I have had good success with Data Domain both as VTL and CIFS storage for TSM. It will encrypt at rest and encrypt the replication stream to another Data Domain.
Andy Huebner -----Original Message----- From: ADSM: Dist Stor Manager [mailto:[email protected]] On Behalf Of Hart, Charles A Sent: Monday, July 02, 2012 11:06 AM To: [email protected] Subject: Re: [ADSM-L] VTL's and D2D solutions With Gary's point below using the PT Gateway you can slide in Encrypted disk underneath the other appliances don't support encryption. With using your own disk you can leverage your volume purchasing power with your existing disk vendor as well. -----Original Message----- From: ADSM: Dist Stor Manager [mailto:[email protected]] On Behalf Of Lee, Gary Sent: Monday, July 02, 2012 10:35 AM To: [email protected] Subject: Re: [ADSM-L] VTL's and D2D solutions We are looking at vtls as well. You might check into the ibm protectier 7650. This is a head end that you attach to whatever storage you have. Emulates a lot of libraries, including the 3484 and 3494 I believe. Should know more in a couple of weeks after we review the answers to our RFPs. Gary Lee Senior System Programmer Ball State University phone: 765-285-1310 -----Original Message----- From: ADSM: Dist Stor Manager [mailto:[email protected]] On Behalf Of Kevin Boatright Sent: Monday, July 02, 2012 10:35 AM To: [email protected] Subject: [ADSM-L] VTL's and D2D solutions We are currently looking at adding a Disk to Disk backup solution. Our current solution has a 3584 tape library with LTO-5 drives using TKLM. We have looked at Exagrid and Data Domain. Also, I believe HP has a solution. We will need to have encryption on the device and the ability to replicate between the two disk units. Anyone have any comments or recommendations? Thanks, Kevin This e-mail, including attachments, may include confidential and/or proprietary information, and may be used only by the person or entity to which it is addressed. If the reader of this e-mail is not the intended recipient or his or her authorized agent, the reader is hereby notified that any dissemination, distribution or copying of this e-mail is prohibited. If you have received this e-mail in error, please notify the sender by replying to this message and delete this e-mail immediately. This e-mail (including any attachments) is confidential and may be legally privileged. If you are not an intended recipient or an authorized representative of an intended recipient, you are prohibited from using, copying or distributing the information in this e-mail or its attachments. If you have received this e-mail in error, please notify the sender immediately by return e-mail and delete all copies of this message and any attachments. Thank you.
