ILM: Tiered Services & The Need For Classification
|
|
|
- Lily Kelly
- 10 years ago
- Views:
Transcription
1 ILM: Tiered Services & The Need For Classification Edgar StPierre, EMC 2 SNW San Diego April 2007
2 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced without modification The SNIA must be acknowledged as source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. 2
3 About SNIA and the DMF About the Storage Networking Industry Association (SNIA) SNIA s primary goal is to ensure that storage networks become complete and trusted solutions across the IT community For additional information about SNIA see SNIA s Dictionary of Storage Networking Terminology is online at About the Data Management Forum (DMF) Founded in 2004, the Data Management Forum is a sub-group of SNIA specializing in data management and protection throughout the lifecycle of information. More information about the DMF including resources on data and information lifecycle management can be found at 3
4 Agenda Introduction What is ILM Tiers of service with service level management Classification Section 1 Tiers of Service What are tiers of service? What technologies compose a tier? What tiers do you need in your Data Center? What is the business value of tiered storage? Section 2 Data Classification Why classify data? Using Information to drive classification Aligning Classified Data with Available Resources Section 3 Implementation Considerations Unstructured Files in file systems Semi-structured messages in systems Structured Database records Section 4 Automated Classification 4
5 Abstract Tiered Services & The Need For Classification Establishing an ILM strategy is a high priority for many organizations as they struggle to deal with data growth and regulatory compliance. The definition of tiered services is an important part of that ILM strategy. Two keys to a successful tiered service implementation are: Resource classification - organizing your storage-related services into tiers that will meet the requirements of your business. Data Classification - if you don't know what you have or how valuable it is, it s very hard to decide what data should be placed on a particular service tier. In this tutorial we will look at how to think about organizing your storage-related service tiers based on your needs, and at data classification techniques and emerging technologies that can help you manage the placement of data across different tiers of service, or the movement of data across storage within the same service tier. 5
6 Information Growth Save everything 161 Exabytes in Exabytes in 2010 Source: IDC The Expanding Digital Universe Major new drivers Digital images, voice and TV Growth for both size and units Beyond size : 70% created by individuals Organizations responsible for managing 85% of: Security Privacy Reliability Compliance 6
7 Increased Requirements on IT for Service Delivery Senior IT Management: Optimize storage costs with a flat budget Legal Counsel: Need to find the right information at the right time for legal and patent issues Security Officer: Manage enterprise-wide information security and risk Compliance Officer / Records Information Manager (RIM): Comply with government and corporate regulations for retention and access Chief Risk Officer: Addressing corporate risk management Business users: The average knowledge worker spends six hours per week searching for information* *Sources: IDC; Kahn/Blair 7
8 Mitigation: ILM and Tiers of Service Key characteristics of ILM: Standard configurations to form tiers of service (Service Catalog) Data classification to organize data based on information requirements Information Requirements Guides Standard Configurations Service Catalog Capabilities Gold DR Align Silver Defines Bronze 8
9 Section 1 - Tiers of Service What are Tiers of Service? What technologies compose a Tier? What do you need in your Data Center? What is the Business Value of Tiered Services? 9
10 Service Catalog a customer sample Primary Storage Secondary Storage Operational Recovery (OR) Disaster Recovery (DR) Guaranteed Performance Availability Performance Availability Alignment Attributes Scheme Retention & Disposition Accessibility Data Integrity Offsite Recovery Granularity Recovery Point Objective (RPO) Recovery Time Objective (RTO) Recoverability Retention period Recovery Point Objective (RPO) Recovery Time Objective (RTO) Specification Performance throughput per port (I/O sec) Response time (ms) Maximum unplanned downtime per year (mins) Response time Throughput Maximum downtime (year) Retention period Data shredding compliance Read access frequency Guarantee of authenticity Recovery point objective Recovery granularity Amount of data loss Time to restore data Ability to recover backed up data Time data is retained Amount of data loss Time to restore data Tier 1 Tier 2 Tier 3 Tier 4 5,000+ 3,500 5,000 1,500 3,500 < 8ms 7-14ms 12-30ms < 26.5 < 1 second < 1 second < 24 hours <= 300 Mbps <= 700 Mbps <= 280 Mbps <5.25 mins <52.56 mins < hours < 30 years < 10 years < 3 years Yes No No < Hourly > Hourly Daily Yes No No < 1 minute < 28 hours < 38 hours Complete app. restore < 26.5 Complete app. restore < 52.5 File or file sys. restore 1 hour 24 hours 24 hours < 30 minutes < 30 minutes 7 GB/minute 100% 100% 98% 2 hours 24 hours 3 Weeks 0 minutes < 4 hours hours < 2 hours <12 hours < 48 hours 500 1, ms < 263 File or file sys. restore 30 days.5 GB/minute 95% 15 months hours <72 hours Courtesy of EMC 2 Consulting 10
11 Storage which technology to use? Storage technology recommendations today are obsolete tomorrow Technology driven and constantly changing Some capabilities may be critical to decision-making Best practices have significant influence on success Your data and lifecycle requirements & your existing capabilities must drive How many stages of storage & what technologies to choose 11
12 Data Protection Technologies Technology recommendations today are still obsolete tomorrow Technology driven and constantly changing Best practices have significant influence on success Critical best practice strategy: Separate your requirements for copies: OR vs. DR vs. Archive Operational Recovery (OR): Save the company $ with fast recovery from logical errors Multiple layers of OR When to fall back to DR copies Disaster Recovery (DR): Is your business continuity plan in place? Leverage OR copies for DR Archive: From the SNIA Online Dictionary for Archive : A collection of data that is maintained as a long-term record of a business, application, or information state. Archives are typically kept for auditing, regulatory, analysis or reference purposes rather than for application or data recovery. Not all archive definitions are the same! Data moved to secondary or tertiary online storage Offline/offsite copy of data A copy of data on backup tapes What are your stakeholders requirements for archive access and protection? 12
13 What tiers do you need Start from your requirements! Bring in ILM Professional Services to facilitate Include all the information stakeholders Determine how many tiers of service you need The fewer the better! Some services are specific to your needs Then determine solutions to deliver Including how many stages in each data lifecycle Requirements for storage and protection at each stage Solutions to manage the data stage transition Iterate and negotiate Pilot the process with one application Add applications with subsequent iterations 13
14 Business value of tiered storage Improve efficiency by aligning data with the most appropriate resources Delay or reduce purchase of high end storage Delete data if and when appropriate Improve service delivery by Managing to requirements No more nor less than what s s needed Focusing on fewer configurations Improve scalability of personnel Establish a baseline for measurement 14
15 Section 2 - Data Classification Why classify data? Using information to drive data classification Aligning classified data with available resources 15
16 Information Classification: Gathering requirements from stakeholders Corporate information is simply data to the data center Data is what I.T. manages: files, volumes, bits and bytes Information is data with context: decisions are based on information Use a collaborative process to identify information service requirements Use these requirements to define an SLA Line of Business (LOB) information stakeholders: Application performance, availability, recoverability, Staff response time, asset reporting, Cost Corporate information stakeholders: Security officer: Secret, confidential, proprietary, Records Manager: retention time, Compliance officer: authorization, retention, This process enables the IT Organization to: Business Process Analyst App Owner DBA Create a service catalog Create data classification policies Match data with appropriate resources based on its service requirements rements SLA Security Officer Records Legal Manager Information Classification Data Admin IT Architect IT Admins Data Requirements 16
17 Classifying Data Benefits it will provide: Identify alignment of IT with business priorities Identify gaps in alignment, utilization & management Identify and organize data for regulatory compliance Benefits it could provide: Reduced footprint Improved environmental resource utilization Data that is deleted is no longer an expense and no longer a liability Simplifies introduction of ITIL practices 17
18 How is Data Classified? Data Classification methods: Classify by business process or application All data assigned same classification Simple; good start; a first approximation Net effect: ranking of applications to service tiers Classify by metadata Time last accessed, owner, file name, path, etc Useful for aligning data to tiers of service E.g., the CEO s s receives different service than yours Or for placement of data to appropriate stage within a service tiert E.g., Hierarchical Storage Management (HSM) for a file server Classify by content Content-driven alignment of data to service level requirements Added value for Business Intelligence, Compliance & ediscovery 18
19 Section 3 Classification Implementation Considerations Three primary data types Unstructured Files in file systems Semi-structured messages in systems Structured Database records Each type presents different challenges Each type requires a different form of virtualization 19
20 Unstructured Data (Files) Direct access File System Access Redirect Migrate/recall Policy Engine File system 2 File system 3 Tier 1 Tier 2 Tier 3 Tier 4 Caveat: be sure your data protection solution is integrated with your storage tiers! It s s more than just HSM It s s file virtualization! Direct access: Network or NAS File redirect: typically NAS Traditional migrate/recall Policy-driven movement: Internal or external policy engines Age/owner type metadata File content Movement can be 1. Tier-to to-tier tier (bi-directional) 2. To compliance archive 3. To trash 4. To/from SAN or NAS 5. To offsite archive vaults 20
21 Semi-Structured Data ( ) Server Typical deployment MAPI Tier 1 Tier 2 Tier 3 Policy Engine Trash Selection criteria include To/From type metadata Age & access metadata Content, attachments Actions might include 1.Create single instance store & migrate attachments 2.Send appropriate to compliance archive 3.Delete upon expiration 21
22 Structured Data (RDBMS) Represents significant challenges because: Content & organization is a function of the application Each application is different Must maintain transactional integrity Three basic approaches. Application RDBMS Application Transparency + Policy Application Transparency + Policy Transparency + Policy RDBMS (Tier 1) RDBMS (Tier 2) RDBMS (Tier 1) RDBMS (Tier 2) 22
23 Structured Data Archiving Represents significant challenges because: Conversion of records to files in long term re-usable format Allow for import to current and future releases of RDBMS Allow for import to different database technologies/products Caveat: Archiving loses database transparency Application RDBMS Transparency + Policy Tier 1 Tier 2 Tier 3 23
24 Tools Emerging product areas Automated data classification products Create classification schemes Based on metadata, content or both Policy engine Service Level Management Data lifecycle management Managing data based on its classification Catalog for metadata & content Extracted and maintained externally Independently or as extensions of file system metadata Leverage data movement capabilities OS, HSM, Backup, etc. In band and out of band Interfaces to archive devices to set retention, etc. 24
25 Issues to consider with automated data classification Metadata repository Scalability Automation of data movement Defining policies information classification 25
26 Continue Your SNIA Education Experience At SNW Attend Hands-On Labs in: Data Classification Key to Service Level Management Data Security and Protection Data Assurance Solutions to Meet Corporate Requirements IP Storage iscsi, Your IP SAN Storage Management Manage Storage or Be Managed By It Storage Virtualization Increasing Productivity Zero to SAN Fibre Channel Connectivity in No Time Sessions begin Monday afternoon, April 16 and continue through Wednesday, April 18. All sessions in Emma/Maggie/Annie, 3 rd Floor of the Hyatt Manchester. Registration at the SNW Registration area 26
27 DMF s ILM Framework for the Datacenter For more information on SNIA s Data Management Forum (DMF) visit the DMF website at At SNW, see: The Data Management Solutions Center in the Show Exhibit area Information Classification: The Cornerstone to Information Management The Secret Sauce of ILM The Professional ILM Assessment Data Classification Hands On Lab Business Framework Define Business Process Information Network Infrastructure IT Infrastructure Business Requirements Requirements Applications Data Management Services Compute Infrastructure Requirements Goals Management Policies, Instrumentation, Filters Information Management Services Storage Infrastructure ILM Framework 27
28 Please send any comments on this tutorial to SNIA: Many thanks to the following individuals for their contributions to this tutorial: Edgar StPierre Bob Rogers Nik Simpson Bill Pierce 28
Creating a Catalog for ILM Services. Bob Mister Rogers, Application Matrix Paul Field, Independent Consultant Terry Yoshii, Intel
Creating a Catalog for ILM Services Bob Mister Rogers, Application Matrix Paul Field, Independent Consultant Terry Yoshii, Intel SNIA Legal Notice The material contained in this tutorial is copyrighted
Best Practices for Long-Term Retention & Preservation. Michael Peterson, Strategic Research Corp. Gary Zasman, Network Appliance
Best Practices for Long-Term Retention & Preservation Michael Peterson, Strategic Research Corp. Gary Zasman, Network Appliance SNIA Legal Notice The material contained in this tutorial is copyrighted
Storage Considerations for Database Archiving. Julie Lockner, Vice President Solix Technologies, Inc.
Storage Considerations for Database Archiving Julie Lockner, Vice President Solix Technologies, Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
ILM, classification and the Information-Centric Enterprise. Per Sedihn, Vice Chair Nordics Comitte SNIA Europe CTO Proact IT Group
ILM, classification and the Information-Centric Enterprise Per Sedihn, Vice Chair Nordics Comitte SNIA Europe CTO Proact IT Group SN IA Legal N otice The material contained in this tutorial is copyrighted
Accelerating Application Performance -- Tier-0
Accelerating Application Performance -- Tier-0 Richard Gillett Acopia Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may
Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation
Introduction to Data Protection: Backup to Tape, Disk and Beyond Michael Fishman, EMC Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
UNDERSTANDING DATA DEDUPLICATION. Thomas Rivera SEPATON
UNDERSTANDING DATA DEDUPLICATION Thomas Rivera SEPATON SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
Backup and Recovery 1
Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup
UNDERSTANDING DATA DEDUPLICATION. Jiří Král, ředitel pro technický rozvoj STORYFLEX a.s.
UNDERSTANDING DATA DEDUPLICATION Jiří Král, ředitel pro technický rozvoj STORYFLEX a.s. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual
Long Term Record Retention and XAM
Long Term Record Retention and XAM Wayne M. Adams Chair Emeritus, SNIA www.snia.org Agenda Market Trends and Drivers SNIA Survey SNIA XAM Standard SNIA Meta Data Work Summary Information Challenge Escalating
THE CASE FOR ACTIVE DATA ARCHIVING
THE CASE FOR ACTIVE DATA ARCHIVING Written by Ray Quattromini 3 rd September 2007 Contact details Tel: 01256 782030 / 08704 286 186 Fax: 08704 286 187 Email: [email protected] Web: www.data-storage.co.uk
Restoration Technologies. Mike Fishman / EMC Corp.
Trends PRESENTATION in Data TITLE Protection GOES HERE and Restoration Technologies Mike Fishman / EMC Corp. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless
How To Create A Cloud Backup Service
Cloud Backup Recovery and Restore Requirements Ashar Baig, Asigra Chairman, SNIA Cloud Backup Recovery and Restore (BURR) Special Interest Group (SIG) SNIA Legal Notice The material contained in this tutorial
Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation
: Backup to Tape, Disk and Beyond Michael Fishman, EMC Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use
Why enterprise data archiving is critical in a changing landscape
Why enterprise data archiving is critical in a changing landscape Ovum white paper for Informatica SUMMARY Catalyst Ovum view The most successful enterprises manage data as strategic asset. They have complete
FAN An Architecture for Scalable, Service-Oriented Data Management
FAN An Architecture for Scalable, Service-Oriented Data Management Richard Gillett Acopia Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
UNDERSTANDING DATA DEDUPLICATION. Tom Sas Hewlett-Packard
UNDERSTANDING DATA DEDUPLICATION Tom Sas Hewlett-Packard SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures
1 Refreshing Your Data Protection Environment with Next-Generation Architectures Dale Rhine, Principal Sales Consultant Kelly Boeckman, Product Marketing Analyst Program Agenda Storage
Cloud OS Vision. Modern platform for the world s apps
Cloud OS Vision Modern platform for the world s apps transforms the datacenter unlocks insights on any data empowers people-centric IT enables modern business apps Development Management Identity Data
SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY
SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY Among the priorities for efficient storage management is an appropriate protection architecture. This paper will examine how to architect storage
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R L e v e r a g e R e c o r d s M a n a g e m e n t B e s t P r a c t i c e s t
Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation (Author and Presenter)
Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation (Author and Presenter) SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless
EaseTag Cloud Storage Solution
EaseTag Cloud Storage Solution The Challenge For most companies, data especially unstructured data, continues to grow by 50 percent annually. The impact of spending more every year on storage, and on protecting
How To Protect Data On Network Attached Storage (Nas) From Disaster
White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains
EMC SourceOne Email Management and ediscovery Overview
EMC SourceOne Email Management and ediscovery Overview Deanna Hoover EMC SourceOne Systems Engineer 1 Agenda Value of Good Information Governance Introduction to EMC SourceOne Information Governance Email
Effective Storage Management for Cloud Computing
IBM Software April 2010 Effective Management for Cloud Computing April 2010 smarter storage management Page 1 Page 2 EFFECTIVE STORAGE MANAGEMENT FOR CLOUD COMPUTING Contents: Introduction 3 Cloud Configurations
DATA PROGRESSION. The Industry s Only SAN with Automated. Tiered Storage STORAGE CENTER DATA PROGRESSION
DATA PROGRESSION STORAGE CENTER DATASHEET STORAGE CENTER DATA PROGRESSION Delivering On the Promise of Tiered Storage Tiered storage solutions promise to help companies lower storage costs by storing less
Pacific Life Insurance Company
Pacific Life Insurance Company Pacific Life Turns Compliance into Business Advantage SOLUTION SNAPSHOT Applications: SAP, Oracle, Microsoft Exchange, Microsoft SQL Server, KVS, FileNet EMC Software: EMCControlCenter
DEFINING THE RIGH DATA PROTECTION STRATEGY
DEFINING THE RIGH DATA PROTECTION STRATEGY The Nuances of Backup and Recovery Solutions By Cindy LaChapelle, Principal Consultant, ISG www.isg-one.com INTRODUCTION Most organizations have traditionally
Server and Storage Virtualization with IP Storage. David Dale, NetApp
Server and Storage Virtualization with IP Storage David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this
Reduce your data storage footprint and tame the information explosion
IBM Software White paper December 2010 Reduce your data storage footprint and tame the information explosion 2 Reduce your data storage footprint and tame the information explosion Contents 2 Executive
Approximately 260 PST files totaling 180GB will be included in the pilot. 2. Are the Windows XP clients running XP 64 bit or 32 bit OS?
Addendum #1 1. What is the count of PST files and total aggregate size of PST files that will need to be ingested for the pilot? Approximately 260 PST files totaling 180GB will be included in the pilot.
An ITIL Perspective for Storage Resource Management
An ITIL Perspective for Storage Resource Management BJ Klingenberg, IBM Greg Van Hise, IBM Abstract Providing an ITIL perspective to storage resource management supports the consistent integration of storage
Cloud File Services: October 1, 2014
Cloud File Services: SMB/CIFS and TITLE NFS in the Cloud PRESENTATION GOES HERE October 1, 2014 Webcast Presenters David Fair, SNIA ESF Business Development Chair - Intel John Reed Product Manager, Windows
Trends in Application Recovery. Andreas Schwegmann, HP
Andreas Schwegmann, HP SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations
Planning a Backup Strategy
Planning a Backup Strategy White Paper Backups, restores, and data recovery operations are some of the most important tasks that an IT organization performs. Businesses cannot risk losing access to data
In ediscovery and Litigation Support Repositories MPeterson, June 2009
XAM PRESENTATION (extensible TITLE Access GOES Method) HERE In ediscovery and Litigation Support Repositories MPeterson, June 2009 Contents XAM Introduction XAM Value Propositions XAM Use Cases Digital
Energy Efficient Storage - Multi- Tier Strategies For Retaining Data
Energy and Space Efficient Storage: Multi-tier Strategies for Protecting and Retaining Data NOTICE This White Paper may contain proprietary information protected by copyright. Information in this White
Introduction to Data Protection: Backup to Tape, Disk and Beyond
Introduction to Data Protection: Backup to Tape, Disk and Beyond Frank Holliman, NetApp Author: Jason Iehl, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless
Acme Corporation Enterprise Storage Assessment Prepared by:
Acme Corporation Enterprise Storage Assessment Prepared by: Rocket Software, Inc. 150 N. Mathilda Place, Suite 304 Sunnyvale, CA 94086 USA Tel# +1.650.237.6100 / Fax# +1.650.237.9183 Table of Contents
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER The IT Manager's Role in Proactive Information Retention and Disposition Management: Balancing ediscovery and Compliance Obligations with IT Operational and Budget Constraints Sponsored by:
Eliminating Backup System Bottlenecks: Taking Your Existing Backup System to the Next Level. Jacob Farmer, CTO, Cambridge Computer
: Taking Your Existing Backup System to the Next Level Jacob Farmer, CTO, Cambridge Computer SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals
Hitachi Cloud Service for Content Archiving. Delivered by Hitachi Data Systems
SOLUTION PROFILE Hitachi Cloud Service for Content Archiving, Delivered by Hitachi Data Systems Improve Efficiencies in Archiving of File and Content in the Enterprise Bridging enterprise IT infrastructure
DATA ARCHIVING. The first Step toward Managing the Information Lifecycle. Best practices for SAP ILM to improve performance, compliance and cost
DATA ARCHIVING The first Step toward Managing the Information Lifecycle Best practices for SAP ILM to improve performance, compliance and cost 2010 Dolphin. West Chester, PA All rights are reserved, including
STORAGE CENTER. The Industry s Only SAN with Automated Tiered Storage STORAGE CENTER
STORAGE CENTER DATASHEET STORAGE CENTER Go Beyond the Boundaries of Traditional Storage Systems Today s storage vendors promise to reduce the amount of time and money companies spend on storage but instead
ADVANCED DEDUPLICATION CONCEPTS. Larry Freeman, NetApp Inc Tom Pearce, Four-Colour IT Solutions
ADVANCED DEDUPLICATION CONCEPTS Larry Freeman, NetApp Inc Tom Pearce, Four-Colour IT Solutions SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and
Intelligent Information Management: Archive & ediscovery
Intelligent Information Management: Archive & ediscovery Byron Chang Senior Systems Engineer / Symantec Hong Kong Agenda 1 Today s Information Management Challenges 2 Why Information Management? 3 The
Storage Virtualization
Section 2 : Storage Networking Technologies and Virtualization Storage Virtualization Chapter 10 EMC Proven Professional The #1 Certification Program in the information storage and management industry
Enforce Governance, Risk, and Compliance Programs for Database Data
Enforce Governance, Risk, and Compliance Programs for Database Data With an Information Lifecycle Management Strategy That Includes Database Archiving, Application Retirement, and Data Masking WHITE PAPER
Symantec Enterprise Vault
Store, Manage, and Discover Critical Business Information The pressure on organizations to protect and manage data has intensified with the recent growth in unstructured data and the reliance on email
The Archival Upheaval Petabyte Pandemonium Developing Your Game Plan Fred Moore President www.horison.com
USA The Archival Upheaval Petabyte Pandemonium Developing Your Game Plan Fred Moore President www.horison.com Did You Know? Backup and Archive are Not the Same! Backup Primary HDD Storage Files A,B,C Copy
Archiving, Backup, and Recovery for Complete the Promise of Virtualization
Archiving, Backup, and Recovery for Complete the Promise of Virtualization Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that
Things You Need to Know About Cloud Backup
Things You Need to Know About Cloud Backup Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective and reliable method of safeguarding the increasing
IBM Storage Management within the Infrastructure Laura Guio Director, WW Storage Software Sales October 20, 2008
IBM Storage Management within the Infrastructure Laura Guio Director, WW Storage Software Sales October 20, 2008 IBM Information Infrastructure Proven Capabilities Manage Information Risks Information
W H I T E P A P E R E X E C U T I V E S U M M AR Y S I T U AT I O N O V E R V I E W. Sponsored by: EMC Corporation. Laura DuBois May 2010
W H I T E P A P E R E n a b l i n g S h a r e P o i n t O p e r a t i o n a l E f f i c i e n c y a n d I n f o r m a t i o n G o v e r n a n c e w i t h E M C S o u r c e O n e Sponsored by: EMC Corporation
What s New with VMware Virtual Infrastructure
What s New with VMware Virtual Infrastructure Virtualization: Industry-Standard Way of Computing Early Adoption Mainstreaming Standardization Test & Development Server Consolidation Infrastructure Management
Maintaining Business Continuity with Disk-Based Backup and Recovery Solutions
I D C V E N D O R S P O T L I G H T Maintaining Business Continuity with Disk-Based Backup and Recovery Solutions March 2008 Adapted from Worldwide Data Protection and Recovery Software 2007 2011 Forecast:
SOLUTION BRIEF KEY CONSIDERATIONS FOR LONG-TERM, BULK STORAGE
SOLUTION BRIEF KEY CONSIDERATIONS FOR LONG-TERM, BULK STORAGE IT organizations must store exponentially increasing amounts of data for long periods while ensuring its accessibility. The expense of keeping
IBM Tivoli Storage Manager
Help maintain business continuity through efficient and effective storage management IBM Tivoli Storage Manager Highlights Increase business continuity by shortening backup and recovery times and maximizing
Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Managing millions of mailboxes for thousands of customers worldwide, Enterprise Vault, the industry leader in email and content archiving, enables
Storage Clouds. Karthik Ramarao. Director of Strategy and Technology and CTO Asia Pacific, NetApp Board Director SNIA South Asia
Deploying PRESENTATION Public, TITLE Private, GOES HERE and Hybrid Storage Clouds Karthik Ramarao Director of Strategy and Technology and CTO Asia Pacific, NetApp Board Director SNIA South Asia SNIA Legal
SYMANTEC ENTERPRISE SOLUTION STRATEGY
ENTERPRISE STRATEGY IT OPERATIONS STORAGE MANAGEMENT CONTINUITY Data Center Automation pg 3 Veritas Cluster Server Veritas Server Foundation Veritas Application Director Veritas Configuration Manager Veritas
Virtual Provisioning. Management. Capacity oversubscription Physical allocation on the fly to logical size. With Thin Provisioning enabled
Management Virtual Provisioning Capacity oversubscription Physical allocation on the fly to logical size Automatic File System Extension past logical size With Thin Provisioning enabled Additional storage
OPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006
OPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006 EXECUTIVE SUMMARY Microsoft Exchange Server is a disk-intensive application that requires high speed storage to deliver
Cost Effective Backup with Deduplication. Copyright 2009 EMC Corporation. All rights reserved.
Cost Effective Backup with Deduplication Agenda Today s Backup Challenges Benefits of Deduplication Source and Target Deduplication Introduction to EMC Backup Solutions Avamar, Disk Library, and NetWorker
REDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION
REDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION SD005 V2.0 Issue Date 02 July 2014 1) SERVICE OVERVIEW Redcentric's Managed Archive Service allows customers to regain control of their Microsoft Exchange
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Effective storage management and data protection for cloud computing
IBM Software Thought Leadership White Paper September 2010 Effective storage management and data protection for cloud computing Protecting data in private, public and hybrid environments 2 Effective storage
EMC PERSPECTIVE EMC SourceOne Email Management
EMC PERSPECTIVE EMC SourceOne Email Management Competitive Advantages Foreword This document provides an overview of the competitive advantages of EMC SourceOne Email Management, part of a family of next-generation
Miguel Ortiz, Sr. Systems Engineer. Globanet
Miguel Ortiz, Sr. Systems Engineer Globanet Agenda Who is Globanet? Archiving Processes and Standards How Does Data Archiving Help Data Management? Data Archiving to Meet Downstream ediscovery Needs Timely
Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments
Unified Information Management for Complex Windows Environments The Explosion of Unstructured Information It is estimated that email, documents, presentations, and other types of unstructured information
How do you test to determine which backup and restore technology best suits your business needs?
KEY CRITERIA WHEN SELECTING BACKUP AND RESTORE TECHNOLOGY FOR WINDOWS SYSTEMS How do you test to determine which backup and restore technology best suits your business needs? Real-Time Recovery delivers
Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication
PRODUCT BRIEF Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication NOTICE This Product Brief contains proprietary information protected by copyright. Information in this
ADDENDUM 1 September 22, 2015 Request for Proposals: Data Center Implementation
Following are the questions submitted on or before September 18, 2015, in accordance with RFP specifications. All questions are published verbatim as received, without regard to errors in spelling, punctuation,
