Optimizing Protection and Security for IBM i
|
|
|
- Leon Glenn
- 10 years ago
- Views:
Transcription
1 Optimizing Protection and Security for IBM i A WHITE PAPER
2 OPTIMIZING PROTECTION AND SECURITY FOR IBM i ABSTRACT For too long, the standard method of protecting and securing IBM i (AS/400) systems and data has relied on attached tape drives/libraries or connectivity to expensive proprietary disk arrays, resulting in high complexity and cost. By introducing FalconStor Optimized Backup & Deduplication protection in conjunction with Townsend Security software into an IBM i environment, organizations can simplify, optimize, and accelerate backup/recovery and security processes across platforms, while improving operational efficiency and reducing risk and costs. FalconStor protection solutions in conjunction with Townsend Security solutions can provide significant business and technical advantages for IBM i environments, including integration with native backup tools, simplified business continuity via unique bare-metal IPL recovery capabilities, and complete peace of mind knowing your data is not only protected, but secure. CONTENTS Introduction 2 About IBM i 4 Case Study FalconStor Protection for IBM i 8 Benefits for IBM i Environments 12 Sizing Guidelines 13 Summary 14 Additional Resources 16 Optimizing Protection and Security for IBM i 1
3 INTRODUCTION In today s data-driven world, businesses face increased challenges in protecting their vital data from loss, theft, corruption, and disaster. As the amount of data grows, traditional backup solutions still constantly create copies of data for protection and recovery purposes, making data management more costly and complex. Even though tape and disk acquisition costs are lower each year, coping with exponential data growth still remains a significant challenge for most organizations. Ensuring that data is secure and protected should be easy. The fact remains that most organizations still rely on traditional tape-based backup for protecting and securing IBM i systems data. Tapes are created and shipped offsite for recovery in case of disaster, but in many cases, recovery times are unknown and the process may not be thoroughly tested. Data may reside on unencrypted tape and sent offsite, increasing the risk of data theft or loss. In some instances, large and expensive enterprise disk storage arrays may be used to replicate data offsite, requiring costly network bandwidth and expensive storage firmware licenses, increasing overall costs. Tape-based protection is subject to performance limitations and high management complexity, costs, and risk due to manual tape handling, insufficient security, and available offsite recovery capabilities. In addition, the IBM i environment is often isolated from other IT platforms, requiring a dedicated solution that also adds to increased complexity and cost. With FalconStor Optimized Backup & Deduplication solutions, traditional tape-based backup operations are replaced by automated, deduplicated, disk-based protection and recovery. All data sent to the device is immediately deduplicated, encrypted, and electronically vaulted to your DR facility or to the cloud. The FalconStor solution provides the unique ability to IPL directly from the device, eliminating the need to duplicate backups to physical tape. FalconStor provides a complete, integrated solution that improves the speed and performance of IBM i protection and recovery. Security is provided by automatic encryption for data in flight and at rest. The Optimized Backup & Deduplication solution can automate offsite archive to encrypted physical tape if desired. Local and disaster recovery is simplified for file- and system-level recovery by enabling an alternate load source IPL directly from the replicated target. Implementing FalconStor protection enables high-performance recovery and eliminates tape-based backup and transport, while still offering the ability to automate archiving to encrypted physical tape all in one solution that can accommodate all application platforms in the datacenter. When combined with Townsend Security s high performance database encryption, IBM i customers can rest assured that sensitive data is encrypted regardless of where it is stored on tape, on disk, or in the cloud - a simple solution across all platforms at reduced cost. Because FalconStor incorporates its own disk resources, it doesn t require any IBM i storage. This means that there is no impact on internal IBM i disk consumption. The ability of the solution to emulate IBM tape libraries and tape drives, combined with native support for IBM i backup tools, makes it easy for backup administrators to manage the process with little or no operational changes. No additional skillsets are required and all operations and process can continue as normal if desired. The only difference is that backup and restore are faster, data is immediately available locally or offsite for DR recovery, and data recovery is more reliable. Optimizing Protection and Security for IBM i 2
4 Native IBM I support with FalconStor Optimized Backup & Deduplication solutions Immediate business benefits Simplifies backup and disaster recovery operations across all platforms with one solution Provides fast offsite IPL recovery for IBM i systems Makes it possible to retain more data online with less storage via data deduplication Reduces storage and WAN costs by up to 90% for business continuity Streams data quickly to encrypted physical tape as needed for archives Simplified high-performance encryption and isolated key management that provably meet NIST standards Solution can be leveraged as your simple on-ramp to the cloud Optimizing Protection and Security for IBM i 3
5 ABOUT IBM i IBM i (formerly known as i5/os) offers a highly scalable and virus-resistant architecture with a proven reputation for business resiliency. Over the years IBM has transitioned from OS/400 to i5/os to IBM i. When IBM introduced POWER5, OS/400 was renamed i5/os. When the POWER6 platform became available in January 2008, IBM announced a major new release named i5/os V6R1. Later that same year, the name was changed to IBM i to disassociate any presumed dependency on the POWER5 hardware platform. The notations 5.4 and 6.1 were introduced to indicate operating system release levels V5R4 and V6R1. The latest release of IBM i is 7.1, which delivers database, virtualization, storage management, web application serving, and other enhancements that allow clients to reduce cost, improve service, and manage risk of their IT infrastructure. IBM i 7.1 is supported on the following platforms: Power Systems servers and blades with POWER7 processors Power Systems servers and blades with POWER6/6+ processors System i servers with POWER6 processors System i servers with POWER5/5+ processors As a turnkey operating system, IBM i runs on a unified server platform - IBM Power Systems - which can house different logical partitions (LPAR). Each LPAR can then run a version of IBM i. Normally, companies purchase IBM i Standard Edition with the DB2 capability built in, but IBM also offers an IBM i Express Edition option for companies deploying workloads that do not use the DB2 database. In addition to handling data stored in the DB2 relational database, IBM i has an integrated file system that supports storage management of files in a similar way to Microsoft Windows and UNIX operating systems. The integrated file system provides a hierarchical directory structure and management interface to eleven different file systems (including UNIX, Microsoft Windows, and NFS), each with its own set of logical structures and rules for interacting with information in storage. Compared with systems that focus only on their own native file system technology, the integrated file system gives companies much broader flexibility to integrate with a range of open applications from a wide variety of operating environments. IBM i terminology IBM i. IBM operating system. The newest version is 7.1.x. Power Systems. IBM hardware supported by IBM i. This hardware is often partitioned into different local partitions so that different operating systems can run concurrently. RAM and disk is considered part of a single storage pool in an IBM i system and is shared among different logical partitions. IBM i can share I/O feature codes such as network and Fibre Channel (FC). Logical Partition (LPAR). Multiple workloads managed in independent operating system images. Power Systems can be divided into LPARs running a different operating system concurrently. The current operating systems supported in a Power System are IBM i, AIX, and Linux. Feature code. IBM i I/O cards are sometimes known as feature codes. IBM i has FC feature codes dedicated to tape and disk. When connecting to a FalconStor system, a tape-based FC feature code is required. Optimizing Protection and Security for IBM i 4
6 FIELDPROC (Field Procedures). IBM's automatic encryption exit points were introduced in V7R1. Townsend Security provides support for IBM FIELDPROC for strong encryption and isolated key management in a hardware security module (HSM), cloud HSM, virtualized appliance, or in the cloud. Initial Program Load (IPL). The booting process for IBM i. Normal IPL default is to boot from disk, but IPL can be interrupted to boot from an alternative source including tape devices (virtual or physical). This is known as D- IPL or Alternative IPL. IBM i D-IPL functionality is supported by the FalconStor solution. Save/Restore. IBM i has a built-in backup and restore program. The native program provides the ability to write to standalone tape drives and tape libraries. GO SAV and option 21 are often used to perform a full system backup. D-IPL can be used to execute a boot from this backup. All functionality in Save/Restore is supported by the FalconStor solution. Backup Recovery and Media Services (BRMS). Licensed backup software created by IBM that incorporates media management and tape cataloging. Save/Restore does not support media management or tape cataloging. All functionality in BRMS is supported by the FalconStor solution. LXI Media Management System (MMS). Licensed backup software created by LXI that provides media management and tape catalog functionality. MMS is fully supported by the FalconStor solution. Advanced Encryption Standard (AES). The worldwide standard for strong encryption. Townsend Security's AES solution provides the best available performance and is NIST validated to the AES standard. IBM i architecture The IBM i operating environment demonstrates a unique design that delivers innovative technology without complexity. It is a highly integrated, reliable server platform that allows businesses to run multiple operating environments. IBM i dynamically adjusts to the changing requirements of a dynamic business marketplace. IBM i offers an integrated architecture combined with high availability and security levels, simplified management, and mainframe-class technology. One of the key contributing factors to the efficiency of IBM i is the ability to run multiple business processes and applications reliably and securely. In a study of large enterprises using multiple operating systems, IBM found utilization rates on IBM i-based servers were over 10 times higher than Intel processor-based servers and over twice as high as UNIX and other midrangebased systems. (IBM i Data Sheet: IBM i = Efficient, resilient business processing, 2010). The high rate of utilization of Power Systems with IBM i is achieved through the use of a variety of proven virtualization technologies, such as sub-systems (multiple workloads managed in a single operating system image) and IBM PowerVM LPARs. IBM I architecture Optimizing Protection and Security for IBM i 5
7 With LPAR, companies have both the power and flexibility to address multiple system requirements in a single machine to achieve server consolidation, business unit consolidation, a mix of production and test environments, and integrated clusters. LPARs are ideal for companies that want to run varied workloads in a single IBM i system. Licenses can be managed across partitions. Each partition s system name is distinct, and the system values can be set independently. Each partition can have a different primary and secondary national language and can be operated using different time zones. This flexibility is ideal for multinational companies that wish to centralize operations in a single location while retaining the national characteristics of each system. IBM i backup and restore strategies IBM i LPAR IBM I LPAR Although the IBM i is a reliable system, there are certain risks associated with backup. Data that changes often should be backed up daily. System data and data that only changes periodically should be backed up weekly. Data recovered from a site failure, disk failure, or corrupted data cannot be properly restored if it is not saved on a regular and disciplined basis. To define a backup strategy, IBM defines the save window as the amount of time that a system is permitted to be unavailable to users while administrators perform save operations. Backup strategies are defined as simple, medium, or complex. Regardless of your save strategy, your IBM i data will be protected with Townsend Security's AES encryption and NIST FIPS-compliant key management solution. You never have to worry about data loss due to mis-configuration or employee mistakes. All sensitive data remains encrypted, regardless of the Save command or strategy that you use. Simple save strategy. The simple save strategy is used by customers with a long save window, such as an 8-to- 12-hour block of time with no system activity (including batch work) available daily. The simplest save strategy is to save everything every night or during off-shift hours. IBM i has a built-in management option 21 (entire system) that can be scheduled to automatically do these backups. Medium save strategy. A medium save window means that a 4-to-6-hour block of time with no system activity is available daily. Customers may use this strategy if large batch jobs are run on the system at night or large files exceed the save window. The following techniques are used in a medium save strategy: Saving changed objects. Journaling objects and saving the journal receivers. Optimizing Protection and Security for IBM i 6
8 The Save Changed Objects (SAVCHGOBJ) command is used when programs and data files are in the same library. SAVCHGOBJ saves only those files that change. The Save Document Library Object (SAVDLO) command is used to save only the documents and folders that changed. The Save (SAV) command is used to save the objects in directories that have changed since a specific point in time. If save operations for integrated file system objects and data areas are taking too long, a journal of the objects can be used to make operations more efficient. In files with many records, the SAVCHGOBJ command saves the entire file if a single record changes in a file with many records,. Journaling database files and saving journal receivers regularly is a better solution, even though recovery is more complex. A similar principle applies to the integrated file system objects and data areas. Journal objects write a copy of every change in the object to a journal receiver, saving only the changed portions of the object rather than the entire object. Complex save strategy. In instances where there is little or no time to take systems down for interactive or batch work, the complex save strategy must be employed. BRMS is typically implemented in such environments. BRMS is IBM's strategic backup and recovery product for the IBM i. Its policies provide the necessary interface to manage and execute archive, backup, migration, recovery, and other removable-media-related operations. Backups using BRMS are implemented through Control Groups or native BRMS backup commands. Control Groups are analogous to Control Language Programs without the need for programming expertise. They are easier to create/customize/change without having to compile or recompile. BRMS can save libraries, objects, spool files, document library objects, and objects in directories (IFS) within the same control group. Spool files saved using BRMS can be restored with their attributes and overlays intact. For additional information, see Backup Recovery and Media Services for IBM i 7.1 (IBM Online Library SC ). Encryption embedded at the database layer Townsend Security implements support for IBM Field Procedures (FieldProc) in V7R1 of the IBM i operating system. This means that you can always be sure that your archived data is always encrypted when you use native IBM save commands or BRMS. Database fields that are protected with FieldProc are never decrypted as a part of a save process, and will be encrypted on all media. Townsend Security s encryption solution can protect multiple fields (columns) in a table, and can encrypt fields that are used as primary or secondary indexes. The supported application environment includes traditional RPG and COBOL applications, modern SQL applications, ODBC access, and all other methods and combinations used to access data in the IBM DB2 relational database. Additionally, data masking by user and user group helps prevent unintended loss of data unauthorized users. Optimizing Protection and Security for IBM i 7
9 CASE STUDY FALCONSTOR PROTECTION FOR IBM i FalconStor protection for IBM i is designed to increase the speed and reliability of IBM i backup tools and methods by leveraging disk to emulate all IBM i-supported tape drive and tape libraries. The FalconStor solution leverages existing Fibre Channel (FC) or IP SAN / NAS to transfer data to and restore data from a disk-based virtual tape at ultra-high speeds. Customer deployment example By using FalconStor with IBM i, smaller offices and remote sites can electronically vault tapes across any distance using standard IP (WAN) networks, centralizing data at the DR site for long-term data protection, retention, and central tape creation. Data over the wire is encrypted (AES 256-bit) and data written from the FalconStor protection solution directly to physical tape can also be encrypted (AES 256-bit), ensuring data is safe at all times. Because FalconStor can emulate over 50 popular tape libraries and 30 tape-drive formats in addition to IBM i specific formats, it fits easily and transparently into the existing IBM i backup environment. Extensive certification testing has validated FalconStor protection and deduplication operationally with all major backup software packages across multiple operating systems and environments. This allows FalconStor to integrate and interoperate easily with open systems backups as well as IBM i and other legacy systems, allowing consolidation of all backup operations on a single platform. Your encryption and key management strategy is as flexible as the FalconStor solution. Townsend Security's encryption and key management solutions work with a wide variety of databases, operating systems, and applications, including Microsoft SQL Server, Oracle Database, MySQL, IBM DB2, Microsoft SharePoint, Microsoft Optimizing Protection and Security for IBM i 8
10 Dynamics CRM, AX, GP, TrueCrypt, and many others. Your encryption and key management strategy works across all of your environments making your FalconStor investment pay dividends. Because enterprise data centers typically require both disk and tape to meet corporate and regulatory requirements for tiered backup, archive and compliance, FalconStor protection solutions seamlessly bridge disk and tape through direct write-to-tape and best-of-breed tape management capabilities, removing additional network and operational overhead. Media management capabilities are optimized to reduce complex IT operations, reduce media consumption, and improve security through features that include: Tape caching. Transparently and directly move data from virtual to physical tape, either concurrently with backup or based on user-defined policies and schedules, without the need to transfer data back across networks or through backup or media servers. Physical tape can also be migrated directly and transparently into the FalconStor deduplication solution, natively and without interfering with backup operations. Tape consolidation. Write multiple virtual tapes to a single physical tape of the same or greater capacity, maximizing physical media utilization. Multi-tape export. Create multiple copies of physical tapes to meet offsite DR needs, SLAs, and regulatory requirements. Since data security is only as good as its weakest link, securing data both on backup media and during any replication process is critical to the integrity of corporate information. FalconStor, together with Townsend software deliver a unique set of features to provide comprehensive data integrity for securing data regardless of location or media. Secure tape export via encryption. To prevent unauthorized access to data on physical tapes, the FalconStor solution can write to tape in an encrypted format based on the Advanced Encryption Standard (AES 256-bit). Because encryption is handled by FalconStor, it does not require any specific backup software or tape drive encryption licensing, nor does it require the BRMS encryption option. It works with any format or any physical tape media, maximizing media investments. The entire tape is encrypted, not just the data, allowing the physical tape to be fully protected in the event the tape is lost or stolen. For mobility, key management is included, and key packages can be exported for use with the remote target at the data center or DR site, allowing encrypted tapes to be imported and restored. Tape shredding. Tape shredding enables users to "destroy" a virtual tape image so that it cannot be accessed, even when using disk forensics. Shredding performs a three-pass wipe of the selected virtual tapes using an algorithm specified by the U.S. Department of Defense (Standard M). Optimizing Protection and Security for IBM i 9
11 FalconStor is your single solution for protection and archives across all platforms As noted, FalconStor deduplication technology supports direct export of virtual tapes to physical tape. Because data is streamed directly from the FalconStor system to tape, tape drives can stream at their maximum performance levels, speeding the tape creation process and reducing the number of tape drives needed to produce media. FalconStor deduplication technology can also cross tape drive boundaries. Normally, IBM i recognizes only a few physical tape formats; however, FalconStor deduplication can bridge these IBM i virtual tapes to any physical tape, including those not supported by IBM i systems. For example, an LTO-2 virtual tape can be copied to an STK physical tape. Tape stacking consolidates multiple smaller virtual tapes into a larger physical tape format, maximizing media utilization while reducing tape consumption and cost. Built-in encrypted replication is used for tape vaulting and DR, eliminating tape transport and providing the opportunity to create secure physical tape at the DR site. Running wizard-based policies, each individual virtual tape or job can be deduplicated, compressed, replicated, and retained at the DR site in the online disk repository for a defined period of time, and then vaulted to physical tape with a unique policy and a defined schedule. Facilitating replication offers additional cost savings by reducing WAN bandwidth requirements, eliminating the need to create tape at the remote or branch office, and the associated tape transport cost while ensuring security. Added benefits include support for IPL (boot); administrators can D-IPL from the virtual tape or from physical tape, locally or from the DR site, ensuring fast recovery in the event of a catastrophic failure. Additionally, FalconStor encryption configuration simplifies the process of selecting tapes to encrypt and determines where to store the tapes and associated secure encryption keys. The process is transparently managed and controlled by the FalconStor system, offloading the computing resource required by IBM i software encryption as well as the need to procure hardware encryption devices to meet security requirements. Optimizing Protection and Security for IBM i 10
12 Policy-Based Deduplication. Data deduplication dramatically reduces the amount of backup data stored by eliminating redundant data, maximizing storage utilization while allowing IT to retain more nearline backup data for longer periods and faster restores. FalconStor Optimized Backup & Deduplication provides integrated policybased deduplication, offering flexible post-process or concurrent deduplication methods, configurable for maximum flexibility and performance. Because IBM i backups write data sequentially to tape, the FalconStor solution is optimized to provide the best results based on backup and tape format awareness. A deduplication parser recognizes each IBM i tape format as well as multi-streamed backup sessions. This allows for proper alignment of the data prior to the start of the deduplication process. The metadata portion of the backup is identified and compressed. The parser is then aligned to the start of the data portion where a hash is calculated based on fixed block size, and duplicate blocks are discarded. This patent-pending, tape-format-aware deduplication model analyzes tape formats, guarantees that the same files are aligned the same way each time, and achieves the most efficient deduplication ratio. It allows the deduplication parser to align on different size blocks for different IBM i tape formats to ensure maximum detection of duplicate data, improving duplicate data detection by as much as 30% to 40% over generic raw fixed-block deduplication analysis. The ability to use a different deduplication algorithm based on data type, or turn deduplication off for specific data types, is what sets the FalconStor solution apart from the rest of the crowd. Example of customer configuration with three environments The FalconStor solution is optimized for read performance, ensuring a read is nearly as fast as a write by enabling high-performance read-ahead data access, parallel read across a wide disk stripe, and direct block-level access with no file system overhead. This ensures that restore speeds are fast, allowing organizations to bring critical systems back online quickly. When a file read request is initiated, the deduplication index detects the links and reads the Optimizing Protection and Security for IBM i 11
13 blocks directly, in parallel from the deduplication repository, sending data blocks directly to the application for highspeed restore. BENEFITS FOR IBM I ENVIRONMENTS Non-disruptive operation; IBM i does not see any difference between a physical tape and virtual tape Native emulation of all IBM i tape drives and libraries, including IBM 3580, 3590, 3592, TS1120 tape drives; LTO- 1, LTO-2, LTO-3, LTO-4, and LTO-5 tape drives, and IBM 3583, 3584, and 3590 libraries Supports all IBM i backup tools and methods (BRMS, LXI MMS, SAVLIB, media policies and IPL) without any process change Supports mixed open system, IBM I, and mainframe system environments NIST-validated encryption and key management from Townsend Security to provably meet compliance regulations mandating data protection Ensures business continuity through IPL, bare-metal boot from virtual or physical tape Offers the flexibility to create as many tape targets and libraries as needed Higher performance (write and restore) with connectivity across 8Gb/sec FC Integrated deduplication to retain backup data on capacity-optimized disk for longer periods Eliminates tape shipments with integrated replication and secure data encryption over the WAN Only unique blocks of data are transmitted, reducing WAN requirements by as much as 99% Direct export of virtual tape to physical tape, simultaneous with backup or based on defined policies and schedules The FalconStor deduplication solution can cross tape-drive boundaries. Support for tape stacking allows multiple smaller virtual tapes to be consolidated onto larger physical tape media. Optimizing Protection and Security for IBM i 12
14 SIZING GUIDELINES Much has been written about deduplication ratios, and many vendors have a tendency to indiscriminately advertise large deduplication ratios. However, no vendor can guarantee a specific deduplication ratio without first analyzing a customer's specific data and backup methodology. The ratio of data stored (after deduplication and compression) wholly depends on a number of different factors, including: Backup methods and policies (full, incremental, daily, weekly, etc.) Disk retention policies Rate of data change (for example, database data and data that changes frequently has lower deduplication ratios) Type of data (structured, unstructured, images, etc.) Sizing a FalconStor deduplication solution must take these backup methods and policies into account. Since the IBM i is not aware of deduplication, a few general rules need to be followed: 1. Perform an assessment of the backup solution so FalconStor deduplication sizing can be done in collaboration with the backup team at the customer site. A discussion of methodologies, long-term intentions, and aforementioned factors should be discussed in detail to understand the customer's environment, retention policies, SLA, and DR environment. 2. Plan for the initial disk design. The size of the FalconStor deduplication physical resources are calculated by taking into consideration the size of the total backup source (all data combined) and anticipating a deduplication ratio based on data type, change rate, retention, etc. This will provide a strong phase 1 estimate of the required size. 3. It is critical to understand that the benefits of data deduplication are realized over time. Initial deduplication ratios may be relatively low during the first few weeks of backup. This is normal since larger deduplication ratios are a factor of retaining data for longer time periods, combined with lower rates of changed data. These ratios will improve over time. FalconStor recommends recalculating sizing once a significant subset of production backup data is sent to an IBM i. Optimizing Protection and Security for IBM i 13
15 SUMMARY Data is driving our world; information is becoming the new currency. While technology changes, data remains irreplaceable and a corporation's most valuable asset. But protecting that asset presents many challenges. IT budgets are flat or down, and data continues to grow at a rate of 50% to 60% annually. Most IBM i installations continue to use tape, stockpiling and trucking data to tape silo centers. Furthermore, corporations are saving information for longer periods of time in order to meet regulatory and compliance requirements, and data is becoming more difficult to find and restore in a timely fashion. IBM i backup administrators face these challenges daily. Adapting IBM i to the FalconStor solution infrastructure allows customers to take full advantage of the product's deduplication, replication, and tape media management with encryption, with little or no disruption to backup operations. The FalconStor deduplication solution is an ideal backup-to-disk target for IBM i backup environments, allowing organizations and their administrators to: Reduce backup storage requirements by as much as 95% through deduplication Meet defined SLAs for RTO and RPO requirements by retaining data on disk for longer time periods Reduce/eliminate tape expenses by extending disk retention policies Eliminate offsite tape management and transportation costs using secure electronic vaulting Meet regulatory and compliance requirements through encryption Deploy the leading IBM i encryption and key management solution through our partnership with Townsend Security Improve resource management through a single platform for open systems and IBM i FalconStor Optimized Backup and Deduplication appliances scale to your needs Optimizing Protection and Security for IBM i 14
16 ABOUT TOWNSEND SECURITY Townsend Security creates data privacy solutions that help organizations meet evolving compliance requirements and mitigate the risk of data breaches and cyber-attacks. Over 3,000 companies worldwide trust Townsend Security s NIST-validated and FIPS compliant solutions to meet the encryption and key management requirements in PCI DSS, HIPAA/HITECH, FISMA, GLBA/FFIEC, DIACAP, SOX, and other regulatory compliance requirements. Learn more at townsendsecurity.com/. ABOUT FALCONSTOR FalconStor Software, Inc. (NASDAQ: FALC) is transforming how enterprises move, store, protect, and optimize data. Founded in 2000, FalconStor offers an award-winning platform for data migration, business continuity, disaster recovery, and optimized backup and deduplication. FalconStor helps maximize data availability and system uptime to ensure nonstop business productivity, while simplifying data management to reduce operational costs. Our open, integrated software solutions reduce vendor lock-in and give enterprises the freedom to choose the applications and hardware components that make the best sense for their business. FalconStor solutions are available and supported by OEMs, as well as leading system integrators and resellers worldwide. FalconStor is headquartered in Melville, N.Y. with offices throughout Europe and the Asia Pacific region. Learn more at falconstor.com/. Optimizing Protection and Security for IBM i 15
17 ADDITIONAL RESOURCES Sources Reference documents (Backup, Recovery, and Media Services for i7.1sc ) Related FalconStor documents Demystifying Data Deduplication: Choosing the Best Solution White Paper FalconStor Optimized Backup & Deduplication Optimized Backup Clueter/Single Instance Repository Cluster Deduplication Gateway Related Townsend Security products & information Automatic Encryption with FIELDPROC on the IBM I [Webinar] Encryption Key Management for IBM i Sources of Audit Failures [White Paper] Alliance AES/400 Encryption Product Information Alliance Key Manager Product Information For more information, visit or contact your local FalconStor representative. Corporate Headquarters EMEA Headquarters Asia-Pacific Headquarters United States Germany Singapore tel tel +49.(0) tel Information in this document is provided AS IS without warranty of any kind, and is subject to change without notice by FalconStor, which assumes no responsibility for any errors or claims herein. Copyright 2014 FalconStor Software. All rights reserved. FalconStor Software and FalconStor are registered trademarks of FalconStor Software, Inc. in the United States and other countries. All other company and product names contained herein are or may be trademarks of the respective holder. OPSI Optimizing Protection and Security for IBM i 16
Using DSI VTL as a Backup Target for IBM i (iseries)
Using DSI VTL as a Backup Target for IBM i (iseries) Abstract For too long, the standard method of backing up IBM i series has been with a locally attached tape drive or library. The result is reduced
How To Protect Data On Network Attached Storage (Nas) From Disaster
White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains
Accelerating Backup/Restore with the Virtual Tape Library Configuration That Fits Your Environment
Accelerating Backup/Restore with the Virtual Tape Library Configuration That Fits Your Environment A WHITE PAPER Abstract: Since VTL uses disk to back up data, it eliminates the media and mechanical errors
WHY DO I NEED FALCONSTOR OPTIMIZED BACKUP & DEDUPLICATION?
WHAT IS FALCONSTOR? FalconStor Optimized Backup and Deduplication is the industry s market-leading virtual tape and LAN-based deduplication solution, unmatched in performance and scalability. With virtual
IBM Tivoli Storage Manager
Help maintain business continuity through efficient and effective storage management IBM Tivoli Storage Manager Highlights Increase business continuity by shortening backup and recovery times and maximizing
IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication
PRODUCT BRIEF Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication NOTICE This Product Brief contains proprietary information protected by copyright. Information in this
How to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems
W H I T E P A P E R How to Manage Critical Data Stored in Microsoft Exchange Server 2010 By Hitachi Data Systems April 2012 2 Table of Contents Executive Summary and Introduction 3 Mission-critical Microsoft
<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures
1 Refreshing Your Data Protection Environment with Next-Generation Architectures Dale Rhine, Principal Sales Consultant Kelly Boeckman, Product Marketing Analyst Program Agenda Storage
Protect Microsoft Exchange databases, achieve long-term data retention
Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...
Optimizing IT Data Services
Christopher L Poelker Optimizing IT Data Services US Commission on Cloud Computing Commission on the Leadership Opportunity in U.S. Deployment of the Cloud (CLOUD 2 ) Commission Full Report Text Available
Data Deduplication: An Essential Component of your Data Protection Strategy
WHITE PAPER: THE EVOLUTION OF DATA DEDUPLICATION Data Deduplication: An Essential Component of your Data Protection Strategy JULY 2010 Andy Brewerton CA TECHNOLOGIES RECOVERY MANAGEMENT AND DATA MODELLING
Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration
Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta
Reduce your data storage footprint and tame the information explosion
IBM Software White paper December 2010 Reduce your data storage footprint and tame the information explosion 2 Reduce your data storage footprint and tame the information explosion Contents 2 Executive
Using HP StoreOnce Backup systems for Oracle database backups
Technical white paper Using HP StoreOnce Backup systems for Oracle database backups Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key features and benefits 2 HP StoreOnce
Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup
Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP
EMC Disk Library with EMC Data Domain Deployment Scenario
EMC Disk Library with EMC Data Domain Deployment Scenario Best Practices Planning Abstract This white paper is an overview of the EMC Disk Library with EMC Data Domain deduplication storage system deployment
Things You Need to Know About Cloud Backup
Things You Need to Know About Cloud Backup Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective and reliable method of safeguarding the increasing
Dell PowerVault DL Backup to Disk Appliance Powered by CommVault. Centralized data management for remote and branch office (Robo) environments
Dell PowerVault DL Backup to Disk Appliance Powered by CommVault Centralized data management for remote and branch office (Robo) environments Contents Executive summary Return on investment of centralizing
Symantec NetBackup 7 Clients and Agents
Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency
Protecting enterprise servers with StoreOnce and CommVault Simpana
Technical white paper Protecting enterprise servers with StoreOnce and CommVault Simpana HP StoreOnce Backup systems Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key
VERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION DATASHEET. Product Highlights
VERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION As the recognized leader for enterprise-class backup and recovery, VERITAS NetBackup Enterprise Server software is designed to help provide
FUJITSU Backup as a Service Rapid Recovery Appliance
FUJITSU Backup as a Service Rapid Recovery Appliance The unprecedented growth of business data The role that data plays in today s organization is rapidly increasing in importance. It guides and supports
Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation
Next Generation Data Protection with Symantec NetBackup 7 Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation White Paper: Next Generation Data Protection with NetBackup
W H I T E P A P E R T h e C r i t i c a l N e e d t o P r o t e c t M a i n f r a m e B u s i n e s s - C r i t i c a l A p p l i c a t i o n s
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R T h e C r i t i c a l N e e d t o P r o t e c t M a i n f r a m e B u s i n e
TSM (Tivoli Storage Manager) Backup and Recovery. Richard Whybrow Hertz Australia System Network Administrator
TSM (Tivoli Storage Manager) Backup and Recovery Richard Whybrow Hertz Australia System Network Administrator 2 Preparation meets success 3 Hertz Service Delivery Hertz has over 220 car hire locations
We look beyond IT. Cloud Offerings
Cloud Offerings cstor Cloud Offerings As today s fast-moving businesses deal with increasing demands for IT services and decreasing IT budgets, the onset of cloud-ready solutions has provided a forward-thinking
Deduplication has been around for several
Demystifying Deduplication By Joe Colucci Kay Benaroch Deduplication holds the promise of efficient storage and bandwidth utilization, accelerated backup and recovery, reduced costs, and more. Understanding
Using HP StoreOnce D2D systems for Microsoft SQL Server backups
Technical white paper Using HP StoreOnce D2D systems for Microsoft SQL Server backups Table of contents Executive summary 2 Introduction 2 Technology overview 2 HP StoreOnce D2D systems key features and
BlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything
BlueArc unified network storage systems 7th TF-Storage Meeting Scale Bigger, Store Smarter, Accelerate Everything BlueArc s Heritage Private Company, founded in 1998 Headquarters in San Jose, CA Highest
Meeting the Top Backup Challenges in Small and Medium Business Environments
Meeting the Top Backup Challenges in Small and Medium Business Environments December 2008 Although small and medium businesses (SMBs) do not typically generate the same amount of data that large enterprises
IBM Tivoli Storage Manager Version 7.1.4. Introduction to Data Protection Solutions IBM
IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM Note: Before you use this
Symantec NetBackup 7.1 What s New and Version Comparison Matrix
Symantec 7.1 What s New and Version Comparison Matrix Symantec 7 allows customers to standardize backup and recovery operations across physical and virtual environments with fewer resources and less risk
Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description
Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.
Archiving, Backup, and Recovery for Complete the Promise of Virtualization
Archiving, Backup, and Recovery for Complete the Promise of Virtualization Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
Optimizing Storage for Better TCO in Oracle Environments. Part 1: Management INFOSTOR. Executive Brief
Optimizing Storage for Better TCO in Oracle Environments INFOSTOR Executive Brief a QuinStreet Excutive Brief. 2012 To the casual observer, and even to business decision makers who don t work in information
The Modern Virtualized Data Center
WHITEPAPER The Modern Virtualized Data Center Data center resources have traditionally been underutilized while drawing enormous amounts of power and taking up valuable floorspace. Virtualization has been
Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software
Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key
Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments
Unified Information Management for Complex Windows Environments The Explosion of Unstructured Information It is estimated that email, documents, presentations, and other types of unstructured information
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
EMC DATA DOMAIN OPERATING SYSTEM
ESSENTIALS HIGH-SPEED, SCALABLE DEDUPLICATION Up to 58.7 TB/hr performance Reduces protection storage requirements by 10 to 30x CPU-centric scalability DATA INVULNERABILITY ARCHITECTURE Inline write/read
Virtual Tape Library Solutions by Hitachi Data Systems
O V E R V I E W Virtual Tape Library Solutions by Hitachi Data Systems Hitachi Data Systems Virtual Tape Library Solutions by Hitachi Data Systems Enterprise data centers face a growing problem in data
EMC BACKUP-AS-A-SERVICE
Reference Architecture EMC BACKUP-AS-A-SERVICE EMC AVAMAR, EMC DATA PROTECTION ADVISOR, AND EMC HOMEBASE Deliver backup services for cloud and traditional hosted environments Reduce storage space and increase
Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection
The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the
Vodacom Managed Hosted Backups
Vodacom Managed Hosted Backups Robust Data Protection for your Business Critical Data Enterprise class Backup and Recovery and Data Management on Diverse Platforms Vodacom s Managed Hosted Backup offers
WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression
WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression Sponsored by: Oracle Steven Scully May 2010 Benjamin Woo IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA
The EVault Portfolio
The EVault Portfolio Built from the start as a pure disk-to-disk solution, EVault is the only data protection platform that can be consumed as a cloud service, deployed as on-premise software, an on-premise
Symantec Backup Exec 2014 Agents and Options
Symantec Backup Exec 2014 Agents and Options Data Sheet: Data Protection Overview enhance and extend Backup Exec features, capabilities, and platform support. Whether you need to protect VMware vsphere,
How To Use An Npm On A Network Device
WHITE PAPER: CA ARCserve Backup Network Data Management Protocol (NDMP) Network Attached Storage (NAS) Option: Integrated Protection for Heterogeneous NAS Environments CA ARCserve Backup: Protecting heterogeneous
W H I T E P A P E R R e a l i z i n g t h e B e n e f i t s o f Deduplication in a Backup and Restore System
W H I T E P A P E R R e a l i z i n g t h e B e n e f i t s o f Deduplication in a Backup and Restore System Sponsored by: HP Noemi Greyzdorf November 2008 Robert Amatruda INTRODUCTION Global Headquarters:
Energy Efficient Storage - Multi- Tier Strategies For Retaining Data
Energy and Space Efficient Storage: Multi-tier Strategies for Protecting and Retaining Data NOTICE This White Paper may contain proprietary information protected by copyright. Information in this White
Daymark DPS Enterprise - Agentless Cloud Backup and Recovery Software
Daymark DPS Enterprise - Agentless Cloud Backup and Recovery Software Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this is the lifeblood
UPSTREAM for Linux on System z
PRODUCT SHEET UPSTREAM for Linux on System z UPSTREAM for Linux on System z UPSTREAM for Linux on System z is designed to provide comprehensive data protection for your Linux on System z environment, leveraging
Solution Overview. Business Continuity with ReadyNAS
Business Continuity with ReadyNAS What is ReadyNAS? ReadyNAS is a family of network storage solutions for small and medium businesses, workgroups, and remote/home offices. ReadyNAS delivers unified storage
Backup Exec 15 Agents and Options
DATA PROTECTION Backup Exec 15 Agents and Options Enhance and extend Backup Exec features, capabilities, and platform support Overview enhance and extend Backup Exec features, capabilities, and platform
EMC DATA DOMAIN OPERATING SYSTEM
EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 58.7 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive
Bringing the edge to the data center a data protection strategy for small and midsize companies with remote offices. Business white paper
Bringing the edge to the data center a data protection strategy for small and midsize companies with remote offices Business white paper Table of contents Data protection synonymous with business success...
Oracle Database Backup Service. Secure Backup in the Oracle Cloud
Oracle Database Backup Service Secure Backup in the Oracle Cloud Today s organizations are increasingly adopting cloud-based IT solutions and migrating on-premises workloads to public clouds. The motivation
Universal Backup Device The Essential Facts of UBD
Information Technology Solution Brief Universal Backup Device The Essential Facts of UBD Fibre Channel Disk to Disk Backup for IBM Power Systems Copyright (c)2014 Electronic Storage Corporation Information
BEST PRACTICES FOR PROTECTING MICROSOFT EXCHANGE DATA
BEST PRACTICES FOR PROTECTING MICROSOFT EXCHANGE DATA Bill Webster September 25, 2003 VERITAS ARCHITECT NETWORK TABLE OF CONTENTS Introduction... 3 Exchange Data Protection Best Practices... 3 Application
DATA BACKUP & RESTORE
DATA BACKUP & RESTORE Verizon Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable. Offsite backup is
Backup and Recovery for SAP Environments using EMC Avamar 7
White Paper Backup and Recovery for SAP Environments using EMC Avamar 7 Abstract This white paper highlights how IT environments deploying SAP can benefit from efficient backup with an EMC Avamar solution.
Frequently Asked Questions (FAQs) United Computer Group, Inc. VAULT400 System i (AS/400) Agent
Frequently sked uestions (Fs) United Computer Group, Inc. VULT400 System i (S/400) gent Revised September 2013 VULT400 System i (S/400) gent F What are the key benefits of VULT400 ISeries gent when compared
Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its
DISASTER RECOVERY STRATEGIES: BUSINESS CONTINUITY THROUGH REMOTE BACKUP REPLICATION Every organization has critical data that it can t live without. When a disaster strikes, how long can your business
Using EonStor FC-host Storage Systems in VMware Infrastructure 3 and vsphere 4
Using EonStor FC-host Storage Systems in VMware Infrastructure 3 and vsphere 4 Application Note Abstract This application note explains the configure details of using Infortrend FC-host storage systems
Secure Your Business with EVault Cloud-Connected Solutions
Secure Your Business with EVault Cloud-Connected Solutions Winfried Posthumus Channel Sales Manager NL [email protected] 11/22/2012 2012 EVault, Inc. All Rights Reserved 1 Agenda Who is EVault
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,
The safer, easier way to help you pass any IT exams. Exam : 000-115. Storage Sales V2. Title : Version : Demo 1 / 5
Exam : 000-115 Title : Storage Sales V2 Version : Demo 1 / 5 1.The IBM TS7680 ProtecTIER Deduplication Gateway for System z solution is designed to provide all of the following EXCEPT: A. ESCON attach
Demystifying Deduplication for Backup with the Dell DR4000
Demystifying Deduplication for Backup with the Dell DR4000 This Dell Technical White Paper explains how deduplication with the DR4000 can help your organization save time, space, and money. John Bassett
Veritas NetBackup 6.0 Server Now from Symantec
Veritas NetBackup 6.0 Server Now from Symantec Innovative data protection As the recognized leader for enterprise-class backup and recovery, Veritas NetBackup Server software is designed to help provide
June 2009. Blade.org 2009 ALL RIGHTS RESERVED
Contributions for this vendor neutral technology paper have been provided by Blade.org members including NetApp, BLADE Network Technologies, and Double-Take Software. June 2009 Blade.org 2009 ALL RIGHTS
Riverbed Whitewater/Amazon Glacier ROI for Backup and Archiving
Riverbed Whitewater/Amazon Glacier ROI for Backup and Archiving November, 2013 Saqib Jang Abstract This white paper demonstrates how to increase profitability by reducing the operating costs of backup
IBM Tivoli Storage Manager 6
Leverage next-generation data storage and recovery management capabilities IBM Tivoli Storage Manager 6 IBM Tivoli Storage Manager is the core component of an enterprise-wide data protection and recovery
Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect
Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect Abstract Retrospect backup and recovery software provides a quick, reliable, easy-to-manage disk-to-disk-to-offsite backup solution for SMBs. Use
Data Protection Report 2008 Best Practices in Data Backup & Recovery
Data Protection Report 2008 Best Practices in Data Backup & Recovery Prepared for: Executive Summary Data is growing at an incredible rate. As a result, the demands of data protection increase as well.
Uni Vault. An Introduction to Uni Systems Hybrid Cloud Data Protection as a Service. White Paper Solution Brief
Uni Vault An Introduction to Uni Systems Hybrid Cloud Data Protection as a Service White Paper Solution Brief Contents The Challenges of Traditional Backup... 3 The Uni Systems Data Protection as a Service
Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities
WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities White Paper: Enterprise Security Symantec Backup Exec 11d for Windows Servers Contents Executive
Backup Exec 2010 Deduplication Protect More, Store Less, Save More
Backup Exec 2010 Deduplication Protect More, Store Less, Save More Lim Andre Xavier Regional Product Manager Asia Pacific & Japan Information Management Group - SMB 2 3 Symantec Backup Exec 2010 Agenda
Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems
Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec
Business-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance
Intel Xeon processor Business-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance The easy solution for backup to disk with deduplication Intel Inside. Powerful Solution Outside. If
EMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise
EMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise ESSENTIALS Easy-to-use, single volume, single file system architecture Highly scalable with
Solutions for Encrypting Data on Tape: Considerations and Best Practices
Solutions for Encrypting Data on Tape: Considerations and Best Practices NOTICE This white paper may contain proprietary information protected by copyright. Information in this white paper is subject to
Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology
Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication
Actifio Big Data Director. Virtual Data Pipeline for Unstructured Data
Actifio Big Data Director Virtual Data Pipeline for Unstructured Data Contact Actifio Support As an Actifio customer, you can get support for all Actifio products through the Support Portal at http://support.actifio.com/.
VERITAS Backup Exec 9.0 for Windows Servers
WHITE PAPER Data Protection Solutions for Network Attached Storage VERITAS Backup Exec 9.0 for Windows Servers VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Background...3 Why Use a NAS
MANAGED SERVICE PROVIDERS SOLUTION BRIEF
MANAGED SERVICE PROVIDERS SOLUTION BRIEF The Assured Recovery Services Platform The data protection world has drastically changed in the past few years. Protection and recovery of data and systems has
Leverage the IBM Tivoli advantages in storage management
IBM Software December 2010 Leverage the IBM Tivoli advantages in storage management IBM Tivoli storage management solutions outperform the competition 2 Leverage the IBM Tivoli advantages in storage management
Unitrends Recovery-Series: Addressing Enterprise-Class Data Protection
Solution Brief Unitrends Recovery-Series: Addressing Enterprise-Class Data Protection 2 Unitrends has leveraged over 20 years of experience in understanding ever-changing data protection challenges in
Virtualization Support - Real Backups of Virtual Environments
Virtualization Support Real Backups of Virtual Environments Contents Virtualization Challenges 3 The Benefits of Agentless Backup 4 Backup and Recovery Built for Virtualized Environments 4 Agentless in
Universal Backup Device with
Universal Backup Device with Fibre Channel Disk to Disk Backup with Affordable Deduplication and Replication for IBM Power Systems Executive Overview Copyright (c)2015 Electronic Storage Corporation Universal
VMware vsphere Data Protection 6.0
VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application
NetVault Backup, NDMP and Network Attached Storage
NetVault, NDMP and Network Attached Storage Simplicity and power for NAS Written by Adrian Moir, Dell Scott Hetrick, Dell Abstract This technical brief explains how Network Data Management Protocol (NDMP)
ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT
ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT IS THIS ebook RIGHT FOR ME? Not sure if this is the right ebook for you? Check the following qualifications to make
Backup and Archiving Explained. White Paper
Backup and Archiving Explained White Paper Backup vs. Archiving The terms backup and archiving are often referenced together and sometimes incorrectly used interchangeably. While both technologies are
