SECURITY SUMMIT 06/06/2013 Roma STORAGE FORENSICS. Litiano Piccin (NCDA-NCIE/SAN)
|
|
- Bartholomew Newton
- 8 years ago
- Views:
Transcription
1 SECURITY SUMMIT 06/06/2013 Roma STORAGE FORENSICS Litiano Piccin (NCDA-NCIE/SAN)
2 1. Introduction: SAN vs NAS. 2. SAN. 3. NAS. 4. SNAPSHOT. 5. Data Acquisition.
3 INTRODUCTION
4 STORAGE: SAN vs NAS Storage area network. A storage area network (SAN) is a dedicated network that provides access to consolidated, block level data storage. SANs are primarily used to make storage devices, such as disk arrays, tape libraries, and optical jukeboxes, accessible to servers so that the devices appear like locally attached devices to the operating system. A SAN typically has its own network of storage devices that are generally not accessible through the local area network by other devices. Network attached storage. Network-attached storage (NAS) is file-level computer data storage connected to a computer network providing data access to heterogeneous group of clients. NAS not only operates as a file server, but is specialized for this task either by its hardware, software, or configuration of those elements. NAS is often manufactured as a computer appliance a specialized computer built from the ground up for storing and serving files rather than simply a general purpose computer being used for the role.
5 STORAGE: SAN vs NAS
6 STORAGE: SAN vs NAS SAN: High Performance in a separated network. Scalability. Reliability: more fabric can guarantee the backup/mirror of the network. Safety: with SWITCH/STORAGE ZONING eliminates the possibility of unapproved access. NAS: Low cost and easiness to maintain. Easily multiplatform access. With 10GE connectivity, NAS devices can offer performance on par with many SANs. Recently many customers are expanding the use of NAS to include storage for relational databases such as Oracle and MySQL, server virtualization environments such as VMWare VSphere, and virtual desktop solutions.
7 SAN
8 SAN (STORAGE AREA NETWORK) LUN In computer storage, a logical unit number, or LUN, is a number used to identify a logical unit, which is a device addressed by the SCSI protocol or protocols which encapsulate SCSI, such as Fibre Channel or iscsi. A LUN may be used with any device which supports read/write operations, such as a tape drive, but is most often used to refer to a logical disk as created on a SAN. Though not technically correct, the term "LUN" is often also used to refer to the logical disk itself. SCSI Small Computer System Interface (SCSI) is a set of standards for physically connecting and transferring data between computers and peripheral devices. The SCSI standards define commands, protocols and electrical and optical interfaces. SCSI is most commonly used for hard disks and tape drives, but it can connect a wide range of other devices, including scanners and CD drives, although not all controllers can handle all devices.
9 SAN (STORAGE AREA NETWORK) FC Fibre Channel, or FC, is a high-speed network technology (commonly running at 2-, 4-, 8- and 16-gigabit speeds) primarily used for storage networking. Fibre Channel is standardized in the T11 Technical Committee of the International Committee for Information Technology Standards (INCITS), an American National Standards Institute (ANSI)-accredited standards committee. Fibre Channel was primarily used in the supercomputer field, but has now become the standard connection type for storage area networks (SAN) enterprise storage. Despite its name, Fibre Channel signaling can run on twisted pair copper wire in addition to fiber-optic cables.. iscsi In computing, iscsi, is an abbreviation of Internet Small Computer System Interface, an Internet Protocol (IP)-based storage networking standard for linking data storage facilities. By carrying SCSI commands over IP networks, iscsi is used to facilitate data transfers over intranets and to manage storage over long distances. iscsi can be used to transmit data over local area networks (LANs), wide area networks (WANs), or the Internet and can enable location-independent data storage and retrieval. The protocol allows clients (called initiators) to send SCSI commands (CDBs) to SCSI storage devices (called targets) on remote servers.
10 SAN (STORAGE AREA NETWORK) FC SWITCH In the computer storage field, a Fibre Channel switch is a network switch compatible with the Fibre Channel (FC) protocol. It allows the creation of a Fibre Channel fabric, that is currently the core component of most storage area networks (SAN). The fabric is a network of Fibre Channel devices which allows many-to-many communication, device name lookup, security, and redundancy. FC switches implement zoning, a mechanism that disables unwanted traffic between certain fabric nodes.
11 SAN (STORAGE AREA NETWORK)
12 NAS
13 NAS (NETWORK ATTACHED STORAGE) NFS Network File System (NFS) is a distributed file system protocol originally developed by Sun Microsystems in 1984, allowing a user on a client computer to access files over a network in a manner similar to how local storage is accessed. NFS, like many other protocols, builds on the Open Network Computing Remote Procedure Call (ONC RPC) system. CIFS In computer networking, Server Message Block (SMB), also known as Common Internet File System (CIFS) operates as an application-layer network protocol mainly used for providing shared access to files, printers, serial ports, and miscellaneous communications between nodes on a network. It also provides an authenticated inter process communication mechanism.
14 SNAPSHOT
15 SNAPSHOT What is a snapshot? In general terms, a snapshot is a locally retained, read-only, point-in-time virtual copy of a file system or volume. Most snapshots are time-and spaceefficient. When properly implemented, they ll enable faster operational recovery (OR) and help meet tighter recovery point objectives (RPOs), recovery time objectives (RTOs) and service level agreements (SLAs). Snapshots are not a replacement for backups but can be foundational to implementing a solid backup strategy. Research conducted by International Data Corporation (IDC) shows that enterprises are increasingly relying on disk base backup/restore software to meet their shrinking backup windows and meet application availability requirements. Interestingly, 46% of backup and restore implementations are disk based followed by tape at 38% (according to IDC), which is a dramatic change from the past. This change indicates the necessity of understanding the options the capabilities and limitations of the different snapshot implementations.
16 SNAPSHOT Two Type of Snapshot: Copy on write (COW): the allocation block are copy before to be overwritten. Redirect on write (RoW): the write request is redirect to new allocation block (NETAPP). COW Low Performance RoW More Fragmentation
17 SNAPSHOT: COW
18 SNAPSHOT: RoW
19 DATA ACQUISITION
20 DATA ACQUISITION The process of data acquisition must preseve: INTEGRITY DISCRETION AVAILABILITY 1) Freeze the evidence: SNAPSHOT 2) Copy the evidence in another Storage OR Clone the evidence. 3) Acquire the Evidence (LUN, CIFS SHARE, EXPORT NFS)
21 FREEZE THE EVIDENCE: SNAPSHOT The SNAPSHOT process is instantaneously and not require VOLUME modification. Before to execute the command check the volume size and the free space. A SNAPSHOT can increase very easily when there are a lots of file modifications (DB REORG/REBUILD).
22 COPY THE EVIDENCE MIRROR is a process that require TCP/IP connectivity. All the command are execute on the DESTINATION STORAGE (except if the destination is in the same STORAGE). The MIRROR process copy all source block in a destination volume that must have the same or major size of the source. The time required depends of the size of source and the TCP/IP connection. Commercial Solutions: NetApp: SnapMirror EMC: RecoverPoint IBM: Global Mirror
23 CLONE THE EVIDENCE With The CLONE Technology you can create a clone of different object: LUN, FILE or VOLUME. The best practise to preserve the integrity of a evidence is the VOLUME CLONE. The process of VOLUME CLONE depends to the size of the SOURCE VOLUME. The CLONE VOLUME will be create in the same STORAGE.
24 ACQUIRE THE EVIDENCE: LUN In a VOLUME CLONE process all data are replicated in read/write mode. All CLONED LUN have a different SIGNATURE from SOURCE LUN for access protection purpose. After the process all LUN are ONLINE but without INITIATOR CONFIGURED. The first step is to configure the INITIATOR of the LUN with the WWN of the FORENSICS WORKSTATION. Notice that a LUN can t be READONLY.
25 ACQUIRE THE EVIDENCE: LUN INITIATOR HOST
26 ACQUIRE THE EVIDENCE: CIFS SHARE When you define a share you can assign the CIFS SHARE SECURITY. This attribute don t change the METADATA of the FILES in the VOLUME. In the CLONE VOLUME you can assign the CIFS SECURITY: Everyone / Read CIFS SHARE SECURITY
27 ACQUIRE THE EVIDENCE: EXPORT NFS When you define an NFS EXPORT you can decide to put the mount in READONLY access and only to a determinate host.
28 SECURITY SUMMIT 06/06/2013 ROMA
29 Twitter: Web: Tanzania 2008 (Ismani - Iringa)
Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците
Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците Why SAN? Business demands have created the following challenges for storage solutions: Highly available and easily
More informationVirtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric
Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric 2001 San Diego Gas and Electric. All copyright and trademark rights reserved. Importance
More informationHow To Back Up A Computer To A Backup On A Hard Drive On A Microsoft Macbook (Or Ipad) With A Backup From A Flash Drive To A Flash Memory (Or A Flash) On A Flash (Or Macbook) On
Solutions with Open-E Data Storage Software (DSS V6) Software Version: DSS ver. 6.00 up40 Presentation updated: September 2010 Different s opportunities using Open-E DSS The storage market is still growing
More informationStorage Networking Overview
Networking Overview iscsi Attached LAN Networking SAN NAS Gateway NAS Attached SAN Attached IBM Total Module Flow Business Challenges Networking Trends and Directions What is Networking? Technological
More informationStorage Networking Foundations Certification Workshop
Storage Networking Foundations Certification Workshop Duration: 2 Days Type: Lecture Course Description / Overview / Expected Outcome A group of students was asked recently to define a "SAN." Some replies
More informationNetwork Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
More informationIP Storage On-The-Road Seminar Series
On-The-Road Seminar Series Disaster Recovery and Data Protection Page 1 Agenda! The Role of IP in Backup!Traditional use of IP networks for backup! backup capabilities! Contemporary data protection solutions
More informationAchieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006
Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of
More informationUsing High Availability Technologies Lesson 12
Using High Availability Technologies Lesson 12 Skills Matrix Technology Skill Objective Domain Objective # Using Virtualization Configure Windows Server Hyper-V and virtual machines 1.3 What Is High Availability?
More informationHow To Design A Data Center
Data Center Design & Virtualization Md. Jahangir Hossain Open Communication Limited jahangir@open.com.bd Objectives Data Center Architecture Data Center Standard Data Center Design Model Application Design
More informationan introduction to networked storage
an introduction to networked storage How networked storage can simplify your data management The key differences between SAN, DAS, and NAS The business benefits of networked storage Introduction Historical
More informationSAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
More informationThe safer, easier way to help you pass any IT exams. Exam : 000-115. Storage Sales V2. Title : Version : Demo 1 / 5
Exam : 000-115 Title : Storage Sales V2 Version : Demo 1 / 5 1.The IBM TS7680 ProtecTIER Deduplication Gateway for System z solution is designed to provide all of the following EXCEPT: A. ESCON attach
More informationSTORAGE. 2015 Arka Service s.r.l.
STORAGE STORAGE MEDIA independently from the repository model used, data must be saved on a support (data storage media). Arka Service uses the most common methods used as market standard such as: MAGNETIC
More informationNETAPP WHITE PAPER USING A NETWORK APPLIANCE SAN WITH VMWARE INFRASTRUCTURE 3 TO FACILITATE SERVER AND STORAGE CONSOLIDATION
NETAPP WHITE PAPER USING A NETWORK APPLIANCE SAN WITH VMWARE INFRASTRUCTURE 3 TO FACILITATE SERVER AND STORAGE CONSOLIDATION Network Appliance, Inc. March 2007 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 BACKGROUND...
More informationVERITAS Backup Exec 9.0 for Windows Servers
WHITE PAPER Data Protection Solutions for Network Attached Storage VERITAS Backup Exec 9.0 for Windows Servers VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Background...3 Why Use a NAS
More informationOptimizing Large Arrays with StoneFly Storage Concentrators
Optimizing Large Arrays with StoneFly Storage Concentrators All trademark names are the property of their respective companies. This publication contains opinions of which are subject to change from time
More informationVirtual Provisioning. Management. Capacity oversubscription Physical allocation on the fly to logical size. With Thin Provisioning enabled
Management Virtual Provisioning Capacity oversubscription Physical allocation on the fly to logical size Automatic File System Extension past logical size With Thin Provisioning enabled Additional storage
More informationWHITE PAPER. How To Build a SAN. The Essential Guide for Turning Your Windows Server Into Shared Storage on Your IP Network
WHITE PAPER How To Build a SAN The Essential Guide for Turning Your Windows Server Into Shared Storage on Your IP Network TABLE OF CONTENTS Introduction... 3 What is a SAN?... 4 Why iscsi Storage?... 4
More informationDPAD Introduction. EMC Data Protection and Availability Division. Copyright 2011 EMC Corporation. All rights reserved.
DPAD Introduction EMC Data Protection and Availability Division 1 EMC 的 備 份 與 回 復 的 解 決 方 案 Data Domain Avamar NetWorker Data Protection Advisor 2 EMC 雙 活 資 料 中 心 的 解 決 方 案 移 動 性 ( Mobility ) 可 用 性 ( Availability
More informationEMC Disk Library with EMC Data Domain Deployment Scenario
EMC Disk Library with EMC Data Domain Deployment Scenario Best Practices Planning Abstract This white paper is an overview of the EMC Disk Library with EMC Data Domain deduplication storage system deployment
More informationHP iscsi storage for small and midsize businesses
HP iscsi storage for small and midsize businesses IP SAN solution guide With data almost doubling in volume every year, businesses are discovering that they need to take a strategic approach to managing
More informationUncompromised business agility with Oracle, NetApp and VMware
Tag line, tag line Uncompromised business agility with Oracle, NetApp and VMware HroUG Conference, Rovinj Pavel Korcán Sr. Manager Alliances South & North-East EMEA Using NetApp Simplicity to Deliver Value
More informationJune 2009. Blade.org 2009 ALL RIGHTS RESERVED
Contributions for this vendor neutral technology paper have been provided by Blade.org members including NetApp, BLADE Network Technologies, and Double-Take Software. June 2009 Blade.org 2009 ALL RIGHTS
More informationData Replication INSTALATION GUIDE. Open-E Data Storage Server (DSS ) Integrated Data Replication reduces business downtime.
Open-E Data Storage Server (DSS ) Data Replication INSTALATION GUIDE Integrated Data Replication reduces business downtime. Open-E DSS Data Replication Open-E Data Server Storage (DSS) offers enterprise-class
More informationSAN vs. NAS: The Critical Decision
SAN vs. NAS: The Critical Decision Executive Summary The storage strategy for your organization is dictated by many factors: the nature of the documents and files you need to store, the file usage patterns
More informationEMC DATA PROTECTION. Backup ed Archivio su cui fare affidamento
EMC DATA PROTECTION Backup ed Archivio su cui fare affidamento 1 Challenges with Traditional Tape Tightening backup windows Lengthy restores Reliability, security and management issues Inability to meet
More informationDAS, NAS or SAN: Choosing the Right Storage Technology for Your Organization
DAS, NAS or SAN: Choosing the Right Storage Technology for Your Organization New Drivers in Information Storage Data is unquestionably the lifeblood of today s digital organization. Storage solutions remain
More informationFinding a Home for Your VMware and Hyper-V Backups
Finding a Home for Your VMware and Hyper-V Backups Veeam Backup & Replication Rick Vanover vexpert, VCP, MCITP Veeam Product Strategy Specialist @RickVanover @Veeam About this webinar Technical in nature
More informationOracle Database Deployments with EMC CLARiiON AX4 Storage Systems
Oracle Database Deployments with EMC CLARiiON AX4 Storage Systems Applied Technology Abstract This white paper investigates configuration and replication choices for Oracle Database deployment with EMC
More informationCOMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE
COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE Complementary technologies provide unique advantages over traditional storage architectures Often seen as competing technologies, Storage Area
More informationZFS Administration 1
ZFS Administration 1 With a rapid paradigm-shift towards digital content and large datasets, managing large amounts of data can be a challenging task. Before implementing a storage solution, there are
More informationSAN Implementation Course SANIW; 3 Days, Instructor-led
SAN Implementation Course SANIW; 3 Days, Instructor-led Course Description In this workshop course, you learn how to connect Windows, vsphere, and Linux hosts via Fibre Channel (FC) and iscsi protocols
More informationRedefining Microsoft SQL Server Data Management. PAS Specification
Redefining Microsoft SQL Server Data Management APRIL Actifio 11, 2013 PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft SQL Server Data Management.... 4 Virtualizing
More informationStorage Area Network
Storage Area Network 2007 Infortrend Technology, Inc. All rights Reserved. Table of Contents Introduction...3 SAN Fabric...4 Advantages of SAN Solution...4 Fibre Channel SAN vs. IP SAN...4 Fibre Channel
More informationIT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
More informationiscsi: Accelerating the Transition to Network Storage
iscsi: Accelerating the Transition to Network Storage David Dale April 2003 TR-3241 WHITE PAPER Network Appliance technology and expertise solve a wide range of data storage challenges for organizations,
More informationVMware vsphere Backup and Replication on EMC Celerra
VMware vsphere Backup and Replication on EMC Celerra Applied Technology Abstract NAS is a common storage platform for VMware vsphere environments. EMC Celerra can present storage to VMware ESX servers
More informationEMC: The Virtual Data Center
EMC: The Virtual Data Center Dejan Živanovi EMC Technology Solution Group Sr. Technology Consultant High-End platforms & Business Continuity 1 Business Challenges Data growing at 70% annually 80% are files
More informationNAS or iscsi? White Paper 2007. Selecting a storage system. www.fusionstor.com. Copyright 2007 Fusionstor. No.1
NAS or iscsi? Selecting a storage system White Paper 2007 Copyright 2007 Fusionstor www.fusionstor.com No.1 2007 Fusionstor Inc.. All rights reserved. Fusionstor is a registered trademark. All brand names
More information3 common cloud challenges eradicated with hybrid cloud
3 common cloud eradicated 3 common cloud eradicated Cloud storage may provide flexibility and capacityon-demand benefits but it also poses some difficult that have limited its widespread adoption. Consequently,
More informationHow To Protect Data On Network Attached Storage (Nas) From Disaster
White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains
More informationEmulex OneConnect 10GbE NICs The Right Solution for NAS Deployments
Emulex OneConnect 10GbE NICs The Right Solution for NAS Deployments As the value and volume of business data continues to rise, small/medium/ enterprise (SME) businesses need high-performance Network Attached
More informationSecure Backup and Recovery Whitepaper. Securing Data in Backup and Disaster Recovery Sites with Decru DataFort Appliances
Secure Backup and Recovery Whitepaper Securing Data in Backup and Disaster Recovery Sites with Decru DataFort Appliances September 2005 Introduction... 2 Decru DataFort Storage Security Appliances... 2
More informationBenefits of Fibre Channel (FC) SANs
Benefits of Fibre Channel (FC) s Mike McNamara, Network Appliance 9/21/06 TR-3447 Executive Summary As the volume and criticality of data grows, companies need efficient, scalable solutions for making
More informationWHITE PAPER: customize. Best Practice for NDMP Backup Veritas NetBackup. Paul Cummings. January 2009. Confidence in a connected world.
WHITE PAPER: customize DATA PROTECTION Confidence in a connected world. Best Practice for NDMP Backup Veritas NetBackup Paul Cummings January 2009 Best Practice for NDMP Backup Veritas NetBackup Contents
More informationEVOLUTION OF NETWORKED STORAGE
EVOLUTION OF NETWORKED STORAGE Sonika Jindal 1, Richa Jindal 2, Rajni 3 1 Lecturer, Deptt of CSE, Shaheed Bhagat Singh College of Engg & Technology, Ferozepur. sonika_manoj@yahoo.com 2 Lecturer, Deptt
More informationBest Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center
Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center Samir Sharma, Juniper Networks Author: Samir Sharma, Juniper Networks SNIA Legal Notice The material contained in this
More informationEMC RECOVERPOINT FAMILY
EMC RECOVERPOINT FAMILY Cost-effective local and remote data protection and disaster recovery solution ESSENTIALS Maximize application data protection and disaster recovery Protect business applications
More informationIntroduction to Storage Technologies and Terminology
Introduction to Storage Technologies and Terminology Si está interesado en almacenamiento de datos le recomendamos visitar: www.almacenamientodlink.es Agenda! Introduction Drives Interfaces and Evolution
More informationBackup and Recovery Solutions for Exadata. Ľubomír Vaňo Principal Sales Consultant
Backup and Recovery Solutions for Exadata Ľubomír Vaňo Principal Sales Consultant Fundamental Backup and Recovery Data doesn t exist in most organizations until the rule of 3 is complete: Different Media
More informationTraditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking
Network Storage for Business Continuity and Disaster Recovery and Home Media White Paper Abstract Network storage is a complex IT discipline that includes a multitude of concepts and technologies, like
More informationBlock based, file-based, combination. Component based, solution based
The Wide Spread Role of 10-Gigabit Ethernet in Storage This paper provides an overview of SAN and NAS storage solutions, highlights the ubiquitous role of 10 Gigabit Ethernet in these solutions, and illustrates
More informationEMC Data Domain Boost for Oracle Recovery Manager (RMAN)
White Paper EMC Data Domain Boost for Oracle Recovery Manager (RMAN) Abstract EMC delivers Database Administrators (DBAs) complete control of Oracle backup, recovery, and offsite disaster recovery with
More informationVolume Replication INSTALATION GUIDE. Open-E Data Storage Server (DSS )
Open-E Data Storage Server (DSS ) Volume Replication INSTALATION GUIDE Enterprise-class Volume Replication helps ensure non-stop access to critical business data. Open-E DSS Volume Replication Open-E Data
More informationImplementing Storage Concentrator FailOver Clusters
Implementing Concentrator FailOver Clusters Technical Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc. which are subject to
More informationNetVault Backup, NDMP and Network Attached Storage
NetVault, NDMP and Network Attached Storage Simplicity and power for NAS Written by Adrian Moir, Dell Scott Hetrick, Dell Abstract This technical brief explains how Network Data Management Protocol (NDMP)
More informationWHITE PAPER: ENTERPRISE SECURITY. Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions
WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server White Paper: Enterprise Security Symantec
More informationBenefits of Networked Storage: iscsi & Fibre Channel SANs. David Dale, NetApp
Benefits of Networked Storage: iscsi & Fibre Channel SANs David Dale, NetApp SNIA Legal Notice The material contained in this presentation is copyrighted by the SNIA. Member companies and individuals may
More informationNetApp Replication-based Backup
NetApp Replication-based Backup Backup & Recovery Solutions Marketing July 12, 2010 Data Protection Requirements Solid reliability Backup in minutes Recover in minutes Simple to deploy and manage 2010
More informationBackup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland
Backup and Recovery Solutions for Exadata Cor Beumer Storage Sales Specialist Oracle Nederland Recovery Point and Recovery Time Wks Days Hrs Mins Secs Secs Mins Hrs Days Wks Data Loss (Recovery Point Objective)
More informationHow To Build A Clustered Storage Area Network (Csan) From Power All Networks
Power-All Networks Clustered Storage Area Network: A scalable, fault-tolerant, high-performance storage system. Power-All Networks Ltd Abstract: Today's network-oriented computing environments require
More informationEMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
More informationDR-to-the- Cloud Best Practices
DR-to-the- Cloud Best Practices HOW TO EFFECTIVELY CONFIGURE YOUR OWN SELF-MANAGED RECOVERY PLANS AND THE REPLICATION OF CRITICAL VMWARE VIRTUAL MACHINES FROM ON-PREMISES TO A CLOUD SERVICE PROVIDER CONTENTS
More informationPrimeArray Data Storage Solutions Network Attached Storage (NAS) iscsi Storage Area Networks (SAN) Optical Storage Systems (CD/DVD)
Fall 2008 PrimeArray Data Storage Solutions Network Attached Storage (NAS) iscsi Storage Area Networks (SAN) Optical Storage Systems (CD/DVD) AutoStor iscsi SAN solution. See pages 8 and 9 for more information.
More informationCASE STUDY SAGA - FcoE
CASE STUDY SAGA - FcoE FcoE: New Standard Leads to Better Efficency by Fibre Channel over Ethernet replaces IP and FC networks and enables faster data transfer with speeds of up to 10 Gbps When we talk
More informationCIGRE 2014: Udaljena zaštita podataka
CIGRE 2014: Udaljena zaštita podataka Žarko Stupar Product Manager zstupar@mds.rs "" 1 Agenda Udaljena zaštita podataka - pristup Replikacija podataka između data centara Napredna backup rešenja Replikacija
More informationServer and Storage Virtualization with IP Storage. David Dale, NetApp
Server and Storage Virtualization with IP Storage David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this
More informationSAN and NAS Bandwidth Requirements
SAN and NAS Bandwidth Requirements Exploring Networked Storage Scott Kipp Office of the CTO Brocade Inc. Categorizing Storage - DAS SAN - NAS Directly Attached Storage DAS Storage that is connected point-to-point
More informationRedefining Oracle Database Management
Redefining Oracle Database Management Actifio PAS Specification A Single Solution for Backup, Recovery, Disaster Recovery, Business Continuity and Rapid Application Development for Oracle. MAY, 2013 Contents
More informationStorage Protocol Comparison White Paper TECHNICAL MARKETING DOCUMENTATION
Storage Protocol Comparison White Paper TECHNICAL MARKETING DOCUMENTATION v 1.0/Updated APRIl 2012 Table of Contents Introduction.... 3 Storage Protocol Comparison Table....4 Conclusion...10 About the
More informationOpen-E Data Storage Software and Intel Modular Server a certified virtualization solution
Open-E Data Storage Software and Intel Modular Server a certified virtualization solution Contents 1. New challenges for SME IT environments 2. Open-E DSS V6 and Intel Modular Server: the ideal virtualization
More informationNAS or iscsi? White Paper 2006. Selecting a storage system. Copyright 2006 Open-E www.open-e.com
NAS or iscsi? Selecting a storage system White Paper 2006 Copyright 2006 Open-E www.open-e.com 2006 Open-E GmbH. All rights reserved. Open-E is a registered trademark. All brand names and products are
More informationBackup Exec 15 Agents and Options
DATA PROTECTION Backup Exec 15 Agents and Options Enhance and extend Backup Exec features, capabilities, and platform support Overview enhance and extend Backup Exec features, capabilities, and platform
More informationUltimate Guide to Oracle Storage
Ultimate Guide to Oracle Storage Presented by George Trujillo George.Trujillo@trubix.com George Trujillo Twenty two years IT experience with 19 years Oracle experience. Advanced database solutions such
More informationEMC Replication Manager for Virtualized Environments
EMC Replication Manager for Virtualized Environments A Detailed Review Abstract Today s IT organization is constantly looking for ways to increase the efficiency of valuable computing resources. Increased
More informationQuick Start - Virtual Server idataagent (Microsoft/Hyper-V)
Page 1 of 31 Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data
More informationIncreasing Storage Performance, Reducing Cost and Simplifying Management for VDI Deployments
Increasing Storage Performance, Reducing Cost and Simplifying Management for VDI Deployments Table of Contents Introduction.......................................3 Benefits of VDI.....................................4
More informationVMware Data Recovery. Product Overview
VMware Data Recovery Frequently Asked Questions (FAQ), April 2009 Product Overview What is VMware Data Recovery? VMware Data Recovery is a new backup and recovery product for VMware vsphere users that
More informationEMC BACKUP MEETS BIG DATA
EMC BACKUP MEETS BIG DATA Strategies To Protect Greenplum, Isilon And Teradata Systems 1 Agenda Big Data: Overview, Backup and Recovery EMC Big Data Backup Strategy EMC Backup and Recovery Solutions for
More informationWhite Paper Technology Review
White Paper Technology Review iscsi- Internet Small Computer System Interface Author: TULSI GANGA COMPLEX, 19-C, VIDHAN SABHA MARG, LUCKNOW 226001 Uttar Pradesh, India March 2004 Copyright 2004 Tata Consultancy
More informationFile-interface Deduplication System (FDS) Technical Whitepaper. Using FalconStor FDS as a Backup Target for EMC NetWorker
File-interface Deduplication System (FDS) Technical Whitepaper Using FalconStor FDS as a Backup Target for EMC NetWorker Using FalconStor FDS as a Backup Target for EMC NetWorker TM File-interface Deduplication
More informationEMC DATA DOMAIN OVERVIEW. Copyright 2011 EMC Corporation. All rights reserved.
EMC DATA DOMAIN OVERVIEW 1 2 With Data Domain Deduplication Storage Systems, You Can WAN Retain longer Keep backups onsite longer with less disk for fast, reliable restores, and eliminate the use of tape
More informationCDPindepth CDP. to recover from replicas, select point-in-time recovery
STEFAN KNOERER at Siemens IT Solutions and Services implemented EMC s RecoverPoint CDP appliance in early 2007 and witnessed a big reduction in database recovery times. 32 Storage October 2007 CDP As continuous
More informationWHITE PAPER PPAPER. Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions. for Microsoft Exchange Server 2003 & Microsoft SQL Server
WHITE PAPER PPAPER Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions for Microsoft Exchange Server 2003 & Microsoft SQL Server
More informationThe Future of Storage Area Network
The Future of Area Network Henry Yang McDATA Corporation 4 McDATA Parkway, Broomfield CO 80021-5060 Phone: +1-720-558-4418 FAX: +1-720-558-4849 E-mail: Henry.Yang@McDATA.com Presented at the THIC Meeting
More informationiscsi SAN for Education
WHITE PAPER iscsi SAN for Education Shared Storage, Server & Desktop Virtualization, Replication, Backup, Recovery TABLE OF CONTENTS Overview... 3 The IT Challenge for Educational Institutions... 4 What
More informationRedefining Microsoft Exchange Data Management
Redefining Microsoft Exchange Data Management FEBBRUARY, 2013 Actifio PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft Exchange Data Management.... 3 Virtualizing
More informationCustomer Education Services Course Overview
Customer Education Services Course Overview Accelerated SAN Essentials (UC434S) This five-day course provides a comprehensive and accelerated understanding of SAN technologies and concepts. Students will
More informationAffordable. Simple, Reliable and. Vess Family Overview. VessRAID FC RAID Storage Systems. VessRAID SAS RAID Storage Systems
Simple, Reliable and Affordable Vess Family Overview VessRAID FC RAID Storage Systems Fiber Channel s dominance for applications requiring high substantial bandwidth in the market still remains high as
More informationStorage Solutions Overview. Benefits of iscsi Implementation. Abstract
Storage Solutions Overview Benefits of iscsi Implementation Aberdeen LLC. Charles D. Jansen Published: December 2004 Abstract As storage demands continue to increase and become more complex, businesses
More informationvsphere Storage ESXi 6.0 vcenter Server 6.0 EN-001522-03
ESXi 6.0 vcenter Server 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
More informationArchive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration
Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta
More informationHighly Available Tessitura
Mal Everett Technical Director Chris Tew Business Development Manager AGENDA Tessitura key items we need to protect Traditional methods for High Availability Now lets look at Virtualization Performance
More informationQNAP NAS & Virtualization
QNAP Turbo NAS Storage QNAP NAS & Virtualization Cost-effective IP-SAN / iscsi Storage Solution Presented by: Alfred LIANG, Jérôme JAUSSAUD, Simon CHANG Product Manager QNAP Systems, Inc. November 2011
More informationRFP-MM-1213-11067 Enterprise Storage Addendum 1
Purchasing Department August 16, 2012 RFP-MM-1213-11067 Enterprise Storage Addendum 1 A. SPECIFICATION CLARIFICATIONS / REVISIONS NONE B. REQUESTS FOR INFORMATION Oracle: 1) What version of Oracle is in
More informationCisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation
Solution Overview Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation IT organizations face challenges in consolidating costly and difficult-to-manage branch-office
More informationEMC RecoverPoint Continuous Data Protection and Replication Solution
EMC RecoverPoint Continuous Data Protection and Replication Solution Simple. Efficient. Consistent Dejan Živanović EMC Technology Solutions Group SEE Presales Manager Dejan.Zivanovic@emc.com 1 Real Time
More informationE20-005. http://www.gratisexam.com/ Number: E20-005 Passing Score: 800 Time Limit: 120 min
E20-005 Number: E20-005 Passing Score: 800 Time Limit: 120 min http://www.gratisexam.com/ www.yesuse.com Exam A QUESTION 1 Which statement defines retention period? A. Amount of time available for restoring
More informationWHAT IS THE DIFFERENCE BETWEEN SAN AND NAS AND HOW CAN I USE THEM IN MY QLIKVIEW ENVIRONMENT?
WHAT IS THE DIFFERENCE BETWEEN AND NAS AND HOW CAN I USE THEM IN MY QLIKVIEW ENVIRONMENT? QlikView Technical Brief February 2012 qlikview.com This document will highlight some of the conceptual differences
More information