Professional backup solutions compared
Test Run
You might think everything to be said about backups has already been said. The backup principle scribes have used since the middle ages has hardly changed. Valuable information is duplicated and put into safekeeping to avoid loss, even if the original is mislaid or damaged. Of course, the copying process is digital and typically automated now. The volume of data created worldwide will grow 10-fold between 2006 and 2011 say the analysts at IDC [1], and the major part of this huge volume – some 1,800 exabytes – needs to be backed up on a regular basis.
As capacities grow and time slots become increasingly shorter, admins face limited bandwidth for network-based data transfer. Additionally, they need to worry about data security and protection requirements, the increasing need for automation, huge mountains of information that cloud offerings or data warehouses accumulate, the pressure of guaranteeing minimal outages, stricter compliance regulations, and an increasingly complex storage landscape. For all of these reasons, and more, backup is a topic of concern for many admins.
New requirements automatically spawn new backup software features, and these changes are reflected in the product comparison, first performed about two years ago. Some of the buzzwords that dominate the backup scene today were of no consequence then, including the now ubiquitous "deduplication," as well as continuous data protection, synthetic backups, or special processes for backups of virtual machines. In the new round of product comparisons, I naturally included these criteria, and they are worth examining in more detail.
Deduplication, CDP, and Synthetic Backups
Deduplication has become important to backups in the course of the past two or three years because, in a perfect world, it combines several benefits. For one, deduplication reduces the sheer volume of data by identifying identical blocks of data and backing them up once only; all other instances of the same data block are simply referenced by pointers. Depending on the type of information and the change rate, this process can often reduce the data to a tenth of its original volume.
Source deduplication also removes the need to transfer data, which saves network bandwidth in client-server backup scenarios. Sometimes deduplication takes place at the target or on the media server (post-process target deduplication). In this case, you lose the benefit of source dedupe, and the compression rate is typically slightly lower, but you can apply the technology to older backups with, say, Tivoli Storage Manager.
Of course, deduplication has a negative side, too. The most obvious disadvantage is that it costs far more in terms of CPU resources, and in a worst case scenario, the benefits will not outweigh these costs. If you're deduping video or audio files, precompressed or encrypted files, images, and databases, the savings will not be significant.
Redundancy – which, in addition to the downside of space consumption, has the positive effect of greater failure tolerance – is removed deliberately through deduplication. If you are unable to read a block physically from a deduplicated medium, the effect might be that many different files containing the block are lost. Without deduplication, the damage would only affect exactly one file.
Continuous Data Protection (CDP) refers to the idea of backing up every change straightaway, typically in the form of byte- or block-level differences. This approach means any previous version can be restored immediately (as opposed to replication, which only stores the latest version). To offer this technology, many brand name backup software vendors have had to acquire specialists, as with deduplication.
For example, Symantec acquired Revivio, IBM acquired FilesX, and EMC acquired Kashya. Thus, CDP still is often an add-on product (Symantec NetBackup RealTime, IBM Tivoli Storage Manager FastBack, or EMC RecoverPoint).
Of course, no backup disk can store all the changes to the original data indefinitely, and CDP is therefore able to keep its promise only for a limited period of time. Thus, the backup interval is changed to a couple of hours or days in some cases.
The technology often relies on snapshots and is then referred to as near-CDP. Continually comparing the results and the original consumes CPU cycles and I/O bandwidth. CDP is typically incapable of bridging large distances between host and storage.
Synthetic backups answer the question: Why bother backing up what you've already backed up? The full backup is easy to handle and accurate but also slow and expensive. Differential or incremental backups are much smaller and faster but also far more complex to handle, and their accuracy leaves something to be desired. Deleted, renamed, or moved files can keep reappearing at their previous location or under previous names if restored from an incremental backup.
In most cases, 90 percent of a full backup will be identical to the previous full backup, so the full backup does not need to be sent to the backup server again. Instead, the backup server creates a backup of a previous full backup and the subsequent incremental backups. This synthetic backup is identical to a full backup but doesn't entail repeatedly transferring data over the wire.
VM backups could involve grabbing a snapshot of the virtualization host, thus supporting backups of the running machine without a maintenance time slot.
In other cases, the backup can be created directly in storage, without needing to access the LAN, or it could use a backup server running on one of the other virtual machines, which avoids accessing the physical network.
Cloning is a way to back up VMs and access them without using their operating systems. By cloning the core image file of a disconnected VM, you could duplicate its virtual hard disk without having to start the VM.
Old Friends
The other criteria for the comparison tables (Tables 1 through 4) are mainly old friends. Besides basic details of the products (Table 1), I was also interested in standard features (Table 2) that any administrator would expect to find. Acronis Backup & Recovery stands out here, because it doesn't use a centralized backup server and many clients; rather, it backs up a dedicated server directly.
Tabelle 1: Product Overview
Acronis |
Arkeia |
EMC |
IBM |
Open Source |
SEP |
Symantec |
|
Backup & Recovery |
Network Backup |
NetWorker |
Tivoli Storage Manager |
Bacula |
SEP sesam |
NetBackup |
|
v10 |
v8.2.6.1 |
v7.6 |
v6.2 |
v5.0.3 |
v4.0 |
v7.0 |
|
Product Details |
|||||||
---|---|---|---|---|---|---|---|
Operating Systems (Server) |
|||||||
Linux |
Asianux, CentOS, Debian, Fedora, openSUSE, RHEL, SLES 10, Ubuntu |
Fedora, generic, Mandrake, Mandriva, Novell OES/SLES/SUSE, RHEL, Slackware, Ubuntu, United Linux, Yellow Dog |
RHEL and SLES |
Linux x86/64, Linux on Power, Linux on System z |
CentOS, Debian, Fedora, Gentoo, Mandriva, openSUSE, Red Hat, SUSE, Ubuntu |
CentOS, Debian, Red Hat, SUSE, Ubuntu, UCS |
Asianux/Red Flag, Novell OES/SLES, Oracle, Red Hat |
BSD |
No |
No |
No |
FreeBSD, OpenBSD, NetBSD |
FreeBSD |
No |
|
Unix variants |
No |
AIX, HP-UX, Irix, SCO UnixWare, Solaris |
AIX, Dynix, HP-UX, Irix, Solaris, Tru64 |
AIX, HP-UX, Solaris |
Solaris, OpenSolaris |
Solaris |
AIX, HP-UX, Solaris |
Other |
No |
No |
No |
Novell OES |
NetWare, VMS, PowerMAX OS |
No |
|
Mac OS X |
No |
No |
No |
No |
No |
No |
No |
Windows versions |
No |
No |
2000/2003 |
2003/2008 |
2000,/2003/2008/Vista/XP/7 |
2003/2008/2003R2/2008R2 |
2003/2003 R2/2008/2008 R2 |
Operating Systems (Client) |
|||||||
Linux |
– |
Fedora, generic, Mandrake, Mandriva, Novell OES/SLES/SUSE, RHEL, Slackware, Ubuntu, United Linux, Yellow Dog |
x86/64 |
x86/64, Linux on Power, Linux on System z |
As of kernel 2.4.x |
As of kernel 2.2.x |
Asianux/Red Flag, CentOS, Debian, Novell OES, Red Hat, SUSE, Ubuntu |
BSD |
– |
FreeBSD, NetBSD, OpenBSD |
No |
No |
FreeBSD, OpenBSD, NetBSD |
Open BSD |
FreeBSD |
Unix variants |
– |
AIX, HP-UX, Irix, SCO UnixWare, Solaris, Tru64 |
AIX, HP-UX, Solaris, Tru64, Irix |
AIX, HP-UX, Solaris, IBM z/OS |
AIX, HP-UX, OpenSolaris, Solaris |
AIX, HP-UX, Sinix, SCO Unix, Solaris, Tru64 |
AIX, HP-UX, Solaris |
Other |
– |
NetWare |
NetWare, OpenVMS |
Novell NetWare 6.5 and OES |
Novell OES |
VMS, OS/2, NetWare |
HP OpenVMS, NetWare |
Mac OS X |
– |
Yes |
Yes |
Yes |
Yes |
No |
Yes |
Windows versions |
– |
2000/2003/2008/98/XP/Vista/7 |
2000/2003/98/NT/XP/Vista |
7/Vista/XP/2003/2008 |
2000/2003/2008/Vista/XP/7 |
NT/2000/2003/2008/Vista/7 |
2003/2003 R2/2008/2008 R2/Vista/XP/7, Storage Server 2003/2008 |
Interfaces and Support |
|||||||
GUI |
Yes |
No |
No |
Yes |
Yes, Qt |
Yes, Java |
Yes, Java |
Web interface |
No |
Yes |
Yes |
Yes |
Yes, BWEB |
No |
No |
CLI |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes, CLI + text menus |
License |
Commercial |
Commercial |
Commercial |
Commercial, by processor core or backup volume |
AGPLv3 |
Commercial, multiplex stream server under GPLv2 |
Commercial |
24/7 support |
Yes |
Yes |
Yes |
Yes |
Yes, Enterprise Edition |
Yes |
Yes |
Price |
US$ 1,219 |
One server, one drive, 1TB VTL: US$ 1,300 |
Client/server/Storage Node >US$ 4,000 depending on size of environment |
Enterprise Edition from ~US$ 5,000 (one platform, unlimited number of support calls, clients, volumes, etc.) |
From EUR 150 (one server/stream) |
From US$ 8,000 for a server and five clients |
|
URL |
|||||||
System Architecture |
|||||||
Client-server architecture |
No |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Optional media server |
Yes, storage node |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Backup Media |
|||||||
Disks |
Yes |
Yes, via VTLs |
Yes |
Yes |
Yes |
Yes, via VTLs |
Yes |
Tapes |
Various SCSI and USB drives |
3590, 9840/9940, AIT, DAT, DLT, DTF, LTO, Magstar, Mammoth, SAIT, SDLT, SLR, Travan, VXA |
4mm, 8mm, 9840/9490, AIT, Atmos, DAT, DLT, LTO, QIC, SAIT, SDLT, Travan |
3592, 4mm, 8mm, AIT, DLT, LTO, SAIT, SDLT, T10000 |
AIT, DAT, DLT, LTO, SDLT, VXA |
AIT, DAT, DLT, LTO, SDLT, VXA |
AIT, DAT, DLT, LTO, SDLT, VXA |
Autoloader |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Virtual tape libraries |
No |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
NAS via NDMP |
No |
Yes |
Yes |
Yes and NetApp SnapMirror to Tape |
No |
Yes |
Yes |
Tabelle 2: Classical Backup Technologies
Acronis |
Arkeia |
EMC |
IBM |
Open Source |
SEP |
Symantec |
|
Backup Strategies |
|||||||
---|---|---|---|---|---|---|---|
Full backup |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Differential |
Yes |
Yes |
Yes |
Yes (only for NDMP and databases) |
Yes |
Yes |
Yes |
Incremental |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
|
Synthetic backups from incremental backups |
No |
No |
No |
Yes, incremental forever, except databases |
Yes |
No |
Yes |
Exclude Filter |
|||||||
Directories |
Yes |
Yes, using special block files |
Yes |
Yes |
Yes |
Yes |
Yes |
Regex for file names |
No, but wildcards |
No |
No |
Yes |
Yes |
Yes |
No, but wildcards |
File size |
No |
No |
No |
No |
No |
No |
No |
File extension |
No |
No |
No |
Yes |
Yes |
Yes |
Yes, with wildcards |
Date |
No |
No |
No |
No |
No |
No |
No |
Owner |
No |
No |
No |
Yes |
No |
No |
No |
Scheduling |
|||||||
Frequency: cyclical, fixed cycle |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Calendar: fixed or relative date |
No |
Yes |
No |
Yes |
Yes |
No |
Yes |
Pre/Post Scripts |
|||||||
Pre-backup scripts |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Post-backup scripts |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Extra Options |
|||||||
Multiple copies at one pass |
No |
No |
Yes |
Yes |
Yes |
No |
Yes |
Data classification |
No |
No |
No |
Yes |
No |
No |
Yes |
Media pools |
No |
Yes |
Yes |
Primary and copy pools on disk and tape |
Yes |
Yes |
Yes |
Retention policies |
Yes, related to archive |
Yes by Savepack/Drivepack |
Yes, by SaveSet |
Yes, client-based, arbitrary granular |
Yes, by file, volume, and job |
By Mediapool in days |
By policy |
Restore to other location |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Monitoring active processes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Integrated log viewer |
Yes |
Yes, two variants |
Yes |
Yes |
Yes |
Yes |
Yes |
All of the programs can handle full backups and differential and incremental backups, but beyond these, you start to see the differences: Synthetic backups are not as frequent, and you can rarely schedule a backup for the first Monday in the month; several copies at a single pass are also rare, and the filtering options for file and directory exclusion are also very different. Equally apparent differences exist with special backup technologies (Table 3), and support for applications such as databases or groupware in the form of special modules reveal the discrepancies between the vendors (Table 4).
Tabelle 3: Special Backup Technologies
Acronis |
Arkeia |
EMC |
IBM |
Open Source |
SEP |
Symantec |
|
Snapshots |
|||||||
---|---|---|---|---|---|---|---|
Based on backup software |
Yes |
No |
Yes |
No |
No |
Yes |
|
Based on Windows VSS |
No |
Yes, own agent |
Yes |
Yes |
Yes |
Yes |
Yes |
Based on storage hardware |
No |
No |
Yes, via PowerSnap module |
Yes |
No |
No |
Controlled like Hitachi ShadowImage, EMC TimeFinder and SnapView, IBM FlashCopy, HP EVA Snapclone |
Data Handling |
|||||||
Deduplication |
No |
Not integrated yet, but available separately |
Integrated separate product: EMC Avamar |
Yes, client and server side |
Yes |
Not integrated, but possible with FalconStor |
Yes, integrated with client and media servers |
CDP |
No |
No |
Integrated separate product: EMC RecoverPoint |
Proprietary product, TSM FastBack |
No |
No |
Proprietary product (RealTime) |
Backup clones |
Yes, "dual destination" |
Yes, by means of replication |
Yes |
Yes |
Yes, implicit on migration |
Yes, implicit on migration |
Yes |
Staging (e.g., D2D2T) |
No |
Yes, optional, D2T separate license |
Yes |
Yes; also between disk and tape |
Yes |
By migration between medial pools |
Yes |
Compression |
Yes |
Yes, two variants |
Yes |
Yes |
Yes |
Yes |
Yes |
Encryption |
Yes, AES 128/196/256 |
Yes, DES or Blowfish |
Yes (256-bit AES) |
Yes |
Yes (256-bit AES), Blowfish, RSA |
Yes (256-bit AES), Blowfish 64-bit |
Yes (DES 40-bit , DES 56-bit) |
Multiplex streaming |
No |
Yes, multiplex and multiflow; hundreds of streams |
Yes, based on clients, savegroups, and devices |
Yes, source disk multiplexing for SAP backups; no tape multiplexing |
Yes, unlimited |
Yes, up to 64 parallel streams |
Yes |
Load balancing/Failover between drives |
No |
Yes, within Drivepacks |
Yes |
Yes, when using IBM tape drives and drivers |
Yes |
Yes, within drive groups |
Yes, within storage unit groups |
Backup verification |
Yes |
Yes |
Yes |
No |
Yes |
Yes |
Yes |
Disaster recovery |
Yes |
Yes, optional |
Optional via EMC HomeBase Server |
Yes |
Yes, Enterprise Edition |
Proprietary product (BSR) |
Proprietary product (RealTime) or features bare-metal recovery with separate license |
Bandwidth controls/Throttling |
Yes |
Yes, two methods |
Yes |
For laptop backups with TSM FastBack for Workstations |
No |
No |
Yes |
Tabelle 4: Online Backup Modules for Special Applications
Acronis |
Arkeia |
EMC |
IBM |
Open Source |
SEP |
Symantec |
|
Databases |
|||||||
---|---|---|---|---|---|---|---|
Oracle |
No |
Yes |
Yes |
Yes, TSM for databases |
No |
Yes |
Yes |
DB2 |
No |
Yes |
Yes |
Yes |
No |
Yes |
Yes |
Informix IDS |
No |
No |
Yes |
Yes |
No |
Yes |
Yes |
Microsoft SQL |
No |
Yes |
Yes |
Yes, TSM for databases |
No |
Yes |
Yes |
MySQL |
No |
Yes |
No |
No |
No |
Yes |
No |
Ingres |
No |
No |
No |
No |
No |
Yes |
No |
MaxDB |
No |
No |
No |
No |
No |
Yes |
Yes |
Sybase ASE |
No |
No |
Yes |
Via BMC SQL BackTrack or direct in ASE 15.5 |
No |
No |
Yes |
PostgreSQL |
No |
Yes |
No |
No |
No |
Yes |
No |
Mail Servers and Groupware |
|||||||
Open Xchange |
No |
Yes |
No |
No |
No |
Yes |
No |
MS Exchange |
No |
Yes |
Yes |
Yes |
Yes, Enterprise Edition |
Yes |
Yes |
Scalix |
No |
No |
No |
No |
No |
Yes |
No |
Novell GroupWise |
No |
Yes |
No |
No |
No |
Yes |
No |
Zarafa |
No |
Yes, script |
No |
No |
No |
Yes |
No |
Lotus Domino |
No |
Yes |
Yes |
Yes |
No |
Yes |
Yes |
MS SharePoint |
No |
Yes |
Yes |
Yes, TSM for MS SharePoint |
Yes, Enterprise Edition |
No |
Yes |
Directory Services |
|||||||
LDAP |
No |
Yes |
No |
No |
No |
Yes |
No |
Novell eDirectory |
No |
Yes |
No |
Yes |
No |
Yes |
No |
MS Active Directory |
No |
Yes |
Yes |
Yes, NetWare with TSM B/A client, OES with eMTool |
Yes, Enterprise Edition |
No |
Yes |
Virtualization Solutions |
|||||||
VMware ESX |
No |
Yes |
Yes |
Yes |
No |
Yes |
Yes |
Citrix XenServer |
No |
Yes, script |
Yes |
Yes |
No |
Yes |
No |
Hyper-V |
No |
Yes |
Yes |
Yes |
No |
Yes |
Yes |
HP-UX Integrity |
No |
No |
No |
Yes |
No |
No |
Yes |
Solaris Zones |
No |
No |
Yes |
Yes |
No |
No |
No |
Business Intelligence Software |
|||||||
SAP R/3 |
No |
No |
Yes, TSM for ERP |
No |
Yes |
Yes |
At this point, you can see that despite our efforts to look at the details, some criteria are not easily compared. For example, specialist modules can't offer more than the applications that they support. Thus, they're not responsible for certain deficits – or, at least, not if they leverage the capabilities of the supported applications, which is not always the case.
The compatibility issue also applies to pricing. Licensing models can be by number of clients, the backup volume, number of server CPUs, number of platforms to back up, or just a lump sum.
Additionally, you'll see a variety of surcharges for add-on modules, which in turn are priced by some kind of volume criterion. The costs are only comparable if you get the vendor's sales people to work out an offer for a tangible scenario. Wherever possible, I listed the entry-level price for a server without any optional extras (Table 1), which at least gives you some idea of the scale.
Besides these criteria, identical factors also made it hard to choose in some cases. For example, any of the programs looked at can easily back up a Linux server. With the exception of Acronis, which uses a different paradigm, all of the programs will work well on heterogeneous networks with many backup clients.
For this reason, you first have to decide what you want to back up and how. If you need a feature that is a unique selling point with one of the candidates, your choice is obvious. For example, an environment with many open source components would not be supported as well by many of the commercial backup solutions as it is by SEP sesam.
The same thing applies if you have deployed some other components by, say, Tivoli. In this case, you probably want to purchase the matching backup solution.
If you have not made a decision yet, your budget will be another major factor. The heavyweights in this test in particular require a considerable investment up front. If you still have two candidates neck and neck, a subjective appraisal of their usability is your last option. Because backup software is generally quite complex, and use concepts will tend to differ, this consideration is a matter of personal preference.
Acronis
The Linux backup software Acronis [2] doesn't keep to the popular architecture of a backup server and possibly a media server plus clients. Instead, Acronis supports precisely one server on which it is installed. It creates normal file-based backups or images on the server, with combinations also supported.
Because a disk image lets you restore the operating system with all its settings, the boot records, and so on in one fell swoop, this approach can drastically reduce the time it takes you to recover.
Acronis Secure Zone is a feature that lets you set up an extra rescue partition from which you can boot the server in an emergency. This capability means that you can fully automate any backup and allow events, such as the free space on a disk rather than just a schedule, to trigger backups – this feature is a rare ability. The GUI is clear-cut and easy to use. You can encrypt archives if needed.
After successfully completing all of the tests in the virtual environment, I encountered a problem with Acronis when backing up physical machines. The backup software froze, damaged its own installation, and reported totally nonsensical statistics. As we discovered in cooperation with the friendly and competent support people, this behavior was caused by the ext4 filesystem I had used in this case.
Acronis will not support ext4 until the next release, if then. Considering that ext4 has been around in the mainstream kernel for more than two years, it's high time Acronis started to support it.
Arkeia
Just looking at the architecture quickly reveals that Arkeia [3] aims to do battle with any size IT landscape. At the highest level, there is the Central Management Server, which manages multiple backup servers one level below.
These servers in turn communicate with Backup Agents, which reside on most platforms. In this way, Arkeia's model is similar to that of major-league players like Symantec, IBM, or EMC.
A software designed to handle any task has its charm because it will scale with your needs, can be modified to change as your requirements do, and offers the feature richness that you would expect from a state-of-art backup solution.
However, the downside is that such a system can become very complex; thus, it can be more difficult to manage and often expensive. If you accept these restrictions, you'll be able to do just about anything with Arkeia NetBackup.
For example, Arkeia has many features that you would only expect in the major leagues, such as direct management of storage hardware by brand name vendors to create snapshots or default definitions for throttling, or replication of backup sets on geographically distributed servers.
On the other hand, the clear void between Arkeia and open source is apparent: Arkeia doesn't support even the most popular free databases or groupware suites compared with its commercial competitors.
EMC
NetWorker by EMC [4] (formerly Legato) is one of the long-standing heavyweights in this class. Development of the software started in the 1990s, and the product is correspondingly mature and complete on various platforms.
A wide range of backup agents will take care of applications with open files that need special treatment, including open source products such as MySQL or Open-Xchange, which other competitors from the commercial camp traditionally avoid.
Deduplication and continuous data protection are implemented as add-on products for NetWorker (Avamar and RecoverPoint), but their controls are at least integrated with the NetWorker console.
As another special feature, EMC also draws on its own resources as a hardware vendor and offers preconfigured bundles with NetWorker software and matching storage hardware. For example, the software includes the EMC Data Domain Global Deduplication Array with its centralized inline deduplication storage pool.
I noticed a small issue when I installed the test software – a dependency for Open Motif, which is no longer included in the standard repositories for SLES 11.
This dependency is easily resolved by downloading and integrating Medium 1 from the SUSE Linux Enterprise 11 SDK [5], which provides the required software. You can't install the HomeBase Agent, which stores the server configuration and hardware information in profiles, at all on SLES 11; it is only available for RHEL 4/5, Solaris, and AIX.
IBM
The best thing about the Tivoli Storage Manager (TSM) product [6] is that it integrates with Tivoli, IBM's all-encompassing system management solution, which manages the entire life cycle of your full crop of services under one roof. Tivoli integrates modules for asset management, security, monitoring, or storage management, including backup and archiving.
Besides this, Tivoli Storage Manager, with all of its modules and add-on products, is one of the most powerful backup suites, period. Like other commercial competitors, however, it pays little heed to popular open source products like MySQL or PostgreSQL. The only backup methods are offline and file-based; special modules are not provided.
Tivoli Storage Manager is well equipped for any other field of application, at least if you have the budget to afford it. In this case, you can benefit from the flexible, hierarchical organization of the program structure that supports granular control of, say, retention periods or versioning in many layers.
It also integrates a descendent of HSM (Hierarchical Storage Management), which lets you migrate data to cheaper media with longer access times as the data becomes less important.
Additionally, IBM obviously leverages the benefit of being able to supply matching storage hardware in the form of disk arrays or tape libraries from a single source.
Open Source
Bacula [7] is the only professional and network-based backup that is totally free. It offers the classical open source advantages: completely (at least theoretically) extensible code, no licensing costs at all, and an active community. If needed, Bacula Systems and various system integrators will offer support, including 24/7 support with short response times. Of course, this service will cost you money.
Additionally, Bacula offers more or less everything you need for centralized backup on larger networks, including sophisticated job control, comprehensive support for popular storage hardware, useful scalability, and powerful volume management. Creating your own rescue CD adds bare-metal recovery to your options.However, you will have to do without other things – particularly custom support for backing up databases, groupware, directory services, or similar applications. Add-on modules for these purposes, which are typical of other products, are almost completely missing.
The generic Bpipe plugin fills some of the gaps by picking up data of any kind that you need to back up – via Stdout, for example – and passing it on to Bacula. Thus, you can integrate a MySQL dump that other backup solutions that support the database can access internally.
SEP
SEP's sesam software [8] has cleverly found a niche market where the crowd is not as tightly packed. This tool goes beyond simple backup solutions designed to handle only a couple of computers but flies below the altitude of those functional monsters with their panacea claims. SEP sesam is thus useful for larger environments but also easy to keep track of and affordable.
SEP sesam impresses in open source environments: No other backup solution provides modules for important free applications. Additionally, SEP releases its own Sesam Multiplex Stream Server under the GPL, which includes the recording format. Users could thus theoretically access data stored with SEP, without actually purchasing the software; this feature provides additional peace of mind and cuts the cords tying an enterprise to a vendor.
Recently, the brand-new version 4 of SEP sesam was released, along with a new GUI. This latest version is even more suitable for large-scale IT environments.
For example, you can group clients and hide or show them in the view behind the group name for a clearer overview. Additionally, you can configure and store your own custom views.
Filtering options have also been extended. All told, many improvements to details based on feedback from users have considerably boosted usability.
One small downside with respect to usability relates to the still fairly complex configuration of disk backups using a virtual tape library and virtual media.
However, I have heard that the developers will be tackling this problem in one of the next versions. Then, you will simply be able to define a target directory for disk backups in SEP sesam.
Symantec
Symantec's NetBackup [9], which still went by the name of Veritas in my last test, is also a mature and widespread backup software that includes everything you would expect from a professional data center backup tool today: integrated source and target deduplication, options for backing up virtual environments, a plethora of monitoring and reporting functions, and disaster recovery features.
NetBackup has a wide selection of options and add-on modules: from special backup technologies for laptops and desktops and remote SAN-based tape access, to virtual tapes or tape and disk encryption. NetBackup also shows its strength on storage networks, for example, in the form of support for the Network Data Management Protocol (NDMP) that allows serverless direct backups on any backup medium. The software also includes many modules for special applications, including databases (from Oracle to Sybase), groupware servers, directory services, and hypervisors, as well as for snapshots and fast SAN-based backups.