Publication Date: April 2007

Size: px
Start display at page:

Download "Publication Date: April 2007"

Transcription

1 white paper Boost Block-level Replication with GoldenGate s TDM Technology for 100% Business Continuity Publication Date: April 2007 Abstract: Recent natural disasters and government regulations have created a new demand for business continuity solutions. Many vendors have offered a variety of technologies for disaster recovery that focus on recovering data after a disaster i.e. physical disruptions but not necessarily enabling companies to prevent an interruption to their business when a logical disruption such as a human error occurs. To have continuous operations for critical business applications, companies need solutions that can handle interruptions caused by physical and logical failures. This paper describes the two leading business continuity solutions: block level data replication and Transactional Data Management (TDM). It evaluates how they complement each other in creating a solid and complete business continuity solution that enables not only disaster recovery, but also high availability (HA) of mission critical systems.

2 white paper: BOOST BLOCK-LEVEL REPLICATION WITH GOLDENGATE Table of Contents Section Page Number BUSINESS CONTINUITY VS. DISASTER RECOVERY BUILDING A COMPLETE BUSINESS CONTINUITY SOLUTION ) Business considerations ) Technical requirements BLOCK LEVEL REPLICATION TRANSACTIONAL DATA MANAGEMENT COMPARISON OF TECHNOLOGIES IN HANDLING DIFFERENT FAILURES Data storage hardware failure without data corruption Data storage hardware failure with data corruption System failure without data corruption System failure with data corruption Human error or application error creating data corruption Planned outages Performance problems due to overhead on production system CONCLUSION ABOUT GOLDENGATE SOFTWARE CONTACT INFORMATION

3 BUSINESS CONTINUITY VS. DISASTER RECOVERY The disruptive events companies have experienced in the recent years including power blackouts, hurricanes, tsunamis, along with new government regulations such as Sarbanes Oxley, compelled businesses to make business continuity planning a priority. Many companies have deployed disaster recovery solutions that focus on recovering their data after a disaster or a disruptive event occurs. Business continuity, however, is a broader term that includes strict requirements for high availability of systems and data files i.e. the ability to operate within acceptable criteria under a wide variety of damaging conditions or interruptions. While disaster recovery technologies aim to decrease mean time to recover (MTTR) in case of a physical failure, high availability solutions aim to maximize mean time to fail (MTTF). Since a typical business experiences interruptions approximately fifty percent 1 of the time due to human errors rather than large disasters, it is critical for companies to have a solid high availability technology to implement a complete business continuity solution. A high availability solution should be able to support the business in any of the three possible availability issues from the perspective of end-users: 1. Unplanned outages: These are the interruptions caused by system failures such as a power outage that stops all systems. Disaster recovery solutions focus on these unplanned outages, where the company can only react after it happens. 2. Planned outages: Planned outages happen when moving from one system to another, maintaining an existing system or upgrading it to the next version. During this time, end-users are not able to use the system and it interrupts the business operations that rely on this system. Most of the time businesses select times when the outage will cause minimum impact on the company. However, for mission-critical systems there is never an ideal time in which a business can afford not having the system available. For example, hospital medical systems that patients depend on for sustaining life are mission-critical systems and the hospital cannot afford to allow them to go down for even ten minutes on a weekend night. 3. Active state performance issues: Systems that are overloaded with a large number of users or stressed with high processing demands can experience performance issues even though all the underlying components are up and running. In such instances, end users may experience significant delays in response times, even receive error messages. These types of interruptions not only slow the business, but make end-users dissatisfied, resulting in retention issues and possible revenue loss when customers are the end users. For example, if an ATM system of a retail bank is slow and the users receive error messages that say the system cannot process the request at that time, it will negatively impact the customer s personal experience with the bank and may lead them to switch banks if repeat issues occur. Business continuity plans should address all of these three availability issues to make certain end users have access to the critical applications under any circumstances including maintenance and upgrades, as well as when the transaction volumes or processing requirements increase. 1 D. Patterson et al. Recovery Oriented Computing (ROC): Motivation, Definition, Techniques, and Case Studies, UC Berkeley Technical Report UCB//CSD , March 2002.

4 white paper: BOOST BLOCK-LEVEL REPLICATION WITH GOLDENGATE BUILDING A COMPLETE BUSINESS CONTINUITY SOLUTION There are various technologies available to support business continuity of key applications, each with different levels of expected availability, recovery time objectives 2 (RTO) and recovery point objectives 3 (RPO). When building a complete business continuity solution IT organizations should evaluate not only the technical fit of the solution but also how it supports the business requirements. 1) Business considerations Certainly, not every application and its data is equally important to invest in maximum availability and fastest recovery times. For example, an online retail company can afford to have its human resource systems to be down for a day or two, or lose employee contact information, which can be easily replaced. However, it cannot have its order management system down. Similarly, it cannot afford to lose its customers order data since it would be almost impossible to replace all of them and would cause significant revenue loss. For many mission critical applications recovery time and recovery point objectives are very strict due to their crucial impact on the day-to-day, revenue generating operations. IT organizations should work with business groups to identify which applications are the ones that need the best investment for ensuring high availability and very granular data recovery points, and which applications can use the technologies that are less strict in availability and recovery objectives. As shown below on Chart 1 there are four categories of importance that an application and related data can fall into: critical, essential, important and normal. Working with business owners, IT organizations should assign recovery time and recovery point objectives for each application to help with selecting the right technology. In addition, IT teams should determine the cost of downtime and data loss for each application. With that information they can find out the expected return on investment by comparing the cost of different business continuity technologies to possible downtime scenarios when these technologies are not deployed. Another critical business consideration is service level agreements (SLA). If certain applications availability is directly or indirectly linked to meeting SLAs, those requirements should be considered when choosing a business continuity solution for applications. Chart 1: Matching Data Classification to Recovery Objectives RTO RPO 0 3 Sec Financial Services Healthcare Systems Critical Online Trading E-Commerce 10 Min 1 Hr 3 Sec 10 Min Call Centers Mail Services Essential Supply Chain Website 1 Hr 1 Day 10 Min 1 Day Information Billing Important Sales Analysis 1 Day 1 Day 1 Week HR Syste Finan Normal Historical Data 1 Day 2 Recovery time objective defines acceptable duration of outage 3 Recovery point objective defines maximum age of acceptable data after recovery

5 2) Technical requirements After identifying the business requirements, IT organizations should evaluate the applications at hand from a technical perspective. These considerations include: Source system performance: Does the HA solution create any overhead on the source system? Application I/O: What are the peak times for the source system? How do they impact other systems? Network limitations: Does the solution require additional bandwidth? Target database preferences: Does the solution support data movement only between similar systems and can the target database be actively used? Fail back strategy: How easy and fast does it fail back? Geographical distance: Are there any physical distance requirements for the back-up system? If so, what is the minimum distance requirement? BLOCK LEVEL REPLICATION Block level replication technology has been offered by a wide selection of vendors addressing disaster recovery requirements. Block level replication terminology is used for these solutions due to the fact that they replicate each block of data in the hard drive to a remote copy. This technology category is also further grouped into controller-based replication 4 and host-based replication 5 : Controller-based solutions create in-box clones, or snapshots of data, without using storage area network (SAN) or server resources. This technology creates copies of the source database byte-by-byte over limited or extended distances using synchronous and asynchronous modes of replication, respectively. Host based solutions replicate data from one server to another, using various methodologies, including file-write-based replication, disk-volume-based replication and database-log-based replication. In general, server-based replication requires near-identical software on each server. Block level replications tools have several advantages that have made them popular in disaster recovery space: Available in many different flavors, from a wide selection of vendors Provide fast recovery from hardware failures Replicate non-structured data and files as well Require minimal configuration depending on implementation Can be on cheaper hardware Create low overhead on the database 4 Also called array-based replication 5 Also called server-based replication

6 white paper: BOOST BLOCK-LEVEL REPLICATION WITH GOLDENGATE However, block level replication solutions have also disadvantages, including: High total cost of ownership (TCO) due to vendor dependencies Target machine cannot be accessed with controller-based replication 6 Distance constraints Cannot guarantee transactional data integrity Cannot provide granular RPO/point-in-time recovery Replicates the failure cause block-level problem or data corruption to the target database as well Requires significantly more bandwidth due to replicating all blocks Has to be implemented across identical systems Requires labor intensive and time consuming failover and recovery TRANSACTIONAL DATA MANAGEMENT Transactional data management (TDM) technology moves high volumes of transactional data across heterogeneous IT environments with sub-second latency, guaranteed accuracy, reliability, and integrity. TDM technology is not intrusive. The software reads the transaction logs of the source database and moves the changed data only after the transaction is committed. Because TDM moves data at the business transaction level, rather than copying disk blocks, and has dynamic rollback capabilities it enables high availability in the event of logical failures such as human errors. TDM fits well to improve the availability of mission-critical data due to its several unique strengths: Enables immediate failover to a secondary system. Also provides dual-active HA solutions Allows active use of the target database for writing via bi-directional data movement or for read-only activities, including real-time reporting Creates no overhead on source systems Does not have any distance constraints Moves transactional data in real-time Supports heterogeneous database systems which allows secondary systems to be on lower-cost platforms from different vendors Provides very granular point-in-time recovery Preserves transactional integrity by moving only committed transactions In addition to improving availability for mission-critical systems, TDM provides data integration capabilities that support data warehousing or real-time reporting. 6 Applies to majority of the technologies in this category

7 COMPARISON OF TECHNOLOGIES IN HANDLING DIFFERENT FAILURES When we compare these two separate technologies and their combination based on their effectiveness in enabling high availability and disaster recovery for different types of failure and interruption scenarios, we see that each have their own strength areas and complement each other in creating a complete business continuity solution. Data storage hardware failure without data corruption As shown on the table on the next page, block level replication tools are effective in handling physical disruptions such as disk corruption. Because these solutions replicate each byte in a disk to another disk, if the first disk cannot be read, the secondary one will be available for the users. If there is a physical damage to the primary site, a secondary, nearby site can be used to continue operations after bringing up the secondary database. Block level replication solutions are also an important investment to recover unstructured data such as image files. Because they can copy any byte in a disk, the users can have a mirrored copy of their unstructured data in another storage location. While TDM solutions do not support unstructured data, in the event of a physical damage to one site, a secondary site with up-to-date transactional data will be immediately available for failover. Data storage hardware failure with data corruption If a physical disruption such as a disk failure creates data corruption and shuts down the database management system, it can take anywhere from 30 minutes to hours to bring the system back online. Because an improper shutdown puts the database management system into recovery mode, it cannot be mounted immediately. During this recovery state, users cannot access it. In addition, because a block level replication tool copies each byte on the disk, it will also copy the faulty data to the target database. Hence, recovering the corrupted data will require significant effort and time. In many cases recovery teams will lose the data since the last snapshot or archive file. Because TDM does not replicate byte by byte, but only the committed transactions, the data corruption on one of the disks would not be transferred to the other database. The recovery team can switch over to the secondary database immediately since its data is not corrupt. They can then focus on understanding the failure and data corruption in the primary database. The TDM solution also allows two active databases to support a mission-critical system with bidirectional, real-time data movement between heterogeneous databases. It detects loops automatically and prevents the bi-directional movement from creating a continuous loop of the same data between databases. If one database goes down due to the data corruption, the other one can continue to support the system without any downtime. System failure without data corruption When the database shuts down improperly, restarting can be time consuming even if there is no data corruption. As mentioned above, the database system will be in recovery mode and will not be accessible. If the user wants to failover to the target system, that process will also be time consuming. After the secondary (target) system is set as the primary, it will be coming up slow, because it lacks the required files in its cache. With the TDM solution, the recovery team can switch over to the secondary database immediately. After the first database restarts, TDM s internal checkpoints will show which transactions were not applied to the first database. Using TDM solution s trail files which store all the changed data in a transportable format users can deliver new transactions to the first database and update it to a current state.

8 white paper: BOOST BLOCK-LEVEL REPLICATION WITH GOLDENGATE Table: Comparison of Technologies In Handling Different Failures or Interruptions Failure/Interruption type Scope Block level Replication Database storage hardware failure (structured data no data corruption) (such as EMC SRDF, Hitachi TruCopy, NetApp Snapmirror, Veritas Volume Replicator) Transactional Data Management (GoldenGate Software) Combined Solution: Block level replication & TDM HA DR 1 2 Database storage hardware failure (unstructured data no data corruption) Database storage hardware failure (with structured data corruption) Database system/os failure (without data corruption) Database system/os failure (with data corruption) Human error/ Application error (e.g. deleting data) Planned outage (migration, upgrade, maintenance) Performance problems due to overhead on production system HA DR HA DR HA DR HA DR 3 2 HA DR HA HA = Very effective in handling the failure scenario 1: In-flight transactions may be lost = Somewhat effective in handling the failure scenario = Not effective in handling the failure scenario 2: If block level replication stores the trail files of GoldenGate s TDM solution, there will be no loss of data when solutions are combined. 3: May permanently lose data since the last snapshot 4: During the restart few minutes of data may be lost

9 System failure with data corruption Replicating every byte of the database can be detrimental to availability and recovery also if there is a data corruption due to a system failure. When there are two corrupt instances of databases, a failover to the target system will require a significant amount of time and effort. In many cases, IT teams will have to use an outdated snapshot of the database to be able to recover from the disruption. This will result in the company losing data since the last snapshot or the archive file was created. As described above, TDM captures transactions from transaction logs. Because it looks for committed transactions it will not move a transaction to a secondary database if it contains corrupted data. After a database crash, the TDM solution provides a target database to which the application can switch. Once the primary database is up and running, TDM s internal checkpoints show the last transaction the primary database received and the delivery mechanism closes the gap between two databases using TDM s trail files. Human error or application error creating data corruption If a user or a faulty application logic e.g. a software bug creates data corruption, block level replication tools will copy the faulty data to the target database. Because both database copies will have incorrect data, failover to the target database will be futile. Recovery teams will need to use other tools to be able to fix the data corruption and restore the database. In this scenario, the database may lose the data since the last snapshot or archive file. On the other hand, TDM technology s dynamic rollback capability enables the users to reverse any unwanted action via the trail files which store all the change data operations. For example, if the data corruption happened because a user deleted the customer list from the database, the TDM solution would first move that changed data i.e. the delete command for those customers to the target database. As soon as the error is noticed the user can find the erroneous delete command in TDM solution s trail files. The user can change that command right in the trail file in a way that it will fix the data corruption problem i.e. by changing the delete operation back to an insert of those customer names. The bi-directional TDM solution can reverse specific commands and apply them to the source database to remove the related issue. As a result, the business can continue to use the source database with complete and correct data. Planned outages In addition to logical disruptions, TDM allows high availability when a system migration or upgrade or maintenance is needed. For example, a database migration team can install a new database and then associate it as the target to the primary database so that the TDM software keeps it up-to-date with the changes that happen to the primary one. The team can then switch the system to the target (new) database, while the primary (old) database becomes the target for the new database in case a problem occurs requiring the team to switch back to the old one. Having these two heterogeneous databases in-synch enables a migration to a new database with zero downtime. Block level replication solutions cannot recover from unplanned outages without data loss, because they do not support bi-directional data movement. Performance problems due to overhead on production system Because block level replication tools are designed specifically for disaster recovery purposes, the secondary system cannot be accessed by end-users unless snapshots are mounted as point-in-time images of the data. However, TDM solutions allow the secondary system to be actively utilized for both read and write activities. Many businesses with TDM solutions use the target database for load balancing in addition to real-time reporting. When the production system is overloaded with many read-only queries, a secondary database with real-time updates from the primary system can be assigned for read-only activities, offloading the primary system and significantly improving performance.

10 white paper: BOOST BLOCK-LEVEL REPLICATION WITH GOLDENGATE All these different scenarios show us that these two technologies have their pros and cons in different types of disruptions. While block level replication has advantages in handling unstructured data and physical disruption related recoveries, TDM solutions are highly effective in handling logical corruptions. TDM solutions allow for immediate failover and HA, keeping business application running while repair is done on the primary systems. In addition, TDM technology offers solutions beyond HA its real-time data integration capabilities can be used for real-time business intelligence in data warehousing and reporting. The solution enables businesses to access mission-critical data from multiple, heterogeneous systems in real time. When combined these complementing technologies form a very strong and complete business continuity solution that enables high availability during physical or logical failures for both structured and unstructured data. CONCLUSION Disaster recovery investments are only a component of business continuity planning. High availability solutions for mission-critical transactional data play a very critical role in enabling continuous operations. Business continuity planning requires a thorough analysis of existing data. Identifying requirements for acceptable down times and acceptable data loss enables a business to find the right type of solution for each application. With many mature products available today in the market, block level replication solutions are a good fit for recovering non-mission critical, structured or unstructured data from physical disruptions. For mission-critical transactional data that impacts day-to-day operations, high availability and transactional integrity are vital for business health. Therefore companies should deploy a TDM solution for those systems that contain mission critical transactional data. Given the complementary protection strengths associated with different types of failures, block level replication solutions and TDM solutions offer a combined solution that provides a complete business continuity solution that enables high availability in all major failure or interruption cases. 10

11 ABOUT GOLDENGATE SOFTWARE GoldenGate Software, Inc. is the market leader in Transactional Data Management (TDM). GoldenGate s solutions enable customers to effectively maximize the performance, accessibility, and availability of the transactional data that drives their mission-critical business applications. Providing technologies for capturing, transforming, routing, delivering, and verifying data transactions in real-time and across major databases, GoldenGate helps organizations mitigate risk, reduce costs and increase revenues. Fortune 500 companies leverage GoldenGate solutions to manage critical initiatives for high availability/disaster recovery and real-time data integration. A privately held company, GoldenGate s more than 300 customers worldwide include Visa, Bank of America, US Bank, UBS, Sabre Holdings, DirecTV, Comcast, Federated Investors, Mayo Foundation and Overstock.com. GoldenGate broadens its global market reach through key relationships with leading application and infrastructure vendors including ACI Worldwide, Business Objects, Amdocs, Eclipsys, GE Healthcare, HP, IBM, Ingres, Oracle, Teradata, and others. 11

12 CONTACT INFORMATION Corporate Headquarters: GoldenGate Software, Inc. 301 Howard Street San Francisco, CA USA Tel: For a list of worldwide offices and for more company information, please visit: 12

Disaster Recovery for Oracle Database

Disaster Recovery for Oracle Database Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches

More information

High Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper

High Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper High Availability with Postgres Plus Advanced Server An EnterpriseDB White Paper For DBAs, Database Architects & IT Directors December 2013 Table of Contents Introduction 3 Active/Passive Clustering 4

More information

Ensuring High Availability for Critical Systems and Applications

Ensuring High Availability for Critical Systems and Applications Ensuring High Availability for Critical Systems and Applications Using SharePlex to Ensure Your Oracle Databases Are Always Up and Running Bill Brunt, Product Manager, Dell Software Abstract Keeping business

More information

Business Continuity: Choosing the Right Technology Solution

Business Continuity: Choosing the Right Technology Solution Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail

More information

Leveraging the Cloud for Data Protection and Disaster Recovery

Leveraging the Cloud for Data Protection and Disaster Recovery WHITE PAPER: Leveraging the Cloud for Data Protection and Disaster Recovery Leveraging the Cloud for Data Protection and Disaster Recovery Bennett Klein DATA MANAGEMENT CUSTOMER SOLUTIONS MARCH 2012 Table

More information

MySQL Enterprise Backup

MySQL Enterprise Backup MySQL Enterprise Backup Fast, Consistent, Online Backups A MySQL White Paper February, 2011 2011, Oracle Corporation and/or its affiliates Table of Contents Introduction... 3! Database Backup Terms...

More information

Leveraging Virtualization for Disaster Recovery in Your Growing Business

Leveraging Virtualization for Disaster Recovery in Your Growing Business Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster

More information

Technical Considerations in a Windows Server Environment

Technical Considerations in a Windows Server Environment Technical Considerations in a Windows Server Environment INTRODUCTION Cloud computing has changed the economics of disaster recovery and business continuity options. Accordingly, it is time many organizations

More information

Enabling Disaster Recovery Through Data Replication Technology June 7, 2010

Enabling Disaster Recovery Through Data Replication Technology June 7, 2010 Enabling Disaster Recovery Through Data Replication Technology June 7, 2010 Christophe Bertrand, BA (Hons), MBA Roselinda Schulman, CBCP Hitachi Data Systems 2005 Hitachi Data Systems About This Session

More information

EonStor DS remote replication feature guide

EonStor DS remote replication feature guide EonStor DS remote replication feature guide White paper Version: 1.0 Updated: Abstract: Remote replication on select EonStor DS storage systems offers strong defense against major disruption to IT continuity,

More information

BUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g

BUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g BUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g ENABLED BY EMC VMAX 10K AND EMC RECOVERPOINT Technical Presentation EMC Solutions Group 1 Agenda Business case Symmetrix VMAX 10K overview RecoverPoint

More information

DISASTER RECOVERY ebook FACING DISASTERS HEAD ON

DISASTER RECOVERY ebook FACING DISASTERS HEAD ON DISASTER RECOVERY ebook FACING DISASTERS HEAD ON CHAPTER 1: Facing Reality CHAPTER 2: Disaster Recovery Considerations CHAPTER 3: Making the Best Choices CHAPTER 4: A Single, Unified Solution CHAPTER 5:

More information

VERITAS Business Solutions. for DB2

VERITAS Business Solutions. for DB2 VERITAS Business Solutions for DB2 V E R I T A S W H I T E P A P E R Table of Contents............................................................. 1 VERITAS Database Edition for DB2............................................................

More information

RPO represents the data differential between the source cluster and the replicas.

RPO represents the data differential between the source cluster and the replicas. Technical brief Introduction Disaster recovery (DR) is the science of returning a system to operating status after a site-wide disaster. DR enables business continuity for significant data center failures

More information

Using Hitachi Protection Manager and Hitachi Storage Cluster software for Rapid Recovery and Disaster Recovery in Microsoft Environments

Using Hitachi Protection Manager and Hitachi Storage Cluster software for Rapid Recovery and Disaster Recovery in Microsoft Environments Using Hitachi Protection Manager and Hitachi Storage Cluster software for Rapid Recovery and Disaster Recovery in Microsoft Environments Robert Burch, Advanced Technical Consultant Leland Sindt, Principal

More information

Veritas Cluster Server by Symantec

Veritas Cluster Server by Symantec Veritas Cluster Server by Symantec Reduce application downtime Veritas Cluster Server is the industry s leading clustering solution for reducing both planned and unplanned downtime. By monitoring the status

More information

DISASTER RECOVERY STRATEGIES FOR ORACLE ON EMC STORAGE CUSTOMERS Oracle Data Guard and EMC RecoverPoint Comparison

DISASTER RECOVERY STRATEGIES FOR ORACLE ON EMC STORAGE CUSTOMERS Oracle Data Guard and EMC RecoverPoint Comparison DISASTER RECOVERY STRATEGIES FOR ORACLE ON EMC STORAGE CUSTOMERS Oracle Data Guard and EMC RecoverPoint Comparison Document Control Change Record 3 Date Author Version Change Reference 15-Aug-2007 Ravi

More information

DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES

DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES Dejan Živanović EMC Technology Solutions Group SEE Presales Manager Dejan.Zivanovic@emc.com 1 The Business Maturity Model V Enabled Web

More information

HA / DR Jargon Buster High Availability / Disaster Recovery

HA / DR Jargon Buster High Availability / Disaster Recovery HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster

More information

The Secret to Affordably Protecting Critical Data

The Secret to Affordably Protecting Critical Data The Secret to Affordably Protecting Critical Data Using StoneFly Backup Advantage All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc.

More information

Microsoft Cross-Site Disaster Recovery Solutions

Microsoft Cross-Site Disaster Recovery Solutions Microsoft Cross-Site Disaster Recovery Solutions End-to-End Solutions Enabled by Windows 2008 Failover Clustering, Hyper-V, and Partner Solutions for Data Replication Published: December 2009 Introduction:

More information

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models 1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint

More information

Redefining Oracle Database Management

Redefining Oracle Database Management Redefining Oracle Database Management Actifio PAS Specification A Single Solution for Backup, Recovery, Disaster Recovery, Business Continuity and Rapid Application Development for Oracle. MAY, 2013 Contents

More information

Database Storage Management with Veritas Storage Foundation by Symantec Manageability, availability, and superior performance for databases

Database Storage Management with Veritas Storage Foundation by Symantec Manageability, availability, and superior performance for databases Database Storage Management with Veritas Storage Foundation by Symantec Manageability, availability, and superior performance for databases Solution Brief: Database Storage Management Database Storage

More information

SnapManager 5.0 for Microsoft Exchange Best Practices Guide

SnapManager 5.0 for Microsoft Exchange Best Practices Guide NETAPP TECHNICAL REPORT SnapManager 5.0 for Microsoft Exchange s Guide Shannon Flynn, NetApp November 2008 TR-3730 Table of Contents 1 EXECUTIVE SUMMARY... 3 1.1 PURPOSE AND SCOPE... 3 1.2 INTENDED AUDIENCE...

More information

System Migrations Without Business Downtime. An Executive Overview

System Migrations Without Business Downtime. An Executive Overview System Migrations Without Business Downtime An Executive Overview Businesses grow. Technologies evolve. System migrations may be inevitable, but business downtime isn t. All businesses strive for growth.

More information

Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options

Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware

More information

Disaster Recovery of Tier 1 Applications on VMware vcenter Site Recovery Manager

Disaster Recovery of Tier 1 Applications on VMware vcenter Site Recovery Manager Disaster Recovery of Tier 1 Applications on VMware vcenter Site Recovery Manager This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by

More information

An Oracle White Paper March 2014. Best Practices for Real-Time Data Warehousing

An Oracle White Paper March 2014. Best Practices for Real-Time Data Warehousing An Oracle White Paper March 2014 Best Practices for Real-Time Data Warehousing Executive Overview Today s integration project teams face the daunting challenge that, while data volumes are exponentially

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

Achieve Continuous Computing for Mainframe Batch Processing. By Hitachi Data Systems and 21st Century Software

Achieve Continuous Computing for Mainframe Batch Processing. By Hitachi Data Systems and 21st Century Software Achieve Continuous Computing for Mainframe Batch Processing By Hitachi Data Systems and 21st Century Software February 2016 Contents Executive Summary... 2 Introduction... 3 Difficulties in Recovering

More information

EMC RECOVERPOINT FAMILY

EMC RECOVERPOINT FAMILY EMC RECOVERPOINT FAMILY Cost-effective local and remote data protection and disaster recovery solution ESSENTIALS Maximize application data protection and disaster recovery Protect business applications

More information

Veritas InfoScale Availability

Veritas InfoScale Availability Veritas InfoScale Availability Delivers high availability and disaster recovery for your critical applications Overview protects your most important applications from planned and unplanned downtime. InfoScale

More information

Pervasive PSQL Meets Critical Business Requirements

Pervasive PSQL Meets Critical Business Requirements Pervasive PSQL Meets Critical Business Requirements Pervasive PSQL White Paper May 2012 Table of Contents Introduction... 3 Data Backup... 3 Pervasive Backup Agent... 3 Pervasive PSQL VSS Writer... 5 Pervasive

More information

CA XOsoft Replication and CA XOsoft High Availability CA Partner Frequently Asked Questions

CA XOsoft Replication and CA XOsoft High Availability CA Partner Frequently Asked Questions Q1. What do the terms Replication and High Availability mean? A. In the context of these two products, replication refers to the process of copying all application data from one server to another over

More information

Veritas Cluster Server from Symantec

Veritas Cluster Server from Symantec Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

How to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems

How to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems W H I T E P A P E R How to Manage Critical Data Stored in Microsoft Exchange Server 2010 By Hitachi Data Systems April 2012 2 Table of Contents Executive Summary and Introduction 3 Mission-critical Microsoft

More information

PROTECTING MICROSOFT SQL SERVER TM

PROTECTING MICROSOFT SQL SERVER TM WHITE PAPER PROTECTING MICROSOFT SQL SERVER TM Your company relies on its databases. How are you protecting them? Published: February 2006 Executive Summary Database Management Systems (DBMS) are the hidden

More information

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many

More information

Remote Copy Technology of ETERNUS6000 and ETERNUS3000 Disk Arrays

Remote Copy Technology of ETERNUS6000 and ETERNUS3000 Disk Arrays Remote Copy Technology of ETERNUS6000 and ETERNUS3000 Disk Arrays V Tsutomu Akasaka (Manuscript received July 5, 2005) This paper gives an overview of a storage-system remote copy function and the implementation

More information

Improving Microsoft SQL Server Recovery with EMC NetWorker and EMC RecoverPoint

Improving Microsoft SQL Server Recovery with EMC NetWorker and EMC RecoverPoint Improving Microsoft SQL Server Recovery with EMC NetWorker and EMC RecoverPoint Applied Technology Abstract This white paper covers how EMC NetWorker and EMC NetWorker modules can be used effectively in

More information

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper Connectivity Alliance Access 7.0 Database Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Database Loss Business Impact... 6 2.2 Database Recovery

More information

CA XOsoft Replication r12.5 and CA XOsoft High Availability r12.5

CA XOsoft Replication r12.5 and CA XOsoft High Availability r12.5 FREQUENTLY ASKED QUESTIONS: CA XOSOFT REPLICATION AND CA XOSOFT HIGH AVAILABILITY CA XOsoft Replication r12.5 and CA XOsoft High Availability r12.5 Q: What are CA XOsoft Replication and CA XOsoft High

More information

SOLUTION BRIEF: KEY CONSIDERATIONS FOR DISASTER RECOVERY

SOLUTION BRIEF: KEY CONSIDERATIONS FOR DISASTER RECOVERY SOLUTION BRIEF: KEY CONSIDERATIONS FOR DISASTER RECOVERY A Disaster Recovery and Business Continuity plan is specific to the circumstances, priorities and expense versus the value decisions of the organization,

More information

Windows Geo-Clustering: SQL Server

Windows Geo-Clustering: SQL Server Windows Geo-Clustering: SQL Server Edwin Sarmiento, Microsoft SQL Server MVP, Microsoft Certified Master Contents Introduction... 3 The Business Need for Geo-Clustering... 3 Single-location Clustering

More information

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper Connectivity Alliance 7.0 Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Loss Business Impact... 6 2.2 Recovery Tools... 8 3 Manual Recovery Method...

More information

Veritas Storage Foundation High Availability for Windows by Symantec

Veritas Storage Foundation High Availability for Windows by Symantec Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability

More information

WHITE PAPER ENHANCING YOUR SQL REPORTING SERVICES DEPLOYMENT WITH DOUBLE-TAKE

WHITE PAPER ENHANCING YOUR SQL REPORTING SERVICES DEPLOYMENT WITH DOUBLE-TAKE WHITE PAPER ENHANCING YOUR SQL REPORTING SERVICES DEPLOYMENT WITH DOUBLE-TAKE Published: May 2006 Executive Summary Database Management Systems (DBMS) are the hidden engines behind some of a company's

More information

Oracle Active Data Guard

Oracle Active Data Guard Oracle Active Data Guard Real-Time Data Protection and Availability ORACLE WHITE PAPER OCTOBER 2015 Table of Contents Introduction 1 Oracle Active Data Guard An Overview 2 How Data Guard Synchronizes Standby

More information

IMPROVING MICROSOFT EXCHANGE SERVER RECOVERY WITH EMC RECOVERPOINT

IMPROVING MICROSOFT EXCHANGE SERVER RECOVERY WITH EMC RECOVERPOINT White Paper IMPROVING MICROSOFT EXCHANGE SERVER RECOVERY WITH EMC RECOVERPOINT Applied Technology Abstract This white paper outlines the challenges faced by Microsoft Exchange administrators in managing

More information

Implementing Disaster Recovery? At What Cost?

Implementing Disaster Recovery? At What Cost? Implementing Disaster Recovery? At What Cost? Whitepaper Viktor Babkov Technical Director Business Continuity Copyright Business Continuity May 2010 In today s environment, minimizing IT downtime has become

More information

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper Copyright 2011-2012 Dbvisit Software Limited. All Rights Reserved v2, Mar 2012 Contents Executive Summary... 1

More information

High availability and disaster recovery with Microsoft, Citrix and HP

High availability and disaster recovery with Microsoft, Citrix and HP High availability and disaster recovery White Paper High availability and disaster recovery with Microsoft, Citrix and HP Using virtualization, automation and next-generation storage to improve business

More information

Symantec Cluster Server powered by Veritas

Symantec Cluster Server powered by Veritas Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

EMC NETWORKER SNAPSHOT MANAGEMENT

EMC NETWORKER SNAPSHOT MANAGEMENT White Paper Abstract This white paper describes the benefits of NetWorker Snapshot Management for EMC Arrays. It also explains the value of using EMC NetWorker for snapshots and backup. June 2013 Copyright

More information

ABSTRACT. February, 2014 EMC WHITE PAPER

ABSTRACT. February, 2014 EMC WHITE PAPER EMC APPSYNC SOLUTION FOR MANAGING PROTECTION OF MICROSOFT SQL SERVER SLA-DRIVEN, SELF-SERVICE CAPABILITIES FOR MAXIMIZING AND SIMPLIFYING DATA PROTECTION AND RECOVERABILITY ABSTRACT With Microsoft SQL

More information

NetApp SnapMirror. Protect Your Business at a 60% lower TCO. Title. Name

NetApp SnapMirror. Protect Your Business at a 60% lower TCO. Title. Name NetApp SnapMirror Protect Your Business at a 60% lower TCO Name Title Disaster Recovery Market Trends Providing disaster recovery remains critical Top 10 business initiative #2 area for storage investment

More information

Business Continuity and Disaster Recovery Workbook: Determining Business Resiliency It s All About Recovery Time

Business Continuity and Disaster Recovery Workbook: Determining Business Resiliency It s All About Recovery Time Business Continuity and Disaster Recovery Workbook: Determining Business Resiliency It s All About Recovery Time Introduction This is the third of a series of best practices workbooks designed to familiarize

More information

Storage Based Replications

Storage Based Replications Storage Based Replications Miroslav Vraneš EMC Technology Group miroslav.vranes@emc.com 1 Protecting Information Is a Business Decision Recovery point objective (RPO): How recent is the point in time for

More information

Sanovi DRM for Oracle Database

Sanovi DRM for Oracle Database Application Defined Continuity Sanovi DRM for Oracle Database White Paper Copyright@2012, Sanovi Technologies Table of Contents Executive Summary 3 Introduction 3 Audience 3 Oracle Protection Overview

More information

IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity

IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity Simplifying storage processes and ensuring business continuity and high availability IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity The risks are even greater for companies that

More information

Complete Online Microsoft SQL Server Data Protection

Complete Online Microsoft SQL Server Data Protection WHITE PAPER Complete Online Microsoft SQL Server Data Protection VERITAS BACKUP EXEC TM 10 FOR WINDOWS SERVERS Agent for Microsoft SQL Server SQL Server 7.0 SQL Server 2000 1/17/2005 1 TABLE OF CONTENTS

More information

Contents. SnapComms Data Protection Recommendations

Contents. SnapComms Data Protection Recommendations Contents Abstract... 2 SnapComms Solution Environment... 2 Concepts... 3 What to Protect... 3 Database Failure Scenarios... 3 Physical Infrastructure Failures... 3 Logical Data Failures... 3 Service Recovery

More information

Virtual Infrastructure Security

Virtual Infrastructure Security Virtual Infrastructure Security 2 The virtual server is a perfect alternative to using multiple physical servers: several virtual servers are hosted on one physical server and each of them functions both

More information

STORAGE CENTER. The Industry s Only SAN with Automated Tiered Storage STORAGE CENTER

STORAGE CENTER. The Industry s Only SAN with Automated Tiered Storage STORAGE CENTER STORAGE CENTER DATASHEET STORAGE CENTER Go Beyond the Boundaries of Traditional Storage Systems Today s storage vendors promise to reduce the amount of time and money companies spend on storage but instead

More information

Abstract... 2. Introduction... 2. Overview of Insight Dynamics VSE and Logical Servers... 2

Abstract... 2. Introduction... 2. Overview of Insight Dynamics VSE and Logical Servers... 2 HP Insight Recovery Technical white paper Abstract... 2 Introduction... 2 Overview of Insight Dynamics VSE and Logical Servers... 2 Disaster Recovery Concepts... 4 Recovery Time Objective (RTO) and Recovery

More information

EMC Invista: The Easy to Use Storage Manager

EMC Invista: The Easy to Use Storage Manager EMC s Invista SAN Virtualization System Tested Feb. 2006 Page 1 of 13 EMC Invista: The Easy to Use Storage Manager Invista delivers centrally managed LUN Virtualization, Data Mobility, and Copy Services

More information

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss

More information

Oracle Database Disaster Recovery Using Dell Storage Replication Solutions

Oracle Database Disaster Recovery Using Dell Storage Replication Solutions Oracle Database Disaster Recovery Using Dell Storage Replication Solutions This paper describes how to leverage Dell storage replication technologies to build a comprehensive disaster recovery solution

More information

Snapshot Technology: Improving Data Availability and Redundancy

Snapshot Technology: Improving Data Availability and Redundancy Snapshot Technology: Improving Data Availability and Redundancy. All rights reserved. Table of Contents Introduction...3 Snapshot Overview...3 Functional Description...6 Creating Snapshots...7 Other Snapshot

More information

High Availability Database Solutions. for PostgreSQL & Postgres Plus

High Availability Database Solutions. for PostgreSQL & Postgres Plus High Availability Database Solutions for PostgreSQL & Postgres Plus An EnterpriseDB White Paper for DBAs, Application Developers and Enterprise Architects November, 2008 High Availability Database Solutions

More information

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication

More information

Things You Need to Know About Cloud Backup

Things You Need to Know About Cloud Backup Things You Need to Know About Cloud Backup Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective and reliable method of safeguarding the increasing

More information

Best Practices for Architecting Storage in Virtualized Environments

Best Practices for Architecting Storage in Virtualized Environments Best Practices for Architecting Storage in Virtualized Environments Leverage Advances in Storage Technology to Accelerate Performance, Simplify Management, and Save Money in Your Virtual Server Environment

More information

Application Brief: Using Titan for MS SQL

Application Brief: Using Titan for MS SQL Application Brief: Using Titan for MS Abstract Businesses rely heavily on databases for day-today transactions and for business decision systems. In today s information age, databases form the critical

More information

DISASTER RECOVERY THE DIFFERENCE BETWEEN SUCCESS AND FAILURE FOR SMALL BUSINESSES

DISASTER RECOVERY THE DIFFERENCE BETWEEN SUCCESS AND FAILURE FOR SMALL BUSINESSES DISASTER RECOVERY THE DIFFERENCE BETWEEN SUCCESS AND FAILURE FOR SMALL BUSINESSES BUSINESS VALUE WHITEPAPER Double-Take Software, Inc. Published: October 2006 Abstract Relying on native backup for your

More information

VERITAS Volume Replicator in an Oracle Environment

VERITAS Volume Replicator in an Oracle Environment VERITAS Volume Replicator in an Oracle Environment Introduction Remote replication of online disks and volumes is emerging as the technique of choice for protecting enterprise data against disasters. VERITAS

More information

Best practice: Simultaneously upgrade your Exchange and disaster recovery protection

Best practice: Simultaneously upgrade your Exchange and disaster recovery protection Best practice: Simultaneously upgrade your Exchange and disaster recovery protection March 2006 1601 Trapelo Road Waltham, MA 02451 1.866.WANSync www.xosoft.com Contents The Value Proposition... 1 Description

More information

Virtual Disaster Recovery

Virtual Disaster Recovery Virtual Disaster Recovery White Paper September 16, 2008 Kelly Laughton Davenport Group Consultant Davenport Group 2008. All rights reserved. Introduction Today s data center has evolved into a complex,

More information

Realizing the True Potential of Software-Defined Storage

Realizing the True Potential of Software-Defined Storage Realizing the True Potential of Software-Defined Storage Who should read this paper Technology leaders, architects, and application owners who are looking at transforming their organization s storage infrastructure

More information

Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper

Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper bex30102507wpor Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies Introduction Are you a database administrator

More information

(Formerly Double-Take Backup)

(Formerly Double-Take Backup) (Formerly Double-Take Backup) An up-to-the-minute copy of branch office data and applications can keep a bad day from getting worse. Double-Take RecoverNow for Windows (formerly known as Double-Take Backup)

More information

Creating A Highly Available Database Solution

Creating A Highly Available Database Solution WHITE PAPER Creating A Highly Available Database Solution Advantage Database Server and High Availability TABLE OF CONTENTS 1 Introduction 1 High Availability 2 High Availability Hardware Requirements

More information

Synchronous Data Replication

Synchronous Data Replication S O L U T I O N S B R I E F Synchronous Data Replication Hitachi Data Systems Synchronous Data Replication Business continuity has become one of the top issues facing businesses and organizations all around

More information

DeltaV Virtualization High Availability and Disaster Recovery

DeltaV Virtualization High Availability and Disaster Recovery DeltaV Distributed Control System Whitepaper October 2014 DeltaV Virtualization High Availability and Disaster Recovery This document describes High Availiability and Disaster Recovery features supported

More information

IP Storage On-The-Road Seminar Series

IP Storage On-The-Road Seminar Series On-The-Road Seminar Series Disaster Recovery and Data Protection Page 1 Agenda! The Role of IP in Backup!Traditional use of IP networks for backup! backup capabilities! Contemporary data protection solutions

More information

Four Steps to Disaster Recovery and Business Continuity using iscsi

Four Steps to Disaster Recovery and Business Continuity using iscsi White Paper Four Steps to Disaster Recovery and Business Continuity using iscsi It s a fact of business life physical, natural, and digital disasters do occur, and they interrupt operations and impact

More information

Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric

Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric 2001 San Diego Gas and Electric. All copyright and trademark rights reserved. Importance

More information

Best practices for data migration.

Best practices for data migration. IBM Global Technology Services June 2007 Best practices for data migration. Methodologies for planning, designing, migrating and validating data migration Page 2 Contents 2 Executive summary 4 Introduction

More information

Symantec Storage Foundation High Availability for Windows

Symantec Storage Foundation High Availability for Windows Symantec Storage Foundation High Availability for Windows Storage management, high availability and disaster recovery for physical and virtual Windows applications Data Sheet: High Availability Overview

More information

Server and Storage Virtualization with IP Storage. David Dale, NetApp

Server and Storage Virtualization with IP Storage. David Dale, NetApp Server and Storage Virtualization with IP Storage David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this

More information

Traditional Disaster Recovery versus Cloud based DR

Traditional Disaster Recovery versus Cloud based DR Traditional Disaster Recovery versus Cloud based DR May 2014 Executive Summary Many businesses want Disaster Recovery (DR) services to prevent either man-made or natural disasters from causing expensive

More information

Financial Services Need More than Just Backup... But they don t need to spend more! axcient.com

Financial Services Need More than Just Backup... But they don t need to spend more! axcient.com Financial Services Need More than Just Backup... But they don t need to spend more! axcient.com Introduction Financial institutions need to keep their businesses up and running more than ever now. Considering

More information

Lunch and Learn: Modernize Your Data Protection Architecture with Multiple Tiers of Storage Session 17174, 12:30pm, Cedar

Lunch and Learn: Modernize Your Data Protection Architecture with Multiple Tiers of Storage Session 17174, 12:30pm, Cedar Lunch and Learn: Modernize Your Data Protection Architecture with Multiple Tiers of Storage Session 17174, 12:30pm, Cedar Kevin Horn Principal Product Manager Enterprise Data Protection Solutions March

More information

Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747

Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747 Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747 Introduction Rajesh Gupta - rajgupta@deloitte.com Solution Network

More information

Protecting Microsoft SQL Server

Protecting Microsoft SQL Server Your company relies on its databases. How are you protecting them? Protecting Microsoft SQL Server 2 Hudson Place suite 700 Hoboken, NJ 07030 Powered by 800-674-9495 www.nsisoftware.com Executive Summary

More information

Constant Replicator: An Introduction

Constant Replicator: An Introduction Data Availability Storage Software Constant Replicator: An Introduction Configurations, Applications and Solutions of Constant Replicator A White Paper A Constant Data Technology Document August 2004 Copyright

More information

SQL Server Storage Best Practice Discussion Dell EqualLogic

SQL Server Storage Best Practice Discussion Dell EqualLogic SQL Server Storage Best Practice Discussion Dell EqualLogic What s keeping you up at night? Managing the demands of a SQL environment Risk Cost Data loss Application unavailability Data growth SQL Server

More information

NetApp and Microsoft Virtualization: Making Integrated Server and Storage Virtualization a Reality

NetApp and Microsoft Virtualization: Making Integrated Server and Storage Virtualization a Reality NETAPP TECHNICAL REPORT NetApp and Microsoft Virtualization: Making Integrated Server and Storage Virtualization a Reality Abhinav Joshi, NetApp Chaffie McKenna, NetApp August 2008 TR-3701 Version 1.0

More information

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation Next Generation Data Protection with Symantec NetBackup 7 Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation White Paper: Next Generation Data Protection with NetBackup

More information