It s All About Restoring Your Data Achieving Rapid Business Resumption with Highly Efficient Disk-to-Disk Backup & Restore

Size: px
Start display at page:

Download "It s All About Restoring Your Data Achieving Rapid Business Resumption with Highly Efficient Disk-to-Disk Backup & Restore"

Transcription

1 It s All About Restoring Your Data Achieving Rapid Business Resumption with Highly Efficient Disk-to-Disk Backup & Restore All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time. This publication is copyright by StoneFly, Inc. and is intended for use only by recipients authorized by StoneFly, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of StoneFly, Inc., is in violation of U.S. copyright law.

2 It s All About Restore Page 2 Peace of Mind Peace of mind comes from knowing your backed-up data can actually be restored quickly and reliably. Backups can be easily verified, but there is high anxiety associated with confirming the reliability of a restore. In most cases, knowing that a restore actually works usually occurs after data is lost. Keeping your fingers crossed should not be an integral part of a data recovery program. You ve heard the horror stories. Perhaps you ve even been a victim yourself. Following are some true stories: The backup set required restoring one full backup on a total of five tapes and five incrementals on one tape each. After running the restore process on seven out of the ten tapes, the restore fails on a bad sector on the second to the last incremental. After 6 hours, the entire restore process has to be completely restarted after copying the incremental to another tape. A sales manager deletes an important with the details for a proposal. Even though the file is backed up, to restore this required restoring an entire data set. The IT department refuses because it will take 14 hours to restore the data set and the sales manager can t prove that single is worth the cost to restore it. The sales manager loses the deal and the company doesn t meet its quarterly numbers. A company purchased and configured a high-end, expensive, and full-featured tape library for the company's system backups. Unfortunately, the backup library was placed right beside the primary system. When the primary system got fried during a lightening storm, so too did the backup library. A system suffered a serious disk failure. The operator attempts a restore only to discover that its automated backup hadn't run properly for fourteen months. A tape had jammed in the drive, but no one had noticed. A new IT administrator managed to delete the contents of an entire password file. He attempted to restore it from tape only to overwrite it with the deleted file. High profile events, such as recent natural disasters, provide harsh reminders of the many ways information can be lost. Among the most common are hardware and software malfunction, human error, computer viruses and natural disasters. A study by the Contingency Planning Research & Strategic Research Corp. revealed that among the causes of data loss, 44% are caused by hardware and system malfunction, and 32% by human error. Other causes of data loss include software corruption or program malfunction (14%), computer viruses (seven percent) and natural disasters (three percent). There are three main quantifiable costs associated with each incident of data loss: the cost of technical support in the recovery effort, lost productivity due to user downtime, and the possible cost associated with data that is permanently lost. The value of lost data will vary widely depending on how easily it is replaced: in some cases the data may be re-created in a short period of time, which would translate to

3 It s All About Restore Page 3 a relatively low value on the lost data. In other cases, the value of the lost data may take hundreds of man-hours over several weeks to rebuild, and thus the value of the lost data is very high. In some instances, the lost data may be irreplaceable, making the data invaluable. Losses in mission critical databases or custom applications can lead to severe business losses. Benefits of Disk-to-Disk Backup Three trends are making disk-to-disk backup solutions not only feasible, but also viable for organizations to consider. The first is the availability of inexpensive Serial ATA drives, providing low cost disks that can be employed specifically for backup and restore. Second, the iscsi standard (Internet SCSI) allows companies to develop cost-effective IP SANs (Internet Protocol Storage Area Networks) for disk-to-disk backup. Finally, a new generation of backup and restore software supports disk-todisk backup and restore methods. Additionally, optical storage technologies can be employed instead of tape to meet the new compliance regulations. In an IP SAN configuration, the backup software instructs client servers to send backup data to logical volumes presented by the IP SAN over a dedicated Gigabit Ethernet link. An intelligent networking platform uses volume management to make these logical volumes appear as a local disk to each client server. In this way, the backup operation is a simple disk copy operation that is performed at disk-to-disk speeds. The entire operation is as fast and seamless as writing backup data to a local drive that actually resides at the client server. See Figure 1. Figure 2: Backup software sends client data from DAS or internal disk on host servers to the IP SAN during the normal backup window. Likewise, network logical volumes are also backed up to backup volumes. Older volumes can later be copied to tape as a background activity. Backup operations are further enhanced by Ethernet s inherent ability to support concurrent server data transfers on the network. This intrinsic feature enables multiple client servers to backup data to their own logical disks at the same time, without having to wait for other backup jobs to finish. Running multiple backup jobs simultaneously dramatically reduces the time required to backup data.

4 It s All About Restore Page 4 Once the client servers complete their data backups, a master backup server can fetch the data directly from the logical volumes and place it on tape or an archival media such as WORM or optical drives. This transfer can take place without regard to the backup window since all of the client servers have already completed their respective backups and returned to normal operation. As an added bonus, the system administrator has complete control over configuring the size and number of IP SAN volumes presented to each client server, thus providing the ultimate flexibility in determining how much and how long backup data remains accessible at disk speeds. For example a system administrator could choose to have as little as yesterday s backups, or as much as last month s daily backups accessible via the IP SAN. Enabling Restore Operations Data loss or corruption can trigger a tape-based restore, resulting in lengthy downtimes. According to Gartner, up to 35% of all backup tapes will not restore in the way that users expect. Due to the mission-critical nature of today s messaging and collaborative applications, minimizing downtime and providing swift data recovery are paramount. Therefore, rapid disaster recovery and high availability remain the most significant achievements for implementers of disk-to-disk backup systems. The random access nature of disks makes them much more efficient for restore than sequentially accessible tape. This provides the following benefits: Data is logically mapped to storage resources using storage policies, which eliminates administrators' need to identify the physical location of data before a restore Automated movement of data from disk to tape, no manual intervention required Data path traceability enables administrators to more easily discover and remedy configuration issues for backup, restore, archiving and migration operations Auto discovery of storage devices by software - removes human intervention so there is less chance of incorrect configuration Automatic Default storage policy includes all data - no unprotected data How Disk-to-Disk Restore Works In an IP SAN, client server data is backed up to logical volumes. In Figure 2, for example, servers 1 and 2 backup data Monday through Friday. In order to facilitate the quick recovery of recently backed-up data, the system administrator has chosen to keep five days worth of backup data on each of those logical volumes. In the rare instance that a client server needs to restore this data, backup software is pointed to the correct logical volume on the IP SAN to copy the required data. Instead of restoring a whole dataset, the backup software can locate the correct file in minutes rather than hours. The entire transaction is conducted over a dedicated Gigabit Ethernet IP SAN using a simple copy operation.

5 It s All About Restore Page 5 Figure 2: The system administrator keeps five days of backups on-line to ensure quick recovery. This restores the data at disk-to-disk speeds that are as fast and seamless as accessing data from local drives in the client server. If client backup data more than five days old is required, it can be restored from tape by the backup server and then sent over the LAN, to the requesting server. Ethernet s inherent ability to support concurrent server data transfers on the network enables a client server to restore data from its own logical volume without impacting other restore operations that may be occurring at the same time on other servers. As a company s storage requirements increase, the IP SAN allows client servers and their associated logical volumes to be added, without increasing backup or restore times. Benefits of disk-to-disk backup and restore using an IP SAN include: Provides lower cost of ownership, ease of use, and performance benefits superior to traditional backup solutions Minimizes costs and simplifies operations using integrated IP SAN technology Offloads LAN-attached backups to the IP SAN creating a LAN-free backup environment Supports replication of backups to a remote IP SAN Eliminates the human element in handling tape Automated, policy based management of backups to ensure that they take place even if you can t be there An effective disk-to-disk backup and restore system requires configuring the IP SAN, including storage resources, backup software, and servers. The easiest way to ensure seamless operation is to look for a turnkey system, including the IP SAN components and backup software that all works together in a complete backup solution. Look for a disk-to-disk backup and restore system with the following key features:

6 It s All About Restore Page 6 If a backup fails for any reason, when the backup is restarted the system should pick up at the point of interruption rather than all the way at the beginning, saving time Support for standard iscsi protocol ensuring integration into standard Ethernet networks An auxiliary copy feature that can backup data from one server to the IP SAN volumes and then, without user intervention, have that server forward a backup copy to another server and IP SAN, even if it is in a remote location The ability to make backup copies from different media formats, for example from IP SAN to tape and then from tape to a remote IP SAN The ability to locate and restore a single file Re al World Examples Sites that have implanted disk-to-disk backup systems using an IP SAN have seen dramatic improvements, both in the time it takes to back up their systems, but also the time it takes to restore them. Ken Marsh, IT Manager at T.B. Penick & Sons "The StoneFly IP SAN is a dream come true," said Marsh. "I no longer worry about running out of storage in the middle of a huge project or having to spend endless nights performing backups." In particular, Marsh recalls several instances where project folders were accidentally deleted from the network. "Without the IP SAN, we could have spent tens of thousands of dollars recreating work that had been lost inadvertently," he noted. "Now, I can restore files in less than a minute and avoid disasters that could adversely impact both productivity and bottom-line profitability." In the past, Marsh and his small IT team spent most nights backing up the system with no time left for regular maintenance. Now, the team's incremental nightly backups take only minutes. Once a week full backups, which used to take days, are performed in less than 10 hours. When the disk-to-disk backup is completed, the IT team sends an archival copy to tape as a background activity that never impedes network performance. Brad Green, Director of Information Services, Denton Central Appraisal District (DCAD), North Texas DCAD uses a StoneFly IP SAN in conjunction with CommVault s award-winning backup and recovery software to slash back-up operations on the RISC 6000 platform. We reduced back up on that primary system from 10 hours to two hours, said Green. What s more, we can now back up 35 servers in the amount of time it used to take to back up one server. DCAD has also improved restore times considerably. Previously, if a file on any server was lost, it took several hours to recover the data, including securing offsite tapes and completing the entire restore operation. With the IP SAN, restores can now be completed in a matter of minutes.

7 It s All About Restore Page 7 Mirroring Supports Disaster Recovery in Backup Operations Mirroring provides a technique for creating and maintaining identical data sets on different physical IP SANs for data migration to a new SAN or replication for disaster recovery planning. If a disk fails within a mirror, it will have an identical set in a separate IP SAN. Local (synchronous) mirroring is performed between two or more IP SANs within the same storage environment. For example, building A can keep Exchange Databases in an IP SAN synchronized with a separate IP SAN in building B. Remote (asynchronous) mirroring is performed between two or more IP SANs in separate (remote) storage environments across a WAN connection. The remote site typically acts as a disaster recover configuration for the primary location. Mirroring provides the following benefits: Preservation of data integrity Enhanced disaster recovery planning Immediate access to business-critical data at a remote site Accelerated backup windows Consolidated backups and restores from multiple servers A system that combines disk-to-disk backup and restore efficiencies with mirroring provides a secure way to ensure that data is always accessible and that restores are always easy. For more information on implementing Data Recovery in an IP SAN environment, see whitepapers on StoneFly Solutions at

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of

More information

Disk-to-Disk Backup & Restore Application Note

Disk-to-Disk Backup & Restore Application Note Disk-to-Disk Backup & Restore Application Note All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from

More information

The Secret to Affordably Protecting Critical Data

The Secret to Affordably Protecting Critical Data The Secret to Affordably Protecting Critical Data Using StoneFly Backup Advantage All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc.

More information

Information Lifecycle Management

Information Lifecycle Management Information Lifecycle Management Using StoneFly Backup Advantage All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc. which are subject

More information

Seven Steps to Cost-Effective Disaster Recovery With IP SAN Technologies

Seven Steps to Cost-Effective Disaster Recovery With IP SAN Technologies Seven Steps to Cost-Effective Disaster Recovery With IP SAN Technologies Disk-to-Disk Backup & Restore and Off-Site Replication Now Within Reach of SMEs All trademark names are the property of their respective

More information

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices September 2008 Recent advances in data storage and data protection technology are nothing short of phenomenal. Today,

More information

Preface... 1. Introduction... 1 High Availability... 2 Users... 4 Other Resources... 5 Conventions... 5

Preface... 1. Introduction... 1 High Availability... 2 Users... 4 Other Resources... 5 Conventions... 5 Table of Contents Preface.................................................... 1 Introduction............................................................. 1 High Availability.........................................................

More information

Symantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer

Symantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer ESG Lab Review Symantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer Abstract: This ESG Lab review documents hands-on testing of consolidated management and automated data

More information

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP

More information

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss

More information

Storage Concentrator in a Microsoft Exchange Network

Storage Concentrator in a Microsoft Exchange Network Implementing a Storage Concentrator in a Microsoft Exchange Network All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc. which are subject

More information

Protecting enterprise servers with StoreOnce and CommVault Simpana

Protecting enterprise servers with StoreOnce and CommVault Simpana Technical white paper Protecting enterprise servers with StoreOnce and CommVault Simpana HP StoreOnce Backup systems Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key

More information

NSI Solutions with Microsoft VSS

NSI Solutions with Microsoft VSS Published: March 2004 Abstract With the introduction of Volume Shadow Copy Service (VSS) in Microsoft Windows Server 2003 and Windows Storage Server 2003 and the strength of NSI Software Double-Take you

More information

Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its

Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its DISASTER RECOVERY STRATEGIES: BUSINESS CONTINUITY THROUGH REMOTE BACKUP REPLICATION Every organization has critical data that it can t live without. When a disaster strikes, how long can your business

More information

DAS to SAN Migration Using a Storage Concentrator

DAS to SAN Migration Using a Storage Concentrator DAS to SAN Migration Using a Storage Concentrator April 2006 All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc. which are subject to

More information

Disaster Recovery Strategies: Business Continuity through Remote Backup Replication

Disaster Recovery Strategies: Business Continuity through Remote Backup Replication W H I T E P A P E R S O L U T I O N : D I S A S T E R R E C O V E R Y T E C H N O L O G Y : R E M O T E R E P L I C A T I O N Disaster Recovery Strategies: Business Continuity through Remote Backup Replication

More information

Four Steps to Disaster Recovery and Business Continuity using iscsi

Four Steps to Disaster Recovery and Business Continuity using iscsi White Paper Four Steps to Disaster Recovery and Business Continuity using iscsi It s a fact of business life physical, natural, and digital disasters do occur, and they interrupt operations and impact

More information

Affordable Remote Data Replication

Affordable Remote Data Replication SANmelody Application Affordable Remote Data Replication Your Data is as Valuable as Anyone s You know very well how critical your data is to your organization and how much your business would be impacted

More information

IBM Tivoli Storage Manager

IBM Tivoli Storage Manager Help maintain business continuity through efficient and effective storage management IBM Tivoli Storage Manager Highlights Increase business continuity by shortening backup and recovery times and maximizing

More information

The Microsoft Large Mailbox Vision

The Microsoft Large Mailbox Vision WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more e mail has many advantages. Large mailboxes

More information

Optimizing Large Arrays with StoneFly Storage Concentrators

Optimizing Large Arrays with StoneFly Storage Concentrators Optimizing Large Arrays with StoneFly Storage Concentrators All trademark names are the property of their respective companies. This publication contains opinions of which are subject to change from time

More information

The next generation, proven, affordable way to protect business using disk-based recovery

The next generation, proven, affordable way to protect business using disk-based recovery REAL-TIME RECOVERY The next generation, proven, affordable way to protect business using disk-based recovery StorageCraft Technology Corporation Leading the Way to Safer Computing 2006 StorageCraft Technology

More information

Total Cost of Ownership Analysis

Total Cost of Ownership Analysis Total Cost of Ownership Analysis Abstract A total cost of ownership (TCO) analysis can measure the cost of acquiring and operating a new technology solution against a current installation. In the late

More information

Virtual Disaster Recovery

Virtual Disaster Recovery Virtual Disaster Recovery White Paper September 16, 2008 Kelly Laughton Davenport Group Consultant Davenport Group 2008. All rights reserved. Introduction Today s data center has evolved into a complex,

More information

Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect

Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect Abstract Retrospect backup and recovery software provides a quick, reliable, easy-to-manage disk-to-disk-to-offsite backup solution for SMBs. Use

More information

Protect Microsoft Exchange databases, achieve long-term data retention

Protect Microsoft Exchange databases, achieve long-term data retention Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...

More information

THE BASIC BACKUP GUIDE TAPE BACKUP STRATEGIES FOR THE SMALL-TO-MEDIUM BUSINESS

THE BASIC BACKUP GUIDE TAPE BACKUP STRATEGIES FOR THE SMALL-TO-MEDIUM BUSINESS THE BASIC BACKUP GUIDE TAPE BACKUP STRATEGIES FOR THE SMALL-TO-MEDIUM BUSINESS 1010370-001 ii Contents About This Guide.................. v Why tape is ideal for backup... v automation - now available

More information

IP Storage On-The-Road Seminar Series

IP Storage On-The-Road Seminar Series On-The-Road Seminar Series Disaster Recovery and Data Protection Page 1 Agenda! The Role of IP in Backup!Traditional use of IP networks for backup! backup capabilities! Contemporary data protection solutions

More information

Business Continuity: Choosing the Right Technology Solution

Business Continuity: Choosing the Right Technology Solution Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail

More information

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many

More information

15 Organisation/ICT/02/01/15 Back- up

15 Organisation/ICT/02/01/15 Back- up 15 Organisation/ICT/02/01/15 Back- up 15.1 Description Backup is a copy of a program or file that is stored separately from the original. These duplicated copies of data on different storage media or additional

More information

Backup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases

Backup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases Backup and Recovery What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases CONTENTS Introduction 3 Terminology and concepts 3 Database files that make up a database 3 Client-side

More information

Using HP StoreOnce Backup systems for Oracle database backups

Using HP StoreOnce Backup systems for Oracle database backups Technical white paper Using HP StoreOnce Backup systems for Oracle database backups Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key features and benefits 2 HP StoreOnce

More information

StorageCraft Technology Corporation Leading the Way to Safer Computing 2004-2009 StorageCraft Technology Corporation. All Rights Reserved.

StorageCraft Technology Corporation Leading the Way to Safer Computing 2004-2009 StorageCraft Technology Corporation. All Rights Reserved. PRODUCT SCENARIOS Introduction Fast and reliable online backup and bare metal recovery for Windows servers ShadowProtect Server Edition creates an exact point-in-time backup of your entire server or specific

More information

Breakthrough Data Recovery for IBM AIX Environments

Breakthrough Data Recovery for IBM AIX Environments TECHNICAL ISSUES Best Practices in Availability. Breakthrough Data Recovery for IBM AIX Environments How New Technologies Are Making Data Protection, Recovery and High Availability Easier and More Affordable

More information

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL

More information

Why cloud backup? Top 10 reasons

Why cloud backup? Top 10 reasons Why cloud backup? Top 10 reasons HP Autonomy solutions Table of contents 3 Achieve disaster recovery with secure offsite cloud backup 4 Free yourself from manual and complex tape backup tasks 4 Get predictable

More information

How do you test to determine which backup and restore technology best suits your business needs?

How do you test to determine which backup and restore technology best suits your business needs? KEY CRITERIA WHEN SELECTING BACKUP AND RESTORE TECHNOLOGY FOR WINDOWS SYSTEMS How do you test to determine which backup and restore technology best suits your business needs? Real-Time Recovery delivers

More information

PROTECTING MICROSOFT SQL SERVER TM

PROTECTING MICROSOFT SQL SERVER TM WHITE PAPER PROTECTING MICROSOFT SQL SERVER TM Your company relies on its databases. How are you protecting them? Published: February 2006 Executive Summary Database Management Systems (DBMS) are the hidden

More information

Next Generation NAS: A market perspective on the recently introduced Snap Server 500 Series

Next Generation NAS: A market perspective on the recently introduced Snap Server 500 Series Next Generation NAS: A market perspective on the recently introduced Snap Server 500 Series ABSTRACT In February 2006, Snap Server announced the 500 Series of Networked Attached Storage systems as well

More information

Disaster Recovery for Small Businesses

Disaster Recovery for Small Businesses Technical White Paper Disaster Recovery for Small Businesses A disaster recovery plan helps you understand what data is critical to your business operations and how to best protect it from unexpected failures.

More information

CLPCCD DATA BACKUP DISTRICT ADMINISTRATIVE SYSTEMS

CLPCCD DATA BACKUP DISTRICT ADMINISTRATIVE SYSTEMS CLPCCD DATA BACKUP DISTRICT ADMINISTRATIVE SYSTEMS INTRODUCTION A comprehensive backup solution is essential in ensuring timely recovery of critical user information in the event of accidental deletion,

More information

Slash Costs and Improve Operations with Server, Storage and Backup Virtualization. December 2008

Slash Costs and Improve Operations with Server, Storage and Backup Virtualization. December 2008 Slash Costs and Improve Operations with Server, Storage and Backup Virtualization December 2008 Virtualization consolidates resources to obliterate waste in IT, and the associated cost savings make this

More information

an introduction to networked storage

an introduction to networked storage an introduction to networked storage How networked storage can simplify your data management The key differences between SAN, DAS, and NAS The business benefits of networked storage Introduction Historical

More information

Application Brief: Using Titan for MS SQL

Application Brief: Using Titan for MS SQL Application Brief: Using Titan for MS Abstract Businesses rely heavily on databases for day-today transactions and for business decision systems. In today s information age, databases form the critical

More information

Disk-to-Disk-to-Tape (D2D2T)

Disk-to-Disk-to-Tape (D2D2T) Where Disk Fits into Backup Tape originated in the 1950 s as the primary storage device for computers. It was one of the first ways to store data beyond the memory of a computer, which at the time was

More information

Mosaic IT Directors Series. Snapshots, Replication and iscsi: A Practical Guide

Mosaic IT Directors Series. Snapshots, Replication and iscsi: A Practical Guide Mosaic IT Directors Series Snapshots, Replication and iscsi: A Practical Guide Introduction/Overview 3 The New Reality -- Operations Must Be Online 4 What Constitutes a Disaster? 4 Data Protection - One

More information

Local Government Cyber Security:

Local Government Cyber Security: Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and

More information

Call: 08715 900800. Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT

Call: 08715 900800. Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT The VirtuousIT DR/BC solution is designed around RecoveryShield from Thinking SAFE. The service includes a local backup appliance

More information

Leveraging Virtualization for Disaster Recovery in Your Growing Business

Leveraging Virtualization for Disaster Recovery in Your Growing Business Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster

More information

Continuous Data Protection. PowerVault DL Backup to Disk Appliance

Continuous Data Protection. PowerVault DL Backup to Disk Appliance Continuous Data Protection PowerVault DL Backup to Disk Appliance Continuous Data Protection Current Situation The PowerVault DL Backup to Disk Appliance Powered by Symantec Backup Exec offers the industry

More information

Disaster Recovery Planning

Disaster Recovery Planning Assess, Adjust, Improve An LXI Publication Page 1 of 11 Your company's ability to recover is a high priority. In a survey by Contingency Planning & Management Magazine of 1437 contingency planners, 76%

More information

IBM Sales and Distribution Group June 2009. Next-generation data protection for midsize companies.

IBM Sales and Distribution Group June 2009. Next-generation data protection for midsize companies. IBM Sales and Distribution Group June 2009 Next-generation data protection for midsize companies. Page 2 Contents 2 What is next-generation data protection? 3 Understanding the whole problem 6 Next-generation

More information

Using HP StoreOnce D2D systems for Microsoft SQL Server backups

Using HP StoreOnce D2D systems for Microsoft SQL Server backups Technical white paper Using HP StoreOnce D2D systems for Microsoft SQL Server backups Table of contents Executive summary 2 Introduction 2 Technology overview 2 HP StoreOnce D2D systems key features and

More information

SQL Server Storage Best Practice Discussion Dell EqualLogic

SQL Server Storage Best Practice Discussion Dell EqualLogic SQL Server Storage Best Practice Discussion Dell EqualLogic What s keeping you up at night? Managing the demands of a SQL environment Risk Cost Data loss Application unavailability Data growth SQL Server

More information

Protecting Virtual Servers with Acronis True Image

Protecting Virtual Servers with Acronis True Image Protecting Virtual Servers with Acronis True Image Protecting Virtual Servers with Acronis True Image In This Paper Protecting Virtual Servers with Acronis True Image...3 Virtual Machines: The Data Protection

More information

The Essential Guide for Protecting Your Legal Practice From IT Downtime

The Essential Guide for Protecting Your Legal Practice From IT Downtime The Essential Guide for Protecting Your Legal Practice From IT Downtime www.axcient.com Introduction: Technology in the Legal Practice In the professional services industry, the key deliverable of a project

More information

How To Protect Data On Network Attached Storage (Nas) From Disaster

How To Protect Data On Network Attached Storage (Nas) From Disaster White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains

More information

IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity

IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity Simplifying storage processes and ensuring business continuity and high availability IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity The risks are even greater for companies that

More information

White. Paper. Improving Backup Effectiveness and Cost-Efficiency with Deduplication. October, 2010

White. Paper. Improving Backup Effectiveness and Cost-Efficiency with Deduplication. October, 2010 White Paper Improving Backup Effectiveness and Cost-Efficiency with Deduplication By Lauren Whitehouse October, 2010 This ESG White Paper was commissioned by Fujitsu and is distributed under license from

More information

Disk-to-Disk Backup and Restore Solution

Disk-to-Disk Backup and Restore Solution Disk-to-Disk Backup and Restore Solution Using Computer Associates ARCserve 11 and Adaptec FS4500 Fibre-to-SATA RAID Contents Introduction.....................................1 The Solution: The Adaptec

More information

BlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything

BlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything BlueArc unified network storage systems 7th TF-Storage Meeting Scale Bigger, Store Smarter, Accelerate Everything BlueArc s Heritage Private Company, founded in 1998 Headquarters in San Jose, CA Highest

More information

UBDR and Microsoft Cluster Server

UBDR and Microsoft Cluster Server WHITE PAPER UBDR and Microsoft Cluster Server UltraBac Version 8.x OVERVIEW UltraBac Software, author of award-winning backup and storage management software, is proud to announce enhanced support for

More information

Manufacturers Need More Than Just Backup... But they don t need to spend more! axcient.com

Manufacturers Need More Than Just Backup... But they don t need to spend more! axcient.com Manufacturers Need More Than Just Backup... But they don t need to spend more! axcient.com Introduction Manufacturers need to keep their businesses up and running more than ever now. Automating work processes

More information

White. Paper. Benefiting from Server Virtualization. Beyond Initial Workload Consolidation. June, 2010

White. Paper. Benefiting from Server Virtualization. Beyond Initial Workload Consolidation. June, 2010 White Paper Benefiting from Server Virtualization Beyond Initial Workload Consolidation By Mark Bowker June, 2010 This ESG White Paper was commissioned by VMware and is distributed under license from ESG.

More information

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:

More information

The Importance of Disaster Recovery for Data Protection

The Importance of Disaster Recovery for Data Protection The Importance of Disaster Recovery for Data Protection Eric R Schott Director, Product Management 2006 Summer Conference 2005 Annual June Conference 13th, 2006 October Sheraton 24-26 Nashua 2005, Hotel

More information

Online Backup Solution Features

Online Backup Solution Features CCC Technologies, Inc. 700 Nicholas Blvd., Suite 300 Elk Grove Village, IL 60007 877.282.9227 www.ccctechnologies.com Online Backup Solution Features Introduction Computers are the default storage medium

More information

Unitrends Backup & Recovery Solutions and Disaster Recovery Best Practices

Unitrends Backup & Recovery Solutions and Disaster Recovery Best Practices Solution Brief Unitrends Backup & Recovery Solutions and Disaster Recovery Best Practices 2 So you re confident knowing that the backup and recovery solution protecting your business-critical operations

More information

ESG Report. Data Protection Strategies for SMBs. By Heidi Biggar Storage Analyst, Data Protection Enterprise Strategy Group.

ESG Report. Data Protection Strategies for SMBs. By Heidi Biggar Storage Analyst, Data Protection Enterprise Strategy Group. By Heidi Biggar Storage Analyst, Data Protection Enterprise Strategy Group April, 2007 Copyright 2007. The Enterprise Strategy Group, Inc. All Rights Reserved. Table of Contents ESG Report Table of Contents...

More information

Implementing Storage Concentrator FailOver Clusters

Implementing Storage Concentrator FailOver Clusters Implementing Concentrator FailOver Clusters Technical Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc. which are subject to

More information

About Backing Up a Cisco Unity System

About Backing Up a Cisco Unity System CHAPTER 4 Introduction This chapter describes in general terms backing up a Cisco Unity system. When you back up a Cisco Unity server (and one or more Exchange servers) you need to consider the same issues

More information

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta

More information

Business-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance

Business-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance Intel Xeon processor Business-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance The easy solution for backup to disk with deduplication Intel Inside. Powerful Solution Outside. If

More information

Do You Know Where Your Messages Are?

Do You Know Where Your Messages Are? Do You Know Where Your Messages Are? By Jason Sherry The need for message archiving In most organizations, an estimated 83 percent of all communications are electronic, with the vast majority of those

More information

The Art of High Availability

The Art of High Availability The Essentials Series: Configuring High Availability for Windows Server 2008 Environments The Art of High Availability by The Art of High Availability... 1 Why Do We Need It?... 1 Downtime Hurts... 1 Critical

More information

EonStor DS remote replication feature guide

EonStor DS remote replication feature guide EonStor DS remote replication feature guide White paper Version: 1.0 Updated: Abstract: Remote replication on select EonStor DS storage systems offers strong defense against major disruption to IT continuity,

More information

Real-time Protection for Hyper-V

Real-time Protection for Hyper-V 1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate

More information

Field Audit Report. Asigra. Hybrid Cloud Backup and Recovery Solutions. May, 2009. By Brian Garrett with Tony Palmer

Field Audit Report. Asigra. Hybrid Cloud Backup and Recovery Solutions. May, 2009. By Brian Garrett with Tony Palmer Field Audit Report Asigra Hybrid Cloud Backup and Recovery Solutions By Brian Garrett with Tony Palmer May, 2009 Field Audit: Asigra Hybrid Cloud Backup and Recovery Solutions 2 Contents Introduction...

More information

WHY CLOUD BACKUP: TOP 10 REASONS

WHY CLOUD BACKUP: TOP 10 REASONS WHITE PAPER DATA PROTECTION WHY CLOUD BACKUP: TOP 10 REASONS Contents REASON #1: Achieve disaster recovery with secure offsite cloud backup REASON #2: Freedom from manual and complex tape backup tasks

More information

Fluid Data storage: A fully virtualized foundation for the IT stack

Fluid Data storage: A fully virtualized foundation for the IT stack Fluid Data storage: A fully virtualized foundation for the IT stack A Dell Technical White Paper February 2010 A C-level look at the business impact of virtualization Executive overview In today s challenging

More information

WHITE PAPER: DATA PROTECTION. Veritas NetBackup for Microsoft Exchange Server Solution Guide. Bill Roth January 2008

WHITE PAPER: DATA PROTECTION. Veritas NetBackup for Microsoft Exchange Server Solution Guide. Bill Roth January 2008 WHITE PAPER: DATA PROTECTION Veritas NetBackup for Microsoft Exchange Server Solution Guide Bill Roth January 2008 White Paper: Veritas NetBackup for Microsoft Exchange Server Solution Guide Content 1.

More information

THE CASE FOR ACTIVE DATA ARCHIVING

THE CASE FOR ACTIVE DATA ARCHIVING THE CASE FOR ACTIVE DATA ARCHIVING Written by Ray Quattromini 3 rd September 2007 Contact details Tel: 01256 782030 / 08704 286 186 Fax: 08704 286 187 Email: sales@data-storage.co.uk Web: www.data-storage.co.uk

More information

Protecting Virtual Servers with Acronis True Image Echo

Protecting Virtual Servers with Acronis True Image Echo Protecting Virtual Servers with Acronis True Image Echo IT organizations have discovered that virtualization technology can simplify server management and reduce total operating costs. Despite the technical

More information

DISASTER RECOVERY PLANNING WITH VIRTUALIZATION TECHNOLOGIES

DISASTER RECOVERY PLANNING WITH VIRTUALIZATION TECHNOLOGIES DISASTER RECOVERY PLANNING WITH VIRTUALIZATION TECHNOLOGIES Business Value Whitepaper Double-Take Software, Inc. Published: October 2009 Virtualization and Recoverability Business continuity is not just

More information

Business-centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance

Business-centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance Business-centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance The easy solution for backup to disk with deduplication If you rethink your backup strategy, then think of ETERNUS CS800

More information

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper Connectivity Alliance Access 7.0 Database Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Database Loss Business Impact... 6 2.2 Database Recovery

More information

Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric

Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric 2001 San Diego Gas and Electric. All copyright and trademark rights reserved. Importance

More information

Version: 1.5 2014 Page 1 of 5

Version: 1.5 2014 Page 1 of 5 Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware

More information

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper Connectivity Alliance 7.0 Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Loss Business Impact... 6 2.2 Recovery Tools... 8 3 Manual Recovery Method...

More information

Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication

Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication PRODUCT BRIEF Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication NOTICE This Product Brief contains proprietary information protected by copyright. Information in this

More information

NetVault Backup, NDMP and Network Attached Storage

NetVault Backup, NDMP and Network Attached Storage NetVault, NDMP and Network Attached Storage Simplicity and power for NAS Written by Adrian Moir, Dell Scott Hetrick, Dell Abstract This technical brief explains how Network Data Management Protocol (NDMP)

More information

Virtual Infrastructure Security

Virtual Infrastructure Security Virtual Infrastructure Security 2 The virtual server is a perfect alternative to using multiple physical servers: several virtual servers are hosted on one physical server and each of them functions both

More information

Bringing the edge to the data center a data protection strategy for small and midsize companies with remote offices. Business white paper

Bringing the edge to the data center a data protection strategy for small and midsize companies with remote offices. Business white paper Bringing the edge to the data center a data protection strategy for small and midsize companies with remote offices Business white paper Table of contents Data protection synonymous with business success...

More information

Remote Site Business Continuity with Syncsort XRS White Paper

Remote Site Business Continuity with Syncsort XRS White Paper Remote Site Business Continuity with Syncsort XRS White Paper bex30101907wprs-xrs Remote Site Business Continuity with Syncsort XRS Introduction As companies increasingly migrate to distributed business

More information

CYBERNETICS. Virtualization of Tape Storage

CYBERNETICS. Virtualization of Tape Storage Abstract: Realizing the benefits of Disk to Disk to Tape backup strategies incorporating disk-based virtual tape devices. CYBERNETICS Intelligent Storage Solutions Table of Contents Introduction 1 Benefits

More information

High Availability and Disaster Recovery Solutions for Perforce

High Availability and Disaster Recovery Solutions for Perforce High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce

More information

Wanted: Better Backup Poll shows widening gap between expectations and reality

Wanted: Better Backup Poll shows widening gap between expectations and reality Poll shows widening gap between expectations and reality SPONSORED BY: In recent years, businesses and government agencies have delayed modernizing backup systems due to economics and other IT priorities.

More information

How To Backup Your Hard Drive With Pros 4 Technology Online Backup

How To Backup Your Hard Drive With Pros 4 Technology Online Backup Pros 4 Technology Online Backup Features Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and

More information

Migrating from Tape to Disk Backups

Migrating from Tape to Disk Backups Migrating from Tape to Disk Backups DATA PROTECTION WHITE PAPER Migrating from Tape to Disk Backups Page 1 of 14 2008 Revinetix, Inc. All rights reserved. Title: Product: Target Audience: Migrating from

More information