Hyperconverged Infrastructure Data Protection Isn t a Snap

Size: px
Start display at page:

Download "Hyperconverged Infrastructure Data Protection Isn t a Snap"

Transcription

1 Hyperconverged Infrastructure Data Protection Isn t a Snap

2 CONTENTS From Virtualized to Hyperconverged Hyperconvergence for What?... 3 Hyperconvergence = New Threats: Understand Data Protection and the Implications in an HCI.. 4 Understand Data Protection Basics to Understand its Role for HCI Projects... 2 Hyperconverged Data Protection... 5 Array-Based Snapshots Are Not Backups... 5 Hypervisor Snapshots... 6 Where Snapshots Fall Short... 7 Choosing the Right Approach for HCIs... 8 Quantum and Veeam: Data Protection for Hyperconverged Environments Hyperconverged Infrastructure Data Protection Isn t a Snap

3 FROM VIRTUALIZED TO HYPERCONVERGED Simplification and cost reduction have always been the holy grail of IT managers. Beginning in the 1960s, IT managers used virtualization as a method of logically dividing the system resources provided by a mainframe computer between applications. The next wave of virtualization resurgence in 2005 was based on x86 machines its objectives were to do more with less and make IT administrators lives easier. Lately, this do-more-with-less approach called hyperconvergence is expanding out of the server scope to reach not only the compute layer, but also data storage devices and networking equipment. The concept is simple include storage, compute, and networking in one box. A single preconfigured appliance greatly simplifies management and maintenance. Over the last year, we ve seen even more convergence in the hyperconverged infrastructure (HCI). HCI solutions include the converged layer components storage, compute, and networking as well as a hypervisor (as used in virtual environments), all managed through a single interface. It s an IT stack in a box. This software-centric architecture represents the current ultimate simplification. A vendor provides a preconfigured solution with hardware and software in a single system minimizing compatibility issues and simplifying management. The system is designed and must be managed and used as a single system it can t be broken down into separate components. In parallel with HCI development, vendors have created the next level of abstraction software-defined data centers (SDDCs). With SDDCs, all of the elements in an IT stack are fully virtualized and delivered as a service. Some vendors define their solutions as software-defined hyperconverged appliances. To simplify the discussion in this paper, we ll consider SDDC and HCI to be in the same category. Hyperconvergence for What? For smaller companies with relatively few virtual machines (VMs), an HCI solution may be the only architecture their data center needs, providing the ultimate simplification. However, the larger the environment, the more complex the storage and network design can be. Typical HCI workloads are VMs, virtual desktop infrastructures (VDIs), and disaster recovery (DR) sites. Some critical applications can also be hosted on an HCI, but designing an HCI to meet performance service-level agreements (SLAs) might be challenging compared to designing a more traditional infrastructure. Simplification can create complexity especially when HCI and existing independent IT components are deployed in the same environment. Hyperconverged Infrastructure Data Protection Isn t a Snap 3

4 Hyperconvergence = New Threats: Understand Data Protection and the Implications in an HCI Data protection is the process of safeguarding important information from corruption and/or loss. The term data protection is used to describe both operational backup of data as well as protection against localized disasters and online threats like ransomware. Companies need to protect against hardware failure, data corruption, and facility outages; security breaches and viruses; and data loss due to unhappy employees or human error. These are just a few of the reasons to implement a formal data protection policy. Data protection is not an option, it s an insurance policy. There are numerous data protection technologies available such as snapshots, WAN optimization applied to replication, backup deduplication and compression appliances, continuous data protection, copy data management, and many more. In today s environment, a traditional backup approach is constantly challenged by many threats. As data center technology evolves, from virtualization to HCI, other data protection methods can also be used in conjunction with or replacing backups. As waves of IT solutions come and go, some old rules still apply. The backup rule is timeless. This strategy helps you overcome nearly any failure scenario. Despite the rule s simplicity or perhaps because of it, many IT managers continue to ignore it and lose their data because they were unprepared for a disaster. A robust data protection strategy should use the rule. Following the rule is even more critical for highly consolidated virtual environments and HCIs due to the consolidation nature of the data. Here are the basics of a rule (or strategy): Keep three (3) different copies of your data. In addition to your primary data storage, you should also have at least two (2) backup copies. Keep data on two (2) different media types such as disk and tape. Storing copies on two different media ensures that a failure of any one device will not affect the recoverability on another. If possible, store copies in a different physical location than the original. Using a different medium is required because a common failure is likely to affect all devices. Keep one (1) copy off-site. This is the most important part of the rule. Keeping a copy off-site protects data against fires or a natural disaster that can take out both your primary data and all your backup copies at once. This off-site copy can be stored in the cloud, but it s better to use an offline media (such as tape). Offline storage offers a number of benefits from an availability perspective. Whether it s the latest malware risk or possibly some physical issue (like an extreme power problem that damages everything), there is a use case for tape storage in today s modern world. Besides, the portability and acquisition cost of tape can t be beat. Not following the rule can put you out of business. This happened to a code-hosting and software collaboration provider that was forced out of business by an attacker who deleted the company s data and backups after gaining root access. Primary data and backups copies were stored in the same infrastructure, failing to be on two different media and in two different locations. The company also did not have an offline copy, which would have been a lifesaver in this situation. Even if copies of data are stored on a geospread architecture, as long as they re on one console, it doesn t count as off-site. Data remains vulnerable to any type of administrator identity attack, which is more likely to be carried out by an ex-employee than a hacker. 4 Hyperconverged Infrastructure Data Protection Isn t a Snap

5 There is incredible versatility in how the rule can be implemented since it doesn t specify any specific technology. For instance, backups on tape are one way to get data off-site and on different media. Replicated virtual machines are another way to address different media types such as a storage system. Even putting backups in a service provider cloud can be a way to easily address the off-site requirement. In any situation, you can use the rule to meet any availability requirement for the advanced data center. HYPERCONVERGED DATA PROTECTION HCI brings nondisruptive scaling, reduced complexity, and other benefits, but it requires a stronger data-protection strategy because hyperconvergence brings new vulnerabilities. A root compromise anywhere provides complete and unfettered access to everything in that system the entire IT stack. There is no separation of application interfaces and configurations, and all services share the same security characteristics and profile. This means if there is a single root compromise, an intruder can access all application interfaces, all networking functions, and all the databases and storage for all systems. Using a single vendor increases the chance of a zero-day attack a hole in software that is unknown to the vendor, and therefore, no vendor fix or patch is available for it leaving the HCI vulnerable to a single attacker. What about ransomware attacks like Locky or Cryptolocker? Ransomware is a type of malware that prevents or limits users (or administrators) from accessing their system, either by locking system access or by locking files. Today s ransomware encrypts files and uses new infection routines that enable them to spread across networks and servers. Hyperconverged systems are a perfect target one unique system to encrypt with a built-in replication to spread the malware. Simply put, putting all your eggs in the same basket induces a vulnerability. In Australia, a faulty software update deployed by a local telco left tens of thousands of DSL broadband customers without internet access. Consolidation offers great benefits, but can also introduce new risks a faulty software update on an HCI can cause a major outage to your users. Array-Based Snapshots Are Not Backups Some HCI vendors make a categorical statement that you do not need any other product to build a complete infrastructure. That means no backup software, no deduplication appliances, no DR products, nothing additional it s all included. The caveat they fail to mention is that the built-in data protection technology is often based on snapshots. Array-based snapshots, also known as storage snapshots, are widely used to quickly create point-in-time virtual copies of data. But storage snapshots, unless copied to secondary media do not protect against media failures. Snapshots are not sufficient as a backup because if the volume is inaccessible, so is the snapshot. Imagine deleting or removing access to your storage during a routine upgrade the snapshots are worthless because they are stored on the same inaccessible storage. Hyperconverged Infrastructure Data Protection Isn t a Snap 5

6 In addition, there are different snapshot variants to consider: Copy-on-write snapshots make an initial snapshot that further updates as the data is changed. But if one iteration is corrupted or unavailable, then the restoration might be impossible to perform and the uncorrupted data is lost. Clone/split-error snapshots create reference pointers to the entire contents of a mirrored set of drives, file system, or logical unit number (LUN) every time a snapshot is made. When a clone is created, this can negatively impact production performance as it can access primary data at the same time as the host. Not the best choice for HCIs. Continuous data protection (CDP) is another method to create snapshots that tracks and stores all updates to data as those updates occur. But CDP requires additional storage in order to keep every changed block copy, and more performance to store it. In a hyperconverged solution, it means adding the full stack of compute, networking, and so on, when only storage is required to protect primary data. Array-based snapshots typically occur very quickly. The number of supported snapshots varies by platform, with some suppliers providing support for hundreds or thousands of snapshots per system. Most suppliers offer advanced scheduling to automate the snapshot process. Remember also that snapshots on the array are based on a LUN or volume. This means that array-based snapshots may contain many VMs, making it difficult to build schedules around protecting individual VMs. This is expected to change with the introduction of Virtual Volumes (vvols), but it s still a complex job. (For information on VMware vvols, read this article.) So what if we want to back up only two VMs? Do we need to acquiesce to all of them? What if we want to protect some VMs in different backup groups with different backup policies? A dedicated backup software solution, such as Veeam, is recommended to overcome these limitations and provide additional data protection capabilities. Hypervisor Snapshots Hypervisor-based snapshots, on the other hand, operate at the VM level, allowing a snapshot policy to be applied to each VM individually. With the advent of virtualization, the hypervisor now provides an alternative location from which to execute the snapshot process. VMs are simply files (VMDKs in the case of VMware vsphere and VHD files on Microsoft Hyper-V), which means creating and managing snapshots is a case of manipulating these image files. When a VM has an active snapshot, its virtual disk I/O is not performed on the VM s actual virtual disk, but instead they are kept unchanged, and whatever changes in the VM is written to different physical files. This type of snapshot has three side effects: Disk I/O for the VM is much slower since when a snapshot is created, it produces an additional delta file. Each successive snapshot produces an additional file. When a disk operation is performed within the guest, the disk I/O is recreated by parsing each snapshot delta file in the chain. This produces additional disk overhead on the host because more than one file must be opened and processed to recreate the I/O data for the guest operating system. The delta files keep growing over time, consuming disk space. When the snapshots are removed, the delta files have to be merged back to the main virtual disk. This is slow and time-consuming. 6 Hyperconverged Infrastructure Data Protection Isn t a Snap

7 Best practices for virtual machine snapshots can be found in the VMware Knowledge Base, including: A snapshot file is only a change log of the original virtual disk and should not be retained as a backup. Do not use single snapshot for more than hours. Where Snapshots Fall Short As previously mentioned, the major problem with snapshots is that they are usually kept on the same physical volume as the running VM. Obviously this means that if data loss occurs because of a problem with a volume or system, or a failed upgrade, the snapshot will disappear or be corrupted along with the original VM. Furthermore, snapshots are not distinct copies taken at regular intervals; they are generally deltas. New data is incrementally stored, rather than completely replicating the whole image. So what happens if the original storage volume had become corrupted at some point in time? If the parent volume is corrupted, then it becomes impossible to restore at any point in time along the snapshot tree. The same risk applies to virtual snapshots that are often dependent on the original disk image for information. If that image is damaged, the snapshots become worthless. For instance, a command can be run that accidentally removes critical data. For an example of this, view the video How Toy Story 2 Almost Got Deleted. A snapshot can help protect files, but it s not a replacement for a full backup strategy with multiple copies of a system and/or files in a physically separate location. If ransomware starts encrypting your data or malware hits your drives, the snapshot will be affected as part of its imaging data. Compliance is another area where snapshots fall short. They are not designed for long-term retention a common requirement for governance, audits, and compliance. Also, some vendors support a very limited number of snapshots. As previously mentioned, hypervisor vendors do not recommend keeping more than two or three snapshots, and array-based snapshots also have some limitations. For example, a limit of 255 array-based snapshots means less than 37 weeks of retention (assuming one snapshot per day), unless you are using different retentions for hourly/ daily/weekly/monthly snapshots to increase retention but it still can t achieve years or decades of retention. Snapshots do not replace backup, but they can be used to enhance a data protection strategy if you use them at the right time and for the right tasks. Some technologies in an HCI integrate VM-centric backups and DR features to improve availability. Others support snapshots and replication, and provide a common engine across multiple systems. As a result, management is consolidated into a single interface. This covers only some aspects of the strategy, perhaps supporting different media or offline media only, and so on. A dedicated data protection solution, such as Veeam, can increase the level of protection especially when the strategy is used to overcome nearly any failure scenario. Hyperconverged Infrastructure Data Protection Isn t a Snap 7

8 CHOOSING THE RIGHT APPROACH FOR HCIs The best solution for HCIs is to adopt a strategy and combine different technologies. Shortterm snapshots or CDP are great for dealing with user errors or some data corruption scenarios. Snapshots are also the fastest way to restore data. Backup tools, in particular those designed to safeguard virtual environments, are the best solution to protect against hardware failures, site disasters, and virus/ransomware attacks if combined with offline media such as tape. Backups are better for mid-term and long-term data retention. Adding a deduplication appliance can help to reduce the amount of storage required for data protection and the bandwidth required for replication. Deduplication is a must-have if there is a requirement for multiple backup copies in geographically dispersed locations. Why multiple copies? Why long-term retention? Suppose you are hosting virtual desktops on your brand new HCI. Some of your users take a long-term leave of absence, and you routinely remove unused accounts after a few months. This happened to a government agency in the UK and the agency was saved by its backups. Quantum and Veeam: Data Protection for Hyperconverged Environments If you want to avoid putting all your eggs in the same basket, but also don t want too many baskets, Veeam and Quantum offer the best solution to protect HCIs. Data is stored in three different places as shown below, with protection policies managed by Veeam software. ON-SITE Copy 2 OFF-SITE APP OS APP OS APP OS QXS Hybrid Storage -or- Virtualized, Converged, Hyperconverged Environment Veeam Backup Server DXi Dedupe Disk 2 Media Types Cloud 1 Off-Site Copy Off-line Copy 1 Copy 3 Scalar Tape Library Tape Veeam and Quantum are applying hyperconvergence principles to secondary storage and backup solutions. Quantum offers a complete backup solution to implement a best practice approach for data protection: Quantum QXS delivers fast block storage array Quantum DXi provides patented variable-length deduplication Quantum Q-Cloud Protect stores a copy off-site in the cloud Quantum Scalar stores offline/off-site copies on tape. Veeam Backup & Replication manages all backup policies and data movement. 8 Hyperconverged Infrastructure Data Protection Isn t a Snap

9 Hyperconvergence provides great benefits, but it brings new vulnerabilities. Separating production and data protection can be a pragmatic way to mitigate risk and costs. Don t keep your backups or snapshots on the same physical volume or hardware as your production virtual servers. If you have a data loss due to hardware failure, human error, failed upgrades, or any other threat you ll lose everything. For more details on the Quantum and Veeam solution, read this technical brief (Veeam and Quantum Tech Brief TB00043). Hyperconverged Infrastructure Data Protection Isn t a Snap 9

10 ABOUT QUANTUM Quantum is a leading expert in scale-out storage, archive and data protection, providing solutions for capturing, sharing and preserving digital assets over the entire data lifecycle. From small businesses to major enterprises, more than 100,000 customers have trusted Quantum to address their most demanding data workflow challenges. Quantum s end-to-end, tiered storage foundation enables customers to maximize the value of their data by making it accessible whenever and wherever needed, retaining it indefinitely and reducing total cost and complexity. See how at Quantum Corporation. All rights reserved. Quantum, the Quantum logo, Artico and StorNext are either registered trademarks or trademarks of Quantum Corporation and its affiliates in the United States and/or other countries. All other trademarks are the property of their respective owners. WP00219A-v01 Sept 2016 Hyperconverged Infrastructure Data Protection Isn t a Snap 10

The Data Protection Rule and Hybrid Cloud Backup

The Data Protection Rule and Hybrid Cloud Backup The 3-2-1 Data Protection Rule and Hybrid Cloud Backup IT teams are under extreme pressure to improve backup, disaster recovery and data protection to eliminate downtime and facilitate digital transformation.

More information

Understanding Virtual System Data Protection

Understanding Virtual System Data Protection Understanding Virtual System Data Protection Server virtualization is the most important new technology introduced in the data center in the past decade. It has changed the way we think about computing

More information

DEDUPLICATION BASICS

DEDUPLICATION BASICS DEDUPLICATION BASICS 4 DEDUPE BASICS 6 WHAT IS DEDUPLICATION 8 METHODS OF DEDUPLICATION 10 DEDUPLICATION EXAMPLE 12 HOW DO DISASTER RECOVERY & ARCHIVING FIT IN? 14 DEDUPLICATION FOR EVERY BUDGET QUANTUM

More information

Evolved Backup and Recovery for the Enterprise

Evolved Backup and Recovery for the Enterprise Evolved Backup and Recovery for the Enterprise with Asigra technology Working gives me confidence in my data protection plan. I know that if I ever need to restore, it will take a few minutes rather than

More information

arcserve r16.5 Hybrid data protection

arcserve r16.5 Hybrid data protection arcserve r16.5 Hybrid data protection Whether you re protecting the data center, remote offices or desktop resources, you need a solution that helps you meet today s demanding service-level agreements

More information

Countering ransomware with HPE data protection solutions

Countering ransomware with HPE data protection solutions Countering ransomware with HPE data protection solutions What is ransomware? Definition Malware that prevents or limits users from accessing their system by: Locking the system s screen Encrypting files

More information

The storage challenges of virtualized environments

The storage challenges of virtualized environments The storage challenges of virtualized environments The virtualization challenge: Ageing and Inflexible storage architectures Mixing of platforms causes management complexity Unable to meet the requirements

More information

Protecting Microsoft Hyper-V 3.0 Environments with Arcserve

Protecting Microsoft Hyper-V 3.0 Environments with Arcserve Protecting Microsoft Hyper-V 3.0 Environments with Arcserve Adding value to your Hyper-V environment. Today, you face demanding service level agreements (SLAs) while having to address staffing and budget

More information

1 Quantum Corporation 1

1 Quantum Corporation 1 1 Tactics and Tips for Protecting Virtual Servers Mark Eastman Director, Solutions Marketing April 2008 VMware Changing the Way Data Protection is Done No longer 1 server, 1 backup paradigm App Virtual

More information

Backup and Restore Strategies

Backup and Restore Strategies Backup and Restore Strategies WHITE PAPER How to identify the appropriate life insurance for your data At home, you safeguard against any incident to protect your family, your life, your property everything

More information

Chapter 11. SnapProtect Technology

Chapter 11. SnapProtect Technology Chapter 11 SnapProtect Technology Hardware based snapshot technology provides the ability to use optimized hardware and disk appliances to snap data on disk arrays providing quick recovery by reverting

More information

Symantec Reference Architecture for Business Critical Virtualization

Symantec Reference Architecture for Business Critical Virtualization Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization

More information

UNITRENDS & NUTANIX ARCHITECTURE & IMPLEMENTATION GUIDE

UNITRENDS & NUTANIX ARCHITECTURE & IMPLEMENTATION GUIDE UNITRENDS & NUTANIX ARCHITECTURE & IMPLEMENTATION GUIDE ALL-IN-ONE BACKUP AND DISASTER RECOVERY FOR LEADING HYPERCONVERGED INFRASTRUCTURE 1 INTRODUCTION Nutanix and Unitrends have jointly integrated their

More information

How Symantec Backup solution helps you to recover from disasters?

How Symantec Backup solution helps you to recover from disasters? How Symantec Backup solution helps you to recover from disasters? Finn Henningsen Presales Specialist Technology Days 2011 1 Thank you to our sponsors Technology Days 2011 2 Agenda Why do we bother? Infrastructure

More information

Ten things hyperconvergence can do for you

Ten things hyperconvergence can do for you Ten things hyperconvergence can do for you Francis O Haire Director, Technology & Strategy DataSolutions Evolution of Enterprise Infrastructure 1990s Today Virtualization Server Server Server Server Scale-Out

More information

Data Protection for Cisco HyperFlex with Veeam Availability Suite. Solution Overview Cisco Public

Data Protection for Cisco HyperFlex with Veeam Availability Suite. Solution Overview Cisco Public Data Protection for Cisco HyperFlex with Veeam Availability Suite 1 2017 2017 Cisco Cisco and/or and/or its affiliates. its affiliates. All rights All rights reserved. reserved. Highlights Is Cisco compatible

More information

Protecting VMware vsphere/esx Environments with CA ARCserve

Protecting VMware vsphere/esx Environments with CA ARCserve Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting VMware vsphere/esx Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while

More information

WHITE PAPER. DATA DEDUPLICATION BACKGROUND: A Technical White Paper

WHITE PAPER. DATA DEDUPLICATION BACKGROUND: A Technical White Paper WHITE PAPER DATA DEDUPLICATION BACKGROUND: A Technical White Paper CONTENTS Data Deduplication Multiple Data Sets from a Common Storage Pool.......................3 Fixed-Length Blocks vs. Variable-Length

More information

Modernize Your Backup and DR Using Actifio in AWS

Modernize Your Backup and DR Using Actifio in AWS FOR AWS Modernize Your Backup and DR Using Actifio in AWS 150105H FOR AWS Modernize Your Backup and DR Using Actifio in AWS What is Actifio? Actifio virtualizes the data that s the lifeblood of business.

More information

TOP REASONS TO CHOOSE DELL EMC OVER VEEAM

TOP REASONS TO CHOOSE DELL EMC OVER VEEAM HANDOUT TOP REASONS TO CHOOSE DELL EMC OVER VEEAM 10 This handout overviews the top ten reasons why customers choose Data Protection from Dell EMC over Veeam. Dell EMC has the most comprehensive data protection

More information

Symantec NetBackup 7 for VMware

Symantec NetBackup 7 for VMware V-Ray visibility into virtual machine protection Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing

More information

Why SaaS isn t Backup

Why SaaS isn t Backup EBOOK LOGO HERE Why SaaS isn t Backup Yes, You need to backup your cloud data. 1 One of the most business friendly innovations in recent years has been the proliferation of cloud apps like Google Apps,,

More information

Veritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW

Veritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW Veritas Backup Exec Powerful, flexible and reliable data protection designed for cloud-ready organizations. OVERVIEW Veritas Backup Exec is the backup solution without barriers, delivered your way. You

More information

Table of Contents HOL HCI

Table of Contents HOL HCI Table of Contents Lab Overview - - Getting Started with VxRail... 2 VxRail Lab Overview... 3 Module 1 - VxRail Initial Configuration (15 minutes)... 5 Introduction - Configure a newly deployed VxRail Appliance...

More information

ZYNSTRA TECHNICAL BRIEFING NOTE

ZYNSTRA TECHNICAL BRIEFING NOTE ZYNSTRA TECHNICAL BRIEFING NOTE Backup What is Backup? Backup is a service that forms an integral part of each Cloud Managed Server. Its purpose is to regularly store an additional copy of your data and

More information

Complete Data Protection & Disaster Recovery Solution

Complete Data Protection & Disaster Recovery Solution Complete Data Protection & Disaster Recovery Solution Quadric Software 2015 We were looking at other solutions. Alike was the best with XenServer, and none of them had Alike s compression abilities. After

More information

Best practices for protecting Virtualization, SDDC, Cloud, and the Modern Data Center, with NetBackup

Best practices for protecting Virtualization, SDDC, Cloud, and the Modern Data Center, with NetBackup Best practices for protecting Virtualization, SDDC, Cloud, and the Modern Data Center, with NetBackup Alain Pelegrin EMEA NetBackup Solutions Lead TSS IM Technology Practice Olivier Ribouchon Presales

More information

The Expanding Role of Backup and Recovery in the Hybrid Enterprise

The Expanding Role of Backup and Recovery in the Hybrid Enterprise The Expanding Role of Backup and Recovery in the Hybrid Enterprise 6 STRATEGIES TO PROTECT MODERN INFRASTRUCTURE ON-PREMISES AND IN THE CLOUD It s no secret. Today s changing infrastructure landscape coupled

More information

Preserving the World s Most Important Data. Yours. SYSTEMS AT-A-GLANCE: KEY FEATURES AND BENEFITS

Preserving the World s Most Important Data. Yours. SYSTEMS AT-A-GLANCE: KEY FEATURES AND BENEFITS Preserving the World s Most Important Data. Yours. SYSTEMS AT-A-GLANCE: KEY FEATURES AND BENEFITS We are the only company to integrate disk, tape, and replication in a single solution set for better near-term

More information

Protecting VMware vsphere/esx Environments with Arcserve

Protecting VMware vsphere/esx Environments with Arcserve Protecting VMware vsphere/esx Environments with Arcserve Today, you face demanding service level agreements (SLAs) while having to address staffing and budget constraints. You seek ways to reduce cost

More information

VMware vsphere Clusters in Security Zones

VMware vsphere Clusters in Security Zones SOLUTION OVERVIEW VMware vsan VMware vsphere Clusters in Security Zones A security zone, also referred to as a DMZ," is a sub-network that is designed to provide tightly controlled connectivity to an organization

More information

HYCU and ExaGrid Hyper-converged Backup for Nutanix

HYCU and ExaGrid Hyper-converged Backup for Nutanix HYCU and ExaGrid Hyper-converged Backup for Nutanix Backing Up and Recovering Data: Nutanix, ExaGrid and HYCU As IT data centers move to hyper-converged infrastructure, new and innovative backup approaches

More information

Protecting Microsoft SharePoint

Protecting Microsoft SharePoint TECHNICAL WHITE PAPER: BACKUP EXEC TM 2014 PROTECTING MICROSOFT SHAREPOINT Backup Exec TM 2014 Technical White Paper Protecting Microsoft SharePoint Technical White Papers are designed to introduce Symantec

More information

3 Ways Businesses Use Network Virtualization. A Faster Path to Improved Security, Automated IT, and App Continuity

3 Ways Businesses Use Network Virtualization. A Faster Path to Improved Security, Automated IT, and App Continuity 3 Ways Businesses Use Network Virtualization A Faster Path to Improved Security, Automated IT, and App Continuity INTRODUCTION 2 Today s IT Environments Are Demanding Technology has made exciting leaps

More information

Asigra Cloud Backup Provides Comprehensive Virtual Machine Data Protection Including Replication

Asigra Cloud Backup Provides Comprehensive Virtual Machine Data Protection Including Replication Datasheet Asigra Cloud Backup Provides Comprehensive Virtual Machine Data Protection Including Replication Virtual Machines (VMs) have become a staple of the modern enterprise data center, but as the usage

More information

4 Criteria of Intelligent Business Continuity

4 Criteria of Intelligent Business Continuity 4 Criteria of Intelligent Business Continuity BEYOND BACKUP AND DISASTER RECOVERY As we move further into the age of high availability and instant gratification we must adapt our business practices to

More information

Why Datrium DVX is Best for VDI

Why Datrium DVX is Best for VDI Why Datrium DVX is Best for VDI 385 Moffett Park Dr. Sunnyvale, CA 94089 844-478-8349 www.datrium.com Technical Report Introduction Managing a robust and growing virtual desktop infrastructure in current

More information

Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments. Solution Overview Cisco Public

Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments. Solution Overview Cisco Public Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments 1 2017 2017 Cisco Cisco and/or and/or its

More information

DATA CENTRE SOLUTIONS

DATA CENTRE SOLUTIONS DATA CENTRE SOLUTIONS NOW OPTIMIZATION IS WITHIN REACH. CONVERGED INFRASTRUCTURE VIRTUALIZATION STORAGE NETWORKING BACKUP & RECOVERY POWER & COOLING 2 INCREASE AGILITY, STARTING IN YOUR DATA CENTRE. Chances

More information

CA ARCserve Backup. Benefits. Overview. The CA Advantage

CA ARCserve Backup. Benefits. Overview. The CA Advantage PRODUCT BRIEF: CA ARCSERVE BACKUP R12.5 CA ARCserve Backup CA ARCSERVE BACKUP, A HIGH-PERFORMANCE, INDUSTRY-LEADING DATA PROTECTION PRODUCT, UNITES INNOVATIVE DATA DEDUPLICATION TECHNOLOGY, POWERFUL STORAGE

More information

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY SOLUTION OVERVIEW BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY Every organization is exploring how technology can help it disrupt current operating models, enabling it to better serve

More information

Redefine Data Protection: Next Generation Backup And Business Continuity

Redefine Data Protection: Next Generation Backup And Business Continuity Redefine Data Protection: Next Generation Backup And Business Continuity 1 Business Is Being Redefined Leveraging the Power of Technology Megatrends CLOUD MOBILE SOCIAL BIG DATA 2 Creating New Next Gen

More information

vsan Security Zone Deployment First Published On: Last Updated On:

vsan Security Zone Deployment First Published On: Last Updated On: First Published On: 06-14-2017 Last Updated On: 11-20-2017 1 1. vsan Security Zone Deployment 1.1.Solution Overview Table of Contents 2 1. vsan Security Zone Deployment 3 1.1 Solution Overview VMware vsphere

More information

Acronis Hybrid Cloud Architecture Unified Centralized Data Protection Web-based User Interface Deployed On-premises or in the Cloud.

Acronis Hybrid Cloud Architecture Unified Centralized Data Protection Web-based User Interface Deployed On-premises or in the Cloud. Acronis Hybrid Cloud Architecture Unified Centralized Data Protection Web-based User Interface Deployed On-premises or in the Cloud A PUBLIC Any Deploy ment UBER VENDOR Any Workload ON-PREMISES PHYSICAL

More information

Boost your data protection with NetApp + Veeam. Schahin Golshani Technical Partner Enablement Manager, MENA

Boost your data protection with NetApp + Veeam. Schahin Golshani Technical Partner Enablement Manager, MENA Boost your data protection with NetApp + Veeam Schahin Golshani Technical Partner Enablement Manager, MENA NetApp Product Strategy Market-leading innovations, that are NetApp Confidential Limited Use 3

More information

Xcellis Technical Overview: A deep dive into the latest hardware designed for StorNext 5

Xcellis Technical Overview: A deep dive into the latest hardware designed for StorNext 5 TECHNOLOGY BRIEF Xcellis Technical Overview: A deep dive into the latest hardware designed for StorNext 5 ABSTRACT Xcellis represents the culmination of over 15 years of file system and data management

More information

Hyper-converged Secondary Storage for Backup with Deduplication Q & A. The impact of data deduplication on the backup process

Hyper-converged Secondary Storage for Backup with Deduplication Q & A. The impact of data deduplication on the backup process Hyper-converged Secondary Storage for Backup with Deduplication Q & A The impact of data deduplication on the backup process Table of Contents Introduction... 3 What is data deduplication?... 3 Is all

More information

Data Protection Everywhere. For the modern data center

Data Protection Everywhere. For the modern data center Data Protection Everywhere For the modern data center Tale of two worlds You need both for Traditional apps IT centric & Next-gen apps Developer centric On-premise Trust Agility Live in the cloud 3 Copyright

More information

Simplify Backups. Dell PowerVault DL2000 Family

Simplify Backups. Dell PowerVault DL2000 Family Simplify Backups Dell PowerVault DL2000 Family SIMPLIFYING I T The Dell PowerVault DL2000 family helps reduce the cost and complexity of backups and restores, freeing up valuable resources that you can

More information

IBM TS7700 grid solutions for business continuity

IBM TS7700 grid solutions for business continuity IBM grid solutions for business continuity Enhance data protection and business continuity for mainframe environments in the cloud era Highlights Help ensure business continuity with advanced features

More information

The Three Data Challenges

The Three Data Challenges The Three Data Challenges Mark Bentkower, CISSP, Director Solutions Marketing, APAC 12 October 2017 2016 COMMVAULT SYSTEMS, INC. ALL RIGHTS RESERVED. You can have data without information, but you cannot

More information

Hedvig as backup target for Veeam

Hedvig as backup target for Veeam Hedvig as backup target for Veeam Solution Whitepaper Version 1.0 April 2018 Table of contents Executive overview... 3 Introduction... 3 Solution components... 4 Hedvig... 4 Hedvig Virtual Disk (vdisk)...

More information

Microsoft E xchange 2010 on VMware

Microsoft E xchange 2010 on VMware : Microsoft E xchange 2010 on VMware Availability and R ecovery Options This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more

More information

Solution Brief: Commvault HyperScale Software

Solution Brief: Commvault HyperScale Software Solution Brief: Commvault HyperScale Software ENTERPRISE IT SHIFTS Enterprise IT is being transformed with the maturing of public cloud providers that offer compute, storage and application services with

More information

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/ Chapter 1 Storage Concepts 4 - Storage Concepts In order to understand CommVault concepts regarding storage management we need to understand how and why we protect data, traditional backup methods, and

More information

Disaster Recovery as a Service

Disaster Recovery as a Service Disaster Recovery as a Service Heart-stopping IT failure. At least your business won t skip a beat. 02 delivering business agility 03 Flexible, cost-effective DRaaS made simple Enjoy rapid recovery following

More information

Balakrishnan Nair. Senior Technology Consultant Back Up & Recovery Systems South Gulf. Copyright 2011 EMC Corporation. All rights reserved.

Balakrishnan Nair. Senior Technology Consultant Back Up & Recovery Systems South Gulf. Copyright 2011 EMC Corporation. All rights reserved. Balakrishnan Nair Senior Technology Consultant Back Up & Recovery Systems South Gulf 1 Thinking Fast: The World s Fastest Backup Now Does Archive Too Introducing the New EMC Backup and Recovery Solutions

More information

Arcserve Solutions for Amazon Web Services (AWS)

Arcserve Solutions for Amazon Web Services (AWS) Arcserve Solutions for Amazon Web Services (AWS) Introduction The public cloud has become a major factor in all IT decision making due to its endless supply of technical resources at an affordable cost.

More information

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure Nutanix Tech Note Virtualizing Microsoft Applications on Web-Scale Infrastructure The increase in virtualization of critical applications has brought significant attention to compute and storage infrastructure.

More information

The Ultimate Guide for Virtual Server Protection

The Ultimate Guide for Virtual Server Protection The Ultimate Guide for Virtual Server Protection 4 QUESTIONS EVERYONE SHOULD ASK ABOUT VIRTUAL SERVER DATA PROTECTION IT leadership should be looking to storage and data management teams to ensure they

More information

vsan Disaster Recovery November 19, 2017

vsan Disaster Recovery November 19, 2017 November 19, 2017 1 Table of Contents 1. Disaster Recovery 1.1.Overview 1.2.vSAN Stretched Clusters and Site Recovery Manager 1.3.vSAN Performance 1.4.Summary 2 1. Disaster Recovery According to the United

More information

Disaster Recovery Is A Business Strategy

Disaster Recovery Is A Business Strategy Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...

More information

Integrated and Hyper-converged Data Protection

Integrated and Hyper-converged Data Protection Integrated and Hyper-converged Data Protection Simplicity & Agility GLOBAL SPONSORS Data Protection Portfolio Protection and recovery to cloud PROTECTION STORAGE PROTECTION SOFTWARE PROTECTION APPLIANCE

More information

Catalogic DPX: Backup Done Right

Catalogic DPX: Backup Done Right Catalogic DPX: Backup Done Right The Backup Alternative You ve Been Waiting For Catalogic DPX Highlights Fast and reliable low-impact backup for physical and virtual environments Direct access to data

More information

Server Fault Protection with NetApp Data ONTAP Edge-T

Server Fault Protection with NetApp Data ONTAP Edge-T Technical Report Server Fault Protection with NetApp Data ONTAP Edge-T Jeff Whitaker, NetApp March 2013 TR-4154 TABLE OF CONTENTS 1 Introduction... 3 2 Backup and Disaster Recovery Technology... 4 2.1

More information

OL Connect Backup licenses

OL Connect Backup licenses OL Connect Backup licenses Contents 2 Introduction 3 What you need to know about application downtime 5 What are my options? 5 Reinstall, reactivate, and rebuild 5 Create a Virtual Machine 5 Run two servers

More information

Why Continuity Matters

Why  Continuity Matters Why Email Continuity Matters Contents What is Email Continuity and Why it Matters........................... 1 Challenges to Email Continuity................................... 2 Increasing Email Management

More information

Data Protection for Virtualized Environments

Data Protection for Virtualized Environments Technology Insight Paper Data Protection for Virtualized Environments IBM Spectrum Protect Plus Delivers a Modern Approach By Steve Scully, Sr. Analyst February 2018 Modern Data Protection for Virtualized

More information

Business Continuity and Disaster Recovery. Ed Crowley Ch 12

Business Continuity and Disaster Recovery. Ed Crowley Ch 12 Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster

More information

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member

More information

File backup and recovery programs store duplicate copies of data to protect you from data loss.

File backup and recovery programs store duplicate copies of data to protect you from data loss. What is data backup and recovery? Data backup is a proactive means to mitigate the loss of data, files, or systems by creating duplicate copies of data. Creating backups can reduce the chance of losing

More information

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3

More information

Maximizing Availability With Hyper-Converged Infrastructure

Maximizing Availability With Hyper-Converged Infrastructure Maximizing Availability With Hyper-Converged Infrastructure With the right solution, organizations of any size can use hyper-convergence to help achieve their most demanding availability objectives. Here

More information

The Data-Protection Playbook for All-flash Storage KEY CONSIDERATIONS FOR FLASH-OPTIMIZED DATA PROTECTION

The Data-Protection Playbook for All-flash Storage KEY CONSIDERATIONS FOR FLASH-OPTIMIZED DATA PROTECTION The Data-Protection Playbook for All-flash Storage KEY CONSIDERATIONS FOR FLASH-OPTIMIZED DATA PROTECTION The future of storage is flash The all-flash datacenter is a viable alternative You ve heard it

More information

The Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio

The Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio Prompt. Courteous. Knowledgeable. Support you deserve. The Value Of NEONet Cybersecurity Why You Need To Protect Your Private Student Data In Ohio 1 TABLE OF CONTENTS 2 2 2-3 4 5 7 Introduction The Three

More information

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments. WHITE PAPER Data safety for digital business. One solution for hybrid, physical, and virtual environments. It s common knowledge that the cloud plays a critical role in helping organizations accomplish

More information

Data Protection Everywhere

Data Protection Everywhere Data Protection Everywhere For the modern data center Syed Saleem Advisory Systems Engineer Pillars of the modern data center Protection and trust Security/Governance Encryption Data Protection Services/Support

More information

Remove complexity in protecting your virtual infrastructure with. IBM Spectrum Protect Plus. Data availability made easy. Overview

Remove complexity in protecting your virtual infrastructure with. IBM Spectrum Protect Plus. Data availability made easy. Overview Overview Challenge In your organization, backup management is too complex and consumes too much time and too many IT resources. Solution IBM Spectrum Protect Plus dramatically simplifies data protection

More information

Dell DR4000 Replication Overview

Dell DR4000 Replication Overview Dell DR4000 Replication Overview Contents Introduction... 1 Challenges with Data Disaster Recovery... 1 The Dell DR4000 Solution A Replication Overview... 2 Advantages of using DR4000 replication for disaster

More information

Merging Enterprise Applications with Docker* Container Technology

Merging Enterprise Applications with Docker* Container Technology Solution Brief NetApp Docker Volume Plugin* Intel Xeon Processors Intel Ethernet Converged Network Adapters Merging Enterprise Applications with Docker* Container Technology Enabling Scale-out Solutions

More information

How unified backup and cloud enable your digital transformation success

How unified backup and cloud enable your digital transformation success Key Considerations for Data Protection and Cloud on Your Digital Journey How unified backup and cloud enable your digital transformation success An IDC InfoBrief, Sponsored by February 2018 1 Digital Transformation

More information

EMC DATA DOMAIN PRODUCT OvERvIEW

EMC DATA DOMAIN PRODUCT OvERvIEW EMC DATA DOMAIN PRODUCT OvERvIEW Deduplication storage for next-generation backup and archive Essentials Scalable Deduplication Fast, inline deduplication Provides up to 65 PBs of logical storage for long-term

More information

Veritas Storage Foundation for Oracle RAC from Symantec

Veritas Storage Foundation for Oracle RAC from Symantec Veritas Storage Foundation for Oracle RAC from Symantec Manageability, performance and availability for Oracle RAC databases Data Sheet: Storage Management Overviewview offers a proven solution to help

More information

Chapter 10 Protecting Virtual Environments

Chapter 10 Protecting Virtual Environments Chapter 10 Protecting Virtual Environments 164 - Protecting Virtual Environments As more datacenters move to virtualize their environments and the number of virtual machines and the physical hosts they

More information

Microsoft SQL Server HA and DR with DVX

Microsoft SQL Server HA and DR with DVX Microsoft SQL Server HA and DR with DVX 385 Moffett Park Dr. Sunnyvale, CA 94089 844-478-8349 www.datrium.com Technical Report Introduction A Datrium DVX solution allows you to start small and scale out.

More information

Copyright 2012 EMC Corporation. All rights reserved.

Copyright 2012 EMC Corporation. All rights reserved. 1 Transforming Backup And Recovery 2 THE JOURNEY CONTINUES 3 IT PRESSURES KEEP STACKING UP Compliance & Discovery Infrastructure Shift Budget Dilemma Data Growth 4 CONVERGENCE OF BACKUP & ARCHIVING Backup

More information

Tintri & Veeam VM Backup & Replication Best Practices. John Phillips Strategic Alliances and Technical Marketing Ryan Post Systems Engineer

Tintri & Veeam VM Backup & Replication Best Practices. John Phillips Strategic Alliances and Technical Marketing Ryan Post Systems Engineer Tintri & Veeam VM Backup & Replication Best Practices John Phillips Strategic Alliances and Technical Marketing Ryan Post Systems Engineer 1 VM-aware Storage from Tintri Stores VMs and vdisks (only!) No

More information

Redefine Data Protection: Next Generation Backup & Business Continuity Solutions

Redefine Data Protection: Next Generation Backup & Business Continuity Solutions Redefine Data Protection: Next Generation Backup & Business Continuity Solutions 1 Creating New Next Gen Applications Existing Workloads Continue to Grow 2 How Can Data Protection Help? Lower Cost Reduce

More information

HCI: Hyper-Converged Infrastructure

HCI: Hyper-Converged Infrastructure Key Benefits: Innovative IT solution for high performance, simplicity and low cost Complete solution for IT workloads: compute, storage and networking in a single appliance High performance enabled by

More information

Converged and Hyper-Converged: Factory-Integrated Data Protection for Simplicity and Lifecycle Assurance

Converged and Hyper-Converged: Factory-Integrated Data Protection for Simplicity and Lifecycle Assurance Converged and Hyper-Converged: Factory-Integrated Data Protection for Simplicity and Lifecycle Assurance Key takeaways Dell EMC offers unique factory-integrated data protection for CI and HCI systems to

More information

Veeam Agent for Microsoft Windows

Veeam Agent for Microsoft Windows Veeam Agent for Microsoft Windows Version 2.1 User Guide December, 2017 2017 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication

More information

Disk-Based Data Protection Architecture Comparisons

Disk-Based Data Protection Architecture Comparisons Disk-Based Data Protection Architecture Comparisons Abstract The dramatic drop in the price of hard disk storage combined with its performance characteristics has given rise to a number of data protection

More information

ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS. By George Crump

ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS. By George Crump ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS By George Crump Economical, Storage Purpose-Built for the Emerging Data Centers Most small, growing businesses start as a collection of laptops

More information

SYMANTEC DATA CENTER SECURITY

SYMANTEC DATA CENTER SECURITY SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information

More information

THE DEFINITIVE GUIDE TO BACKUP FOR OFFICE 365

THE DEFINITIVE GUIDE TO BACKUP FOR OFFICE 365 THE DEFINITIVE GUIDE TO BACKUP FOR OFFICE 365 ENSURING COMPLETE AND EFFECTIVE DATA PROTECTION FOR OFFICE 365 TABLE OF CONTENTS THE TRUTH ABOUT SAAS DATA LOSS THE TOP 4 REASONS YOU NEED BACKUP FOR OFFICE

More information

EMC DATA DOMAIN OPERATING SYSTEM

EMC DATA DOMAIN OPERATING SYSTEM EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 31 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive

More information

Building a Smart Segmentation Strategy

Building a Smart Segmentation Strategy Building a Smart Segmentation Strategy Using micro-segmentation to reduce your attack surface, harden your data center, and secure your cloud. WP201705 Overview Deployed at the network layer, segmentation

More information

MAXIMIZE YOUR NUTANIX ROI WITH SURELINE SUREedge

MAXIMIZE YOUR NUTANIX ROI WITH SURELINE SUREedge SOLUTIONS BRIEF MAXIMIZE YOUR NUTANIX ROI WITH SURELINE SUREedge SUREedge delivers compelling value to Nutanix users with Migration and DR solutions AT A GLANCE Nutanix delivers an enterprise cloud platform

More information

StorageCraft OneXafe and Veeam 9.5

StorageCraft OneXafe and Veeam 9.5 TECHNICAL DEPLOYMENT GUIDE NOV 2018 StorageCraft OneXafe and Veeam 9.5 Expert Deployment Guide Overview StorageCraft, with its scale-out storage solution OneXafe, compliments Veeam to create a differentiated

More information

White paper: Agentless Backup is Not a Myth. Agentless Backup is Not a Myth

White paper: Agentless Backup is Not a Myth. Agentless Backup is Not a Myth White paper: less Backup is Not a Myth less Backup is Not a Myth White paper: less Backup is Not a Myth Executive Summary Backup and recovery software typically requires agents that are installed onto

More information