1 WHITE PAPER Disaster Recovery and Continuity of Operations Planning Keeping your organization operating at its best while preparing for the worst Table of Contents 2 Network Management 3 Data Storage Solutions 3 Unified Communications 4 Recovering Servers 5 Client Access 6 Power Management 6 Security and Disaster Recovery 7 Manufacturer Options Executive Summary For any government organization or educational institution to fulfill its mission, it s important for data to be continually secure and available. Numerous events over the past few years have led to a heightened awareness of the need to be prepared for the worst. IT departments are now faced with the pressing concerns of growing demand for and reliance on access to information, along with ensuring continuous operation during a disaster. These concerns are forcing organizations to bring a renewed focus to disaster recovery (DR) and have a comprehensive continuity of operations plan (COOP) in place. Having a thought-out, detailed strategy for disaster recover and continuity of operations puts organizations in a position to keep their systems running when problems occur. Most organizations need to place a high value on being prepared for disasters of any kind because the ramifications of failing to do so can be very costly, and could result in a loss of public confidence, putting public safety at risk, reduced staff morale and effectiveness, and downtime that can cost organizations a great deal of money. A plan that helps operations get up and running quickly or keeps them up and running with a minimal loss of data, information and productivity is now a necessity. This white paper will benefit organizations by informing and helping them plan out their strategies for DR and COOP.
2 2 3 Network Management Data Storage Solutions In disaster situations, networks can be managed remotely, whether from across the room or from another building, city, state or even country. Organizations can choose to manage the network themselves or outsource this task. In-house management requires a sizable investment in people, processes and technology. It requires properly trained staff available around the clock; a strong set of standard operating procedures defined to handle various events; and a fault-tolerant infrastructure to monitor and generate alerts based on pre-established parameters. Organizations can find management solutions that offer varying levels of visibility, control and application. At the console of a management device, managers can literally see what is transpiring on the network by viewing the screen and/or panel and lights on the device itself. But with this kind of insight available, where an organization has visibility into network conditions remotely in an actionable way, it becomes impractical to devote human resources to these mundane tasks. This opens the possibility of outsourcing network management to a managed service provider. Many organizations reach this conclusion. Two key considerations for outsourcing your network management are price and contractual obligations. If terms can be defined and agreed to, outsourcing can be far more effective and efficient (as well as less costly) compared to an in-house management strategy. Organizations utilize hosted managed services (HMS), which are usually based on service level agreements. SLAs allow the organization to determine the degree of outsourced management that best suits it. This model scales well and ultimately proves more cost effective than self-maintaining the environment 24x7. Network Load Balancing Network load balancing is the process of spreading the work or balancing the workload between two or more servers, network links or other devices. Load balancing also increases resiliency within the network by potentially eliminating single points of failure and by providing seamless continuity should a network link, server or other device fail. Choosing an HMS provider Before signing a contract, it is important to investigate how an HMS provider runs its network operations center (NOC). Only in doing so can you responsibly select a provider to monitor and manage your network. For example, find out what certifications the provider has and what is its overall reputation is in the marketplace. How well is its NOC staffed? What kind of service level agreements does the provider offer, and will any of them aptly fit your needs? You may want to inquire as to what green energy measures the facility has implemented. And it s critical to know what the service will truly cost. Network load balancing can be accomplished within the network using software (such as certain operating systems) or through purpose-built hardware. When properly deployed, load balancing can add critical elements to an organization s disaster recovery plan or COOP. WAN Acceleration Consolidating an organization s data to a data center as well as a disaster recovery site can lead to problems when attempting to access vital information quickly. Wide area network (WAN) optimization resolves this issue by accelerating protocols, compressing traffic and caching files. It speeds up applications such as Exchange, Citrix and web applications. Acceleration statistics vary by manufacturer, but backup and recovery of Windows data processes can be accelerated up to three times their normal speed, while bandwidth utilization can be decreased by more than 60 percent, according to some manufacturer claims. WAN acceleration should be considered essential to your DR plan. Disaster recovery plans and COOP tend to focus heavily on technology, while neglecting the enormous investment in paperbased resources. A document management system that transfers those paper-based resources into a space-saving, more-manageable electronic format is a critical component of any plan. A management system begins with document capture, which involves making digital copies of the original paper documents. This is typically done with a scanner or multifunction device. Once the content is in an electronic format, it is indexed and stored in a central repository. Being able to quickly and easily locate important documents in the aftermath of a disaster makes a document capture and management system invaluable to a DR plan. Disk-based Storage Disaster recovery can utilize many storage solutions. Direct-attached storage (DAS) is one option. DAS offers two varieties of storage: mirrored disk and the various redundant array of independent disks (RAID) solutions. Both options protect from the most common form of system interruption, a drive failure. Disk-based storage offers advanced features helpful to DR such as cloning, snap shooting and continuous data protection (CDP). Cloning: This technology automatically copies production LUNs (logical unit numbers) to another location on the system so that if the production copy failed or corrupted, the cloned copy could be brought into action for nearly immediate recovery. Snap shooting: This technology copies file changes to a disk from a particular point in time forward. So a file can be recovered from the point in time where it is deleted or changed. CDP: This technology monitors an organization s files and as a file is changed or auto saved, a copy of the changed bytes/blocks is replicated to either a local directory or remote location. Tape Archiving Another storage option for disaster recovery is tape. Tape is a data storage device that reads and writes data onto magnetic tape. It is typically used for archiving and allows for access to data sequentially rather than randomly. Tape is portable (unlike disks, tape can be removed from a drive and taken to another location for recovery or storage), green (tape requires no power other than the read/write drives), dense and very fast. Many organizations have turned to a combination of disk and tape storage for preserving their archives. When using either disk or tape, an advanced technology known as data deduplication can provide valuable storage benefits. Data deduplication reduces storage needs by eliminating redundant data. Only one unique instance of the data is retained on the storage media. Hierarchical Storage Management Another approach for long-term retention of archival data is a hierarchical storage management (HSM) solution, which involves migrating data from its production location to a lower cost/tier of storage while leaving a stub file behind. The stub file allows applications or file searches to see the file in its normal location, but when accessed, recall the file from its lower-cost location. This lower-cost location can be either a slower disk such as SATA, or even a backup solution such as tape. Unified Communications The adoption of one-wire infrastructures has combined , voic , cell phones and public address systems onto one data and voice IP network, and the use of wireless technology has further extended the network beyond the four walls of a building. The disaster recovery challenge is adapting the network for mass communication and emergency notification. In recent years, emergency notification has taken on a new meaning: sending out messages to entire office buildings or an entire campus of buildings. IP phones, sitting on the desks of every staffer, have become more than just phones. They can also be used to display a text message and play audio broadcasts from the handset speaker. In a matter of seconds, a public safety official can log onto an internal website and send out a prerecorded and pretyped emergency message to any building within the organization.
3 4 5 IP-addressable speakers can be deployed throughout a building or across a campus. These IP speakers are Power over Ethernet (PoE) devices that can be plugged into any CAT 5 jack on the network, turning a voice and data network into a public address system. For remote outdoor locations, IP speakers can also be deployed with wireless radios to extend the network. Non-IP Network Options A desktop notification system (DNS) can be deployed throughout an organization where IP phones or IP speakers are not yet in use. This small desktop client sits in the system tray of workstations until an emergency notification is sent. Once activated, the DNS displays a text message about the alert while playing an audio broadcast via desktop computer speakers if available. Recovering Servers Developing a comprehensive and cost-effective recovery strategy for servers is challenging. Server consolidation, with the goal of reducing data center cost and complexity, should be explored before developing a recovery plan. The goal of server consolidation is to reduce the number of servers, as well as make the environment simpler to administer and maintain and easier to recover. The four most common forms of server consolidation carried out today are: physical consolidation, which involves consolidating multiple file, print and database servers onto fewer, larger, clustered servers; Virtual consolidation, which involves migrating multiple physical servers onto fewer servers through virtualization; Data center consolidation, which allows organizations with multiple data centers and remote sites to consolidate servers and storage devices to a centralized data center; application server consolidation, which allows for the consolidation of multiple application servers onto fewer physical or virtual systems. Disaster Recovery Lifecycle Maintaining a disaster recovery plan or COOP is an ongoing process, a lifecycle rather than a once-ayear checklist. There are five key phases to a disaster recovery lifecycle: analysis: In this phase organizations determine potential impacts, identify likely threats and develop impact scenarios. Solution design: With this phase, the goal is to identify the most cost-effective and technically viable solution. implementation: This phase consists solely of the execution of the design elements identified in the solution design phase. testing and acceptance: To be certain that disaster recovery plans and COOP meet the needs of the organization, testing is required to assure process and acceptance. maintenance: Once a disaster recovery plan or COOP is established, regular maintenance of the plan helps ensure viability. Physical and Virtual Server Options Although data centers are clearly going virtual, on average only 80 percent of a data center can be virtualized, so solutions are still needed for the replication and failover of the physical servers. Physical server arrays have several options for recovery: Servers deployed with local storage or direct-attached disk: Recovery options include restoration from tape media to similar hardware, restoration from tape media to dissimilar hardware, host-based replication and physical to virtual (P2V). Servers deployed with a combination of local and remote storage: Recovery options include either storage-based replication or geographically dispersed clusters. Servers deployed with no local storage: This situation, with both the operating system and data drives stored on remote storage, can utilize all of the previously mentioned options. Because of their isolation and encapsulation capabilities, virtualized servers can be moved and restored between different physical servers and storage hardware, with no need for any kind of migration. Virtual server environments also have several options for recovery: Servers deployed with local storage or direct-attached disk: Recovery options include restoration from tape media to any hardware, host-based replication and guest-based replication. Servers deployed with a combination of local and remote storage: Recovery options include utilizing the previously mentioned options, as well as storage-based replication. Servers deployed with no local storage: This situation, with both the operating system and data drives stored on remote storage, can utilize any of the previously mentioned options. Should You Virtualize? Server virtualization is now the leading technology used for disaster recovery. Organizations virtualize not only because of its immediate cost savings, but also because of its flexibility. Data center design can become very simple once all areas (storage, server, desktop, application and network) are virtualized. Starting in the production site, multiple shared storage subsystems can be used with storage virtualization in front of them. This allows servers to be moved on demand between different storage devices. All servers and desktops can be completely virtualized, which allows all instances to be replicated into the recovery facility and brought online in minutes. The end-user experience is almost identical when accessing applications in either site. In many instances, users can be redirected to the recovery site automatically. Virtualization removes hardware dependencies. This enables completely different servers and storage subsystems to be used in the recovery site. And this allows organizations to reuse existing hardware for their recovery sites. Client Access Many organizations put a tremendous amount of time and effort into developing a disaster recovery plan but overlook developing a client access plan. With little or no strategy as to how end users actually connect to the systems in the disaster recovery site, a good plan can quickly be rendered ineffective. A client access recovery plan should be formed around the applications needed to run the organization. Once these applications are identified and the server, storage and network infrastructure are replicated, the last piece is how an end user will access those key applications. Client access is the method used to present applications to end users. The most common form of access is assigning physical desktops and notebook computers to end users. Unfortunately, it proves extremely difficult to duplicate these application delivery environments in a disaster. An alternative gaining popularity is utilizing thin clients small, inexpensive devices with no moving parts that run a light operating system and connect to a remote operating system and applications, thereby only sending mouse clicks and keyboard information back and forth. When preparing your organization for disaster or continuity of operations, it is essential to plan for desktop, notebook and thin client replacement. Depending on the situation, many work staff may lose their smartphones as well. Given our dependence on these mobile devices, a strategy needs to be put in place to replace them as well. Terminal Services Once your organization has decided on a client access device, it can decide on a method for delivering client access. Both Citrix Presentation Server and Microsoft Terminal Services produce similar products that can host an end user s desktop as well as their applications. Whether your organization decides to deliver a published desktop or a published application is completely dependent on the user s needs. There are several methods for accessing the published application. For example, an end user can access a published application using a browser on a home computer. A client can also be loaded directly onto the operating system so that application icons can be readily available on the actual desktop and only a single click away. Server virtualization is now in widespread use. As a result, using the same technology to host desktops is quickly becoming the norm. Virtual desktops involve an end user accessing a desktop operating system with a thin or thick client device using remote desktop protocol (RDP).
4 6 7 Power Management A disaster recovery or backup technology is going to need power. The best way to ensure that your equipment is receiving consistent, clean and reliable power is to back it up with an uninterruptible power supply (UPS). A UPS is a device that provides backup power via battery to electronic equipment. Not all UPS products are the same. There are different types of UPS solutions that offer varying types of protection and various additional features. Choosing the right UPS can mean the difference between seamless operation and outright system failure during a power emergency. Standby UPS: This is the most basic level of protection. When the UPS detects a drop or spike in voltage or the complete loss of power, it switches over to its internal battery. The standby UPS solutions is designed to protect desktop and workstation systems that require just basic protection for a period of time long enough to safely save open applications and shut down the equipment. Line-interactive UPS: This setup offers midlevel protection. In addition to the battery backup, the line-interactive UPS also contains a transformer that can regulate the incoming voltage, bringing it up or down to an acceptable range rather than failing over to the battery at the first sign of trouble. Online or double-conversion UPS: This is recommended for the highest level of protection. This technology takes the battery backup and voltage regulation of the line-interactive UPS and adds power conditioning via rectifiers and inverters that convert the incoming power to its purest form before releasing it out to the load. When looking for a UPS solution, there are several factors to take into consideration. Most important, you want to determine the amount of power the organization s devices consume, determine how much future expansion the organization anticipates and select the UPS that will support the capacity needed. Next, consider how much runtime (or battery uptime) you will need. Runtime is the amount of time the UPS will continue to provide backup battery power to your devices. On average, most organizations are looking for 15 to 30 minutes of runtime. Other Power Considerations Here are some other important things to consider when deciding on a power solution: redundancy: Similar to a RAID set with hard drives, having a mirrored (or 2N) UPS solution will provide the organization with additional availability in the event the primary UPS fails. form factor and physical size/space availability: Determine how much room you have for the UPS unit. There are both rack-mount and freestanding UPS solutions. external bypass: This feature will allow you to disengage power from the UPS while maintaining power to your equipment. power distribution: UPS units can provide output power in two ways: outlets on the back of the UPS or a direct connection to an electrical panel via conduit. Services: Regular maintenance on the UPS unit is important. UPS manufacturers provide startup services to inspect the wiring, boot up the unit, run diagnostics and ensure the system is functioning properly. Security and Disaster Recovery Disaster recovery involves making sure that information assets remain reliable and available if trouble strikes. Security has two primary concerns with respect to disaster recovery planning: minimizing the likelihood of disasters and minimizing their severity. Disaster Prevention When an organization adopts disaster prevention as a security goal, there are three basic focuses: eliminate threats: Though not always feasible, many organizations attempt to make themselves less likely targets. For example, they will move critical data centers to areas not plagued by severe weather. eliminate vulnerabilities: Again, while an organization can t eliminate all existing vulnerabilities, it can make an effort to eliminate critical ones. make vulnerabilities unexploitable: This approach interposes a safeguard that prevents a threat from triggering a vulnerability. Focusing on the various options for preventing disasters is an important part of disaster recovery. Thinking through the prevention strategy is a critical exercise because it provides insight into what combinations of threats and vulnerabilities currently remain uncountered. Disaster Mitigation Like disasters, risk has more than one component. The following equation is a simple and common formulation of risk, expressed as an annualized loss expectancy. Risk = Frequency x Impact Risk is expressed as a figure in dollars per year. That figure represents the product of the number of incidents per year and the average loss expectancy associated with an incident. In the case of disaster-scale incidents, frequency should remain low even though the impact is high. Although most organizations devote the bulk of their security dollars to minimizing the frequency of incidents, other measures can lessen the impact of incidents when they do occur. User education is an example. If users know how to respond to signs of trouble (such as a worm outbreak), a potentially serious incident can be nipped in the bud before it mutates into a full-fledged disaster. Likewise, compartmentalization of information and assets helps contain incidents within manageable boundaries instead of allowing them to spread across the enterprise. Investments in fault tolerance, redundancy and capacity are equally investments in system availability. Disaster Strikes Within IT, a disaster can be many things. By broad definition, a disaster is an adverse, unfortunate and unforeseen event. There are three common types of disasters: Natural (fire, flood, wind, earthquake) Malicious intent (viruses, burglary, vandalism) Accidental (outages of power, telecom, hardware or software systems) Finally, a proper incident response plan includes the preservation of key information about the incident. Keeping detailed and accurate records of what went wrong doesn t lessen the severity of a disaster, but it can help greatly when an organization goes to recover costs either through insurance claims or litigation. Manufacturer Options Disaster recovery and continuity of operations planning cover a wide swath of technologies. Because there is so much that falls into this category, what follows here is a best of covering some of the solutions that are indispensable for organizations when setting strategy for recovery and operations continuity. NetApp is a manufacturer of storage solutions that can help keep an organization s data flowing and highly available. One of its premiere products is the S550, a storage solution that can scale from 1TB to 12TBs and can combine NAS, iscsi SAN and Fibre Channel SAN. Utilizing StoreVault software, this solution can back up a complete multi-terabyte Microsoft SQL Server database in seconds and recovery is just as fast. EMC is a manufacturer that specializes in storage and content management solutions. One of its top offerings is the CLARiiON AX4, a scaleable network storage product that can facilitate your organization s storage consolidation and provide you with highly available information management. It can consolidate and share storage for up to 64 servers and is compatible with VMware virtualization software. The AX4 can also mix and match SATA and SAS drives for varying application requirements. VMware is the market leader in virtualization software. VMware ESX Server is virtual infrastructure software that is used by organizations for partitioning, consolidating and managing their systems in mission-critical environments. This solution provides a highly scalable virtual machine platform with advanced resource management capabilities, which can be managed by the VMware VirtualCenter. This solution will lower the TCO on your organization s computing infrastructure. McAfee is a software and computer security solutions manufacturer. One of McAfee s leading products is Total Protection. This software suite delivers an integrated security system with built-in, automatic protection against viruses, spyware, hackers and identity thieves.
5 8 It also provides protection against spam, phishing, inappropriate content and viruses. This software is compatible with McAfee SecurityCenter, a web-based management and reporting console with tons of security features. Symantec specializes in security and backup solutions. Its most well-known product is probably its Ghost software. Symantec Ghost Solution Suite is an imaging, deployment and system management solution. It facilitates recovery and operations continuity by securing images of your organization s staff computers. In an emergency where access to computers is lost, your IT team will be able to call up operating systems and settings for users computers and reinstall them on new access devices. Hewlett-Packard s forays into disaster recovery and operations continuity revolve around servers, storage and thin client solutions. HP offers the ProLiant DL360 G5 server with two quad-core Xeon processors. This server is optimized for spaceconstrained installations, has redundant power and fans, and Lights- Out remote management. Making the Case for Your DR Plan Finding out the true cost of downtime for an organization can be a very difficult process, which is why most organizations outsource their risk analysis to outside consultants. This process can take quite a long time, but its results are invaluable. Once your organization determines the cost of downtime, it will be easier for the IT department to make a case for a disaster recovery plan. Brocade is a communications systems manufacturer that offers storage network products. It offers the ServerIron GT CGx2 SSL load-balancing device, which can help organizations keep servers running smoothly. This product has a 2-port Gigabit line module and a WSM6-SSL-1 management module. The management module s processors perform application switching, traffic management, SSL acceleration and web optimization, as well as dedicated and reliable device management. HP s StorageWorks 2000 Smart Array family of SAN devices assist in storage consolidation. And HP s Compaq Thin Client t5730, with an AMD processor, high-end graphics, HP Sygate Security Agent and local application support, can facilitate remote access for your users. WYSE Technology manufactures thin client solutions. One of Wyse s premiere thin client products is the V90L model. This is a midrange thin client with an Eden 800MHz processor that delivers Windows XPe performance; supports dual-video; and has serial, parallel and USB ports. Wyse has partnered with Planar to create the fully integrated ND1750 LCD monitor. This device has a 17 display and is a good fit for virtual desktop computing. Cisco s forays into disaster recovery and operations continuity are built around networking solutions. One of its key recovery and operations offerings is the 7942G Unified IP phone. This phone runs over the network and is designed for wideband audio. Its graphic capabilities allow users to take advantage of XML applications. Another helpful Cisco product is its Unified Communications software. This software helps facilitate the kind of enterprise-wide communication that needs to happen during a disaster situation via its messaging applications
Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of
Next Generation NAS: A market perspective on the recently introduced Snap Server 500 Series ABSTRACT In February 2006, Snap Server announced the 500 Series of Networked Attached Storage systems as well
Backup and Redundancy White Paper NEC s UC for Business Backup and Redundancy allow businesses to operate with confidence, providing security for themselves and their customers. When a server goes down
HP StorageWorks Data Protection Strategy brief Your business depends on IT more than ever before. The availability of key application services and information is critical to maintain business processes,
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
HP and Mimosa Systems A system for email archiving, recovery, and storage optimization white paper Mimosa NearPoint for Microsoft Exchange Server and HP StorageWorks 1510i Modular Smart Array Executive
Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP
EMC Backup and Recovery for Microsoft SQL Server Enabled by Quest LiteSpeed Copyright 2010 EMC Corporation. All rights reserved. Published February, 2010 EMC believes the information in this publication
business continuity and disaster recovery Reference guide Keep resources secure and available in today s nonstop business environment. CDW.com/businesscontinuityguide 888.566.4239 business continuity and
HP ProLiant Storage Server family Radically simple storage The HP ProLiant Storage Server family delivers affordable, easy-to-use network attached storage (NAS) solutions that simplify storage management
DATA CENTER VIRTUALIZATION WHITE PAPER SEPTEMBER 2006 EXECUTIVE SUMMARY Many enterprise IT departments have attempted to respond to growth by adding servers and storage systems dedicated to specific applications,
Improving availability with virtualization technology Renata Budko Solutions Marketing Manager VMware, Inc Why focus on business continuity In the previous years backup & recovery was best effort Today
Contributions for this vendor neutral technology paper have been provided by Blade.org members including NetApp, BLADE Network Technologies, and Double-Take Software. June 2009 Blade.org 2009 ALL RIGHTS
Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices September 2008 Recent advances in data storage and data protection technology are nothing short of phenomenal. Today,
Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...
Technical white paper Protecting enterprise servers with StoreOnce and CommVault Simpana HP StoreOnce Backup systems Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key
Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster
Using EonStor FC-host Storage Systems in VMware Infrastructure 3 and vsphere 4 Application Note Abstract This application note explains the configure details of using Infortrend FC-host storage systems
White Paper Scala Storage Scale-Out Clustered Storage White Paper Chapter 1 Introduction... 3 Capacity - Explosive Growth of Unstructured Data... 3 Performance - Cluster Computing... 3 Chapter 2 Current
w H I T e PaP e r Comprehensive Virtual Desktop Deployment with VMware and NetApp NOVEMBER 2008 Table of Contents Introduction.... 3 Desktop Management Challenge.....................................................
Solution Overview Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation IT organizations face challenges in consolidating costly and difficult-to-manage branch-office
EMC Business Continuity for Microsoft SQL Server 2008 Enabled by EMC Celerra Fibre Channel, EMC MirrorView, VMware Site Recovery Manager, and VMware vsphere 4 Reference Architecture Copyright 2009, 2010
Network Storage for Business Continuity and Disaster Recovery and Home Media White Paper Abstract Network storage is a complex IT discipline that includes a multitude of concepts and technologies, like
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
Slash Costs and Improve Operations with Server, Storage and Backup Virtualization December 2008 Virtualization consolidates resources to obliterate waste in IT, and the associated cost savings make this
It s All About Restoring Your Data Achieving Rapid Business Resumption with Highly Efficient Disk-to-Disk Backup & Restore All trademark names are the property of their respective companies. This publication
How would lost data impact your business? What you don t know could hurt you. NETWORK ATTACHED STORAGE FOR SMALL BUSINESS How would lost data impact your business? What you don t know could hurt you You
HP iscsi storage solution guide How companies of all sizes benefit from iscsi-based storage Data growth rates are increasing by 50 per cent or more every single year. Governance and regulatory requirements
Technical white paper Using HP StoreOnce D2D systems for Microsoft SQL Server backups Table of contents Executive summary 2 Introduction 2 Technology overview 2 HP StoreOnce D2D systems key features and
Application Brief: Using Titan for MS Abstract Businesses rely heavily on databases for day-today transactions and for business decision systems. In today s information age, databases form the critical
High Availability with Windows Server 2012 Release Candidate Windows Server 2012 Release Candidate (RC) delivers innovative new capabilities that enable you to build dynamic storage and availability solutions
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
R E F E R E N C E A R C H I T E C T U R E Contents Introduction...1 Portable Datacenter Requirements...1 Solution Implementation...2 Physical System Layout...2 Hardware...3 Management Case...3 Virtualization
Continuous Availability Suite: Neverfail s Continuous Availability Suite is at the core of every Neverfail solution. It provides a comprehensive software solution for High Availability (HA) and Disaster
Remote Backup & Replication Solution Guide When it comes to Storage we are the Solution 2 What is Remote Backup? Remote Backup is simply backing up data to a location other than an organisation s central
Addendum No. 1 to Packet No. 28-13 Enterprise Data Storage Solution and Strategy for the Ingham County MIS Department The following clarifications, modifications and/or revisions to the above project shall
OPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006 EXECUTIVE SUMMARY Microsoft Exchange Server is a disk-intensive application that requires high speed storage to deliver
WHITEPAPER The Modern Virtualized Data Center Data center resources have traditionally been underutilized while drawing enormous amounts of power and taking up valuable floorspace. Virtualization has been
P2000 P4000 29/07/2010 1 HP D2200SB STORAGE BLADE Twelve hot plug SAS drives in a half height form factor P410i Smart Array controller onboard with 1GB FBWC Expand local storage capacity PCIe x4 to adjacent
Technical White Paper Disaster Recovery for Small Businesses A disaster recovery plan helps you understand what data is critical to your business operations and how to best protect it from unexpected failures.
XenData White Paper XenData Archive Series Software Technical Overview Advanced and Video Editions, Version 4.0 December 2006 XenData Archive Series software manages digital assets on data tape and magnetic
Server and Storage Virtualization: A Complete Solution A SANRAD White Paper copyright SANRAD 2008 SANRAD Inc. www.sanrad.com Server and Storage Virtualization: A Complete Solution A SANRAD Whitepaper Server
Eliminating End User and Application Downtime Protecting Mission-Critical, Multi-Tier Business Applications with Neverfail and Virtualization July 2010 Table of Contents Introduction... 3 Protecting Mission-Critical
Best Practice of Server Virtualization Using Qsan SAN Storage System F300Q / F400Q / F600Q Series P300Q / P400Q / P500Q / P600Q Series Version 1.0 July 2011 Copyright Copyright@2011, Qsan Technology, Inc.
Tag line, tag line Uncompromised business agility with Oracle, NetApp and VMware HroUG Conference, Rovinj Pavel Korcán Sr. Manager Alliances South & North-East EMEA Using NetApp Simplicity to Deliver Value
STORAGE CENTER DATASHEET STORAGE CENTER Go Beyond the Boundaries of Traditional Storage Systems Today s storage vendors promise to reduce the amount of time and money companies spend on storage but instead
Technical white paper Using HP StoreOnce Backup systems for Oracle database backups Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key features and benefits 2 HP StoreOnce
Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication
NETAPP WHITE PAPER USING A NETWORK APPLIANCE SAN WITH VMWARE INFRASTRUCTURE 3 TO FACILITATE SERVER AND STORAGE CONSOLIDATION Network Appliance, Inc. March 2007 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 BACKGROUND...
EMC Virtual Infrastructure for Microsoft Applications Data Center Solution Enabled by EMC Symmetrix V-Max and Reference Architecture EMC Global Solutions Copyright and Trademark Information Copyright 2009
HP iscsi storage for small and midsize businesses IP SAN solution guide With data almost doubling in volume every year, businesses are discovering that they need to take a strategic approach to managing
Citrix XenApp Server Deployment on VMware ESX at a Large Multi-National Insurance Company June 2010 TECHNICAL CASE STUDY Table of Contents Executive Summary...1 Customer Overview...1 Business Challenges...1
HP StorageWorks P2000 G3 and MSA2000 G2 Arrays Family Data sheet How can the flexibility of the HP StorageWorks P2000 G3 MSA Array Systems help remedy growing storage needs and small budgets? By offering
The Advantages of Multi-Port Network Adapters in an SWsoft Virtual Environment Introduction... 2 Virtualization addresses key challenges facing IT today... 2 Introducing Virtuozzo... 2 A virtualized environment
HP VMware ESXi 5.0 and Updates Getting Started Guide Abstract This guide is intended to provide setup information for HP VMware ESXi. HP Part Number: 616896-002 Published: August 2011 Edition: 1 Copyright
Accelerating Your Success Discover Smart Server Solutions Performance, efficiency and value STORAGE Block and file explained Block explained IP-SAN, also known as Internet Small Computer System Interface
Implementing a Storage Concentrator in a Microsoft Exchange Network All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc. which are subject
Cloud Offerings cstor Cloud Offerings As today s fast-moving businesses deal with increasing demands for IT services and decreasing IT budgets, the onset of cloud-ready solutions has provided a forward-thinking
Backup and Recovery Redesign with Deduplication Why the move is on September 9, 2010 1 Major trends driving the transformation of backup environments UNABATED DATA GROWTH Backup = 4 to 30 times production
, Inc. Manufacturing backup/recovery/archiving n clustering n consolidation n database n management/utilities n messaging n VIRTUALIZATION n Customer Overview is a leading provider of hardware and software
Planning and Implementing Disaster Recovery for DICOM Medical Images A White Paper for Healthcare Imaging and IT Professionals I. Introduction It s a given - disaster will strike your medical imaging data
W H I T E P A P E R S O L U T I O N : D I S A S T E R R E C O V E R Y T E C H N O L O G Y : R E M O T E R E P L I C A T I O N Disaster Recovery Strategies: Business Continuity through Remote Backup Replication
ENTERPRISE STORAGE WITH THE FUTURE BUILT IN Breakthrough Efficiency Intelligent Storage Automation Single Platform Scalability Real-time Responsiveness Continuous Protection Storage Controllers Storage
Abstract: Realizing the benefits of Disk to Disk to Tape backup strategies incorporating disk-based virtual tape devices. CYBERNETICS Intelligent Storage Solutions Table of Contents Introduction 1 Benefits
Solution Brief: CA ARCserve R16.5 Complexity ate my budget VMware System, Application and Data Availability With CA ARCserve High Availability Adding value to your VMware environment Overview Today, performing
WHITE PAPER NETWORK-ATTACHED STORAGE FOR THE GROWING SMALL BUSINESS Introduction 2 The Solution: NAS 2 What to Look For 4 Iomega NAS Solutions 5 Conclusion 6 FEBRUARY 2009 Small businesses are grappling
Bringing the edge to the data center a data protection strategy for small and midsize companies with remote offices Business white paper Table of contents Data protection synonymous with business success...
What s New with VMware Virtual Infrastructure Virtualization: Industry-Standard Way of Computing Early Adoption Mainstreaming Standardization Test & Development Server Consolidation Infrastructure Management
AUtOMATEyour data protection. HP StorageWorks D2D Backup Systems and StoreOnce The combination that right-sizes your storage capacity. Solution brief Regardless of size and industry, many of today s organizations
WHITE PAPER SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH DELL EQUALLOGIC AUTO SNAPSHOT MANAGER Business critical applications depend on Relational Database Management Systems (RMS) to store and
Neverfail Solutions for VMware: Continuous Availability for Mission-Critical Applications throughout the Virtual Lifecycle Table of Contents Virtualization 3 Benefits of Virtualization 3 Continuous Availability
Data center virtualization A Dell Technical White Paper August 2011 Lay the foundation for impressive disk utilization and unmatched data center flexibility Executive summary Many enterprise IT departments
Business Continuity with ReadyNAS What is ReadyNAS? ReadyNAS is a family of network storage solutions for small and medium businesses, workgroups, and remote/home offices. ReadyNAS delivers unified storage
Customer Focus on Business Continuity Parish National Bank Parish National Bank increases protection with recovery management from EMC and VMware BUSINESS VALUE HIGHLIGHTS SOLUTION SNAPSHOT Software: VMware
Page 1 15-Drive Supports over 5 TB of reliable, low-cost, high performance storage 15200 Product Highlights First to deliver a full HW iscsi solution with SATA drives - Lower CPU utilization - Higher data
Five Secrets to SQL Server Availability EXECUTIVE SUMMARY Microsoft SQL Server has become the data management tool of choice for a wide range of business critical systems, from electronic commerce to online
SANmelody Application Affordable Remote Data Replication Your Data is as Valuable as Anyone s You know very well how critical your data is to your organization and how much your business would be impacted
High availability and disaster recovery White Paper High availability and disaster recovery with Microsoft, Citrix and HP Using virtualization, automation and next-generation storage to improve business