Disaster Recovery and Business Continuity Basics The difference between Disaster Recovery and Business Continuity

Size: px
Start display at page:

Download "Disaster Recovery and Business Continuity Basics The difference between Disaster Recovery and Business Continuity"

Transcription

1 Disaster Recovery and Business Continuity Basics Both Business Continuity and Disaster Recovery are very important business issues for every organization. Global businesses cannot simply stop operating, because the location from which they run their major IT operation is failing for various reasons. Such incident of failure could include anything such as floods, storms, serious power outages, terrorist attacks or even a malicious manipulation targeting data and applications to bring the operation down. The difference between Disaster Recovery and Business Continuity While many people mean the same when they use the terms Business Continuity and Disaster Recovery, those terms are not exactly identical. However, the common denominator between both is that those terms are understood as measures to prepare the IT for a worst case scenario. The term Business Continuity is targeting more the organizational aspects of potential outages. Questions raised in the context of Business Continuity are for example: What are contingency plans for the business organization? Who has which responsibility in the process of getting back in business as soon as possible? What needs to happen to declare a specific situation as disaster? How much time is granted until the operation needs to be up again? And so on. The term Disaster Recovery is rather targeting the technical aspects of a potential outage. How is the IT operation going to recover from a disaster? What technologies are used to address what kind of incident? Which applications will be switched when to the Disaster Recovery site and how will they be switched? How will the users get access to the remote site? And so on. How we understand Disaster Recovery We understand Disaster Recovery as all plans and technologies which are in place to prevent downtime in case a disaster strikes. The Disaster Recovery Architecture has to include a remote site, which can take over the key IT operations when the primary site fails in the shortest possible timeframe. From a business perspective, the remote site should be as far away as possible. The farer the safer! It is not sufficient to stay within a radius of a couple of miles. What about power outages? What about long-term global perspectives on data safety? Real protection requires a distance between individual states, countries or continents.

2 The weaknesses of hardware-based Disaster Recover Concepts The typical way a customer is starting his Disaster Recovery Project is usually to ask existing hardware vendor or system integrators for possible solutions. The hardware vendor then may come up with a concept based on traditional server replication (cluster) over a large distance in combination with storage replication (block-based replication). In addition to serious technical hurdles (network latency, data consistency, distance limitations, bandwidth requirements ) the Return on Investment of this solution is not that great. It is important to understand that hardware vendors usually propose tools, which worked fine in the past. However, new requirements such as much larger distances between two datacenters sometimes require to think out-of-the-box and to come up with something new instead of re-engineering and trying to enhance existing technologies. Please do not get this wrong: Cluster Server and RAID systems are still the greatest way to ensure local hardware availability, they are simply not that ideal for mirroring data over hundreds or thousands of miles for Disaster Recovery purposes. A different approach to Business Continuity and Disaster Recovery As mentioned earlier, new requirements sometimes require some out-of-the-boxthinking. Before talking about a possible way to address the Disaster Recovery project in a more progressive way, let s face the major criteria for a ideal Disaster Recovery project: The application should be up and running at the remote site within a short period of time when a Disaster strikes (e.g. 20 minutes) Potential data loss should be either eliminated or minimized A minimum distance between both datacenters (e.g. at least miles) Manual work for switching over the application should be minimized Data consistency should be guaranteed Interference with production servers should be kept to a minimum In addition, your Disaster Recovery project is typically on a tight budget and also the bandwidth between remote sites is always limited. Overcoming Disaster Recovery challenges with Business Shadow Instead of using block-level storage mechanisms we are operating on a database and application level. The key idea is to work with dedicated changes in the database or

3 in the file system which are copied to the mirror system. Communication is purely based on standard TCP/IP protocols. The good news about the Business Shadow Software is that all above mentioned Disaster Recovery requirements can be addressed. Business Shadow consists of three components: DB Shadow for mirroring databases, FS Shadow for mirroring your file systems and Switch Application to cover the automated switch of NetBIOS names and IP-Addresses automatically between servers (whereas the Switch Application software only makes sense if primary and disaster recovery datacenters are within the same network segment or you are working with own name servers). With DB Shadow we would copy your production database to your remote site only once. Then all changes (database archive files) are continuously picked up and copied to the backup site automatically - let s say every two or five minutes. In addition the mirror server is working with a built-in time delay when adapting archive files. That offers you additional protection against any user or software errors within your application since you are enabled to perform a point-in-time recovery to any time before an error occurred. The same happens with file systems using FSShadow. What do you need to implement Business Shadow There are only a few very basic requirements to implement a Disaster Recovery concept. First of all, you need a second server with the same operating system as

4 the production server. Supported operating systems are HP Tru64, HP-UX, IBM AIX, LINUX, SINIX, SUN SOLARIS and Microsoft Windows Server 2003/2000/NT. The second server needs to have the same disk space as the production server, but there is no restriction on what kind of storage system you use on your Disaster Recovery site. Many clients use expensive RAID-systems on the production site and some more cost-effective storage systems on the DR site. Since for example DB Shadow is working with backup and recovery mechanisms of databases, it is necessary that Business Shadow supports your database which could be any of the following: DB2 UDB, Microsoft SQL Server, Oracle and MySQL SAPDB/ MAXDB. The next step is to have a network connection between both servers and at least one open IP-Port. The necessary bandwidth between both sites is depending on a variety of factors. We have a variety of tools available and would be happy to give you a free estimation about potential network requirements. Disaster Recovery projects don t have to be unaffordable when you check the alternatives on the market. Don t let your hardware vendor talking your business into a two million dollar Disaster Recovery project when you can have the same coverage for up to 90% less of the investment. Overcoming network bottlenecks in Disaster Recovery projects Moving away from block-based replication towards (log) file based mirroring is a huge step towards being able to handle network, bandwidth and distance limitations at all. However, we are still not where we need to be. There is lot of work left to make sure that the communication between your production server and disaster recovery server is working smoothly. Let s look at the major network limitations. Disaster Recovery Major Network Limitations Even when working with files instead of block-based replication, there are still some major network limitation when moving a large number of large-sized files over the network: Network bandwidth is still limited. If changes to your production application are for example 10 GB per day, those changes need to be moved to the Disaster Recovery site with a minimal delay. Otherwise those files potentially clock up your production server and the changes are nowhere safe in case of a disaster Network latency is still a problem. Some parts of the problem of network latency got removed by moving from block-based replication towards log-based replication. However, standard TCP/IP is working sequential. That means IP Packet are being sent one after the

5 other, whereas each packet waits for the feedback ticket of the previous one. This is causing serious delay in getting your data over. Wide Area Networks are not stable. The larger the distance, the more unstable networks are getting. It is not unusual that a connection between two sites is getting lost every once in a while for a couple of minutes. It can be frustrating to continuously intervene to get the DR site back up and running Utilizing the Potential for Network Optimization Some basic mechanisms of Business Shadow are including that for example copy processes can highly parallelized which increases the performance and network utilization. In addition, the number of parallel copy processes can be changed dynamically to fine-tune to copy performance. Another feature is that the process of copying data can be set to compressed or high compressed. Whereas compressed copy is focused on the speed of the compressing time, the high compression is using some more CPU power to focused on a higher compression. In addition to those basic mechanisms, the Business Shadow Long Distance version is offering dedicated features such as for example: Parallel Archive Shipping (PAS-Technology): An important functionality of the Long Distance Edition is the so-called PAS- Algorithm. Core of this concept is the possibility to ship the archive files parallel over the Wide Area Network. This includes sending single files parallel and shipping multiple packages of the same file parallel. Beneath the Initial Copy, this functionality is offering a much better utilization of the existing network bandwidth. Data Encryption :When customers are using Wide Area Networks to mirror critical data, we suggest to use very secure lines between the locations for security reasons. One effective mechanism is to rely on Virtual Private Networks or use additional hardware-based encryption mechanisms. With the Features of the Long Distance Edition, Aivant is offering additional security mechanisms. The encryption methods are based on own procedures which result from e.g. compressing the data or specific bit-rotation mechanisms. Optimizing IP-Communication (VLP-Technology) A traditional TCP-IP Stack usually is not the best solution for mirroring standard Enterprise Resource Planning (ERP) databases or typical file systems. For the maximum utilization of the bandwidth, the Long Distance Edition is offering intelligent technologies for optimizing the basic IPcommunication. This communication optimization package is including the so-called VLP-Technology (very large packages) along with

6 additional package checksums. By implementing these features, the overall IP-communication is clearly oriented towards the typical database and file system traffic and the DBShadow/FSShadow processes. Beneath the PAS-Algorithms, optimizing of the IPcommunication is a great contribution for increasing the performance and utilizing limited bandwidth.... and of course many more

ExaEcon Inc. 99 Baynards Lane Richmond Hill, ON L4C 9B9. White Paper. High Availability and Disaster Recovery with Libelle BusinessShadow

ExaEcon Inc. 99 Baynards Lane Richmond Hill, ON L4C 9B9. White Paper. High Availability and Disaster Recovery with Libelle BusinessShadow White Paper High Availability and Disaster Recovery with Libelle BusinessShadow High Availability and Disaster Recovery with Libelle BusinessShadow Libelle AG has been providing High Availability (HA)

More information

Compellent Source Book

Compellent Source Book Source Book Remote Instant Replay Thin Replication Compellent Corporate Office Compellent Technologies 12982 Valley View Road Eden Prairie, Minnesota 55344 www.compellent.com Contents Contents...2 Document

More information

HA / DR Jargon Buster High Availability / Disaster Recovery

HA / DR Jargon Buster High Availability / Disaster Recovery HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster

More information

WHITE PAPER. Header Title. Side Bar Copy. Real-Time Replication Is Better Than Periodic Replication WHITEPAPER. A Technical Overview

WHITE PAPER. Header Title. Side Bar Copy. Real-Time Replication Is Better Than Periodic Replication WHITEPAPER. A Technical Overview Side Bar Copy Header Title Why Header Real-Time Title Replication Is Better Than Periodic Replication A Technical Overview WHITEPAPER Table of Contents Introduction...1 Today s IT Landscape...2 What Replication

More information

Designing a bullet-proof Disaster Recovery Architecture for business-critical Applications

Designing a bullet-proof Disaster Recovery Architecture for business-critical Applications Designing a bullet-proof Disaster Recovery Architecture for business-critical Applications While real disaster incidents are rare, the impacts are dramatic. What if your business-critical Application becomes

More information

High Availability and Disaster Recovery with Libelle BusinessShadow

High Availability and Disaster Recovery with Libelle BusinessShadow High Availability and Disaster Recovery with Libelle BusinessShadow Libelle AG has been providing High Availability (HA) and Disaster Recovery (DR) Solutions to the enterprise market for over a decade.

More information

Protecting Microsoft SQL Server

Protecting Microsoft SQL Server Your company relies on its databases. How are you protecting them? Protecting Microsoft SQL Server 2 Hudson Place suite 700 Hoboken, NJ 07030 Powered by 800-674-9495 www.nsisoftware.com Executive Summary

More information

Securing Your Microsoft SQL Server Databases in an Enterprise Environment

Securing Your Microsoft SQL Server Databases in an Enterprise Environment Securing Your Microsoft SQL Server Databases in an Enterprise Environment Contents Introduction...1 Taking Steps Now to Secure Your Data...2 Step 1: Back Up Everything...2 Step 2: Simplify as Much as

More information

A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES

A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES By: Edward Whalen Performance Tuning Corporation INTRODUCTION There are a number of clustering products available on the market today, and clustering has become

More information

Veritas Cluster Server from Symantec

Veritas Cluster Server from Symantec Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

Veritas Cluster Server by Symantec

Veritas Cluster Server by Symantec Veritas Cluster Server by Symantec Reduce application downtime Veritas Cluster Server is the industry s leading clustering solution for reducing both planned and unplanned downtime. By monitoring the status

More information

VERITAS NetBackup 6.0 Database and Application Protection

VERITAS NetBackup 6.0 Database and Application Protection VERITAS NetBackup 6.0 Database and Application Protection INNOVATIVE DATA PROTECTION When it comes to database and application recovery, VERITAS Software has a clear goal in mind simplify the complexity

More information

Veritas Replicator from Symantec

Veritas Replicator from Symantec Data replication across multi-vendor storage for cost effective disaster recovery Data Sheet: Disaster Recovery Overviewview provides organizations with a comprehensive solution for heterogeneous data

More information

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many

More information

Data Sheet: Disaster Recovery Veritas Volume Replicator by Symantec Data replication for disaster recovery

Data Sheet: Disaster Recovery Veritas Volume Replicator by Symantec Data replication for disaster recovery Data replication for disaster recovery Overview Veritas Volume Replicator provides organizations with a world-class foundation for continuous data replication, enabling rapid and reliable recovery of critical

More information

EVault Technology Build Cloud-Connected Backup and Recovery Services for Datacenter

EVault Technology Build Cloud-Connected Backup and Recovery Services for Datacenter EVault Technology Build Cloud-Connected Backup and Recovery Services for Datacenter ROMA 18/09/2013 JUKU UNPLUGGED Antonio Naletto - antonio.naletto@evault.com 28/09/13 2012 EVault, Inc. All Rights Reserved

More information

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization. WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read

More information

Eliminate SQL Server Downtime Even for maintenance

Eliminate SQL Server Downtime Even for maintenance Eliminate SQL Server Downtime Even for maintenance Eliminate Outages Enable Continuous Availability of Data (zero downtime) Enable Geographic Disaster Recovery - NO crash recovery 2009 xkoto, Inc. All

More information

Network-based Intelligent Data Protection Yossi Mossel, Product Manager

Network-based Intelligent Data Protection Yossi Mossel, Product Manager 1 EMC RecoverPoint Network-based Intelligent Data Protection Yossi Mossel, Product Manager The CIO s Information-Storage and -Management Requirements Lower TCO Utilization, consolidation, automated management

More information

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL

More information

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper Copyright 2011-2012 Dbvisit Software Limited. All Rights Reserved v2, Mar 2012 Contents Executive Summary... 1

More information

WHITE PAPER PPAPER. Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions. for Microsoft Exchange Server 2003 & Microsoft SQL Server

WHITE PAPER PPAPER. Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions. for Microsoft Exchange Server 2003 & Microsoft SQL Server WHITE PAPER PPAPER Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions for Microsoft Exchange Server 2003 & Microsoft SQL Server

More information

Redefining Backup for VMware Environment. Copyright 2009 EMC Corporation. All rights reserved.

Redefining Backup for VMware Environment. Copyright 2009 EMC Corporation. All rights reserved. Redefining Backup for VMware Environment 1 Agenda VMware infrastructure backup and recovery challenges Introduction to EMC Avamar Avamar solutions for VMware infrastructure Key takeaways Copyright 2009

More information

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available Phone: (603)883-7979 sales@cepoint.com Cepoint Cluster Server CEP Cluster Server turnkey system. ENTERPRISE HIGH AVAILABILITY, High performance and very reliable Super Computing Solution for heterogeneous

More information

Veritas NetBackup 6.0 Database and Application Protection

Veritas NetBackup 6.0 Database and Application Protection Veritas NetBackup 6.0 Database and Application Protection Innovative data protection When it comes to database and application recovery, Symantec has a clear goal in mind simplify the complexity of database

More information

IBM Tivoli Storage FlashCopy Manager

IBM Tivoli Storage FlashCopy Manager IBM Storage FlashCopy Manager Online, near-instant snapshot backup and restore of critical business applications Highlights Perform near-instant application-aware snapshot backup and restore, with minimal

More information

Neverfail for Windows Applications June 2010

Neverfail for Windows Applications June 2010 Neverfail for Windows Applications June 2010 Neverfail, from Neverfail Ltd. (www.neverfailgroup.com), ensures continuity of user services provided by Microsoft Windows applications via data replication

More information

IP Storage On-The-Road Seminar Series

IP Storage On-The-Road Seminar Series On-The-Road Seminar Series Disaster Recovery and Data Protection Page 1 Agenda! The Role of IP in Backup!Traditional use of IP networks for backup! backup capabilities! Contemporary data protection solutions

More information

DISASTER RECOVERY WITH AWS

DISASTER RECOVERY WITH AWS DISASTER RECOVERY WITH AWS Every company is vulnerable to a range of outages and disasters. From a common computer virus or network outage to a fire or flood these interruptions can wreak havoc on your

More information

Price sensitive backup using EMC SnapView

Price sensitive backup using EMC SnapView Price sensitive backup using EMC SnapView A whitepaper Brought to you by Efficiency and reliability are no longer the only factors being considered by companies in choosing a data storage and backup solution.

More information

Symantec NetBackup 7 Clients and Agents

Symantec NetBackup 7 Clients and Agents Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency

More information

Secure Your Business with EVault Cloud-Connected Solutions

Secure Your Business with EVault Cloud-Connected Solutions Secure Your Business with EVault Cloud-Connected Solutions Winfried Posthumus Channel Sales Manager NL Winfried.Posthumus@evault.com 11/22/2012 2012 EVault, Inc. All Rights Reserved 1 Agenda Who is EVault

More information

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye Best of Breed of an ITIL based IT Monitoring The System Management strategy of NetEye by Georg Kostner 5/11/2012 1 IT Services and IT Service Management IT Services means provisioning of added value for

More information

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11 Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node

More information

Secure, Compliant and Flexible Cloud Services

Secure, Compliant and Flexible Cloud Services www.ricohidc.com Secure, Compliant and Flexible Cloud Services Key to continuous success is EVOLUTION RICOH CLOUD SERVICES - Next Generation Cloud Services Our ISO 27001 certified datacenters provide wide

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

The Remote Data Backup & Restore Service from

The Remote Data Backup & Restore Service from The Remote Data Backup & Restore Service from How does Work? is an agentless method of backup this means that you can backup as many PCs, servers, and applications as you wish, just by installing the TP-Client

More information

Sanovi DRM for Oracle Database

Sanovi DRM for Oracle Database Application Defined Continuity Sanovi DRM for Oracle Database White Paper Copyright@2012, Sanovi Technologies Table of Contents Executive Summary 3 Introduction 3 Audience 3 Oracle Protection Overview

More information

White paper: Unlocking the potential of load testing to maximise ROI and reduce risk.

White paper: Unlocking the potential of load testing to maximise ROI and reduce risk. White paper: Unlocking the potential of load testing to maximise ROI and reduce risk. Executive Summary Load testing can be used in a range of business scenarios to deliver numerous benefits. At its core,

More information

The syslog-ng Store Box 3 LTS

The syslog-ng Store Box 3 LTS The syslog-ng Store Box 3 LTS PRODUCT DESCRIPTION Copyright 2000-2012 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Store Box (SSB) is a high-reliability and high-performance

More information

SAP HANA Operation Expert Summit BUILD - High Availability & Disaster Recovery

SAP HANA Operation Expert Summit BUILD - High Availability & Disaster Recovery SAP HANA Operation Expert Summit BUILD - High Availability & Disaster Recovery Dr. Ralf Czekalla/SAP HANA Product Management May 09, 2014 Customer Disclaimer This presentation outlines our general product

More information

Enterprise Backup Solution Vendor Questions

Enterprise Backup Solution Vendor Questions Enterprise Backup Solution Vendor Questions What is the size of a single full back up? If Backups comprise 28% of the 19TB, can we assume that a single full (not compressed) is approximately 6TB? The approximate

More information

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models 1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint

More information

PROTECTING MICROSOFT SQL SERVER TM

PROTECTING MICROSOFT SQL SERVER TM WHITE PAPER PROTECTING MICROSOFT SQL SERVER TM Your company relies on its databases. How are you protecting them? Published: February 2006 Executive Summary Database Management Systems (DBMS) are the hidden

More information

Exchange Data Protection: To the DAG and Beyond. Whitepaper by Brien Posey

Exchange Data Protection: To the DAG and Beyond. Whitepaper by Brien Posey Exchange Data Protection: To the DAG and Beyond Whitepaper by Brien Posey Exchange is Mission Critical Ask a network administrator to name their most mission critical applications and Exchange Server is

More information

2. Highlights and Updates: ITSM for Databases

2. Highlights and Updates: ITSM for Databases IBM Tivoli Storage Manager Data Protection for Oracle Neil Rasmussen Software Development for Tivoli Data Protection Tivoli Software, IBM SWG rasmussn@us.ibm.com Agenda 1. Overview: Tivoli Storage Manager

More information

Using Hitachi Protection Manager and Hitachi Storage Cluster software for Rapid Recovery and Disaster Recovery in Microsoft Environments

Using Hitachi Protection Manager and Hitachi Storage Cluster software for Rapid Recovery and Disaster Recovery in Microsoft Environments Using Hitachi Protection Manager and Hitachi Storage Cluster software for Rapid Recovery and Disaster Recovery in Microsoft Environments Robert Burch, Advanced Technical Consultant Leland Sindt, Principal

More information

Overview of I/O Performance and RAID in an RDBMS Environment. By: Edward Whalen Performance Tuning Corporation

Overview of I/O Performance and RAID in an RDBMS Environment. By: Edward Whalen Performance Tuning Corporation Overview of I/O Performance and RAID in an RDBMS Environment By: Edward Whalen Performance Tuning Corporation Abstract This paper covers the fundamentals of I/O topics and an overview of RAID levels commonly

More information

CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR

CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR PERFORMANCE BRIEF CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR INTRODUCTION Enterprise organizations face numerous challenges when delivering applications and protecting critical

More information

The EVault Portfolio

The EVault Portfolio The EVault Portfolio Built from the start as a pure disk-to-disk solution, EVault is the only data protection platform that can be consumed as a cloud service, deployed as on-premise software, an on-premise

More information

Blackboard Managed Hosting SM Disaster Recovery Planning Document

Blackboard Managed Hosting SM Disaster Recovery Planning Document BLACKBOARD MANAGED HOSTING Blackboard Managed Hosting SM Disaster Recovery Planning Document Prepared By: MH Services Modified Date: March 2009 Revision: 1.8 1. OBJECTIVES... 3 2. SCOPE... 3 3. ASSUMPTIONS...

More information

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between

More information

DATA PROGRESSION. The Industry s Only SAN with Automated. Tiered Storage STORAGE CENTER DATA PROGRESSION

DATA PROGRESSION. The Industry s Only SAN with Automated. Tiered Storage STORAGE CENTER DATA PROGRESSION DATA PROGRESSION STORAGE CENTER DATASHEET STORAGE CENTER DATA PROGRESSION Delivering On the Promise of Tiered Storage Tiered storage solutions promise to help companies lower storage costs by storing less

More information

Database Resilience at ISPs. High-Availability. White Paper

Database Resilience at ISPs. High-Availability. White Paper Database Resilience at ISPs High-Availability White Paper Internet Service Providers (ISPs) generally do their job very well. The commercial hosting market is segmented in a number of different ways but

More information

Installation Prerequisites for MetaFrame Presentation Server 3.0

Installation Prerequisites for MetaFrame Presentation Server 3.0 3 Installation Prerequisites for MetaFrame Presentation Server 3.0............................................... Terms you ll need to understand: Terminal Services Licensing Terminal Services Client Access

More information

Enterprise Linux Business Continuity Solutions for Critical Applications

Enterprise Linux Business Continuity Solutions for Critical Applications Enterprise Linux Business Continuity Solutions for Critical Applications Introducing SteelEye Protection Suite for Linux Multi-site Cluster May 15 2009 EMEA DataKeeper Our Expanding Family of Solutions

More information

The syslog-ng Store Box 3 F2

The syslog-ng Store Box 3 F2 The syslog-ng Store Box 3 F2 PRODUCT DESCRIPTION Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Store Box (SSB) is a high-reliability and high-performance

More information

Brian LaGoe, Systems Administrator Benjamin Jellema, Systems Administrator Eastern Michigan University

Brian LaGoe, Systems Administrator Benjamin Jellema, Systems Administrator Eastern Michigan University Brian LaGoe, Systems Administrator Benjamin Jellema, Systems Administrator Eastern Michigan University 1 Backup & Recovery Goals and Challenges Traditional/EMU s Old Environment Avamar Key Features EMU

More information

The LCO Group. Backup & Disaster Recovery. Protect your data. Protect your business.

The LCO Group. Backup & Disaster Recovery. Protect your data. Protect your business. The LCO Group Backup & Disaster Recovery Protect your data. Protect your business. SMB Disaster Preparedness Survey By Applied Research 50% 36% 50% of SMB s Have No Backup and Disaster Recovery Plan Out

More information

FDR/UPSTREAM. Simplified Enterprise Backup

FDR/UPSTREAM. Simplified Enterprise Backup FDR/UPSTREAM Simplified Enterprise Backup FDR/UPSTREAM If you need a backup product that is flexible, simple-to-use and very cost-effective, with a personalized technical support model, look no further!

More information

Module 7: System Component Failure Contingencies

Module 7: System Component Failure Contingencies Module 7: System Component Failure Contingencies Introduction The purpose of this module is to describe procedures and standards for recovery plans to be implemented in the event of system component failures.

More information

Accelerating Cloud Based Services

Accelerating Cloud Based Services Accelerating Cloud Based Services A White Paper February 2011 1.1 Replify 2011 Table of Contents Executive Summary... 3 Introduction... 4 The Network a Barrier to Cloud Adoption... 4 Current Solutions...

More information

WHITE PAPER: ENTERPRISE SECURITY. Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions

WHITE PAPER: ENTERPRISE SECURITY. Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server White Paper: Enterprise Security Symantec

More information

SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH DELL EQUALLOGIC AUTO SNAPSHOT MANAGER

SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH DELL EQUALLOGIC AUTO SNAPSHOT MANAGER WHITE PAPER SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH DELL EQUALLOGIC AUTO SNAPSHOT MANAGER Business critical applications depend on Relational Database Management Systems (RMS) to store and

More information

Cisco Application Networking for Citrix Presentation Server

Cisco Application Networking for Citrix Presentation Server Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

VERITAS Backup Exec 9.1 for Windows Servers. Intelligent Disaster Recovery Option

VERITAS Backup Exec 9.1 for Windows Servers. Intelligent Disaster Recovery Option WHITE PAPER Intelligent Disaster Recovery VERITAS Backup Exec 9.1 for Windows Servers Intelligent Disaster Recovery Option 11/20/2003 1 TABLE OF CONTENTS Introduction...3 Solution: Point-in-Time Disaster

More information

1. Management Application (or Console), including Deferred Processor & Encryption Key 2. Database 3. Website

1. Management Application (or Console), including Deferred Processor & Encryption Key 2. Database 3. Website This document answers the question: What are the disaster recovery steps for Enterprise Random Password Manager (ERPM) and how can the solution be made highly available? Disaster Recovery Preparation As

More information

Disaster Recovery Solution Achieved by EXPRESSCLUSTER

Disaster Recovery Solution Achieved by EXPRESSCLUSTER Disaster Recovery Solution Achieved by EXPRESSCLUSTER http://www.nec.com/expresscluster/ NEC Corporation System Software Division December, 2012 Contents 1. Clustering system and disaster recovery 2. Disaster

More information

Efficient Backup with Data Deduplication Which Strategy is Right for You?

Efficient Backup with Data Deduplication Which Strategy is Right for You? Efficient Backup with Data Deduplication Which Strategy is Right for You? Rob Emsley Senior Director, Product Marketing CPU Utilization CPU Utilization Exabytes Why So Much Interest in Data Deduplication?

More information

Barracuda Backup Server. Introduction

Barracuda Backup Server. Introduction Barracuda Backup Server Introduction Backup & Recovery Conditions and Trends in the Market Barracuda Networks 2! Business Continuity! Business today operates around the clock Downtime is very costly Disaster

More information

PORTrockIT. Veeam : accelerating virtual machine replication with PORTrockIT

PORTrockIT. Veeam : accelerating virtual machine replication with PORTrockIT 1 PORTrockIT Veeam : accelerating virtual machine replication 2 Executive summary Business continuity solutions such as Veeam offer the ability to recover quickly from disaster by creating a replica of

More information

A Native American Owned Company. I.T. & DATA SERVICES Keeping your data safe and accessible for generations to come

A Native American Owned Company. I.T. & DATA SERVICES Keeping your data safe and accessible for generations to come A Native American Owned Company I.T. & DATA SERVICES Keeping your data safe and accessible for generations to come I.T. & DATA SERVICES Workplace Solutions offers IT and data services for businesses of

More information

CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server

CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server CA RECOVERY MANAGEMENT R12.5 BEST PRACTICE CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering

More information

syslog-ng Store Box PRODUCT DESCRIPTION Copyright 2000-2009 BalaBit IT Security All rights reserved. www.balabit.com

syslog-ng Store Box PRODUCT DESCRIPTION Copyright 2000-2009 BalaBit IT Security All rights reserved. www.balabit.com syslog-ng Store Box PRODUCT DESCRIPTION Copyright 2000-2009 BalaBit IT Security All rights reserved. www.balabit.com Introduction Log messages contain information about the events happening on the hosts.

More information

The Trouble with Backups

The Trouble with Backups The Trouble with Backups Backups are central to any data protection strategy, but by some estimates more than half of all backups fail either in whole or in part. When you look at the reasons for why they

More information

DISASTER RECOVERY ebook FACING DISASTERS HEAD ON

DISASTER RECOVERY ebook FACING DISASTERS HEAD ON DISASTER RECOVERY ebook FACING DISASTERS HEAD ON CHAPTER 1: Facing Reality CHAPTER 2: Disaster Recovery Considerations CHAPTER 3: Making the Best Choices CHAPTER 4: A Single, Unified Solution CHAPTER 5:

More information

Optimize Results By Integrating People, Process and IT. Services. Why Mirage Data?

Optimize Results By Integrating People, Process and IT. Services. Why Mirage Data? Optimize Results By Integrating People, Process and IT For Mirage Data, consulting is about providing the highest level of quality and service. With an extensive understanding and focus on corporate needs,

More information

Veritas Storage Foundation High Availability for Windows by Symantec

Veritas Storage Foundation High Availability for Windows by Symantec Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability

More information

Implementing efficient system i data integration within your SOA. The Right Time for Real-Time

Implementing efficient system i data integration within your SOA. The Right Time for Real-Time Implementing efficient system i data integration within your SOA The Right Time for Real-Time Do your operations run 24 hours a day? What happens in case of a disaster? Are you under pressure to protect

More information

Efficient Data Protection with EMC Avamar Global De-duplication Software

Efficient Data Protection with EMC Avamar Global De-duplication Software Efficient Data Protection with EMC Avamar Global De-duplication Software Technology Concepts and Business Considerations Abstract This white paper provides a technical overview of EMC Avamar backup and

More information

Solid State Storage in Massive Data Environments Erik Eyberg

Solid State Storage in Massive Data Environments Erik Eyberg Solid State Storage in Massive Data Environments Erik Eyberg Senior Analyst Texas Memory Systems, Inc. Agenda Taxonomy Performance Considerations Reliability Considerations Q&A Solid State Storage Taxonomy

More information

Perform-Tools. Powering your performance

Perform-Tools. Powering your performance Perform-Tools Powering your performance Perform-Tools With Perform-Tools, optimizing Microsoft Dynamics products on a SQL Server platform never was this easy. They are a fully tested and supported set

More information

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta

More information

Leveraging Virtualization for Disaster Recovery in Your Growing Business

Leveraging Virtualization for Disaster Recovery in Your Growing Business Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster

More information

Managed Services - A Paradigm for Cloud- Based Business Continuity

Managed Services - A Paradigm for Cloud- Based Business Continuity Managed Services - A Paradigm for Cloud- Based Business Continuity Ron McCracken IBM 6 February 2013 Session Number 12993 Agenda This session is intended to expose key requirements for support of enterprise

More information

An Oracle White Paper May 2013. Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices

An Oracle White Paper May 2013. Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices An Oracle White Paper May 2013 Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices Introduction... 1 Component Overview... 2 Sizing Hardware Requirements... 3 Audit Vault Server Sizing...

More information

Cisco Application Networking for BEA WebLogic

Cisco Application Networking for BEA WebLogic Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Optimizing Storage for Better TCO in Oracle Environments. Part 1: Management INFOSTOR. Executive Brief

Optimizing Storage for Better TCO in Oracle Environments. Part 1: Management INFOSTOR. Executive Brief Optimizing Storage for Better TCO in Oracle Environments INFOSTOR Executive Brief a QuinStreet Excutive Brief. 2012 To the casual observer, and even to business decision makers who don t work in information

More information

Backup and Disaster Recovery Software for Microsoft Windows Servers

Backup and Disaster Recovery Software for Microsoft Windows Servers Backup and Disaster Recovery Software for Microsoft Windows Servers Five Strategic Considerations Investment Protection For many companies, the life-blood of their business is corporate data. Protecting

More information

Open Text Archive Server and Microsoft Windows Azure Storage

Open Text Archive Server and Microsoft Windows Azure Storage Open Text Archive Server and Microsoft Windows Azure Storage Whitepaper Open Text December 23nd, 2009 2 Microsoft W indows Azure Platform W hite Paper Contents Executive Summary / Introduction... 4 Overview...

More information

Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011

Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Executive Summary Large enterprise Hyper-V deployments with a large number

More information

VERITAS Volume Replicator in an Oracle Environment

VERITAS Volume Replicator in an Oracle Environment VERITAS Volume Replicator in an Oracle Environment Introduction Remote replication of online disks and volumes is emerging as the technique of choice for protecting enterprise data against disasters. VERITAS

More information

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key

More information

Data Backup Options for SME s

Data Backup Options for SME s Data Backup Options for SME s As an IT Solutions company, Alchemy are often asked what is the best backup solution? The answer has changed over the years and depends a lot on your situation. We recognize

More information

courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview f5 networks P

courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview f5 networks P courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview Business Continuity, Disaster Recovery and Data Center Consolidation IT managers today must be ready for the

More information

Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity

Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity task is resuming business critical operations. Having

More information

RFP-MM-1213-11067 Enterprise Storage Addendum 1

RFP-MM-1213-11067 Enterprise Storage Addendum 1 Purchasing Department August 16, 2012 RFP-MM-1213-11067 Enterprise Storage Addendum 1 A. SPECIFICATION CLARIFICATIONS / REVISIONS NONE B. REQUESTS FOR INFORMATION Oracle: 1) What version of Oracle is in

More information

CA Virtual Assurance/ Systems Performance for IM r12 DACHSUG 2011

CA Virtual Assurance/ Systems Performance for IM r12 DACHSUG 2011 CA Virtual Assurance/ Systems Performance for IM r12 DACHSUG 2011 Happy Birthday Spectrum! On this day, exactly 20 years ago (4/15/1991) Spectrum was officially considered meant - 2 CA Virtual Assurance

More information

Four Steps to Disaster Recovery and Business Continuity using iscsi

Four Steps to Disaster Recovery and Business Continuity using iscsi White Paper Four Steps to Disaster Recovery and Business Continuity using iscsi It s a fact of business life physical, natural, and digital disasters do occur, and they interrupt operations and impact

More information

SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH EQUALLOGIC AUTO-SNAPSHOT MANAGER

SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH EQUALLOGIC AUTO-SNAPSHOT MANAGER WHITE PAPER SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH EQUALLOGIC AUTO-SNAPSHOT MANAGER MANAGEMENT SERIES Business critical applications depend on Relational Database Management Systems (RDBMS)

More information