QStar White Paper. Tiered Storage



Similar documents
Symantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

THE CASE FOR ACTIVE DATA ARCHIVING

IBM Tivoli Storage Manager

Solution Brief: Creating Avid Project Archives

OPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006

Accelerating Backup/Restore with the Virtual Tape Library Configuration That Fits Your Environment

Sales Tool. Summary DXi Sales Messages November NOVEMBER ST00431-v06

IBM Tivoli Storage Manager

Application Brief: Using Titan for MS SQL

STORAGE CENTER. The Industry s Only SAN with Automated Tiered Storage STORAGE CENTER

IBM Tivoli Storage Manager 6

Energy Efficient Storage - Multi- Tier Strategies For Retaining Data

WHITEPAPER. 7 Reasons Why Businesses are Shifting to Cloud Backup

AUTOMATED DATA RETENTION WITH EMC ISILON SMARTLOCK

Virtual Disaster Recovery

Oracle Database Backup Service. Secure Backup in the Oracle Cloud

ETERNUS CS800 data protection appliance featuring deduplication to protect your unique data

EaseTag Cloud Storage Solution

Multi-Terabyte Archives for Medical Imaging Applications

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Technology Insight Series

Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities

Protect Microsoft Exchange databases, achieve long-term data retention

Versity All rights reserved.

Acme Corporation Enterprise Storage Assessment Prepared by:

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments

Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication

DEFINING THE RIGH DATA PROTECTION STRATEGY

Effective Storage Management for Cloud Computing

How To Use An Npm On A Network Device

Enhanced Protection and Manageability of Virtual Servers Scalable Options for VMware Server and ESX Server

Library Recovery Center

Thin Provisioning: Using Intelligent Storage Virtualization Technology for More Efficient Use of Storage Assets

BACKUP IS DEAD: Introducing the Data Protection Lifecycle, a new paradigm for data protection and recovery WHITE PAPER

Technology Insight Series

Reduce your data storage footprint and tame the information explosion

EMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise

Automated file management with IBM Active Cloud Engine

Archiving, Backup, and Recovery for Complete the Promise of Virtualization

How To Protect Data On Network Attached Storage (Nas) From Disaster

Disk-to-Disk Backup & Restore Application Note

DATA PROGRESSION. The Industry s Only SAN with Automated. Tiered Storage STORAGE CENTER DATA PROGRESSION

The software platform for storing, preserving and sharing very large data sets.

ARCHIVING FOR DATA PROTECTION IN THE MODERN DATA CENTER. Tony Walker, Dell, Inc. Molly Rector, Spectra Logic

ETERNUS CS High End Unified Data Protection

<Insert Picture Here> Oracle Secure Backup 10.3 Secure Your Data, Protect Your Budget

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

LTO4 Hardware Encryption Best Practices. By Vic Ludlam Distributed by Dynamic Solutions International

Using the NDMP File Service for DMA- Driven Replication for Disaster Recovery. Hugo Patterson

for Oil & Gas Industry

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.

Solutions White Paper. Using Storage Virtualization. to Meet the Challenges of Rapid Data Growth

Hitachi Cloud Service for Content Archiving. Delivered by Hitachi Data Systems

ENTERPRISE STORAGE WITH THE FUTURE BUILT IN

Optimizing and Managing File Storage

Instant Recovery for VMware

Backup, Recovery & Archiving. Choosing a data protection strategy that best suits your IT requirements and business needs.

Why Plan B DR? Benefits of Plan B Disaster Recovery Service:

Yiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1

Backup and Recovery: The Benefits of Multiple Deduplication Policies

Active Archive - Data Protection for the Modern Data Center. Molly Rector, Spectra Logic Dr. Rainer Pollak, DataGlobal

Effective storage management and data protection for cloud computing

THE FUTURE IS FLUID.

Optimizing Storage for Better TCO in Oracle Environments. Part 1: Management INFOSTOR. Executive Brief

Business-centric Storage for small and medium-sized enterprises. How ETERNUS DX powered by Intel Xeon processors improves data management

WHITE PAPER: ENTERPRISE SOLUTIONS. Effective Enterprise Data Management with Veritas NetBackup and Symantec Enterprise Vault Software Solutions

Case Studies. Data Sheets : White Papers : Boost your storage buying power... use ours!

2011 FileTek, Inc. All rights reserved. 1 QUESTION

Archive 8.0 for File Systems and NAS Optimize Storage Resources, Reduce Risk and Improve Operational Efficiencies

Whitepaper: archiving and storage management solution for compliance, retention management and electronic discovery

Global Namespace The Future of Distributed File Server Management

StorageX 7.5 Case Study

Protecting your SQL database with Hybrid Cloud Backup and Recovery. Session Code CL02

Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems

Efficiently Protect, Manage and Access Big Data. Nigel Tozer Business Development Director EMEA

Business-centric Storage for small and medium-sized enterprises. How ETERNUS DX powered by Intel Xeon processors improves data management

Slash Storage Costs, Archive to the Cloud

Data Protection. the data. short retention. event of a disaster. - Different mechanisms, products for backup and restore based on retention and age of

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide

City of Lawrence Administrative Policy

Information Lifecycle Management

Oracle Secure Backup 10.2 Policy-Based Backup Management. An Oracle White Paper December 2007

Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module

It s All About Restoring Your Data Achieving Rapid Business Resumption with Highly Efficient Disk-to-Disk Backup & Restore

Simplify Your Windows Server Migration

XenData Archive Series Software Technical Overview

Recovering Microsoft Office SharePoint Server Data. Granular search and recovery means time and cost savings.

Symantec NetBackup OpenStorage Solutions Guide for Disk

Protecting SQL Server Databases Software Pursuits, Inc.

NetApp Replication-based Backup

Planning for a Disaster Using Tivoli Storage Manager. Laura G. Buckley Storage Solutions Specialists, Inc.

Perforce Backup Strategy & Disaster Recovery at National Instruments

Conquering the Top 5 Enterprise Data Protection Challenges

Reduced Complexity with Next- Generation Deduplication Innovation

Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect

WHITE PAPER MOVING BEYOND BATCH BACKUP. Practical Steps to Improve Data Protection & Dramatically Reduce Backup Software Licensing Costs

IBM Global Technology Services November Successfully implementing a private storage cloud to help reduce total cost of ownership

IBM Tivoli Storage Manager

Transcription:

QStar White Paper Tiered Storage

QStar White Paper Tiered Storage Table of Contents Introduction 1 The Solution 1 QStar Solution 3 Conclusion 4 Copyright 2007 QStar Technologies, Inc.

QStar White Paper Tiered Storage Introduction The Data Management Dilemma IT organizations today are facing relentless growth of data volumes. Applications are creating more and larger files. Users rarely delete data making access to files more time consuming, contributing to lower productivity. The price of hard disk storage has come down significantly over the last 5 years. Thus, the trend has been to buy more hardware. This solution, however, creates complex and cumbersome storage environments that require more maintenance, management and money to operate. Buying hardware also breeds inefficiency. IT departments often set aside large amounts of free storage space to prevent capacity failures. Analysts report UNIX and Windows storage utilization rates from 20 to 50 percent. On top of this, consider that 60 to 80 percent of the data in these systems has often not been accessed in months or even years. These architectures waste system resources, require more attention from administrators, increase backup costs and take longer to restore from failure. By addressing these inefficiencies, organizations can tap into unused storage space they have already purchased, streamline data protection and disaster recovery operations, consolidate hardware and reduce operational overhead. To accomplish this, there are only a few viable options, delete data or move it. Corporate data is increasing by 50 to 70 percent per year. --Horison Information Strategies Data deletion will free up significant amounts of space, but is not always ideal. Deletion is a manual process that carries the risks of data loss and unpleasant legal ramifications, as many regulations prevent data from being deleted or destroyed. Archiving can be automated, but forces companies to train and support users on the archive application and often requires dedicated storage. The Solution Storage management through the utilization of tiers has brought about a means of managing data over a network in which the data resides on specific storage devices based on the value of the date. Intelligent storage management software that facilitates the management of files across storage resources to house data in the most appropriate media given its usage patterns and value to the organization is the basic concept behind tiered storage management. Heavily used or time sensitive data is stored on high performance media and static data resides on less costly removable media. Client Server NAS Server 1 Copyright 2007 QStar Technologies, Inc.

QStar White Paper Tiered Storage Migration/Deletion Policies Time Modification or Access Threshold Watermarks File Types Extensions Search Regular Expressions File Size Greater Than, Less Than, Between Two Sizes Administrators create policies to sweep storage looking for files of a certain age, size, name, type or location. When the storage management application finds a file that meets the policy, it is copied to alternate storage device. Once the data is moved to the appropriate location, the application can delete the original file and create a placeholder or tag for the file, allowing users and applications seamless access to the data, regardless of its physical location. Because of the policy-based nature of tiered storage management, it is ideal for managing the data lifecycle. When data is created and used heavily, it resides on the fastest disks for fast access. As files are accessed less frequently, the software moves data to less costly, lower performance disk such as a SATA-NAS device. The application can also leverage tape and optical libraries as storage. Tiered storage management applications also have the ability to monitor disk capacity and react to critical capacity conditions. The software is configured to provide a minimum amount of free space on a given volume, say 20 percent. If the software detects that the volume has less than 20 percent of capacity available, data is relocated from the volume to alternate media. Space is immediately freed and the administrator can address the capacity issue when she/he has the time. 80% Valuable in its own right, this feature also allows organizations to increase their utilization rates and therefore consolidate their hardware. Much of the unused storage on a disk is allocated so that users and applications have sufficient free space. Administrators would rather over-provision storage than have to spend all day, every day managing it. By using a policy based tiered storage methodology to monitor storage and automatically move data, administrators can run disks at 70 to 80 percent of capacity without fear of out-of-space failures. This allows each server to store more of the active data. Since there is less data to store on the disk, and because less of the disk is dedicated to free space, organizations need less hardware and can reduce the number of servers in their environment. Copyright 2007 QStar Technologies, Inc. 2

QStar White Paper Tiered Storage QStar Solution An efficient storage environment streamlines operations like backup and restore which complete much more quickly and consume far less media. Backup jobs will only copy the small placeholder file rather than the entire file. Since the migrated files have not been accessed, their data has not changed since it was last backed up and does not need to be copied again. Restores are also more efficient. Rather than restore all the data in the environment, administrators need only concern themselves with restoring the data that is critical to getting operations running again. The tiered based managed data, which hadn t been used in x number of days anyway, can be restored when the time is available. QStar Network Migrator utilizes advanced policy management for client side data movement to NAS storage servers on the network. QStar MultiStor utilizes advanced policy management for NAS server based data movement through storage tiers to archive devices. By combining the two products, QStar can move data from client side server applications to NAS storage pools on the network, and then to archive hardware once the data is no longer accessed frequently. Either one or a combination of File Modification, File Extensions, Regular Expression Searches and High Water Mark attributes can define policies. Once archive retention dates have been met, QStar MultiStor or Network Migrator are also designed to automatically delete files based on individual rules set on a monitored file system basis. Both Network Migrator and MultiStor manage the following properties: Time Based Creation or Modification Dates can be monitored and files can be automatically archived when certain thresholds are met. Many implementations include a scan and approval phase that must be completed before the file can be archived. These same criteria can also be monitored for automatic deletion when certain time thresholds are met. This is essential for companies requiring compliancy solutions. Extensions Certain files may be automatically archived dependent upon the extensions. Alternatively, an exclusion list can be created to migrate all files except the files matching the extensions listed. In addition specific file extensions may be flagged for deletion. This is effective when monitoring user home directories to remove non-authorized material or when temporary files need not be archived. Search Criteria Files will be archived when the file s name matches a specified pattern, i.e. Archive any file with the string project1 in the name. Files can also be deleted based on a file s name matching a specified pattern. This method can be used to remove all the files from a finished project that share a common nomenclature. Disk Usage Files will be archived when a certain space threshold is reached. This policy ensures that the monitored file space never reaches full capacity, causing an Out of Space error. 3 Copyright 2007 QStar Technologies, Inc.

QStar White Paper Tiered Storage File Size The system is designed to identify and archive or delete all files that are larger than, smaller than or in between the range of two size values. This policy ensures larger files do not consume large quantities of primary storage space. Copy on Close MultiStor and Storage Migrator can be set to copy files to removable archive media when they are closed after creation, a file is renamed, a file attribute is changed, or an existing file is modified. Files that have been archived to removable archive media no longer need to be backed up, and thus reducing the backup window, adding to the overall return on investment. Synchronized Closed Files (Copy and Verify) The Synchronized Closed File option allows synchronizing an existing file system to an Integral Volume set. This utility is used to copy local files to an alterative location making a complete real time copy of the source data. This feature can be used to provide a real time backup copy of a data set, eliminating the time it takes to facilitate a restore during the recovery process after a server or system failure. File Versioning MultiStor or Network Migrator will compare the modification date and file size of the source file and the file on the specific remote destination. If they match, the system will re-link to the current remote file that already exists. Should either the modification date or the file size not match, then the remote file will be renamed with the time stamp extension and the source file will be migrated to the remote location maintaining the files original name. Conclusion Today s businesses requires policy based data management, a multi-tiered storage infrastructure to meet the varying service levels and cost requirements, and active archiving solutions to retain information for regulatory, legal, intellectual property and other requirements. An active approach to these challenges saves companies considerable amounts of money, increases worker productivity, as well as reducing the risk of legal or regulatory issues. In addition, it improves the service levels of a business. Copyright 2007 QStar Technologies, Inc. 4

info@qstar.com info@qstar.it www.qstar.com Copyright 2008 QStar Technologies, Inc. All rights reserved