Module 4 STORAGE NETWORK BACKUP & RECOVERY
|
|
- Wilfrid McKenzie
- 6 years ago
- Views:
Transcription
1 Module 4 STORAGE NETWORK BACKUP & RECOVERY BC Terminology, BC Planning Lifecycle General Conditions for Backup, Recovery Considerations Network Backup, Services Performance Bottlenecks of Network Backup, Backup Clients, Back up file systems, Backup Databases, Next Generation Backup.
2 Introduction to Business Continuity (BC) Information Availability BC Terminology BC Planning Lifecycle
3 Business Continuity (BC) Business continuity encompasses planning and preparation to ensure that an organization can continue to operate in case of serious incidents or disasters and is able to recover to an operational state within a reasonably short period.
4 Business Continuity (BC) Business continuity (BC) is an integrated and enterprise wide process that includes all activities (internal and external to IT) that a business must perform to mitigate the impact of planned and unplanned downtime. It involves proactive measures, such as business impact analysis and risk assessments, data protection, and security, and reactive countermeasures, such as disaster recovery and restart, to be invoked in the event of a failure. The goal of a business continuity solution is to ensure the information availability required to conduct vital business operations.
5 Information Availability (IA) It refers to the ability of the infrastructure to function according to business expectations during its specified time of operation. Information availability ensures that people (employees, customers, suppliers, and partners) can access information whenever they need it. Information availability can be defined with the help of reliability, accessibility and timeliness.
6 Information Unavailability Various planned and unplanned incidents result in data unavailability: 1. Planned incidents include installation/ integration/ maintenance of new hardware, software upgrades, taking backups, application and data restores, facility operations (renovation and construction), and refresh/migration of the testing to the production environment. 2. Unplanned incidents include failure caused by database corruption, component failure, and human errors.
7 Another type of incident that may cause data unavailability is natural or man-made disasters such as flood, fire, earthquake, etc.
8 Fig: Cause of Information Unavailability
9 Measuring Information Availability 1. Mean Time Between Failure (MTBF): It is the average time available for a system or component to perform its normal operations between failures. 2. Mean Time To Repair (MTTR): It is the average time required to repair failed component. While calculating MTTR, it is assumed that the fault responsible for the failure is correctly identified
10 Measuring Information Availability Mean Time To Repair (MTTR): It includes the time required to do the following: detect the fault, mobilize the maintenance team, diagnose the fault, obtain the spare parts, repair, test, and resume normal operations.
11 Measuring Information Availability IA is the fraction of a time period that a system is in a condition to perform its intended function upon demand. It can be expressed in terms of system uptime and downtime and measured as the amount or percentage of system uptime: IA = system uptime / (system uptime + system downtime) In terms of MTBF and MTTR, IA could also be expressed as IA = MTBF / (MTBF + MTTR)
12 BC Terminology 1. Disaster recovery: This is the coordinated process of restoring systems, data, and the infrastructure required to support key ongoing business operations in the event of a disaster. It is the process of restoring a previous copy of the data and applying logs or other necessary processes to that copy to bring it to a known point of consistency. Once all recoveries are completed, the data is validated to ensure that it is correct.
13 BC Terminology 2. Disaster restart: This is the process of restarting business operations with mirrored consistent copies of data and applications. 3. Recovery-Point Objective (RPO): This is the point in time to which systems and data must be recovered after an outage. It defines the amount of data loss that a business can endure. A large RPO signifies high tolerance to information loss in a business.
14 BC Terminology 3. Recovery- Time Objective (RTO) : The time within which systems, applications, or functions must be recovered after an outage. It defines the amount of downtime that a business can endure and survive. Businesses can optimize disaster recovery plans after defining the RTO for a given data center or network.
15 BC Planning Lifecycle The BC planning lifecycle includes five stages : 1. Establishing objectives 2. Analyzing 3. Designing and developing 4. Implementing 5. Training, testing, assessing, and maintaining
16 Figure: BC planning lifecycle
17 BC Planning Lifecycle 1. Establishing objectives Determine BC requirements. Estimate the scope and budget to achieve requirements. Select a BC team by considering subject matter experts from all areas of the business, whether internal or external. Create BC policies.
18 BC Planning Lifecycle 2. Analyzing Collect information on data profiles, business processes, infrastructure support, dependencies, and frequency of using business infrastructure. Identify critical business needs and assign recovery priorities. Create a risk analysis for critical areas and mitigation strategies. Conduct a Business Impact Analysis (BIA). Create a cost and benefit analysis based on the consequences of data unavailability. Evaluate options
19 BC Planning Lifecycle 3. Designing and developing Define the team structure and assign individual roles and responsibilities. For example, different teams are formed for activities such as emergency response, damage assessment, and infrastructure and application recovery. Design data protection strategies and develop infrastructure. Develop contingency scenarios. Develop emergency response procedures. Detail recovery and restart procedures.
20 BC Planning Lifecycle 4. Implementing Implement risk management and mitigation procedures that include backup, replication, and management of resources. Prepare the Disaster Recovery (DR) sites that can be utilized if a disaster affects the primary data center. Implement redundancy for every resource in a data center to avoid single points of failure.
21 BC Planning Lifecycle 5. Training, testing, assessing, and maintaining Train the employees who are responsible for backup and replication of business-critical data on a regular basis or whenever there is a modification in the BC plan. Train employees on emergency response procedures when disasters are declared. Train the recovery team on recovery procedures based on contingency scenarios. Perform damage assessment processes and review recovery plans. Test the BC plan regularly to evaluate its performance and identify its limitations. Assess the performance reports and identify limitations. Update the BC plans and recovery/restart procedures to reflect regular changes within the data centre.
22 General Conditions for Backup Installed storage capacity doubles every 4-12 months depending upon the company requirement. The data set is thus often growing more quickly than the infrastructure in general (personnel, network capacity). Nowadays, business processes have to be adapted to changing requirements all the time. As business processes change, so the IT systems that support them also have to be adapted. As a result, the daily backup routine must be continuously adapted to the ever-changing IT infrastructure.
23 As a result of globalisation, the Internet and e- business, more and more data has to be available around the clock. Network backup can help us to get to grips with these problems.
24 Network Backup Services Network backup systems such as Arcserve (Computer Associates), NetBackup (Symantec/Veritas), Networker (EMC/Legato) and Tivoli Storage Manager (IBM) provide the following services: 1. Backup 2. Archive 3. Hierarchical Storage Management (HSM)
25 Network Backup Services Backup The main task of network backup systems is to back data up regularly. To this end, at least one up-to-date copy must be kept of all data, so that it can be restored after a hardware or application error ( file accidentally deleted or destroyed by editing, error in the database programming ).
26 Network Backup Services Archive The goal of archiving is to freeze a certain version of data so that precisely this version can be retrieved at a later date. For example, at the end of a project the data that was used can be archived on a backup server and then deleted from the local hard disk. This releases local disk space and accelerates the backup and restore processes, because only the data currently being worked on needs to be backed up or restored.
27 Network Backup Services Hierarchical Storage Management (HSM) HSM moves files that have not been accessed for a long time from the local disk to the backup server; only a directory entry remains in the local file server. The entry in the directory contains meta-information such as file name, owner, access rights, date of last modification and so on.
28 PERFORMANCE BOTTLENECKS OF NETWORK BACKUP 1. Application-specific performance bottlenecks 2. Performance bottlenecks due to server-centric IT architecture
29 1. Application-specific performance bottlenecks are all those bottlenecks that can be traced back to the network backup application. The main candidate is the metadata database. Almost every action in the network backup system is associated with one or more operations in the metadata database. If, for example, several versions of a file are backed up, an entry is made in the metadata database for each version.
30 1. Application-specific performance bottlenecks The backup of a file system with several hundreds of thousands of files can thus be associated with a whole range of database operations. A further candidate is the storage hierarchy: when copying the data from hard disk to tape the media manager has to load the data from the hard disk into the main memory via the I/O bus and the internal buses, only to forward it from there to the tape drive via the internal buses and I/O bus.
31 1. Application-specific performance bottlenecks This means that the buses can get clogged up during the copying of the data from hard disk to tape. The same applies to tape reclamation.
32 2. Performance bottlenecks due to servercentric IT architecture In a server-centric IT architecture storage devices only exist in relation to servers; access to storage devices always takes place via the computer to which the storage devices are connected. The performance bottlenecks described in the following apply for all applications that are operated in a server-centric IT architecture.
33 2. Performance bottlenecks due to servercentric IT architecture Let us assume that a backup client wants to back data up to the backup server Figure : In network backup, all data to be backed up must be passed through both computers. Possible performance bottlenecks are internal buses, CPU and the LAN.
34 2. Performance bottlenecks due to servercentric IT architecture The backup client loads the data to be backed up from the hard disk into the main memory of the application server via the SCSI bus, the PCI bus and the system bus, only to forward it from there to the network card via the system bus and the PCI bus. On the backup server the data must once again be passed through the buses twice.
35 2. Performance bottlenecks due to servercentric IT architecture During backup, therefore, the buses of the participating computers can become a bottleneck, particularly if the application server also has to bear the I/O load of the application or the backup server is supposed to support several simultaneous backup operations. The network card transfers the data to the backup server via TCP/IP and Ethernet. Previously the data exchange via TCP/IP was associated with a high CPU load. However, the CPU load caused by TCP/IP data traffic can be reduced using TCP/IP offload engines
36 BACKUP CLIENTS A platform-specific client (backup agent) is necessary for each platform to be backed up. The base client can back up and archive files and restores them if required. The term platform is used here to mean the various operating systems and the file systems that they support. Some base clients offer HSM for selected file systems. The backup of file systems takes place at file level as standard.
37 BACKUP CLIENTS This means that each changed file is completely re-transferred to the server and entered there in the metadata database. By using backup at volume level and at block level it is possible to change the granularity of the objects to be backed up. When backup is performed at volume level, a whole volume is backed up as an individual object on the backup server.
38 BACKUP CLIENTS Although this has the disadvantage that free areas, on which no data at all has been saved, are also backed up, only very few metadata database operations are necessary on the backup server and on the client side it is not necessary to spend a long time comparing which files have changed since the last backup. As a result, backup and restore operations can sometimes be performed more quickly at volume level than they can at file level. This is particularly true when restoring large file systems with a large number of small files.
39 BACKUP CLIENTS Backup on block level optimises backup for members of the external sales force, who only connect up to the company network now and then by means of a laptop via a dial-up line or the Internet. In this situation the performance bottleneck is the low transmission capacity between the backup server and the backup client.
40 BACKUP CLIENTS When backing up on block level the backup client additionally keeps a local copy of every file backed up. If a file has changed, it can establish which parts of the file have changed. The backup client sends only the changed data fragments (blocks) to the backup server. This can then reconstruct the complete file. Thus, when backing up on block level the quantity of data to be transmitted is reduced at the cost of storage space on the local hard disk.
41 BACKUP CLIENTS When backing up on block level the backup client additionally keeps a local copy of every file backed up. If a file has changed, it can establish which parts of the file have changed. The backup client sends only the changed data fragments (blocks) to the backup server. This can then reconstruct the complete file. Thus, when backing up on block level the quantity of data to be transmitted is reduced at the cost of storage space on the local hard disk.
42 BACKUP OF FILE SYSTEMS 1. Backup of file servers 2. Backup of file systems 3. Backup of NAS servers 4. The Network Data Management Protocol (NDMP)** (Note: For explanation refer Text Book1: page no. 288 to 291 )
43 BACKUP OF DATABASES 1. Functioning of database systems 2. Classical backup of databases 3. Next generation backup of databases (Note: For explanation refer Text Book1: page no. 299 to 303)
44 NEXT GENERATION BACKUP 1. Server-free backup 2. LAN-free backup 3. LAN-free backup with shared disk file systems 4. Backup using instant copies 5. Data protection using remote mirroring 6. Tape library sharing (Note: For explanation refer Text Book1: page no. 279 to 286 )
Information Storage and Management TM Volume 2 of 2 Student Guide. EMC Education Services
Information Storage and Management TM Volume 2 of 2 Student Guide EMC Education Services July 2009 1 2 Business Continuity Section 3 2009 EMC Corporation. All rights reserved. Introduction to Business
More informationIntroduction to Business continuity Planning
Week - 06 Introduction to Business continuity Planning 1 Introduction The purpose of this lecture is to give an overview of what is Business Continuity Planning and provide some guidance and resources
More informationBusiness Continuity and Disaster Recovery. Ed Crowley Ch 12
Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster
More informationAfter the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning
After the Attack Business Continuity Week 6 Part 2 Staying in Business Disaster Recovery Planning and Testing Steps Business continuity is a organization s ability to maintain operations after a disruptive
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 13 Business Continuity Objectives Define business continuity Describe the components of redundancy planning List disaster recovery
More informationDisaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper By Anton Els
Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper By Anton Els Copyright 2017 Dbvisit Software Limited. All Rights Reserved V3, Oct 2017 Contents Executive Summary...
More informationTOP REASONS TO CHOOSE DELL EMC OVER VEEAM
HANDOUT TOP REASONS TO CHOOSE DELL EMC OVER VEEAM 10 This handout overviews the top ten reasons why customers choose Data Protection from Dell EMC over Veeam. Dell EMC has the most comprehensive data protection
More informationECE Engineering Robust Server Software. Spring 2018
ECE590-02 Engineering Robust Server Software Spring 2018 Business Continuity: Disaster Recovery Tyler Bletsch Duke University Includes material adapted from the course Information Storage and Management
More informationIT CONTINUITY, BACKUP AND RECOVERY POLICY
IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption
More informationBUSINESS CONTINUITY: THE PROFIT SCENARIO
WHITE PAPER BUSINESS CONTINUITY: THE PROFIT SCENARIO THE BENEFITS OF A COMPREHENSIVE BUSINESS CONTINUITY STRATEGY FOR INCREASED OPPORTUNITY Organizational data is the DNA of a business it makes your operation
More informationDISASTER RECOVERY PRIMER
DISASTER RECOVERY PRIMER 1 Site Faliure Occurs Power Faliure / Virus Outbreak / ISP / Ransomware / Multiple Servers Sample Disaster Recovery Process Site Faliure Data Centre 1: Primary Data Centre Data
More informationHow to Protect Your Small or Midsized Business with Proven, Simple, and Affordable VMware Virtualization
How to Protect Your Small or Midsized Business with Proven, Simple, and Affordable VMware Virtualization January 2011 Business continuity and disaster recovery (BC/DR) planning is becoming a critical mandate
More informationArchiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments
Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that
More informationZYNSTRA TECHNICAL BRIEFING NOTE
ZYNSTRA TECHNICAL BRIEFING NOTE Backup What is Backup? Backup is a service that forms an integral part of each Cloud Managed Server. Its purpose is to regularly store an additional copy of your data and
More informationAudit & Advisory Services. IT Disaster Recovery Audit 2015 Report Date January 28, 2015
Audit & Advisory Services IT Disaster Recovery Audit 2015 Report Date January 28, 2015 Audit & Advisory Services Mission and Function The JCCC Audit & Advisory Services department provides an independent
More informationDisaster Recovery and Business Continuity
Disaster Recovery and Business A Rackspace White Paper Spring 2010 Summary The purpose of this guide is to cut through the jargon around Business and Disaster Recovery, explain the differences and help
More informationIBM Tivoli Storage Manager 6
Leverage next-generation data storage and recovery management capabilities IBM Tivoli Storage Manager 6 IBM Tivoli Storage Manager is the core component of an enterprise-wide data protection and recovery
More informationINFORMATION SECURITY- DISASTER RECOVERY
Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy
More informationData Sheet: High Availability Veritas Cluster Server from Symantec Reduce Application Downtime
Reduce Application Downtime Overview is an industry-leading high availability solution for reducing both planned and unplanned downtime. By monitoring the status of applications and automatically moving
More information10 Reasons Why Your DR Plan Won t Work
10 Reasons Why Your DR Plan Won t Work Jim Damoulakis CTO, GlassHouse Technologies, Inc. Sept. 29, 2005 DR Vision Imagine Prepared to handle multiple categories of disaster Clearly documented policies
More informationBackup vs. Business Continuity
EBOOK Backup vs. Business Continuity 1 datto.com Data protection solutions are essential for businesses of all sizes to implement, regardless of size, industry and geographic location. In this white paper,
More informationBusiness Continuity Plan Executive Overview
Business Continuity Plan Executive Overview In terms of business continuity and disaster recovery planning, Harland Clarke s mission is to ensure the availability of critical business functions and Information
More informationEMC CLARiiON CX3-40. Reference Architecture. Enterprise Solutions for Microsoft Exchange 2007
Enterprise Solutions for Microsoft Exchange 2007 EMC CLARiiON CX3-40 Metropolitan Exchange Recovery (MER) for Exchange Server Enabled by MirrorView/S and Replication Manager Reference Architecture EMC
More informationContingency Planning and Disaster Recovery
Contingency Planning and Disaster Recovery Best Practices Version: 7.2.x Written by: Product Knowledge, R&D Date: April 2017 2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International
More informationBME CLEARING s Business Continuity Policy
BME CLEARING s Business Continuity Policy Contents 1. Introduction 1 2. General goals of the Continuity Policy 1 3. Scope of BME CLEARING s Business Continuity Policy 1 4. Recovery strategies 2 5. Distribution
More informationFlorida State University
Florida State University Disaster Recovery & Business Continuity Planning Overview October 24, 2017 1 Key Readiness Questions Has your department identified the business functions and infrastructure that
More informationDisaster Recovery Planning: Is Your Plan in Place? Presented by: Steve Shofner, CISA, CGEIT
Disaster Recovery Planning: Is Your Plan in Place? Presented by: Steve Shofner, CISA, CGEIT 1 The material appearing in this presentation is for informational purposes only and is not legal or accounting
More informationContinuity of Business
White Paper Continuity of Business SAS Continuity of Business initiative reflects our commitment to our employees, to our customers, and to all of the stakeholders in our global business community to be
More informationWhite Paper. Disaster Recovery in the Cloud
White Paper Disaster Recovery in the Cloud Disaster Recovery in the Cloud Disaster recovery (DR) is the ability to handle site failures with minimal disruptions to a business. This is an essential capability
More informationRejuvenating BCM - Infrastructure. Business Continuity Awareness Week March 2009
Rejuvenating BCM - Infrastructure Business Continuity Awareness Week 23 27 March 2009 Brigitte Theuma MBCI, CBCMMA, CBCMP, CBCITP, MIAEM 23 March 2009 Total of 5 pages Table of Contents I. ICT Service
More informationMaximum Availability Architecture: Overview. An Oracle White Paper July 2002
Maximum Availability Architecture: Overview An Oracle White Paper July 2002 Maximum Availability Architecture: Overview Abstract...3 Introduction...3 Architecture Overview...4 Application Tier...5 Network
More informationUPS system failure. Cyber crime (DDoS ) Accidential/human error. Water, heat or CRAC failure. W eather related. Generator failure
BEST PRACTICES: LEVERAGING CLOUD AND COLOCATION TO AVOID DOWNTIME Business continuity implementations that address traditional and emerging threats KEY TAKEAWAYS The cost for unplanned downtime has never
More informationDisaster Recovery Is A Business Strategy
Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...
More informationHigh Availability and Disaster Recovery Solutions for Perforce
High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce
More informationProjectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
More informationDisaster Recovery Planning: Weighing your customer s options
Disaster Recovery Planning: Weighing your Even though backing up data and developing a plan to restore it isn't the first step in business continuity planning (BCP), it's still a cornerstone. Without a
More informationLeveraging ITIL to improve Business Continuity and Availability. itsmf Conference 2009
Leveraging ITIL to improve Business Continuity and Availability Samuel Lo MBA, MSc, CDCP, PMP, CISSP, CISA Data Centre Services Manager COL Limited Strictly Business itsmf Conference 2009 25 February 2009
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR HONG KONG
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR HONG KONG 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationIntroduction 1.1 SERVER-CENTRIC IT ARCHITECTURE AND ITS LIMITATIONS
1 Introduction The purpose of this chapter is to convey the basic idea underlying this book. To this end we will first describe conventional server-centric IT architecture and sketch out its limitations
More informationInterSystems High Availability Solutions
InterSystems High Availability Solutions Version 2018.1.1 2018-08-13 InterSystems Corporation 1 Memorial Drive Cambridge MA 02142 www.intersystems.com InterSystems High Availability Solutions InterSystems
More informationEMC GLOBAL DATA PROTECTION INDEX STUDY KEY RESULTS & FINDINGS FOR THE USA
EMC GLOBAL DATA PROTECTION INDEX STUDY KEY RESULTS & FINDINGS FOR THE USA 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationInformation Systems. Data Protection Disaster recovery Backups
Information Systems Data Protection Disaster recovery Backups Data protection act 1998 - Rights The rights of data subjects People whose personal data is stored are called data subjects. The DPA sets uprights
More informationEMS TM Continuity
EMS TM Email Continuity Email Management Services Architectural overview for Lotus Notes-Centric environments Dell IT Management Software as a Service THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY,
More informationVeritas Cluster Server from Symantec
Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overviewview protects your most important applications from planned and unplanned downtime.
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDIA
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDIA 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationIPMA State of Washington. Disaster Recovery in. State and Local. Governments
IPMA State of Washington Disaster Recovery in State and Local Governments Disaster by the Numbers Over 70% of agencies had some sort of data loss incident in 2012 Under 5% report that they were able to
More informationHP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version :
HP HP0-771 Designing and Implementing HP Enterprise Backup Solutions Download Full Version : http://killexams.com/pass4sure/exam-detail/hp0-771 A. copy backup B. normal backup C. differential backup D.
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR UAE
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR UAE 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDONESIA
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDONESIA 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GlOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationTake Back Lost Revenue by Activating Virtuozzo Storage Today
Take Back Lost Revenue by Activating Virtuozzo Storage Today JUNE, 2017 2017 Virtuozzo. All rights reserved. 1 Introduction New software-defined storage (SDS) solutions are enabling hosting companies to
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR BRAZIL
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR BRAZIL 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationHYBRID CLOUD BACKUP & DISASTER RECOVERY
HYBRID CLOUD BACKUP & DISASTER RECOVERY What is NexProtect? NexProtect is a cost-effective, Hybrid Cloud Backup & Disaster Recovery solution that meets your business needs with an on-site appliance that
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR ITALY
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR ITALY 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationITIL overview Service Delivery. Jaroslav Procházka
ITIL overview Service Delivery Jaroslav Procházka Content Service Delivery processes Service Level Management IT Financial Management Capacity Management Availability Management IT Service Continuity Management
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AMERICAS
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AMERICAS 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR APJ
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR APJ 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationThe Problem. Business Continuity/ Disaster Recovery. Course Outline and Structure. The Problem The Coverage. Sean Gunasekera
Course Outline and Structure Week 1 Security Governance Week 2 Managing Security in the organisation Risk Management Week 3 Risk management Breaches, threats, vulnerabilities Week 4 IS security access
More informationCLOUDALLY EBOOK. Best Practices for Business Continuity
CLOUDALLY EBOOK 8 Disaster Recovery Best Practices for Business Continuity Introduction Disaster can strike at any moment, and it s impossible to plan for every eventuality. When Hurricane Katrina hit
More informationBusiness Continuity and Disaster Recovery Disaster-Proof Your Business
Business Continuity and Disaster Recovery Disaster-Proof Your Business Jon Bock Senior Product Marketing Manager October 16, 2008 Agenda Disaster Recovery Requirements and Challenges Disaster Recovery
More informationNew England Data Camp v2.0 It is all about the data! Caregroup Healthcare System. Ayad Shammout Lead Technical DBA
New England Data Camp v2.0 It is all about the data! Caregroup Healthcare System Ayad Shammout Lead Technical DBA ashammou@caregroup.harvard.edu About Caregroup SQL Server Database Mirroring Selected SQL
More informationTUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY
JUNE 2017 TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY OVERVIEW The intent of this document is to provide external customers and auditors with a high-level overview of the Tufts Health Plan Corporate
More informationRediffmail Enterprise High Availability Architecture
Rediffmail Enterprise High Availability Architecture Introduction Rediffmail Enterprise has proven track record of 99.9%+ service availability. Multifold increase in number of users and introduction of
More informationThe Data Protection Rule and Hybrid Cloud Backup
The 3-2-1 Data Protection Rule and Hybrid Cloud Backup IT teams are under extreme pressure to improve backup, disaster recovery and data protection to eliminate downtime and facilitate digital transformation.
More informationHow to Protect SAP HANA Applications with the Data Protection Suite
White Paper Business Continuity How to Protect SAP HANA Applications with the Data Protection Suite As IT managers realize the benefits of in-memory database technology, they are accelerating their plans
More informationLevel 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) Cloud Services
9628-08 Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) 9628-808 Cloud Services Sample question paper Duration: 60 minutes Candidate s name: Candidate s
More informationIBM Storage Software Strategy
IBM Storage Software Strategy Hakan Turgut 1 Just how fast is the data growing? 128 GB/ person The World s total data per person No Problem I I think I can do this We have a problem 24 GB/ person 0.8 GB/
More informationEMC Celerra CNS with CLARiiON Storage
DATA SHEET EMC Celerra CNS with CLARiiON Storage Reach new heights of availability and scalability with EMC Celerra Clustered Network Server (CNS) and CLARiiON storage Consolidating and sharing information
More informationWhite Paper: Backup vs. Business Continuity. Backup vs. Business Continuity: Using RTO to Better Plan for Your Business
Backup vs. Business Continuity: Using RTO to Better Plan for Your Business Executive Summary SMBs in general don t have the same IT budgets and staffs as larger enterprises. Yet just like larger organizations
More informationIBM TS7700 grid solutions for business continuity
IBM grid solutions for business continuity Enhance data protection and business continuity for mainframe environments in the cloud era Highlights Help ensure business continuity with advanced features
More informationTechnology Insight Series
EMC Avamar for NAS - Accelerating NDMP Backup Performance John Webster June, 2011 Technology Insight Series Evaluator Group Copyright 2011 Evaluator Group, Inc. All rights reserved. Page 1 of 7 Introduction/Executive
More informationPowerVault MD3 Storage Array Enterprise % Availability
PowerVault MD3 Storage Array Enterprise 99.999% Availability Dell Engineering June 2015 A Dell Technical White Paper THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS
More informationBackups and archives: What s the scoop?
E-Guide Backups and archives: What s the scoop? What s a backup and what s an archive? For starters, one of the differences worth noting is that a backup is always a copy while an archive should be original
More informationCopyright 2012 EMC Corporation. All rights reserved.
1 TRANSFORM IT+BUSINESS+YOURSELF DISASTER RECOVERY FOR MISSION CRITICAL APPLICATIONS EMC FORUM 2012 SKOPJE Dejan Živanović Presales Manager Dejan.Zivanovic@emc.com 2 Cloud A New Architecture Old World
More informationNWPPA2016. Disaster Recovery NWPPA Reno, NV Copyright 2016, IVOXY Consulting, LLC
NWPPA2016 Disaster Recovery NWPPA Reno, NV Copyright 2016, IVOXY Consulting, LLC About Us Our Consulting Services We perform assessments, design, implementation, project management, support & training
More informationExam : A : Assess: Fundamentals of Applying Tivoli Storage Management V3. Title. Version : Demo
Exam : A2010-564 Title : Assess: Fundamentals of Applying Tivoli Storage Management V3 Version : Demo 1.Which difference is reflected in a gap analysis? A. between software versions B. between expected
More informationUniversity Information Technology Data Backup and Recovery Policy
University Information Technology Data Backup and Recovery Policy I. Purpose and Scope A. The purpose of this policy is to document the University of Utah Information Technology (UIT) data backup and recovery
More informationHigh Availability- Disaster Recovery 101
High Availability- Disaster Recovery 101 DBA-100 Glenn Berry, Principal Consultant, SQLskills.com Glenn Berry Consultant/Trainer/Speaker/Author Principal Consultant, SQLskills.com Email: Glenn@SQLskills.com
More informationReal-time Protection for Microsoft Hyper-V
Real-time Protection for Microsoft Hyper-V Introduction Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate of customer adoption. Moving resources to
More informationProtecting Microsoft Hyper-V 3.0 Environments with Arcserve
Protecting Microsoft Hyper-V 3.0 Environments with Arcserve Adding value to your Hyper-V environment. Today, you face demanding service level agreements (SLAs) while having to address staffing and budget
More informationECE Enterprise Storage Architecture. Fall 2018
ECE590-03 Enterprise Storage Architecture Fall 2018 Business Continuity: Disaster Recovery Tyler Bletsch Duke University Includes material adapted from the course Information Storage and Management v2
More informationHigh Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc.
High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. Table of Contents Section I: The Need for Warm Standby...2 The Business Problem...2 Section II:
More informationNetwork Performance, Security and Reliability Assessment
Network Performance, Security and Reliability Assessment Presented to: CLIENT NAME OMITTED Drafted by: Verteks Consulting, Inc. 2102 SW 20 th Place, Suite 602 Ocala, Fl 34474 352-401-0909 ASSESSMENT SCORECARD
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR TURKEY
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR TURKEY 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationChapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/
Chapter 1 Storage Concepts 4 - Storage Concepts In order to understand CommVault concepts regarding storage management we need to understand how and why we protect data, traditional backup methods, and
More informationExam Name: Midrange Storage Technical Support V2
Vendor: IBM Exam Code: 000-118 Exam Name: Midrange Storage Technical Support V2 Version: 12.39 QUESTION 1 A customer has an IBM System Storage DS5000 and needs to add more disk drives to the unit. There
More informationBreakthrough Data Recovery for IBM AIX Environments
Breakthrough Data Recovery for IBM AIX Environments How New Technologies Are Making Data Protection, Recovery and High Availability Easier and More Affordable Introduction Downtime and data loss pose intolerable
More informationDesigning Data Protection Strategies for Lotus Domino
WHITE PAPER Designing Data Protection Strategies for Lotus Domino VERITAS Backup Exec 10 for Windows Servers Agent for Lotus Domino 1/17/2005 1 TABLE OF CONTENTS Executive Summary...3 Introduction to Lotus
More informationMicrosoft E xchange 2010 on VMware
: Microsoft E xchange 2010 on VMware Availability and R ecovery Options This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more
More informationEXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year!
EXAMGOOD QUESTION & ANSWER Exam Good provides update free of charge in one year! Accurate study guides High passing rate! http://www.examgood.com Exam : A2010-564 Title : Assess: Fundamentals of Applying
More informationTitan SiliconServer for Oracle 9i
Titan SiliconServer for 9i Abstract Challenges facing deployment include the ever-growing size of the database and performance scalability. Enterprise businesses rely heavily on databases for day-to-day
More informationGlobal Headquarters: 5 Speen Street Framingham, MA USA P F
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER VERITAS Bare Metal Restore: Automating Recovery from Server Failure Sponsored by: VERITAS
More informationBusiness Continuity & Disaster Recovery
Business Continuity & Disaster Recovery Technology and Process Alessio Di Benedetto Presales Manager Roma, 7 th of May 2010 1 Objectives The objective of this workshop is to provide: an overview of the
More informationTSM Paper Replicating TSM
TSM Paper Replicating TSM (Primarily to enable faster time to recoverability using an alternative instance) Deon George, 23/02/2015 Index INDEX 2 PREFACE 3 BACKGROUND 3 OBJECTIVE 4 AVAILABLE COPY DATA
More informationIn this unit we are going to review a set of computer protection measures also known as countermeasures.
1 In this unit we are going to review a set of computer protection measures also known as countermeasures. A countermeasure can be defined as an action, device, procedure, or technique that reduces a threat,
More informationDesigning Data Protection Strategies for Oracle Databases
WHITE PAPER Designing Data Protection Strategies for Oracle Databases VERITAS Backup Exec 9.0 for Windows Servers Agent for Oracle VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Introduction...3
More informationHow Does Failover Affect Your SLA? How Does Failover Affect Your SLA?
How Does Failover Affect Your SLA? How Does Failover Affect Your SLA? Dr. Bill Highleyman Dr. Managing Bill Highleyman Editor, Availability Digest Managing HP NonStop Editor, Technical Availability Boot
More informationSOLUTION BRIEF RSA ARCHER BUSINESS RESILIENCY
RSA ARCHER BUSINESS RESILIENCY INTRODUCTION Organizations are becoming a complex tapestry of products and services, processes, technologies, third parties, employees and more. Each element adds another
More informationSolution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Subject Governing Agreement Term DXC Services Requirements Agreement between DXC and Customer
More informationUsing Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager
White Paper Using Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager Author(s): Computer Associates International and Microsoft Corporation Published September 2005 Abstract
More informationEdge for All Business
1 Edge for All Business Datasheet Zynstra is designed and built for the edge the business-critical compute activity that takes place outside a large central datacenter, in branches, remote offices, or
More information