Delivering Fat-Free CDP with Delphix. Using Database Virtualization for Continuous Data Protection without Storage Bloat.
|
|
- Richard Holland
- 7 years ago
- Views:
Transcription
1 Delivering Fat-Free CDP with Delphix Using Database Virtualization for Continuous Data Protection without Storage Bloat White Paper
2 Delivering Fat- Free CDP with Delphix Revision: June 2012 You can find the most up- to- date technical documentation at: The Delphix Web site also provides the latest product updates. If you have comments about this documentation, submit your feedback to: 2012 Delphix Corp. All rights reserved. The Delphix logo and design are registered trademarks of Delphix Corp. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Delphix Corp. 275 Middlefield Road, Suite 50 Menlo Park, CA
3 Enterprise Architecture Issues Global organizations have significantly digitized their business processes and information over the past decade. Today, applications that run on databases touch nearly every Global 1000 process and interaction with employees, partners, and customers. To ensure that a digital business can maintain operations and up time, firms have spent billions building out enterprise IT architectures. A primary function of enterprise IT is safeguarding and ensuring the availability of data the most valuable of which is often stored in databases. Without a strong recovery strategy, a large organization would grind to a halt following any significant outage or disaster. To ensure that never happens, firms have implemented extensive disaster recovery and backup implementations. While these solutions can synchronously replicate up- to- date information to remote locations, this approach on its own can also backfire. If a critical database is corrupted, business processes such as supply chain management or order processing can stop completely. Even worse, in many cases the very solution for protecting information the disaster recovery systems can increase the damage by replicating corrupted data to backups and failover systems. A recent example of this cascading failure occurred at Salesforce.com in August Despite using industry best practices and state of the art failover and backup technology, Salesforce.com suffered a major outage due to a corrupted database. Salesforce.com s storage systems replicated the corruption to their alternate datacenter, so there was no fast recovery mechanism in place. There are several key lessons in the Salesforce.com outage. First, replication strategies designed to protect an organization s operations can become a weapon instead of a shield. Salesforce.com is hardly unique; the problem of storage technology propagating corrupted data across the enterprise is very common among large organizations. Second, as organizations scale up their digital operations, the very nature of that scale changes the notion of an edge case. Put differently, a one in a million chance of failure is a real problem if you process a billion transactions a month. Over time and in large environments, edge case failures are a certainty, and it is imperative that IT organizations put protective measures in place ahead of such failures. Third, synchronous replication technologies do not provide sufficient coverage. Any organization that has had to resort to restore from tapes can attest to the cost, pain, and time of trying to recover from unreliable and antiquated backup mechanisms. Existing methods for data protection are not sufficient in a modern environment at today s scale. Outages will become more frequent and more costly as digital businesses continue to scale. 3
4 Outage Costs The report, Trends in IT Value, by The Standish Group provides useful estimates of the costs of system outage for key business processes. At one end of the spectrum, The Standish Group estimates that each minute of downtime in a securities trading operation costs $73,000. That translates to $4.4 million per hour and $105 million per day of outage costs. At the other end of the spectrum, an outage in an enterprise system is estimated to cost $1,900 per minute, i.e. $114,000 per hour and $2.7 million per day. This amount is smaller but still significant. In between those extremes are the key applications that power most large organizations: ERP ($888,000 per hour of outage), order processing ($798,000 per hour of outage), and supply chain ($690,000 per hour of outage). Source: Trends In IT Value Report (Standish Group) For a large investment bank, the costs of a major outage can reach hundreds of millions of dollars over a few days. Traditional Data Protection Solutions Production Traditional data protection solutions for disaster recovery include short- term rollback technologies and longer- term backup/restore technologies. Each addresses a piece of the overall protection problem, but neither can fully prevent dramatic outage costs (e.g. due to complex, corruption- triggered events). In addition, each brings significant storage costs via storage bloat. These Disaster Recovery increased costs can limit 4 Hour Flashback (Continuous) On production, limited flexibility enterprise- wide deployment. SRDF 5 Days Business Continuance Volumes (Hourly/Daily) Susceptible to array errors, patches While many organizations have short- term rollback options like Oracle Flashback, these tend only to work for a short window of time on production systems often as little as 4 hours. The use case for technologies such as Flashback is immediate rollback of user error (e.g. a DBA accidentally drops a table, which breaks referential integrity and forces an application error). Short- term rollback technologies usually do not retain days or weeks of data and cannot help if the production database itself is corrupted and unavailable due to an event like a problematic database software patch. Enterprise storage arrays often provide less granular coverage through full copies of storage volumes, but the recovery window typically only covers a few days due to the cost of full system copies. Snapshots can be more space efficient and provide a longer window of FAST RECOVERY 4
5 coverage, but often come at the impact of production performance a tradeoff most companies are not willing to make. Production In addition to primary recovery strategies, most organizations also have longer- term disk and tape backup options, including offsite tape archives. While these will likely provide the necessary coverage window, the process of setting up a restore volume, restoring data via backup software, applying logs Disaster Recovery to get to a specific point in 4 Hour Flashback (Continuous) On production, limited flexibility time, and configuring database servers can dramatically 5 Days Business Continuance Volumes (Hourly/Daily) SRDF Susceptible to array errors, patches increase the duration and cost of downtime. FAST RECOVERY Disk and Tape Backup, Archive 1-2 weeks (Daily) Even worse, the time to Requires lengthy restore, no granularity retrieve offsite tapes alone can Months to Years be counted in days or even Tape shipping time, unreliable restores weeks adding insult to injury. At a large organization, a week of outage in a key system can mean hundreds of millions of dollars lost and damaged credibility for IT and the business itself. While traditional options for near- term and long- term data recovery each serve a purpose, they are of limited value in a complex database failure. Data is either missing or cannot be recovered within an acceptable period of time. While a significant outage may be an edge case, the potential cost is so large that protective mechanisms need to be put in place. SLOW RESTORE Delphix Virtualization Creates a Bloat-Free Data Recovery Layer 5 Production Delphix provides a powerful addition to existing replication, backup, and recovery solutions. By virtualizing copies of production databases and managing all updates to these copies, Delphix brings extended TimeFlow SRDF Fast: quickly provision parallel firefighting environments Complete: continuous granularity with log shipping (Superior RPO) Extended: 30:1 efficiency enables long retention periods Disaster Recovery Disk and Tape Backup, Archive 4 Hour Flashback (Continuous) On production, limited flexibility 5 Days Business Continuance Volumes (Hourly/Daily) Susceptible to array errors, patches 1-2 weeks (Daily) Requires lengthy restore, no granularity Months to Years Tape shipping time, unreliable restores FAST RECOVERY SLOW RESTORE and flexible firefighting capabilities to database outages generated by complex events (e.g. late identification of corruption). Moreover, Delphix does this without increasing the storage footprint.
6 Delphix enables DBAs to instantly roll back a virtual copy of a corrupted production database to the last known good state. At the same time, Delphix can retain a very long tail of information, so that the customer can perform this rollback across an extended period of time. Virtual databases can be opened quickly and easily by database teams in a few minutes and as little as three clicks without the need to wait for lengthy restores to a new target volume. As a result, a business gains both the instant, granular recovery capabilities of rollback technologies and the long- term coverage of a tape based backup/recovery system while eliminating the need to wait for prolonged restores. With its patented TimeFlow technology, Delphix retains all updates to copies of production databases, down to the second. A Delphix user can pick any point in time in the life of a protected database and instantly open a virtual copy of that database at that point in time. Users can even set specific transaction boundaries, such as a specific SCN for an Oracle database. With its unique ability to compress and eliminate redundancy in database storage, Delphix can deliver large reduction ratios as high as 30:1, so a business can store 30 days worth of recoverability in the space of a single copy. Traditional continuous data protection (CDP) technologies, in contrast, generally require enormous amounts of storage as much as 7x the original production copy for a similar window of recoverability. As a result, the Delphix efficiency advantage enables far longer retention periods to recover to a known good state following an outage or disaster. In the Salesforce.com example above, Delphix could have dramatically minimized the effects of the corrupted database outage. Upon realizing that the corrupted data blocks had been propagated to the recovery site, a Delphix admin could have simply moved the Delphix TimeFlow slider back until the last known good state in time. Parallel Firefighting Environments to Determine Last Good State 11:00AM If a previous good state in time is unknown, a Delphix admin can open multiple parallel firefighting environments at different points in time simultaneously. With database virtualization, Delphix can open up to 35 12:00PM 1:00PM 2:00PM 3:00PM 4:00PM No Corruption No Corruption! Corruption! 2. Quickly Open Parallel Firefighting Sandboxes for Troubleshooting 1:21:05PM 1. Problem First Detected copies of a database at different points in time, all from a single, shared data footprint. Virtual databases (VDBs) look and behave like normal, full read/write databases, with performance parity to physical database copies ID root cause and determine resolution
7 VDBs can be used as failover databases or can be recovered to a physical target using the Delphix V2P feature. As a result, Delphix acts as a flexible safety net for large organizations that require critical databases to be running and available at all times. Delphix can be deployed as an additional protective measure for enterprise databases, and does not impact other backup technologies or solutions. Delphix installs as a virtual appliance in a private cloud in minutes and connects to databases through standard APIs. For instance, with Oracle databases, Delphix maintains synchronization with an Oracle database through the RMAN API, and does not interfere with RMAN processes used by backup solutions (Delphix is an Oracle Gold- Certified Partner). Conclusion The scale of modern business operations has greatly increased the risk of system outage. Simply put, the effective likelihood of a failure due to outage or error is much greater when transactions occur at the rate of millions instead of thousands. For global organizations, the cost of downtime is simply too great; traditional recovery solutions are not comprehensive enough on their own. Delphix adds a powerful extended recovery layer to global IT operations. By virtualizing the information in production databases, Delphix can prevent tens to hundreds of millions of dollars in downtime costs from a single outage incident. Organizations looking to increase agility by rolling out new applications and technologies should evaluate Delphix as a fundamental layer in their data protection architecture. Delphix provides four significant, differentiated benefits to enterprise customers: Ability to quickly provision multiple parallel firefighting environments simultaneously Full granularity with log synchronization and application for superior RPO (recovery point objective) Superior RTO (recovery time objective) with the ability to open VDBs in minutes Ability to maintain long retention windows with 30:1 TimeFlow reduction ratios Delphix Corp. All rights reserved. 7
Increased Security, Greater Agility, Lower Costs for AWS DELPHIX FOR AMAZON WEB SERVICES WHITE PAPER
Increased Security, Greater Agility, Lower Costs for AWS DELPHIX FOR AMAZON WEB SERVICES TABLE OF CONTENTS Introduction... 3 Overview: Delphix Virtual Data Platform... 4 Delphix for AWS... 5 Decrease the
More informationDATABASE VIRTUALIZATION AND INSTANT CLONING WHITE PAPER
DATABASE VIRTUALIZATION AND INSTANT CLONING TABLE OF CONTENTS Brief...3 Introduction...3 Solutions...4 Technologies....5 Database Virtualization...7 Database Virtualization Examples...9 Summary....9 Appendix...
More informationDelphix Agile Data Platform Technical White Paper
Delphix Agile Data Platform Technical White Paper Delphix Agile Data Platform Overview Revision: 1 July 2014 You can find the most up- to- date technical documentation at: http://www.delphix.com/support
More informationImproving Microsoft SQL Server Recovery with EMC NetWorker and EMC RecoverPoint
Improving Microsoft SQL Server Recovery with EMC NetWorker and EMC RecoverPoint Applied Technology Abstract This white paper covers how EMC NetWorker and EMC NetWorker modules can be used effectively in
More informationDisaster Recovery for Oracle Database
Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches
More informationThe ABCs of DaaS. Enabling Data as a Service for Application Delivery, Business Intelligence, and Compliance Reporting.
The ABCs of DaaS Enabling Data as a Service for Application Delivery, Business Intelligence, and Compliance Reporting White Paper The ABCs of DaaS Enabling Data as a Service Application Delivery, Business
More informationThe Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments
The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss
More informationEMC NETWORKER SNAPSHOT MANAGEMENT
White Paper Abstract This white paper describes the benefits of NetWorker Snapshot Management for EMC Arrays. It also explains the value of using EMC NetWorker for snapshots and backup. June 2013 Copyright
More informationEMC RECOVERPOINT: BUSINESS CONTINUITY FOR SAP ENVIRONMENTS ACROSS DISTANCE
White Paper EMC RECOVERPOINT: BUSINESS CONTINUITY FOR SAP ENVIRONMENTS ACROSS DISTANCE Applied Technology Abstract Business continuity is a critical component of any enterprise data protection strategy
More informationDelphix Modernization Engine REDUCING THE BURDEN OF REGULATION, LEGAL HOLD, AND DISCOVERY USING DELPHIX LIVE ARCHIVE WHITE PAPER
Delphix Modernization Engine REDUCING THE BURDEN OF REGULATION, LEGAL HOLD, AND DISCOVERY USING DELPHIX LIVE ARCHIVE TABLE OF CONTENTS Introduction...3 Common Terms to Which We Refer....4 What is Live
More informationVirtual Infrastructure Security
Virtual Infrastructure Security 2 The virtual server is a perfect alternative to using multiple physical servers: several virtual servers are hosted on one physical server and each of them functions both
More informationDell Data Protection Point of View: Recover Everything. Every time. On time.
Dell Data Protection Point of View: Recover Everything. Every time. On time. Dell Data Protection White Paper May 2013 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL
More informationNear-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper
Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper bex30102507wpor Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies Introduction Are you a database administrator
More informationEMC Data Domain Boost for Oracle Recovery Manager (RMAN)
White Paper EMC Data Domain Boost for Oracle Recovery Manager (RMAN) Abstract EMC delivers Database Administrators (DBAs) complete control of Oracle backup, recovery, and offsite disaster recovery with
More informationManufacturers Need More Than Just Backup... But they don t need to spend more! axcient.com
Manufacturers Need More Than Just Backup... But they don t need to spend more! axcient.com Introduction Manufacturers need to keep their businesses up and running more than ever now. Automating work processes
More informationNSI Solutions with Microsoft VSS
Published: March 2004 Abstract With the introduction of Volume Shadow Copy Service (VSS) in Microsoft Windows Server 2003 and Windows Storage Server 2003 and the strength of NSI Software Double-Take you
More informationRedefining Oracle Database Management
Redefining Oracle Database Management Actifio PAS Specification A Single Solution for Backup, Recovery, Disaster Recovery, Business Continuity and Rapid Application Development for Oracle. MAY, 2013 Contents
More informationRestoration Technologies. Mike Fishman / EMC Corp.
Trends PRESENTATION in Data TITLE Protection GOES HERE and Restoration Technologies Mike Fishman / EMC Corp. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless
More informationManaging Big Data Exhaust. Controlling Big Application Data Growth for ERP, MDM, and Other Key Enterprise Functions.
Managing Big Data Exhaust Controlling Big Application Data Growth for ERP, MDM, and Other Key Enterprise Functions Solution Brief Managing Big Data Exhaust Revision: 2 August 2012 You can find the most
More informationFinancial Services Need More than Just Backup... But they don t need to spend more! axcient.com
Financial Services Need More than Just Backup... But they don t need to spend more! axcient.com Introduction Financial institutions need to keep their businesses up and running more than ever now. Considering
More informationBreaking the Disaster Recovery Mold
Breaking the Disaster Recovery Mold John Newsom CEO Quorum, Inc. IT Spending Priorities 2014 Midsized organizations need the same kind of data protection capabilities that enterprises have demanded for
More informationVeritas Backup Exec 15: Protecting Microsoft SQL
Veritas Backup Exec 15: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed to introduce IT professionals to key technologies and technical concepts that are associated
More informationBackup Exec 2014: Protecting Microsoft SQL
TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SQL........................................ Backup Exec 2014: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed
More informationData Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection
The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the
More informationContinuous Data Replicator 7.0
DATA PROTECTION ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH Continuous Data Replicator 7.0 Continuous Data Protection (CDP) and Centralized Management of Remote Office Data Key Benefits Reduces management
More informationBackup and Recovery Solutions for Exadata. Ľubomír Vaňo Principal Sales Consultant
Backup and Recovery Solutions for Exadata Ľubomír Vaňo Principal Sales Consultant Fundamental Backup and Recovery Data doesn t exist in most organizations until the rule of 3 is complete: Different Media
More informationThe Case for Continuous Data Protection
The Case for Continuous Data Protection This paper will discuss the benefits of using CDP-based solutions, particularly in place of traditional, tape-based backup products that currently dominate the SMB
More informationBusiness-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance
Intel Xeon processor Business-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance The easy solution for backup to disk with deduplication Intel Inside. Powerful Solution Outside. If
More informationSymantec NetBackup PureDisk Optimizing Backups with Deduplication for Remote Offices, Data Center and Virtual Machines
Optimizing Backups with Deduplication for Remote Offices, Data Center and Virtual Machines Mayur Dewaikar Sr. Product Manager Information Management Group White Paper: Symantec NetBackup PureDisk Symantec
More informationArchiving, Backup, and Recovery for Complete the Promise of Virtualization
Archiving, Backup, and Recovery for Complete the Promise of Virtualization Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that
More informationImplementing Disaster Recovery? At What Cost?
Implementing Disaster Recovery? At What Cost? Whitepaper Viktor Babkov Technical Director Business Continuity Copyright Business Continuity May 2010 In today s environment, minimizing IT downtime has become
More informationBackup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland
Backup and Recovery Solutions for Exadata Cor Beumer Storage Sales Specialist Oracle Nederland Recovery Point and Recovery Time Wks Days Hrs Mins Secs Secs Mins Hrs Days Wks Data Loss (Recovery Point Objective)
More informationBackup Exec 2014: Protecting Microsoft SharePoint
TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SHAREPOINT........................................ Backup Exec 2014: Protecting Microsoft SharePoint Who should read this paper Technical White Papers
More informationProtecting Microsoft SQL Server
Your company relies on its databases. How are you protecting them? Protecting Microsoft SQL Server 2 Hudson Place suite 700 Hoboken, NJ 07030 Powered by 800-674-9495 www.nsisoftware.com Executive Summary
More informationUnitrends Integrated Backup and Recovery of Microsoft SQL Server Environments
Solution Brief Unitrends Integrated Backup and Recovery of Microsoft SQL Server Environments Summary Your business infrastructure relies on your Microsoft SQL Servers. Your business no matter the size
More informationIP Storage On-The-Road Seminar Series
On-The-Road Seminar Series Disaster Recovery and Data Protection Page 1 Agenda! The Role of IP in Backup!Traditional use of IP networks for backup! backup capabilities! Contemporary data protection solutions
More informationVeritas Backup Exec : Protecting Microsoft SharePoint
Veritas Backup Exec : Protecting Microsoft SharePoint Who should read this paper Technical White Papers are designed to introduce IT professionals to key technologies and technical concepts that are associated
More informationSecure Data Across Application Landscapes: On Premise, Offsite & In the Cloud REINVENTING DATA MASKING WHITE PAPER
Secure Data Across Application Landscapes: On Premise, Offsite & In the Cloud REINVENTING DATA MASKING TABLE OF CONTENTS Data Protection Challenges Across Application Lifecycles... 3 Delphix Service-Based
More informationTrends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation (Author and Presenter)
Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation (Author and Presenter) SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless
More informationComplete Storage and Data Protection Architecture for VMware vsphere
Complete Storage and Data Protection Architecture for VMware vsphere Executive Summary The cost savings and agility benefits of server virtualization are well proven, accounting for its rapid adoption.
More informationLeverage the IBM Tivoli advantages in storage management
IBM Software December 2010 Leverage the IBM Tivoli advantages in storage management IBM Tivoli storage management solutions outperform the competition 2 Leverage the IBM Tivoli advantages in storage management
More informationBackup Exec 15: Protecting Microsoft SQL
TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT SQL........................................ Backup Exec 15: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed
More informationBusiness-centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance
Business-centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance The easy solution for backup to disk with deduplication If you rethink your backup strategy, then think of ETERNUS CS800
More informationEMC Data Domain Boost for Oracle Recovery Manager (RMAN)
White Paper EMC Data Domain Boost for Oracle Recovery Manager (RMAN) Abstract EMC delivers Database Administrators (DBAs) complete control of Oracle backup, recovery, and offsite disaster recovery with
More informationSteelFusion with AWS Hybrid Cloud Storage
Solution Guide SteelFusion with AWS Hybrid Cloud Storage March 2016 The Challenge According to IDC, to meet the demands of global customer and global talent requirements, companies have to maintain remote
More informationPRODUCT SCENARIOS BEST-IN-CLASS DISASTER RECOVERY FOR WINDOWS SERVERS
PRODUCT SCENARIOS BEST-IN-CLASS DISASTER RECOVERY FOR WINDOWS SERVERS StorageCraft ShadowProtect Server and ShadowProtect Small Business Server provide fast and reliable disaster recovery, data protection
More informationComprehensive VMware Virtual Machine Protection with Asigra Cloud Backup TM
Comprehensive VMware Virtual Machine Protection with Asigra Cloud Backup TM Virtualization is changing the way companies design, run, and manage their IT environments. Today, virtual machines (VM) are
More informationThe Essential Guide for Protecting Your Legal Practice From IT Downtime
The Essential Guide for Protecting Your Legal Practice From IT Downtime www.axcient.com Introduction: Technology in the Legal Practice In the professional services industry, the key deliverable of a project
More informationGIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT
Why Data Domain Series GIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT Why you should take the time to read this paper Speed up backups (Up to 58.7 TB/hr, Data Domain systems are about 1.5 times faster
More informationBackup and Archiving Explained. White Paper
Backup and Archiving Explained White Paper Backup vs. Archiving The terms backup and archiving are often referenced together and sometimes incorrectly used interchangeably. While both technologies are
More informationStorage Infrastructure as a Service
The Best of Cloud and On-premises Storage www.nasuni.com Introduction Organizations rely on corporate data for everything from product design to order processing; it is their most valuable asset. Today
More informationBusiness Continuity: Choosing the Right Technology Solution
Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail
More informationAccess to easy-to-use tools that reduce management time with Arcserve Backup
Access to easy-to-use tools that reduce management time with Arcserve Backup In business, evolution is constant. Staff grows. New offices spring up. New applications are being implemented, and typically,
More informationOracle Database 10g: Backup and Recovery 1-2
Oracle Database 10g: Backup and Recovery 1-2 Oracle Database 10g: Backup and Recovery 1-3 What Is Backup and Recovery? The phrase backup and recovery refers to the strategies and techniques that are employed
More informationNimble Storage Best Practices for Microsoft Exchange
BEST PRACTICES GUIDE: Nimble Storage Best Practices for Microsoft Exchange Table of Contents NIMBLE STORAGE OVERVIEW... 3 EXCHANGE STORAGE REFERENCE ARCHITECTURE... 3 Store Database and Transaction Log
More informationNetApp Syncsort Integrated Backup
WHITE PAPER NetApp Syncsort Integrated Backup Protect your Microsoft and VMware Environment with NetApp Syncsort Integrated Backup Protecting Microsoft and VMware Executive Summary 3 Microsoft and VMware
More informationTABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models
1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint
More informationWHAT S NEW & COOL. Zenoss Service Dynamics 5 February 2015
WHAT S NEW & COOL Zenoss Service Dynamics 5 February 2015 What s New and Cool Zenoss Service Dynamics 5 redefines monitoring for today s modern IT infrastructures. Most organizations still rely on either
More informationConstant Replicator: An Introduction
Data Availability Storage Software Constant Replicator: An Introduction Configurations, Applications and Solutions of Constant Replicator A White Paper A Constant Data Technology Document August 2004 Copyright
More informationHuawei OceanStor Backup Software Technical White Paper for NetBackup
Huawei OceanStor Backup Software Technical White Paper for NetBackup Huawei Page 1 of 14 Copyright Huawei. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form
More informationTop 10 Reasons for Using Disk-based Online Server Backup and Recovery
ADVISORY Top 10 Reasons for Using Disk-based Online Server Backup and Recovery INTRODUCTION Backup of vital company information is critical to a company s survival, no matter what size the company. Recent
More informationBackupEnabler: Virtually effortless backups for VMware Environments
White Paper BackupEnabler: Virtually effortless backups for VMware Environments Contents Abstract... 3 Why Standard Backup Processes Don t Work with Virtual Servers... 3 Agent-Based File-Level and Image-Level
More informationTrends in Data Protection and Restoration Technologies. Jason Iehl, NetApp
Trends in Data Protection and Restoration Technologies Jason Iehl, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and
More informationWHITE PAPER. Best Practices to Ensure SAP Availability. Software for Innovative Open Solutions. Abstract. What is high availability?
Best Practices to Ensure SAP Availability Abstract Ensuring the continuous availability of mission-critical systems is a high priority for corporate IT groups. This paper presents five best practices that
More informationVeritas Storage Foundation High Availability for Windows by Symantec
Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability
More informationWhite Paper. 1 800 FASTFILE / www.ironmountain.ca Page 1
White Paper LIVEVAULT Top 10 Reasons for Using Online Server Backup and Recovery Introduction Backup of vital company information is critical to a company s survival, no matter what size the company. Recent
More informationBackup and Recovery 1
Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup
More informationRecovery, BYOD and the Cloud. Director of Managed Services
The Modern Backup: Recovery, BYOD and the Cloud Brian J Page, CISSP Director of Managed Services Structured: Your Trusted Technology Partner Founded in 1992 Headquartered in Portland, OR. Offices in Oregon,
More informationThe case for cloud-based disaster recovery
IBM Global Technology Services IBM SmartCloud IBM SmartCloud Virtualized Server Recovery i The case for cloud-based disaster recovery Cloud technologies help meet the need for quicker restoration of service
More informationCourse Outline: Course 6317: Upgrading Your SQL Server 2000 Database Administration (DBA) Skills to SQL Server 2008 DBA Skills
Course Outline: Course 6317: Upgrading Your SQL Server 2000 Database Administration (DBA) Skills to DBA Skills Learning Method: Instructor-led Classroom Learning Duration: 3.00 Day(s)/ 24 hrs Overview:
More informationReducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email
Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email Harnessing the Power of Virtualization with an Integrated Solution Based on VMware vsphere and VMware Zimbra WHITE
More informationVENDOR-AGNOSTIC EXPLANATIONS AND ADVICE FOR THE INFORMATION TECHNOLOGY BUYER. Evaluating Email Archiving Solutions
P Evaluating Email Archiving Solutions Clipper Notes VENDOR-AGNOSTIC EXPLANATIONS AND ADVICE FOR THE INFORMATION TECHNOLOGY BUYER New in 2007 Report #TCG2007048 March 31, 2007 Evaluating Email Archiving
More informationMICROSOFT EXCHANGE 2003. best practices BEST PRACTICES - DATA STORAGE SETUP
MICROSOFT EXCHANGE 2003 best practices BEST PRACTICES - DATA STORAGE SETUP TABLE OF CONTENTS E-mail has become a business critical communication tool 3 Build a disaster recovery solution with VSS and Data
More informationEBOOK: XOSOFT. CA XOsoft A solution that offers Disaster Recovery, High Availability and Continuous Data Protection
EBOOK: XOSOFT CA XOsoft A solution that offers Disaster Recovery, High Availability and Continuous Data Protection Responding to a growing need The data behind every enterprise is vital not only to its
More informationVMware vsphere Data Protection 6.1
VMware vsphere Data Protection 6.1 Technical Overview Revised August 10, 2015 Contents Introduction... 3 Architecture... 3 Deployment and Configuration... 5 Backup... 6 Application Backup... 6 Backup Data
More informationBEST PRACTICES FOR PROTECTING MICROSOFT EXCHANGE DATA
BEST PRACTICES FOR PROTECTING MICROSOFT EXCHANGE DATA Bill Webster September 25, 2003 VERITAS ARCHITECT NETWORK TABLE OF CONTENTS Introduction... 3 Exchange Data Protection Best Practices... 3 Application
More informationTotal Cost of Ownership Analysis
Total Cost of Ownership Analysis Abstract A total cost of ownership (TCO) analysis can measure the cost of acquiring and operating a new technology solution against a current installation. In the late
More informationMigration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module
Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module WHITE PAPER May 2015 Contents Advantages of NEC / Iron Mountain National
More informationPROTECTING MICROSOFT SQL SERVER TM
WHITE PAPER PROTECTING MICROSOFT SQL SERVER TM Your company relies on its databases. How are you protecting them? Published: February 2006 Executive Summary Database Management Systems (DBMS) are the hidden
More informationOnline Transaction Processing in SQL Server 2008
Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,
More informationCA XOsoft Continuous Data Protection Solo V4
PRODUCT BRIEF: CA XOSOFT CDP SOLO CA XOsoft Continuous Data Protection Solo V4 PROVIDING YOU THE CAPABILITY TO EASILY REWIND DATA BACK TO A SINGLE POINT IN TIME, CA XOSOFT CONTINUOUS DATA PROTECTION (CDP)
More informationEMC DATA DOMAIN OPERATING SYSTEM
EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 58.7 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive
More informationProtecting Microsoft Hyper-V 3.0 Environments with CA ARCserve
Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while
More informationReal-time Protection for Hyper-V
1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate
More informationEMC DATA DOMAIN OPERATING SYSTEM
ESSENTIALS HIGH-SPEED, SCALABLE DEDUPLICATION Up to 58.7 TB/hr performance Reduces protection storage requirements by 10 to 30x CPU-centric scalability DATA INVULNERABILITY ARCHITECTURE Inline write/read
More informationEMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
More informationwww.rackwareinc.com RackWare Solutions Disaster Recovery
RackWare Solutions Disaster Recovery RackWare Solutions Disaster Recovery Overview Business Continuance via Disaster Recovery is an essential element of IT and takes on many forms. The high end consists
More informationWhy Your Backup/Recovery Solution Probably Isn t Good Enough
Why Your Backup/Recovery Solution Probably Isn t Good Enough Whatever can go wrong, will go wrong. Whatever can go wrong, will go wrong. Are you prepared? @! Restored? Complex 18.5 Hours downtime $5,600/Min
More informationCLOUD COMPUTING FACT SHEET. Considering Cloud Computing For Your Business?
The Fulcrum Group, Inc. (817) 337-0300 CLOUD COMPUTING FACT SHEET Considering Cloud Computing For Your Business? This White Paper is brought to you by your friends at The Fulcrum Group, Inc. CLOUD COMPUTING
More informationHow To Backup And Restore A Database With A Powervault Backup And Powervaults Backup Software On A Poweredge Powervalt Backup On A Netvault 2.5 (Powervault) Powervast Backup On An Uniden Power
Database Backup and Recovery using NetVault Backup and PowerVault MD3260 A Dell Technical White Paper Database Solutions Engineering Dell Product Group Umesh Sunnapu Mayura Deshmukh Robert Pound This document
More informationHow To Protect Data On Network Attached Storage (Nas) From Disaster
White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains
More informationWhy cloud backup? Top 10 reasons
Why cloud backup? Top 10 reasons HP Autonomy solutions Table of contents 3 Achieve disaster recovery with secure offsite cloud backup 4 Free yourself from manual and complex tape backup tasks 4 Get predictable
More informationBackup 2.0: un opportunità bestiale. Todd Fredrick Executive Vice President Sales&Marketing e Cofounder di AppAssure
Backup 2.0: un opportunità bestiale Todd Fredrick Executive Vice President Sales&Marketing e Cofounder di AppAssure Achab Achab Open Forum 2011 About AppAssure Software Fast Facts: Founded in 2006 Former
More informationPresents. Attix5 Technology. An Introduction
Presents Attix5 Technology An Introduction January 2013 1. Global Block Level Deduplication. Attix5 Feature Top 10 Things That Matter When Attix5 is first installed on a target server a full backup is
More informationVMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of
More informationWhite Paper: 5 Ways Cloud-integrated Storage Reduces Costs
White Paper: 5 Ways Cloud-integrated 5 Ways Cloud-integrated Introduction Many companies consider using cloud storage to reduce costs and the IT burden of storing data in the enterprise. However, simply
More informationHP Data Protection. Business challenge: Resulting pain points: HP technology solutions:
Business challenge: HP Data Protection Solutions GUIDE How to protect rising data volumes without increasing operational costs and management overheads Resulting pain points: Meeting the backup window
More informationSymantec Backup Exec 2014
Symantec Backup Exec 2014 Maxim Tsvetaev Principal Systems Engineer Backup Exec 2014 1 Today s Top Backup and Recovery Challenges Reducing Costs and Complexity Protecting Virtual Machines Meeting Backup
More informationHow To Get A Backup Service From Ronald Eyres
R 0 RE Cloud Backup as a Service and Reliable DR Introduction RE Cloud BaaS is a complete replacement for on-premise backup and offsite data protection. It offers all the benefits of the most advanced
More informationTOP FIVE REASONS WHY CUSTOMERS USE EMC AND VMWARE TO VIRTUALIZE ORACLE ENVIRONMENTS
TOP FIVE REASONS WHY CUSTOMERS USE EMC AND VMWARE TO VIRTUALIZE ORACLE ENVIRONMENTS Leverage EMC and VMware To Improve The Return On Your Oracle Investment ESSENTIALS Better Performance At Lower Cost Run
More information