EMC DATA PROTECTION SOLUTIONS FOR PUBLIC CLOUD ENVIRONMENTS
|
|
|
- Jody Holland
- 9 years ago
- Views:
Transcription
1 EMC DATA PROTECTION SOLUTIONS FOR PUBLIC CLOUD ENVIRONMENTS TECHNOLOGY PREVIEW ABSTRACT As the enterprise evaluates a move to public cloud, one of the services that often holds them back is enterprise Data Protection for public cloud environments. In this paper we will preview how EMC Data Protection solutions can be deployed in public cloud environments to address enterprise grade Data Protection services for enterprise application workloads. December, 2015 WHITE PAPER
2 To learn more about how EMC products, services, and solutions can help solve your business and IT challenges, contact your local representative or authorized reseller, visit or explore and compare products in the EMC Store Copyright 2015 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. This release contains forward-looking statements as defined under the Federal Securities Laws. Actual results could differ materially from those projected in the forward-looking statements as a result of certain risk factors, including but not limited to: (i) risks associated with the proposed acquisition of EMC by Denali Holdings, Inc., the parent company of Dell, Inc., including, among others, assumptions related to the ability to close the acquisition, the expected closing date and its anticipated costs and benefits; (ii) adverse changes in general economic or market conditions; (iii) delays or reductions in information technology spending; (iv) the relative and varying rates of product price and component cost declines and the volume and mixture of product and services revenues; (v) competitive factors, including but not limited to pricing pressures and new product introductions; (vi) component and product quality and availability; (vii) fluctuations in VMware, Inc. s operating results and risks associated with trading of VMware stock; (viii) the transition to new products, the uncertainty of customer acceptance of new product offerings and rapid technological and market change; (ix) risks associated with managing the growth of our business, including risks associated with acquisitions and investments and the challenges and costs of integration, restructuring and achieving anticipated synergies; (x) the ability to attract and retain highly qualified employees; (xi) insufficient, excess or obsolete inventory; (xii) fluctuating currency exchange rates; (xiii) threats and other disruptions to our secure data centers or networks; (xiv) our ability to protect our proprietary technology; (xv) war or acts of terrorism; and (xvi) other one-time events and other important factors disclosed previously and from time to time in EMC s filings with the U.S. Securities and Exchange Commission. EMC disclaims any obligation to update any such forward-looking statements after the date of this release. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. Part Number H
3 TABLE OF CONTENTS INTRODUCTION... 5 CLOUD USE CASES... 6 BACKUP TO CLOUD... 6 LONG TERM RETENTION BACKUPS TO CLOUD... 7 BACKUP IN CLOUD... 8 BACKUP ACROSS CLOUDS... 9 BACKUP IN CLOUD AND ACROSS CLOUDS SOLUTION COMPONENTS NETWORKER MANAGEMENT CONSOLE NETWORKER SERVER CLOUDBOOST SERVER CLOUD OBJECT STORAGE NETWORKER CLIENT CLOUDBOOST PLUGIN NETWORKER APPLICATION MODULES DESIGN CONSIDERATIONS SOLUTION REQUIREMENTS NETWORKING SCALABILITY AND PERFORMANCE MANAGEMENT AND REPORTING AUDIT AND COMPLIANCE DATA REDUCTION DATA SECURITY AND INTEGRITY DATA CACHING AUTHENTICATION AND AUTHORIZATION VM IMPORT AND EXPORT SERVICE ISOLATION DISASTER RECOVERY CLOUD COSTS PUBLIC CLOUD CONSIDERATIONS AMAZON WEB SERVICES
4 PERFORMANCE DATA REDUNDANCY DATA STORAGE DOMAIN NAME SYSTEM NETWORKING MICROSOFT AZURE PERFORMANCE DATA REDUNDANCY DATA STORAGE DOMAIN NAME SYSTEM NETWORKING SUMMARY ADDITIONAL RESOURCES
5 INTRODUCTION With the rise of public cloud computing, companies are evaluating how they can leverage public cloud resources to become more agile and competitive in the marketplace. As companies proceed down this path it is natural to become overwhelmed by the risk and uncertainty associated with treading these uncharted waters. After all, a path to the public cloud involves giving up certain freedoms, such as ownership of IT assets and controls to respond to any situation. Another way to describe this phenomenon is to understand who has the balance of power. When consuming public cloud resources the balance of power shifts to the public cloud provider. This may be an uncomfortable thought for some, and may even force one to withdraw from the journey. However, there is a way to navigate the uncertainty that public clouds introduce. We call it Data Protection Everywhere Data Protection Everywhere is about ensuring you maintain custody and control over your data assets irrespective of where or how they are stored. Data Protection is a key tenet of sound IT strategy that has withstood the test of time. In this new era of public cloud computing, the need for Data Protection is magnified and warrants special attention given the freedoms you are required to forego. EMC is the world leader in Data Protection solutions. With the release of this technology preview, we are excited to showcase how EMC s Software-Defined Data Protection solutions will be able to help you gain control of your journey to public cloud, giving you the same level of comfort, control and protection to confidently embark on your journey to any cloud. The remainder of this paper outlines a number of approaches for protecting workloads running in public cloud environments. These approaches have specifically been verified against Amazon Web Services (AWS) and Microsoft Azure. In the future, we intend to expand the scope to include consideration for other public cloud providers. 5
6 CLOUD USE CASES This paper introduces five use cases available to support an organization s cloud-enabled Data Protection requirements with EMC s Data Protection solutions. This section describes each use case along with the advantages, disadvantages and requirements to help the reader align their cloud-based Data Protection requirements with the most suitable use case. BACKUP TO CLOUD The Backup to Cloud use case is designed for situations where the user has on-premises infrastructure and would like to use public cloud object storage for all backup workloads, including short term backups for operational recovery, and long term backups for compliance. This architecture consists of NetWorker and CloudBoost servers (virtual or physical) located onpremises. The CloudBoost server deduplicates, compresses and encrypts the data before sending it to the object storage. The CloudBoost server can optionally be attached to data storage that caches backup data as it moves through the CloudBoost server to object storage. The cache can be used to complete backups faster while masking the affects of bandwidth constrained WAN connections (below 200 Mbps). Similarly, and subject to the size of the environment requiring backups, the backup cache can be sized to retain the most frequent backup copies on-premises for fast restore. In the event of an irrevocable failure of on-premises systems, the NetWorker and CloudBoost servers can be instantiated in the public cloud environment to virtual machine instances, and backups recovered directly from the object storage to the disaster recovery virtual machine instances. Advantages Disadvantages Requirements Fast restore from locally cached shortterm backup copies Ability to restore systems and applications from backups stored in the cloud, to public cloud compute instances Consumption of low-cost deduplicated public cloud object storage for all backup copies Restoration speed of backup copies from a cloud providers object storage is entirely dependent on the network connectivity and performance of the provider s service at the time of restore There is no second independent copy of backup data stored outside of the public cloud provider s control and infrastructure Potential for data loss in the event the public cloud provider s service malfunctions or is compromised High retrieval cost to move backup copies from one public cloud provider to another or to an on-premises solution if the need arises Minimum one NetWorker server for onpremises cloud (physical or virtual) Minimum one CloudBoost server for onpremises cloud (physical or virtual) Minimum 100 GB data storage for CloudBoost metadata (virtual only) HTTPS connectivity between CloudBoost server and object storage HTTPS connectivity between CloudBoost server and EMC cloud portal 6
7 LONG TERM RETENTION BACKUPS TO CLOUD The Long Term Retention Backups to Cloud use case is designed for situations where the user has existing on-premises infrastructure and would like to use public cloud object storage for long term retention and compliance requirements. Backup copies required for short term operational recovery remain on-premises for fast restore; and optionally, a disaster recovery site may be established for contingency purposes. Ideal candidates for this use case include backup environments that use tape for long term retention and compliance. In this case the tape storage is replaced with public cloud object storage. This architecture consists of NetWorker and CloudBoost servers located on-premises in addition to local storage, Data Domain protection storage for example, to support short term operational recovery requirements. The CloudBoost server can be attached to data storage in order to cache backup data as it is copied from the local storage through the CloudBoost server to public cloud object storage. The CloudBoost server deduplicates, compresses and encrypts the data before sending it to the public cloud object storage. This process is controlled by the NetWorker policy engine and allows backup and cloning operations to occur concurrently. The optional backup cache allows backups to complete faster while masking the affects of bandwidth-constrained WAN connections. In this illustration long term retention copies to public cloud object storage are created from the disaster recovery site (Site B). Alternatively, if the CloudBoost server is located at the production site (Site A), copies to public cloud object storage could also originate from the production site. In the event of an irrevocable failure to on-premises production systems, the surviving NetWorker and CloudBoost servers in the disaster recovery site assume ownership of backup and restore activities for both short and long term backup copies. Advantages Disadvantages Requirements Fast restore from on-premises short-term backup copies Efficient on-premises short-term backup copies stored and replicated using Data Domain deduplication Reliable on-premises short-term backup copies protected by Data Domain s Data Invulnerability Architecture Consumption of low-cost deduplicated public cloud object storage for long term retention backup copies There is no second independent copy of the long term retention backup copies stored outside of the public cloud provider s control and infrastructure Potential for long term retention data loss in the event the public cloud provider s service malfunctions or is compromised High retrieval cost to move backup copies from one public cloud provider to another or to an on-premises solution if the need arises Minimum two NetWorker servers for onpremises cloud (virtual or physical) Minimum one CloudBoost server for onpremises cloud (virtual or physical) Minimum 100 GB data storage for CloudBoost metadata (virtual only) HTTPS connectivity between CloudBoost server and object storage HTTPS connectivity between CloudBoost server and EMC cloud portal 7
8 BACKUP IN CLOUD The Backup in Cloud use case is designed for situations where the user has workloads running in public cloud virtual machine instances and would like to use public cloud object storage for all backup workloads, including short term backups for operational recovery and long term retention backups for compliance. This architecture consists of NetWorker and CloudBoost servers deployed as public cloud virtual machine instances. The CloudBoost server is used to move backup data from NetWorker clients through the CloudBoost server to public cloud object storage. The CloudBoost server deduplicates, compresses and encrypts the data before sending it to the public cloud object storage. As the distance between the CloudBoost server and public cloud object storage is short, the backup cache is not required. In fact, in this scenario the use of a cache would slow down backup and restore processing. This use case does not include a mitigation strategy to address an irrevocable failure to the public cloud provider s services. Consequently, the risk of permanent data loss increases compared to other use cases. Advantages Disadvantages Requirements Consumption of low-cost deduplicated public cloud object storage for all backup copies No on-premises infrastructure required There is no second independent copy of the backup data stored outside of the public cloud provider s control and infrastructure Potential for data loss in the event the public cloud provider s service malfunctions or is compromised High retrieval cost to move backup copies from one public cloud provider to another or to an on-premises solution if the need arises Minimum one NetWorker server for public cloud Minimum one CloudBoost server for public cloud Minimum 100 GB data storage for CloudBoost metadata HTTPS connectivity between CloudBoost server and object storage HTTPS connectivity between CloudBoost server and EMC Cloud Portal 8
9 BACKUP ACROSS CLOUDS The Backup across Clouds use case is designed for situations where the user is consuming workloads in two independent public clouds, regions or instances and would like to protect each cloud s workload using offsite backups to the alternate cloud. This architecture consists of NetWorker and CloudBoost servers deployed on public cloud virtual machine instances. These instances support the short term operational recovery and long term retention requirements of all deployed public cloud workloads. The CloudBoost servers in each cloud are optionally attached to data storage to cache backup data as it is moves through the CloudBoost server to the remote public cloud object storage. The CloudBoost servers deduplicate, compress and encrypt the data before sending it to the public object storage. In this illustration the two clouds are labeled public; however, it is possible to use a combination of public and private clouds including private cloud object storage. In the event of an irrevocable failure in one of the public clouds, the NetWorker and CloudBoost servers can be instantiated in the surviving public cloud environment to assume ownership of backup and restore activities for both short and long term retention copies. Advantages Disadvantages Requirements Fast restore from locally cached shortterm backup copies Consumption of low-cost deduplicated public cloud object storage for all backup copies Multiple backup copies maintained across independent public clouds reducing potential for data loss No exit costs as two independent backup copies are maintained across independent public clouds Higher cost as two independent backup copies are maintained across two independent public clouds Restore speeds of non-cached backups will depend on inter-cloud network performance Minimum two NetWorker servers for public clouds Minimum two CloudBoost servers for public clouds Minimum 100 GB data storage for CloudBoost metadata HTTPS connectivity between CloudBoost server and object storage HTTPS connectivity between CloudBoost server and EMC cloud portal No on-premises infrastructure required 9
10 BACKUP IN CLOUD AND ACROSS CLOUDS The Backup in Cloud and across Clouds use case is designed for situations where the user is consuming workloads in public clouds and would like to protect each workload using local backups for fast restore, and cloned backups across clouds to maintain offsite independent backup copies. The backups stored in both clouds can be used for both short term operational recovery and long term backups for compliance. This architecture consists of NetWorker and CloudBoost servers deployed on public cloud virtual machine instances to support the short term operational recovery and long term retention requirements of public cloud workloads. The CloudBoost servers that facilitate cloning of backups to the remote public cloud are optionally attached to data storage in order to cache data as it moves through the CloudBoost server to the remote public cloud object storage. The CloudBoost servers deduplicate, compress and encrypt the data before sending it to the public object storage. In this illustration the two clouds are labeled public; however, it is possible to use a combination of public and private clouds including private cloud object storage. In the event of an irrevocable failure in one of the public clouds, the NetWorker and CloudBoost servers can be instantiated in the surviving public cloud environment to assume ownership of backup and restore activities for both short and long term retention copies. Advantages Disadvantages Requirements Fast restore from local backup copies across all retention classes Consumption of low-cost deduplicated public cloud object storage for all backup copies Multiple backup copies maintained across independent public clouds reducing potential for data loss No exit costs as two independent backup copies are maintained across independent public clouds Higher cost as two independent backup copies are maintained across two independent public clouds Additional CloudBoost servers required Minimum two NetWorker servers for public clouds Minimum four CloudBoost servers for public clouds Minimum 100 GB data storage for CloudBoost metadata HTTPS connectivity between CloudBoost server and object storage HTTPS connectivity between CloudBoost server and EMC cloud portal No on-premises infrastructure required 10
11 SOLUTION COMPONENTS This section describes the role of the solution components and relationships to support the various cloud use cases. NetWorker Management Console NetWorker Server NetWorker Server CloudBoost Server CloudBoost Server CloudBoost Server CloudBoost Server Cloud Object Storage Cloud Object Storage NetWorker Client Networker CloudBoost Client Application Module NetWorker Client Networker CloudBoost Client Application Module Figure 1 Solution components and how they are related NETWORKER MANAGEMENT CONSOLE All NetWorker servers and clients are managed from the NetWorker Management Console server. The management console provides reporting and monitoring capabilities for all NetWorker servers and clients and can also provide logging and alerting of events and notifications. The console server is accessed through a graphical user interface that can be run from any system with a supported web browser and Java Runtime Environment (JRE). Multiple users can access the console and authentication can be integrated with Lightweight Directory Access Protocol (LDAP/S) and Microsoft Active Directory Server (AD). To reduce the number of virtual machine instances required, the console server can be deployed on a server that is also acting as the NetWorker server NETWORKER SERVER The NetWorker Server is the core component of the solution and supports the policy, scheduling and catalog functions of the solution to manage backup and recover processes between the NetWorker clients, CloudBoost servers and cloud object storage. The NetWorker server also coordinates NetWorker Application Modules to create consistent and recoverable backup copies of operating system and application workloads. The NetWorker server can be deployed on either Windows or Linux systems. For a compete list of supported operating systems refer to the Online NetWorker Compatibility Matrix. CLOUDBOOST SERVER The CloudBoost server provides connectivity and access to the cloud object storage for backup data. NetWorker clients communicate with the CloudBoost server to backup and restore from backup copies stored in the cloud object storage. Each CloudBoost server can be associated with one cloud object storage profile. Some of the important functions performed by the CloudBoost server include data compression, data deduplication and encryption. As data passes through the CloudBoost server it is deduplicated using a variable block algorithm, followed by compression and encryption before it is written to a cloud object storage bucket or container. This process ensures the minimum amount of storage and network bandwidth is consumed and is designed to yield significant cost savings over solutions that do not provide data compression and data deduplication features. 11
12 Once deployed and activated, the CloudBoost server is considered headless and managed via the EMC Cloud Portal. This portal is hosted by EMC so that CloudBoost servers can be deployed and managed across any combination of private and public cloud environments. The EMC Cloud Portal is accessed via a standard web browser. Some of the management functions available include configuration, monitoring, capacity and performance management, upgrading and recovering CloudBoost servers. Below are sample screenshots of the EMC Cloud Portal in action. Figure 2 List of CloudBoost servers 12
13 Figure 3 CloudBoost server usage details 13
14 CLOUD OBJECT STORAGE Cloud object storage is high density, low cost storage designed for infrequently accessed data. In this solution, the cloud object storage is used to store backup copies for short term operational recovery requirements and/or long term retention and compliance requirements. The cloud object storage represents a near infinite amount of storage that can be consumed by the CloudBoost server and optionally CloudBoost plugins, to store and retrieve backup copies. For a list of supported object stores refer to the CloudBoost compatibility matrix. Below are sample screenshots of Azure Blob storage and Amazon S3 storage that have been consumed by a CloudBoost server. Figure 4 List of CloudBoost objects in Azure Storage container 14
15 Figure 5 List of CloudBoost objects in AWS S3 bucket 15
16 NETWORKER CLIENT A NetWorker client is a software component deployed in the public cloud virtual machine instances to protect the operating system and application data. Once deployed, the client configuration is performed from the NetWorker Management Console and associated with one or more protection policies. These protection policies determine when clients are protected, what is protected, where backup copies are sent, and how long they are retained. With the NetWorker client deployed, backups and recoveries are sent to a CloudBoost server where data compression, deduplication and encryption activities occur before writing to the cloud object storage. The diagram below illustrates the data path for NetWorker client deployments that do not include the CloudBoost plugin. The public cloud object storage is accessed via the CloudBoost server. Figure 6 Dataflow of NetWorker client The CloudBoost server can be deployed with or without a local data cache and will depend on the proximity of the cloud object storage to the server and available bandwidth. 16
17 CLOUDBOOST PLUGIN The CloudBoost plugin is an optional software component that can be enabled in NetWorker clients to maximize the aggregate performance and efficiency of the Data Protection service. With the CloudBoost plugin enabled, the NetWorker client can perform backups and recoveries directly to the cloud object storage, and assumes responsibility for data deduplication, compression and encryption activities before writing to the cloud object storage. The diagram below illustrates the data path for NetWorker clients deployed with the CloudBoost plugin. The public cloud object storage can be accessed directly or via a web proxy server. For high performance requirements, use of a web proxy is not recommended. Figure 7 Dataflow of NetWorker client with CloudBoost plugin To ensure data is deduplicated across clients, the CloudBoost plugin exchanges metadata with the CloudBoost server to check if a block of data has been backed up previously before committing it to cloud object storage. This avoids transmitting duplicate blocks of data and ensures the solution delivers global deduplication efficiency across clients using the same CloudBoost server. Although optional, there are several performance and security benefits to using the CloudBoost plugin: Deduplicates, compresses and encrypts the data before it leaves the client, ensuring data is transmitted efficiently and securely Sends and recalls data directly to/from the cloud object storage and avoids passing the data through a backup server Increases the aggregate performance of the environment by distributing the data processing to the CloudBoost plugins NetWorker s Block Based Backup feature can be used to further increase performance of backup and restores Another benefit is in the case where backups are created across different public cloud providers. The CloudBoost plugin can be enabled for a remote NetWorker client to facilitate direct access to the local public cloud object storage. This avoids bulk data transfer from one public cloud to another and expedites the restore process. 17
18 NETWORKER APPLICATION MODULES NetWorker application modules are software components deployed alongside NetWorker clients to integrate the Data Protection service with application workloads. It is recommended these modules be deployed to provide application administrators control and visibility of Data Protection services, granular recovery capabilities and to ensure the application state is transaction consistent at the time of backup. There are two application module bundles that would be appropriate for public cloud use cases. NetWorker Module for Microsoft (NMM) support for Microsoft applications (e.g. MS SQL, Exchange, SharePoint) NetWorker Module for Databases and Applications (NMDA) support for UNIX applications (e.g. Oracle, DB2, Sybase, SAP, MySQL) For a complete list of all supported applications refer to the Online NetWorker Compatibility Matrix. 18
19 DESIGN CONSIDERATIONS For many organizations exploring the consumption of public cloud services, the transition from on-premises solutions to public cloud will raise many questions. This section details some of the design considerations we encountered when evaluating our solution using the AWS and Azure public cloud platforms as targets. While these considerations are specific to the solution and use cases described in this paper, the reader may find they are generally applicable to other Data Protection solutions. SOLUTION REQUIREMENTS The following table outlines the minimum NetWorker server requirements for small, medium and large configurations. Size of configuration Small configuration (up to 50 clients, approximately 1000 jobs per day) Medium configuration (up to 200 clients, up to 10,000 jobs per day) Large configuration (up to 500 clients, more than 10,000 jobs per day) Minimum requirements 2 CPU cores, 8 GB RAM, 1 GbE 4 CPU cores, 16 GB RAM, 1 GbE 8 CPU cores, 32 GB RAM, 1 GbE Table 1 NetWorker server sizing For more elaborate sizing and requirements refer to the NetWorker Performance Optimization Planning Guide. The CloudBoost server is sized relative to the amount of logical backup data under management and whether the data cache is enabled or disabled. If the CloudBoost server is in close proximity to the cloud object storage and exhibits LAN characteristics, then the data cache option should be disabled. This will improve ingress and egress performance and speed up the backup and recovery process. Data Cache Disabled 8 CPU cores, 32 GB RAM, 1-10 GbE 100 GB of metadata storage per 400 TB of logical backup data under management Maximum 6 PB logical data under management per server Data Cache Enabled 16 CPU cores, 64 GB RAM, 1-10 GbE 100 GB of metadata storage per 400 TB of logical backup data under management Maximum 6 PB logical data under management per server Minimum 200 GB and up to 6 TB of data cache storage Table 2 CloudBoost server sizing The amount of cloud object storage consumed will depend on the backup retention, frequency and application data types protected. In a typical environment CloudBoost technology will yield a 1.5:1 to 4:1 deduplication ratio for the first backup (e.g., 100 TB of backup will be reduced to between 25 TB and 66 TB). For subsequent backups, the amount of data that changes is the primary contributor to the deduplication rate. A lower change rate will yield higher deduplication rates while a higher change rate will yield lower deduplication rates. Furthermore, shorter intervals between backups will yield higher rates and longer intervals lower rates. For detailed sizing advice please contact your EMC Systems Engineer. 19
20 NETWORKING A common approach to deploying infrastructure services in the public cloud is to create a virtual network segment specifically for infrastructure services. The VMs that support the services are deployed into this segment to provide isolation from other systems and segments. In the example below the NetWorker and CloudBoost servers are deployed in a services segment. Network access controls are used to enforce which systems and segments can access the services. Internet Cloud Provider Frontend NAC LB VM VM VM NWC NWC NWC NWC DNS Backend NAC LB VM VM VM NWC NWC NWC Services NAC NetWorker VM CloubBoost VM Cloud Object Store NWC = NetWorker client NAC = Network Access Controls Virtual Private Network Figure 8 Example cloud network design NetWorker and CloudBoost both require DNS services. In this example they are hosted locally on a DNS server in the frontend network. Alternatively, DNS services from the cloud provider or external Internet facing providers can be used. As the needs of the infrastructure services grow, additional servers are deployed in the services segment and workloads are distributed accordingly. 20
21 SCALABILITY AND PERFORMANCE One of the frequently under-estimated characteristics of a public cloud service is the infrastructure supporting the services are often shared amongst unrelated users. In order to ensure each user receives their fair share of resource time, cloud providers employ automated resource management techniques to minimize the impact one user can have on another when consuming the same resources. This behavior makes measuring and modeling performance highly unpredictable and circumstantial. Given this, it would be innappropriate to claim particular levels of performance when consuming public cloud resources with this solution. However, it is appropriate to share how the solution components scale with additional cloud resources. The primary components that need to scale in this solution are the NetWorker server and CloudBoost server. The NetWorker server is responsible for tracking real-time activities across the Data Protection service. There is a limit to the number of real-time activities and elements a NetWorker server can track given the available resources. The NetWorker server sizing table in the solution requirements section of this document describes how the virtual machine resources can be scaled up to satisfy additional workload. Once it is determined that scaling up yields diminishing returns, the environment must scale out by adding a subsequent NetWorker server. When this occurs a subsequent CloudBoost server must also be added as there is a one-to-one relationship between a CloudBoost server and a NetWorker server. In the event the CloudBoost server needs to scale to support higher data volumes within a desired backup window, the environment must scale out by adding a second CloudBoost server and associating it with the existing NetWorker media pool. Once this is done NetWorker will distribute the workloads across the available CloudBoost servers. Alternatively, if the capacity that a CloudBoost server can manage is exhausted, then the NetWorker device that manages it should be flagged read-only. This will prevent new backups from being written to the full CloudBoost server while still allowing recoveries. A second CloudBoost server should be added to take over the remaining backup workload. The CloudBoost server that was flagged read-only can be flagged read-write once the amount of data under management falls to acceptable levels caused by old backups expiring. MANAGEMENT AND REPORTING The Data Protection service is managed using a Java client downloaded from the NetWorker server over the Java Network Launch Protocol (JNLP). This allows the service to be managed from anywhere so long as access to the required network ports is made available to the desired management clients. Conversely, it is also possible to deploy a Windows or Linux desktop in the public cloud that is used as a jump server to manage access to the systems. This avoids opening up management activities to the public facing Internet. Operational reporting is provided by the NetWorker server using the NetWorker Management Console. The NetWorker server collects information from the environment and stores it in a database. The NetWorker Management Console interrogates this database to produce a number of reports on backup status, backup statistics, events, hosts, users and devices. For a detailed understanding of NetWorker s management and reporting capabilities refer to the NetWorker Administration Guide. For more advanced reporting, including reporting across multiple NetWorker servers, clouds and on premise deployments, EMC s Data Protection Advisor can be used. Data Protection Advisor (DPA) is a comprehensive monitoring, analytics, alerting and reporting platform that provides businesses with full visibility into the utilization, effectiveness and compliance status of their data protection environment. For more information on DPA refer to AUDIT AND COMPLIANCE The data collected by the NetWorker server facilitates auditing tasks and activities performed by specific users. By default the retention policy for audit data is one year; however, this can be increased as required. Refer to the NetWorker Administration Guide to learn how to adjust the audit retention period. 21
22 DATA REDUCTION The CloudBoost technology embedded in the CloudBoost server and plugin implements data reduction techniques to significantly reduce the consumption of cloud object storage. Specifically, CloudBoost implements the Rabin-fingerprinting scheme to identify natural break points in the backup stream and then use these break points to eliminate variable blocks of data that have been stored previously by the CloudBoost server. CloudBoost purposefully uses a large average block size of 256KB as cloud object stores tend to exhibit very high overheads for any write or commit operation. By using larger and fewer blocks, the solution can support significantly higher throughput than would be possible with small block schemes. Once blocks are identified as unique, they are compressed, encrypted and transferred to the cloud object storage and stored as objects. References to the objects are added to the CloudBoost metadata database. When backups expire and unique blocks become orphaned, the CloudBoost server reclaims space by removing the corresponding objects. This process is very efficient and is specifically designed to reclaim space without recalling objects. DATA SECURITY AND INTEGRITY The CloudBoost technology implements both in-flight and at rest encryption for all transactions. CloudBoost uses Secure Socket Layer (SSL) to communicate with the object storage and also produces signed URLs that are only valid for a limited time and cannot be replayed. The signed URLs are used to access the public object storage securely. CloudBoost uses Advanced Encryption Standard (AES-256) to encrypt the data stored in the cloud object storage. CloudBoost ensures the data is written to the cloud object storage correctly. To achieve this a cryptographic hash is generated for the object. This hash is passed to the cloud object storage along with the data at the time it is created. This allows the cloud object storage to validate that the correct data was received and, as a final check, the CloudBoost server checks that the object is present. For features such as fault detection and healing, CloudBoost relies on the underlying cloud object storage to support these low-level data integrity activities. The diagram below illustrates the CloudBoost data flow when the CloudBoost plugin is enabled in the NetWorker client. Figure 9 Dataflow using NetWorker client with CloudBoost plugin enabled 22
23 The diagram below illustrates the CloudBoost data flow when the NetWorker client is deployed without the CloudBoost plugin. Figure 10 Dataflow using NetWorker client with CloudBoost plugin disabled DATA CACHING The CloudBoost technology can be deployed with a local data cache that is used to cache backup data destined for the cloud object storage. In public cloud deployments the data cache must be allocated from a virtual disk image and attached to the CloudBoost server at the time of setup. The data cache should only be used when the CloudBoost server and object storage are separated by WAN characteristics. This will allow the cache to temporarily mask the effects of WAN connectivity. It is important to recognize the caching feature can only provide short term relief from bandwidth constrained environments. If bandwidth is consistently constrained relative to the amount of data that must be written to the cloud object storage, then the disk cache will eventually reach its maximum space threshold and will trigger CloudBoost to throttle the ingest rate. Once the cache falls below its maximum space threshold the throttling will subside. This process will continue until the backup workload is completed. When sizing the cache it is best to choose a cache that is larger than the size of the backups being transferred unless the available bandwidth to the object storage is above 200 Mbps. The data cache will reclaim space based on a first-in-first-out basis. This is where the oldest data that entered the cache will be removed to make room for new data. Once a minimum space threshold is met the CloudBoost server will cease removing old data. The CloudBoost server supports up to 6 TB of data cache. 23
24 AUTHENTICATION AND AUTHORIZATION NetWorker Authentication Service provides a NetWorker environment with token-based authentication and single sign on (SSO) support. Token-based authentication enables users to securely connect to the NetWorker Management Console, the NetWorker server, and to perform secure backup and recover operations. When a NetWorker or NetWorker Management Console operation requires authentication, the requesting process contacts the NetWorker Authentication Service to verify the credentials of the user account that started the request. When the NetWorker Authentication Service successfully verifies the user, the application issues a time-limited, signed, and encrypted SAML token to the requesting process. All the NetWorker components that require authentication can use the token to verify the user, until the token expires. The NetWorker Authentication Service supports both an internal authentication authority and external authentication authority via LDAP and AD services. The service also provides a hierarchical security model for users and groups, which enables you to define access levels, authentication, and authorization in a multi-tenant configuration. For further information refer to the NetWorker Security Configuration Guide. VM IMPORT AND EXPORT The import and export of data to the cloud can be facilitated by adopting the Backup across Clouds use case. This allows remote backups from one cloud to be recovered to a running VM instance in the alternate cloud. Importing and exporting entire VM instances is best achieved with the cloud provider s integrated tools. The general approach involves: Powering down the VM Creating a snapshot of the VM Exporting the snapshot to a flat file Copying the file to the alternate cloud Creating a VM from the file image Powering on and reconfigure the VM For further information refer to the cloud providers VM import and export instructions. SERVICE ISOLATION One of the most important principles of a Data Protection strategy is maintaining separation of concerns between the primary systems being protected and the systems providing the protection. When we think about Data Protection we usually think in terms of recovery point objective and recovery time objective. What we rarely consider are the events we are protecting against and whether the protection methods and controls we employ are effective against these events. Public cloud environments introduce new levels of uncertainty and risk that we need to account for in the design of Data Protection services. It is important to ensure the overall strategy employed provides diversification away from primary systems, by taking copies of data and placing them under the control of different and diverse systems. Separating the concerns of the Data Protection service and systems away from the primary systems being protected minimizes events from propagating to the protection copies and compromising the recovery position. One way to implement separation of concerns for public cloud environments is to allocate the Data Protection resources from a separate cloud account that is isolated from the cloud account hosting the primary application systems. This provides management isolation between the accounts supporting the primary datasets and protection copies. 24
25 DISASTER RECOVERY While very unlikely, public cloud environments are not immune to long outages and disaster scenarios. It is prudent to ensure that Data Protection services and the data under management is recoverable from failure scenarios affecting the public cloud provider. There are three datasets required to rebuild the Data Protection service. These include the NetWorker server bootstrap data and client file indexes, and the CloudBoost server metadata database. NetWorker bootstrap data and client file indexes are backed up regularly via standard NetWorker policy 1. The CloudBoost metadata is also backed up regularly to the cloud object storage and is configured via the EMC Cloud Portal. In the event of a disaster that renders the servers inoperable the following steps would be taken: Deploy a new CloudBoost server and register it to the EMC Cloud Portal account (but do not configure it) Recover the CloudBoost server using the EMC Cloud Portal (select the un-configured CloudBoost server) Deploy a new NetWorker server instance and associate it with the CloudBoost server Recover the NetWorker bootstrap and client file indexes For further information refer to the NetWorker Server Disaster Recovery and Availability Best Practices Guide. CLOUD COSTS Understanding the cost of cloud services is necessary before embarking on your cloud journey. With respect to Data Protection services the rate of cloud object storage comsumption will be quite rapid initially and will not exhibit a slow ramp up period that you may be familiar with when deploying storage for application servers. When Data Protection services are activated, the first backup copy consumes the greatest amount of storage as it benefits least from data reduction techniques. However, subsequent copies consume a fraction of the total required cloud object storage. Therefore, when budgeting for cloud object storage, it is necessary to budget upfront approximately 30-50% of the total storage required to support the desired data protection and retention policies. Furthermore, it is important to recognize the criticality of Data Protection services particularly when deployed alongside application servers in public cloud, as the failure of the cloud could render your recovery position untenable. Therefore, it is recommended the cloud services supporting the Data Protection service are placed under premium levels of support to allow you to better respond to unplanned events. 1 NetWorker requires the bootstrap data to be backed up to a local device. This can be achieved by installing the CloudBoost plugin on the NetWorker server and using the CloudBoost server as a local backup device. 25
26 PUBLIC CLOUD CONSIDERATIONS This section outlines a number of deployment considerations when implementing the use cases outlined in this paper for a variety of pubic cloud providers. AMAZON WEB SERVICES PERFORMANCE We understand the performance of AWS S3 is throttled which will prematurely limit the performance of CloudBoost to S3. To maximize performance, open a support case with AWS and request that rate limits be removed. Refer to AWS S3 Request Rate and Performance Considerations. DATA REDUNDANCY The durability of data copies stored in AWS S3 is a function of the AWS S3 service. As of this time there are three classes supported. Standard: designed for 99.99% availability and % durability Standard-Infrequent Access: designed for 99.9% availability and % durability Reduced Redundancy: designed for 99.99% availability and 99.99% durability 2 It is important to recognize that redundancy provided by S3 does not prevent data loss in the event of accidental, intentional or malicious deletion of objects contained in the S3 storage. It is for this reason you should strongly consider whether other forms of isolation are necessary to minimize the risk of permanent data loss. One common approach to preventing data loss is to maintain multiple backup copies of data across diverse and independent storage systems; for example, by storing one copy in S3 and a second copy in Azure Blob Storage. This approach can help minimize the risk that an incident will affect both copies. For further information refer to AWS S3 services documentation. DATA STORAGE The CloudBoost server requires Amazon Elastic Block Store (AWS EBS) for the operating system disk, metadata database and optional data cache. In an AWS environment it is recommend the metadata database and optional data cache be allocated from AWS general purpose or provisioned IOPS (SSD) volumes which provide high IOPs and throughput. AWS EC2 instance storage volumes are ephemeral and should not be used for the NetWorker Servers or CloudBoost Servers. When the CloudBoost data cache feature is used, the data written to EBS volumes is only replicated within its Availability Zone to protect from component failure. If by chance the Availability Zone is lost, this data will be unrecoverable. If this is undesirable, do not use the disk cache feature which is only required when the CloudBoost server and object storage are separated by WAN conditions. DOMAIN NAME SYSTEM The Data Protection service requires hostnames and IP addresses to resolve via the Domain Name System (DNS). AWS includes support for hosting your own domains on the AWS Route 53 DNS service or DNS servers of your choice. For further information refer to AWS Route 53 services documentation. NETWORKING In an AWS Virtual Private Cloud (VPC) environment, each virtual machine is assigned an IP address from a defined virtual network and a public IP address that is accessible via a load balancer. By default, Internet facing access to the public IP address is enabled for secure shell where the VM is running Linux and Windows Remote Desktop where the VM is running Windows. 2 Reduced redundancy is not appropriate for deduplicated backups due to the expected data loss of 1 out of 10,000 objects per year. 26
27 In order to set up the CloudBoost server, secure shell access should be used. However, once set up, it can be removed from the CloudBoost server s VM security group using the AWS portal. To access the NetWorker Management Console from AWS s Internet facing load balancers, the following firewall rules should be enabled against the NetWorker server VM. Source Target Protocol Port Management Clients NetWorker Server TCP 5432, 9000, 9001 Note: The CloudBoost Server is managed via the EMC Cloud Portal which is accessible from the Internet. Therefore the CloudBoost server must continue to have Internet access. By default AWS S3 storage is accessed by sending data over an Internet connection from the VPC. To avoid the Internet it is possible to configure an AWS endpoint to bypass the Internet. For more information refer to AWS VPC endpoints documentation. When selecting the machine type to run CloudBoost server, consider the network available to the machine. AWS provides four network types: low to moderate, moderate, high and 10 Gigabit. The high network type will result in Gigabit network speeds. This was verified with iperf3 between clients and the CloudBoost server. This the minimum recommended. If higher network capacity is required, deploy the CloudBoost server on a machine with 10 Gigabit network type. Alternatively, deploy multiple CloudBoost servers and distribute the workload between them. 27
28 MICROSOFT AZURE PERFORMANCE During the testing phase of this technology preview, we recognized that the limiting factor preventing higher levels of performance was the network connectivity available between the virtual machine instances supporting the NetWorker clients and CloudBoost servers. Using iperf3 we conducted network performance bandwidth tests between the NetWorker virtual machine instances and CloudBoost virtual machine instances to characterize the available bandwidth between them. The Azure A2 instances used for the NetWorker clients peaked at ~500 Mbit/sec ingress and egress bandwidth rates. The Azure A4 instances used for the CloudBoost server peaked at ~1000 Mbit/sec ingress and egress bandwidth rates. It is important to identify and recognize the limits of the virtual machine instances used to support Data Protection services in order to achieve the desired backup and recovery expectations for the volumes of data requiring protection. In addition to networking constraints, we also noticed the performance of Azure storage used for the operating system and application workloads also exhibit low performance for standard Azure storage. In order to achieve a reliable service that can be recovered quickly, one should consider using performance Azure storage for important application workloads and spreading these workloads across multiple Azure storage accounts. For further information refer to Azure Subscription and Service Limits, Quotas, and Constraints documentation. DATA REDUNDANCY The durability of data copies stored in Azure Blob storage is a function of the Azure Storage service. As of this time there are three replication modes supported. Locally redundant replicates data within the same region Geo redundant replicates data to a secondary storage region Read-access geo redundant replicates data to a secondary storage region with read-only access enabled It is important to recognize that redundancy provided by Azure Storage does not prevent data loss in the event of accidental, intentional or malicious deletion of objects contained in the Azure Blob storage. It is for this reason you should strongly consider whether other forms of isolation are necessary to minimize permanent data loss. One common approach to preventing data loss is to maintain multiple backup copies of data across diverse and independent storage systems; for example, by storing one copy in Azure Blob Storage and a second copy in Amazon Simple Storage Service. This approach can help minimize the risk that an incident will affect both copies. For further information refer to Azure Storage services documentation. DATA STORAGE The CloudBoost server requires Azure Blob storage for the operating system disk, metadata database and optional data cache. In an Azure environment it is recommend that the metadata database and optional data cache be allocated from Azure premium storage disks which provide high IOPs and throughput. DOMAIN NAME SYSTEM The Data Protection service requires hostnames and IP addresses to resolve via the Domain Name System. Azure includes support for hosting your own domains on Azure DNS servers or DNS servers of your choice. For further information refer to Azure DNS services documentation. 28
29 NETWORKING In an Azure environment each virtual machine is assigned a private IP address from a defined virtual network and a public IP address that is accessible via a load balancer. By default, Internet facing access to the public IP address is enabled for secure shell where the VM is running Linux, and Windows Remote Desktop where the VM is running Windows. In order to set up the CloudBoost server, secure shell access should be used. However, once set up, it can be removed from the CloudBoost server s VM endpoint configuration using the Azure portal. To access the NetWorker Management Console from Azure s Internet facing load balancers, the following firewall rules should be enabled against the NetWorker server VM. Source Target Protocol Port Management Clients NetWorker Server TCP 5432, 9000, 9001 Note: The CloudBoost Server is managed via the EMC Cloud Portal, which is accessible from the Internet. Therefore the CloudBoost server must continue to have Internet access. 29
30 SUMMARY This technology preview has shown how EMC Data Protection solutions can be used to protect valuable customer data in the most common public and private cloud use cases. The advantages, disadvantages and requirements of each use case are also discussed to help the reader match their requirements to the most apporiate use case. 30
31 ADDITIONAL RESOURCES Link to NetWorker documentation Link to CloudBoost documentation Link to NetWorker with CloudBoost Technical Demo Video 31
Understanding EMC Avamar with EMC Data Protection Advisor
Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection
EMC AVAMAR INTEGRATION WITH EMC DATA DOMAIN SYSTEMS
EMC AVAMAR INTEGRATION WITH EMC DATA DOMAIN SYSTEMS A Detailed Review ABSTRACT This white paper highlights integration features implemented in EMC Avamar with EMC Data Domain deduplication storage systems
EMC BACKUP-AS-A-SERVICE
Reference Architecture EMC BACKUP-AS-A-SERVICE EMC AVAMAR, EMC DATA PROTECTION ADVISOR, AND EMC HOMEBASE Deliver backup services for cloud and traditional hosted environments Reduce storage space and increase
IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
VMware vsphere Data Protection 6.1
VMware vsphere Data Protection 6.1 Technical Overview Revised August 10, 2015 Contents Introduction... 3 Architecture... 3 Deployment and Configuration... 5 Backup... 6 Application Backup... 6 Backup Data
EMC DATA DOMAIN OPERATING SYSTEM
ESSENTIALS HIGH-SPEED, SCALABLE DEDUPLICATION Up to 58.7 TB/hr performance Reduces protection storage requirements by 10 to 30x CPU-centric scalability DATA INVULNERABILITY ARCHITECTURE Inline write/read
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION Automated file synchronization Flexible, cloud-based administration Secure, on-premises storage EMC Solutions January 2015 Copyright 2014 EMC Corporation. All
Vodacom Managed Hosted Backups
Vodacom Managed Hosted Backups Robust Data Protection for your Business Critical Data Enterprise class Backup and Recovery and Data Management on Diverse Platforms Vodacom s Managed Hosted Backup offers
EMC Data Domain Boost for Oracle Recovery Manager (RMAN)
White Paper EMC Data Domain Boost for Oracle Recovery Manager (RMAN) Abstract EMC delivers Database Administrators (DBAs) complete control of Oracle backup, recovery, and offsite disaster recovery with
EMC DATA DOMAIN OPERATING SYSTEM
EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 58.7 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive
We look beyond IT. Cloud Offerings
Cloud Offerings cstor Cloud Offerings As today s fast-moving businesses deal with increasing demands for IT services and decreasing IT budgets, the onset of cloud-ready solutions has provided a forward-thinking
Access to easy-to-use tools that reduce management time with Arcserve Backup
Access to easy-to-use tools that reduce management time with Arcserve Backup In business, evolution is constant. Staff grows. New offices spring up. New applications are being implemented, and typically,
Understanding EMC Avamar with EMC Data Protection Advisor
Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features that reduce the complexity of managing data protection
CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR
PERFORMANCE BRIEF CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR INTRODUCTION Enterprise organizations face numerous challenges when delivering applications and protecting critical
IBM Tivoli Storage Manager Version 7.1.4. Introduction to Data Protection Solutions IBM
IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM Note: Before you use this
VMware vsphere Data Protection 6.0
VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application
Veeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
EMC Data Domain Boost and Dynamic Interface Groups
EMC Data Domain Boost and Dynamic Interface Groups Maximize the Efficiency of Multiple Network Interfaces ABSTRACT EMC delivers dynamic interface groups to simplify the use of multiple network interfaces
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
Amazon Cloud Storage Options
Amazon Cloud Storage Options Table of Contents 1. Overview of AWS Storage Options 02 2. Why you should use the AWS Storage 02 3. How to get Data into the AWS.03 4. Types of AWS Storage Options.03 5. Object
GIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT
Why Data Domain Series GIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT Why you should take the time to read this paper Speed up backups (Up to 58.7 TB/hr, Data Domain systems are about 1.5 times faster
Quantum Q-Cloud Backup-as-a-Service Reference Architecture
Quantum Q-Cloud Backup-as-a-Service Reference Architecture NOTICE This Technology Brief may contain proprietary information protected by copyright. Information in this Technology Brief is subject to change
The EVault Portfolio
The EVault Portfolio Built from the start as a pure disk-to-disk solution, EVault is the only data protection platform that can be consumed as a cloud service, deployed as on-premise software, an on-premise
Veeam Backup Enterprise Manager. Version 7.0
Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may
VMware vsphere Data Protection
VMware vsphere Data Protection Replication Target TECHNICAL WHITEPAPER 1 Table of Contents Executive Summary... 3 VDP Identities... 3 vsphere Data Protection Replication Target Identity (VDP-RT)... 3 Replication
How To Protect Data On Network Attached Storage (Nas) From Disaster
White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains
How To Backup With Ec Avamar
BACKUP AND RECOVERY FOR MICROSOFT-BASED PRIVATE CLOUDS LEVERAGING THE EMC DATA PROTECTION SUITE A Detailed Review ABSTRACT This white paper highlights how IT environments which are increasingly implementing
Alfresco Enterprise on AWS: Reference Architecture
Alfresco Enterprise on AWS: Reference Architecture October 2013 (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 13 Abstract Amazon Web Services (AWS)
EMC Data Domain Boost for Oracle Recovery Manager (RMAN)
White Paper EMC Data Domain Boost for Oracle Recovery Manager (RMAN) Abstract EMC delivers Database Administrators (DBAs) complete control of Oracle backup, recovery, and offsite disaster recovery with
Symantec NetBackup 7.1 What s New and Version Comparison Matrix
Symantec 7.1 What s New and Version Comparison Matrix Symantec 7 allows customers to standardize backup and recovery operations across physical and virtual environments with fewer resources and less risk
Alfresco Enterprise on Azure: Reference Architecture. September 2014
Alfresco Enterprise on Azure: Reference Architecture Page 1 of 14 Abstract Microsoft Azure provides a set of services for deploying critical enterprise workloads on its highly reliable cloud platform.
How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup
Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
IBM Cognos TM1 on Cloud Solution scalability with rapid time to value
IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.
Hitachi Data Migrator to Cloud Best Practices Guide
Hitachi Data Migrator to Cloud Best Practices Guide Global Solution Services Engineering April 2015 MK-92HNAS045-02 Notices and Disclaimer Copyright 2015 Corporation. All rights reserved. The performance
Nasuni Management Console Guide
Nasuni Management Console Guide Version 5.5 April 2014 2014 Nasuni Corporation All Rights Reserved Document Information Nasuni Management Console Guide Version 5.5 April 2014 Copyright Copyright 2010-2014
Optimizing Backup & Recovery Performance with Distributed Deduplication
Optimizing Backup & Recovery Performance with Distributed Deduplication Using NetVault Backup with EMC DD Boost Written by: Shad Nelson Product Manager Dell Software Executive Summary Backup applications
Nasuni Filer Virtualization Getting Started Guide. Version 7.5 June 2016 Last modified: June 9, 2016 2016 Nasuni Corporation All Rights Reserved
Nasuni Filer Virtualization Getting Started Guide Version 7.5 June 2016 Last modified: June 9, 2016 2016 Nasuni Corporation All Rights Reserved Document Information Nasuni Filer Virtualization Getting
SHARPCLOUD SECURITY STATEMENT
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
Symantec NetBackup 5220
A single-vendor enterprise backup appliance that installs in minutes Data Sheet: Data Protection Overview is a single-vendor enterprise backup appliance that installs in minutes, with expandable storage
EMC AVAMAR. a reason for Cloud. Deduplication backup software Replication for Disaster Recovery
EMC AVAMAR a reason for Cloud Deduplication backup software Replication for Disaster Recovery Bogdan Stefanescu (Bogs) EMC Data Protection Solutions [email protected] 1 BUSINESS DRIVERS Increase
RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.
RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...
Cloud Services for Backup Exec. Planning and Deployment Guide
Cloud Services for Backup Exec Planning and Deployment Guide Chapter 1 Introducing Cloud Services for Backup Exec This chapter includes the following topics: About Cloud Services for Backup Exec Security
How to setup NovaBACKUP DataCenter to backup data to Amazon S3 using Amazon s AWS Storage Gateway
Whitepaper How to setup NovaBACKUP DataCenter to backup data to Amazon S3 using Amazon s AWS Storage Gateway Contents What is Amazon S3?... 3 What is the AWS Storage Gateway?... 4 How to setup Amazon Storage
Huawei OceanStor Backup Software Technical White Paper for NetBackup
Huawei OceanStor Backup Software Technical White Paper for NetBackup Huawei Page 1 of 14 Copyright Huawei. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form
Service Level Agreement for Windows Azure operated by 21Vianet
Service Level Agreement for Windows Azure operated by 21Vianet Last updated: November 2015 1. Introduction This Service Level Agreement for Windows Azure (this SLA ) is made by 21Vianet in connection with,
Veritas Backup Exec 15: Deduplication Option
Veritas Backup Exec 15: Deduplication Option Who should read this paper Technical White Papers are designed to introduce IT professionals to key technologies and technical concepts that are associated
Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems
Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec
Migration Scenario: Migrating Backend Processing Pipeline to the AWS Cloud
Migration Scenario: Migrating Backend Processing Pipeline to the AWS Cloud Use case Figure 1: Company C Architecture (Before Migration) Company C is an automobile insurance claim processing company with
Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation
Next Generation Data Protection with Symantec NetBackup 7 Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation White Paper: Next Generation Data Protection with NetBackup
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
Cloud Computing. Chapter 1 Introducing Cloud Computing
Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization
Continuous Data Protection. PowerVault DL Backup to Disk Appliance
Continuous Data Protection PowerVault DL Backup to Disk Appliance Continuous Data Protection Current Situation The PowerVault DL Backup to Disk Appliance Powered by Symantec Backup Exec offers the industry
Riverbed Whitewater/Amazon Glacier ROI for Backup and Archiving
Riverbed Whitewater/Amazon Glacier ROI for Backup and Archiving November, 2013 Saqib Jang Abstract This white paper demonstrates how to increase profitability by reducing the operating costs of backup
Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud
Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud What You Will Learn The adoption of cloud-based computing and applications promises to improve the agility, efficiency,
EMC Disk Library with EMC Data Domain Deployment Scenario
EMC Disk Library with EMC Data Domain Deployment Scenario Best Practices Planning Abstract This white paper is an overview of the EMC Disk Library with EMC Data Domain deduplication storage system deployment
CMB 207 1I Citrix XenApp and XenDesktop Fast Track
CMB 207 1I Citrix XenApp and XenDesktop Fast Track This fast paced course provides the foundation necessary for students to effectively centralize and manage desktops and applications in the datacenter
Amazon Relational Database Service (RDS)
Amazon Relational Database Service (RDS) G-Cloud Service 1 1.An overview of the G-Cloud Service Arcus Global are approved to sell to the UK Public Sector as official Amazon Web Services resellers. Amazon
Symantec NetBackup 5000 Appliance Series
A turnkey, end-to-end, global deduplication solution for the enterprise. Data Sheet: Data Protection Overview Symantec NetBackup 5000 series offers your organization a content aware, end-to-end, and global
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX
White Paper SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX Abstract This white paper explains the benefits to the extended enterprise of the on-
Increased Security, Greater Agility, Lower Costs for AWS DELPHIX FOR AMAZON WEB SERVICES WHITE PAPER
Increased Security, Greater Agility, Lower Costs for AWS DELPHIX FOR AMAZON WEB SERVICES TABLE OF CONTENTS Introduction... 3 Overview: Delphix Virtual Data Platform... 4 Delphix for AWS... 5 Decrease the
WHY SECURE MULTI-TENANCY WITH DATA DOMAIN SYSTEMS?
Why Data Domain Series WHY SECURE MULTI-TENANCY WITH DATA DOMAIN SYSTEMS? Why you should take the time to read this paper Provide data isolation by tenant (Secure logical data isolation for each tenant
Nasuni Filer Administration Guide
Nasuni Filer Administration Guide Version 7.5 May 2016 Last modified: May 23, 2016 2016 Nasuni Corporation All Rights Reserved Document Information Nasuni Filer Administration Guide Version 7.5 May 2016
VMware Virtual SAN Backup Using VMware vsphere Data Protection Advanced SEPTEMBER 2014
VMware SAN Backup Using VMware vsphere Data Protection Advanced SEPTEMBER 2014 VMware SAN Backup Using VMware vsphere Table of Contents Introduction.... 3 vsphere Architectural Overview... 4 SAN Backup
Daymark DPS Enterprise - Agentless Cloud Backup and Recovery Software
Daymark DPS Enterprise - Agentless Cloud Backup and Recovery Software Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this is the lifeblood
TECHNICAL PAPER. Veeam Backup & Replication with Nimble Storage
TECHNICAL PAPER Veeam Backup & Replication with Nimble Storage Document Revision Date Revision Description (author) 11/26/2014 1. 0 Draft release (Bill Roth) 12/23/2014 1.1 Draft update (Bill Roth) 2/20/2015
Installation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
EMC Data Protection Advisor 6.0
White Paper EMC Data Protection Advisor 6.0 Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection environments, improve compliance
IBM Tivoli Storage Manager
Help maintain business continuity through efficient and effective storage management IBM Tivoli Storage Manager Highlights Increase business continuity by shortening backup and recovery times and maximizing
Drobo How-To Guide. Cloud Storage Using Amazon Storage Gateway with Drobo iscsi SAN
The Amazon Web Services (AWS) Storage Gateway uses an on-premises virtual appliance to replicate a portion of your local Drobo iscsi SAN (Drobo B1200i, left below, and Drobo B800i, right below) to cloudbased
How AWS Pricing Works May 2015
How AWS Pricing Works May 2015 (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 15 Table of Contents Table of Contents... 2 Abstract... 3 Introduction...
VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015
VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation
System Administration of Windchill 10.2
System Administration of Windchill 10.2 Overview Course Code Course Length TRN-4340-T 3 Days In this course, you will gain an understanding of how to perform routine Windchill system administration tasks,
Protect Microsoft Exchange databases, achieve long-term data retention
Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...
IBM Spectrum Protect in the Cloud
IBM Spectrum Protect in the Cloud. Disclaimer IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding
Oracle Database Backup To Cloud: Amazon Simple Storage Service (S3) ORACLE WHITE PAPER JULY 2015
Oracle Database Backup To Cloud: Amazon Simple Storage Service (S3) ORACLE WHITE PAPER JULY 2015 Introduction 1 Why Backup to Cloud Storage? 2 Oracle Secure Backup Cloud Module 3 Complete Data Security
Deployment Options for Microsoft Hyper-V Server
CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES
Phoenix backs up servers using Windows and Linux operating systems. Here is a list of Windows servers that Phoenix supports:
Druva About Phoenix What is Phoenix? Druva Phoenix is a cloud based backup and archival solution aimed primarily at remote office servers. Since Phoenix is cloud-targeted backup, there is no elaborate
Cloud Backup Service Service Description. PRECICOM Cloud Hosted Services
Cloud Backup Service Service Description PRECICOM Cloud Hosted Services Table of Contents Table of Contents 2 1. Cloud Backup Service Service Summary 3 2. Cloud Backup Service Service Definition 4 2.1.
Cloud-integrated Storage What & Why
Cloud-integrated Storage What & Why Table of Contents Overview...3 CiS architecture...3 Enterprise-class storage platform...4 Enterprise tier 2 SAN storage...4 Activity-based storage tiering and data ranking...5
Introduction. Silverton Consulting, Inc. StorInt Briefing
Introduction Silverton Consulting, Inc. StorInt Briefing All too often in today s SMB data centers the overall backup and recovery process, including both its software and hardware components, is given
Licensing Guide for CA ARCserve & CA XOsoft Products
Licensing Guide for CA ARCserve & CA XOsoft Products CA ARCserve and CA XOsoft Product Pricing Models CA ARCserve and CA XOsoft products offer a multi-layered data protection solution that combines highperformance
Amazon EC2 Product Details Page 1 of 5
Amazon EC2 Product Details Page 1 of 5 Amazon EC2 Functionality Amazon EC2 presents a true virtual computing environment, allowing you to use web service interfaces to launch instances with a variety of
Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup
Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP
efolder BDR for Veeam Cloud Connection Guide
efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud
With Eversync s cloud data tiering, the customer can tier data protection as follows:
APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software
EMC ISILON AND ELEMENTAL SERVER
Configuration Guide EMC ISILON AND ELEMENTAL SERVER Configuration Guide for EMC Isilon Scale-Out NAS and Elemental Server v1.9 EMC Solutions Group Abstract EMC Isilon and Elemental provide best-in-class,
Evaluation of Enterprise Data Protection using SEP Software
Test Validation Test Validation - SEP sesam Enterprise Backup Software Evaluation of Enterprise Data Protection using SEP Software Author:... Enabling you to make the best technology decisions Backup &
Cloud Storage Backup for Storage as a Service with AT&T
WHITE PAPER: CLOUD STORAGE BACKUP FOR STORAGE AS A SERVICE........ WITH..... AT&T........................... Cloud Storage Backup for Storage as a Service with AT&T Who should read this paper Customers,
THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY COMPANY.
THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY COMPANY. Capitalized terms used herein but not otherwise defined shall have their respective meanings set forth in the End User
Get Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : E22-290 Title : EMC Data Domain Deduplication, Backup and Recovery Exam Version : DEMO 1.A customer has a Data Domain system with
Data Protection. the data. short retention. event of a disaster. - Different mechanisms, products for backup and restore based on retention and age of
s t o r s i m p l e D a t a s h e e t Data Protection I/T organizations struggle with the complexity associated with defining an end-to-end architecture and processes for data protection and disaster recovery.
Efficient Backup with Data Deduplication Which Strategy is Right for You?
Efficient Backup with Data Deduplication Which Strategy is Right for You? Rob Emsley Senior Director, Product Marketing CPU Utilization CPU Utilization Exabytes Why So Much Interest in Data Deduplication?
Service Overview CloudCare Online Backup
Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
A Guide to Hybrid Cloud An inside-out approach for extending your data center to the cloud
A Guide to Hybrid Cloud An inside-out approach for extending your data center to the cloud Inside INTRODUCTION Create a Flexible IT Environment With Hybrid Cloud CHAPTER 1 Common Business Drivers for Hybrid
An Oracle White Paper May 2010. Cloud-Stored Offsite Database Backups
An Oracle White Paper May 2010 Cloud-Stored Offsite Database Backups 1 Introduction Cloud Computing allows users to tap into a virtually unlimited pool of computing and storage resources over the Internet
Hitachi Cloud Service for Content Archiving. Delivered by Hitachi Data Systems
SOLUTION PROFILE Hitachi Cloud Service for Content Archiving, Delivered by Hitachi Data Systems Improve Efficiencies in Archiving of File and Content in the Enterprise Bridging enterprise IT infrastructure
EMC Data Protection Search
EMC Data Protection Search Version 1.0 Security Configuration Guide 302-001-611 REV 01 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published April 20, 2015 EMC believes
