Intel RAID Premium Features
|
|
|
- Gabriel Pearson
- 10 years ago
- Views:
Transcription
1 Intel RAID Premium Features Description and use Revision 1.0 August, 2010 Enterprise Platforms and Services Division - Marketing
2 Revision History Intel RAID Premium Features Revision History Date Revision Number Modifications August Initial release. ii Intel Confidential Revision 1.0
3 Intel RAID Premium Features Disclaimers Disclaimers The information contained in this document is provided for informational purposes only and represents the current view of Intel Corporation ( Intel ) and its contributors ("Contributors") on, as of the date of publication. Intel and the Contributors make no commitment to update the information contained in this document, and Intel reserves the right to make changes at any time, without notice. DISCLAIMER. THIS DOCUMENT, IS PROVIDED AS IS. NEITHER INTEL, NOR THE CONTRIBUTORS MAKE ANY REPRESENTATIONS OF ANY KIND WITH RESPECT TO PRODUCTS REFERENCED HEREIN, WHETHER SUCH PRODUCTS ARE THOSE OF INTEL, THE CONTRIBUTORS, OR THIRD PARTIES. INTEL, AND ITS CONTRIBUTORS EXPRESSLY DISCLAIM ANY AND ALL WARRANTIES, IMPLIED OR EXPRESS, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR ANY PARTICULAR PURPOSE, NON-INFRINGEMENT, AND ANY WARRANTY ARISING OUT OF THE INFORMATION CONTAINED HEREIN, INCLUDING WITHOUT LIMITATION, ANY PRODUCTS, SPECIFICATIONS, OR OTHER MATERIALS REFERENCED HEREIN. INTEL, AND ITS CONTRIBUTORS DO NOT WARRANT THAT THIS DOCUMENT IS FREE FROM ERRORS, OR THAT ANY PRODUCTS OR OTHER TECHNOLOGY DEVELOPED IN CONFORMANCE WITH THIS DOCUMENT WILL PERFORM IN THE INTENDED MANNER, OR WILL BE FREE FROM INFRINGEMENT OF THIRD PARTY PROPRIETARY RIGHTS, AND INTEL, AND ITS CONTRIBUTORS DISCLAIM ALL LIABILITY THEREFOR. INTEL, AND ITS CONTRIBUTORS DO NOT WARRANT THAT ANY PRODUCT REFERENCED HEREIN OR ANY PRODUCT OR TECHNOLOGY DEVELOPED IN RELIANCE UPON THIS DOCUMENT, IN WHOLE OR IN PART, WILL BE SUFFICIENT, ACCURATE, RELIABLE, COMPLETE, FREE FROM DEFECTS OR SAFE FOR ITS INTENDED PURPOSE, AND HEREBY DISCLAIM ALL LIABILITIES THEREFOR. ANY PERSON MAKING, USING OR SELLING SUCH PRODUCT OR TECHNOLOGY DOES SO AT HIS OR HER OWN RISK. Licenses may be required. Intel, its contributors and others may have patents or pending patent applications, trademarks, copyrights or other intellectual proprietary rights covering subject matter contained or described in this document. No license, express, implied, by estoppel or otherwise, to any intellectual property rights of Intel or any other party is granted herein. It is your responsibility to seek licenses for such intellectual property rights from Intel and others where appropriate. Limited License Grant. Intel hereby grants you a limited copyright license to copy this document for your use and internal distribution only. You may not distribute this document externally, in whole or in part, to any other person or entity. LIMITED LIABILITY. IN NO EVENT SHALL INTEL, OR ITS CONTRIBUTORS HAVE ANY LIABILITY TO YOU OR TO ANY OTHER THIRD PARTY, FOR ANY LOST PROFITS, LOST DATA, LOSS OF USE OR COSTS OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR FOR ANY DIRECT, INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF YOUR USE OF THIS DOCUMENT OR RELIANCE UPON THE INFORMATION CONTAINED HEREIN, UNDER ANY CAUSE OF ACTION OR THEORY OF LIABILITY, AND IRRESPECTIVE OF WHETHER INTEL, OR ANY CONTRIBUTOR HAS ADVANCE NOTICE OF THE POSSIBILITY OF SUCH DAMAGES. THESE LIMITATIONS SHALL APPLY NOTWITHSTANDING THE FAILURE OF THE ESSENTIAL PURPOSE OF ANY LIMITED REMEDY. Intel, the Intel logo, and Intel Xeon are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. *Other names and brands may be claimed as the property of others. Copyright 2010, Intel Corporation. All Rights Reserved. Revision 1.0 Intel Confidential iii
4 Table of Contents Intel RAID Premium Features Table of Contents 1. Introduction Optimized SSD solutions Providing Additional Data Recovery Capability Protecting Data Through Self Encrypting Drive Support How it works Installing the Premium Feature Key SSD Cache with Fastpath IO Premium Features SSD Cache Configuring SSD Cache... 4 Usage Models Fastpath I/O Configuring Fastpath Usage Models Snapshot Recovery Premium Feature Configuring Snapshot Usage Models Self Encrypting Drive (SED) support Configuring SED Support Instant Secure Erase Usage Model Summary/Conclusion...18 iv Intel Confidential Revision 1.0
5 Intel RAID Premium Features List of Figures List of Figures Figure 1. RAID Premium Feature Key and Key Header... 2 Figure 2. RAID Premium Feature Key Header Location... 3 Figure 3. Intel RAID Web Console 2 Dashboard... 4 Figure 4. Creating SSCD... 5 Figure 5. SSCD Properties... 5 Figure 6. SSD Cache for small working data set applications... 6 Figure 7. SSD Cache pool improves IO Performance for Exchange... 6 Figure 8. SSD Cache pool for larger working data sets... 7 Figure 9. SSD Cache Doubles IO Performance for MS SQL... 7 Figure 10. SSD Cache cuts the MS Exchange Cost Per Transaction by Half... 8 Figure 11. Applications with Larger Active Data Sets and Wider IO Access Rages... 9 Figure 12. OLTP Performance with and Fast Path and Non-Fast Path... 9 Figure 13. Enable MegaRAID Recovery Figure 14. Select Snapshot Repository Figure 15. Snapshot Base and Snapshot Repository Figure 16. Create View of Snapshots Figure 17. Enable Drive Security Figure 18. Drive Security Properties Figure 19. Instant Secure Erase Revision 1.0 Intel Confidential v
6 List of Figures Intel RAID Premium Features < This page is intentionally left blank. > vi Intel Confidential Revision 1.0
7 Intel RAID Premium Features Introduction 1. Introduction With the release of 6Gb/s SAS / SATA RAID products, Intel has set new industry standards for RAID product performance and added new features that improve manageability. To further enhance the 6Gb RAID product line Intel has introduced a new set of add-on premium features that allow customers to: 1. Optimize performance with the addition of Solid State Drives (SSDs) to their RAID configuration 2. Provide additional data recovery protection 3. Add support for Self Encrypting Drives to protect data from theft or misuse. These features can be enabled at any time through the addition of a Premium Feature Key (PFK) to the RAID controller. 1.1 Optimized SSD solutions It has always been possible to add off the shelf SSDs to the system and to organize them as a RAID volume. Two new features have been added to improve RAID performance through the use of SSDs: 1. When using one or more SSDs as an all SSD RAID volume, the FastPath I/O feature can be enabled that optimizes the RAID controller software stack for use with these solid state solutions. With this premium feature enabled, solid state drive configurations are tuned for small, random block-size IO activity, typical of transactional database applications, doubling the IOPs capability attained without the key installed. 2. A feature called SSD Cache can be enabled that allows the use of one or more SSDs to serve as a cache pool for RAID volumes made up of hard disk drives, greatly improving performance in some applications by allowing frequently-read data (hotspot data) to be copied from a traditional hard drive to second tier SSD cache, allowing for faster data retrieval for data which is re-read. 1.2 Providing Additional Data Recovery Capability A new feature called Snapshot Recovery provides a means for simplified recovery of data, automatic boot volume protection, and inexpensive disaster recovery enhancement for small-tomedium sized businesses. This is accomplished through a quick and easy-to-use feature within the RAID storage manager that restores or recovers data should file loss or corruption of a volume occur. With this feature, a snapshot of a selected volume is taken that can provide a means to roll back to a previous point in time. File Restoration/Recovery With one of more snapshots taken and the Restore-from-View option, users can simply view their point-in-time (PiT) snapshots and determine inconsistencies in content between PiT & source data (deleted/missing files, presence of virus), then drag files from the snapshot to source volumes seamlessly. Boot Volume /Virtual Drive Protection Through the use of either/both Snapshot and Auto Snap (where snapshots are taken automatically at boot time), should the system become unbootable, rolling back to a previous PiT allows boot restoration and block/file level repair. Revision 1.0 Intel Confidential 1
8 Introduction Intel RAID Premium Features Microsoft Volume Shadow Copy Services VSS Support Through the support of VSS (Provider) Snapshot recovery now supports any VSS Requestor calls through MS s VSS service and ensures data consistency when using a 3rd party backup applications Protecting Data Through Self Encrypting Drive Support Self Encrypting Drive (SED) support provides a user interface for local key management for self encrypting drives or SEDs such as the Seagate Secure line of hard disk drives. SEDs require a high security key to unlock them at power up; Intel RAID SED support provides the interface within the RAID management utilities to create and manage keys and to interface with the encryption engine on the self encrypting drive. With the key, the SED capable Intel RAID controller can unlock the hard drives providing several real world advantages, including: 1. Secure data when a drive is misplaced, failed, or removed from service. 2. Auto-Lock volumes in case of server or drive theft. 3. Instantly erase the drive data before returning leased or defective drives Intel RAID SED capability provides a secure, simple, affordable, and high performance solution for full disk encryption support How it works The desired feature is activated via a Premium Feature Key. Intel RAID Mainstream and Scalable performance controllers include a key header that enable the Premium Feature Key to be plugged onto the adapter. Figure 1. RAID Premium Feature Key and Key Header When the presence of the enablement key is detected by the RAID controller, the premium feature is activated and will remain active as long as the key is connected. In the case of a RAID controller failure, the key can be transferred to a replacement controller. 2 Intel Confidential Revision 1.0
9 Intel RAID Premium Features Installing the Premium Feature Key 2. Installing the Premium Feature Key IMPORTANT: Your Intel RAID Controller must be programmed with the latest Intel RAID Controller firmware to enable Intel RAID Premium Features. A Raid controller firmware update is available at: The feature key is designed to plug onto a Mainstream or Scalable Performance Intel RAID Controller that has a RAID Premium Feature Key connector. The Intel RAID Premium Feature Key must remain attached to the connector in order to enable and maintain the premium feature. Figure 2. RAID Premium Feature Key Header Location In the figure, the arrow points to the location of the RAID Premium Feature Key connector for the Intel RAID Controller RS2BL080. This is a 2-pin shielded connector, the location of Premium Feature Key connector on your Intel RAID Controller may vary. Please refer to the Intel RAID Controller User Guide for the location of this connector. Only single PFK installations are allowed (one PFK header per controller). When the PFK is removed all premium features provided by the key are disabled. With the Feature Key installed, unless noted specifically, the added feature must be enabled and/or configured using the RAID BIOS Console utility or RAID Web Console 2 utility. For detailed information on enabling and configuring the feature key option, please refer to the Intel RAID Software User s Guide available under your selected controller at Removing the PFK is done by firmly holding the RAID controller on a flat surface, and pulling the Intel RAID Premium Feature Key from the connector. Revision 1.0 Intel Confidential 3
10 SSD Cache with Fastpath IO Premium Features Intel RAID Premium Features 3. SSD Cache with Fastpath IO Premium Features These two mutually exclusive features are combined on one premium feature key. Each of these features is described below: 3.1 SSD Cache SSD Cache uses one or more Solid State Drives (SSD) as a second level of controller cache, allowing for very large data sets to be present in that cache to improve overall application performance. In this configuration, in addition to mechanical SAS or SATA hard drives set up as virtual drives, one or more SSDs are set up as a cache pool into which data is written at the same time it is written to the virtual drive. Up to 32 SSDs can be assigned to the cache pool, increasing the size of the cache pool increases the likelihood of a cache hit. During a data read command, if the data can be read from the controller memory or from the SSD Cache pool rather than from the virtual drive. Because IO performance is much higher for an SSD than for a mechanical hard drive, data can be accesses much more quickly. This is especially beneficial when reading small block random data, but may not be of benefit for large block sequential data reads, and is of no benefit if data is not existent in the cache pool. This solution is ideal for cost sensitive server environments, by offering a high-performance upgrade that requires only a small investment in SSD technology, and provides the benefit of high IO SSD capability with the advantage of also being able to use large capacity SAS or SATA hard disk drives Configuring SSD Cache Configuring and managing SSD Cache can be accomplished using the RAID Bios Console Utility (ctrl+g at boot), or via the RAID Web Console 2 utility. We will describe enabling and managing the feature using the RAID Web Console 2 utility. An SSD Cache pool can be created from either the dashboard view of RAID Web Console 2 or from the properties pull down option. Figure 3. Intel RAID Web Console 2 Dashboard 4 Intel Confidential Revision 1.0
11 Intel RAID Premium Features SSD Cache with Fastpath IO Premium Features Figure 4. Creating SSCD You can then select SSD drives for inclusion in the SSC Cache pool and then chose to create the pool; you will then see the SSD cache pool in the logical view as shown below: Figure 5. SSCD Properties With the cache pool created, any data going to the virtual drives supported by the controller will also be copied to the cache pool, and any read requests will look in the cache pool and read the data if it exists in the pool. You can remove the SSD Cache drive group any time without affecting the data that exists on the virtual drives. SSD cache is not a backup strategy for data existing on virtual drives, SSD cache data will remain available across reboots, but will be overwritten on a first in / first out basis. Revision 1.0 Intel Confidential 5
12 SSD Cache with Fastpath IO Premium Features Intel RAID Premium Features Usage Models SSD Cache is best suited for small working data set applications where data is frequently read and re-read from a relatively small working data set as depicted in the graphics below. Figure 6. SSD Cache for small working data set applications Figure 7. SSD Cache pool improves IO Performance for Exchange Adding additional SSDs to the SSD Cache pool can benefit transactional database (OLTP, SQL) and some applications that have larger working data sets that require a larger cache pool to scale performance. 6 Intel Confidential Revision 1.0
13 Intel RAID Premium Features SSD Cache with Fastpath IO Premium Features Figure 8. SSD Cache pool for larger working data sets Figure 9. SSD Cache Doubles IO Performance for MS SQL SSD Cache can improve the total cost of ownership by lowering the latency for data retrieval and getting more out of the storage investment. Revision 1.0 Intel Confidential 7
14 SSD Cache with Fastpath IO Premium Features Intel RAID Premium Features Figure 10. SSD Cache cuts the MS Exchange Cost Per Transaction by Half 3.2 Fastpath I/O Fast Path is a high performance IO accelerator for Solid State Drive (SSD) arrays connected to a MegaRAID controller card. This premium feature solution can dramatically boost storage subsystem bandwidth and overall application performance when deployed with a 6Gb/s SAS MegaRAID controller connected to SSDs. Intel RAID controller cache is tuned to provide general IO Path capability for Write Through data transfers in disk drive based arrays that can reach up to 80,000 IOPs. However, with SSDs now able to reach up to 33,000 IOPs for each drive, additional IO capability is needed. Fast Path is an SSD-centric solution to improve IO performance by supporting full optimization of SSD Virtual Disk groups. With this premium feature enabled, raid firmware supporting Solid State Drive configurations is tuned for small, random block-size IO activity and can sustain over 150,000 IO READS Per Second. This is three times the IOPs levels attainable by the previous RAID solutions. The performance levels reached with this solution are equivalent to those of much costlier Flash-based adapter card solutions Configuring Fastpath This feature is enabled by default when the Fastpath Premium Feature Key is installed. Enablement of this feature can be verified in the properties screen of RAID Web Console 2. Fastpath does not use RAID Controller Cache and is an optimal IO path available for reads on RAID 0,1,5,6; and Writes on RAID 0,1,5 (Write Through Only). 8 Intel Confidential Revision 1.0
15 Intel RAID Premium Features SSD Cache with Fastpath IO Premium Features Usage Models Applications with larger active data sets and wider IO access ranges show less improvement with SSD Cache, Cache hit rates are lower due to heavy write requests. These applications are a better fit for FastPath. Figure 11. Applications with Larger Active Data Sets and Wider IO Access Rages For applications requiring highest transactional throughput or with critical data on SSD RAID volumes can benefit from up to 147,500 IO/s for real world workloads. This graph above depicts 4KB On-Line Transactional Processing (OLTP ) 67% reads and 33% writes with 8 Intel X25E SSDs, RAID 0, 64K Stripe Size, WT/DIO/NRA Figure 12. OLTP Performance with and Fast Path and Non-Fast Path Revision 1.0 Intel Confidential 9
16 Snapshot Recovery Premium Feature Intel RAID Premium Features 4. Snapshot Recovery Premium Feature The Snapshot feature offers a simplified way to recover lost or corrupted data and provides automatic protection for the boot volume. You can use this feature to take a snapshot of a volume at a Point in Time (PiT) and then later roll back an individual file or a complete volume to that point in time. You can store and manage up to 8 snapshots of individual Points in Time for each volume which will allow the user to restore a file that has changed or been deleted, roll back applications to a previous point in time, or roll back a complete volume to a point in time that was captured by one of the eight snapshots. This allows a user to recover lost data in minutes, minimizing the downtime experienced by users and eliminating the lengthy process of restoring data from tape. This feature will allow a configuration where the server s boot volume can be easily recovered in the case where the volume is no longer bootable due to operating system corruption or an errant patch or update. Snapshot Recovery is not a substitute for a tested backup strategy. When Snapshot Recovery is enabled, a complete copy of the volume is NOT taken, but rather changes to the selected volume are tracked. When a roll back to a snapshot at a previous Point in Time (PiT) is done, you are undoing changes to the volume that caused corruption or a file deletion Configuring Snapshot When you enable MegaRAID Recovery, you select two virtual drives, one as a snapshot base and the other as a snapshot repository. Prior to a data block being overwritten in the snapshot base, the original block is copied to the snapshot repository to a snapshot Point in Time (PiT). The original data block in the snapshot repository will not be overwritten with subsequent updates so that the original block can be rolled back to the original point in time. When a follow-on snapshot is taken, the previous PiT is frozen and all subsequent changes are redirected to the follow-on snapshot. The user can subsequently create a snapshot view that allows the user to roll some or all changes back to a previous PiT. Figure 13. Enable MegaRAID Recovery When you enable Snapshot, the MegaRAID recovery Wizard will appear. 10 Intel Confidential Revision 1.0
17 Intel RAID Premium Features Snapshot Recovery Premium Feature Figure 14. Select Snapshot Repository On the Enable Recovery Wizard screen, select the virtual drive to use as the Snapshot Repository in the Snapshot Repository field. (You can leave the suggested virtual drive as the Snapshot Repository.) You can then enter the capacity to use in the Snapshot Repository for changes to the base virtual drive. By default, the available capacity is the largest free block of capacity on the snapshot repository virtual drive. You will be prompted to choose to have a snapshot taken on reboot. If you select this option, a snapshot is taken on boot after every successful shutdown. You can use this snapshot of the boot virtual drive to restore the operating system on the virtual drive in case the virtual drive becomes corrupted. Data existing on the virtual drive designated as the Snapshot Repository will be lost when converting it to the Snapshot repository. If you enable the take snapshot on reboot option and the enable auto deletion of snapshot option the system will automatically delete the oldest snapshot and then create a new one after reboot after creating 8 snapshots. An example of the location of the Snapshot Base Volume and the Snapshot Repository Volume is located below. Figure 15. Snapshot Base and Snapshot Repository The size of the Snapshot Repository must be large enough to hold the data contained in all eight snapshots. Typically this requires an equivalent amount of space in the repository that will be used by files and data in the Snapshot Base. However, this depends greatly on the type and size of files that will change over time and will vary depending on usage model. In order to grow the size of the repository, the snapshot feature must be disabled and the repository virtual drives will be lost. The snapshot repository virtual drives will then need to be recreated. Revision 1.0 Intel Confidential 11
18 Snapshot Recovery Premium Feature Intel RAID Premium Features Snapshot Tips: 1. You can use RAID Web Console 2 (RWC2) to create up to eight snapshots of a volume. RWC2 shows the snapshots in chronological order from the oldest to the newest. Each snapshot is a PiT snapshot of the virtual drive that is the Snapshot Base. 2. The snapshots appear on the timeline from the oldest on the left to the newest on the right. If you create the maximum number of snapshots allowed, eight, the Create Snapshot button is disabled. You cannot create an additional snapshot unless you delete a snapshot. 3. After you create the snapshots, you can create views of the PiT snapshots. You can search the snapshot view to find and recover data that is not corrupted or missing. The view is looking at the Snapshot Repository volume. Data from view can be copied to the Snapshot Base volume. Figure 16. Create View of Snapshots To create a view of a Point in time, select a snapshot on the timeline and click create view. The view will now be visible as a mapped drive in your operating system, such as in the My computer window in the Windows operating system. You can then copy the files in the new drive to the original drive and cover them. If you wish to delete a snapshot, you can delete them one at a time, beginning with the oldest snapshot Usage Models File Restoration/Recovery With Restore-from-View, users can simply view their point-in-time (PiT) snapshots, determine inconsistencies in content between PiT & source data (deleted/missing files, presence of virus), and then drag files from the snapshot to source volumes seamlessly. For example: Multiple users are sourcing and editing files in a shared folder that resides on a virtual drive that is backed up on tape every night. But with Snapshot Recovery, Snapshots are taken 2x daily; at backup and remotely, last one 12:00 PM. Any authorized user can mount a view of the mid-day snapshot and drag and drop the important file back into the shared folder, providing access to the file within minutes. Users only lose changes that were made to the file between 12:00 PM snapshot and file deletion. 12 Intel Confidential Revision 1.0
19 Intel RAID Premium Features Snapshot Recovery Premium Feature Boot Volume /Virtual Drive Protection Through the use of either/both Snapshot and Auto Snap (where snapshots are taken automatically at boot time), should system become unbootable, the user can roll back to a previous PiT which allows boot restoration and block/file level repair. For Example: The OS is contained on a separate volume from data and is non bootable due to a power loss or by a malicious file. Without Snapshot Recovery, the system drive would require a rebuild and reinstallation of applications. But with Snapshot Recovery, an Auto Snapshot can be taken of the boot volume every time the system boots and the user can perform a roll-back by entering the Bios Console Utility during power on and roll the boot volume back to a bootable point in time Microsoft Volume Shadow Copy Services VSS Support Through the support of VSS (Provider) recovery now supports any VSS Requestor call through Microsoft s VSS service. This supports data consistency when using a 3rd party backup Application (ex. Symantec). Snapshot stores periodic snapshots of a virtual drive s data at different points in time (PiTs), the user configures virtual drives for each application(s) including one for the snapshot repository, RAID Web Console 2 allows the user to enable MR Recovery for each virtual drive. The sser designates the repository drive and size needed to store the snapshot data, snapshots of the data can be taken at any given time with a single mouse click or auto-snap at boot. For example: 1. The backup archival application runs backups on the ACTIVE Virtual drive but data inconsistency can be experienced when s are moved from inbox to local drives frequently, and some headers may appear but cannot be opened. This inconsistency can cause errors when backup data is restored. 2. Snapshot Recovery is a VSS Provider and will accept VSS requests from the archival application. With Snapshot Recovery enabled and PiTs taken frequently, the archival application (VSS requestor) can perform a backup of the most recent Snapshot Point in Time and Snapshot Recovery PiT will ensure consistent data throughout the backup process. Revision 1.0 Intel Confidential 13
20 Self Encrypting Drive (SED) support Intel RAID Premium Features 5. Self Encrypting Drive (SED) support The SED support capability of the RAID controller provides Full Disk Encryption(FDE) via a Premium Feature Key which is required to enable this feature. It is equivalent to Intel RAID controllers that ship with Full Disk Encryption enabled by default (RS2BL080DE and RS2PI008DE). The product code for Intel RAID controllers with built in encryption support enabled ends in DE. Full Disk Encryption is encrypting data at rest on a hard disk drive, several methods of encrypting data at rest can accomplish this, including software or host-based encryption, or through data encrypted by an encryption engine located on the drive. Self Encrypting Drive technology is one method of implementing FDE. This method puts the encryption circuitry directly on the disk drive and the drive then encrypts everything written to the disk and will de-crypt everything read from the drive. Intel RAID controllers with a product code that end in DE or that have a premium feature plugged on to enable the feature can manage the encryption key on the drive. All data going to and coming from the SED drive passes through the encryption engine on the drive and the drive will automatically encrypt and decrypt all data passing in and out of the drive unless the Self Encrypting Drive is secured through managing the drive s encryption engine via RAID Firmware. When the RAID controllers firmware is enabled to manage the encryption key, as user definable encryption key can be created that becomes part of the encryption algorithm. When the drive is powered down or removed, the SED drive becomes locked and the encryption key within that drive will not encrypt or decrypt data making the drive unreadable until RAID firmware provides the correct encryption key to the drive and authorizes encryption / decryption. A security-enabled SED drive may be lost or stolen, but it will not expose its data to an unauthorized user without the proper encryption key presented to the drive. Disk Encryption Services are provided by all Mainstream and Scalable Performance Intel 6Gbs RAID controllers when the Encryption Management AXXRPFKDE PFK installed. These RAID controllers are based on the LSI 2108 or later ROC chip with at least 512MB of controller memory. SED supports the Advanced Encryption Standard (AES) from NIST (National Institute of Standards and Technology) and is implemented with a 128-bit. AES is defined in the NIST publication FIPS 197 (Federal Information Processing Standard) and has been adopted internationally as an encryption standard. The Seagate implementation of AES in drive circuitry has received NIST certification through an independent laboratory, as tested against the FIPS 197 standard. Current Seagate implementation is based on a 128-bit encryption key. There are 2^128 = 3.4 x 10^38 possible keys with 128 bits, which is a huge key space. NIST estimates that AES 128 is safe from key-search techniques for at least the next 30 years. There is no way to circumvent the security measures provided by the drive. For example, if the Security Key is lost, the owner has no recourse for gaining access to the encrypted data. But, security best practices dictate that sensitive or critical data should be backed up, as well as critical parameters like Security Keys. Non-SED drives cannot be part of an encryption-protected RAID set. SED drives can be used in non-encryption-protected RAID groups. This means that a customer could purchase all SED drives and turn on the encryption protection, as desired. Enabling encryption actually means turning on the locking function, as the drives are always encrypting. The locking function is configured by selecting the appropriate feature on the RAID management console for those drives and defining a Security Key. 14 Intel Confidential Revision 1.0
21 Intel RAID Premium Features Self Encrypting Drive (SED) support The server can be configured to pause during the MegaRAID boot sequence for a password. If the appropriate password is not entered in three attempts, the server will still boot but the data on the SEDs will be inaccessible. If the OS boot partition is secured, the server can be configured to pause during the MegaRAID boot sequence for a password. If the appropriate password is not entered in three attempts, the server will not boot. There is only a very slight impact to performance as a result of SED implementation. This is because encryption is done on the hard drive via an AES engine built into the electronics of the drive. SED drives operate at the same throughput and response time levels as non-sed drives and encryption horsepower scales perfectly with the number of drives in the system Configuring SED Support Two general configuration steps are required to enable the controller encryption support within the RAID management utility (BIOS Console or RAID Web Console). Step 1: Enable Encryption (Drive Security) Support in RAID Console. Figure 17. Enable Drive Security Step 2: Build a Virtual Drive Containing SEDs Figure 18. Drive Security Properties Revision 1.0 Intel Confidential 15
22 Self Encrypting Drive (SED) support Intel RAID Premium Features Instant Secure Erase Instant Secure Erase means that an authorized administrator can overwrite the on-board encryption key, thereby rendering the encrypted data unreadable. MegaRAID supports this feature on all 6Gbs products (i.e. Encryption Management products are not required for instant secure erase). When encryption is enable via the RAID controller utility, data is encrypted based on the encryption key which is managed by the RAID controller. Cryptographic erase changes the drive encryption key rendering the data on the drive unreadable. There is no recovery option to restore the key, Instant Secure Erase is non-reversible. Instantaneous erase provides a method for secure disposal or repurposing of disk drives without the risk of data contained on the drives being readable or recoverable by any means. It provides a simple and efficient way of sanitizing the drive. Instant Secure Erase is only permitted on unconfigured drives to remove possibility of deleting array data. In Raid Web Console 2 Go To > Physical Drive > Instant Secure Erase or Right Click on the physical drive and select Instant Secure Erase. Figure 19. Instant Secure Erase Usage Model Protect Data When Returning Failed Drive. A recent study by IBM indicates that 80% of drives returned to the drive vendor for warranty replacement include recoverable data. When SED drives are secured by the RAID controller via encryption management the data on the drives is not readable without the encryption key, so a drive can be safely taken out of service and returned for replacement even though the drive may be non functional and cannot be erased Instant Secure Erase Drives being taken out of service for replacement or for repurposing can be easily erased by performing an Instant Secure Erase which removes the encryption key from the drive logic and renders the drive data inaccessible even if the original encryption key is known Theft protection The RAID controller firmware will manage both the encryption key and a boot password. 16 Intel Confidential Revision 1.0
23 Intel RAID Premium Features Self Encrypting Drive (SED) support 1. If a drive is stolen from a system and installed into another system, the data on the drive cannot be read unless the encryption key is provided to the drive to unlock the encryption engine. 2. The RAID firmware can be enabled to manage a boot password so that if the server containing the RAID controller (with encryption key in memory) and SED drives are stolen, the RAID firmware will prompt for a boot password. If that password is not provided, the RAID controller will not allow access to the encrypted volume. Revision 1.0 Intel Confidential 17
24 Summary/Conclusion Intel RAID Premium Features 6. Summary/Conclusion Intel provides and option key header on Mainstream and Scalable Performance level RAID controllers that allows additional features to be added to the RAID controller feature set. These features can be enabled by plugging a Premium Feature Key (PFK) onto the option key header on the RAID controller. Premium Features include: 1. SSD Cache with Fastpath IO 2. Self Encrypting Drive Support 3. Snapshot Recovery With the addition of the SSD cache and Fastpath IO key, RAID firmware can detect Solid State Drives and optimize for their performance in either and all SSD array, or in arrays of SSDs that act as a second level of read cache. The addition of the key that enabled Self Encrypting Drive Support allows the user to configure and manage self encrypting drive encryption keys for drives offered by vendors such as Seagate Technologies Seagate Secure drives. Snapshot Recovery allows the user to set up a Snapshot repository into which original data blocks are copied when updated, allowing the user to roll back to a point in time and recover a lost or corrupted file or volume. The ability to add a key that enables a premium feature allows the user the flexibility to enable a feature needed for a particular application without burdening the controller with the added cost of all available features, and provides the user with the power of truly enterprise class raid solutions at their finger tips. 18 Intel Confidential Revision 1.0
Intel RAID Controller Premium Feature Key Training
Intel RAID Controller Premium Feature Key Training AXXRPFKSNSH Snapshot Recovery AXXRPFKDE Self Encrypting Drive (SED) AXXRPFKSSD SSD Cache with Fastpath Note: Graphics for this training is based on RAID
ServeRAID M5000 Series Performance Accelerator Key for IBM System x Product Guide
ServeRAID M5000 Series Performance Accelerator Key for IBM System x Product Guide The ServeRAID M5000 Series Performance Accelerator Key for System x enables performance enhancements needed by emerging
ServeRAID M5000 Series Performance Accelerator Key for IBM System x IBM System x at-a-glance guide
:: Seite 1 von 13 :: Datenblatt zum Produkt IBM ServeRAID M5000 Series Performance Accel mit DC# 601672 :: ServeRAID M5000 Series Performance Accelerator Key for IBM System x IBM System x at-a-glance guide
SyAM Software* Server Monitor Local/Central* on a Microsoft* Windows* Operating System
SyAM Software* Server Monitor Local/Central* on a Microsoft* Windows* Operating System with Internal Storage Focusing on IPMI Out of Band Management Recipe ID: 19SYAM190000000011-01 Contents Hardware Components...3
Accelerating Server Storage Performance on Lenovo ThinkServer
Accelerating Server Storage Performance on Lenovo ThinkServer Lenovo Enterprise Product Group April 214 Copyright Lenovo 214 LENOVO PROVIDES THIS PUBLICATION AS IS WITHOUT WARRANTY OF ANY KIND, EITHER
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
Intel RAID SSD Cache Controller RCS25ZB040
SOLUTION Brief Intel RAID SSD Cache Controller RCS25ZB040 When Faster Matters Cost-Effective Intelligent RAID with Embedded High Performance Flash Intel RAID SSD Cache Controller RCS25ZB040 When Faster
Intel RAID Web Console 2 and StorCLI Command Line Tool
SOLUTIONS Brief Intel RAID Web Console 2 and StorCLI Command Line Tool Powered by LSI* MegaRAID technology Instant access, intuitive configuration/navigation, easy standard storage management and advanced
Intel RAID Controllers
Intel RAID Controllers Best Practices White Paper April, 2008 Enterprise Platforms and Services Division - Marketing Revision History Date Revision Number April, 2008 1.0 Initial release. Modifications
Best Practices for Optimizing SQL Server Database Performance with the LSI WarpDrive Acceleration Card
Best Practices for Optimizing SQL Server Database Performance with the LSI WarpDrive Acceleration Card Version 1.0 April 2011 DB15-000761-00 Revision History Version and Date Version 1.0, April 2011 Initial
Intel RAID. INTEL raid
Intel RAID Intel offers multiple categories of RAID products to protect data, increase performance, scale storage, and enhance server availability. A brief description of each category is listed below
Intel Rapid Storage Technology
Intel Rapid Storage Technology User Guide August 2011 Revision 1.0 1 Document Number: XXXXXX INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
RAID Basics Training Guide
RAID Basics Training Guide Discover a Higher Level of Performance RAID matters. Rely on Intel RAID. Table of Contents 1. What is RAID? 2. RAID Levels RAID 0 RAID 1 RAID 5 RAID 6 RAID 10 RAID 0+1 RAID 1E
Performance Brief: MegaRAID SAS 9265/9285 Series
MegaRAID SAS 9265/9285 Series Performance Brief Performance Brief: MegaRAID SAS 9265/9285 Series Executive Summary PERFORMANCE SUMMARY n Measured IOPS surpass 200,000 IOPS n When used with MegaRAID FastPath
Snapshot Technology: Improving Data Availability and Redundancy
Snapshot Technology: Improving Data Availability and Redundancy. All rights reserved. Table of Contents Introduction...3 Snapshot Overview...3 Functional Description...6 Creating Snapshots...7 Other Snapshot
ServeRAID M5015 and M5014 SAS/SATA Controllers for IBM System x IBM Redbooks Product Guide
ServeRAID M5015 and M5014 SAS/SATA Controllers for IBM System x IBM Redbooks Product Guide The ServeRAID M5015 and ServeRAID M5014 SAS/SATA Controllers for IBM System x are the next-generation 6 Gbps SAS
Intel Matrix Storage Console
Intel Matrix Storage Console Reference Content January 2010 Revision 1.0 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE,
MICROSOFT EXCHANGE 2003. best practices BEST PRACTICES - DATA STORAGE SETUP
MICROSOFT EXCHANGE 2003 best practices BEST PRACTICES - DATA STORAGE SETUP TABLE OF CONTENTS E-mail has become a business critical communication tool 3 Build a disaster recovery solution with VSS and Data
Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008
Best Practices Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008 Installation and Configuration Guide 2010 LSI Corporation August 13, 2010
StarWind iscsi SAN Software: Implementation of Enhanced Data Protection Using StarWind Continuous Data Protection
StarWind iscsi SAN Software: Implementation of Enhanced Data Protection Using StarWind Continuous Data Protection www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright
Intel Matrix Storage Manager 8.x
Intel Matrix Storage Manager 8.x User's Manual January 2009 Revision 1.0 Document Number: XXXXXX INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
Configuring RAID for Optimal Performance
Configuring RAID for Optimal Performance Intel RAID Controller SRCSASJV Intel RAID Controller SRCSASRB Intel RAID Controller SRCSASBB8I Intel RAID Controller SRCSASLS4I Intel RAID Controller SRCSATAWB
Intel RAID Software v6.x (and newer) Upgrade/Installation Procedures
Intel RAID Software v6.x (and newer) Upgrade/Installation Procedures For Intel Server RAID Controller U3-1 and Intel Server RAID Controller U3-1L Revision 1.1 12/21/01 Date Rev Modifications 12/21/01 1.1
Samsung Magician v.4.5 Introduction and Installation Guide
Samsung Magician v.4.5 Introduction and Installation Guide 1 Legal Disclaimer SAMSUNG ELECTRONICS RESERVES THE RIGHT TO CHANGE PRODUCTS, INFORMATION AND SPECIFICATIONS WITHOUT NOTICE. Products and specifications
INCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT
INCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT UNPRECEDENTED OBSERVABILITY, COST-SAVING PERFORMANCE ACCELERATION, AND SUPERIOR DATA PROTECTION KEY FEATURES Unprecedented observability
Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution. Database Solutions Engineering
Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution Database Solutions Engineering By Subhashini Prem and Leena Kushwaha Dell Product Group March 2009 THIS WHITE PAPER IS FOR INFORMATIONAL
Intel Server Raid Controller. RAID Configuration Utility (RCU)
Intel Server Raid Controller RAID Configuration Utility (RCU) Revision 1.1 July 2000 Revision History Date Rev Modifications 02/13/00 1.0 Initial Release 07/20/00 1.1 Update to include general instructions
Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager Solution Guide
Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager Solution Guide Securing sensitive client and company data is becoming an IT task of paramount importance. Often
NSS Volume Data Recovery
NSS Volume Data Recovery Preliminary Document September 8, 2010 Version 1.0 Copyright 2000-2010 Portlock Corporation Copyright 2000-2010 Portlock Corporation Page 1 of 20 The Portlock storage management
N8103-149/150/151/160 RAID Controller. N8103-156 MegaRAID CacheCade. Feature Overview
N8103-149/150/151/160 RAID Controller N8103-156 MegaRAID CacheCade Feature Overview April 2012 Rev.1.0 NEC Corporation Contents 1 Introduction... 3 2 Types of RAID Controllers... 3 3 New Features of RAID
Remote/Branch Office IT Consolidation with Lenovo S2200 SAN and Microsoft Hyper-V
Remote/Branch Office IT Consolidation with Lenovo S2200 SAN and Microsoft Hyper-V Most data centers routinely utilize virtualization and cloud technology to benefit from the massive cost savings and resource
CASPER SECURE DRIVE BACKUP
TM CASPER SECURE DRIVE BACKUP USER GUIDE V4.0 TM Copyright and Trademark Information Information in this document is subject to change without notice. Federal law prohibits unauthorized use, duplication,
LSI MegaRAID CacheCade Performance Evaluation in a Web Server Environment
LSI MegaRAID CacheCade Performance Evaluation in a Web Server Environment Evaluation report prepared under contract with LSI Corporation Introduction Interest in solid-state storage (SSS) is high, and
2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12
USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...
OPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006
OPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006 EXECUTIVE SUMMARY Microsoft Exchange Server is a disk-intensive application that requires high speed storage to deliver
Drive Vaccine PC Restore
Horizon DataSys Drive Vaccine PC Restore User Manual Horizon DataSys Copyright 2011 All Rights Reserved Last Updated: May 16, 2011 Table of Contents Table of Contents... 2 Introduction... 4 Chapter 1:
Intel Data Migration Software
User Guide Software Version 2.0 Document Number: 324324-002US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY
EMC VFCACHE ACCELERATES ORACLE
White Paper EMC VFCACHE ACCELERATES ORACLE VFCache extends Flash to the server FAST Suite automates storage placement in the array VNX protects data EMC Solutions Group Abstract This white paper describes
Intel X58 Express Chipset
Product Brief Intel X58 Express Chipset Highest performing desktop platform for extreme gamers and demanding enthusiasts Desktop PC platforms based on the Intel X58 Express Chipset and Intel Core i7 processor
Intel RAID RS25 Series Performance
PERFORMANCE BRIEF Intel RAID RS25 Series Intel RAID RS25 Series Performance including Intel RAID Controllers RS25DB080 & PERFORMANCE SUMMARY Measured IOPS surpass 200,000 IOPS When used with Intel RAID
4 Backing Up and Restoring System Software
4 Backing Up and Restoring System Software In this Chapter... Planning a Backup Strategy, 4-3 Preparing for Disaster Recovery, 4-4 Creating Boot Recovery Diskettes, 4-5 Making a Full Backup Tape, 4-8 Restoring
Navigating Endpoint Encryption Technologies
Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
EMC Replication Manager and Kroll Ontrack PowerControls for Granular Recovery of SharePoint Items
EMC Replication Manager and Kroll Ontrack PowerControls for Granular Recovery of SharePoint Items Applied Technology Abstract This white paper discusses how Kroll Ontrack PowerControls integrates with
Symantec Drive Encryption for Windows
Symantec Drive Encryption for Windows Technical Note 10.3 Released January 2014. Legal Notice Copyright (c) 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo,
Redundant Array of Independent Disks (RAID)
For Data Centers Redundant Array of Independent Disks (RAID) Combine and control multiple storage devices for better performance and reliability Application note 2014 Samsung Electronics Co. 1. What is?
System Image Backup and Recovery
System Image Backup and Recovery Enveloc s new System and Drive Imaging feature is an important part of an effective disaster recovery plan and can allow you to restore a machine after a complete crash
Amazon Cloud Storage Options
Amazon Cloud Storage Options Table of Contents 1. Overview of AWS Storage Options 02 2. Why you should use the AWS Storage 02 3. How to get Data into the AWS.03 4. Types of AWS Storage Options.03 5. Object
Trusted Platform Module (TPM) Quick Reference Guide
Trusted Platform Module (TPM) Quick Reference Guide System builders/integrators should give this Guide to the system owners to assist them in enabling and activating the Trusted Platform Module. Warning
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,
VERITAS Storage Foundation 4.3 for Windows
DATASHEET VERITAS Storage Foundation 4.3 for Windows Advanced Volume Management Technology for Windows In distributed client/server environments, users demand that databases, mission-critical applications
StorageCraft Technology Corporation Leading the Way to Safer Computing 2009 StorageCraft Technology Corporation. All Rights Reserved.
PRODUCT WHITEPAPER This brochure is for informational purposes only. STORAGECRAFT MAKES NO WARRANTIES, EXPRESSED OR IMPLIED, IN THIS SUMMARY. StorageCraft, ShadowProtect and ExactState and the StorageCraft
StorageCraft Technology Corporation Leading the Way to Safer Computing 2004-2006 StorageCraft Technology Corporation. All Rights Reserved.
COMPETITIVE ADVANTAGES ShadowProtect Desktop Edition Overview ShadowProtect Desktop Edition supports Windows 2000 Professional, XP Home and XP Professional. This version provides automatic online backup
SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH DELL EQUALLOGIC AUTO SNAPSHOT MANAGER
WHITE PAPER SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH DELL EQUALLOGIC AUTO SNAPSHOT MANAGER Business critical applications depend on Relational Database Management Systems (RMS) to store and
Backup and Restore Back to Basics with SQL LiteSpeed
Backup and Restore Back to Basics with SQL December 10, 2002 Written by: Greg Robidoux Edgewood Solutions www.edgewoodsolutions.com 888.788.2444 2 Introduction One of the most important aspects for a database
One Solution for Real-Time Data protection, Disaster Recovery & Migration
One Solution for Real-Time Data protection, Disaster Recovery & Migration Built-in standby virtualisation server Backs up every 15 minutes up to 12 servers On and Off-site Backup User initialed file, folder
Intel RAID Volume Recovery Procedures
Intel RAID Volume Recovery Procedures Revision 1.0 12/20/01 Revision History Date Revision Number 12/20/01 1.0 Release Modifications Disclaimers Information in this document is provided in connection with
Technical Note. Installing Micron SEDs in Windows 8 and 10. Introduction. TN-FD-28: Installing Micron SEDs in Windows 8 and 10.
Technical Note Installing Micron SEDs in Windows 8 and 10 TN-FD-28: Installing Micron SEDs in Windows 8 and 10 Introduction Introduction Self-encrypting drives (SEDs) can provide an effective way of protecting
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 3.0 User Guide P/N 300-999-671 REV 02 Copyright 2007-2013 EMC Corporation. All rights reserved. Published in the USA.
Configuring ThinkServer RAID 100 on the TS140 and TS440
Configuring ThinkServer RAID 100 on the TS140 and TS440 Lenovo ThinkServer TS Series Servers Lenovo Enterprise Product Group Version 1.0 September 17, 2013 2013 Lenovo. All rights reserved. LENOVO PROVIDES
Benefits of Intel Matrix Storage Technology
Benefits of Intel Matrix Storage Technology White Paper December 2005 Document Number: 310855-001 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
MS Exchange Server Acceleration
White Paper MS Exchange Server Acceleration Using virtualization to dramatically maximize user experience for Microsoft Exchange Server Allon Cohen, PhD Scott Harlin OCZ Storage Solutions, Inc. A Toshiba
WHITE PAPER PPAPER. Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions. for Microsoft Exchange Server 2003 & Microsoft SQL Server
WHITE PAPER PPAPER Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions for Microsoft Exchange Server 2003 & Microsoft SQL Server
Hyper-V Protection. User guide
Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 R1/R2 Hyper-V support... 3 Custom
SSD Guru. Installation and User Guide. Software Version 1.4
SSD Guru Installation and User Guide Software Version 1.4 Contents Welcome!............................................................................. 1 Key features.........................................................................
WHITE PAPER: ENTERPRISE SECURITY. Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions
WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server White Paper: Enterprise Security Symantec
SanDisk SSD Boot Storm Testing for Virtual Desktop Infrastructure (VDI)
WHITE PAPER SanDisk SSD Boot Storm Testing for Virtual Desktop Infrastructure (VDI) August 214 951 SanDisk Drive, Milpitas, CA 9535 214 SanDIsk Corporation. All rights reserved www.sandisk.com 2 Table
Continuous Data Protection. PowerVault DL Backup to Disk Appliance
Continuous Data Protection PowerVault DL Backup to Disk Appliance Continuous Data Protection Current Situation The PowerVault DL Backup to Disk Appliance Powered by Symantec Backup Exec offers the industry
This user guide describes features that are common to most models. Some features may not be available on your computer.
RAID User Guide Copyright 2011 Hewlett-Packard Development Company, L.P. Intel is a trademark of Intel Corporation in the U.S. and other countries. Microsoft and Windows are U.S. registered trademarks
ACER ProShield. Table of Contents
ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...
BrightStor ARCserve Backup for Windows
BrightStor ARCserve Backup for Windows Serverless Backup Option Guide r11.5 D01182-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the
Intel Solid- State Drive Data Center P3700 Series NVMe Hybrid Storage Performance
Intel Solid- State Drive Data Center P3700 Series NVMe Hybrid Storage Performance Hybrid Storage Performance Gains for IOPS and Bandwidth Utilizing Colfax Servers and Enmotus FuzeDrive Software NVMe Hybrid
LSI Software RAID Configuration Utility
LSI Software RAID Configuration Utility E8581 First Edition August 2013 Copyright 2013 ASUSTeK COMPUTER INC. All Rights Reserved. No part of this manual, including the products and software described in
Keep Your Data Secure: Fighting Back With Flash
Keep Your Data Secure: Fighting Back With Flash CONTENTS: Executive Summary...1 Data Encryption: Ensuring Peace of Mind...2 Enhanced Encryption and Device Decommission in the Enterprise...3 Freeing Up
LSI MegaRAID User s Manual
LSI MegaRAID User s Manual Q2143 August 2005 Copyright Information No part of this manual, including the products and software described in it,may be reproduced, transmitted, transcribed, stored in a retrieval
www.horizon-datasys.com User s Guide
www.horizon-datasys.com User s Guide Drive Vaccine PC Restore Plus The information contained in this document is subject to change without notice. Horizon Datasys Corporation assumes no responsibility
How To Protect Data On Network Attached Storage (Nas) From Disaster
White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains
HP Smart Array Controllers and basic RAID performance factors
Technical white paper HP Smart Array Controllers and basic RAID performance factors Technology brief Table of contents Abstract 2 Benefits of drive arrays 2 Factors that affect performance 2 HP Smart Array
User Guide - English. Embedded MegaRAID Software
User Guide - English Embedded MegaRAID Software April 2015 Comments Suggestions Corrections The User Documentation Department would like to know your opinion of this manual. Your feedback helps us optimize
Symantec Backup Exec 2010 R2. Quick Installation Guide
Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
How To Use A Recoverypoint Server Appliance For A Disaster Recovery
One Solution for Real-Time Data protection, Disaster Recovery & Migration Built-in standby virtualisation server Backs up every 15 minutes up to 12 servers On and Off-site Backup Exchange Mailbox & Message
The MAX5 Advantage: Clients Benefit running Microsoft SQL Server Data Warehouse (Workloads) on IBM BladeCenter HX5 with IBM MAX5.
Performance benefit of MAX5 for databases The MAX5 Advantage: Clients Benefit running Microsoft SQL Server Data Warehouse (Workloads) on IBM BladeCenter HX5 with IBM MAX5 Vinay Kulkarni Kent Swalin IBM
White Paper A New RAID Configuration for Rimage Professional 5410N and Producer IV Systems November 2012
White Paper A New RAID Configuration for Rimage November 2012 Combining RAID 5 and RAID 0 to Reduce the Impact of Hard Drive Failures Rimage is changing the hard drive layout and RAID configurations for
UBDR and Microsoft Cluster Server
WHITE PAPER UBDR and Microsoft Cluster Server UltraBac Version 8.x OVERVIEW UltraBac Software, author of award-winning backup and storage management software, is proud to announce enhanced support for
Intel Entry Storage System SS4000-E
Intel Entry Storage System SS4000-E Software Release Notes March, 2006 Storage Systems Technical Marketing Revision History Intel Entry Storage System SS4000-E Revision History Revision Date Number 3 Mar
BlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide
BlackBerry Web Desktop Manager Version: 5.0 Service Pack: 4 User Guide Published: 2012-10-03 SWD-20121003174218242 Contents 1 Basics... 5 Log in to the BlackBerry Web Desktop Manager... 5 Connect your
Windows BitLocker Drive Encryption Step-by-Step Guide
Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft
An Oracle White Paper May 2011. Exadata Smart Flash Cache and the Oracle Exadata Database Machine
An Oracle White Paper May 2011 Exadata Smart Flash Cache and the Oracle Exadata Database Machine Exadata Smart Flash Cache... 2 Oracle Database 11g: The First Flash Optimized Database... 2 Exadata Smart
How To Backup A Database In Navision
Making Database Backups in Microsoft Business Solutions Navision MAKING DATABASE BACKUPS IN MICROSOFT BUSINESS SOLUTIONS NAVISION DISCLAIMER This material is for informational purposes only. Microsoft
Administration Guide. Wireless software upgrades
Administration Guide Wireless software upgrades SWDT207654-207654-0727045705-001 Contents Upgrading the BlackBerry Device Software over the wireless network... 3 Wireless software upgrades... 3 Sources
2.8.1 Creating an Acronis account... 15 2.8.2 Subscription to Acronis Cloud... 16. 3 Creating bootable rescue media... 16
USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...
The Methodology Behind the Dell SQL Server Advisor Tool
The Methodology Behind the Dell SQL Server Advisor Tool Database Solutions Engineering By Phani MV Dell Product Group October 2009 Executive Summary The Dell SQL Server Advisor is intended to perform capacity
EMC VMAX3 DATA AT REST ENCRYPTION
EMC VMAX3 DATA AT REST ENCRYPTION ABSTRACT In the interconnected world, data and intellectual property is the highest value currency which can be held by corporations. From recent newsworthy examples,
Answering the Requirements of Flash-Based SSDs in the Virtualized Data Center
White Paper Answering the Requirements of Flash-Based SSDs in the Virtualized Data Center Provide accelerated data access and an immediate performance boost of businesscritical applications with caching
DISK IMAGE BACKUP. For Physical Servers. VEMBU TECHNOLOGIES www.vembu.com TRUSTED BY OVER 25,000 BUSINESSES
DISK IMAGE BACKUP For Physical Servers VEMBU TECHNOLOGIES www.vembu.com Copyright Information Information in this document is subject to change without notice. The entire risk of the use or the results
