SOLUTION BRIEF: KEY CONSIDERATIONS FOR DISASTER RECOVERY
|
|
|
- Egbert Thornton
- 10 years ago
- Views:
Transcription
1 SOLUTION BRIEF: KEY CONSIDERATIONS FOR DISASTER RECOVERY A Disaster Recovery and Business Continuity plan is specific to the circumstances, priorities and expense versus the value decisions of the organization, which presents a broad range of unique challenges for the midmarket. This brief outlines mid-market best practices in developing a disaster recovery strategy for their top, middle and bottom tiers. SOLUTION BRIEF
2 TOP FIVE DISASTER RECOVERY CONSIDERATIONS 1. PLAN FOR SUCCESS - Whether by fire, power outage, hardware or human failure, or an act of God, setting rigorous standards for recovery service levels that are cost-efficient is the first order of business. Procedures must be well documented, detailed and up-to-date, as a critical step. 2. VIRTUALIZATION - Although virtualization is not required to have a tenable Disaster Recovery Business Continuity plan, it simplifies it by providing a robust, reliable and secure platform that isolates applications and operating systems from their underlying hardware. This dramatically reduces the complexity of implementing and testing DRBC strategies. 3. AUTOMATION - Reliability in the backup and recovery process is increased proportionally to the extent human intervention is reduced. Automation also enables the unstoppable progression of changes in the primary data center to be mirrored synchronously in the backup location. 4. COST EFFICIENCY - The protection architecture is often over-built with a premium solution applied across the board. That creates sticker shock and impacts an appropriate protection architecture at both the primary and secondary sites. Classify the necessary protection for each site to achieve a cost-efficient overall solution. 5. TEST-OFTEN - Not only do you need an effective plan for a broad spectrum of failures, you need to TEST it... often! Several analysts have reported that many organizations never test their DRBC plans, or test them so infrequently as to be ineffective. The more frequently you test, the higher the probability of a successful recovery. Test at least once a quarter. SOLUTION BRIEF 2 Recent tornados, hurricanes, earthquakes and tsunamis have refocused attention on disaster recovery among business leaders and IT managers. While the broader scale of disaster recovery planning includes facilities, power, cooling, communications and people, data recovery remains key to business continuity. The tasks associated with the data center are a specialized and complex discipline that requires unique planning and management. Large scale, regional and localized disasters require comprehensive business continuity plans that include the use of a secondary data center located far enough away so that it will not be impacted by the disaster at the primary site. A secondary site can obviously be very expensive, causing some to minimize the expense by using external vendors that offer disaster recovery services. In either case; whether you choose to have a secondary site or co-located services, the need to organize and move data from the primary site to the secondary site remains if you want your business to survive. When it comes to disaster recovery planning, without a plan, you can plan on your business failing. THE DISASTER RECOVERY ARCHITECTURE DRBC FOR THE MID-MARKET A Disaster Recovery and Business Continuity plan is specific to the circumstances, priorities and expense versus the value decisions of the organization. This presents a broad range of unique challenges for the mid-market. While the mid-market is not strictly defined, it is not difficult to categorize. In an effort to provide context and guidance for how strategies must adapt to meet mid-market needs, we will look at the mid-market in three segments; Bottom Tier, Middle Tier and Top Tier. Bottom Tier This mid-market tier is comprised of organizations that are generally able to serve all their data needs with a single small-to medium size storage array. They typically do not use advanced storage management capabilities but, like all businesses, are in need of highly available, high-performance storage that is easy to manage. Middle Tier The middle tier of the midmarket is represented by businesses that have multiple, sophisticated applications with varying demands (in terms of performance, availability, protection, recovery, etc.) to serve their users. Typically, multiple processes and procedures will be used for storage management in a storage infrastructure that is itself often tiered. This tier will likely have multiple virtualized servers managing capacities in the hundreds of terabytes. Performance, reliability and manageability are critical to their business objectives.
3 DEFINING THE TIERS OF THE MID-MARKET Top Middle Bottom THE MID-MARKET 1 PB+ Service Level Management and definitions of data classes 100s of TBs Multiple sophisticated applications with varying demands Able to serve all needs with a single storage array - no advanced storage management Top Tier These are organizations that are more proactive in designing infrastructure with service level management, resulting in the definition of standard service levels. They will define data classes and policies in the management structure. Policybased storage management processes are usually standardized. Compliance is managed and enterprise content management is linked to storage optimization. This tier frequently has multiple consolidated and virtualized servers with extended virtualization and Storage Resource Management (SRM). They will commonly have a tiered storage infrastructure to meet performance and protection requirements, including an archive for legal and business protection. At this tier, performance, reliability and manageability are at the peak of the requirements. These organizations will typically manage hundreds of terabyte or even petabytes of data. THE DRBC PROTECTION ARCHITECTURE Building a data protection architecture appropriate for DRBC objectives is an extension of building a backup and recovery plan as covered in the Solutions Brief titled Backup and Recovery. Suffice it to say, the principles are the same - understand the business value of the applications being protected and align that with technology, resulting in a cost-justified level of protection. Not every application deserves the highest level of protection money can buy. An organization must develop a classification schema to organize the value of an application s data and the performance levels for recovery. However, a DRBC plan extends beyond storage and additional consideration must be given to the servers and networks. Disaster recovery implies the need to restore full operation after extensive repair to an existing center, or to build a full recovery at a secondary site. Assuming that time is of the essence, a DRBC recovery strategy should be targeted for a secondary site to achieve the fastest possible recovery to maintain business continuity. When thinking about an optimal storage architecture strategy, organizations must also consider their tier within the mid-market. Each tier faces increasingly complex challenges in achieving a recovery. The least complicated bottom tier may simply have a bucket of tapes or may write to a secondary array at a remote location. This approach could include the higher tiers as well. Below is an introduction to the basic protection architecture to be used at a primary location along with the strategy used to synchronize operating systems, applications and data at a secondary location. SOLUTION BRIEF 3
4 CLASSIFICATION Protection Tier Classification Availability RTO RPO 1 Mission Critical Data (RAID 5 RAID 10) Critical to an enterprise, continuous access Highest performance, near zero downtime % 1 min Business Critical Data (RAID5) Very important to the enterprise, frequently accessed High performance, high availability, less than four-hour recovery 99.99% 1 hr 15 min 2-3 Accessible Online Data (RAID 5 or RAID 6) Necessary to the enterprise, infrequently accessed, cost sensitive Online performance, high availability, less than eight hours of recovery 99% 3 hrs 1 hr 2-3 Nearline Data (RAID 6) Non-Changing Data, Backup/Recovery - Unmanaged archive, cost sensitive Disk performance, automated retrieval 96% 24 hrs 8 hrs 3-4 Compliance Data (RAID 6) Managed Archive Enforced record retention and verifiable data integrity Discovery CAS Classification, index and search capabilities Audit 100% 48 hrs 0% SOLUTION BRIEF 4 THE BASICS OF A PROTECTION ARCHITECTURE The protection architecture is an infrastructural organization composed of layers of protection as a tradeoff against time and money. As an example, a subsystem RAID protection scheme is great for an individual disk failure, but it has no value if a water main breaks on top of the disk array and the entire subsystem is lost. Also, if a virus invades the subsystem, or if critical files are lost, deleted or corrupted, there must be a way to recover. There are four major Protection Tiers in an effective architecture with some areas of differentiation. Protection Tier-1 provides volume failover. If the primary volume fails, the server is able to recognize and failover to
5 a surviving volume. Protection Tier-2 allows for rapid restart in case of a hardware failure, data corruption or data loss by using mirrored or point-in-time copies of volumes. Protection Tier-3 considers backup and recovery when point-in-time copies have also failed and recovery is necessary versus a restart. Protection Tier- 4 is a logical layer of protection used for compliance regulations, governance and long-term archiving. Each tier features tools that are used to provide local layers of protection. Architectural adjustments must be made to accomplish DRBC. This is differentiated from what is done locally by adding the ability to move data in each of the Protection Tiers to a secondary site. There are tools and techniques available to move data to a remote location for each of the tiers in the protection architecture COLD, WARM, OR HOT SITE There are also ways of looking at the various Protections Tiers largely based on the frequency with which you update data. These views of the Protection Tiers are measured as Recovery Point Objectives (RP). RPO determines how much data is willing to be put at risk between updates. This is sometimes referred to as Cold, Warm or Hot sites. A Cold site environment is turned on once to have software installed and configured then turned off until needed. This view of Protection Tier-1 assumes you are bringing data with you. A Warm site is a backup site that is turned on periodically to receive updates from the server being backed up, thus reducing the amount of data at risk. You still have to bring data with you, or have it located nearby for a recovery. Warm servers are often used for replication and mirroring as point-in-time copies of data, mapping to Protection Tier-2 in the protection architecture. A Hot backup site receives constant updates and is on Hot standby, ready to take over immediately in the event of the need for a failover. This view of Protection Tier-3 offers little to no risk to data. If the Hot site is nearby, or if certain technology options are used, it can even be configured to share workloads and thus, simply picks up the workload in the event of a primary failure. In this event, the user is completely unaware of a failure and business continuity is absolute. Protection Tier-4 adds logical layer protection to this type of Hot site architecture to ensure compliance. SOLUTION BRIEF 5
6 1 week 1 day 2 hrs. mins. AMOUNT OF DATA RECOVERY TIME OBJECTIVE Mirror Copies Point in Time Copies Full and Incremental Backups Off-site Storage Protection Tier Two Protection Tier Three Tape TAPE Protection Tier Three Tape DISK LIBRARY BEST PRACTICES A well-founded DRBC protection architecture starts as a classification process to determine the value of an application and its data when it is running and the impact of an application when it stops. This determination is used to set the Recovery Time Objectives and Recovery Point Objectives. The DRBC plan uses various software and hardware technologies to move data from a local Protection Tier level to the same remote tier level. Once that is done, the system is configured as a Highly Available Clustered System. A recovery at the remote site is equivalent to what it looks like locally, including the appearance that no failure has occurred whatsoever. From a local point of view, Protection Tier-1 would typically represent the smallest amount of overall data. In this case, mirroring data with a hardware RAID or software solution for failover is cost justified. That is good news as it reduces the amount of mission critical change data that must be written to a remote site. Even so, if the remote site is farther than 6.2 miles away, using Fibre Channel is out of the question. iscsi must be considered for synchronous or asynchronous data transfer at distances greater than 6.2 miles. Beyond the physical interface, there are various methods that can asynchronously move applications and file systems data great distances from a system point of view. Tier-3 of the protection architecture would use anything from copies on a disk library, for reliable, high-performance recovery that ranges from minutes to hours, to offsite copies on tape allowing recovery that would be measured in days or weeks. secs. Protection Tier One PROTECTED DISK What is important about this architecture and strategy is the idea that you must first map the value of data, which offers a recover point and time objective. That can then be mapped into a solution capability requirement used to choose the right technology that will provide an effective DRBC architecture with an effective business rationalization plan. DISK BEST PRACTICES Consider some best practices using a Nexsan disk solution within the protection architecture and for DRBC. Nexsan s approach to the protection architecture is grounded in proven principles of matching the right technology to deliver the right data, at the right time, at the right cost. Because Nexsan designs and builds Easy, Efficient, Enterprise-Class storage, users can depend on data meeting Service Levels for Protection and Recovery objectives at a price point that will please the business. SOLUTION BRIEF 6
7 Since many of today s mid-market data centers have, or will soon deploy, virtualized servers, Nexsan has focused on implementing integrated virtualization capabilities for management that also aid in the objectives of DRBC. For example, Microsoft offers a number of capabilities for managing virtual machines and virtual storage. Nexsan management software integrates with these Microsoft capabilities. It is through this integration with Microsoft virtual storage management capabilities that Nexsan supports not only Microsoft s Hyper-V virtualization system but also virtualization systems from other vendors including VMware, Citrix and Symantec. Systems with multiple controllers need to handle the dual issues of array ownership and SAN load balancing in order to optimize performance. Host systems with advanced MPIO software, such as VMware s ESX and ESXi, along with Windows Server 2008, can access a Nexsan storage array and discern the subtle but important difference between an active disk port and an active port on a service processor - thanks to Nexsan s implementation of ALUA. Because I/O requests are sent only to active service processors, this enables optimal performance and avoids the overhead of switching controllers. Nexsan has achieved an unparalleled level of reliability, adding tremendous value at both local and secondary recovery sites. Nexsan can be used as storage building blocks when matched within a larger scheme of technologies such as virtualization, advanced file systems and high-performance applications. Together, these create a complete solution that can be used to plan a rock-solid DRBC for any tier within the mid-market. DRBC applications that involve distances outside the reach of fibre channel, Nexsan offers a storage array specifically for iscsi networked storage. This enables a simple implementation of a DRBC plan without the hassle of requiring advanced file systems and applications. Top and middle tier mid-sized organizations may already have advanced file systems and applications in place and may not need Nexsan s iseries product for iscsi connectivity. On the other hand, some middle and bottom tier mid-market customers may find Nexsan s iseries ideal. Top-tier, and many middle-tier, mid-market customers will already have virtualization, clustered high availability file systems and applications in place. Nexsan provides a variety of purpose-built, ultra-high availability disk arrays that serve multitudes of customers seeking best-in-class solutions that are cost-aligned with the needs of constrained business practices common in the market. SOLUTION BRIEF 7
8 Customers looking to include a long-term archive as part of the DRBC plan find that Nexsan offers the very best technology available anywhere: the Assureon Archive Storage System. Assureon enables organizations to meet regulatory demands while ensuring data does not corrupt or worse yet, deleted before its time. If Assureon discovers lost or corrupted data during regular background maintenance sweeps, it will fix it first then let you know that a problem has been handled. CONCLUSIONS Achieving the right protection architecture for your Disaster Recovery Business Continuity plan requires serious attention to a myriad of details. IT professionals should never have to worry about their storage. Nexsan offers reliable solutions as a trusted partner to help build a DRBC architecture regardless of where your organization fits in the mid-market. Nexsan is known for Easy, Efficient and Enterprise-class storage - an important consideration when the survivability of data is the fulcrum that balances the survivability of your business. ABOUT NEXSAN Nexsan is a leading provider of innovative data storage systems with over 10,000 customers worldwide. Nexsan s pioneering hybrid storage systems combine solid-state technologies, spinning disk storage and advanced software to deliver radical new levels of performance and capacity at lower cost. The company s advanced technologies enable organizations to optimize traditional, virtual and cloud computing environments for increased productivity and business agility. With more than 28,000 systems deployed since 1999, the company delivers its data storage systems through a worldwide network of solution providers, VARs and system integrators. Nexsan is based in Thousand Oaks, Calif. For more information, visit SOLUTION BRIEF 8
SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY
SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY Among the priorities for efficient storage management is an appropriate protection architecture. This paper will examine how to architect storage
SOLUTION BRIEF KEY CONSIDERATIONS FOR LONG-TERM, BULK STORAGE
SOLUTION BRIEF KEY CONSIDERATIONS FOR LONG-TERM, BULK STORAGE IT organizations must store exponentially increasing amounts of data for long periods while ensuring its accessibility. The expense of keeping
Veritas Storage Foundation High Availability for Windows by Symantec
Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability
DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES
DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES Dejan Živanović EMC Technology Solutions Group SEE Presales Manager [email protected] 1 The Business Maturity Model V Enabled Web
Leveraging Virtualization for Disaster Recovery in Your Growing Business
Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster
Veritas Cluster Server from Symantec
Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster
Affordable Remote Data Replication
SANmelody Application Affordable Remote Data Replication Your Data is as Valuable as Anyone s You know very well how critical your data is to your organization and how much your business would be impacted
Protecting Microsoft SQL Server
Your company relies on its databases. How are you protecting them? Protecting Microsoft SQL Server 2 Hudson Place suite 700 Hoboken, NJ 07030 Powered by 800-674-9495 www.nsisoftware.com Executive Summary
PROTECTING MICROSOFT SQL SERVER TM
WHITE PAPER PROTECTING MICROSOFT SQL SERVER TM Your company relies on its databases. How are you protecting them? Published: February 2006 Executive Summary Database Management Systems (DBMS) are the hidden
SQL Server Storage Best Practice Discussion Dell EqualLogic
SQL Server Storage Best Practice Discussion Dell EqualLogic What s keeping you up at night? Managing the demands of a SQL environment Risk Cost Data loss Application unavailability Data growth SQL Server
How To Protect Data On Network Attached Storage (Nas) From Disaster
White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains
Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011
Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Executive Summary Large enterprise Hyper-V deployments with a large number
High availability and disaster recovery with Microsoft, Citrix and HP
High availability and disaster recovery White Paper High availability and disaster recovery with Microsoft, Citrix and HP Using virtualization, automation and next-generation storage to improve business
Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware
Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery
Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11
Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node
Unitrends Recovery-Series: Addressing Enterprise-Class Data Protection
Solution Brief Unitrends Recovery-Series: Addressing Enterprise-Class Data Protection 2 Unitrends has leveraged over 20 years of experience in understanding ever-changing data protection challenges in
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery www.citrix.com Contents Introduction... 3 Fitting Disaster Recovery to the Cloud... 3 Considerations for Disaster Recovery
How To Get A Storage And Data Protection Solution For Virtualization
Smart Storage and Modern Data Protection Built for Virtualization Dot Hill Storage Arrays and Veeam Backup & Replication Software offer the winning combination. Veeam and Dot Hill Solutions Introduction
Leveraging EMC Deduplication Solutions for Backup, Recovery, and Long-term Information Retention
White Paper Leveraging EMC Deduplication Solutions for Backup, Recovery, and Long-term Information Retention By Brian Babineau and David A. Chapa January, 2011 This ESG White Paper was commissioned by
How to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems
W H I T E P A P E R How to Manage Critical Data Stored in Microsoft Exchange Server 2010 By Hitachi Data Systems April 2012 2 Table of Contents Executive Summary and Introduction 3 Mission-critical Microsoft
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
The Microsoft Large Mailbox Vision
WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more e mail has many advantages. Large mailboxes
Introduction. Setup of Exchange in a VM. VMware Infrastructure
Introduction VMware Infrastructure is deployed in data centers for deploying mission critical applications. Deployment of Microsoft Exchange is a very important task for the IT staff. Email system is an
High Availability with Windows Server 2012 Release Candidate
High Availability with Windows Server 2012 Release Candidate Windows Server 2012 Release Candidate (RC) delivers innovative new capabilities that enable you to build dynamic storage and availability solutions
The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments
The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss
BUSINESSES NEED TO MAXIMIZE PRODUCTIVITY, LOWER COSTS AND DECREASE RISKS EVERY DAY.
NSA Cloud Suite Powered by BUSINESSES NEED TO MAXIMIZE PRODUCTIVITY, LOWER COSTS AND DECREASE RISKS EVERY DAY. In this age of information, this means you need your servers, desktops and applications up
Backup and Recovery 1
Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup
Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006
Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of
Data Protection Report 2008 Best Practices in Data Backup & Recovery
Data Protection Report 2008 Best Practices in Data Backup & Recovery Prepared for: Executive Summary Data is growing at an incredible rate. As a result, the demands of data protection increase as well.
Disaster Recover Challenges Today
S O L U T I O N S O V E R V I E W Disaster Recovery Solutions from VMware Transforming Disaster Recovery - VMware Infrastructure for Rapid, Reliable and Cost-Effective Disaster Recovery Disaster Recover
WHITE PAPER Overview of Data Replication
Overview of Data Replication 1 Abstract Replication is the process of making a copy of something, or of creating a replica. In different contexts, such as art (copies of a painting), bioscience (cloning),
Complete Storage and Data Protection Architecture for VMware vsphere
Complete Storage and Data Protection Architecture for VMware vsphere Executive Summary The cost savings and agility benefits of server virtualization are well proven, accounting for its rapid adoption.
Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric
Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric 2001 San Diego Gas and Electric. All copyright and trademark rights reserved. Importance
Planning and Deploying a Disaster Recovery Solution
Planning and Deploying a Disaster Recovery Solution Produced by SearchStorage.com Presenters: Jon Bock and Ian Selway Sponsored by Copyright 2008 HP. All Rights Reserved. Reproduction, adaptation, or translation
Business Continuity and Disaster Recovery Service & Solutions. Kevin Kelly: President - Agile360 Kevin Burton: President - Burton Asset Management
Business Continuity and Disaster Recovery Service & Solutions Kevin Kelly: President - Agile360 Kevin Burton: President - Burton Asset Management About Agile360 The professionals at Agile360 have years
Disaster Recovery for Oracle Database
Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches
STORAGE CENTER. The Industry s Only SAN with Automated Tiered Storage STORAGE CENTER
STORAGE CENTER DATASHEET STORAGE CENTER Go Beyond the Boundaries of Traditional Storage Systems Today s storage vendors promise to reduce the amount of time and money companies spend on storage but instead
Assessing the OpEx Savings Driven by Nexsan Management Software
Executive Briefing Assessing the OpEx Savings Driven by Nexsan Management Software Integration and Compatibility with Windows in a Virtualized Environment Jack Fegreus September 30. 2010 To meet IT needs
Contents. SnapComms Data Protection Recommendations
Contents Abstract... 2 SnapComms Solution Environment... 2 Concepts... 3 What to Protect... 3 Database Failure Scenarios... 3 Physical Infrastructure Failures... 3 Logical Data Failures... 3 Service Recovery
Symantec Storage Foundation High Availability for Windows
Symantec Storage Foundation High Availability for Windows Storage management, high availability and disaster recovery for physical and virtual Windows applications Data Sheet: High Availability Overview
Backup and Recovery Solutions for Exadata. Ľubomír Vaňo Principal Sales Consultant
Backup and Recovery Solutions for Exadata Ľubomír Vaňo Principal Sales Consultant Fundamental Backup and Recovery Data doesn t exist in most organizations until the rule of 3 is complete: Different Media
Backup, Recovery & Archiving. Choosing a data protection strategy that best suits your IT requirements and business needs.
A N AT L A N T I C - I T. N E T W H I T E PA P E R Choosing a data protection strategy that best suits your IT requirements and business needs. 2 EXECUTIVE SUMMARY Data protection has become the hydra
Implementing the Right High Availability and Disaster Recovery Plan for Your Business Date: August 2010 Author: Mark Peters, Senior Analyst
Technology Brief Implementing the Right High Availability and Disaster Recovery Plan for Your Business Date: August 2010 Author: Mark Peters, Senior Analyst Abstract: IT budgets remain flat, yet businesses
Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution. Database Solutions Engineering
Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution Database Solutions Engineering By Subhashini Prem and Leena Kushwaha Dell Product Group March 2009 THIS WHITE PAPER IS FOR INFORMATIONAL
BACKUP IS DEAD: Introducing the Data Protection Lifecycle, a new paradigm for data protection and recovery WHITE PAPER
BACKUP IS DEAD: Introducing the Data Protection Lifecycle, a new paradigm for data protection and recovery Despite decades of research and development into backup and data protection, enterprise customers
Backup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland
Backup and Recovery Solutions for Exadata Cor Beumer Storage Sales Specialist Oracle Nederland Recovery Point and Recovery Time Wks Days Hrs Mins Secs Secs Mins Hrs Days Wks Data Loss (Recovery Point Objective)
IBM System Storage DS5020 Express
IBM DS5020 Express Manage growth, complexity, and risk with scalable, high-performance storage Highlights Mixed host interfaces support (Fibre Channel/iSCSI) enables SAN tiering Balanced performance well-suited
EMC DATA DOMAIN OPERATING SYSTEM
ESSENTIALS HIGH-SPEED, SCALABLE DEDUPLICATION Up to 58.7 TB/hr performance Reduces protection storage requirements by 10 to 30x CPU-centric scalability DATA INVULNERABILITY ARCHITECTURE Inline write/read
Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology
Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication
Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking
Network Storage for Business Continuity and Disaster Recovery and Home Media White Paper Abstract Network storage is a complex IT discipline that includes a multitude of concepts and technologies, like
StoneFly SCVM TM for ESXi
StoneFly TM for ESXi Add StoneFly Storage Concentrator Virtual Machine () to your VMware ESXi Server and the possibilities are endless! Reduce your CapEx and OpEx by optimized utilization of servers and
The Difference Between Disaster Recovery and Business Continuance
The Difference Between Disaster Recovery and Business Continuance In high school geometry we learned that a square is a rectangle, but a rectangle is not a square. The same analogy applies to business
EMC Virtual Infrastructure for Microsoft Applications Data Center Solution
EMC Virtual Infrastructure for Microsoft Applications Data Center Solution Enabled by EMC Symmetrix V-Max and Reference Architecture EMC Global Solutions Copyright and Trademark Information Copyright 2009
Improving Microsoft SQL Server Recovery with EMC NetWorker and EMC RecoverPoint
Improving Microsoft SQL Server Recovery with EMC NetWorker and EMC RecoverPoint Applied Technology Abstract This white paper covers how EMC NetWorker and EMC NetWorker modules can be used effectively in
Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs
EMC RECOVERPOINT FAMILY Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs ESSENTIALS EMC RecoverPoint Family Optimizes RPO
Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices
Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices September 2008 Recent advances in data storage and data protection technology are nothing short of phenomenal. Today,
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
What is the Cloud, and why should it matter?
391 12 What is the Cloud, and why should it matter? 23 Everyone seems to be asking about it. No one seems to know exactly what it is, what they need, and where to find it. 4 A Philosophy of Design and
Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.
WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read
WHITE PAPER PPAPER. Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions. for Microsoft Exchange Server 2003 & Microsoft SQL Server
WHITE PAPER PPAPER Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions for Microsoft Exchange Server 2003 & Microsoft SQL Server
Double-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server
Double-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server Double-Take Software, Inc. 257 Turnpike Road; Suite 210 Southborough,
Technology Insight Series
Advancing VMware-based Data Resilience John Webster August, 2011 Technology Insight Series Evaluator Group Advancing VMware-based Data Resilience Copyright 2011 Evaluator Group, Inc. All rights reserved.
STORAGE CENTER WITH NAS STORAGE CENTER DATASHEET
STORAGE CENTER WITH STORAGE CENTER DATASHEET THE BENEFITS OF UNIFIED AND STORAGE Combining block and file-level data into a centralized storage platform simplifies management and reduces overall storage
EMC DATA DOMAIN OPERATING SYSTEM
EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 58.7 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive
Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration
Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta
EMC Business Continuity for Microsoft SQL Server 2008
EMC Business Continuity for Microsoft SQL Server 2008 Enabled by EMC Celerra Fibre Channel, EMC MirrorView, VMware Site Recovery Manager, and VMware vsphere 4 Reference Architecture Copyright 2009, 2010
Downtime, whether planned or unplanned,
Deploying Simple, Cost-Effective Disaster Recovery with Dell and VMware Because of their complexity and lack of standardization, traditional disaster recovery infrastructures often fail to meet enterprise
Availability and Disaster Recovery: Basic Principles
Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer
Lunch and Learn: Modernize Your Data Protection Architecture with Multiple Tiers of Storage Session 17174, 12:30pm, Cedar
Lunch and Learn: Modernize Your Data Protection Architecture with Multiple Tiers of Storage Session 17174, 12:30pm, Cedar Kevin Horn Principal Product Manager Enterprise Data Protection Solutions March
Creating A Highly Available Database Solution
WHITE PAPER Creating A Highly Available Database Solution Advantage Database Server and High Availability TABLE OF CONTENTS 1 Introduction 1 High Availability 2 High Availability Hardware Requirements
Virtual Disaster Recovery
Virtual Disaster Recovery White Paper September 16, 2008 Kelly Laughton Davenport Group Consultant Davenport Group 2008. All rights reserved. Introduction Today s data center has evolved into a complex,
DISASTER RECOVERY PLANNING GUIDE
DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide
IBM Tivoli Storage Manager Suite for Unified Recovery
IBM Tivoli Storage Manager Suite for Unified Recovery Comprehensive data protection software with a broad choice of licensing plans Highlights Optimize data protection for virtual servers, core applications
Backup Software? Article on things to consider when looking for a backup solution. 11/09/2015 Backup Appliance or
11/09/2015 Backup Appliance or Backup Software? Article on things to consider when looking for a backup solution. Ray Quattromini FORTUNA POWER SYSTEMS LTD T: 01256 782030 E: [email protected] W: WWW.FORTUNADATA.COM
High Availability and Disaster Recovery Solutions for Perforce
High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce
IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity
Simplifying storage processes and ensuring business continuity and high availability IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity The risks are even greater for companies that
IBM Storwize V5000. Designed to drive innovation and greater flexibility with a hybrid storage solution. Highlights. IBM Systems Data Sheet
IBM Storwize V5000 Designed to drive innovation and greater flexibility with a hybrid storage solution Highlights Customize your storage system with flexible software and hardware options Boost performance
Business Continuity: Choosing the Right Technology Solution
Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail
W H I T E P A P E R. Disaster Recovery Virtualization Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take
W H I T E P A P E R Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take Contents Introduction...1 What is VMware Infrastructure?...1 What is Double-Take?...1 Data Protection
The case for cloud-based disaster recovery
IBM Global Technology Services IBM SmartCloud IBM SmartCloud Virtualized Server Recovery i The case for cloud-based disaster recovery Cloud technologies help meet the need for quicker restoration of service
Data Center Optimization. Disaster Recovery
Data Center Optimization Disaster Recovery Presentation Overview Introduction to PlateSpin PlateSpin Products and Solutions Overview The Current State of Disaster Recovery Planning Comparing DR Alternatives
Data Backup Options for SME s
Data Backup Options for SME s As an IT Solutions company, Alchemy are often asked what is the best backup solution? The answer has changed over the years and depends a lot on your situation. We recognize
Improving availability with virtualization technology
Improving availability with virtualization technology Renata Budko Solutions Marketing Manager VMware, Inc Why focus on business continuity In the previous years backup & recovery was best effort Today
Server Consolidation with SQL Server 2008
Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations
Wishful Thinking vs. Reality in Regards to Virtual Backup and Restore Environments
NOVASTOR WHITE PAPER Wishful Thinking vs. Reality in Regards to Virtual Backup and Restore Environments Best practices for backing up virtual environments Published by NovaStor Table of Contents Why choose
Virtualizing Exchange
Virtualizing Exchange Simplifying and Optimizing Management of Microsoft Exchange Server Using Virtualization Technologies By Anil Desai Microsoft MVP September, 2008 An Alternative to Hosted Exchange
