solutions that seamlessly and efficiently manage, scale and deliver data protection services. Asigra Cloud Backup™ is built for new and existing MSPs/VARs who focus on data protection, IT constrained organizations, and industries with compliance mandates that are looking to improve their backup with a secure, reliable and predictable data protection cloud backup model. With 25 years of experience as backup/recovery pioneers, Asigra technology protects more than 400,000 sites globally ranging from the Global 100 to SMBs. The world’s largest and most profitable service providers including CDW, HP and Terremark Worldwide power their cloud backup services using Asigra technology. Asigra is headquartered in Toronto, Canada, with offices globally. Tel: 416.736.8111 Email: info@asigra.com Web: www.asigra.com Icomm Techonogies  37­55 Camden Street, Birmingham,  B1 3BP United Kingdom Tel: 0121 248 7931  Email: salesr@icomm.co.uk