Hyperconverged Infrastructure Data Protection Isn t a Snap
|
|
- Marjorie Montgomery
- 6 years ago
- Views:
Transcription
1 Hyperconverged Infrastructure Data Protection Isn t a Snap
2 CONTENTS From Virtualized to Hyperconverged Hyperconvergence for What?... 3 Hyperconvergence = New Threats: Understand Data Protection and the Implications in an HCI.. 4 Understand Data Protection Basics to Understand its Role for HCI Projects... 2 Hyperconverged Data Protection... 5 Array-Based Snapshots Are Not Backups... 5 Hypervisor Snapshots... 6 Where Snapshots Fall Short... 7 Choosing the Right Approach for HCIs... 8 Quantum and Veeam: Data Protection for Hyperconverged Environments Hyperconverged Infrastructure Data Protection Isn t a Snap
3 FROM VIRTUALIZED TO HYPERCONVERGED Simplification and cost reduction have always been the holy grail of IT managers. Beginning in the 1960s, IT managers used virtualization as a method of logically dividing the system resources provided by a mainframe computer between applications. The next wave of virtualization resurgence in 2005 was based on x86 machines its objectives were to do more with less and make IT administrators lives easier. Lately, this do-more-with-less approach called hyperconvergence is expanding out of the server scope to reach not only the compute layer, but also data storage devices and networking equipment. The concept is simple include storage, compute, and networking in one box. A single preconfigured appliance greatly simplifies management and maintenance. Over the last year, we ve seen even more convergence in the hyperconverged infrastructure (HCI). HCI solutions include the converged layer components storage, compute, and networking as well as a hypervisor (as used in virtual environments), all managed through a single interface. It s an IT stack in a box. This software-centric architecture represents the current ultimate simplification. A vendor provides a preconfigured solution with hardware and software in a single system minimizing compatibility issues and simplifying management. The system is designed and must be managed and used as a single system it can t be broken down into separate components. In parallel with HCI development, vendors have created the next level of abstraction software-defined data centers (SDDCs). With SDDCs, all of the elements in an IT stack are fully virtualized and delivered as a service. Some vendors define their solutions as software-defined hyperconverged appliances. To simplify the discussion in this paper, we ll consider SDDC and HCI to be in the same category. Hyperconvergence for What? For smaller companies with relatively few virtual machines (VMs), an HCI solution may be the only architecture their data center needs, providing the ultimate simplification. However, the larger the environment, the more complex the storage and network design can be. Typical HCI workloads are VMs, virtual desktop infrastructures (VDIs), and disaster recovery (DR) sites. Some critical applications can also be hosted on an HCI, but designing an HCI to meet performance service-level agreements (SLAs) might be challenging compared to designing a more traditional infrastructure. Simplification can create complexity especially when HCI and existing independent IT components are deployed in the same environment. Hyperconverged Infrastructure Data Protection Isn t a Snap 3
4 Hyperconvergence = New Threats: Understand Data Protection and the Implications in an HCI Data protection is the process of safeguarding important information from corruption and/or loss. The term data protection is used to describe both operational backup of data as well as protection against localized disasters and online threats like ransomware. Companies need to protect against hardware failure, data corruption, and facility outages; security breaches and viruses; and data loss due to unhappy employees or human error. These are just a few of the reasons to implement a formal data protection policy. Data protection is not an option, it s an insurance policy. There are numerous data protection technologies available such as snapshots, WAN optimization applied to replication, backup deduplication and compression appliances, continuous data protection, copy data management, and many more. In today s environment, a traditional backup approach is constantly challenged by many threats. As data center technology evolves, from virtualization to HCI, other data protection methods can also be used in conjunction with or replacing backups. As waves of IT solutions come and go, some old rules still apply. The backup rule is timeless. This strategy helps you overcome nearly any failure scenario. Despite the rule s simplicity or perhaps because of it, many IT managers continue to ignore it and lose their data because they were unprepared for a disaster. A robust data protection strategy should use the rule. Following the rule is even more critical for highly consolidated virtual environments and HCIs due to the consolidation nature of the data. Here are the basics of a rule (or strategy): Keep three (3) different copies of your data. In addition to your primary data storage, you should also have at least two (2) backup copies. Keep data on two (2) different media types such as disk and tape. Storing copies on two different media ensures that a failure of any one device will not affect the recoverability on another. If possible, store copies in a different physical location than the original. Using a different medium is required because a common failure is likely to affect all devices. Keep one (1) copy off-site. This is the most important part of the rule. Keeping a copy off-site protects data against fires or a natural disaster that can take out both your primary data and all your backup copies at once. This off-site copy can be stored in the cloud, but it s better to use an offline media (such as tape). Offline storage offers a number of benefits from an availability perspective. Whether it s the latest malware risk or possibly some physical issue (like an extreme power problem that damages everything), there is a use case for tape storage in today s modern world. Besides, the portability and acquisition cost of tape can t be beat. Not following the rule can put you out of business. This happened to a code-hosting and software collaboration provider that was forced out of business by an attacker who deleted the company s data and backups after gaining root access. Primary data and backups copies were stored in the same infrastructure, failing to be on two different media and in two different locations. The company also did not have an offline copy, which would have been a lifesaver in this situation. Even if copies of data are stored on a geospread architecture, as long as they re on one console, it doesn t count as off-site. Data remains vulnerable to any type of administrator identity attack, which is more likely to be carried out by an ex-employee than a hacker. 4 Hyperconverged Infrastructure Data Protection Isn t a Snap
5 There is incredible versatility in how the rule can be implemented since it doesn t specify any specific technology. For instance, backups on tape are one way to get data off-site and on different media. Replicated virtual machines are another way to address different media types such as a storage system. Even putting backups in a service provider cloud can be a way to easily address the off-site requirement. In any situation, you can use the rule to meet any availability requirement for the advanced data center. HYPERCONVERGED DATA PROTECTION HCI brings nondisruptive scaling, reduced complexity, and other benefits, but it requires a stronger data-protection strategy because hyperconvergence brings new vulnerabilities. A root compromise anywhere provides complete and unfettered access to everything in that system the entire IT stack. There is no separation of application interfaces and configurations, and all services share the same security characteristics and profile. This means if there is a single root compromise, an intruder can access all application interfaces, all networking functions, and all the databases and storage for all systems. Using a single vendor increases the chance of a zero-day attack a hole in software that is unknown to the vendor, and therefore, no vendor fix or patch is available for it leaving the HCI vulnerable to a single attacker. What about ransomware attacks like Locky or Cryptolocker? Ransomware is a type of malware that prevents or limits users (or administrators) from accessing their system, either by locking system access or by locking files. Today s ransomware encrypts files and uses new infection routines that enable them to spread across networks and servers. Hyperconverged systems are a perfect target one unique system to encrypt with a built-in replication to spread the malware. Simply put, putting all your eggs in the same basket induces a vulnerability. In Australia, a faulty software update deployed by a local telco left tens of thousands of DSL broadband customers without internet access. Consolidation offers great benefits, but can also introduce new risks a faulty software update on an HCI can cause a major outage to your users. Array-Based Snapshots Are Not Backups Some HCI vendors make a categorical statement that you do not need any other product to build a complete infrastructure. That means no backup software, no deduplication appliances, no DR products, nothing additional it s all included. The caveat they fail to mention is that the built-in data protection technology is often based on snapshots. Array-based snapshots, also known as storage snapshots, are widely used to quickly create point-in-time virtual copies of data. But storage snapshots, unless copied to secondary media do not protect against media failures. Snapshots are not sufficient as a backup because if the volume is inaccessible, so is the snapshot. Imagine deleting or removing access to your storage during a routine upgrade the snapshots are worthless because they are stored on the same inaccessible storage. Hyperconverged Infrastructure Data Protection Isn t a Snap 5
6 In addition, there are different snapshot variants to consider: Copy-on-write snapshots make an initial snapshot that further updates as the data is changed. But if one iteration is corrupted or unavailable, then the restoration might be impossible to perform and the uncorrupted data is lost. Clone/split-error snapshots create reference pointers to the entire contents of a mirrored set of drives, file system, or logical unit number (LUN) every time a snapshot is made. When a clone is created, this can negatively impact production performance as it can access primary data at the same time as the host. Not the best choice for HCIs. Continuous data protection (CDP) is another method to create snapshots that tracks and stores all updates to data as those updates occur. But CDP requires additional storage in order to keep every changed block copy, and more performance to store it. In a hyperconverged solution, it means adding the full stack of compute, networking, and so on, when only storage is required to protect primary data. Array-based snapshots typically occur very quickly. The number of supported snapshots varies by platform, with some suppliers providing support for hundreds or thousands of snapshots per system. Most suppliers offer advanced scheduling to automate the snapshot process. Remember also that snapshots on the array are based on a LUN or volume. This means that array-based snapshots may contain many VMs, making it difficult to build schedules around protecting individual VMs. This is expected to change with the introduction of Virtual Volumes (vvols), but it s still a complex job. (For information on VMware vvols, read this article.) So what if we want to back up only two VMs? Do we need to acquiesce to all of them? What if we want to protect some VMs in different backup groups with different backup policies? A dedicated backup software solution, such as Veeam, is recommended to overcome these limitations and provide additional data protection capabilities. Hypervisor Snapshots Hypervisor-based snapshots, on the other hand, operate at the VM level, allowing a snapshot policy to be applied to each VM individually. With the advent of virtualization, the hypervisor now provides an alternative location from which to execute the snapshot process. VMs are simply files (VMDKs in the case of VMware vsphere and VHD files on Microsoft Hyper-V), which means creating and managing snapshots is a case of manipulating these image files. When a VM has an active snapshot, its virtual disk I/O is not performed on the VM s actual virtual disk, but instead they are kept unchanged, and whatever changes in the VM is written to different physical files. This type of snapshot has three side effects: Disk I/O for the VM is much slower since when a snapshot is created, it produces an additional delta file. Each successive snapshot produces an additional file. When a disk operation is performed within the guest, the disk I/O is recreated by parsing each snapshot delta file in the chain. This produces additional disk overhead on the host because more than one file must be opened and processed to recreate the I/O data for the guest operating system. The delta files keep growing over time, consuming disk space. When the snapshots are removed, the delta files have to be merged back to the main virtual disk. This is slow and time-consuming. 6 Hyperconverged Infrastructure Data Protection Isn t a Snap
7 Best practices for virtual machine snapshots can be found in the VMware Knowledge Base, including: A snapshot file is only a change log of the original virtual disk and should not be retained as a backup. Do not use single snapshot for more than hours. Where Snapshots Fall Short As previously mentioned, the major problem with snapshots is that they are usually kept on the same physical volume as the running VM. Obviously this means that if data loss occurs because of a problem with a volume or system, or a failed upgrade, the snapshot will disappear or be corrupted along with the original VM. Furthermore, snapshots are not distinct copies taken at regular intervals; they are generally deltas. New data is incrementally stored, rather than completely replicating the whole image. So what happens if the original storage volume had become corrupted at some point in time? If the parent volume is corrupted, then it becomes impossible to restore at any point in time along the snapshot tree. The same risk applies to virtual snapshots that are often dependent on the original disk image for information. If that image is damaged, the snapshots become worthless. For instance, a command can be run that accidentally removes critical data. For an example of this, view the video How Toy Story 2 Almost Got Deleted. A snapshot can help protect files, but it s not a replacement for a full backup strategy with multiple copies of a system and/or files in a physically separate location. If ransomware starts encrypting your data or malware hits your drives, the snapshot will be affected as part of its imaging data. Compliance is another area where snapshots fall short. They are not designed for long-term retention a common requirement for governance, audits, and compliance. Also, some vendors support a very limited number of snapshots. As previously mentioned, hypervisor vendors do not recommend keeping more than two or three snapshots, and array-based snapshots also have some limitations. For example, a limit of 255 array-based snapshots means less than 37 weeks of retention (assuming one snapshot per day), unless you are using different retentions for hourly/ daily/weekly/monthly snapshots to increase retention but it still can t achieve years or decades of retention. Snapshots do not replace backup, but they can be used to enhance a data protection strategy if you use them at the right time and for the right tasks. Some technologies in an HCI integrate VM-centric backups and DR features to improve availability. Others support snapshots and replication, and provide a common engine across multiple systems. As a result, management is consolidated into a single interface. This covers only some aspects of the strategy, perhaps supporting different media or offline media only, and so on. A dedicated data protection solution, such as Veeam, can increase the level of protection especially when the strategy is used to overcome nearly any failure scenario. Hyperconverged Infrastructure Data Protection Isn t a Snap 7
8 CHOOSING THE RIGHT APPROACH FOR HCIs The best solution for HCIs is to adopt a strategy and combine different technologies. Shortterm snapshots or CDP are great for dealing with user errors or some data corruption scenarios. Snapshots are also the fastest way to restore data. Backup tools, in particular those designed to safeguard virtual environments, are the best solution to protect against hardware failures, site disasters, and virus/ransomware attacks if combined with offline media such as tape. Backups are better for mid-term and long-term data retention. Adding a deduplication appliance can help to reduce the amount of storage required for data protection and the bandwidth required for replication. Deduplication is a must-have if there is a requirement for multiple backup copies in geographically dispersed locations. Why multiple copies? Why long-term retention? Suppose you are hosting virtual desktops on your brand new HCI. Some of your users take a long-term leave of absence, and you routinely remove unused accounts after a few months. This happened to a government agency in the UK and the agency was saved by its backups. Quantum and Veeam: Data Protection for Hyperconverged Environments If you want to avoid putting all your eggs in the same basket, but also don t want too many baskets, Veeam and Quantum offer the best solution to protect HCIs. Data is stored in three different places as shown below, with protection policies managed by Veeam software. ON-SITE Copy 2 OFF-SITE APP OS APP OS APP OS QXS Hybrid Storage -or- Virtualized, Converged, Hyperconverged Environment Veeam Backup Server DXi Dedupe Disk 2 Media Types Cloud 1 Off-Site Copy Off-line Copy 1 Copy 3 Scalar Tape Library Tape Veeam and Quantum are applying hyperconvergence principles to secondary storage and backup solutions. Quantum offers a complete backup solution to implement a best practice approach for data protection: Quantum QXS delivers fast block storage array Quantum DXi provides patented variable-length deduplication Quantum Q-Cloud Protect stores a copy off-site in the cloud Quantum Scalar stores offline/off-site copies on tape. Veeam Backup & Replication manages all backup policies and data movement. 8 Hyperconverged Infrastructure Data Protection Isn t a Snap
9 Hyperconvergence provides great benefits, but it brings new vulnerabilities. Separating production and data protection can be a pragmatic way to mitigate risk and costs. Don t keep your backups or snapshots on the same physical volume or hardware as your production virtual servers. If you have a data loss due to hardware failure, human error, failed upgrades, or any other threat you ll lose everything. For more details on the Quantum and Veeam solution, read this technical brief (Veeam and Quantum Tech Brief TB00043). Hyperconverged Infrastructure Data Protection Isn t a Snap 9
10 ABOUT QUANTUM Quantum is a leading expert in scale-out storage, archive and data protection, providing solutions for capturing, sharing and preserving digital assets over the entire data lifecycle. From small businesses to major enterprises, more than 100,000 customers have trusted Quantum to address their most demanding data workflow challenges. Quantum s end-to-end, tiered storage foundation enables customers to maximize the value of their data by making it accessible whenever and wherever needed, retaining it indefinitely and reducing total cost and complexity. See how at Quantum Corporation. All rights reserved. Quantum, the Quantum logo, Artico and StorNext are either registered trademarks or trademarks of Quantum Corporation and its affiliates in the United States and/or other countries. All other trademarks are the property of their respective owners. WP00219A-v01 Sept 2016 Hyperconverged Infrastructure Data Protection Isn t a Snap 10
The Data Protection Rule and Hybrid Cloud Backup
The 3-2-1 Data Protection Rule and Hybrid Cloud Backup IT teams are under extreme pressure to improve backup, disaster recovery and data protection to eliminate downtime and facilitate digital transformation.
More informationUnderstanding Virtual System Data Protection
Understanding Virtual System Data Protection Server virtualization is the most important new technology introduced in the data center in the past decade. It has changed the way we think about computing
More informationDEDUPLICATION BASICS
DEDUPLICATION BASICS 4 DEDUPE BASICS 6 WHAT IS DEDUPLICATION 8 METHODS OF DEDUPLICATION 10 DEDUPLICATION EXAMPLE 12 HOW DO DISASTER RECOVERY & ARCHIVING FIT IN? 14 DEDUPLICATION FOR EVERY BUDGET QUANTUM
More informationEvolved Backup and Recovery for the Enterprise
Evolved Backup and Recovery for the Enterprise with Asigra technology Working gives me confidence in my data protection plan. I know that if I ever need to restore, it will take a few minutes rather than
More informationarcserve r16.5 Hybrid data protection
arcserve r16.5 Hybrid data protection Whether you re protecting the data center, remote offices or desktop resources, you need a solution that helps you meet today s demanding service-level agreements
More informationCountering ransomware with HPE data protection solutions
Countering ransomware with HPE data protection solutions What is ransomware? Definition Malware that prevents or limits users from accessing their system by: Locking the system s screen Encrypting files
More informationThe storage challenges of virtualized environments
The storage challenges of virtualized environments The virtualization challenge: Ageing and Inflexible storage architectures Mixing of platforms causes management complexity Unable to meet the requirements
More informationProtecting Microsoft Hyper-V 3.0 Environments with Arcserve
Protecting Microsoft Hyper-V 3.0 Environments with Arcserve Adding value to your Hyper-V environment. Today, you face demanding service level agreements (SLAs) while having to address staffing and budget
More information1 Quantum Corporation 1
1 Tactics and Tips for Protecting Virtual Servers Mark Eastman Director, Solutions Marketing April 2008 VMware Changing the Way Data Protection is Done No longer 1 server, 1 backup paradigm App Virtual
More informationBackup and Restore Strategies
Backup and Restore Strategies WHITE PAPER How to identify the appropriate life insurance for your data At home, you safeguard against any incident to protect your family, your life, your property everything
More informationChapter 11. SnapProtect Technology
Chapter 11 SnapProtect Technology Hardware based snapshot technology provides the ability to use optimized hardware and disk appliances to snap data on disk arrays providing quick recovery by reverting
More informationSymantec Reference Architecture for Business Critical Virtualization
Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization
More informationUNITRENDS & NUTANIX ARCHITECTURE & IMPLEMENTATION GUIDE
UNITRENDS & NUTANIX ARCHITECTURE & IMPLEMENTATION GUIDE ALL-IN-ONE BACKUP AND DISASTER RECOVERY FOR LEADING HYPERCONVERGED INFRASTRUCTURE 1 INTRODUCTION Nutanix and Unitrends have jointly integrated their
More informationHow Symantec Backup solution helps you to recover from disasters?
How Symantec Backup solution helps you to recover from disasters? Finn Henningsen Presales Specialist Technology Days 2011 1 Thank you to our sponsors Technology Days 2011 2 Agenda Why do we bother? Infrastructure
More informationTen things hyperconvergence can do for you
Ten things hyperconvergence can do for you Francis O Haire Director, Technology & Strategy DataSolutions Evolution of Enterprise Infrastructure 1990s Today Virtualization Server Server Server Server Scale-Out
More informationData Protection for Cisco HyperFlex with Veeam Availability Suite. Solution Overview Cisco Public
Data Protection for Cisco HyperFlex with Veeam Availability Suite 1 2017 2017 Cisco Cisco and/or and/or its affiliates. its affiliates. All rights All rights reserved. reserved. Highlights Is Cisco compatible
More informationProtecting VMware vsphere/esx Environments with CA ARCserve
Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting VMware vsphere/esx Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while
More informationWHITE PAPER. DATA DEDUPLICATION BACKGROUND: A Technical White Paper
WHITE PAPER DATA DEDUPLICATION BACKGROUND: A Technical White Paper CONTENTS Data Deduplication Multiple Data Sets from a Common Storage Pool.......................3 Fixed-Length Blocks vs. Variable-Length
More informationModernize Your Backup and DR Using Actifio in AWS
FOR AWS Modernize Your Backup and DR Using Actifio in AWS 150105H FOR AWS Modernize Your Backup and DR Using Actifio in AWS What is Actifio? Actifio virtualizes the data that s the lifeblood of business.
More informationTOP REASONS TO CHOOSE DELL EMC OVER VEEAM
HANDOUT TOP REASONS TO CHOOSE DELL EMC OVER VEEAM 10 This handout overviews the top ten reasons why customers choose Data Protection from Dell EMC over Veeam. Dell EMC has the most comprehensive data protection
More informationSymantec NetBackup 7 for VMware
V-Ray visibility into virtual machine protection Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing
More informationWhy SaaS isn t Backup
EBOOK LOGO HERE Why SaaS isn t Backup Yes, You need to backup your cloud data. 1 One of the most business friendly innovations in recent years has been the proliferation of cloud apps like Google Apps,,
More informationVeritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW
Veritas Backup Exec Powerful, flexible and reliable data protection designed for cloud-ready organizations. OVERVIEW Veritas Backup Exec is the backup solution without barriers, delivered your way. You
More informationTable of Contents HOL HCI
Table of Contents Lab Overview - - Getting Started with VxRail... 2 VxRail Lab Overview... 3 Module 1 - VxRail Initial Configuration (15 minutes)... 5 Introduction - Configure a newly deployed VxRail Appliance...
More informationZYNSTRA TECHNICAL BRIEFING NOTE
ZYNSTRA TECHNICAL BRIEFING NOTE Backup What is Backup? Backup is a service that forms an integral part of each Cloud Managed Server. Its purpose is to regularly store an additional copy of your data and
More informationComplete Data Protection & Disaster Recovery Solution
Complete Data Protection & Disaster Recovery Solution Quadric Software 2015 We were looking at other solutions. Alike was the best with XenServer, and none of them had Alike s compression abilities. After
More informationBest practices for protecting Virtualization, SDDC, Cloud, and the Modern Data Center, with NetBackup
Best practices for protecting Virtualization, SDDC, Cloud, and the Modern Data Center, with NetBackup Alain Pelegrin EMEA NetBackup Solutions Lead TSS IM Technology Practice Olivier Ribouchon Presales
More informationThe Expanding Role of Backup and Recovery in the Hybrid Enterprise
The Expanding Role of Backup and Recovery in the Hybrid Enterprise 6 STRATEGIES TO PROTECT MODERN INFRASTRUCTURE ON-PREMISES AND IN THE CLOUD It s no secret. Today s changing infrastructure landscape coupled
More informationPreserving the World s Most Important Data. Yours. SYSTEMS AT-A-GLANCE: KEY FEATURES AND BENEFITS
Preserving the World s Most Important Data. Yours. SYSTEMS AT-A-GLANCE: KEY FEATURES AND BENEFITS We are the only company to integrate disk, tape, and replication in a single solution set for better near-term
More informationProtecting VMware vsphere/esx Environments with Arcserve
Protecting VMware vsphere/esx Environments with Arcserve Today, you face demanding service level agreements (SLAs) while having to address staffing and budget constraints. You seek ways to reduce cost
More informationVMware vsphere Clusters in Security Zones
SOLUTION OVERVIEW VMware vsan VMware vsphere Clusters in Security Zones A security zone, also referred to as a DMZ," is a sub-network that is designed to provide tightly controlled connectivity to an organization
More informationHYCU and ExaGrid Hyper-converged Backup for Nutanix
HYCU and ExaGrid Hyper-converged Backup for Nutanix Backing Up and Recovering Data: Nutanix, ExaGrid and HYCU As IT data centers move to hyper-converged infrastructure, new and innovative backup approaches
More informationProtecting Microsoft SharePoint
TECHNICAL WHITE PAPER: BACKUP EXEC TM 2014 PROTECTING MICROSOFT SHAREPOINT Backup Exec TM 2014 Technical White Paper Protecting Microsoft SharePoint Technical White Papers are designed to introduce Symantec
More information3 Ways Businesses Use Network Virtualization. A Faster Path to Improved Security, Automated IT, and App Continuity
3 Ways Businesses Use Network Virtualization A Faster Path to Improved Security, Automated IT, and App Continuity INTRODUCTION 2 Today s IT Environments Are Demanding Technology has made exciting leaps
More informationAsigra Cloud Backup Provides Comprehensive Virtual Machine Data Protection Including Replication
Datasheet Asigra Cloud Backup Provides Comprehensive Virtual Machine Data Protection Including Replication Virtual Machines (VMs) have become a staple of the modern enterprise data center, but as the usage
More information4 Criteria of Intelligent Business Continuity
4 Criteria of Intelligent Business Continuity BEYOND BACKUP AND DISASTER RECOVERY As we move further into the age of high availability and instant gratification we must adapt our business practices to
More informationWhy Datrium DVX is Best for VDI
Why Datrium DVX is Best for VDI 385 Moffett Park Dr. Sunnyvale, CA 94089 844-478-8349 www.datrium.com Technical Report Introduction Managing a robust and growing virtual desktop infrastructure in current
More informationVeeam Availability Solution for Cisco UCS: Designed for Virtualized Environments. Solution Overview Cisco Public
Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments 1 2017 2017 Cisco Cisco and/or and/or its
More informationDATA CENTRE SOLUTIONS
DATA CENTRE SOLUTIONS NOW OPTIMIZATION IS WITHIN REACH. CONVERGED INFRASTRUCTURE VIRTUALIZATION STORAGE NETWORKING BACKUP & RECOVERY POWER & COOLING 2 INCREASE AGILITY, STARTING IN YOUR DATA CENTRE. Chances
More informationCA ARCserve Backup. Benefits. Overview. The CA Advantage
PRODUCT BRIEF: CA ARCSERVE BACKUP R12.5 CA ARCserve Backup CA ARCSERVE BACKUP, A HIGH-PERFORMANCE, INDUSTRY-LEADING DATA PROTECTION PRODUCT, UNITES INNOVATIVE DATA DEDUPLICATION TECHNOLOGY, POWERFUL STORAGE
More informationBUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY
SOLUTION OVERVIEW BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY Every organization is exploring how technology can help it disrupt current operating models, enabling it to better serve
More informationRedefine Data Protection: Next Generation Backup And Business Continuity
Redefine Data Protection: Next Generation Backup And Business Continuity 1 Business Is Being Redefined Leveraging the Power of Technology Megatrends CLOUD MOBILE SOCIAL BIG DATA 2 Creating New Next Gen
More informationvsan Security Zone Deployment First Published On: Last Updated On:
First Published On: 06-14-2017 Last Updated On: 11-20-2017 1 1. vsan Security Zone Deployment 1.1.Solution Overview Table of Contents 2 1. vsan Security Zone Deployment 3 1.1 Solution Overview VMware vsphere
More informationAcronis Hybrid Cloud Architecture Unified Centralized Data Protection Web-based User Interface Deployed On-premises or in the Cloud.
Acronis Hybrid Cloud Architecture Unified Centralized Data Protection Web-based User Interface Deployed On-premises or in the Cloud A PUBLIC Any Deploy ment UBER VENDOR Any Workload ON-PREMISES PHYSICAL
More informationBoost your data protection with NetApp + Veeam. Schahin Golshani Technical Partner Enablement Manager, MENA
Boost your data protection with NetApp + Veeam Schahin Golshani Technical Partner Enablement Manager, MENA NetApp Product Strategy Market-leading innovations, that are NetApp Confidential Limited Use 3
More informationXcellis Technical Overview: A deep dive into the latest hardware designed for StorNext 5
TECHNOLOGY BRIEF Xcellis Technical Overview: A deep dive into the latest hardware designed for StorNext 5 ABSTRACT Xcellis represents the culmination of over 15 years of file system and data management
More informationHyper-converged Secondary Storage for Backup with Deduplication Q & A. The impact of data deduplication on the backup process
Hyper-converged Secondary Storage for Backup with Deduplication Q & A The impact of data deduplication on the backup process Table of Contents Introduction... 3 What is data deduplication?... 3 Is all
More informationData Protection Everywhere. For the modern data center
Data Protection Everywhere For the modern data center Tale of two worlds You need both for Traditional apps IT centric & Next-gen apps Developer centric On-premise Trust Agility Live in the cloud 3 Copyright
More informationSimplify Backups. Dell PowerVault DL2000 Family
Simplify Backups Dell PowerVault DL2000 Family SIMPLIFYING I T The Dell PowerVault DL2000 family helps reduce the cost and complexity of backups and restores, freeing up valuable resources that you can
More informationIBM TS7700 grid solutions for business continuity
IBM grid solutions for business continuity Enhance data protection and business continuity for mainframe environments in the cloud era Highlights Help ensure business continuity with advanced features
More informationThe Three Data Challenges
The Three Data Challenges Mark Bentkower, CISSP, Director Solutions Marketing, APAC 12 October 2017 2016 COMMVAULT SYSTEMS, INC. ALL RIGHTS RESERVED. You can have data without information, but you cannot
More informationHedvig as backup target for Veeam
Hedvig as backup target for Veeam Solution Whitepaper Version 1.0 April 2018 Table of contents Executive overview... 3 Introduction... 3 Solution components... 4 Hedvig... 4 Hedvig Virtual Disk (vdisk)...
More informationMicrosoft E xchange 2010 on VMware
: Microsoft E xchange 2010 on VMware Availability and R ecovery Options This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more
More informationSolution Brief: Commvault HyperScale Software
Solution Brief: Commvault HyperScale Software ENTERPRISE IT SHIFTS Enterprise IT is being transformed with the maturing of public cloud providers that offer compute, storage and application services with
More informationChapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/
Chapter 1 Storage Concepts 4 - Storage Concepts In order to understand CommVault concepts regarding storage management we need to understand how and why we protect data, traditional backup methods, and
More informationDisaster Recovery as a Service
Disaster Recovery as a Service Heart-stopping IT failure. At least your business won t skip a beat. 02 delivering business agility 03 Flexible, cost-effective DRaaS made simple Enjoy rapid recovery following
More informationBalakrishnan Nair. Senior Technology Consultant Back Up & Recovery Systems South Gulf. Copyright 2011 EMC Corporation. All rights reserved.
Balakrishnan Nair Senior Technology Consultant Back Up & Recovery Systems South Gulf 1 Thinking Fast: The World s Fastest Backup Now Does Archive Too Introducing the New EMC Backup and Recovery Solutions
More informationArcserve Solutions for Amazon Web Services (AWS)
Arcserve Solutions for Amazon Web Services (AWS) Introduction The public cloud has become a major factor in all IT decision making due to its endless supply of technical resources at an affordable cost.
More informationNutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure
Nutanix Tech Note Virtualizing Microsoft Applications on Web-Scale Infrastructure The increase in virtualization of critical applications has brought significant attention to compute and storage infrastructure.
More informationThe Ultimate Guide for Virtual Server Protection
The Ultimate Guide for Virtual Server Protection 4 QUESTIONS EVERYONE SHOULD ASK ABOUT VIRTUAL SERVER DATA PROTECTION IT leadership should be looking to storage and data management teams to ensure they
More informationvsan Disaster Recovery November 19, 2017
November 19, 2017 1 Table of Contents 1. Disaster Recovery 1.1.Overview 1.2.vSAN Stretched Clusters and Site Recovery Manager 1.3.vSAN Performance 1.4.Summary 2 1. Disaster Recovery According to the United
More informationDisaster Recovery Is A Business Strategy
Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...
More informationIntegrated and Hyper-converged Data Protection
Integrated and Hyper-converged Data Protection Simplicity & Agility GLOBAL SPONSORS Data Protection Portfolio Protection and recovery to cloud PROTECTION STORAGE PROTECTION SOFTWARE PROTECTION APPLIANCE
More informationCatalogic DPX: Backup Done Right
Catalogic DPX: Backup Done Right The Backup Alternative You ve Been Waiting For Catalogic DPX Highlights Fast and reliable low-impact backup for physical and virtual environments Direct access to data
More informationServer Fault Protection with NetApp Data ONTAP Edge-T
Technical Report Server Fault Protection with NetApp Data ONTAP Edge-T Jeff Whitaker, NetApp March 2013 TR-4154 TABLE OF CONTENTS 1 Introduction... 3 2 Backup and Disaster Recovery Technology... 4 2.1
More informationOL Connect Backup licenses
OL Connect Backup licenses Contents 2 Introduction 3 What you need to know about application downtime 5 What are my options? 5 Reinstall, reactivate, and rebuild 5 Create a Virtual Machine 5 Run two servers
More informationWhy Continuity Matters
Why Email Continuity Matters Contents What is Email Continuity and Why it Matters........................... 1 Challenges to Email Continuity................................... 2 Increasing Email Management
More informationData Protection for Virtualized Environments
Technology Insight Paper Data Protection for Virtualized Environments IBM Spectrum Protect Plus Delivers a Modern Approach By Steve Scully, Sr. Analyst February 2018 Modern Data Protection for Virtualized
More informationBusiness Continuity and Disaster Recovery. Ed Crowley Ch 12
Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster
More informationTrends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation
Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member
More informationFile backup and recovery programs store duplicate copies of data to protect you from data loss.
What is data backup and recovery? Data backup is a proactive means to mitigate the loss of data, files, or systems by creating duplicate copies of data. Creating backups can reduce the chance of losing
More informationAchieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER
Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3
More informationMaximizing Availability With Hyper-Converged Infrastructure
Maximizing Availability With Hyper-Converged Infrastructure With the right solution, organizations of any size can use hyper-convergence to help achieve their most demanding availability objectives. Here
More informationThe Data-Protection Playbook for All-flash Storage KEY CONSIDERATIONS FOR FLASH-OPTIMIZED DATA PROTECTION
The Data-Protection Playbook for All-flash Storage KEY CONSIDERATIONS FOR FLASH-OPTIMIZED DATA PROTECTION The future of storage is flash The all-flash datacenter is a viable alternative You ve heard it
More informationThe Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio
Prompt. Courteous. Knowledgeable. Support you deserve. The Value Of NEONet Cybersecurity Why You Need To Protect Your Private Student Data In Ohio 1 TABLE OF CONTENTS 2 2 2-3 4 5 7 Introduction The Three
More informationData safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.
WHITE PAPER Data safety for digital business. One solution for hybrid, physical, and virtual environments. It s common knowledge that the cloud plays a critical role in helping organizations accomplish
More informationData Protection Everywhere
Data Protection Everywhere For the modern data center Syed Saleem Advisory Systems Engineer Pillars of the modern data center Protection and trust Security/Governance Encryption Data Protection Services/Support
More informationRemove complexity in protecting your virtual infrastructure with. IBM Spectrum Protect Plus. Data availability made easy. Overview
Overview Challenge In your organization, backup management is too complex and consumes too much time and too many IT resources. Solution IBM Spectrum Protect Plus dramatically simplifies data protection
More informationDell DR4000 Replication Overview
Dell DR4000 Replication Overview Contents Introduction... 1 Challenges with Data Disaster Recovery... 1 The Dell DR4000 Solution A Replication Overview... 2 Advantages of using DR4000 replication for disaster
More informationMerging Enterprise Applications with Docker* Container Technology
Solution Brief NetApp Docker Volume Plugin* Intel Xeon Processors Intel Ethernet Converged Network Adapters Merging Enterprise Applications with Docker* Container Technology Enabling Scale-out Solutions
More informationHow unified backup and cloud enable your digital transformation success
Key Considerations for Data Protection and Cloud on Your Digital Journey How unified backup and cloud enable your digital transformation success An IDC InfoBrief, Sponsored by February 2018 1 Digital Transformation
More informationEMC DATA DOMAIN PRODUCT OvERvIEW
EMC DATA DOMAIN PRODUCT OvERvIEW Deduplication storage for next-generation backup and archive Essentials Scalable Deduplication Fast, inline deduplication Provides up to 65 PBs of logical storage for long-term
More informationVeritas Storage Foundation for Oracle RAC from Symantec
Veritas Storage Foundation for Oracle RAC from Symantec Manageability, performance and availability for Oracle RAC databases Data Sheet: Storage Management Overviewview offers a proven solution to help
More informationChapter 10 Protecting Virtual Environments
Chapter 10 Protecting Virtual Environments 164 - Protecting Virtual Environments As more datacenters move to virtualize their environments and the number of virtual machines and the physical hosts they
More informationMicrosoft SQL Server HA and DR with DVX
Microsoft SQL Server HA and DR with DVX 385 Moffett Park Dr. Sunnyvale, CA 94089 844-478-8349 www.datrium.com Technical Report Introduction A Datrium DVX solution allows you to start small and scale out.
More informationCopyright 2012 EMC Corporation. All rights reserved.
1 Transforming Backup And Recovery 2 THE JOURNEY CONTINUES 3 IT PRESSURES KEEP STACKING UP Compliance & Discovery Infrastructure Shift Budget Dilemma Data Growth 4 CONVERGENCE OF BACKUP & ARCHIVING Backup
More informationTintri & Veeam VM Backup & Replication Best Practices. John Phillips Strategic Alliances and Technical Marketing Ryan Post Systems Engineer
Tintri & Veeam VM Backup & Replication Best Practices John Phillips Strategic Alliances and Technical Marketing Ryan Post Systems Engineer 1 VM-aware Storage from Tintri Stores VMs and vdisks (only!) No
More informationRedefine Data Protection: Next Generation Backup & Business Continuity Solutions
Redefine Data Protection: Next Generation Backup & Business Continuity Solutions 1 Creating New Next Gen Applications Existing Workloads Continue to Grow 2 How Can Data Protection Help? Lower Cost Reduce
More informationHCI: Hyper-Converged Infrastructure
Key Benefits: Innovative IT solution for high performance, simplicity and low cost Complete solution for IT workloads: compute, storage and networking in a single appliance High performance enabled by
More informationConverged and Hyper-Converged: Factory-Integrated Data Protection for Simplicity and Lifecycle Assurance
Converged and Hyper-Converged: Factory-Integrated Data Protection for Simplicity and Lifecycle Assurance Key takeaways Dell EMC offers unique factory-integrated data protection for CI and HCI systems to
More informationVeeam Agent for Microsoft Windows
Veeam Agent for Microsoft Windows Version 2.1 User Guide December, 2017 2017 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication
More informationDisk-Based Data Protection Architecture Comparisons
Disk-Based Data Protection Architecture Comparisons Abstract The dramatic drop in the price of hard disk storage combined with its performance characteristics has given rise to a number of data protection
More informationECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS. By George Crump
ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS By George Crump Economical, Storage Purpose-Built for the Emerging Data Centers Most small, growing businesses start as a collection of laptops
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationTHE DEFINITIVE GUIDE TO BACKUP FOR OFFICE 365
THE DEFINITIVE GUIDE TO BACKUP FOR OFFICE 365 ENSURING COMPLETE AND EFFECTIVE DATA PROTECTION FOR OFFICE 365 TABLE OF CONTENTS THE TRUTH ABOUT SAAS DATA LOSS THE TOP 4 REASONS YOU NEED BACKUP FOR OFFICE
More informationEMC DATA DOMAIN OPERATING SYSTEM
EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 31 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive
More informationBuilding a Smart Segmentation Strategy
Building a Smart Segmentation Strategy Using micro-segmentation to reduce your attack surface, harden your data center, and secure your cloud. WP201705 Overview Deployed at the network layer, segmentation
More informationMAXIMIZE YOUR NUTANIX ROI WITH SURELINE SUREedge
SOLUTIONS BRIEF MAXIMIZE YOUR NUTANIX ROI WITH SURELINE SUREedge SUREedge delivers compelling value to Nutanix users with Migration and DR solutions AT A GLANCE Nutanix delivers an enterprise cloud platform
More informationStorageCraft OneXafe and Veeam 9.5
TECHNICAL DEPLOYMENT GUIDE NOV 2018 StorageCraft OneXafe and Veeam 9.5 Expert Deployment Guide Overview StorageCraft, with its scale-out storage solution OneXafe, compliments Veeam to create a differentiated
More informationWhite paper: Agentless Backup is Not a Myth. Agentless Backup is Not a Myth
White paper: less Backup is Not a Myth less Backup is Not a Myth White paper: less Backup is Not a Myth Executive Summary Backup and recovery software typically requires agents that are installed onto
More information