Plug Storage Push Service
Recognizing customers' distaste for downtime, $125 million storage solutions provider Adexis sells them on data protection services.
Despite its increased emphasis on selling data protection services, storage solutions provider Adexis still sells plenty of hardware. In fact, the "best of breed" philosophy Adexis applies to all of its data protection offerings means its customers aren't buying low-end, low-performing hardware. Its choice of StorageTek (Louisville, CO) as a tape library partner underscores the point. Says Michael Cush, Adexis CTO, "If you don't put a top tier vendor's solution out there - like a StorageTek - then you're exposing your organization's applications to data loss and downtime."
Among the features of StorageTek's tape library line that Adexis particularly appreciates is the ability to handle various tape formats. That gives the integrator plenty of flexibility when it comes to helping customers pull legacy tape solutions into an evolving data archiving strategy. In addition to offering its proprietary, enterprise-class 9840 and 9940 tape drives and media, StorageTek can outfit its libraries with both generations of LTO (linear tape open) drives and with DLT (digital linear tape) and SDLT products. Moreover, libraries such as the L180 can accommodate mixed media. "The need for one library to handle two different tape formats is common among our customers," says Cush. "For restore purposes, they may need to access tapes from a legacy tape solution. Or, the library may be shared by two different environments: mainframe and open systems. In that scenario, the customer may need to run 9X40 series drives and LTO drives in the same library."
Adexis is also looking favorably at StorageTek's latest product, EchoView, an iSCSI (Internet small computer system interface)-enabled, disk-based backup solution. Over the last year or so, a lot of buzz has surrounded the potential of D2D (disk to disk) backup solutions. They have been touted for their ability to eliminate backup windows by periodically copying data from primary online disks to a secondary disk cache. Data can then be moved from the secondary disk cache to tape without affecting the primary disk array's ability to support live applications. Unlike solutions that provide only periodic snapshots of the data, EchoView continuously captures virtual views of what a data volume looked like at any point in time.
Adexis participated in early testing of the EchoView product, and Cush came away impressed. "There's a lot of potential for VARs to leverage this product as part of a high-availability solution," says Cush. "Imagine showing customers that, when a virus wipes out a server, instead of going back to the last time they did backup on that server - say, six hours ago - they can go back 30 seconds. It's definitely a promising technology."
Despite the bold, entrepreneurial impulses driving most corporate initiatives, doing business isn't really about taking risks. It's about managing risk. Whether the decision involves opening a new branch, acquiring a competitor, launching a new product, or bringing on a new CEO, companies understand that risk can't be completely eliminated. And, they know that companies unwilling to assume risk remain stagnant.
However, while thriving companies accept a certain amount of risk in pushing business objectives forward, they tend to think of risk primarily as a consequence of extending the enterprise beyond the four walls of the organization. Security breaches come from "out there." Shaky product launches stem from unpredictable market fluctuations ... "out there."
That way of thinking often holds true when it comes to risks to the IT infrastructure. The hacker who breaks into the organization's proprietary database is lurking "out there." The disaster that could bring down the data center - the earthquake, the terrorist attack, the power outage - will occur "out there." Granted, most companies understand the need to also look internally at their data protection policies and procedures. But, those efforts are often reductive and shortsighted - focused on such knee-jerk activities as adding disk drives to servers or sending backup tapes off-site. Often missing is a thorough, granular examination of internal processes and systems potentially threatening application availability. That's why, to supplement hardware and software sales, VARs and integrators should consider selling data protection assessment and management services.
And, that's exactly the approach taken by $125 million Adexis, the storage division of Cranel, Inc. Headquartered in Columbus, OH, with regional offices spanning coast to coast, this storage solutions provider focuses exclusively on data management, protection, and availability. It offers only what it considers to be best-of-breed hardware and software, as well as design, integration, and implementation services. Additionally, 24/7 technical support is provided by its sister division, Versitec. Revenue from any of those arms is driven primarily by Adexis' ability to help clients identify and mitigate risk, including risk percolating within the company's current storage practices. For Adexis, the key to selling storage solutions comes in giving its clients information about their existing infrastructure - information they can use to set their own data protection priorities.
Backup Vulnerability: Take Stock, Take Action
The sales cycle for Adexis starts with an in-depth assessment of the customer's storage environment. It ends (or perhaps continues indefinitely), in most cases, with a phased solutions rollout. The phased approach targets a company's application availability by separating (and delaying) "wish list" application security items from those marked "clear and present danger." Along the way, Adexis may sell storage hardware, in addition to services, but that revenue is merely a byproduct of the risk assessment process. A hardware sale is not a foregone conclusion Adexis makes about every client from the outset of the relationship. "We don't go into the client's site with the intention of selling more hardware," says Adexis CTO Michael Cush. "We go in to figure out what they have, how they're using it, and whether or not their current storage environment is putting critical business applications at risk. For each problem or potential problem we identify, we offer a solution. Not all risk mitigation strategies require immediate hardware purchases. Of course, most do over time."
A huge piece of the initial risk assessment involves studying the client's current data protection capabilities. Adexis brings in automated discovery tools to determine, for example, how much storage capacity is in the current environment, how much is being utilized, by which applications, for what purposes, and whether or not stale data is being backed up over and over again. To identify points of vulnerability - i.e. potential causes of application downtime, Adexis will even run a mock data recovery drill using whatever process the client has in place for backup/restore. It might discover, for instance, that, although the company is replicating its data from site A to site B, the secondary, disaster recovery site fails when Adexis tests its ability to restore live production data.
Some of the vulnerable spots Adexis discovers can be categorized as human resource problems. Industry analyst firm Gartner estimates that as much as 40% of application downtime can be attributed to human-related causes: labor spread too thin, poor training, actual human error. Says Cush, "At one customer site, operators were manually removing tapes from the library and not running a re-inventory process on the library and backup software. As a result, tape drives were failing because both the library and the backup software were not able to recognize the location of the tapes. The operators simply hadn't been trained properly."
Hardware Headaches Push Service Revenue
Frequently showing up during Adexis' assessments are hardware incompatibility issues. Because they don't always know which devices will work in which environments, companies can unwittingly set themselves up for problems. As more companies adopt SAN (storage area network) technologies, in particular, these potential problem areas multiply. "A company may have a grand plan for consolidating their servers and storage on a SAN. But, then we come in and discover that there is no longer an HBA [host bus adapter] available for the platform they plan to use," says Cush. "People overlook these sorts of things all the time. We try to show customers it's the details that get you - the $2 components."
According to Cush, problem areas in the hardware arena can also stem from clients' tendency to trust vendors to pay attention to all of a deployment's technical requirements. The problem is exacerbated in heterogeneous storage environments - increasingly common in medium and large enterprises. "Manufacturers don't always have the right skill sets to deal with integrating their products in environments where complementary - or even competing - solutions exist," says Cush. For instance, Adexis helped one customer integrate a new NAS (network attached storage) solution with its enterprise backup and recovery solution. The customer had purchased the NAS solution from a manufacturer that didn't consider the company's backup and recovery strategy. "We commonly bail out customers that have been myopic in looking at their technology needs," says Cush. "The customer bought technology X, but neither they nor the vendor of technology X understood the bigger picture that technology X would have to fit into - now and down the road."
Sell Storage In Stages
Adexis knows that overturning stones to reveal potential application vulnerability is fraught with risk - to Adexis. That's because application availability can be a potentially contentious subject among the various data-hungry constituents within a company. So, as it interviews various stakeholders within a company - from line-of-business managers to C-level executives - Adexis makes sure it sidesteps any political land mines that could be set by the risk assessment process. What Adexis does not do, for instance, is decide for the client which utilization policies to set for each application or which applications should be supported with high availability. "If you ask the business leaders responsible for particular applications, they'll all say their apps need to be up 24/7 with no downtime," says Cush. Instead, Adexis asks questions about uptime requirements, presents data showing how close the current environment is to supporting those requirements, and outlines viable options for addressing current inadequacies. "When we present our findings, we don't say, 'You must do this; you must do that,'" says Cush. "For each item, we say, 'Here's a problem; here's the risk; here's a potential solution.' We may discover, for example, that certain files aren't being backed up at all, but it's up to the client to determine if that constitutes a risk worth spending money to mitigate."
Since few companies can afford to give top-shelf IT support to all apps, Adexis nudges them toward making their own distinctions about where pain can be tolerated and where it can't. To help customers place their applications along a pain-severity continuum, Adexis asks customers to consider several factors: 1) the service level requirements for each application; 2) which applications are, in fact, mission-critical; 3) how much it will cost if a critical application goes down; 4) how long they can wait for the application to come back up after a disaster; and 5) how much data they are willing to lose in the event of a disaster.
Once the company has prioritized its applications based on its answers to those questions, Adexis then helps the company put together a road map for bringing on technologies and/or services required to mitigate risk for various apps. "Once you help companies see the true pain they may be facing, you can help them map the cost of avoiding that pain back to particular technologies," says Cush. "For example, a particular business unit may be claiming that it can't tolerate its critical app being down for more than two hours per year. But, that two-hour number doesn't mean much until you show that it's costing the company $10,000 per minute for that app to be down. Only then can the CIO or CFO make an informed purchasing decision about any additional storage needs for supporting that application. You really have to get customers to put a dollar figure on downtime."