Delivering Fat-Free CDP with Delphix. Using Database Virtualization for Continuous Data Protection without Storage Bloat.

Size: px
Start display at page:

Download "Delivering Fat-Free CDP with Delphix. Using Database Virtualization for Continuous Data Protection without Storage Bloat."

Transcription

1 Delivering Fat-Free CDP with Delphix Using Database Virtualization for Continuous Data Protection without Storage Bloat White Paper

2 Delivering Fat- Free CDP with Delphix Revision: June 2012 You can find the most up- to- date technical documentation at: The Delphix Web site also provides the latest product updates. If you have comments about this documentation, submit your feedback to: 2012 Delphix Corp. All rights reserved. The Delphix logo and design are registered trademarks of Delphix Corp. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Delphix Corp. 275 Middlefield Road, Suite 50 Menlo Park, CA

3 Enterprise Architecture Issues Global organizations have significantly digitized their business processes and information over the past decade. Today, applications that run on databases touch nearly every Global 1000 process and interaction with employees, partners, and customers. To ensure that a digital business can maintain operations and up time, firms have spent billions building out enterprise IT architectures. A primary function of enterprise IT is safeguarding and ensuring the availability of data the most valuable of which is often stored in databases. Without a strong recovery strategy, a large organization would grind to a halt following any significant outage or disaster. To ensure that never happens, firms have implemented extensive disaster recovery and backup implementations. While these solutions can synchronously replicate up- to- date information to remote locations, this approach on its own can also backfire. If a critical database is corrupted, business processes such as supply chain management or order processing can stop completely. Even worse, in many cases the very solution for protecting information the disaster recovery systems can increase the damage by replicating corrupted data to backups and failover systems. A recent example of this cascading failure occurred at Salesforce.com in August Despite using industry best practices and state of the art failover and backup technology, Salesforce.com suffered a major outage due to a corrupted database. Salesforce.com s storage systems replicated the corruption to their alternate datacenter, so there was no fast recovery mechanism in place. There are several key lessons in the Salesforce.com outage. First, replication strategies designed to protect an organization s operations can become a weapon instead of a shield. Salesforce.com is hardly unique; the problem of storage technology propagating corrupted data across the enterprise is very common among large organizations. Second, as organizations scale up their digital operations, the very nature of that scale changes the notion of an edge case. Put differently, a one in a million chance of failure is a real problem if you process a billion transactions a month. Over time and in large environments, edge case failures are a certainty, and it is imperative that IT organizations put protective measures in place ahead of such failures. Third, synchronous replication technologies do not provide sufficient coverage. Any organization that has had to resort to restore from tapes can attest to the cost, pain, and time of trying to recover from unreliable and antiquated backup mechanisms. Existing methods for data protection are not sufficient in a modern environment at today s scale. Outages will become more frequent and more costly as digital businesses continue to scale. 3

4 Outage Costs The report, Trends in IT Value, by The Standish Group provides useful estimates of the costs of system outage for key business processes. At one end of the spectrum, The Standish Group estimates that each minute of downtime in a securities trading operation costs $73,000. That translates to $4.4 million per hour and $105 million per day of outage costs. At the other end of the spectrum, an outage in an enterprise system is estimated to cost $1,900 per minute, i.e. $114,000 per hour and $2.7 million per day. This amount is smaller but still significant. In between those extremes are the key applications that power most large organizations: ERP ($888,000 per hour of outage), order processing ($798,000 per hour of outage), and supply chain ($690,000 per hour of outage). Source: Trends In IT Value Report (Standish Group) For a large investment bank, the costs of a major outage can reach hundreds of millions of dollars over a few days. Traditional Data Protection Solutions Production Traditional data protection solutions for disaster recovery include short- term rollback technologies and longer- term backup/restore technologies. Each addresses a piece of the overall protection problem, but neither can fully prevent dramatic outage costs (e.g. due to complex, corruption- triggered events). In addition, each brings significant storage costs via storage bloat. These Disaster Recovery increased costs can limit 4 Hour Flashback (Continuous) On production, limited flexibility enterprise- wide deployment. SRDF 5 Days Business Continuance Volumes (Hourly/Daily) Susceptible to array errors, patches While many organizations have short- term rollback options like Oracle Flashback, these tend only to work for a short window of time on production systems often as little as 4 hours. The use case for technologies such as Flashback is immediate rollback of user error (e.g. a DBA accidentally drops a table, which breaks referential integrity and forces an application error). Short- term rollback technologies usually do not retain days or weeks of data and cannot help if the production database itself is corrupted and unavailable due to an event like a problematic database software patch. Enterprise storage arrays often provide less granular coverage through full copies of storage volumes, but the recovery window typically only covers a few days due to the cost of full system copies. Snapshots can be more space efficient and provide a longer window of FAST RECOVERY 4

5 coverage, but often come at the impact of production performance a tradeoff most companies are not willing to make. Production In addition to primary recovery strategies, most organizations also have longer- term disk and tape backup options, including offsite tape archives. While these will likely provide the necessary coverage window, the process of setting up a restore volume, restoring data via backup software, applying logs Disaster Recovery to get to a specific point in 4 Hour Flashback (Continuous) On production, limited flexibility time, and configuring database servers can dramatically 5 Days Business Continuance Volumes (Hourly/Daily) SRDF Susceptible to array errors, patches increase the duration and cost of downtime. FAST RECOVERY Disk and Tape Backup, Archive 1-2 weeks (Daily) Even worse, the time to Requires lengthy restore, no granularity retrieve offsite tapes alone can Months to Years be counted in days or even Tape shipping time, unreliable restores weeks adding insult to injury. At a large organization, a week of outage in a key system can mean hundreds of millions of dollars lost and damaged credibility for IT and the business itself. While traditional options for near- term and long- term data recovery each serve a purpose, they are of limited value in a complex database failure. Data is either missing or cannot be recovered within an acceptable period of time. While a significant outage may be an edge case, the potential cost is so large that protective mechanisms need to be put in place. SLOW RESTORE Delphix Virtualization Creates a Bloat-Free Data Recovery Layer 5 Production Delphix provides a powerful addition to existing replication, backup, and recovery solutions. By virtualizing copies of production databases and managing all updates to these copies, Delphix brings extended TimeFlow SRDF Fast: quickly provision parallel firefighting environments Complete: continuous granularity with log shipping (Superior RPO) Extended: 30:1 efficiency enables long retention periods Disaster Recovery Disk and Tape Backup, Archive 4 Hour Flashback (Continuous) On production, limited flexibility 5 Days Business Continuance Volumes (Hourly/Daily) Susceptible to array errors, patches 1-2 weeks (Daily) Requires lengthy restore, no granularity Months to Years Tape shipping time, unreliable restores FAST RECOVERY SLOW RESTORE and flexible firefighting capabilities to database outages generated by complex events (e.g. late identification of corruption). Moreover, Delphix does this without increasing the storage footprint.

6 Delphix enables DBAs to instantly roll back a virtual copy of a corrupted production database to the last known good state. At the same time, Delphix can retain a very long tail of information, so that the customer can perform this rollback across an extended period of time. Virtual databases can be opened quickly and easily by database teams in a few minutes and as little as three clicks without the need to wait for lengthy restores to a new target volume. As a result, a business gains both the instant, granular recovery capabilities of rollback technologies and the long- term coverage of a tape based backup/recovery system while eliminating the need to wait for prolonged restores. With its patented TimeFlow technology, Delphix retains all updates to copies of production databases, down to the second. A Delphix user can pick any point in time in the life of a protected database and instantly open a virtual copy of that database at that point in time. Users can even set specific transaction boundaries, such as a specific SCN for an Oracle database. With its unique ability to compress and eliminate redundancy in database storage, Delphix can deliver large reduction ratios as high as 30:1, so a business can store 30 days worth of recoverability in the space of a single copy. Traditional continuous data protection (CDP) technologies, in contrast, generally require enormous amounts of storage as much as 7x the original production copy for a similar window of recoverability. As a result, the Delphix efficiency advantage enables far longer retention periods to recover to a known good state following an outage or disaster. In the Salesforce.com example above, Delphix could have dramatically minimized the effects of the corrupted database outage. Upon realizing that the corrupted data blocks had been propagated to the recovery site, a Delphix admin could have simply moved the Delphix TimeFlow slider back until the last known good state in time. Parallel Firefighting Environments to Determine Last Good State 11:00AM If a previous good state in time is unknown, a Delphix admin can open multiple parallel firefighting environments at different points in time simultaneously. With database virtualization, Delphix can open up to 35 12:00PM 1:00PM 2:00PM 3:00PM 4:00PM No Corruption No Corruption! Corruption! 2. Quickly Open Parallel Firefighting Sandboxes for Troubleshooting 1:21:05PM 1. Problem First Detected copies of a database at different points in time, all from a single, shared data footprint. Virtual databases (VDBs) look and behave like normal, full read/write databases, with performance parity to physical database copies ID root cause and determine resolution

7 VDBs can be used as failover databases or can be recovered to a physical target using the Delphix V2P feature. As a result, Delphix acts as a flexible safety net for large organizations that require critical databases to be running and available at all times. Delphix can be deployed as an additional protective measure for enterprise databases, and does not impact other backup technologies or solutions. Delphix installs as a virtual appliance in a private cloud in minutes and connects to databases through standard APIs. For instance, with Oracle databases, Delphix maintains synchronization with an Oracle database through the RMAN API, and does not interfere with RMAN processes used by backup solutions (Delphix is an Oracle Gold- Certified Partner). Conclusion The scale of modern business operations has greatly increased the risk of system outage. Simply put, the effective likelihood of a failure due to outage or error is much greater when transactions occur at the rate of millions instead of thousands. For global organizations, the cost of downtime is simply too great; traditional recovery solutions are not comprehensive enough on their own. Delphix adds a powerful extended recovery layer to global IT operations. By virtualizing the information in production databases, Delphix can prevent tens to hundreds of millions of dollars in downtime costs from a single outage incident. Organizations looking to increase agility by rolling out new applications and technologies should evaluate Delphix as a fundamental layer in their data protection architecture. Delphix provides four significant, differentiated benefits to enterprise customers: Ability to quickly provision multiple parallel firefighting environments simultaneously Full granularity with log synchronization and application for superior RPO (recovery point objective) Superior RTO (recovery time objective) with the ability to open VDBs in minutes Ability to maintain long retention windows with 30:1 TimeFlow reduction ratios Delphix Corp. All rights reserved. 7

TOP 10 EVALUATION CRITERIA FOR COPY DATA MANAGEMENT & DATA VIRTUALIZATION WHITE PAPER

TOP 10 EVALUATION CRITERIA FOR COPY DATA MANAGEMENT & DATA VIRTUALIZATION WHITE PAPER TOP 10 EVALUATION CRITERIA FOR COPY DATA MANAGEMENT & DATA VIRTUALIZATION Data cloning technology has advanced significantly with data virtualization solutions such as Copy Data Management (CDM) and Database

More information

Delphix Agile Data Platform Technical White Paper

Delphix Agile Data Platform Technical White Paper Delphix Agile Data Platform Technical White Paper Delphix Agile Data Platform Overview Revision: 1 July 2014 You can find the most up- to- date technical documentation at: http://www.delphix.com/support

More information

DATABASE VIRTUALIZATION AND INSTANT CLONING WHITE PAPER

DATABASE VIRTUALIZATION AND INSTANT CLONING WHITE PAPER DATABASE VIRTUALIZATION AND INSTANT CLONING TABLE OF CONTENTS Brief...3 Introduction...3 Solutions...4 Technologies....5 Database Virtualization...7 Database Virtualization Examples...9 Summary....9 Appendix...

More information

Increased Security, Greater Agility, Lower Costs for AWS DELPHIX FOR AMAZON WEB SERVICES WHITE PAPER

Increased Security, Greater Agility, Lower Costs for AWS DELPHIX FOR AMAZON WEB SERVICES WHITE PAPER Increased Security, Greater Agility, Lower Costs for AWS DELPHIX FOR AMAZON WEB SERVICES TABLE OF CONTENTS Introduction... 3 Overview: Delphix Virtual Data Platform... 4 Delphix for AWS... 5 Decrease the

More information

Improving Microsoft SQL Server Recovery with EMC NetWorker and EMC RecoverPoint

Improving Microsoft SQL Server Recovery with EMC NetWorker and EMC RecoverPoint Improving Microsoft SQL Server Recovery with EMC NetWorker and EMC RecoverPoint Applied Technology Abstract This white paper covers how EMC NetWorker and EMC NetWorker modules can be used effectively in

More information

Advanced Recovery & Continuity Appliance (ARCA) features...

Advanced Recovery & Continuity Appliance (ARCA) features... The Zenith Advanced Recovery and Continuity Appliance (ARCA) is a network-attached storage device for Windows Servers that comes preloaded with all backup, recovery and virtualization software it needs

More information

Disaster Recovery for Oracle Database

Disaster Recovery for Oracle Database Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches

More information

The ABCs of DaaS. Enabling Data as a Service for Application Delivery, Business Intelligence, and Compliance Reporting.

The ABCs of DaaS. Enabling Data as a Service for Application Delivery, Business Intelligence, and Compliance Reporting. The ABCs of DaaS Enabling Data as a Service for Application Delivery, Business Intelligence, and Compliance Reporting White Paper The ABCs of DaaS Enabling Data as a Service Application Delivery, Business

More information

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss

More information

EMC PROTECTPOINT. A Detailed Review ABSTRACT

EMC PROTECTPOINT. A Detailed Review ABSTRACT EMC PROTECTPOINT A Detailed Review ABSTRACT This white paper explains how EMC is solving the challenge of ever tightening protection SLAs against the backdrop of exponentially growing data sets. EMC ProtectPoint

More information

EMC RECOVERPOINT: BUSINESS CONTINUITY FOR SAP ENVIRONMENTS ACROSS DISTANCE

EMC RECOVERPOINT: BUSINESS CONTINUITY FOR SAP ENVIRONMENTS ACROSS DISTANCE White Paper EMC RECOVERPOINT: BUSINESS CONTINUITY FOR SAP ENVIRONMENTS ACROSS DISTANCE Applied Technology Abstract Business continuity is a critical component of any enterprise data protection strategy

More information

Virtual Infrastructure Security

Virtual Infrastructure Security Virtual Infrastructure Security 2 The virtual server is a perfect alternative to using multiple physical servers: several virtual servers are hosted on one physical server and each of them functions both

More information

EMC NETWORKER SNAPSHOT MANAGEMENT

EMC NETWORKER SNAPSHOT MANAGEMENT White Paper Abstract This white paper describes the benefits of NetWorker Snapshot Management for EMC Arrays. It also explains the value of using EMC NetWorker for snapshots and backup. June 2013 Copyright

More information

Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper

Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper bex30102507wpor Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies Introduction Are you a database administrator

More information

Managing Big Data Exhaust. Controlling Big Application Data Growth for ERP, MDM, and Other Key Enterprise Functions.

Managing Big Data Exhaust. Controlling Big Application Data Growth for ERP, MDM, and Other Key Enterprise Functions. Managing Big Data Exhaust Controlling Big Application Data Growth for ERP, MDM, and Other Key Enterprise Functions Solution Brief Managing Big Data Exhaust Revision: 2 August 2012 You can find the most

More information

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the

More information

Dell Data Protection Point of View: Recover Everything. Every time. On time.

Dell Data Protection Point of View: Recover Everything. Every time. On time. Dell Data Protection Point of View: Recover Everything. Every time. On time. Dell Data Protection White Paper May 2013 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL

More information

Backup Exec 2014: Protecting Microsoft SQL

Backup Exec 2014: Protecting Microsoft SQL TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SQL........................................ Backup Exec 2014: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed

More information

Restoration Technologies. Mike Fishman / EMC Corp.

Restoration Technologies. Mike Fishman / EMC Corp. Trends PRESENTATION in Data TITLE Protection GOES HERE and Restoration Technologies Mike Fishman / EMC Corp. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless

More information

Veritas Backup Exec 15: Protecting Microsoft SQL

Veritas Backup Exec 15: Protecting Microsoft SQL Veritas Backup Exec 15: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed to introduce IT professionals to key technologies and technical concepts that are associated

More information

NSI Solutions with Microsoft VSS

NSI Solutions with Microsoft VSS Published: March 2004 Abstract With the introduction of Volume Shadow Copy Service (VSS) in Microsoft Windows Server 2003 and Windows Storage Server 2003 and the strength of NSI Software Double-Take you

More information

The Case for Continuous Data Protection

The Case for Continuous Data Protection The Case for Continuous Data Protection This paper will discuss the benefits of using CDP-based solutions, particularly in place of traditional, tape-based backup products that currently dominate the SMB

More information

Backup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland

Backup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland Backup and Recovery Solutions for Exadata Cor Beumer Storage Sales Specialist Oracle Nederland Recovery Point and Recovery Time Wks Days Hrs Mins Secs Secs Mins Hrs Days Wks Data Loss (Recovery Point Objective)

More information

Redefining Oracle Database Management

Redefining Oracle Database Management Redefining Oracle Database Management Actifio PAS Specification A Single Solution for Backup, Recovery, Disaster Recovery, Business Continuity and Rapid Application Development for Oracle. MAY, 2013 Contents

More information

Backup and Recovery Solutions for Exadata. Ľubomír Vaňo Principal Sales Consultant

Backup and Recovery Solutions for Exadata. Ľubomír Vaňo Principal Sales Consultant Backup and Recovery Solutions for Exadata Ľubomír Vaňo Principal Sales Consultant Fundamental Backup and Recovery Data doesn t exist in most organizations until the rule of 3 is complete: Different Media

More information

Breaking the Disaster Recovery Mold

Breaking the Disaster Recovery Mold Breaking the Disaster Recovery Mold John Newsom CEO Quorum, Inc. IT Spending Priorities 2014 Midsized organizations need the same kind of data protection capabilities that enterprises have demanded for

More information

Business-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance

Business-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance Intel Xeon processor Business-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance The easy solution for backup to disk with deduplication Intel Inside. Powerful Solution Outside. If

More information

Unitrends Integrated Backup and Recovery of Microsoft SQL Server Environments

Unitrends Integrated Backup and Recovery of Microsoft SQL Server Environments Solution Brief Unitrends Integrated Backup and Recovery of Microsoft SQL Server Environments Summary Your business infrastructure relies on your Microsoft SQL Servers. Your business no matter the size

More information

Archiving, Backup, and Recovery for Complete the Promise of Virtualization

Archiving, Backup, and Recovery for Complete the Promise of Virtualization Archiving, Backup, and Recovery for Complete the Promise of Virtualization Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that

More information

Implementing Disaster Recovery? At What Cost?

Implementing Disaster Recovery? At What Cost? Implementing Disaster Recovery? At What Cost? Whitepaper Viktor Babkov Technical Director Business Continuity Copyright Business Continuity May 2010 In today s environment, minimizing IT downtime has become

More information

Backup Exec 15: Protecting Microsoft SQL

Backup Exec 15: Protecting Microsoft SQL TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT SQL........................................ Backup Exec 15: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed

More information

Delphix Modernization Engine REDUCING THE BURDEN OF REGULATION, LEGAL HOLD, AND DISCOVERY USING DELPHIX LIVE ARCHIVE WHITE PAPER

Delphix Modernization Engine REDUCING THE BURDEN OF REGULATION, LEGAL HOLD, AND DISCOVERY USING DELPHIX LIVE ARCHIVE WHITE PAPER Delphix Modernization Engine REDUCING THE BURDEN OF REGULATION, LEGAL HOLD, AND DISCOVERY USING DELPHIX LIVE ARCHIVE TABLE OF CONTENTS Introduction...3 Common Terms to Which We Refer....4 What is Live

More information

Always On: Unitrends DRaaS Disaster Recovery Services

Always On: Unitrends DRaaS Disaster Recovery Services Solution Brief Always On: Unitrends DRaaS Disaster Recovery Services What keeps you up at night? Are you thinking about what would happen to your business in the event of a disaster? Are you worrying about

More information

Simple and Granular Data Protection for Microsoft SQL Server

Simple and Granular Data Protection for Microsoft SQL Server Simple and Granular Data Protection for Microsoft SQL Server Simple and Granular Data Protection for Microsoft SQL Server Executive Summary In enterprise environments, many mission critical workloads are

More information

Manufacturers Need More Than Just Backup... But they don t need to spend more! axcient.com

Manufacturers Need More Than Just Backup... But they don t need to spend more! axcient.com Manufacturers Need More Than Just Backup... But they don t need to spend more! axcient.com Introduction Manufacturers need to keep their businesses up and running more than ever now. Automating work processes

More information

SQL Server Backups vs. Replays: A Comparison. Tech Tip

SQL Server Backups vs. Replays: A Comparison. Tech Tip SQL Server Backups vs. Replays: A Comparison Tech Tip Document revision Date Revision Comments 08/30/2010 A Initial Draft 01/12/2012 B Revision Replay 6.0.2 THIS BEST PRACTICES GUIDE IS FOR INFORMATIONAL

More information

Veeam Availability Suite. Ivan Cioffi Systems Engineer, CEMEA Switzerland

Veeam Availability Suite. Ivan Cioffi Systems Engineer, CEMEA Switzerland Veeam Availability Suite Ivan Cioffi Systems Engineer, CEMEA Switzerland ivan.cioffi@veeam.com Welcome to Veeam Veeam is a global company with his headquarter in Baar (ZG), Switzerland Founded in 2006

More information

Business-centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance

Business-centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance Business-centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance The easy solution for backup to disk with deduplication If you rethink your backup strategy, then think of ETERNUS CS800

More information

IBM Cloud Virtualized Server Recovery

IBM Cloud Virtualized Server Recovery IBM Global Technology Services IBM Resiliency Services IBM Cloud Virtualized Server Recovery Service profile 1 The service 2Service deployment 3Service delivery 4Getting started A brief summary of the

More information

Financial Services Need More than Just Backup... But they don t need to spend more! axcient.com

Financial Services Need More than Just Backup... But they don t need to spend more! axcient.com Financial Services Need More than Just Backup... But they don t need to spend more! axcient.com Introduction Financial institutions need to keep their businesses up and running more than ever now. Considering

More information

Trends in Data Protection and Restoration Technologies. Jason Iehl, NetApp

Trends in Data Protection and Restoration Technologies. Jason Iehl, NetApp Trends in Data Protection and Restoration Technologies Jason Iehl, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and

More information

Secure Data Across Application Landscapes: On Premise, Offsite & In the Cloud REINVENTING DATA MASKING WHITE PAPER

Secure Data Across Application Landscapes: On Premise, Offsite & In the Cloud REINVENTING DATA MASKING WHITE PAPER Secure Data Across Application Landscapes: On Premise, Offsite & In the Cloud REINVENTING DATA MASKING TABLE OF CONTENTS Data Protection Challenges Across Application Lifecycles... 3 Delphix Service-Based

More information

EMC Data Domain Boost for Oracle Recovery Manager (RMAN)

EMC Data Domain Boost for Oracle Recovery Manager (RMAN) White Paper EMC Data Domain Boost for Oracle Recovery Manager (RMAN) Abstract EMC delivers Database Administrators (DBAs) complete control of Oracle backup, recovery, and offsite disaster recovery with

More information

Complete Storage and Data Protection Architecture for VMware vsphere

Complete Storage and Data Protection Architecture for VMware vsphere Complete Storage and Data Protection Architecture for VMware vsphere Executive Summary The cost savings and agility benefits of server virtualization are well proven, accounting for its rapid adoption.

More information

Continuous Backup and Assured Recovery for SMBs: Focus on Microsoft Exchange

Continuous Backup and Assured Recovery for SMBs: Focus on Microsoft Exchange Continuous Backup and Assured Recovery for SMBs: Focus on Microsoft Exchange A WHITE PAPER Abstract: For many small and medium businesses data protection is an immediate and growing challenge. A company

More information

Oracle Database 10g: Backup and Recovery 1-2

Oracle Database 10g: Backup and Recovery 1-2 Oracle Database 10g: Backup and Recovery 1-2 Oracle Database 10g: Backup and Recovery 1-3 What Is Backup and Recovery? The phrase backup and recovery refers to the strategies and techniques that are employed

More information

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation (Author and Presenter)

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation (Author and Presenter) Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation (Author and Presenter) SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless

More information

Backup Exec 2014: Protecting Microsoft SharePoint

Backup Exec 2014: Protecting Microsoft SharePoint TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SHAREPOINT........................................ Backup Exec 2014: Protecting Microsoft SharePoint Who should read this paper Technical White Papers

More information

PRODUCT SCENARIOS BEST-IN-CLASS DISASTER RECOVERY FOR WINDOWS SERVERS

PRODUCT SCENARIOS BEST-IN-CLASS DISASTER RECOVERY FOR WINDOWS SERVERS PRODUCT SCENARIOS BEST-IN-CLASS DISASTER RECOVERY FOR WINDOWS SERVERS StorageCraft ShadowProtect Server and ShadowProtect Small Business Server provide fast and reliable disaster recovery, data protection

More information

Protecting Microsoft SQL Server

Protecting Microsoft SQL Server Your company relies on its databases. How are you protecting them? Protecting Microsoft SQL Server 2 Hudson Place suite 700 Hoboken, NJ 07030 Powered by 800-674-9495 www.nsisoftware.com Executive Summary

More information

Veritas Backup Exec : Protecting Microsoft SharePoint

Veritas Backup Exec : Protecting Microsoft SharePoint Veritas Backup Exec : Protecting Microsoft SharePoint Who should read this paper Technical White Papers are designed to introduce IT professionals to key technologies and technical concepts that are associated

More information

The Essential Guide for Protecting Your Legal Practice From IT Downtime

The Essential Guide for Protecting Your Legal Practice From IT Downtime The Essential Guide for Protecting Your Legal Practice From IT Downtime www.axcient.com Introduction: Technology in the Legal Practice In the professional services industry, the key deliverable of a project

More information

IP Storage On-The-Road Seminar Series

IP Storage On-The-Road Seminar Series On-The-Road Seminar Series Disaster Recovery and Data Protection Page 1 Agenda! The Role of IP in Backup!Traditional use of IP networks for backup! backup capabilities! Contemporary data protection solutions

More information

Veritas Storage Foundation High Availability for Windows by Symantec

Veritas Storage Foundation High Availability for Windows by Symantec Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability

More information

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL

More information

Comprehensive VMware Virtual Machine Protection with Asigra Cloud Backup TM

Comprehensive VMware Virtual Machine Protection with Asigra Cloud Backup TM Comprehensive VMware Virtual Machine Protection with Asigra Cloud Backup TM Virtualization is changing the way companies design, run, and manage their IT environments. Today, virtual machines (VM) are

More information

BEST PRACTICES FOR PROTECTING MICROSOFT EXCHANGE DATA

BEST PRACTICES FOR PROTECTING MICROSOFT EXCHANGE DATA BEST PRACTICES FOR PROTECTING MICROSOFT EXCHANGE DATA Bill Webster September 25, 2003 VERITAS ARCHITECT NETWORK TABLE OF CONTENTS Introduction... 3 Exchange Data Protection Best Practices... 3 Application

More information

Total Cost of Ownership Analysis

Total Cost of Ownership Analysis Total Cost of Ownership Analysis Abstract A total cost of ownership (TCO) analysis can measure the cost of acquiring and operating a new technology solution against a current installation. In the late

More information

WHAT S NEW & COOL. Zenoss Service Dynamics 5 February 2015

WHAT S NEW & COOL. Zenoss Service Dynamics 5 February 2015 WHAT S NEW & COOL Zenoss Service Dynamics 5 February 2015 What s New and Cool Zenoss Service Dynamics 5 redefines monitoring for today s modern IT infrastructures. Most organizations still rely on either

More information

Online Transaction Processing in SQL Server 2008

Online Transaction Processing in SQL Server 2008 Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,

More information

Rose Business Technologies

Rose Business Technologies Virtualization and Consolidation vs. Application Performance and WAN Optimization Virtualization and infrastructure consolidation can offer significant benefits for both IT and business operations. The

More information

NetApp Syncsort Integrated Backup

NetApp Syncsort Integrated Backup WHITE PAPER NetApp Syncsort Integrated Backup Protect your Microsoft and VMware Environment with NetApp Syncsort Integrated Backup Protecting Microsoft and VMware Executive Summary 3 Microsoft and VMware

More information

Key Considerations in Moving to Office 365

Key Considerations in Moving to Office 365 Key Considerations in Moving to Office 365 So, your organization has chosen to move to Office 365. Good choice. But how do you implement it? Find out in this white paper. By Jason Helmick Key Considerations

More information

Symantec NetBackup PureDisk Optimizing Backups with Deduplication for Remote Offices, Data Center and Virtual Machines

Symantec NetBackup PureDisk Optimizing Backups with Deduplication for Remote Offices, Data Center and Virtual Machines Optimizing Backups with Deduplication for Remote Offices, Data Center and Virtual Machines Mayur Dewaikar Sr. Product Manager Information Management Group White Paper: Symantec NetBackup PureDisk Symantec

More information

Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module

Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module WHITE PAPER May 2015 Contents Advantages of NEC / Iron Mountain National

More information

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models 1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint

More information

DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES

DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES Dejan Živanović EMC Technology Solutions Group SEE Presales Manager Dejan.Zivanovic@emc.com 1 The Business Maturity Model V Enabled Web

More information

BackupEnabler: Virtually effortless backups for VMware Environments

BackupEnabler: Virtually effortless backups for VMware Environments White Paper BackupEnabler: Virtually effortless backups for VMware Environments Contents Abstract... 3 Why Standard Backup Processes Don t Work with Virtual Servers... 3 Agent-Based File-Level and Image-Level

More information

Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email

Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email Harnessing the Power of Virtualization with an Integrated Solution Based on VMware vsphere and VMware Zimbra WHITE

More information

Continuous Data Replicator 7.0

Continuous Data Replicator 7.0 DATA PROTECTION ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH Continuous Data Replicator 7.0 Continuous Data Protection (CDP) and Centralized Management of Remote Office Data Key Benefits Reduces management

More information

EMC DATA DOMAIN OPERATING SYSTEM

EMC DATA DOMAIN OPERATING SYSTEM EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 58.7 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive

More information

Storage Infrastructure as a Service

Storage Infrastructure as a Service The Best of Cloud and On-premises Storage www.nasuni.com Introduction Organizations rely on corporate data for everything from product design to order processing; it is their most valuable asset. Today

More information

Backup and Archiving Explained. White Paper

Backup and Archiving Explained. White Paper Backup and Archiving Explained White Paper Backup vs. Archiving The terms backup and archiving are often referenced together and sometimes incorrectly used interchangeably. While both technologies are

More information

Barracuda Backup Server. Introduction

Barracuda Backup Server. Introduction Barracuda Backup Server Introduction Backup & Recovery Conditions and Trends in the Market Barracuda Networks 2! Business Continuity! Business today operates around the clock Downtime is very costly Disaster

More information

EMC DATA DOMAIN OPERATING SYSTEM

EMC DATA DOMAIN OPERATING SYSTEM ESSENTIALS HIGH-SPEED, SCALABLE DEDUPLICATION Up to 58.7 TB/hr performance Reduces protection storage requirements by 10 to 30x CPU-centric scalability DATA INVULNERABILITY ARCHITECTURE Inline write/read

More information

Constant Replicator: An Introduction

Constant Replicator: An Introduction Data Availability Storage Software Constant Replicator: An Introduction Configurations, Applications and Solutions of Constant Replicator A White Paper A Constant Data Technology Document August 2004 Copyright

More information

White Paper: 5 Ways Cloud-integrated Storage Reduces Costs

White Paper: 5 Ways Cloud-integrated Storage Reduces Costs White Paper: 5 Ways Cloud-integrated 5 Ways Cloud-integrated Introduction Many companies consider using cloud storage to reduce costs and the IT burden of storing data in the enterprise. However, simply

More information

Presents. Attix5 Technology. An Introduction

Presents. Attix5 Technology. An Introduction Presents Attix5 Technology An Introduction January 2013 1. Global Block Level Deduplication. Attix5 Feature Top 10 Things That Matter When Attix5 is first installed on a target server a full backup is

More information

EMC DATA DOMAIN OPERATING SYSTEM

EMC DATA DOMAIN OPERATING SYSTEM ESSENTIALS HIGH-SPEED, SCALABLE DEDUPLICATION Up to 58.7 TB/hr performance Reduces protection storage requirements by 10 to 30x CPU-centric scalability DATA INVULNERABILITY ARCHITECTURE Inline write/read

More information

Huawei OceanStor Backup Software Technical White Paper for NetBackup

Huawei OceanStor Backup Software Technical White Paper for NetBackup Huawei OceanStor Backup Software Technical White Paper for NetBackup Huawei Page 1 of 14 Copyright Huawei. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form

More information

TOP FIVE REASONS WHY CUSTOMERS USE EMC AND VMWARE TO VIRTUALIZE ORACLE ENVIRONMENTS

TOP FIVE REASONS WHY CUSTOMERS USE EMC AND VMWARE TO VIRTUALIZE ORACLE ENVIRONMENTS TOP FIVE REASONS WHY CUSTOMERS USE EMC AND VMWARE TO VIRTUALIZE ORACLE ENVIRONMENTS Leverage EMC and VMware To Improve The Return On Your Oracle Investment ESSENTIALS Better Performance At Lower Cost Run

More information

WHITE PAPER. Best Practices to Ensure SAP Availability. Software for Innovative Open Solutions. Abstract. What is high availability?

WHITE PAPER. Best Practices to Ensure SAP Availability. Software for Innovative Open Solutions. Abstract. What is high availability? Best Practices to Ensure SAP Availability Abstract Ensuring the continuous availability of mission-critical systems is a high priority for corporate IT groups. This paper presents five best practices that

More information

The case for cloud-based disaster recovery

The case for cloud-based disaster recovery IBM Global Technology Services IBM SmartCloud IBM SmartCloud Virtualized Server Recovery i The case for cloud-based disaster recovery Cloud technologies help meet the need for quicker restoration of service

More information

EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY USING NDMP

EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY USING NDMP White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains

More information

www.rackwareinc.com RackWare Solutions Disaster Recovery

www.rackwareinc.com RackWare Solutions Disaster Recovery RackWare Solutions Disaster Recovery RackWare Solutions Disaster Recovery Overview Business Continuance via Disaster Recovery is an essential element of IT and takes on many forms. The high end consists

More information

SOLUTION BRIEF: CA ARCserve R16. Leveraging the Cloud for Business Continuity and Disaster Recovery

SOLUTION BRIEF: CA ARCserve R16. Leveraging the Cloud for Business Continuity and Disaster Recovery Leveraging the Cloud for Business Continuity and Disaster Recovery There are many reasons why businesses today find high value in a cloud service, whether it s a private cloud offered by a Managed Services

More information

Why Your Backup/Recovery Solution Probably Isn t Good Enough

Why Your Backup/Recovery Solution Probably Isn t Good Enough Why Your Backup/Recovery Solution Probably Isn t Good Enough Whatever can go wrong, will go wrong. Whatever can go wrong, will go wrong. Are you prepared? @! Restored? Complex 18.5 Hours downtime $5,600/Min

More information

Stop the Finger-Pointing: Managing Tier 1 Applications with VMware vcenter Operations Management Suite

Stop the Finger-Pointing: Managing Tier 1 Applications with VMware vcenter Operations Management Suite Stop the Finger-Pointing: Managing Tier 1 Applications with VMware vcenter Operations Management Suite By David Davis, VMware vexpert WHITE PAPER There is a tradition of finger-pointing in too many IT

More information

Database Backup and Recovery using NetVault Backup and PowerVault MD3260

Database Backup and Recovery using NetVault Backup and PowerVault MD3260 Database Backup and Recovery using NetVault Backup and PowerVault MD3260 A Dell Technical White Paper Database Solutions Engineering Dell Product Group Umesh Sunnapu Mayura Deshmukh Robert Pound This document

More information

EMC Data Domain Boost for Oracle Recovery Manager (RMAN)

EMC Data Domain Boost for Oracle Recovery Manager (RMAN) White Paper EMC Data Domain Boost for Oracle Recovery Manager (RMAN) Abstract EMC delivers Database Administrators (DBAs) complete control of Oracle backup, recovery, and offsite disaster recovery with

More information

VENDOR-AGNOSTIC EXPLANATIONS AND ADVICE FOR THE INFORMATION TECHNOLOGY BUYER. Evaluating Email Archiving Solutions

VENDOR-AGNOSTIC EXPLANATIONS AND ADVICE FOR THE INFORMATION TECHNOLOGY BUYER. Evaluating Email Archiving Solutions P Evaluating Email Archiving Solutions Clipper Notes VENDOR-AGNOSTIC EXPLANATIONS AND ADVICE FOR THE INFORMATION TECHNOLOGY BUYER New in 2007 Report #TCG2007048 March 31, 2007 Evaluating Email Archiving

More information

Real-time Protection for Hyper-V

Real-time Protection for Hyper-V 1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate

More information

GIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT

GIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT Why Data Domain Series GIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT Why you should take the time to read this paper Speed up backups (Up to 58.7 TB/hr, Data Domain systems are about 1.5 times faster

More information

Access to easy-to-use tools that reduce management time with Arcserve Backup

Access to easy-to-use tools that reduce management time with Arcserve Backup Access to easy-to-use tools that reduce management time with Arcserve Backup In business, evolution is constant. Staff grows. New offices spring up. New applications are being implemented, and typically,

More information

Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs

Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs EMC RECOVERPOINT FAMILY Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs ESSENTIALS EMC RecoverPoint Family Optimizes RPO

More information

White Paper. WAN-Optimized Replication

White Paper. WAN-Optimized Replication White Paper WAN-Optimized Replication c Contents Abstract... 3 The Many Uses of Data Replication... 3 The Effect of WAN Link Saturation... 4 WAN Resiliency... 4 WAN Optimized X-IO Solutions... 4 Save Bandwidth,

More information

Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve

Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while

More information

Case Studies. Data Sheets : White Papers : Boost your storage buying power... use ours!

Case Studies. Data Sheets : White Papers : Boost your storage buying power... use ours! TM TM Data Sheets : White Papers : Case Studies For over a decade Coolspirit have been supplying the UK s top organisations with storage products and solutions so be assured we will meet your requirements

More information

Oracle Recovery Manager 10g. An Oracle White Paper November 2003

Oracle Recovery Manager 10g. An Oracle White Paper November 2003 Oracle Recovery Manager 10g An Oracle White Paper November 2003 Oracle Recovery Manager 10g EXECUTIVE OVERVIEW A backup of the database may be the only means you have to protect the Oracle database from

More information

MICROSOFT EXCHANGE 2003. best practices BEST PRACTICES - DATA STORAGE SETUP

MICROSOFT EXCHANGE 2003. best practices BEST PRACTICES - DATA STORAGE SETUP MICROSOFT EXCHANGE 2003 best practices BEST PRACTICES - DATA STORAGE SETUP TABLE OF CONTENTS E-mail has become a business critical communication tool 3 Build a disaster recovery solution with VSS and Data

More information