Acronis Backup & Recovery 10 Advanced Server review
Acronis delivers plenty of features with its new server imaging software and adds data deduplication as an option. It’s a highly popular technology but has Acronis got it right?
Acronis has always been one of the top dogs in the disk imaging market and its latest Backup & Recovery 10 software targets businesses of all sizes looking to centralise data protection operations for multiple servers.
In this review we put the Advanced Server version through its paces, with a very keen focus on its optional de-duplication feature.
The software comprises a number of components that can all be installed on a single server. For larger sites, the installation can be distributed to lighten the load. You have a Licence Server, which looks after all your licence keys and provides a central control point which ties in with software deployment.
All the action is handled by a management console from where you create and deploy backup policies and individual jobs, run restore and disaster recovery operations and manage backup devices and hard disk vaults. The latter is looked after by the Storage Node component, which allows vaults to be placed on more than one server.
You can create personal vaults, which are backup repositories for the system they are located on but can also be shared amongst multiple systems. For deduplication you need to create centralised managed vaults which are looked after by the Storage Node.
For our management and vault repository system we called up a Fujitsu RX330 S1 rack server loaded with dual 2.3GHz quad-core AMD Opterons, 16GB of memory, 15K SAS drives and Server 2008 64-bit. The Licence Server install takes minutes and then you place your license keys on it for safe storage. We then loaded the main management console and the Storage Node component.
Our next job was to deploy the agents and deduplication components to each server where we pushed them from the management console to Server 2008 and Server 2003 R2 systems. Note that you need a key for each managed server and another for every one you want to apply deduplication to.
In This Article
Application security fallacies and realities
Web application attacks are the most common vulnerability, so what is the truth about application security?Download now
Your first step researching Managed File Transfer
Advice and expertise on researching the right MFT solution for your businessDownload now
The KPIs you should be measuring
How MSPs can measure performance and evaluate their relationships with clientsDownload now
Life in the digital workspace
A guide to technology and the changing concept of workspaceDownload now