Managed Services - A Paradigm for Cloud- Based Business Continuity



Similar documents
Backups in the Cloud Ron McCracken IBM Business Environment

Creating a Cloud Backup Service. Deon George

The Consolidation Process

IBM Systems and Technology Group Technical Conference

TSM (Tivoli Storage Manager) Backup and Recovery. Richard Whybrow Hertz Australia System Network Administrator

IBM Spectrum Protect in the Cloud

Effective Storage Management for Cloud Computing

How to Deliver Measurable Business Value with the Enterprise CMDB

What You Need to Know NOW about Next Generation Data Protection. Kenny Wong Senior Consultant June 2015

Cloud Computing with xcat on z/vm 6.3

How To Write An Architecture For An Bm Security Framework

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

IBM Tivoli Storage FlashCopy Manager Overview Wolfgang Hitzler Technical Sales IBM Tivoli Storage Management

Reduce your data storage footprint and tame the information explosion

IBM Infrastructure for Long Term Digital Archiving

Title. Click to edit Master text styles Second level Third level

IBM Tivoli Storage FlashCopy Manager

IBM Tivoli Storage Manager Suite for Unified Recovery

IBM Tivoli Storage Manager FastBack

IBM Tivoli Storage Manager for Virtual Environments

Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup

Performance and scalability of a large OLTP workload

Session 1494: IBM Tivoli Storage FlashCopy Manager

Maximo Business Intelligence Reporting Roadmap Washington DC Users Group

IBM Tivoli Storage Manager

Cloud Storage Backup for Storage as a Service with AT&T

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation

IBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready

Protecting enterprise servers with StoreOnce and CommVault Simpana

Positioning the Roadmap for POWER5 iseries and pseries

Leverage the IBM Tivoli advantages in storage management

SuSE Linux High Availability Extensions Hands-on Workshop

UPSTREAM for Linux on System z

Total Cost of Ownership (TCO): Comparing System z and Distributed Platforms

Arwed Tschoeke, Systems Architect IBM Systems and Technology Group

Tivoli Automation for Proactive Integrated Service Management

We look beyond IT. Cloud Offerings

EMC CLOUDARRAY PRODUCT DESCRIPTION GUIDE

Effective storage management and data protection for cloud computing

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Cloud Gateway. Agenda. Cloud concepts Gateway concepts My work. Monica Stebbins

Protect Microsoft Exchange databases, achieve long-term data retention

Ten ways to save money with IBM Tivoli Storage Manager

Enable and protect business-ready cloud infrastructures

Redefining Backup for VMware Environment. Copyright 2009 EMC Corporation. All rights reserved.

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)

Cloud OS Vision. Modern platform for the world s apps

TSM for Virtual Environments Data Protection for VMware

CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR

Session Title: Cloud Computing 101 What every z Person must know

Vodacom Managed Hosted Backups

MANAGED SERVICE PROVIDERS SOLUTION BRIEF

CA s Cloud Storage for System z

Lisa Gundy IBM Corporation. Wednesday, March 12, 2014: 11:00 AM 12:00 PM Session 15077

WHITEPAPER. 7 Reasons Why Businesses are Shifting to Cloud Backup

WHITE PAPER: customize. Best Practice for NDMP Backup Veritas NetBackup. Paul Cummings. January Confidence in a connected world.

Riverbed Whitewater/Amazon Glacier ROI for Backup and Archiving

How To Use An Npm On A Network Device

IBM Tivoli Storage Manager and Front-safe TSM Portal

Cloud Backup Service Service Description. PRECICOM Cloud Hosted Services

VERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION DATASHEET. Product Highlights

Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication

Using HP StoreOnce Backup systems for Oracle database backups

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

How To Manage Energy At An Energy Efficient Cost

Energy Management in a Cloud Computing Environment

How To Write An Ets Request For Proposal (Rfp)

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL).

Asigra Cloud Backup TM and Recovery Software.

HyperQ DR Replication White Paper. The Easy Way to Protect Your Data

IBM Cloud Computing Infrastructure Architect V1. Version: Demo. Page <<1/9>>

IBM Tivoli Storage Manager Suite for Unified Recovery

IBM Storage Management within the Infrastructure Laura Guio Director, WW Storage Software Sales October 20, 2008

Deploying a private database cloud on z Systems

IBM Tivoli Storage Manager

Actual trends in backup protection solution IBM Backup Products and Services

IBM Storwize Rapid Application Storage solutions

SHARE in Pittsburgh Session 15591

Accelerating Backup/Restore with the Virtual Tape Library Configuration That Fits Your Environment

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Veritas NetBackup With and Within the Cloud: Protection and Performance in a Single Platform

IBM Maximo Asset Management Essentials

FAQ RIVERBED WHITEWATER FREQUENTLY ASKED QUESTIONS

IBM XIV Gen3 Storage System Storage built for VMware vsphere infrastructures

Data Management in the Cloud Era

Veeam Cloud Connect. Version 8.0. Administrator Guide

Virtualization Support - Real Backups of Virtual Environments

Secure Your Business with EVault Cloud-Connected Solutions

Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems

S O L U T I O N P R O F I L E. Riverbed and EMC Deliver Capacity-Optimized Cloud Storage for Backup, Recovery, Archiving, and DR

secure Agent Secure Enterprise Solutions

Transcription:

Managed Services - A Paradigm for Cloud- Based Business Continuity Ron McCracken IBM 6 February 2013 Session Number 12993

Agenda This session is intended to expose key requirements for support of enterprise data backup activities as a Managed Service. What do we mean by backup as a Managed Service? User Benefits Challenges and enabling technologies Keys to Success Note: Mention of specific Companies/Products in this presentation are intended as examples and does not necessarily constitute IBM endorsement of said Companies/Products

Legal Information The following are trademarks of the International Business Machines Corporation in the United States and/or other countries. AIX* DB2 Universal Database e-business logo* IBM* IBM eserver OS/390* OS/400* S/390* TotalStorage WebSphere* Tivoli* Tivoli Storage Manager IBM logo* * Registered trademarks of IBM Corporation The following are trademarks or registered trademarks of other companies. Intel is a trademark of the Intel Corporation in the United States and other countries. Java and all Java-related trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc., in the United States and other countries. Linux is a registered trademark of Linus Torvalds. Microsoft, W indows and W indows NT are registered trademarks of Microsoft Corporation. SET and Secure Electronic Transaction are trademarks owned by SET Secure Electronic Transaction LLC. UNIX is a registered trademark of The Open Group in the United States and other countries. * All other products may be trademarks or registered trademarks of their respective companies. Notes: Performance is in Internal Throughput Rate (ITR) ratio based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput improvements equivalent to the performance ratios stated here. IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply. All customer examples cited or described in this presentation are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics will vary depending on individual customer configurations and conditions. This publication was produced in the United States. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to change without notice. Consult your local IBM business contact for information on the product or services available in your area. All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Information about non-ibm products is obtained from the manufacturers of those products or their published announcements. IBM has not tested those products and cannot confirm the performance, compatibility, or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. Prices subject to change without notice. Contact your IBM representative or Business Partner for the most current pricing in your geography. This presentation and the claims outlined in it were reviewed for compliance with US law. Adaptations of these claims for use in other geographies must be reviewed by the local country counsel for compliance with local laws. IBM's customer is responsible for ensuring its own compliance with legal requirements. It is the customer's sole responsibility to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer's business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law.

Characteristics of backups as a managed service (BaaS) Still utilizes client-server architecture One or more elements of the backup solution live outside the company firewall Poses additional security concerns Even for a private cloud there is some exposure Generally involves web-based services, e.g: Subscription to a backup service Utilization of electronic data transfer to off-site DR storage Wide-Area networks are used This is typically the major technological obstacle for Enterprise-class solutions

Typical Architectures Public Cloud with local backup server sending data to cloud-based storage with local backup clients sending data to cloud-hosted backup server Public-private Cloud Private backup server Some data copies (typically Disaster Recovery (DR) copy) sent to a public cloud storage service Cloud Management of Private Infrastructure

Customers benefit from simplified information management Simplified infrastructure management, usually via a web portal Offload one or more Continuity Management functions to an MSP, e.g. Off-site DR data storage Backup server management Reduce staff training and infrastructure maintenance expense Simplify Capacity Planning (for backups, at least) to a simple fee-for-service Take better advantage of on-demand efficiencies Shift Service Level Management to a contractual, rather than technological, issue.

Data Security Poses a Challenge Data security is about preventing unauthorized data access. The Cloud exposes organization data If a public cloud is used, the backed-up data is outside the owning organization s control Once outside the firewall, data packets can be intercepted during transmission The same concern exists for tape media traditionally used for off-site (DR) data copies, so this is not entirely a new risk Agentless means Well-Known (to you AND attackers) Keep this in mind when evaluating backup technologies Geography may be important (different laws in different countries) The enabling technology is data encryption Utilize encryption (selectively) for sensitive data sent to (or through) public facilities Ideally, this should be a built-in capability of your backup software

Data Protection Concerns Data protection is about ensuring that data is not lost or corrupted. Use of an MSP does NOT eliminate the typical concerns, it merely makes them the responsibility of the MSP: Hardware failures Media degradation/failure Facility Disasters Migration of data from obsolete technology Add to these concerns the risks inherent in outsourcing critical functions to another company. The successful MSP will utilize technology and an architecture that fully protects the client data (including protection from a disaster to the MSP s primary storage site)

Network Bandwidth WAN networks re-introduce concerns for backup or DR windows that largely disappeared with the introduction of GB+ LAN/SAN capabilities. As with traditional LAN/SAN-based architectures, full DR restorations present the biggest challenge The problem can be insidious with backup software using continuous incremental backup approach Tends to drive large enterprise implementations to local primary backup, with DR copy in the cloud A combination of technology and management strategies are needed to deal with this issue

Network Utilization Strategies Use Continuous Data Protection Technology continuously backs up changes (file or block level) rather than doing periodic system-wide backup Use block-level (subfile) backup technology Use Network Accelerators Have a prioritized DR plan Use Information Lifecycle Management (ILM) to reduce the DR problem If you don t need it, delete it If you might need it later, archive it (and delete from local storage)

Data becomes inactive or obsolete Typically, only 20% of the information is active Of the remaining 80%, some is inactive, some is obsolete Governance >80% is inactive Information to be archived This information/data is mostly static and/or rarely accessed by users Information to be purged <20% is active This information/data is mostly dynamic and/or regularly accessed by users Archived information Policy based retention Tiered storage & mgmt Automation managed Production information Still routinely accessed High Access Service Level Fully managed Regular backups

Network Bandwidth Acceleration The concept of network acceleration is that by a combination of buffering and compression technologies the true network load can be reduced, and spikes leveled, resulting in a higher apparent bandwidth Data Compression Object compression Single Instance Store (SIS) Deduplication Network Accelerator Appliances Either real or virtual implementations available Typically a combination of local buffering and deduplication Different presentations, e.g. network share, IP address, etc. NOTE: These may, or may not, help much with restores depends on how they cache chunks to reconstruct objects

Network Accelerator: Riverbed Whitewater CIFS/NFS access by the Backup Server Appliance (real or virtual versions available) Ready for Tivoli Validated for use with Tivoli Storage Manager (TSM) https://www- 304.ibm.com/software/brandcatalog/ismlibrary/details?catalog.label=1TW1 0SM39 RDBMS FILES Backup Client Backup Client Backup Server NFS/ CIFS Backup Provider

Network Accelerator: Network Executive HyperIP TCP/IP access by the Backup Client Virtual Device Ready for Tivoli Validated for use with TSM: https://www- 304.ibm.com/software/brandcatalog/ismlibrary/details?catalog.label=1TW1 0SM44 RDBMS Backup Client TCP/IP HyperIP HyperIP Backup Provider FILES Backup Client TCP/IP

Front-safe TSM Portal The TSM Portal enables a cloud distribution model that allows the Datacenter (Portal Owner) to deliver their TSM infrastructure to end customers via a cloud service (10 s in each geography) The Portal Owner can sign up one or more Dealers (think VAD) Each Dealer can sign up one or more Partners (think VAR) (100 s in each geography) Portal Owners, Dealers and/or Partners can sign up end customers (1000 s in each geography) 1 5 https://www-304.ibm.com/software/brandcatalog/ismlibrary/details?catalog.label=1tw10sm45

Management Consoles TEC Tivoli IBM Opportunity -Increase customer retention -Grow TSM, TPC licence sales -Reduce dependency on IBM L1 Support MSP / Partner BMC CA HP Automation Service Mgmt Multi-tenancy tenancy Analysis CLOUD IBM Partner Opportunity -Grow profitable services business -Account intelligence -Account retention -Better utilize experts to grow business End User Value: Automation - Daily automated healthcheck - KPI management reporting - Automated Knowledgebase - Capacity and workload management Customers Customer A DC1 TSM servers Continuous Call Home for TSM and TPC DC2 TPC server DC1 https://www-304.ibm.com/software/brandcatalog/ismlibrary/details?catalog.label=1tw10sm1m Customer B TSM servers

Keys to BaaS User Success Know what Service Levels you need when you approach candidate vendors Backup and restore times The amount of data, its change characteristics, and number of versions you will want to retain Evaluate the Vendor Examine their financial situation as if your company s survival depends on it (it might!) Disaster Recovery Are they prepared for a disaster at their own facility What is their Recovery Point capability? Can they provide DR hot site facilities? Do the actual facilities measure up, and where are they? If possible, a site visit is recommended. Data Security Is data encrypted, and protected from unauthorized access?

Keys to MSP Success Choose software tools that support the essential enabling technologies, e.g. encryption, replication, etc. Have a solid knowledge foundation in your chosen backup software. Your customer will expect you to be the expert in this area. Some architectures will require you to do the deployment Decide on your target market, and deploy an architecture appropriate to that market. One size most assuredly DOES NOT fit all Consider offering hot-site recovery services Consider including ILM support Understand each customer s required service levels, be realistic about your capabilities, document the service level agreements, and finally TEST!

IBM Support Programs IBM Backed Up By Tivoli Program Subcategory under Ready for Tivoli Validated Solutions Listed in Integrated Service Management Library https://www- 304.ibm.com/software/brandcatalog/ismlibrary/search#rc=Ba ckedupbytsm

Managed Services - A Paradigm for Cloud- Based Business Continuity Ron McCracken IBM 6 February 2013 Session Number 12993