StorTrends Whitepaper: Backup D2D2T. Whitepaper

Size: px
Start display at page:

Download "StorTrends Whitepaper: Backup D2D2T. Whitepaper"

Transcription

1 StorTrends Whitepaper: D2D2T Whitepaper

2 2012 Copyright American Megatrends, Inc. All rights reserved. American Megatrends, Inc Oakbrook Parkway, Building 200 Norcross, GA TRADEMARK AND COPYRIGHT ACKNOWLEDGMENTS This publication contains proprietary information that is protected by copyright. No part of this publication can be reproduced, transcribed, stored in a retrieval system, translated into any language or computer language, or transmitted in any form whatsoever without the prior written consent of the publisher, American Megatrends, Inc. Trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. American Megatrends, Inc. disclaims any proprietary interest in trademarks and trade names other than its own. FOR ADDITIONAL INFORMATION Call American Megatrends at for additional information, or visit us online at LIMITATIONS OF LIABILITY In no event shall American Megatrends be held liable for any loss, expenses, or damages of any kind whatsoever, whether direct, indirect, incidental, or consequential, arising from the design or use of this product or the support materials provided with the product. LIMITED WARRANTY No warranties are made, either express or implied, with regard to the contents of this work, its merchantability, or fitness for a particular use. American Megatrends assumes no responsibility for errors and omissions or for the uses made of the material contained herein or reader decisions based on such use. DISCLAIMER: Although efforts have been made to assure the accuracy of the information contained here, American Megatrends expressly disclaims liability for any error in this information, and for damages, whether direct, indirect, special, exemplary, consequential or otherwise, that may result from such error, including but not limited to the loss of profits resulting from the use or misuse of the information contained herein (even if American Megatrends has been advised of the possibility of such damages). Any questions or comments regarding this document or its contents should be addressed to American Megatrends at the address shown on the back cover of this document. American Megatrends provides this publication as is without warranty of any kind, either expressed or implied, including, but not limited to, the implied warranties of merchantability or fitness for a specific purpose. Some states do not allow disclaimer of express or implied warranties or the limitation or exclusion of liability for indirect, special, exemplary, incidental or consequential damages in certain transactions; therefore, this statement may not apply to you. Also, you may have other rights that vary from jurisdiction to jurisdiction. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. American Megatrends may make improvements and/or revisions in the product(s) and/or the program(s) described in this publication at any time. 2

3 Table of Contents Introduction: The Need for Reliable Implementations 4 Traditional Tape 4 The Limitations of Tape 4 Data Recovery Issues with D2T 5 One Step Beyond: Disk-to-Disk (D2D) 5 The Head of the Class: Disk-to-Disk-Tape (D2D2T) 6 A Detailed Look at iscsi IP-Storage in D2T and D2D2T 7 Conclusion 9 Why AMI? 10 3

4 Introduction: The Need for Reliable Implementations Organizations today have a massive amount of critical data that needs to be preserved. The regulatory requirements encompassed in the Sarbanes-Oxley Act as well as an overall increased awareness in industry of the need for tighter IT controls have only added to this need. Not only does this data need to be preserved, but it also needs to be stored securely, and it needs to be readily accessible, even if the backup media is stored offsite. In the event that a data anomaly or the like requires the data to be reloaded into the system, for example after data loss, or in the case of an audit procedure, the organization must be certain that uncompromised data can be accessed in a timely manner. Traditional Tape In many companies, from small and medium-sized businesses (SMBs) to enterprise-scale corporations, backup solutions are often comprised of a backup server running backup software that dumps data to a tape device, usually according to a periodic schedule based on the critical-nature of the data involved. solutions such as these are commonly known as Disk-to-Tape backup systems, or D2T. The top three types of data servers that companies focus on for backup operations are their database (particularly accounting or ERP databases), along with file and servers. Depending on the backup policy of a particular company, backups are performed either incrementally or fully. Incremental backups are performed at least once a day, while full backups are performed no less than once a month. Once a system backup has been made to tape media, the backup tapes are stored in a secure, environmentally controlled, and oftentimes offsite location. Gigabit Ethernet Switch Server XPress Tape Offsite Archive Figure 1: A Typical D2T Deployment The Limitations of Tape Most industry analysts concur that tape storage will maintain its place in the backup scheme due to archival and regulatory reasons, along with its shelf life and durability. However, as we will see below, D2T backup strategies have multiple points of failure, including failure of the tape itself. Tape restores fail for a variety of reasons, including media errors, physical damage or loss, corrupt indices, and the like. For all of the simplicity, security, and peace of mind that D2T backups offer, they are burdened by the following limitations: Each server must be backed up individually or interleaved, contributing to a longer overall recovery time. Large backups can span more than one tape and therefore require that a staff member be physically present to manually swap tapes. Tape swaps often occur at night or early morning, due to the timing of most backup schedules. As expensive as this might seem, it is still preferable to an automated system, as software and hardware for automated tape drives are typically cost prohibitive. During backup to tape, data cannot be restored. A commonly quoted statistic is that one in five tape backups fail. However, according to the Yankee group, 42% of all tape restores are known to fail; the Gartner group similarly quotes 71% failure, and Strategic Research claims a failure rate of 54%. The reliability of large backups can be compromised due to one bad tape, which renders all tapes in the batch useless. The large RTO and RPO of tape backup restores (see below for a definition of these terms) The physical and technological limitations of tape are not the only reason why more and more companies are moving to disk backups. The data security issues are increasingly moving to the forefront of user s discontent with tape. These security issues are compounded by the regulatory requirements described earlier in this document. Here are some recent examples of vulnerabilities 4

5 of strict reliance on D2T backup: In February of 2004, a large US bank lost a single magnetic tape with information on roughly 120,000 customers while it was being shipped by truck from a data management center in Singapore. The tape held names, addresses, account numbers and balances. It was never found. In early May of 2005, the same large US bank lost an entire box of tapes from its financial division in transit by one of the largest privately owned shipping companies. Although the tapes were encrypted and were not known to be accessed, the news of their loss created a media frenzy. Four million customer files where compromised. The large US bank that lost their tapes twice has stated that they will begin sending backups electronically to a secure offsite location. Also in the same month, a large media and entertainment company said that computer backup tapes containing data on 600,000 individuals were lost by an outside data storage firm. Unfortunately, stories such as these are not uncommon, and though spectacular, serve to drive home the data security risks inherent in outsourcing backup procedure 1. In response to these concerns, it should be pointed out that some tape backup companies are developing tape encryption products. However, at this point in time this is somewhat a new, developing technology, and time will tell whether or not this is a solution to the data security problems imposed by this model. Data Recovery Issues with D2T As noted above, traditional tape backups present several challenges for providing full protection of critical data. Tape backups are typically performed at night or during weekends; with a tape backup routine, in the unfortunate event of data corruption or server failure, data recovery from only the previous night s or weekday s tape archive is possible. The RPO (Recovery Point Objective, or the most recent point in time where uncorrupted data is certain to exist) in this scenario is not attractive, due to the amount of time that will have passed before the lost data can be restored. Additionally, the RTO (Recovery Time Objective, or the time limit established to restore business processes to normal functioning level) is not attractive if a tape copy has to be physically located and retrieved from an offsite location, particularly in the case of mission critical applications or when facing pressing data audit conditions. Because of the unappealing RTO and RTO presented by D2T backup schemes, it is worthwhile to consider certain alternatives for lowering RPO and RTO, since in a sense a backup is not very worthwhile if the time needed to make use of it in a restore procedure is unnecessarily lengthy. One Step Beyond: Disk-to-Disk (D2D) In response to the security and integrity concerns over strict D2T backup, many corporations are gravitating away from tape, either by integrating disk-based storage into their tape backup solutions, or by completely eliminating conventional tape backups and backing up directly to disk. This type of backup solution is known as Disk-to-Disk (D2D), and by adopting it, the limitations of conventional tape backups can be overcome to a certain degree. As the name implies, disk-to-disk (D2D) backup moves backed up data to a separate disk-based appliance, commonly over a network connection. File/ Application Servers Gigabit Ethernet Switch Storage Area Network Figure 2: A Typical D2D Deployment 1 New York Times, The Scramble to Protect Personal Data, June 09, 2005; USA Today, Tapes with data on 3.9M missing, June 07,

6 One of the main advantages of this approach is that non-tape backups can easily be transmitted to an offsite location via Ethernet, and stored directly to disk. A second reason why D2D is gaining popularity is because disks are faster than tape devices, which reduces the backup window by a sizeable amount. Other factors have also served to increase the attractiveness of D2D backup, such as the rapidly falling prices of disk-based storage, the increasing capacities of today s hard disks, and the reliability and speed of restoring from disk-based backups, in comparison to the involved process of a restore from backup tapes. Simplify and Recovery Organizations can simplify their backup and restore procedures by deploying disk to disk (D2D) backup, by taking advantage of falling disk prices and increased disk capacity and spindle performance, while keeping the option to use tape backups when necessary. Data is a corporate asset and is exposed to loss through a variety of reasons, including human error by accidental deletion. Traditional approaches to its protection are flawed and are not efficiently able to keep pace with the current explosion of growth. Recent innovations solve the complexities associated with ensuring simplicity and efficiency of business data protection tasks. Some of the benefits that organizations can realize by utilizing D2D features include: Primary storage, backup disk volume, and tape provisioning from a single appliance Tape device sharing among multiple backup servers Simplify and Recovery Shrink or eliminate backup windows, without affecting performance Improve Recovery Point Objectives, while decreasing Recovery Time Objectives Minimize system and application downtime Eliminate performance degradation Reduce, if not eliminate, tape restores Ensure faster and more reliable restores Simplify growth and data management by consolidating multiple remote locations to one D2D backup repository Simplify security while increasing availability The Head of the Class: Disk-to-Disk-Tape (D2D2T) Although the simplicity and reliability of a D2D backups solution sounds ideal, most backup policies still call for the use of offsite backup storage on tape. Additionally, major obstacles to the substitution of tape for disk are added start-up and operational costs involved in the transition. Specifically, many backup software companies now charge additional fees for disk-only backups. To soften the blow, a practical solution might be to implement a mixture of tape and disk backups for different purposes; for example, by making incremental backups to disk, and full system backups can be to tape. One leverage point in a scenario such as this is that D2D backups can be either onsite or offsite. s to tape can take place during normal business hours because the data can be staged on disk prior to backup. This type of backup solution is commonly referred to as disk staging, or Disk-to-Diskto-Tape (D2D2T). In short, in disk staging a network backup server will write data locally to a storage disk (or disk array), and then copy the data from there to the tape device. An alternative to this approach is for the backup software clients to copy their backup data to a shared volume on the network, and then for the backup server to push the backup data from the shared volume to tape. 6

7 The illustration below provides more detail on how the D2D2T backup proceeds, and gives an idea of how data availability is maintained throughout the process: 1 2 Servers Gigabit Ethernet Switch Tape XPress 3 Storage System 4 Offsite Archive Figure 3: A Typical D2D2T Deployment 1. can continue to access data during a backup of the servers 2. All servers (2) are incrementally backed up and staged to disk (3) at the same time. The disk can be physically located in another building or across the country in a satellite office. 3. The staged incremental backups are held on disk for three months. A complete backup is transferred to tape (4) once per month. 4. Tapes are sent offsite for secure storage. Briefly, some of the many benefits of D2D2T backup as described above include the following: All servers can be backed up concurrently. Tape swapping can take place during regular business hours. During backup to disk, data is available and can be restored. A company s current tape backup infrastructure can remain in place with only a slight modification to the company s backup policy, while fulfilling the company s legal obligation to providing tape backups. The combination of disks and tape as storage media is more reliable than either single media type. Disk backups can be RAID protected. Tapes can be stored in a secure, climate-controlled, offsite location. It must be pointed out that although this strategy does not eliminate the problem of lost or compromised tapes completely, it is, however, a step in the right direction. A Detailed Look at iscsi IP-Storage in D2T and D2D2T We will next look in more detail at how an iscsi IP-Storage appliance can be incorporated into the two major approaches for and Restore options, D2T and D2D2T. First, we will see how iscsi works together with a Disk-to-Tape (D2T) backup solution, designed for environments that have one or more backup servers and a tape-based backup scheme already in use, but are seeking an more efficient alternative to their current deployment. 7

8 How D2T with iscsi works in a single or a multi-backup server environment: Servers 2 3 Gigabit Ethernet Switch 1 IP-SAN iscsi Storage System Tape 4 Figure 4: D2T with iscsi Storage Device, Multiple Servers Present 1. An iscsi disk(s) is provided to each of the multiple backup servers 2. The backup servers complete their backups to these iscsi based disks 3. The single physical tape unit is presented as iscsi tape devices to each of the backup servers* 4. Once the backup jobs are completed to the disks, they are scheduled for transfer to the iscsi connected tape device, according to the administrator s schedule and the functionality of the backup software *This innovation eliminates the need for multiple tape units or expensive Fibre Channel-based units with high connectivity costs. Note that this solution would work equally well with one or with multiple backup servers. The only difference is that backups are made sequentially to the iscsi device in the case of multiple backup servers. To elaborate, with this option, a single iscsi IP storage appliance enables the following two functions in the D2T backup scheme: iscsi-based backup storage disks: For use as the target disk(s) to which the backup server(s) stores the backup sets. External Ultra-320 SCSI connector: Facilitates the connectivity of virtually any tape device. This tape device is then presented to the backup server as an iscsi tape device for use in their implementation of D2T. In environments that require multiple backup servers, the iscsi appliance delivers multiple iscsi disks to service the disk-based portion of the D2T solution. Through the ability to present the physical tape device as an iscsi tape device, the sharing of a single tape unit can be accomplished. Next we will examine how iscsi IP-Storage appliances can be incorporated into D2D2T backup solutions to make them more robust and flexible. For this example, we will examine an all-in-one, four-function disk-to-disk-to-tape (D2D2T) solution designed for environments that do not currently have a backup server, or for those that are seeking a more efficient alternative to current deployments. This option takes advantage of the power of snapshot technology to provide seamless backup with no interruption to applications, by operating in the background of the application server. 8

9 How D2D2T backup works with no current backup server: IP-SAN iscsi Storage System Tape 4 Figure 5: D2D2T with iscsi Storage Device, No Server(s) Present 1. An IP-SAN appliance is added to the network, in order to provide an iscsi disk for use by the application server. 2. Through Microsoft VSS or an application-aware agent, the backup application initiates an instantaneous snapshot of the file system where the applications store their data 3. From this snapshot, a non-disruptive backup of the file system s contents is completed to the embedded storage container. The contents of this container can also be accessed by a remote backup server, via a CIFS, NFS or HTTPS share. 4. Seamlessly and automatically, the backup set is then transferred to the tape device. The frequency of the disk-based backup cycles is determined by an administrator-configurable policy engine of the backup software stack. With this option, a single iscsi appliance enables the following 4 functions in the D2D2T backup scheme: iscsi-based primary storage disks: For use as the primary storage repository for applications such as Microsoft Exchange, Microsoft SQL Server, Oracle or Windows file servers. Embedded Storage Container: Facilitates storage of backed up data and can also be exposed as a SMB, NFS, or HTTP share for offsite backup data access. External Ultra-320 SCSI Connector: Facilitates the connectivity of virtually any tape device. Software Solution: Enables the delivery of the complete D2D2T backup and recovery solution Conclusion What makes D2D2T backup so effective? We have seen how D2D2T is the best, most reliable solution for backup, combining the best attributes of both tape and disk-based backup schemes. The ubiquity and long shelf life of tape can be leveraged, while D2T s poor RTO and RPO can be addressed. Conversely, the expense of additional disk storage and the licensing fees that backup software vendors often charge to support D2D backup schemes can be ameliorated to a degree. While D2D2T strikes a good balance between D2T and D2D, iscsi makes D2D2T even better, in two ways: by eliminating the need for a dedicated backup server, and by providing CDP through the use of snapshots. Granularity of backups can be reduced down to the order of minutes, greatly improving the poor RTO and RPO of D2T backups. s can be performed in the background by offloading to the iscsi storage device, so application performance is uninterrupted and not degraded. What makes American Megatrends line of StorTrends storage appliances the right choice for D2D2T backup? We have seen how the flexibility and power of iscsi-based IP-Storage devices can bolster data protection in D2D2T backup scenarios, eliminating the need for a dedicated backup server, and allowing for near-continuous data protection. StorTrends iscsi-based IP-Storage appliances from American Megatrends (AMI) offer some of the most advanced snapshot capabilities in the market today, allowing administrators to simplify backup execution while ensuring faster and more reliable data backup and restoration. With StorTrends itx Storage software, preinstalled on every StorTrends IP-SAN storage appliance, backup windows, dramatically reduced with D2D backups, can be eliminated altogether. StorTrends itx advanced snapshots capabilities reduce 9

10 backup windows that once lasted hours to minutes or even seconds. AMI StorTrends implements D2D2T backup using the following innovations: Flexible solution options tailored to your specific environment Snapshot (to virtually eliminate the backup window) Snapshot scheduler, allowing you to automate when the backups are to be taken Replication (to copy the snap shot to the secondary storage unit) StorTrends appliances enable near-instant recovery of access to backup data sets from a remote location, with no backup data loss. Organizations can seamlessly recover from site outages almost instantaneously, through quick re-syncs of unsynchronized backup storage repositories. AMI s Disaster Recovery capability is based on the following features in StorTrends itx: Snapshots to protect data from logical errors, such as accidental deletions or virus attacks. Replication copies of data to the disaster recovery site. Additionally, AMI is able to provide near-cdp, by utilizing several of the snapshot technology innovations available in the StorTrends itx box: Snapshot technology that utilizes Redirect on Write method Almost unlimited snapshot capacity, allowing snaps to be taken every few minutes Minimal performance degradation when snapshots are enabled Easy, quick rollback to any snapshot Find Value with StorTrends, by Lowering Capital Expenditures & Operational Costs AMI StorTrends solutions help organizations lower the cost and effort required to support storage resources by consolidating resources, simplifying management and reducing unused spindles. Some of the many advantages of storage consolidation include: Higher utilization of available storage Use of standard hardware and networking technologies, simplifying maintenance Management of more with less, by reducing the time it takes for existing staff to manage your data Allowing for heterogeneous connectivity between servers & storage Standardization of storage, eliminating multiple points of support Elimination of system downtime by seamlessly & non-disruptively adding or expanding storage to production servers Reduce Complexity StorTrends use of iscsi technology allows existing network personnel manage the new storage environment, foregoing the need for extensive additional training or new storage administrators as with typical FC SAN environments. AMI also deploys Commercial Off-the-Shelf (COTS) hardware, to offer the assurance that the latest developments in hardware technology are in the box. AMI operates on the premise that custom designed hardware has long development cycles, and that many of the features in custom designed hardware can often be provided by creative implementation in software. For example, AMI s ManageTrends software allows monitoring and control of the StorTrends itx product, to simplify configuration and set-up, and make quick work of normally complex, time consuming tasks. Why AMI? AMI offers a wide array of disaster recovery and high availability solutions for your business needs. We provide services that range from storage needs analysis to the design and implementation of a custom disaster recovery solution. We can help your business plan for when things are at their worst while reduce costs and complexity of your storage environment. For more information on AMI StorTrends solutions, visit or contact a StorTrends Sales Representative by (sales@ami.com) or by calling (800) U-BUY-AMI. 10

11 Whitepaper This publication contains proprietary information that is protected by copyright. No part of this publication can be reproduced, transcribed, stored in a retrieval system, translated into any language or computer language, or transmitted in any form whatsoever without the prior written consent of the publisher, American Megatrends, Inc American Megatrends, Inc. All Rights Reserved American Megatrends Inc Oakbrook Parkway, Building 200 Norcross GA t: Sales & Product Information sales@ami.com t: Technical Support stortrends-support@ami.com t:

Total Disaster Recovery in Clustered Storage Servers

Total Disaster Recovery in Clustered Storage Servers Tech Sheet Total Disaster Recovery in Clustered Storage Servers 1 Copyright 1998-2009 American Megatrends, Inc. All rights reserved. American Megatrends, Inc. 5555 Oakbrook Parkway, Building 200 Norcross,

More information

StorTrends RAID Considerations

StorTrends RAID Considerations StorTrends RAID Considerations MAN-RAID 04/29/2011 Copyright 1985-2011 American Megatrends, Inc. All rights reserved. American Megatrends, Inc. 5555 Oakbrook Parkway, Building 200 Norcross, GA 30093 Revision

More information

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of

More information

Using HP StoreOnce Backup systems for Oracle database backups

Using HP StoreOnce Backup systems for Oracle database backups Technical white paper Using HP StoreOnce Backup systems for Oracle database backups Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key features and benefits 2 HP StoreOnce

More information

Using HP StoreOnce D2D systems for Microsoft SQL Server backups

Using HP StoreOnce D2D systems for Microsoft SQL Server backups Technical white paper Using HP StoreOnce D2D systems for Microsoft SQL Server backups Table of contents Executive summary 2 Introduction 2 Technology overview 2 HP StoreOnce D2D systems key features and

More information

Fault Tolerance in Virtualized Data Centers:

Fault Tolerance in Virtualized Data Centers: storage without boundaries Whitepaper Fault Tolerance in Virtualized Data Centers: Leveraging the Resilience of VMware FT and StorTrends itx High Availability CERTIFIED Table of Contents Introduction 3

More information

Comparison of StorTrends and NetApp Implementations of SQL Services in a Virtualized Server Infrastructure

Comparison of StorTrends and NetApp Implementations of SQL Services in a Virtualized Server Infrastructure storage without boundaries Whitepaper Comparison of StorTrends and NetApp Implementations of SQL Services in a Virtualized Server Infrastructure Table of Contents Introduction 3 Storage Section Alignments

More information

Disk-to-Disk-to-Tape (D2D2T)

Disk-to-Disk-to-Tape (D2D2T) Where Disk Fits into Backup Tape originated in the 1950 s as the primary storage device for computers. It was one of the first ways to store data beyond the memory of a computer, which at the time was

More information

Protecting enterprise servers with StoreOnce and CommVault Simpana

Protecting enterprise servers with StoreOnce and CommVault Simpana Technical white paper Protecting enterprise servers with StoreOnce and CommVault Simpana HP StoreOnce Backup systems Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key

More information

SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH DELL EQUALLOGIC AUTO SNAPSHOT MANAGER

SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH DELL EQUALLOGIC AUTO SNAPSHOT MANAGER WHITE PAPER SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH DELL EQUALLOGIC AUTO SNAPSHOT MANAGER Business critical applications depend on Relational Database Management Systems (RMS) to store and

More information

ESG Report. Data Protection Strategies for SMBs. By Heidi Biggar Storage Analyst, Data Protection Enterprise Strategy Group.

ESG Report. Data Protection Strategies for SMBs. By Heidi Biggar Storage Analyst, Data Protection Enterprise Strategy Group. By Heidi Biggar Storage Analyst, Data Protection Enterprise Strategy Group April, 2007 Copyright 2007. The Enterprise Strategy Group, Inc. All Rights Reserved. Table of Contents ESG Report Table of Contents...

More information

How To Protect Data On Network Attached Storage (Nas) From Disaster

How To Protect Data On Network Attached Storage (Nas) From Disaster White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains

More information

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL

More information

Disk-to-Disk Backup & Restore Application Note

Disk-to-Disk Backup & Restore Application Note Disk-to-Disk Backup & Restore Application Note All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from

More information

White Paper. The Convergence of Backup & Replication. Real Answers for Today s Business & IT High Availability Requirements

White Paper. The Convergence of Backup & Replication. Real Answers for Today s Business & IT High Availability Requirements White Paper The Convergence of Backup & Replication Real Answers for Today s Business & IT High Availability Requirements October 2006 Table of Contents Executive Summary...3 Business Continuity Today...3

More information

Meeting the Top Backup Challenges in Small and Medium Business Environments

Meeting the Top Backup Challenges in Small and Medium Business Environments Meeting the Top Backup Challenges in Small and Medium Business Environments December 2008 Although small and medium businesses (SMBs) do not typically generate the same amount of data that large enterprises

More information

NetVault Backup, NDMP and Network Attached Storage

NetVault Backup, NDMP and Network Attached Storage NetVault, NDMP and Network Attached Storage Simplicity and power for NAS Written by Adrian Moir, Dell Scott Hetrick, Dell Abstract This technical brief explains how Network Data Management Protocol (NDMP)

More information

Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution. Database Solutions Engineering

Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution. Database Solutions Engineering Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution Database Solutions Engineering By Subhashini Prem and Leena Kushwaha Dell Product Group March 2009 THIS WHITE PAPER IS FOR INFORMATIONAL

More information

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP

More information

Why cloud backup? Top 10 reasons

Why cloud backup? Top 10 reasons Why cloud backup? Top 10 reasons HP Autonomy solutions Table of contents 3 Achieve disaster recovery with secure offsite cloud backup 4 Free yourself from manual and complex tape backup tasks 4 Get predictable

More information

Data Protection in a Virtualized Environment

Data Protection in a Virtualized Environment The Essentials Series: Virtualization and Disaster Recovery Data Protection in a Virtualized Environment sponsored by by J. Peter Bruzzese Da ta Protection in a Virtualized Environment... 1 An Overview

More information

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss

More information

Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its

Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its DISASTER RECOVERY STRATEGIES: BUSINESS CONTINUITY THROUGH REMOTE BACKUP REPLICATION Every organization has critical data that it can t live without. When a disaster strikes, how long can your business

More information

SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH EQUALLOGIC AUTO-SNAPSHOT MANAGER

SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH EQUALLOGIC AUTO-SNAPSHOT MANAGER WHITE PAPER SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH EQUALLOGIC AUTO-SNAPSHOT MANAGER MANAGEMENT SERIES Business critical applications depend on Relational Database Management Systems (RDBMS)

More information

WHITE PAPER PPAPER. Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions. for Microsoft Exchange Server 2003 & Microsoft SQL Server

WHITE PAPER PPAPER. Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions. for Microsoft Exchange Server 2003 & Microsoft SQL Server WHITE PAPER PPAPER Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions for Microsoft Exchange Server 2003 & Microsoft SQL Server

More information

Lunch and Learn: Modernize Your Data Protection Architecture with Multiple Tiers of Storage Session 17174, 12:30pm, Cedar

Lunch and Learn: Modernize Your Data Protection Architecture with Multiple Tiers of Storage Session 17174, 12:30pm, Cedar Lunch and Learn: Modernize Your Data Protection Architecture with Multiple Tiers of Storage Session 17174, 12:30pm, Cedar Kevin Horn Principal Product Manager Enterprise Data Protection Solutions March

More information

It s All About Restoring Your Data Achieving Rapid Business Resumption with Highly Efficient Disk-to-Disk Backup & Restore

It s All About Restoring Your Data Achieving Rapid Business Resumption with Highly Efficient Disk-to-Disk Backup & Restore It s All About Restoring Your Data Achieving Rapid Business Resumption with Highly Efficient Disk-to-Disk Backup & Restore All trademark names are the property of their respective companies. This publication

More information

The next generation, proven, affordable way to protect business using disk-based recovery

The next generation, proven, affordable way to protect business using disk-based recovery REAL-TIME RECOVERY The next generation, proven, affordable way to protect business using disk-based recovery StorageCraft Technology Corporation Leading the Way to Safer Computing 2006 StorageCraft Technology

More information

Protecting Data with a Unified Platform

Protecting Data with a Unified Platform Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens

More information

The Secret to Affordably Protecting Critical Data

The Secret to Affordably Protecting Critical Data The Secret to Affordably Protecting Critical Data Using StoneFly Backup Advantage All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc.

More information

Virtual Machine Environments: Data Protection and Recovery Solutions

Virtual Machine Environments: Data Protection and Recovery Solutions The Essentials Series: The Evolving Landscape of Enterprise Data Protection Virtual Machine Environments: Data Protection and Recovery Solutions sponsored by by Dan Sullivan Vir tual Machine Environments:

More information

The Importance of Disaster Recovery for Data Protection

The Importance of Disaster Recovery for Data Protection The Importance of Disaster Recovery for Data Protection Eric R Schott Director, Product Management 2006 Summer Conference 2005 Annual June Conference 13th, 2006 October Sheraton 24-26 Nashua 2005, Hotel

More information

Improving Microsoft SQL Server Recovery with EMC NetWorker and EMC RecoverPoint

Improving Microsoft SQL Server Recovery with EMC NetWorker and EMC RecoverPoint Improving Microsoft SQL Server Recovery with EMC NetWorker and EMC RecoverPoint Applied Technology Abstract This white paper covers how EMC NetWorker and EMC NetWorker modules can be used effectively in

More information

How to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems

How to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems W H I T E P A P E R How to Manage Critical Data Stored in Microsoft Exchange Server 2010 By Hitachi Data Systems April 2012 2 Table of Contents Executive Summary and Introduction 3 Mission-critical Microsoft

More information

Using Network Attached Storage for Reliable Backup and Recovery

Using Network Attached Storage for Reliable Backup and Recovery Microsoft Corporation and HP Using Network Attached Storage for Reliable Backup and Recovery Microsoft Corporation Published: March 2010 Abstract Tape-based backup and restore technology has for decades

More information

Protect Microsoft Exchange databases, achieve long-term data retention

Protect Microsoft Exchange databases, achieve long-term data retention Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...

More information

WHITE PAPER THE BENEFITS OF CONTINUOUS DATA PROTECTION. SYMANTEC Backup Exec 10d Continuous Protection Server

WHITE PAPER THE BENEFITS OF CONTINUOUS DATA PROTECTION. SYMANTEC Backup Exec 10d Continuous Protection Server WHITE PAPER THE BENEFITS OF CONTINUOUS DATA PROTECTION SYMANTEC Backup Exec 10d Continuous Protection Server 1 TABLE OF CONTENTS EXECUTIVE SUMMARY...3 Current Situation...3 The New Opportunity...3 The

More information

Protecting Data with a Unified Platform

Protecting Data with a Unified Platform Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens

More information

Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures

Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures sponsored by Introduction to Realtime

More information

Enable unified data protection

Enable unified data protection Business white paper Enable unified data protection HP Data Protector Table of contents 3 The latest backup and recovery strategies 3 Are legacy approaches meeting current challenges? 4 The deployment

More information

an introduction to networked storage

an introduction to networked storage an introduction to networked storage How networked storage can simplify your data management The key differences between SAN, DAS, and NAS The business benefits of networked storage Introduction Historical

More information

Maintaining Business Continuity with Disk-Based Backup and Recovery Solutions

Maintaining Business Continuity with Disk-Based Backup and Recovery Solutions I D C V E N D O R S P O T L I G H T Maintaining Business Continuity with Disk-Based Backup and Recovery Solutions March 2008 Adapted from Worldwide Data Protection and Recovery Software 2007 2011 Forecast:

More information

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta

More information

Improving disaster recovery with Virtual Tape Libraries in Mainframe Environments By Deni Connor Principal Analyst, Storage Strategies NOW

Improving disaster recovery with Virtual Tape Libraries in Mainframe Environments By Deni Connor Principal Analyst, Storage Strategies NOW Improving disaster recovery with Virtual Tape Libraries in Mainframe Environments By Deni Connor Principal Analyst, Storage Strategies NOW Recovering from disasters is an arduous process for mainframe

More information

Snapshot Technology: Improving Data Availability and Redundancy

Snapshot Technology: Improving Data Availability and Redundancy Snapshot Technology: Improving Data Availability and Redundancy. All rights reserved. Table of Contents Introduction...3 Snapshot Overview...3 Functional Description...6 Creating Snapshots...7 Other Snapshot

More information

Bringing the edge to the data center a data protection strategy for small and midsize companies with remote offices. Business white paper

Bringing the edge to the data center a data protection strategy for small and midsize companies with remote offices. Business white paper Bringing the edge to the data center a data protection strategy for small and midsize companies with remote offices Business white paper Table of contents Data protection synonymous with business success...

More information

Virtual Server System and Data Protection, Recovery and Availability

Virtual Server System and Data Protection, Recovery and Availability Virtual Server System and Data Protection, Recovery and Availability Although server virtualization helps reduce IT infrastructure costs, it also adds complexity to protecting the wide range of applications

More information

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices September 2008 Recent advances in data storage and data protection technology are nothing short of phenomenal. Today,

More information

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization. WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read

More information

The Case for Continuous Data Protection

The Case for Continuous Data Protection The Case for Continuous Data Protection This paper will discuss the benefits of using CDP-based solutions, particularly in place of traditional, tape-based backup products that currently dominate the SMB

More information

The Modern Virtualized Data Center

The Modern Virtualized Data Center WHITEPAPER The Modern Virtualized Data Center Data center resources have traditionally been underutilized while drawing enormous amounts of power and taking up valuable floorspace. Virtualization has been

More information

Enabling comprehensive data protection for VMware environments using FalconStor Software solutions

Enabling comprehensive data protection for VMware environments using FalconStor Software solutions Industry Trends and Technology Perspective White Paper Enabling comprehensive data protection for VMware environments using FalconStor Software solutions Issues and solutions to enable complete data protection

More information

WHITE PAPER: ENTERPRISE SECURITY. Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions

WHITE PAPER: ENTERPRISE SECURITY. Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server White Paper: Enterprise Security Symantec

More information

Table of contents 3 4 4 5 5 6 7

Table of contents 3 4 4 5 5 6 7 Business white paper Unified data protection with HP Data Protector Leverage on-premise, cloud, and hybrid backup and recovery strategies Table of contents 3 Introduction 4 Are legacy approaches meeting

More information

Disaster Recovery Strategies: Business Continuity through Remote Backup Replication

Disaster Recovery Strategies: Business Continuity through Remote Backup Replication W H I T E P A P E R S O L U T I O N : D I S A S T E R R E C O V E R Y T E C H N O L O G Y : R E M O T E R E P L I C A T I O N Disaster Recovery Strategies: Business Continuity through Remote Backup Replication

More information

NSI Solutions with Microsoft VSS

NSI Solutions with Microsoft VSS Published: March 2004 Abstract With the introduction of Volume Shadow Copy Service (VSS) in Microsoft Windows Server 2003 and Windows Storage Server 2003 and the strength of NSI Software Double-Take you

More information

Remote Site Business Continuity with Syncsort XRS White Paper

Remote Site Business Continuity with Syncsort XRS White Paper Remote Site Business Continuity with Syncsort XRS White Paper bex30101907wprs-xrs Remote Site Business Continuity with Syncsort XRS Introduction As companies increasingly migrate to distributed business

More information

CA arcserve r16.5 Hybrid data protection

CA arcserve r16.5 Hybrid data protection CA arcserve r16.5 Hybrid data protection Whether you re protecting the data center, remote offices or desktop resources, you need a solution that helps you meet today s demanding service-level agreements

More information

Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication

Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication PRODUCT BRIEF Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication NOTICE This Product Brief contains proprietary information protected by copyright. Information in this

More information

Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation

Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation Introduction to Data Protection: Backup to Tape, Disk and Beyond Michael Fishman, EMC Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

IP Storage On-The-Road Seminar Series

IP Storage On-The-Road Seminar Series On-The-Road Seminar Series Disaster Recovery and Data Protection Page 1 Agenda! The Role of IP in Backup!Traditional use of IP networks for backup! backup capabilities! Contemporary data protection solutions

More information

EMC Integrated Infrastructure for VMware

EMC Integrated Infrastructure for VMware EMC Integrated Infrastructure for VMware Enabled by EMC Celerra NS-120 Reference Architecture EMC Global Solutions Centers EMC Corporation Corporate Headquarters Hopkinton MA 01748-9103 1.508.435.1000

More information

Storage Solutions Overview. Benefits of iscsi Implementation. Abstract

Storage Solutions Overview. Benefits of iscsi Implementation. Abstract Storage Solutions Overview Benefits of iscsi Implementation Aberdeen LLC. Charles D. Jansen Published: December 2004 Abstract As storage demands continue to increase and become more complex, businesses

More information

Continuous Data Protection. PowerVault DL Backup to Disk Appliance

Continuous Data Protection. PowerVault DL Backup to Disk Appliance Continuous Data Protection PowerVault DL Backup to Disk Appliance Continuous Data Protection Current Situation The PowerVault DL Backup to Disk Appliance Powered by Symantec Backup Exec offers the industry

More information

An Oracle White Paper March 2012. Backup and Recovery Strategies for the Oracle Database Appliance

An Oracle White Paper March 2012. Backup and Recovery Strategies for the Oracle Database Appliance An Oracle White Paper March 2012 Backup and Recovery Strategies for the Oracle Database Appliance 1 Oracle Database Appliance The Oracle Database Appliance is an engineered-system; a pre-configured bundle

More information

Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve

Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while

More information

White Paper. 1 800 FASTFILE / www.ironmountain.ca Page 1

White Paper. 1 800 FASTFILE / www.ironmountain.ca Page 1 White Paper LIVEVAULT Top 10 Reasons for Using Online Server Backup and Recovery Introduction Backup of vital company information is critical to a company s survival, no matter what size the company. Recent

More information

Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation

Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation : Backup to Tape, Disk and Beyond Michael Fishman, EMC Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use

More information

Top 10 Reasons for Using Disk-based Online Server Backup and Recovery

Top 10 Reasons for Using Disk-based Online Server Backup and Recovery ADVISORY Top 10 Reasons for Using Disk-based Online Server Backup and Recovery INTRODUCTION Backup of vital company information is critical to a company s survival, no matter what size the company. Recent

More information

How Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution

How Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series How Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution sponsored by Introduction to

More information

An Oracle White Paper November 2010. Backup and Recovery with Oracle s Sun ZFS Storage Appliances and Oracle Recovery Manager

An Oracle White Paper November 2010. Backup and Recovery with Oracle s Sun ZFS Storage Appliances and Oracle Recovery Manager An Oracle White Paper November 2010 Backup and Recovery with Oracle s Sun ZFS Storage Appliances and Oracle Recovery Manager Introduction...2 Oracle Backup and Recovery Solution Overview...3 Oracle Recovery

More information

Tips and Best Practices for Managing a Private Cloud

Tips and Best Practices for Managing a Private Cloud Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies

More information

Affordable Remote Data Replication

Affordable Remote Data Replication SANmelody Application Affordable Remote Data Replication Your Data is as Valuable as Anyone s You know very well how critical your data is to your organization and how much your business would be impacted

More information

Preface... 1. Introduction... 1 High Availability... 2 Users... 4 Other Resources... 5 Conventions... 5

Preface... 1. Introduction... 1 High Availability... 2 Users... 4 Other Resources... 5 Conventions... 5 Table of Contents Preface.................................................... 1 Introduction............................................................. 1 High Availability.........................................................

More information

Eliminating End User and Application Downtime:

Eliminating End User and Application Downtime: Eliminating End User and Application Downtime: Architecting the Right Continuous Availability and Disaster Recovery Environment March 2010 Table of Contents Introduction 3 Where to Start 3 Moving to Continuous

More information

Restoration Technologies. Mike Fishman / EMC Corp.

Restoration Technologies. Mike Fishman / EMC Corp. Trends PRESENTATION in Data TITLE Protection GOES HERE and Restoration Technologies Mike Fishman / EMC Corp. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless

More information

Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems

Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec

More information

WHY CLOUD BACKUP: TOP 10 REASONS

WHY CLOUD BACKUP: TOP 10 REASONS WHITE PAPER DATA PROTECTION WHY CLOUD BACKUP: TOP 10 REASONS Contents REASON #1: Achieve disaster recovery with secure offsite cloud backup REASON #2: Freedom from manual and complex tape backup tasks

More information

Reduce your data storage footprint and tame the information explosion

Reduce your data storage footprint and tame the information explosion IBM Software White paper December 2010 Reduce your data storage footprint and tame the information explosion 2 Reduce your data storage footprint and tame the information explosion Contents 2 Executive

More information

Introduction. Silverton Consulting, Inc. StorInt Briefing

Introduction. Silverton Consulting, Inc. StorInt Briefing Introduction Silverton Consulting, Inc. StorInt Briefing All too often in today s SMB data centers the overall backup and recovery process, including both its software and hardware components, is given

More information

Leveraging Virtualization for Disaster Recovery in Your Growing Business

Leveraging Virtualization for Disaster Recovery in Your Growing Business Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster

More information

Deployment Options for Microsoft Hyper-V Server

Deployment Options for Microsoft Hyper-V Server CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES

More information

AVTech provides customers with end-to-end recovery management service with CA ARCserve solutions

AVTech provides customers with end-to-end recovery management service with CA ARCserve solutions CUSTOMER SUCCESS STORY AVTech provides customers with end-to-end recovery management service with CA ARCserve solutions CLIENT PROFILE Industry: ICT Company: Advanced Vision Technology (AVTech) Employees:

More information

Planning and Implementing Disaster Recovery for DICOM Medical Images

Planning and Implementing Disaster Recovery for DICOM Medical Images Planning and Implementing Disaster Recovery for DICOM Medical Images A White Paper for Healthcare Imaging and IT Professionals I. Introduction It s a given - disaster will strike your medical imaging data

More information

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key

More information

EMC RECOVERPOINT: BUSINESS CONTINUITY FOR SAP ENVIRONMENTS ACROSS DISTANCE

EMC RECOVERPOINT: BUSINESS CONTINUITY FOR SAP ENVIRONMENTS ACROSS DISTANCE White Paper EMC RECOVERPOINT: BUSINESS CONTINUITY FOR SAP ENVIRONMENTS ACROSS DISTANCE Applied Technology Abstract Business continuity is a critical component of any enterprise data protection strategy

More information

EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE: MEETING NEEDS FOR LONG-TERM RETENTION OF BACKUP DATA ON EMC DATA DOMAIN SYSTEMS

EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE: MEETING NEEDS FOR LONG-TERM RETENTION OF BACKUP DATA ON EMC DATA DOMAIN SYSTEMS SOLUTION PROFILE EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE: MEETING NEEDS FOR LONG-TERM RETENTION OF BACKUP DATA ON EMC DATA DOMAIN SYSTEMS MAY 2012 Backups are essential for short-term data recovery

More information

DATA CENTER VIRTUALIZATION WHITE PAPER SEPTEMBER 2006

DATA CENTER VIRTUALIZATION WHITE PAPER SEPTEMBER 2006 DATA CENTER VIRTUALIZATION WHITE PAPER SEPTEMBER 2006 EXECUTIVE SUMMARY Many enterprise IT departments have attempted to respond to growth by adding servers and storage systems dedicated to specific applications,

More information

SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY

SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY Among the priorities for efficient storage management is an appropriate protection architecture. This paper will examine how to architect storage

More information

White. Paper. Improving Backup Effectiveness and Cost-Efficiency with Deduplication. October, 2010

White. Paper. Improving Backup Effectiveness and Cost-Efficiency with Deduplication. October, 2010 White Paper Improving Backup Effectiveness and Cost-Efficiency with Deduplication By Lauren Whitehouse October, 2010 This ESG White Paper was commissioned by Fujitsu and is distributed under license from

More information

A New Era in Data Protection. Enterprise-Class Data Backup for Smaller Businesses

A New Era in Data Protection. Enterprise-Class Data Backup for Smaller Businesses A New Era in Data Protection Enterprise-Class Data Backup for Smaller Businesses THE NEED: Better Backup Solutions For Small Business INTRADYN provides proven solutions designed to let you concentrate

More information

Breakthrough Data Recovery for IBM AIX Environments

Breakthrough Data Recovery for IBM AIX Environments TECHNICAL ISSUES Best Practices in Availability. Breakthrough Data Recovery for IBM AIX Environments How New Technologies Are Making Data Protection, Recovery and High Availability Easier and More Affordable

More information

Leverage the IBM Tivoli advantages in storage management

Leverage the IBM Tivoli advantages in storage management IBM Software December 2010 Leverage the IBM Tivoli advantages in storage management IBM Tivoli storage management solutions outperform the competition 2 Leverage the IBM Tivoli advantages in storage management

More information

CYBERNETICS. Virtualization of Tape Storage

CYBERNETICS. Virtualization of Tape Storage Abstract: Realizing the benefits of Disk to Disk to Tape backup strategies incorporating disk-based virtual tape devices. CYBERNETICS Intelligent Storage Solutions Table of Contents Introduction 1 Benefits

More information

Effective Storage Management for Cloud Computing

Effective Storage Management for Cloud Computing IBM Software April 2010 Effective Management for Cloud Computing April 2010 smarter storage management Page 1 Page 2 EFFECTIVE STORAGE MANAGEMENT FOR CLOUD COMPUTING Contents: Introduction 3 Cloud Configurations

More information

EMC Data Domain Boost for Oracle Recovery Manager (RMAN)

EMC Data Domain Boost for Oracle Recovery Manager (RMAN) White Paper EMC Data Domain Boost for Oracle Recovery Manager (RMAN) Abstract EMC delivers Database Administrators (DBAs) complete control of Oracle backup, recovery, and offsite disaster recovery with

More information

Backup and Recovery 1

Backup and Recovery 1 Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup

More information

The 10 Disaster Planning Essentials For A Small Business Network

The 10 Disaster Planning Essentials For A Small Business Network The 10 Disaster Planning Essentials For A Small Business Network If your data is important to your business and you cannot afford to have your operations halted for days even weeks due to data loss or

More information

Backup Express and Network Appliance: A Cost-Effective Remote Site Business Continuity Solution White Paper

Backup Express and Network Appliance: A Cost-Effective Remote Site Business Continuity Solution White Paper Backup Express and Network Appliance: A Cost-Effective Remote Site Business Continuity Solution White Paper bex235080206 Backup Express and Network Appliance: A Cost-Effective Remote Site Business Continuity

More information

W H I T E P A P E R. Disaster Recovery Virtualization Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take

W H I T E P A P E R. Disaster Recovery Virtualization Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take W H I T E P A P E R Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take Contents Introduction...1 What is VMware Infrastructure?...1 What is Double-Take?...1 Data Protection

More information