Premium Content

Access "Evaluating hardware, software and hypervisor-based replication"


Sponsored by

IT administrators today are faced with a variety of new or growing data protection challenges. For many, the tried and true approach of nightly backups has become impractical. Exponential data growth, the need for more frequent data protection and faster restores have forced administrators to look for alternatives to traditional data backups. One approach that is growing in popularity is to use a combination of replication and snapshots as a way of continuously protecting data. But there are a number of ways this can be accomplished, each with its own pros and cons.

This handbook compares and contrasts hardware-based and software-based replication so you can better decide which approach suits your organization's needs. You will find an easy-to-digest chart detailing the pros and cons of each as well as articles offering greater detail. You will also learn why hypervisor-based replication is growing in popularity.   Access >>>

Table of contents

  • Hypervisor-based replication offers granularity, flexibility
  • Differences between hardware, software replication
  • Hardware, software replication choices

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • How disaster recovery in the cloud impacts IT modernization

    When discussing the modernization of IT, the conversation usually begins with the cloud. Even when it doesn't start with the cloud, the dialogue ...

  • Dealing with today's endpoint data protection challenges

    The decentralization of data among endpoint devices has been a game-changer for IT professionals. After decades of delivering consolidated ...

  • Modernizing data center protection

    Today's workforce is increasingly mobile and BYOD has taken hold in many organizations. The use of devices not connected to a local network is a ...