Module: Business Continuity

Size: px
Start display at page:

Download "Module: Business Continuity"

Transcription

1 Upon completion of this module, you should be able to: Describe business continuity and cloud service availability Describe fault tolerance mechanisms for cloud infrastructure Discuss data protection solutions Describe the key design strategies for cloud application resiliency 1

2 Cloud Computing Reference Model Business Continuity Cross-layer Function 2

3 Lesson: Business Continuity Overview This lesson covers the following topics: Business continuity Cloud service availability Causes of service unavailability Impact of cloud service unavailability Key methods to achieve the required cloud service availability 3

4 What is Business Continuity? Business Continuity BC entails preparing for, responding to, and recovering from service outage that adversely affects business operations. BC enables continuous availability of cloud services in the event of failure Helps to meet the required service level BC involves various proactive and reactive measures Disaster recovery is a part of BC, which coordinates the process of restoring infrastructure, including data Required to support ongoing cloud services, after a disaster occurs 4

5 Cloud Service Availability Cloud Service Availability Refers to the ability of a cloud service to perform its agreed function according to business requirements and customer expectations during its specified time of operation. Service availability is based on the agreed service time and the downtime Service availability (%) = Agreed service time Downtime Agreed service time (Agreed service time is the period where the service is supposed to be available) 5

6 Causes of Cloud Service Unavailability Application failure For example, due to catastrophic exceptions caused by bad logic Data loss Infrastructure component failure Failure of dependent services Data center or site down Refreshing IT infrastructure 7

7 Impact of Cloud Service Unavailability Cost of unavailability of services is greater than ever - Outages could cost millions of dollars per hour Unavailability of service also affects reputation - Customers, financial markets, banks, and business partners Loss of revenue - Direct loss, compensatory payments, future revenue loss, and investment loss 8

8 Methods to Achieve Required Cloud Service Availability Building resilient cloud infrastructure facilitates meeting the required service availability Building resilient cloud infrastructure requires various high availability solutions Implementing fault tolerance mechanisms Deploying redundancy at both cloud infrastructure component level and site level to avoid single point of failure Deploying data protection solutions such as backup and replication Implementing automated cloud service failover Architecting resilient cloud applications 9

9 Lesson Summary During this lesson the following topics were covered: Business continuity Cloud service availability Causes of service unavailability Impact of cloud service unavailability Methods to achieve the required cloud service availability 10

10 Lesson: Building Fault Tolerance Cloud Infrastructure 1 This lesson covers the following topics: Avoiding single points of failure Key fault tolerance mechanisms 11

11 Single Points of Failure Single Points of Failure Refers to any individual component or aspect of an infrastructure whose failure can make the entire system or service unavailable. Single points of failure may occur at Component level (compute, storage, and network) Site or data center level 12

12 Avoiding Single Points of Failure Single points of failure can be avoided by implementing fault tolerance mechanisms such as redundancy Implement redundancy at component level Compute Storage Network Implement multiple service availability zones Avoids single points of failure at data center (site) level Enable service failover globally It is important to have high availability mechanisms that enable automated service failover 13

13 Implementing Redundancy at Component Level Key techniques to protect compute Clustering VM live migration Key techniques to protect network connectivity Link and switch aggregation NIC teaming Multipathing In-service software upgrade Configuring redundant hot swappable components Key techniques to protect storage RAID and erasure coding Dynamic disk sparing Configuring redundant storage system components 14

14 Compute Clustering Compute Clustering A technique where at least two compute systems (or nodes) work together and are viewed as a single compute system to provide high availability and load balancing. Enables service failover in the event of compute system failure to another system to minimize or avoid any service outage Two common clustering implementations are: Active/active Active/passive Hypervisor cluster is a common clustering implementation in cloud environment 15

15 Hypervisor Cluster Multiple hypervisors running on different systems are clustered Provides continuous availability of services running on VMs even if a physical compute system or a hypervisor fails Typically a live instance (i.e., a secondary VM) of a primary VM is created on another compute system 16

16 Virtual Machine Live Migration Running services on VMs are moved from one physical compute system to another without any downtime Allows scheduled maintenance without any downtime Facilitates VM load balancing 17

17 Link and Switch Aggregation Link aggregation Combines links between two switches and also between a switch and a node Enables network traffic failover in the event of a link failure in the aggregation Enables distribution of network traffic across links in the aggregation Switch aggregation Provides fault tolerance against switch and link failures Improves node performance by providing more active paths and bandwidth 18

18 NIC Teaming NIC Teaming A link aggregation technique that groups NICs so that they appear as a single, logical NIC to the OS or hypervisor. Provides network traffic failover in the event of a NIC/link failure Distributes network traffic across NICs NICs within a team can be configured as active and standby 19

19 Multipathing Enables a compute system to use multiple paths for transferring data to a LUN Enables failover by redirecting I/O from a failed path to another active path Performs load balancing by distributing I/O across active paths Standby paths become active if one or more active paths fail 20

20 In-Service Software Upgrade (ISSU) Allows updating software on network devices (switches and routers) without impacting the network availability Eliminates the need to stop the ongoing process on a device Ensures network availability as a result of a network device maintenance or upgrade processes Typically requires a network device with redundant control plane elements (supervisor or routing engines) This setup allows the administrator to update the software image on one engine while the other maintains network availability 21

21 RAID and Dynamic Disk Sparing RAID Combines multiple drives into a logical unit called a RAID set Provides data protection against drive failure Dynamic disk sparing Automatically replaces a failed drive with a spare drive to protect against data loss Multiple spare drives can be configured to improve availability A1 B1 C P A2 B P C Q A P B Q RAID 6 -Dual Distributed Parity A Q B2 C1 C2 22

22 Erasure Coding Provides space-optimal data redundancy to protect data loss against multiple drive failure A set of n disks is divided into m disks to hold data and k disks to hold coding information Coding information is calculated from data 23

23 Storage Resiliency Using Mirrored LUN Mirrored LUN is created using virtualization appliance Each I/O to the LUN is mirrored to the LUNs on the storage systems Mirrored LUN is continuously available to the compute system Even if one of the storage systems is unavailable due to failure 24

24 Lesson Summary During this lesson the following topics were covered: Single points of failure Clustering and VM live migration Aggregation and multipathing In-service software upgrade RAID, erasure coding, and dynamic drive sparing Storage resiliency using mirrored LUN 25

25 Lesson: Building Fault Tolerance Cloud Infrastructure 2 This lesson covers the following topics: Service availability zone Automated service failover across zones Active/passive and active/active zone configurations Live migrations across zones using stretched cluster 26

26 Service Availability Zones A service availability zone is a location with its own set of resources and isolated from other zones A zone can be a part of a data center or may even be comprised of the whole data center Enables running multiple service instances within and across zones to survive data center or site failure In the event of outage, the service should seamlessly failover across the zones Zones within a particular region are typically connected through low-latency network Enables faster cloud service failover 27

27 Automated Service Failover Across Zones Automated service failover Ensures robust and consistent failover Enables to meet stringent service levels Reduces RTO Automated failover process primarily depends on: Replication across zones Live migration with stretched cluster (zones in different remote locations) Reliable network infrastructure between zones Zones can be configured as active/passive and active/active configuration 28

28 Active/Passive Zone Configuration 29

29 Active/Active Zone Configuration 30

30 VM Migration Across Zones Using Stretched Cluster 31

31 Lesson Summary During this lesson the following topics were covered: Service availability zones Active/passive and active/active zone configurations VM migration across zones using stretched cluster 33

32 Lesson: Data Protection Solution Backup This lesson covers the following topics: Backup and recovery Backup requirements in a cloud environment Guest-level and image-level backup method Backup as a Service Backup service deployment options Deduplication for backup environment 34

33 Data Protection Overview Protecting critical data ensures availability of services Seamless service failover requires the availability of data Businesses also implement data protection solutions in order to comply with regulatory requirements Individual services and associated data sets have different business values, require different data protection strategies Two common data protection solutions: Backup Replication 35

34 Introduction to Backup and Recovery Backup An additional copy of production data, created and retained for the sole purpose of recovering lost or corrupted data. RPO and RTO are the primary considerations in selecting and implementing a specific backup strategy RPO specifies the time interval between two backups RTO relates to the time taken to recover data from backup RTO influences the type of backup target that should be used To implement a successful backup and recovery solution Service providers need to evaluate the backup methods along with their recovery considerations and retention requirements 36

35 Backup Requirements in a Cloud Environment Backup requires integration between backup application and management server of virtualized environment Backup requirements may differ from one service to another based on RTO and RPO Requires well-defined backup strategies to meet the requirements Recovery requires file level and/or full VM recovery Huge volume of redundant data in the backup environment Large number of VMs having identical data and configurations Backup and recovery operations need to be automated 37

36 Key Backup Components Backup client Gathers the data that is to be backed up Sends the data to the storage node Backup server Manages backup operations Maintains backup catalog Storage node Responsible for writing data to backup device Backup device (backup target) Tape library, disk library, and virtual tape library 38

37 Backup Targets Backup Targets Description Tape Library Tapes are portable and can be used for long term offsite storage Must be stored in locations with a controlled environment Not optimized to recognize duplicate content Data integrity and recoverability are major issues with tape-based backup media Disk Library Enhanced backup and recovery performance Disks also offer faster recovery when compared to tapes No inherent off-site capability, and is dependent on additional technologies such as replication to comply with off-site requirements Disk-based backup appliance includes features such as deduplication, compression, encryption, and replication to support business objectives Virtual Tape Library Disks are emulated and presented as tapes to backup software Does not require any additional modules or changes in the legacy backup software Provides better performance and reliability over physical tape Does not require the usual maintenance tasks associated with a physical tape drive, such as periodic cleaning and drive calibration 39

38 Backup Methods Two key backup methods: Guest-level Image-level 40

39 Guest-level Backup Backup agent is installed on each VM Performs file-level backup and recovery Does not backup VM configuration files Performing backup on multiple VMs on a compute system may consume more resources and lead to resource contention Impacts performance of applications running on VMs A A A = Backup Agent Application Servers Backup Server/ Storage Node Backup Device 41

40 Image-level Backup Creates a copy of the entire virtual disk and configuration data associated with a particular VM Backup is saved as a single entity called a VM image Provides VM image-level and file-level recovery No backup agent is required inside the VM to backup Backup processing is offloaded from VMs to a proxy server A Proxy Server Create Snapshot Mount the Snapshot Backup VM Snapshot Application Servers FS Volume Backup Device 42

41 Backup as a Service Enables consumers to procure backup services on demand Provides offsite backup for consumer desktops, laptops, and application servers Backs up data to the cloud storage Reduces the backup management overhead Transformation from CAPEX to OPEX Pay-per-use/subscription-based pricing Gives consumers the flexibility to select a backup technology based on their current requirements 43

42 Backup Service Deployment Options Managed Backup Service - Suitable when a cloud service provider already hosts consumer applications and data - Backup service is offered by the provider to protect consumer s data - Backup is managed by the service provider Replicated Backup Service - Service provider only manages data replication and IT infrastructure at disaster recovery site - Local backups are managed by consumers Remote Backup Service - Service provider receives data from consumers - Backup is managed by the service provider 44

43 Drivers for Optimizing Backup 45

44 Introduction to Data Deduplication Data Deduplication The process of detecting and identifying the unique data segments within a given set of data to eliminate redundancy. Deduplication process Chunk the data set Identify duplicate chunk Eliminate the redundant chunk Deduplication After Deduplication Unique segments = 3 Before Deduplication Total segments = 39 46

45 Deduplication Granularity Level File-level deduplication Detects and removes redundant copies of identical files Only one copy of the file is stored; the subsequent copies are replaced with a pointer to the original file Does not address the problem of duplicate content inside the files Sub-file level deduplication Breaks files down to smaller segments Detects redundant data within and across files Two methods: Fixed-length block Variable-length block 47

46 Deduplication Method Source-based deduplication Eliminates redundant data at the source (backup client) Client sends only new, unique segments across the network Reduces storage and network bandwidth requirements Increases overhead on the backup client Target-based deduplication Offloads deduplication process from the backup client Data is deduplicated at the target either inline or post-process 48

47 Lesson Summary During this lesson the following topics were covered: Backup requirements in a cloud environment Guest-level and image-level backup methods Backup as a Service Backup service deployment options Source-based and target-based deduplication 50

48 Lesson: Data Protection Solution-Replication This lesson covers the following topics: Replication and its types Snapshot and mirroring Synchronous and asynchronous remote replication Continuous Data Protection (CDP) Disaster Recovery as a Service (DRaaS) 51

49 Introduction to Replication Replication Process of creating an exact copy (replica) of the data for ensuring availability of services. Replica copies are used to restore and restart services if data loss occurs Based on the SLA for the service being offered to the consumers, data can be replicated to one or more locations Replication can be classified Local replication Snapshot and mirroring Remote replication Synchronous and asynchronous 52

50 Local Replication: Snapshot A virtual copy of a set of files, or volume as they appeared in a particular PIT Provides the ability to restore the files or volumes if there is a data loss or corruption Virtual machine snapshot is a common snapshot technique, that preserves the state and data of a VM at a specific PIT When a snapshot is created, a child virtual disk (delta disk file) is created from the base image or parent virtual disk Successive snapshots generate a new child virtual disk from the previous child virtual disk Snapshots hold only changed blocks 53

51 Local Replication: Mirroring 54

52 Remote Replication: Synchronous Write is committed to both the source and the remote replica before it is acknowledged to the compute system Ensures that the source and the replica have identical data at all times Provides near zero RPO Compute System Compute system writes data to source. 2. Data from source is replicated to replica (target). 3. Target acknowledges back to source. 4. Source acknowledges write complete to the compute system. Storage (Source) Primary Zone (Source site) 2 3 Secondary Zone (Remote Site) Storage (Replica) 55

53 Remote Replication: Asynchronous A write is committed to the source and immediately acknowledged to the compute system Data is buffered at the source and transmitted to the remote site later Replica will be behind the source by a finite amount (finite RPO) Compute System Compute system writes data to source. 2. Write is immediately acknowledged to compute system. 3. Data is transmitted to the replica (target). 4. Target acknowledges back to source. Storage (Source) 3 4 Storage (Replica) Primary Zone (Source Site) Secondary Zone (Remote Site) 56

54 Advanced Replication Solution: CDP Provides the ability to restore data to any previous PIT Enables to meet the required recovery level for an application Data changes are continuously captured and stored in a separate location from the production data Supports both local and remote replication To meet operational and disaster recovery respectively 57

55 Key CDP Components Journal volume Contains all the data that has changed from the time the replication session started to the production volume Journal size determines how far back in time the recovery points can go CDP appliance Intelligent hardware platform that runs the CDP software Manages both the local and the remote replications Write splitter Intercept writes to the production volume from the compute system and splits each write into two copies Can be implemented at the compute, fabric, or storage system 58

56 CDP Operations: Local and Remote Replication 59

57 Replication Use Case: DRaaS Service provider offers resources to enable consumers to run their IT services in the event of a disaster Resources at the service provider location can be dedicated to the consumer or they can be shared Replication is a key technique used by the service provider in order to offer DRaaS to the consumers Service provider should design, implement, and document a DRaaS solution specific to the customer s infrastructure 60

58 DRaaS Normal Production Operation IT services run at the consumer s production data center Replication occurs from the consumer production environment to the service provider s data center over the network Data is usually encrypted while replicating to the provider s location VM instances are not allocated Network Storage Compute Systems Consumer Production Data Center Storage Replication Cloud Service Provider 61

59 DRaaS Business Disruption Business operations failover to the provider s infrastructure in the event of a disaster at consumer s data center Users at the consumer organization are redirected to the cloud Typically VM instances are created from a pool of compute Connect replicated storage to each of the newly activated VMs Disaster VM instances are invoked to run the service Network Compute Systems Storage Consumer Production Data Center Cloud Service Provider 62

60 Lesson Summary During this lesson the following topics were covered: Snapshot and mirroring Synchronous and asynchronous remote replication Continuous Data Protection Disaster Recovery as a Service 63

61 Lesson: Application Resiliency for Cloud This lesson covers the following topics: Resilient cloud application Key design strategies for application resiliency Monitoring applications for availability 64

62 Resilient Cloud Applications Overview Cloud applications have to be designed to deal with IT resources failure to guarantee the required availability Fault resilient applications have logic to detect and handle transient fault conditions to avoid application downtime Key application design strategies for improving availability Graceful degradation of application functionality Retry logic in application code Persistent application state model Event-driven processing 65

63 Graceful Degradation Application maintains the limited functionality even when some of the modules or supporting services are not available Unavailability of certain application components or modules should not bring down the entire application For example, an e-commerce site can continue to collect orders even if its payment gateway is unavailable Provides the ability to process orders when the payment gateway is once again available or after failing over to a secondary gateway 66

64 Fault Detection and Retry Logic Refers to a mechanism that implements a logic in the code of an application to improve the availability To detect and retry the service that is temporarily down May result in successful restore of service A retry strategy must be defined to state how many retries can be attempted before deciding the fault is not transient A successful retry attempt typically goes unnoticed to the application users 67

65 Persistent Application State Model and Eventdriven Processing Persistent application state model Application state information is stored out of the memory Stored in a data repository If an instance fails, the state information is still available in the repository Asynchronous event-driven processing Applications are written in a way to process the user request from a queue asynchronously instead of synchronous call Allows multiple applications instances to process requests If an instance is lost, the impact is minimal 68

66 Monitoring Application Availability Specialized tools provide the capability to monitor the availability of application instance that runs on VMs Minimizes downtime associated with the application failure Typically this tool is integrated with VM management software When there is an error or failure in an application The tool attempts to restart the application within the VM If the application does not restart successfully, the tool communicates to VM management software VM management software in turn automatically restart the VM 69

67 Lesson Summary During this lesson the following topics were covered: Graceful degradation of application functionality Retry logic in application code Persistent application state model Event-driven processing Monitoring application availability 70

68 Concepts in Practice EMC backup and deduplication products EMC replication products VMware BC solutions 71

69 EMC Backup and Deduplication Products NetWorker Avamar Data Domain/ ProtectPoint Software that centralizes, automates, and accelerates data backup and recovery Supports multiplexing Supports source-based, and target-based deduplication capabilities by integrating with EMC Avamar and EMC Data Domain, respectively Disk-based backup and recovery solution that provides inherent sourcebased deduplication Avamar provides a variety of options for backup, including guest OS-level backup and image-level backup Data Domain - Target-based data deduplication solution - Data Domain Boost software increases backup performance by distributing parts of deduplication process to backup server ProtectPoint - Backs up data directly from primary storage to Data Domain system 72

70 EMC Replication Products VNX Snapshot/SnapView TimeFinder/SRDF RecoverPoint/VPLEX VNX Snapshot - Creates a PIT copy of a source LUN SnapView - EMC VNX array-based local replication software - Creates pointer-based virtual copy and full-volume mirror of the source using SnapView Snapshot and Clone respectively TimeFinder - EMC VMAX array-based local replication software - Uses TimeFinder/Snap to create pointer-based virtual copy and TimeFinder/Clone for pointer-based full-volume replica SRDF - A family of remote replication solutions for EMC VMAX arrays - Includes SRDF/Synchronous, SRDF/Asynchronous, and SRDF/Star RecoverPoint - Solution for both local and remote CDP - Enables to access data for any previous PIT VPLEX - Enables mirroring data of a virtual volume both within and across locations - Uses a clustering architecture and data caching techniques 74

71 VMware BC Solutions vcenter Site Recovery Manager A VMware tool that makes disaster recovery rapid, reliable, and manageable Provides an interface for setting up recovery plans Automates both failover and failback process that ensures highly predictable RPO and RTO Integrates tightly with replication products, vsphere, and vcenter Server VMware FT Provides continuous availability for application in the event of server failure Creates a live shadow instance of a VM that is in virtual lockstep with the primary instance FT eliminates even the smallest chance of data loss or disruption VMware HA Provides high availability for applications running in virtual machines In the event of the physical compute system failure, affected VMs are automatically restarted on other compute systems 75

72 VMware BC Solutions (Cont'd) vmotion Enables live migration of running VMs from one physical server to another without any downtime Capable of migrating VMs running any OS across any type of hardware and storage supported by ESXi Storage vmotion Enables live migration of VM disk files within and across storage arrays with no downtime Enables to perform proactive storage migrations, improve VM storage performance and free up valuable storage capacity 76

73 Module Summary Key points covered in this module: Business continuity Cloud service availability Fault tolerance mechanisms for cloud infrastructure Backup and deduplication Local and remote replication Fault resilient cloud application design strategies 77

Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs

Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs EMC RECOVERPOINT FAMILY Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs ESSENTIALS EMC RecoverPoint Family Optimizes RPO

More information

EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers

EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers EMC VPLEX FAMILY Continuous Availability and data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is

More information

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication

More information

Veritas Storage Foundation High Availability for Windows by Symantec

Veritas Storage Foundation High Availability for Windows by Symantec Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability

More information

EMC AVAMAR. Deduplication backup software and system. Copyright 2012 EMC Corporation. All rights reserved.

EMC AVAMAR. Deduplication backup software and system. Copyright 2012 EMC Corporation. All rights reserved. EMC AVAMAR Deduplication backup software and system 1 IT Pressures 2009 2020 0.8 zettabytes 35.2 zettabytes DATA DELUGE BUDGET DILEMMA Transformation INFRASTRUCTURE SHIFT COMPLIANCE and DISCOVERY 2 EMC

More information

EMC VPLEX FAMILY. Continuous Availability and Data Mobility Within and Across Data Centers

EMC VPLEX FAMILY. Continuous Availability and Data Mobility Within and Across Data Centers EMC VPLEX FAMILY Continuous Availability and Data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is

More information

WHITE PAPER. www.fusionstorm.com. The Double-Edged Sword of Virtualization:

WHITE PAPER. www.fusionstorm.com. The Double-Edged Sword of Virtualization: WHiTE PaPEr: Easing the Way to the cloud: 1 WHITE PAPER The Double-Edged Sword of Virtualization: Solutions and Strategies for minimizing the challenges and reaping the rewards of Disaster recovery in

More information

Redefining Backup for VMware Environment. Copyright 2009 EMC Corporation. All rights reserved.

Redefining Backup for VMware Environment. Copyright 2009 EMC Corporation. All rights reserved. Redefining Backup for VMware Environment 1 Agenda VMware infrastructure backup and recovery challenges Introduction to EMC Avamar Avamar solutions for VMware infrastructure Key takeaways Copyright 2009

More information

Symantec Storage Foundation High Availability for Windows

Symantec Storage Foundation High Availability for Windows Symantec Storage Foundation High Availability for Windows Storage management, high availability and disaster recovery for physical and virtual Windows applications Data Sheet: High Availability Overview

More information

DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES

DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES Dejan Živanović EMC Technology Solutions Group SEE Presales Manager Dejan.Zivanovic@emc.com 1 The Business Maturity Model V Enabled Web

More information

Complete Storage and Data Protection Architecture for VMware vsphere

Complete Storage and Data Protection Architecture for VMware vsphere Complete Storage and Data Protection Architecture for VMware vsphere Executive Summary The cost savings and agility benefits of server virtualization are well proven, accounting for its rapid adoption.

More information

Optimization, Business Continuity & Disaster Recovery in Virtual Environments. Darius Spaičys, Partner Business manager Baltic s 2012-06-14

Optimization, Business Continuity & Disaster Recovery in Virtual Environments. Darius Spaičys, Partner Business manager Baltic s 2012-06-14 Optimization, Business Continuity & Disaster Recovery in Virtual Environments Darius Spaičys, Partner Business manager Baltic s 2012-06-14 Agenda Business Continuity and Disaster Recovery Challenges How

More information

STRATEGIC PLANNING ASSUMPTION(S)

STRATEGIC PLANNING ASSUMPTION(S) STRATEGIC PLANNING ASSUMPTION(S) By 2016, one-third of organizations will change backup vendors due to frustration over cost, complexity and/or capability. By 2014, 80% of the industry will choose disk-based

More information

EMC BACKUP-AS-A-SERVICE

EMC BACKUP-AS-A-SERVICE Reference Architecture EMC BACKUP-AS-A-SERVICE EMC AVAMAR, EMC DATA PROTECTION ADVISOR, AND EMC HOMEBASE Deliver backup services for cloud and traditional hosted environments Reduce storage space and increase

More information

IMPROVING VMWARE DISASTER RECOVERY WITH EMC RECOVERPOINT Applied Technology

IMPROVING VMWARE DISASTER RECOVERY WITH EMC RECOVERPOINT Applied Technology White Paper IMPROVING VMWARE DISASTER RECOVERY WITH EMC RECOVERPOINT Applied Technology Abstract EMC RecoverPoint provides full support for data replication and disaster recovery for VMware ESX Server

More information

Maximize Your Virtual Environment Investment with EMC Avamar. Rob Emsley Senior Director, Product Marketing

Maximize Your Virtual Environment Investment with EMC Avamar. Rob Emsley Senior Director, Product Marketing 1 Maximize Your Virtual Environment Investment with EMC Avamar Rob Emsley Senior Director, Product Marketing 2 Private Cloud is the Vision Virtualized Data Center Internal Cloud Trusted Flexible Control

More information

Business Continuity with the. Concerto 7000 All Flash Array. Layers of Protection for Here, Near and Anywhere Data Availability

Business Continuity with the. Concerto 7000 All Flash Array. Layers of Protection for Here, Near and Anywhere Data Availability Business Continuity with the Concerto 7000 All Flash Array Layers of Protection for Here, Near and Anywhere Data Availability Version 1.0 Abstract Concerto 7000 All Flash Array s Continuous Data Protection

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

DR-to-the- Cloud Best Practices

DR-to-the- Cloud Best Practices DR-to-the- Cloud Best Practices HOW TO EFFECTIVELY CONFIGURE YOUR OWN SELF-MANAGED RECOVERY PLANS AND THE REPLICATION OF CRITICAL VMWARE VIRTUAL MACHINES FROM ON-PREMISES TO A CLOUD SERVICE PROVIDER CONTENTS

More information

Westek Technology Snapshot and HA iscsi Replication Suite

Westek Technology Snapshot and HA iscsi Replication Suite Westek Technology Snapshot and HA iscsi Replication Suite Westek s Power iscsi models have feature options to provide both time stamped snapshots of your data; and real time block level data replication

More information

Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options

Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware

More information

EPIC EHR: BUILDING HIGH AVAILABILITY INFRASTRUCTURES

EPIC EHR: BUILDING HIGH AVAILABILITY INFRASTRUCTURES EPIC EHR: BUILDING HIGH AVAILABILITY INFRASTRUCTURES BEST PRACTICES FOR PROTECTING EPIC EHR ENVIRONMENTS EMC HEALTHCARE GROUP ABSTRACT Epic Electronic Health Records (EHR) is at the core of delivering

More information

Storage Based Replications

Storage Based Replications Storage Based Replications Miroslav Vraneš EMC Technology Group miroslav.vranes@emc.com 1 Protecting Information Is a Business Decision Recovery point objective (RPO): How recent is the point in time for

More information

Eliminating End User and Application Downtime:

Eliminating End User and Application Downtime: Eliminating End User and Application Downtime: Architecting the Right Continuous Availability and Disaster Recovery Environment March 2010 Table of Contents Introduction 3 Where to Start 3 Moving to Continuous

More information

Using Live Sync to Support Disaster Recovery

Using Live Sync to Support Disaster Recovery Using Live Sync to Support Disaster Recovery SIMPANA VIRTUAL SERVER AGENT FOR VMWARE Live Sync uses backup data to create and maintain a warm disaster recovery site. With backup and replication from a

More information

Nutanix Tech Note. Configuration Best Practices for Nutanix Storage with VMware vsphere

Nutanix Tech Note. Configuration Best Practices for Nutanix Storage with VMware vsphere Nutanix Tech Note Configuration Best Practices for Nutanix Storage with VMware vsphere Nutanix Virtual Computing Platform is engineered from the ground up to provide enterprise-grade availability for critical

More information

Brian LaGoe, Systems Administrator Benjamin Jellema, Systems Administrator Eastern Michigan University

Brian LaGoe, Systems Administrator Benjamin Jellema, Systems Administrator Eastern Michigan University Brian LaGoe, Systems Administrator Benjamin Jellema, Systems Administrator Eastern Michigan University 1 Backup & Recovery Goals and Challenges Traditional/EMU s Old Environment Avamar Key Features EMU

More information

Nutanix Solution Note

Nutanix Solution Note Nutanix Solution Note Version 1.0 April 2015 2 Copyright 2015 Nutanix, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Nutanix is

More information

Softverski definirani data centri - 2. dio

Softverski definirani data centri - 2. dio Softverski definirani data centri - 2. dio Vmware NSX To Deliver a Software Defined Data Center Implementation Automated Operational Model Programmatically Create, Snapshot, Store, Move, Delete, Restore

More information

EMC MID-RANGE STORAGE AND THE MICROSOFT SQL SERVER I/O RELIABILITY PROGRAM

EMC MID-RANGE STORAGE AND THE MICROSOFT SQL SERVER I/O RELIABILITY PROGRAM White Paper EMC MID-RANGE STORAGE AND THE MICROSOFT SQL SERVER I/O RELIABILITY PROGRAM Abstract This white paper explains the integration of EMC Mid-range Storage arrays with the Microsoft SQL Server I/O

More information

DPAD Introduction. EMC Data Protection and Availability Division. Copyright 2011 EMC Corporation. All rights reserved.

DPAD Introduction. EMC Data Protection and Availability Division. Copyright 2011 EMC Corporation. All rights reserved. DPAD Introduction EMC Data Protection and Availability Division 1 EMC 的 備 份 與 回 復 的 解 決 方 案 Data Domain Avamar NetWorker Data Protection Advisor 2 EMC 雙 活 資 料 中 心 的 解 決 方 案 移 動 性 ( Mobility ) 可 用 性 ( Availability

More information

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery

More information

Implementing a Holistic BC/DR Strategy with VMware

Implementing a Holistic BC/DR Strategy with VMware Implementing a Holistic BC/DR Strategy with VMware VMware vforum, 2014 2014 VMware Inc. All rights reserved. What s on the agenda? Defining the problem Definitions VMware technologies that provide BC and

More information

Zerto Virtual Manager Administration Guide

Zerto Virtual Manager Administration Guide Zerto Virtual Manager Administration Guide AWS Environment ZVR-ADVA-4.0U2-01-23-07-15 Copyright 2015, Zerto Ltd. All rights reserved. Information in this document is subject to change without notice and

More information

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many

More information

DATA PROTECTION IN A VIRTUALIZED ENVIRONMENT - ISSUES AND SOLUTIONS

DATA PROTECTION IN A VIRTUALIZED ENVIRONMENT - ISSUES AND SOLUTIONS International Journal of Computer Science Engineering and Information Technology Research Vol.1, Issue.1 (2011) 1-9 TJPRC Pvt. Ltd., DATA PROTECTION IN A VIRTUALIZED ENVIRONMENT - ISSUES AND SOLUTIONS

More information

The Benefits of Virtualization for Your DR Plan

The Benefits of Virtualization for Your DR Plan E-Guide The Benefits of Virtualization for Your DR Plan Server virtualization is making a positive impact in the area of disaster recovery. Through virtualization, organizations can save money, as well

More information

EMC AVAMAR. a reason for Cloud. Deduplication backup software Replication for Disaster Recovery

EMC AVAMAR. a reason for Cloud. Deduplication backup software Replication for Disaster Recovery EMC AVAMAR a reason for Cloud Deduplication backup software Replication for Disaster Recovery Bogdan Stefanescu (Bogs) EMC Data Protection Solutions bogdan.stefanescu@emc.com 1 BUSINESS DRIVERS Increase

More information

Nutanix Tech Note. Data Protection and Disaster Recovery

Nutanix Tech Note. Data Protection and Disaster Recovery Nutanix Tech Note Data Protection and Disaster Recovery Nutanix Virtual Computing Platform is engineered from the ground-up to provide enterprise-grade availability for critical virtual machines and data.

More information

High Availability with Windows Server 2012 Release Candidate

High Availability with Windows Server 2012 Release Candidate High Availability with Windows Server 2012 Release Candidate Windows Server 2012 Release Candidate (RC) delivers innovative new capabilities that enable you to build dynamic storage and availability solutions

More information

ABSTRACT. February, 2014 EMC WHITE PAPER

ABSTRACT. February, 2014 EMC WHITE PAPER EMC APPSYNC SOLUTION FOR MANAGING PROTECTION OF MICROSOFT SQL SERVER SLA-DRIVEN, SELF-SERVICE CAPABILITIES FOR MAXIMIZING AND SIMPLIFYING DATA PROTECTION AND RECOVERABILITY ABSTRACT With Microsoft SQL

More information

EMC SOLUTIONS TO OPTIMIZE EMR INFRASTRUCTURE FOR CERNER

EMC SOLUTIONS TO OPTIMIZE EMR INFRASTRUCTURE FOR CERNER EMC SOLUTIONS TO OPTIMIZE EMR INFRASTRUCTURE FOR CERNER ESSENTIALS Mitigate project risk with the proven leader, many of largest EHR sites run on EMC storage Reduce overall storage costs with automated

More information

VMware vsphere Data Protection 6.0

VMware vsphere Data Protection 6.0 VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application

More information

Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric

Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric 2001 San Diego Gas and Electric. All copyright and trademark rights reserved. Importance

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Veritas InfoScale Availability

Veritas InfoScale Availability Veritas InfoScale Availability Delivers high availability and disaster recovery for your critical applications Overview protects your most important applications from planned and unplanned downtime. InfoScale

More information

DESIGN AND IMPLEMENTATION GUIDE EMC DATA PROTECTION OPTION NS FOR VSPEXX PRIVATE CLOUD EMC VSPEX December 2014

DESIGN AND IMPLEMENTATION GUIDE EMC DATA PROTECTION OPTION NS FOR VSPEXX PRIVATE CLOUD EMC VSPEX December 2014 DESIGN AND IMPLEMENTATION GUIDE EMC DATA PROTECTION OPTIONS FOR VSPEX PRIVATE CLOUD EMC VSPEX December 2014 Copyright 2013-2014 EMC Corporation. All rights reserved. Published in USA. Published December,

More information

DATA PROTECTION CONSIDERATIONS FOR VBLOCK INFRASTRUCTURE PLATFORMS

DATA PROTECTION CONSIDERATIONS FOR VBLOCK INFRASTRUCTURE PLATFORMS VCE Word Template Table of Contents www.vce.com DATA PROTECTION CONSIDERATIONS FOR VBLOCK INFRASTRUCTURE PLATFORMS March 2012 1 Contents Executive Summary... 3 What is Data Protection?... 3 Industry Data

More information

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of

More information

ADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3

ADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3 ADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT Overview EXHIBIT E to Amendment No. 60 The Disaster Recovery (DR) Services, a Tier-Level DR Solution, addresses the

More information

High Availability & Disaster Recovery Development Project. Concepts, Design and Implementation

High Availability & Disaster Recovery Development Project. Concepts, Design and Implementation High Availability & Disaster Recovery Development Project Concepts, Design and Implementation High Availability & Disaster Recovery Development Project CONCEPTS Who: Schmooze Com Inc, maintainers, core

More information

Solution brief: Modernized data protection with Veeam and HP Storage

Solution brief: Modernized data protection with Veeam and HP Storage Solution brief: Modernized data protection with Veeam and HP Storage Modern Data Protection Built for Virtualization November, 2013 Contents Executive summary....3 Key points...3 Virtual machine data protection

More information

VMware vsphere Data Protection

VMware vsphere Data Protection FREQUENTLY ASKED QUESTIONS VMware vsphere Data Protection vsphere Data Protection Advanced Overview Q. What is VMware vsphere Data Protection Advanced? A. VMware vsphere Data Protection Advanced is a backup

More information

efficient protection, and impact-less!!

efficient protection, and impact-less!! Converged, Hyper- or Flash Sample photo. Replace if desired. efficient protection, and impact-less!! Bogdan Stefanescu (..aka Bogs) EMC Data Protection Solutions bogdan.stefanescu@emc.com 1 ALL DATA HAS

More information

BACKUP AND RECOVERY FOR MICROSOFT-BASED PRIVATE CLOUDS LEVERAGING THE EMC DATA PROTECTION SUITE

BACKUP AND RECOVERY FOR MICROSOFT-BASED PRIVATE CLOUDS LEVERAGING THE EMC DATA PROTECTION SUITE BACKUP AND RECOVERY FOR MICROSOFT-BASED PRIVATE CLOUDS LEVERAGING THE EMC DATA PROTECTION SUITE A Detailed Review ABSTRACT This white paper highlights how IT environments which are increasingly implementing

More information

Turbo Charge Your Data Protection Strategy

Turbo Charge Your Data Protection Strategy Turbo Charge Your Data Protection Strategy Data protection for the hybrid cloud 1 WAVES OF CHANGE! Data GROWTH User EXPECTATIONS Do It YOURSELF Can t Keep Up Reliability and Visibility New Choices and

More information

Microsoft Exchange 2013 on VMware Availability and Recovery Options

Microsoft Exchange 2013 on VMware Availability and Recovery Options This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware

More information

SQL Server Storage Best Practice Discussion Dell EqualLogic

SQL Server Storage Best Practice Discussion Dell EqualLogic SQL Server Storage Best Practice Discussion Dell EqualLogic What s keeping you up at night? Managing the demands of a SQL environment Risk Cost Data loss Application unavailability Data growth SQL Server

More information

Microsoft SQL Server on VMware Availability and Recovery Options

Microsoft SQL Server on VMware Availability and Recovery Options This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware

More information

EMC NETWORKER SNAPSHOT MANAGEMENT

EMC NETWORKER SNAPSHOT MANAGEMENT White Paper Abstract This white paper describes the benefits of NetWorker Snapshot Management for EMC Arrays. It also explains the value of using EMC NetWorker for snapshots and backup. June 2013 Copyright

More information

HP StorageWorks Data Protection Strategy brief

HP StorageWorks Data Protection Strategy brief HP StorageWorks Data Protection Strategy brief Your business depends on IT more than ever before. The availability of key application services and information is critical to maintain business processes,

More information

Getting the Most Out of Virtualization of Your Progress OpenEdge Environment. Libor Laubacher Principal Technical Support Engineer 8.10.

Getting the Most Out of Virtualization of Your Progress OpenEdge Environment. Libor Laubacher Principal Technical Support Engineer 8.10. Getting the Most Out of Virtualization of Your Progress OpenEdge Environment Libor Laubacher Principal Technical Support Engineer 8.10.2013 Agenda Virtualization Terms, benefits, vendors, supportability,

More information

Introduction. Setup of Exchange in a VM. VMware Infrastructure

Introduction. Setup of Exchange in a VM. VMware Infrastructure Introduction VMware Infrastructure is deployed in data centers for deploying mission critical applications. Deployment of Microsoft Exchange is a very important task for the IT staff. Email system is an

More information

EMC NETWORKER AND DATADOMAIN

EMC NETWORKER AND DATADOMAIN EMC NETWORKER AND DATADOMAIN Capabilities, options and news Madis Pärn Senior Technology Consultant EMC madis.parn@emc.com 1 IT Pressures 2009 0.8 Zettabytes 2020 35.2 Zettabytes DATA DELUGE BUDGET DILEMMA

More information

Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011

Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Executive Summary Large enterprise Hyper-V deployments with a large number

More information

TRANSFORMING DATA PROTECTION

TRANSFORMING DATA PROTECTION TRANSFORMING DATA PROTECTION Moving from Reactive to Proactive Mark Galpin 1 Our Protection Strategy: Best Of Breed Performance LEADER HIGH-END STORAGE VMAX Low Service Level LEADER SCALE-OUT NAS STORAGE

More information

Server and Storage Virtualization with IP Storage. David Dale, NetApp

Server and Storage Virtualization with IP Storage. David Dale, NetApp Server and Storage Virtualization with IP Storage David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this

More information

Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve

Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while

More information

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

CA ARCserve Replication and High Availability Deployment Options for Hyper-V Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization

More information

Symantec Cluster Server powered by Veritas

Symantec Cluster Server powered by Veritas Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

THE VIRTUAL DATA CENTER OF THE FUTURE

THE VIRTUAL DATA CENTER OF THE FUTURE THE VIRTUAL DATA CENTER OF THE FUTURE An Introduction to VMAX and VPLEX Ron Davidi EMC Israel 1 2 EMC Petabyte Club Customers with > 1 PB EMC storage 1,000 10 2002 2003 2004 2005 2006 2007 2008 2009 2010

More information

Microsoft SMB File Sharing Best Practices Guide

Microsoft SMB File Sharing Best Practices Guide Technical White Paper Microsoft SMB File Sharing Best Practices Guide Tintri VMstore, Microsoft SMB 3.0 Protocol, and VMware 6.x Author: Neil Glick Version 1.0 06/15/2016 @tintri www.tintri.com Contents

More information

EMC RECOVERPOINT FAMILY

EMC RECOVERPOINT FAMILY EMC RECOVERPOINT FAMILY Cost-effective local and remote data protection and disaster recovery solution ESSENTIALS Maximize application data protection and disaster recovery Protect business applications

More information

BUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g

BUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g BUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g ENABLED BY EMC VMAX 10K AND EMC RECOVERPOINT Technical Presentation EMC Solutions Group 1 Agenda Business case Symmetrix VMAX 10K overview RecoverPoint

More information

E20-005. http://www.gratisexam.com/ Number: E20-005 Passing Score: 800 Time Limit: 120 min

E20-005. http://www.gratisexam.com/ Number: E20-005 Passing Score: 800 Time Limit: 120 min E20-005 Number: E20-005 Passing Score: 800 Time Limit: 120 min http://www.gratisexam.com/ www.yesuse.com Exam A QUESTION 1 Which statement defines retention period? A. Amount of time available for restoring

More information

OmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman

OmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman OmniCube SimpliVity OmniCube and Multi Federation ROBO Reference Architecture White Paper Authors: Bob Gropman Date: April 13, 2015 SimpliVity and OmniCube are trademarks of SimpliVity Corporation. All

More information

TOP FIVE REASONS WHY CUSTOMERS USE EMC AND VMWARE TO VIRTUALIZE ORACLE ENVIRONMENTS

TOP FIVE REASONS WHY CUSTOMERS USE EMC AND VMWARE TO VIRTUALIZE ORACLE ENVIRONMENTS TOP FIVE REASONS WHY CUSTOMERS USE EMC AND VMWARE TO VIRTUALIZE ORACLE ENVIRONMENTS Leverage EMC and VMware To Improve The Return On Your Oracle Investment ESSENTIALS Better Performance At Lower Cost Run

More information

MaxDeploy Hyper- Converged Reference Architecture Solution Brief

MaxDeploy Hyper- Converged Reference Architecture Solution Brief MaxDeploy Hyper- Converged Reference Architecture Solution Brief MaxDeploy Reference Architecture solutions are configured and tested for support with Maxta software- defined storage and with industry

More information

MAKING YOUR VIRTUAL INFRASTUCTURE NON-STOP Making availability efficient with Veritas products

MAKING YOUR VIRTUAL INFRASTUCTURE NON-STOP Making availability efficient with Veritas products TECHNOLOGY REVIEW MAKING YOUR VIRTUAL INFRASTUCTURE NON-STOP Making availability efficient with Veritas products AUGUST 2015 All businesses have a core set of applications and services that are critical

More information

EMC RecoverPoint Continuous Data Protection and Replication Solution

EMC RecoverPoint Continuous Data Protection and Replication Solution EMC RecoverPoint Continuous Data Protection and Replication Solution Simple. Efficient. Consistent Dejan Živanović EMC Technology Solutions Group SEE Presales Manager Dejan.Zivanovic@emc.com 1 Real Time

More information

EMC VPLEX FAMILY. Transparent information mobility within, across, and between data centers ESSENTIALS A STORAGE PLATFORM FOR THE PRIVATE CLOUD

EMC VPLEX FAMILY. Transparent information mobility within, across, and between data centers ESSENTIALS A STORAGE PLATFORM FOR THE PRIVATE CLOUD EMC VPLEX FAMILY Transparent information mobility within, across, and between data centers A STORAGE PLATFORM FOR THE PRIVATE CLOUD In the past, users have relied on traditional physical storage to meet

More information

Understanding EMC Avamar with EMC Data Protection Advisor

Understanding EMC Avamar with EMC Data Protection Advisor Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection

More information

W H I T E P A P E R C o n t i n u o u s R e p l i c a t i o n f o r B u s i n e s s - C r i t i c a l A p p l i c a t i o n s

W H I T E P A P E R C o n t i n u o u s R e p l i c a t i o n f o r B u s i n e s s - C r i t i c a l A p p l i c a t i o n s Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R C o n t i n u o u s R e p l i c a t i o n f o r B u s i n e s s - C r i t i c

More information

www.rackwareinc.com RackWare Solutions Disaster Recovery

www.rackwareinc.com RackWare Solutions Disaster Recovery RackWare Solutions Disaster Recovery RackWare Solutions Disaster Recovery Overview Business Continuance via Disaster Recovery is an essential element of IT and takes on many forms. The high end consists

More information

Building the Virtual Information Infrastructure

Building the Virtual Information Infrastructure Technology Concepts and Business Considerations Abstract A virtual information infrastructure allows organizations to make the most of their data center environment by sharing computing, network, and storage

More information

Take Advantage of Data De-duplication for VMware Backup

Take Advantage of Data De-duplication for VMware Backup Take Advantage of Data De-duplication for VMware Backup Lauren Whitehouse Analyst, Enterprise Strategy Group Tom Martin Avamar Product Management, EMC Mike Zolla Avamar Chief Architect, EMC 1 EMC Avamar

More information

VMware vsphere Data Protection 6.1

VMware vsphere Data Protection 6.1 VMware vsphere Data Protection 6.1 Technical Overview Revised August 10, 2015 Contents Introduction... 3 Architecture... 3 Deployment and Configuration... 5 Backup... 6 Application Backup... 6 Backup Data

More information

Solution Overview VMWARE PROTECTION WITH EMC NETWORKER 8.2. White Paper

Solution Overview VMWARE PROTECTION WITH EMC NETWORKER 8.2. White Paper White Paper VMWARE PROTECTION WITH EMC NETWORKER 8.2 Solution Overview Abstract This white paper describes the integration of EMC NetWorker with VMware vcenter. It also includes details on the NetWorker

More information

Enterprise Backup and Restore technology and solutions

Enterprise Backup and Restore technology and solutions Enterprise Backup and Restore technology and solutions LESSON VII Veselin Petrunov Backup and Restore team / Deep Technical Support HP Bulgaria Global Delivery Hub Global Operations Center November, 2013

More information

Dell PowerVault DL2200 & BE 2010 Power Suite. Owen Que. Channel Systems Consultant Dell

Dell PowerVault DL2200 & BE 2010 Power Suite. Owen Que. Channel Systems Consultant Dell Dell PowerVault DL2200 & BE 2010 Power Suite Owen Que Channel Systems Consultant Dell Dell PowerVault DL2200 powered by Symantec Backup Exec 2010 1 Replace Tape with Deduplication Customer Storage Challenge

More information

EMC DATA PROTECTION. Backup ed Archivio su cui fare affidamento

EMC DATA PROTECTION. Backup ed Archivio su cui fare affidamento EMC DATA PROTECTION Backup ed Archivio su cui fare affidamento 1 Challenges with Traditional Tape Tightening backup windows Lengthy restores Reliability, security and management issues Inability to meet

More information

SAP Solutions on VMware Business Continuance Protecting Against Unplanned Downtime

SAP Solutions on VMware Business Continuance Protecting Against Unplanned Downtime of SAP Solutions on Vmware vsphere SAP Solutions on VMware Protecting Against Unplanned Downtime This product is protected by U.S. and international copyright and intellectual property laws. This product

More information

Understanding EMC Avamar with EMC Data Protection Advisor

Understanding EMC Avamar with EMC Data Protection Advisor Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features that reduce the complexity of managing data protection

More information

High-Availability Fault Tolerant Computing for Remote and Branch Offices HA/FT solutions for Cisco UCS E-Series servers and VMware vsphere

High-Availability Fault Tolerant Computing for Remote and Branch Offices HA/FT solutions for Cisco UCS E-Series servers and VMware vsphere Table of Contents UCS E-Series Availability and Fault Tolerance... 3 Solid hardware... 3 Consistent management... 3 VMware vsphere HA and FT... 3 Storage High Availability and Fault Tolerance... 4 Quick-start

More information

Backing Up the CTERA Portal Using Veeam Backup & Replication. CTERA Portal Datacenter Edition. May 2014 Version 4.0

Backing Up the CTERA Portal Using Veeam Backup & Replication. CTERA Portal Datacenter Edition. May 2014 Version 4.0 Backing Up the CTERA Portal Using Veeam Backup & Replication CTERA Portal Datacenter Edition May 2014 Version 4.0 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may

More information

Backup and Recovery 1

Backup and Recovery 1 Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup

More information

EMC: The Virtual Data Center

EMC: The Virtual Data Center EMC: The Virtual Data Center Dejan Živanovi EMC Technology Solution Group Sr. Technology Consultant High-End platforms & Business Continuity 1 Business Challenges Data growing at 70% annually 80% are files

More information

Native Data Protection with SimpliVity. Solution Brief

Native Data Protection with SimpliVity. Solution Brief Native Data Protection with SimpliVity Solution Brief SimpliVity is the market-leading hyperconverged infrastructure that delivers native data protection. A fundamental requirement of hyperconvergence,

More information

A New Strategy for Data Management in a Time of Hyper Change

A New Strategy for Data Management in a Time of Hyper Change 1 A New Strategy for Data Management in a Time of Hyper Change 2 Everyone Claims to Do Data Protection How Do Enterprises Protect Data Today? In Medium to Large Enterprises, traditional backup is today

More information

Availability Guide for Deploying SQL Server on VMware vsphere. August 2009

Availability Guide for Deploying SQL Server on VMware vsphere. August 2009 Availability Guide for Deploying SQL Server on VMware vsphere August 2009 Contents Introduction...1 SQL Server 2008 with vsphere and VMware HA/DRS...2 Log Shipping Availability Option...4 Database Mirroring...

More information