ROADMAP TO DEFINE A BACKUP STRATEGY FOR SAP APPLICATIONS Helps you to analyze and define a robust backup strategy
|
|
|
- Gwenda Ramsey
- 10 years ago
- Views:
Transcription
1 A BasisOnDemand.com White Paper ROADMAP TO DEFINE A BACKUP STRATEGY FOR SAP APPLICATIONS Helps you to analyze and define a robust backup strategy by Prakash Palani ([email protected])
2 Table of Contents 1. Introduction Roadmap that I follow to define a backup strategy Analyze Recovery Point Objective (RPO) and Recovery Time Objective (RTO) Downtime/Runtime Requirement Retention Period Various Components To Be Backed Up Basic Components (Applicable for any application) AS Java Specific Components Portal Specific Components Exchange Infrastructure Specific APO Specific MDM Specific Business Objects Specific Backup Type Backup Management Tasks Key Points to Take Home Reference / Additional Information P a g e
3 1. Introduction This paper describes various aspects to be considered while defining a backup strategy for an SAP system. Backup and Recovery strategy is one of the most important aspect of any SAP implementation and must be defined as uncomplicated as possible, the same helps to ensure that the defined procedures can be implemented without any difficulties during the critical situations. 2. Roadmap that I follow to define a backup strategy In my opinion, below are the preliminary steps involved in devising a backup strategy, it basically contains four main steps: Analyze Define Implement Test and Fine Tune Identify the restorable components (i.e. database, directory, etc.,) Business/Legal Requirements (downtime, RPO, RTO, etc.,) Technical Requirements Analyze Define Hardware / software requirement Online vs Offline Backup Full vs Incremental vs Differential Retention Period Manual/Automation Downtime Management Tasks Backup Test Runtime Availability Restorability Fine tune Test and Fine Tune Implement Install Hardware Install Software Backup All the Components Labeling Tracking Storage This document is focused on the Analyze phase which is a key to define and implement the backup strategy. The phases like define, implement and test are out of scope of this article; rather it provides an insight over how an analysis phase must be handled in a preparation phase. 3 - P a g e
4 3. Analyze In the analyze phase, as mentioned above, in order to define a robust backup and recovery strategy, a detailed assessment must be done on technical requirements, business requirements, architectural requirements, etc., Below table lists few important questions to be asked when analyzing backup strategy, the output of the analyze phase will be the input for the definition phase. This is the phase in which business and technical requirements will be documented along with the solution to fulfill the requirements. Checklist for defining a Backup Strategy Question SLA Requirements on Recovery Time Objective SLA Requirements on Recovery Point Objective Are there any downtime restrictions? Which component of the database to be backed up? Time and Frequency of the backup for each of the components involved? To what storage media it should be backed up? Will the backup be performed manually / automatically How long a backup should be retained in the tape pool? How many days a backup must be retained? Relevancy This is very important to define how long an SAP system can be unavailable without severe negative impact RPO constitutes an important criterion for recovery of a component; it defines the acceptable data loss during recovery of a component when restoring a backup. Understanding the downtime requirement is essential to decide upon the software/hardware requirements Helps you to understand the components such as database, file system, associated components, etc., This is more relevant when you define the downtime and SLA requirements Depends on the SLA requirements To understand the Resource Requirements SAP's general recommendation is to keep 27 days of the backup in the tape pool, this is to ensure better protection against physical tape errors and logical database errors There are legal requirements to retain a backup, hence retention period is something to be discussed with the legal department to understand the government regulations. We will be discussing about each of the questions in detail in the following sections 4 - P a g e
5 3.1. Recovery Point Objective (RPO) and Recovery Time Objective (RTO) RPO and RTO are the most important factors which play a major role in deciding the backup frequency and types of backups to be taken on any given database. For example, in case of MS-SQL, if the RPO is 30 minutes, then it is recommended to take the full back up on a daily basis along with the transaction log backup every 30 minutes. With this approach, in a worst case scenario, you will be able to recover the database with 30 minutes (or) less of data loss from the crash point. Similarly when it comes to RTO, it is the base to decide upon the frequency, type of backup, size of transaction log file, backup/restore read/write speed, backup solution, etc., For example, If the RTO is just 6 hours in your environment, then you should have a robust solution (i.e. Network, Backup Infrastructure, Skilled Resources, etc.,) to bring the system back up and running in 6 hours of time Downtime/Runtime Requirement This is an important element to be defined by reviewing the business requirement; this is another key factor to decide the backup type, hardware and software. If the SAP system is supporting global operations, then downtime may not be affordable by the business which will lead to choose online backup Retention Period There are legal requirements that must be taken into account while defining retention period, it is generally recommended to have a workshop with the legal team to understand the federal, state and local data retention requirements. 5 - P a g e
6 The technical side of the retention is that you must be in a position to restore a database backup with at least one copy of the backup taken in the recent days, hence several generation of backups have to be available to be able to deal with the faulty backups. SAP s general recommendation is that you maintain the backup of 28 days (4 weeks); consequently 27 backups are available in the event of database failure as indicated in the graphic below. Retention period is not just about daily backups, the same rule applicable for the backups like monthend, quarter-end, year-end backups must also be retained according to legal/business requirements Various Components To Be Backed Up This chapter discusses the various components to be backed up for the SAP products like AS ABAP, AS JAVA, Portal, APO, Business Objects and MDM. The reason for choosing these products is that they are unique in nature. The specific details of each of these products are covered in the following sections Basic Components (Applicable for any application) As a general rule, below are the few important components to be considered for the backup for any SAP application. Database Log files Operating System Files Connected Systems (i.e. BW, SCM, non-sap applications, etc.,) Any other component that is integrated and updated on daily basis Database Why should this be backed up? This is the core of any SAP system and your data. Without the database backup, it is impossible to recover the system in case of crash. When should the backup to take place? The frequency of the full database backup determines how many days back in time you must go to begin the restore: 6 - P a g e
7 If a daily backup is done, in case of a crash today, you will need yesterday s full backup. This option reduces the number of logs that needs to be applied in case of a crash, subsequently reduces the risk of not getting a current state of the database because of a bad/damaged log file. If a weekly backup is done, you will need last week s backup and you may have to apply all the log files created since the last successful backup. As mentioned in the above sections, frequency is something needs to be carefully validated after defining the recovery point and time objective. Transaction Log / Offline Redo Log files Why should this be backed up? Log files are critical to database recovery in any RDBMS (i.e. oracle, MSS, DB2). These files contain the changes made to the database which is used to roll forward or back operations. It is very important to have a complete chain of the log backups. During the restore, if one of the log file is corrupted, then the subsequent log files and changes cannot be recovered. When should the backup to take place? The frequency of the log backup is again a business decision on : RPO / RTO Transaction Volume Critical Period for the system Resource requirement to perform the backups and transfer them offsite Operating System Level Files Why should this be backed up? Operating system files are dependent on specific application, Data Archiving related files 1. Spool files (if stored at OS using rspo/storage_location=g) 2. Transport Management Files (DIR_TRANS) 3. System and Network Configuration 4. Other OS Level files When should the backup to take place? If these application specific operating system level files (outside the database) are to be kept in sync with R/3, they must be backed up at the same frequency as the log backup files. Below are few examples of the operating system level files. 7 - P a g e
8 Connected Systems Why should this be backed up? In any given SAP environments, there will be additional components such as Content Server, SAP BW which needs to be in sync with AS ABAP. It is imperative to take the backup of these components as well to keep every data is in sync with each other components. When should the backup to take place? This is something to be treated as same as operating system level files, please refer above AS Java Specific Components In addition to the backup contents mentioned above, there are few java specific components which are to be backed up. SDM Repository UME Store (either AS ABAP/LDAP/Local DB) Portal Specific Components Below is the list of components to be considered while designing the backup strategy for Enterprise Portal. TREX Indices Portal Archive Content Server Associated Components Exchange Infrastructure Specific Below components are specific to PI/XI (along with AS Java). SLD Database Exchange Profile Interface Files APO Specific Below components are specific to APO/SCM. Live Cache Database Live Cache Log files 8 - P a g e
9 MDM Specific Below components are specific to MDM. MDM Log files MDM distribution port data MDM Configuration Files (mds.ini, mdss.ini, mdls.ini and mdis.ini Business Objects Specific Below components are specific to Business Objects Enterprise Platform. CMS Database Audit Database Local / Central / Profiler Repository Database %LINK_DIR%\bin\DSConfig.txt %LINK_DIR%\log folder The current data services release install files Input / Output File Repository Server Operating System Level files 3.5. Backup Type Every RDBMS has different types of backups, in the below sections, we will be discussing about the various database backup types used in SAP environment. Full Database Backup Entire database backup is taken in this type. Advantages: The entire database is backed up at once, it makes the restore of the entire database easier and faster. There are less log files that need to be applied to bring the restored database to current. Disadvantages Takes longer to run depending upon the database size Incremental/Differential Backup Incremental Backup terminology differs between various RDBMS, for example, incremental backup is linked to transaction log backup in MS-SQL whereas in Oracle, it indicates the backup of all blocks changed after the most recent successful full backup (in MS-SQL the same logic is applied when the differential backup (changed blocks) is taken). Depending on the RDBMS used, above mentioned differential/incremental backup logics to be understood before defining the strategy. 9 - P a g e
10 How the backup is taken? Offline Backup When an offline backup is chosen, the application, database and all the services accessing the backup components should be stopped. Advantages: Faster than online backup During the backup, there is no issue with database changing in the database Disadvantages: SAP system is unavailable during offline backup Database and Application Buffers are flushed Online Backup An online backup is taken when the database and the application is running. Advantages: Application is available to users during the backup Buffers are not flushed Disadvantages An online backup is slower than offline backup Application performance is degraded during the online backup Data may get changed during the online backup, hence it is important to have the transaction log backup 10 - P a g e
11 3.6. Backup Management Tasks Monitoring: Backup must be monitored on a regular interval, the same to be defined in the backup strategy along with the roles and responsibilities for each of the database backup components (i.e. database, transaction log, operating system, etc.,). Tape Management: Tape management activities such as Labeling, Tracking, Handling and Retaining are to be defined in the backup strategy to enable the tape management team to handle the tapes efficiently. Verifying Backup/Integrity check: Backups must be verified following a regular schedule (once in the retention period), only then you will know that you have a valid backup that can be restored when it is needed. Storage: Once the successful backup is taken, the tapes must be transferred to offsite to protect them from disaster. This is one of the key items to be defined in the backup strategy. Backup Test: The backup and recovery must be tested and validated before rolling out the backup procedures to production. In addition to backup/recovery test, performance must also be tested to identify the potential bottlenecks. 4. Key Points to Take Home Backup and Restore Strategy should be defined as uncomplicated as possible Each and Every RDBMS has to be dealt differently Every SAP Product has different flavor in it, hence the backup strategy must be designed according to the products used SLA (RTO/RPO) requirements are to be considered while choosing the backup solution Workshops must be conducted with business/legal departments to understand the requirements in detail and to set the expectation from the technical perspective. 5. Reference / Additional Information Below URLs and notes contain additional information on the backup strategy. tm P a g e
Rajan Arora (Deloitte) SAP Business Objects Backup and Recovery Scenarios and Best Practices Session # 3233
Rajan Arora (Deloitte) SAP Business Objects Backup and Recovery Scenarios and Best Practices Session # 3233 AGENDA Overview Key Learnings What to Backup Type of Backup s Restore Scenario s Best Practices
Backup/Recovery Strategy and Impact on Applications. Jacek Wojcieszuk, CERN IT Database Deployment and Persistancy Workshop October, 2005
Backup/Recovery Strategy and Impact on Applications Jacek Wojcieszuk, CERN IT Database Deployment and Persistancy Workshop October, 2005 Outline Backup and recovery overwiew Current backup strategy overview
Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747
Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747 Introduction Rajesh Gupta - [email protected] Solution Network
SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY
SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY Among the priorities for efficient storage management is an appropriate protection architecture. This paper will examine how to architect storage
Vodacom Managed Hosted Backups
Vodacom Managed Hosted Backups Robust Data Protection for your Business Critical Data Enterprise class Backup and Recovery and Data Management on Diverse Platforms Vodacom s Managed Hosted Backup offers
How do you test to determine which backup and restore technology best suits your business needs?
KEY CRITERIA WHEN SELECTING BACKUP AND RESTORE TECHNOLOGY FOR WINDOWS SYSTEMS How do you test to determine which backup and restore technology best suits your business needs? Real-Time Recovery delivers
MySQL Enterprise Backup
MySQL Enterprise Backup Fast, Consistent, Online Backups A MySQL White Paper February, 2011 2011, Oracle Corporation and/or its affiliates Table of Contents Introduction... 3! Database Backup Terms...
Agenda. Overview Configuring the database for basic Backup and Recovery Backing up your database Restore and Recovery Operations Managing your backups
Agenda Overview Configuring the database for basic Backup and Recovery Backing up your database Restore and Recovery Operations Managing your backups Overview Backup and Recovery generally focuses on the
REMOTE BACKUP-WHY SO VITAL?
REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote
A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES
A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES By: Edward Whalen Performance Tuning Corporation INTRODUCTION There are a number of clustering products available on the market today, and clustering has become
DEFINING THE RIGH DATA PROTECTION STRATEGY
DEFINING THE RIGH DATA PROTECTION STRATEGY The Nuances of Backup and Recovery Solutions By Cindy LaChapelle, Principal Consultant, ISG www.isg-one.com INTRODUCTION Most organizations have traditionally
This policy is not designed to use systems backup for the following purposes:
Number: AC IT POL 003 Subject: Backup and Restore Policy 1. PURPOSE The backup and restore policy establishes the need and rules for performing periodic system backup to permit timely restoration of Africa
Feature. Database Backup and Recovery Best Practices
Feature Ali Navid Akhtar, OCP, has more than two decades of experience with databases. He works as a lead database administrator at Solo Cup Co. Jeff Buchholtz has more than 18 years of design, implementation
D12CBR Oracle Database 12c: Backup and Recovery Workshop NEW
D12CBR Oracle Database 12c: Backup and Recovery Workshop NEW What you will learn This Oracle Database 12c: Backup and Recovery Workshop will teach you how to evaluate your own recovery requirements. You'll
Backup and Archiving Explained. White Paper
Backup and Archiving Explained White Paper Backup vs. Archiving The terms backup and archiving are often referenced together and sometimes incorrectly used interchangeably. While both technologies are
Library Recovery Center
Library Recovery Center Ever since libraries began storing bibliographic information on magnetic disks back in the 70 s, the challenge of creating useful back-ups and preparing for a disaster recovery
Redefining Oracle Database Management
Redefining Oracle Database Management Actifio PAS Specification A Single Solution for Backup, Recovery, Disaster Recovery, Business Continuity and Rapid Application Development for Oracle. MAY, 2013 Contents
Oracle Recovery Manager
1 sur 6 05/08/2014 14:17 ORACLE.COM TECHNOLOGY NETWORK PARTNERS STORE SUPPORT (Sign In / Register for a free DownloadsDocumentation Discussion Forums Articles Sample Code Training RSS Resources For PRODUCT
Module 5 Introduction to Processes and Controls
IT Terminology 1. General IT Environment The general IT environment is the umbrella over the following IT processes: 1. Operating Systems 2. Physical and Logical Security 3. Program Changes 4. System Development
Oracle Database 10g: Backup and Recovery 1-2
Oracle Database 10g: Backup and Recovery 1-2 Oracle Database 10g: Backup and Recovery 1-3 What Is Backup and Recovery? The phrase backup and recovery refers to the strategies and techniques that are employed
Backup and Recovery 1
Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup
<Insert Picture Here> RMAN Configuration and Performance Tuning Best Practices
1 RMAN Configuration and Performance Tuning Best Practices Timothy Chien Principal Product Manager Oracle Database High Availability [email protected] Agenda Recovery Manager
VERITAS NetBackup 6.0 Database and Application Protection
VERITAS NetBackup 6.0 Database and Application Protection INNOVATIVE DATA PROTECTION When it comes to database and application recovery, VERITAS Software has a clear goal in mind simplify the complexity
How To Manage An Sap Solution
... Foreword... 17... Acknowledgments... 19... Introduction... 21 1... Performance Management of an SAP Solution... 33 1.1... SAP Solution Architecture... 34 1.1.1... SAP Solutions and SAP Components...
Cloud-based Managed Services for SAP. Service Catalogue
Cloud-based Managed Services for SAP Service Catalogue Version 1.8 Date: 28.07.2015 TABLE OF CONTENTS Introduction... 4 Managed Services out of the Cloud... 4 Cloud-based Flexibility, Efficiency and Scalability...
Version: 1.5 2014 Page 1 of 5
Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware
WFT - SAP Disaster Recovery Solution Brief Planning and Automating an SAP Landscape Remote Recovery Procedure
WFT - SAP Disaster Recovery Solution Brief Planning and Automating an SAP Landscape Remote Recovery Procedure Abstract This Solution Brief discusses how WFT Disaster Recovery Services helps a customer
Leveraging Virtualization for Disaster Recovery in Your Growing Business
Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster
Maximum Availability Architecture. Oracle Best Practices For High Availability. Backup and Recovery Scenarios for Oracle WebLogic Server: 10.
Backup and Recovery Scenarios for Oracle WebLogic Server: 10.3 An Oracle White Paper January, 2009 Maximum Availability Architecture Oracle Best Practices For High Availability Backup and Recovery Scenarios
MapGuide Open Source Repository Management Back up, restore, and recover your resource repository.
MapGuide Open Source Repository Management Back up, restore, and recover your resource repository. Page 1 of 5 Table of Contents 1. Introduction...3 2. Supporting Utility...3 3. Backup...4 3.1 Offline
Virtual Infrastructure Security
Virtual Infrastructure Security 2 The virtual server is a perfect alternative to using multiple physical servers: several virtual servers are hosted on one physical server and each of them functions both
One Solution for Real-Time Data protection, Disaster Recovery & Migration
One Solution for Real-Time Data protection, Disaster Recovery & Migration Built-in standby virtualisation server Backs up every 15 minutes up to 12 servers On and Off-site Backup User initialed file, folder
Oracle Recovery Manager 10g. An Oracle White Paper November 2003
Oracle Recovery Manager 10g An Oracle White Paper November 2003 Oracle Recovery Manager 10g EXECUTIVE OVERVIEW A backup of the database may be the only means you have to protect the Oracle database from
Cloud Based Application Architectures using Smart Computing
Cloud Based Application Architectures using Smart Computing How to Use this Guide Joyent Smart Technology represents a sophisticated evolution in cloud computing infrastructure. Most cloud computing products
UMHLABUYALINGANA MUNICIPALITY
UMHLABUYALINGANA MUNICIPALITY BACKUP AND RESTORE POLICY Backup and Restore Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Originator Recommended by Director of
The Difference Between Disaster Recovery and Business Continuance
The Difference Between Disaster Recovery and Business Continuance In high school geometry we learned that a square is a rectangle, but a rectangle is not a square. The same analogy applies to business
Tk20 Backup Procedure
Tk20 Backup Procedure 1 TK20 BACKUP PROCEDURE OVERVIEW 3 FEATURES AND ADVANTAGES: 3 TK20 BACKUP PROCEDURE 4 DAILY BACKUP CREATION 4 TRANSFER OF BACKUPS 5 AUDITING PROCESS 5 BACKUP REPOSITORY 5 WRITE TO
Creating a Technical Disaster Recovery Implementation Plan (TDRIP)
Creating a Technical Disaster Recovery Implementation Plan (TDRIP) Arjen Visser Avisit Solutions Limited Creators of Dbvisit Protection Recovery Continuity Introducing myself Arjen Visser Founder and CEO
Keys to optimizing your backup environment: Legato NetWorker
Keys to optimizing your backup environment: Legato NetWorker Natalie Mead Storage Consultant GlassHouse Technologies [email protected] Introduction Audience Profile Storage Management Interdependence
Cloud Attached Storage
CTERA Appliance Disaster Recovery Guide Cloud Attached Storage June 2013 Version 3.2 1 Introduction This document is intended for CTERA Portal administrators. It describes how to replace CTERA appliances
Sanovi DRM for Oracle Database
Application Defined Continuity Sanovi DRM for Oracle Database White Paper Copyright@2012, Sanovi Technologies Table of Contents Executive Summary 3 Introduction 3 Audience 3 Oracle Protection Overview
Backup and Restore Back to Basics with SQL LiteSpeed
Backup and Restore Back to Basics with SQL December 10, 2002 Written by: Greg Robidoux Edgewood Solutions www.edgewoodsolutions.com 888.788.2444 2 Introduction One of the most important aspects for a database
Unitrends Integrated Backup and Recovery of Microsoft SQL Server Environments
Solution Brief Unitrends Integrated Backup and Recovery of Microsoft SQL Server Environments Summary Your business infrastructure relies on your Microsoft SQL Servers. Your business no matter the size
Welcome to My E-Book
Welcome to My E-Book I decided to write this e-book as a response to the many questions that I get from business owners about data backup solutions. I have seen first-hand that business owners are very
Why Cloud Backup Now? Ashar Baig Senior Director of Product Marketing
Why Cloud Backup Now? Ashar Baig Senior Director of Product Marketing Agenda. What is Cloud Backup & Restore (BUR)? Typical Cloud BUR Customer Errors Cloud BUR Future Challenges Urgent and Important End
D78850GC10. Oracle Database 12c Backup and Recovery Workshop. Summary. Introduction. Prerequisites
D78850GC10 Oracle 12c and Recovery Workshop Summary Duration Vendor Audience 5 Days Oracle Data Warehouse Administrators, Administrators, Support Engineers, Technical Administrators, Technical Consultants
Veritas NetBackup 6.0 Database and Application Protection
Veritas NetBackup 6.0 Database and Application Protection Innovative data protection When it comes to database and application recovery, Symantec has a clear goal in mind simplify the complexity of database
Wishful Thinking vs. Reality in Regards to Virtual Backup and Restore Environments
NOVASTOR WHITE PAPER Wishful Thinking vs. Reality in Regards to Virtual Backup and Restore Environments Best practices for backing up virtual environments Published by NovaStor Table of Contents Why choose
PRODUCT SCENARIOS BEST-IN-CLASS DISASTER RECOVERY FOR WINDOWS SERVERS
PRODUCT SCENARIOS BEST-IN-CLASS DISASTER RECOVERY FOR WINDOWS SERVERS StorageCraft ShadowProtect Server and ShadowProtect Small Business Server provide fast and reliable disaster recovery, data protection
Delivering Fat-Free CDP with Delphix. Using Database Virtualization for Continuous Data Protection without Storage Bloat.
Delivering Fat-Free CDP with Delphix Using Database Virtualization for Continuous Data Protection without Storage Bloat White Paper Delivering Fat- Free CDP with Delphix Revision: June 2012 You can find
CENTER FOR NUCLEAR WASTE REGULATORY ANALYSES
Page 1 of 5 ELECTRONIC FILE ARCHIVAL AND BACKUP PROCEDURES EFFECTIVITY AND APPROVAL Revision 1 of this procedure became effective on July 6, 2004. This procedure consists of the pages and changes listed
Ingres Backup and Recovery. Bruno Bompar Senior Manager Customer Support
Ingres Backup and Recovery Bruno Bompar Senior Manager Customer Support 1 Abstract Proper backup is crucial in any production DBMS installation, and Ingres is no exception. And backups are useless unless
How To Plan Out A Disaster Recovery Plan For Mip
Disaster Recovery Planning for MIP Session 7 (1:30pm-3:00pm) Dennis Guiney, Technical Specialist JMT Consulting Group Background: Bachelor of Science, CIS Microsoft Certified Technical Specialist Microsoft
Business continuity management for Microsoft SharePoint Server 2010
Business continuity management for Microsoft SharePoint Server 2010 Microsoft Corporation Published: March 2011 Author: Microsoft Office System and Servers Team ([email protected]) Abstract This book
Backup and Recovery of SAP Systems on Windows / SQL Server
Backup and Recovery of SAP Systems on Windows / SQL Server Author: Version: Amazon Web Services sap- on- [email protected] 1.1 May 2012 2 Contents About this Guide... 4 What is not included in this guide...
Backup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland
Backup and Recovery Solutions for Exadata Cor Beumer Storage Sales Specialist Oracle Nederland Recovery Point and Recovery Time Wks Days Hrs Mins Secs Secs Mins Hrs Days Wks Data Loss (Recovery Point Objective)
Whitepaper - Disaster Recovery with StepWise
Whitepaper - Disaster Recovery with StepWise Copyright Invizion Pty Ltd. All rights reserved. First Published October, 2010 Invizion believes the information in this publication is accurate as of its publication
How to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems
W H I T E P A P E R How to Manage Critical Data Stored in Microsoft Exchange Server 2010 By Hitachi Data Systems April 2012 2 Table of Contents Executive Summary and Introduction 3 Mission-critical Microsoft
Education and Workforce Development Cabinet POLICY/PROCEDURE. Policy Number: EDU-06 Effective Date: April 15, 2006 Revision Date: December 20, 2012
Education and Workforce Development Cabinet POLICY/PROCEDURE Policy Number: EDU-06 Effective Date: April 15, 2006 Revision Date: December 20, 2012 Subject: Backup Procedures Tower and Server Farms Policy:
Comparison: Abaxio s Nimbus Appliances vs. Veeam
Comparison: s Nimbus s vs. Primary Advantages of : focuses only on protecting the VMware virtual environment and offers supplementary tools and utilities to manage the virtual environment. Primary Disadvantages
Trends in Application Recovery. Andreas Schwegmann, HP
Andreas Schwegmann, HP SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations
Benefit from Disaster Recovery... Without a Disaster
Benefit from Disaster Recovery... Without a Disaster Startling Facts 87% of businesses experience computer failure each year 50% of businesses experience up to five failures each year The average number
Data Protection as Part of Your Cloud Journey
Data Protection as Part of Your Cloud Journey Jim Vanek DPAD Area Manager IL / WI EMC Data Protection & Availability Division October 23, 2014 Copyright 2014 EMC Corporation. All rights reserved. 1 Setting
HP LeftHand SAN Solutions
HP LeftHand SAN Solutions Support Document Application Notes Oracle Backup Recovery Setup on LeftHand Networks IP SAN Legal Notices Warranty The only warranties for HP products and services are set forth
BEST PRACTICES FOR PROTECTING MICROSOFT EXCHANGE DATA
BEST PRACTICES FOR PROTECTING MICROSOFT EXCHANGE DATA Bill Webster September 25, 2003 VERITAS ARCHITECT NETWORK TABLE OF CONTENTS Introduction... 3 Exchange Data Protection Best Practices... 3 Application
Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description
Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.
FioranoMQ 9. High Availability Guide
FioranoMQ 9 High Availability Guide Copyright (c) 1999-2008, Fiorano Software Technologies Pvt. Ltd., Copyright (c) 2008-2009, Fiorano Software Pty. Ltd. All rights reserved. This software is the confidential
Continuous Data Protection. PowerVault DL Backup to Disk Appliance
Continuous Data Protection PowerVault DL Backup to Disk Appliance Continuous Data Protection Current Situation The PowerVault DL Backup to Disk Appliance Powered by Symantec Backup Exec offers the industry
Rapid recovery from bare metal, to dissimilar hardware or to and from virtual environments.
Product Scenarios StorageCraft Technology Corporation Backup Fast, Recover Faster 2010 StorageCraft Technology Corporation. All Rights Reserved. This brochure is for informational purposes only. STORAGECRAFT
AVLOR SERVER CLOUD RECOVERY
AVLOR SERVER CLOUD RECOVERY WHITE PAPER 1 Table of Contents Abstract... 2 1. Introduction... 3 2. Server Cloud Recovery... 3 3. Amazon AWS Cloud... 4 a. What it is... 4 b. Why Use AWS?... 5 4. Difficulties
Contents. SnapComms Data Protection Recommendations
Contents Abstract... 2 SnapComms Solution Environment... 2 Concepts... 3 What to Protect... 3 Database Failure Scenarios... 3 Physical Infrastructure Failures... 3 Logical Data Failures... 3 Service Recovery
VERITAS Business Solutions. for DB2
VERITAS Business Solutions for DB2 V E R I T A S W H I T E P A P E R Table of Contents............................................................. 1 VERITAS Database Edition for DB2............................................................
Globalnest SAP Technical Services
GLOBALNEST SAP TECHNICAL SERVICES GLOBALNEST TECHNICAL SERVICES: 1. SAP BASIS SERVICES. 2. SAP SOLUTION MANAGER SERVICES. 3. SAP ABAP SERVICES. WHY GLOBALNEST? KEY BENEFITS: No need to hire, train or retain
SAFETY FIRST. Emerging Trends in IT Disaster Recovery. By Cindy LaChapelle, Principal Consultant. www.isg-one.com
SAFETY FIRST Emerging Trends in IT Disaster Recovery By Cindy LaChapelle, Principal Consultant www.isg-one.com INTRODUCTION Against a backdrop of increasingly integrated and interdependent global service
The Shift Cloud Computing Brings to Disaster Recovery
The Shift Cloud Computing Brings to Disaster Recovery Mike Klein President, Online Tech June 21, 2010 Disasters Happen WHY DISASTER RECOVERY? How Do You Recover All of Your Electronic Assets? Recover Your
Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide
Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:
Backup and Recovery Solutions for Exadata. Ľubomír Vaňo Principal Sales Consultant
Backup and Recovery Solutions for Exadata Ľubomír Vaňo Principal Sales Consultant Fundamental Backup and Recovery Data doesn t exist in most organizations until the rule of 3 is complete: Different Media
Storage and Disaster Recovery
Storage and Disaster Recovery Matt Tavis Principal Solutions Architect The Business Continuity Continuum High Data Backup Disaster Recovery High, Storage Backup and Disaster Recovery form a continuum of
Talk With Someone Live Now: (760) 650-2313. One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE
One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE Prevent Data Loss with Remote Online Backup Service The U.S. National Archives & Records Administration states that
DATA BACKUP & RESTORE
DATA BACKUP & RESTORE Verizon Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable. Offsite backup is
Building a Disaster Recovery Program By: Stieven Weidner, Senior Manager
Building a Disaster Recovery Program By: Stieven Weidner, Senior Manager Part two of a two-part series. If you read my first article in this series, Building a Business Continuity Program, you know that
Local Government Cyber Security:
Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and
Lotus Domino Backup Strategy
Lotus Domino Backup Strategy Introduction LOTUS DOMINO BACKUP STRATEGY White Paper 1 You've worked hard to put your Domino security shield in place. You've set up your firewall, Access Control Lists, and
Introduction to Enterprise Data Recovery. Rick Weaver Product Manager Recovery & Storage Management BMC Software
Introduction to Enterprise Data Recovery Rick Weaver Product Manager Recovery & Storage Management BMC Software Contents Introduction...1 The Value of Data...2 Risks to Data Assets...2 Physical Loss...2
Disaster Recovery. Stanley Lopez Premier Field Engineer Premier Field Engineering Southeast Asia Customer Services and Support
Disaster Recovery Stanley Lopez Premier Field Engineer Premier Field Engineering Southeast Asia Customer Services and Support Categories of Risk Financial Operational Reputational Market share Revenue
Protecting Microsoft SQL Server with Asigra Cloud Backup
Technical Note Protecting Microsoft SQL Server with Asigra Cloud Backup Table of Contents Introduction 3 Overview - Asigra Cloud Backup Software Platform 3 Microsoft SQL Server Backup Set in Asigra DS-Client
IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
John D. Bonam Disaster Recovery Architecture Session # 2841
John D. Bonam Disaster Recovery Architecture Session # 2841 LEARNING POINTS Understand the known Traditional approach to Backup Recovery of the BusinessObjects Environment Understand the need for Disaster
Migration Scenario: Migrating Backend Processing Pipeline to the AWS Cloud
Migration Scenario: Migrating Backend Processing Pipeline to the AWS Cloud Use case Figure 1: Company C Architecture (Before Migration) Company C is an automobile insurance claim processing company with
Considerations when Choosing a Backup System for AFS
Considerations when Choosing a Backup System for AFS By Kristen J. Webb President and CTO Teradactyl LLC. October 21, 2005 The Andrew File System has a proven track record as a scalable and secure network
WHITEPAPER ON SAP SECURITY PATCH IMPLEMENTATION Helps you to analyze and define a robust strategy for implementing SAP Security Patches
A BasisOnDemand.com White Paper WHITEPAPER ON SAP SECURITY PATCH IMPLEMENTATION Helps you to analyze and define a robust strategy for implementing SAP Security Patches by Prakash Palani ([email protected])
ACS Backup and Restore
Table of Contents Implementing a Backup Plan 3 What Should I Back Up? 4 Storing Data Backups 5 Backup Media 5 Off-Site Storage 5 Strategies for Successful Backups 7 Daily Backup Set A and Daily Backup
OPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006
OPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006 EXECUTIVE SUMMARY Microsoft Exchange Server is a disk-intensive application that requires high speed storage to deliver
