Menu

TechValidate Research on Hitachi Data Protection

These pages present data that TechValidate has sourced via direct research with verified customers and users of Hitachi Data Protection. TechValidate stands behind the authenticity of all published data. Learn more »



205 Customers Surveyed

1,182 Data Points Collected

33 Published TechFacts

9 Published Charts



Selected Research Highlights


Storage-Based Snapshots Are Used for Many Purposes

If you are a user of Hitachi Thin Image software, what business objective / IT challenges motivated your use?

Trying to save on disk space and/or cost
45%
The performance / resiliency of full clones are not required
24%
Faster to implement than using full volume cloning or disk mirroring
36%
Less disruptive than other back up alternatives (such as full volume cloning or disk mirroring)
17%
Easier to use compared to other backup approaches
10%
Effective tool to facilitate copying and migration of production data
17%

Hitachi Data Protection Customer Research

Business-critical applications require enterprise-class storage systems

What workloads or data types do you store on your most important enterprise storage systems?

Business-critical database applications, such as transaction processing, CRM, ERP
97%
E-business applications, such as websites, portals, or social media
57%
Content or document management, systems of record
48%
User data and office files, including virtual desktops
47%
Custom applications not covered above
34%
Other
2%

Hitachi Replication Solutions Can Replace Tape Backup

A medium enterprise financial services company purchased their Hitachi replication solution because they needed an alternative to tape-based backup.

Instantly Create Data Clones For Any Purpose

67% of surveyed IT organizations use Hitachi ShadowImage In-System Replication when copying / replicating data locally, within a storage system only.



More to Explore



About Hitachi Data Protection

Hitachi Data Protection allows customers to tightly integrate snapshot, replication and persistent copies that are application-aware, secure, deduplicated, managed and accessible from a single platform.

Hitachi Data Protection Website   Hitachi Website