Data Replication Whitepaper

Size: px
Start display at page:

Download "Data Replication Whitepaper"

Transcription

1 Data Replication Whitepaper WHITEPAPER

2 Introduction: The Role of Replication in the Enterprise In our information-driven economy, a strong case could be made for the assertion that the value of the data stored in a company s storage servers or data center is far greater than the value of the storage servers on which they reside. Unfortunately, this fact is not realized until after a disaster such as a power outage, tornado, flood, or fire strikes, and an organization experiences firsthand how the loss of data is even more catastrophic than the material loss of goods. In many industries, the loss of data on a large scale could signal the end of a company in its present form. A common response to this vulnerability is to accept responsibility for the need to protect data, by copying it and moving it to an offsite repository where necessary, to guard against the original data s loss or corruption. Data duplication, or replication, as it is commonly known, is a very effective safeguard; however, to understand its full value, it is necessary to first understand the process of leveraging replication as a means of business continuity. The point to be realized is that there are many modes of replication, each with their strengths and weaknesses, and that the ideal solution lies in their tight integration, combining them or utilizing each at the appropriate time to leverage the cost and performance benefits of each. A typical replication deployment consists of both a local server, which acts as the primary data source and fields reads and writes from clients, and a remote server, which acts as a backup repository for all of the information stored in the primary. The link between the primary and secondary servers is established in various ways, depending on distance and permissible cost: the link could be over a dedicated network link, an optical connection, or a shared corporate network. WHITEPAPER 2

3 Figure 1: A typical replication setup In many deployments, the dedicated link between the primary and secondary servers is a significant portion of the system s cost, operating cost, and the expense of writing I/Os to the secondary server often exceeds the expense of writing them to the primary. However, the purpose of the secondary is made painfully clear when the primary server undergoes a catastrophic failure, and the administrator has to restart the company s business from the secondary. This is often done manually, by remounting various volumes from the secondary and restarting affected applications, although many storage and application software stacks can automate this process. Whether manual or automatic, an operation such as this is called a failover. In failover mode, the secondary server takes over as the recipient of I/Os from clients. The cost of keeping the system running may be higher during failover (due to the greater cost of networking a system to the secondary server), but for many businesses, this cost is far lower than the cost of not doing business for the duration of disaster recovery. WHITEPAPER 3

4 Figure 2: Failover to Secondary after Loss of Primary When the primary server has been restored -by recovering, repairing, or replacing it- the administrator will most likely want to return control back to the primary, for financial reasons if nothing else. This operation is quite similar to failover, and is called failback. The major difference is that failback is also done in a disconnected (i.e., offline) fashion, with volumes being reconnected and applications being restarted before I/Os are shipped. A Brief Overview of RTO and RPO The value that organizations attach to protecting their data through replication is widely different, typically due to the degree of the critical nature of the data, as well as the cost of keeping it protected. In response to such a market, the storage industry as a whole promotes several different methods ofreplication. What they have in common, is that each of these various methods trade off two critical parameters against cost: Recovery Time Objective and Recovery Point Objective. WHITEPAPER 4 To understand these parameters, RTO can be thought of as the duration of time that elapses between the failure of a primary site and assumption of control by the secondary through failover. Most companies can withstand downtime of a few minutes, while others, such as banks or other financial institutions, cannot afford to be down for a second.

5 In the same light, RPO can be thought of as the amount of data loss that can be tolerated, measured in units of time. When a primary storage server fails, the difference between point at which the last set of data was saved to the primary storage server and the last data save to the secondary storage server is the RPO. In situations such as source code control, data loss of a few minutes is acceptable, while for banking or airline reservation transactions, as is the case with RTO, even one second s worth of data loss can cause irreparable damage because of the amount of transactions that occur within that second. Primary Secondary time lag RPO RTO Secondary takes over Point of Disaster Replication starts Any data beyond this point has not reached the secondary Data replicated to secondary Recovery Period Figure 3: Replication, disaster, recovery, RPO and RTO Obviously, the ideal is to keep both of these benchmarks as close to zero as possible, but naturally, faster recovery times and a smaller time gap between the primary and backup data mean an increase the costs of deploying such a system. WHITEPAPER 5 Balancing RPO and RTO with Cost, Performance, and Data

6 Protection As stated above, a major factor in the choice between the major modes of replication, besides the costs of their implementation and operation, is the RPO and RTO that each offer. As detailed below, these two characteristics can differ greatly over the three major types of replication. Fault Tolerant I/O and High Availability Generally speaking, the costliest form of replication with an RPO and RTO of zero is called active-active clustering, or mirroring. In this form of replication, both the primary and the secondary servers are active and functioning at the same time; clients connect to both the servers, and the servers take care of maintaining consistency with each other at all times. When a server fails, it is equivalent to the failure of a redundant component, leaving the system untroubled. The second server seamlessly takes over the entire functionality of the system without necessitating a manual fail-over. This same functionality can be incorporated into a single enclosure, with dual controllers saving physical space and reducing the carbon footprint of an organization data center. Figure 4: Active/active mirroring or clustering WHITEPAPER 6

7 Synchronous Replication Next in the list is synchronous replication. In this replication method, only the primary server fields I/Os from clients. Every write that arrives to a client is also mirrored to the secondary server, and the write is signaled as being completed only when it has completed on both servers. In this manner, the applications running on the client machines are always guaranteed to have their writes written to both servers, and if any one server fails, the other is guaranteed to contain all the data that has been written so far. The RPO of synchronous replication is, therefore, zero. However, it may be necessary to manually failover a synchronous replication setup, and the RTO may be of the order of a few hours. Primary Volumes Replica primary responsible for blue volume secondary responsible for green volume data replicated in this direction Figure 5: Synchronous replication WHITEPAPER 7 An approach such as this is preferred for applications that require a critical level of data protection, such as market trading and airline reservation management

8 applications, because of its RPO of zero. There is no data loss between the primary and secondary servers, should the application be required to fail over to the secondary. While synchronous replication is a straightforward approach, it is not trouble-free; some of the larger potential drawbacks of synchronous replication are elaborated below. First, synchronous replication can suffer from write-order fidelity issues if data is cached above it. Data that is held in a write-back cache could be lost when disaster strikes, rendering the replication worthless. To counteract this potential problem, data must be replicated before it is stored in the cache for a SAN volume, and for NAS volumes it must work just below the file-system. Synchronous replication deployments can be expensive, primarily because a high-speed connection is required between the primary and secondary servers in order to avoid a decrease in I/O throughput performance. In fact, in deployments where the servers are geographically distant, such as between continents or on different coasts, the cost of a dedicated high-speed link may be out of reach. An additional concern is related to the issue of latency, and its negative impact on server performance in synchronous replication. Since writes must be completed on both the primary and secondary servers before being completed to the initiator, this can exert a significant potential impact on the speed with which I/Os are recorded to the host device, and by extension on application performance, as illustrated below. WHITEPAPER 8

9 Figure 6: Latency and performance of synchronous replication Finally, performance is often decreased further in implementations of synchronous replication when the secondary server is implementing snapshots for data backup. Because typical implementations of snapshots are slow, performance can be degraded by a factor of as much as twenty when snapshots are active, unless countermeasures are taken. Asynchronous Replication For applications that are not mission critical, and can tolerate a slight lag between writes to the primary and the secondary for the sake of improved bandwidth usage, asynchronous replication can be a better choice. In this method of replication, I/Os are not sent from the primary to the secondary server in line with their arrival from clients; rather, they are buffered at the primary for a brief interval before being sent to the secondary. WHITEPAPER 9 This buffering of replicated data improves bandwidth utilization and yields lower costs. Since buffered data can be compressed or otherwise optimized for size, the asynchronous replication link can be significantly slower than

10 that for a synchronous replication. Because of the lag, duplicate writes to the same block are only sent once, again reducing bandwidth use. The trade-off, however, is in the RPO: if disaster strikes, any open buffers on the primary side must necessarily be lost, and the secondary, by virtue of lagging behind the primary, will exhibit this brief data loss to clients. Figure 7: Asynchronous replication Asynchronous replication increases I/O performance on the primary, because latency is substantially reduced. The problem of write-order fidelity, however, becomes a larger issue in comparison to synchronous replication. Since the initiator is not directly in control of the order in which I/Os are sent to the secondary, it can no longer verify that dependent writes are flushed in the correct order to the replica. The role of the replication engine therefore becomes more important, since it is now the responsibility of the storage server to make sure that any application running on the initiator is able to recover smoothly from the secondary server if the primary becomes disabled. WHITEPAPER 10 In many contemporary implementations of asynchronous replication, the management of write-order fidelity is done by collecting I/Os arriving at the primary, and sending them to the secondary server in exactly the same order,

11 without any kind of framing or buffering. This is guaranteed to ensure writeorder fidelity, but it forgoes any potential performance or bandwidth gains that asynchronous replication might bring. Snapshot-assisted Replication (SAR) Snapshot-assisted replication can be considered as somewhat of a variation on asynchronous replication. The main difference between the two is that instead of relying on collected buffers to minimize data transfer rates, snapshotassisted replication relies on snapshots, or point-in-time images of a volume, to establish checkpoints from which to transfer data to the secondary server. A snapshot represents the sum total of all changes since the previous snapshot eliminating all duplicate writes in the intervening period. One major advantage of using a snapshot for replication is that it is a fixed target: once a snapshot has been taken, it never changes. Therefore, it can be copied to a remote server at leisure, without having to deal with locking or consistency issues. Figure 8: Snapshot-assisted replication WHITEPAPER 11 The RPO for this kind of replication, however, varies due to the frequency with which snapshots are taken. For this reason, it is properly called periodic replication rather than continuous replication, which is the term used to refer to the preceding three forms.

12 The RTO may often be significantly lower than synchronous and asynchronous replication, however. Because snapshots are application-consistent point-intime images of volumes, they can be mounted and accessed independently of the volume once they are taken. When a snapshot has been replicated (as volume writes) to the secondary server, a snapshot is taken on the secondary to stamp the point of application consistency. The primary snapshot from which this replica was created can now be deleted. If there is a need to perform failover and restart the application server from the secondary, all that needs to be done is to roll back on the secondary to the latest application-consistent snapshot, and the application will be guaranteed to work. Some storage appliances and software stacks can perform snapshot-assisted replication using a technology called delta-mounting snapshots, a mode of mounting exists that is inherently more powerful in a recovery situation. In this mode, a snapshot is mounted as a sequentially accessible volume that contains only the changes between the snapshot and its predecessor. All data that is accessible through a delta mount will consist of the totality of writes that occurred since the previous snapshot, and replicating these writes alone will be sufficient to arrive at the next application-consistent point on the secondary server. Figure 9: Mounting and Recovery from Delta Snapshot WHITEPAPER 12

13 SAR in an Extensible User-Mode Framework One of the greatest benefits of snapshot-assisted replication is realized when it becomes part of an extensible user-mode framework. Once done, it becomes possible to incorporate a variety of features into SAR, and thus integrate it with third-party products with ease. For example, it now becomes possible to deploy and upgrade snapshot-assisted replication without rebooting the machine, as a result of its position in the stack. Another one of the extensions that snapshot-assisted replication can support is data compression. Since data is read from a snapshot and written to the secondary outside the I/O path, efficient compression algorithms can be applied to greatly reduce the amount of bandwidth needed. In the same light, in addition to compressing data it also becomes possible to compress differential data using delta snapshot-assisted replication. To do so, the snapshot-assisted replication module reads not only the most recent snapshot data, but also the data from a previous snapshot data, and merely compresses the difference between the two. By doing this, it is possible to transmit differences to the remote side at byte-level granularity, compressed with highly efficient algorithms. This method is near the pinnacle in terms of minimizing the amount of data that is transacted between the primary and secondary servers. Aside from compression, another useful feature that snapshot-assisted replication provides is the ability to batch data replication, or to schedule it to happen only at a particular intervals, in order to schedule replication for times when the workload on the servers is lowest. Administrators can use this feature effectively to further decrease the total cost of ownership that replication incurs. In addition to compression, there are a number of methods to optimize the TCP/IP connections to maximize the throughput of the physical link. This enables organizations to overcome the costly addition of increased bandwidth and allow for an affordable DR solution. WHITEPAPER 13

14 Various new replication configurations become possible due to flexible implementation of snapshot-assisted replication. For example, one-to-many replication becomes much simpler, meaning that a single volume may be replicated to multiple replica mirrors, for even greater data protection. It is also now possible to replicate to a storage medium that is not vendor-locked, such as a generic tape backup device or a simple disk array (also known as JBOD, or just a bunch of disks ). This flexibility empowers an administrator to choose the most appropriate backup scheme for the organization, without being tied the replication mechanism that is in use. Conclusion As should be clear from the discussion above, a wide spectrum of replication solutions exist for deployment in storage networks and data centers, trading off RPO, RTO and cost against each other. An analysis of the different major modes of replication, along with their various merits and problem solving approaches, was presented here to highlight the suitability of each. StorTrends itx: Balancing Replication Modes for Optimum Performance It is likely that the ideal solution lies in a combination of all three, since all of the major modes (mirroring, synchronous, and asynchronous/snap-assisted) of replication have their benefits and drawbacks. The ideal storage solution would offer the capability to choose between each type of replication based on an accurate need-assessment, balancing the pros and cons to arrive at an optimal choice. Fortunately, StorTrends from American Megatrends provides exactly such a solution, at a price that is affordable even to small and medium sized (SMB) users. Recovery Point Objective(RTO)Recovery Time Objective(RTO)CostCostActive/ Active ClusteringSynchronous ReplicationAsynchronous ReplicationSnapshotassistedReplicationTape backup &Offline replicationactive/active ClusteringSynchronous ReplicationAsynchronous ReplicationSnapshotassistedReplicationTape backup &Offline replication WHITEPAPER 14

15 Figure 10: RPO and RTO of Major Replication Schemes The innovative features of StorTrendsmake error handling safer and easier, and manage link and power failure in a decisive manner. This unique software stack has been shown to decrease bandwidth requirements, and balance link and CPU utilization, while providing constant high performance. It is also amenable to various value-adds that may be added by third parties to enhance the performance and flexibility of its replication module. Whether operating on an SAN or NAS StorTrends storage device, data replication in StorTrends contains all three of the primary replication modes (synchronous, asynchronous, and snapshot-assisted) discussed in this paper. StorTrends also offers a form of mirroring in its high availability configuration. This flexibility makes it equally effective for units installed in remote offices as it is for units installed in the same rack in the data center. StorTrends: Putting It All Together WHITEPAPER 15 All these forms of replication are tightly integrated in StorTrends, making it easy to choose a replication mode that best serves a user s needs. Regardless of the type of replication being performed, various operations may be performed

16 simultaneously on both the primary and secondary servers, including the creation and deletion of snapshots, expansion of volume capacity, and even rollbacks and restores. The result of this tight cohesion of the various replication features of StorTrendsis added flexibility and power in the hands of the user. The solid integration that StorTrends applies its replication technology also has the effect of making replication transparent and invisible to the user until disaster strikes which, quite simply, is the way it should be. StorTrends gives administrators the ability to balance cost, performance, and data protection requirements by offering multiple modes of replication to suit a wide variety of needs, based on the proximity, connection speed, and critical nature of the devices and data involved. This dual dialect software (SAN and NAS) is preinstalled on all StorTrends servers, giving users the ability to configure with ease, thanks to its intuitive interface and powerful CLI scripting tools. Additionally, StorTrendsalso provides support for UPS power switchover notification in the event of a power failure. Figure 11: Balance RPO, RTO and Cost with StorTrends WHITEPAPER 16

17 Why StorTrends? Consider StorTrends for your data replication solution because StorTrends from American Megatrends, Inc. is Performance Storage with Proven Value. StorTrends SAN and NAS storage appliances are installed worldwide and trusted by companies and institutions in a wide range of industries including education, energy, finance, state & local government, healthcare, manufacturing, marketing, retail, R&D and many more. StorTrends enables users with the features and tools necessary to meet the challenges and demands of today s business environments by offering key network storage functionality such as unified storage, simplified management, business continuity, disaster recovery, high efficiency and virtualization support. Since 2001, StorTrends has built a community of over 1,000 satisfied customers thanks to award-winning products, integrated data protection and world-class support, while continuing to enhance its products with patented enterpriseclass features. For more information on StorTrends solutions from AMI, visit to sales@ami.com, or call U-BUY-AMI. WHITEPAPER 17

Tech Sheet Benefits of Dual Redundant Active/Active Storage Architecture

Tech Sheet Benefits of Dual Redundant Active/Active Storage Architecture Tech Sheet Benefits of Dual Redundant Active/Active Storage Architecture Tech Sheet Introduction Storage servers constitute the very foundation of any data center and their features, performance and scalability

More information

itx with RAID-RT Robust Raid Technology Whitepaper

itx with RAID-RT Robust Raid Technology Whitepaper itx with RAID-RT Robust Raid Technology Whitepaper WHITEPAPER Introduction RAID (Redundant Array of Independent Disks) technology constitutes the very foundation of network storage servers today, and its

More information

Disaster Recovery Options

Disaster Recovery Options Disaster Recovery Options Balancing Pros and Cons, Objectives and Cost This ebook is written for both technology and non-technology executives who want to know their options and create a plan that appropriately

More information

VERITAS Volume Replicator. Successful Replication and Disaster Recovery

VERITAS Volume Replicator. Successful Replication and Disaster Recovery VERITAS Volume Replicator Successful Replication and Disaster Recovery V E R I T A S W H I T E P A P E R Table of Contents Introduction.................................................................................1

More information

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc.

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. Table of Contents Section I: The Need for Warm Standby...2 The Business Problem...2 Section II:

More information

Dell DR4000 Replication Overview

Dell DR4000 Replication Overview Dell DR4000 Replication Overview Contents Introduction... 1 Challenges with Data Disaster Recovery... 1 The Dell DR4000 Solution A Replication Overview... 2 Advantages of using DR4000 replication for disaster

More information

Benefits of Multi-Node Scale-out Clusters running NetApp Clustered Data ONTAP. Silverton Consulting, Inc. StorInt Briefing

Benefits of Multi-Node Scale-out Clusters running NetApp Clustered Data ONTAP. Silverton Consulting, Inc. StorInt Briefing Benefits of Multi-Node Scale-out Clusters running NetApp Clustered Data ONTAP Silverton Consulting, Inc. StorInt Briefing BENEFITS OF MULTI- NODE SCALE- OUT CLUSTERS RUNNING NETAPP CDOT PAGE 2 OF 7 Introduction

More information

Disaster Recovery Guide

Disaster Recovery Guide Disaster Recovery Guide DR in Virtualized Environments Powered by PREFACE Disaster Recovery in a Virtualized World In today s always-on, information-driven organizations, business continuity depends completely

More information

Advanced Snapshots Whitepaper

Advanced Snapshots Whitepaper Advanced Snapshots Whitepaper WHITEPAPER Introduction: The Need for Snapshots In any storage system, the one feature that is of paramount importance to the user is data protection. While the idea that

More information

White Paper. How to select a cloud disaster recovery method that meets your requirements.

White Paper. How to select a cloud disaster recovery method that meets your requirements. How to select a cloud disaster recovery method that meets your requirements. VS Table of contents Table of contents Page 2 Executive Summary Page 3 Introduction Page 3 Disaster Recovery Methodologies Page

More information

VERITAS Volume Replicator Successful Replication and Disaster Recovery

VERITAS Volume Replicator Successful Replication and Disaster Recovery VERITAS Replicator Successful Replication and Disaster Recovery Introduction Companies today rely to an unprecedented extent on online, frequently accessed, constantly changing data to run their businesses.

More information

Business Continuity and Disaster Recovery. Ed Crowley Ch 12

Business Continuity and Disaster Recovery. Ed Crowley Ch 12 Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster

More information

An Oracle White Paper May Oracle VM 3: Overview of Disaster Recovery Solutions

An Oracle White Paper May Oracle VM 3: Overview of Disaster Recovery Solutions An Oracle White Paper May 2014 Oracle VM 3: Overview of Disaster Recovery Solutions Contents Introduction... 1 Overview of DR Solutions with Oracle VM... 2 Choose your DR solution path... 2 Continuous

More information

High Availability and Disaster Recovery Solutions for Perforce

High Availability and Disaster Recovery Solutions for Perforce High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce

More information

HUAWEI OceanStor Enterprise Unified Storage System. HyperReplication Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

HUAWEI OceanStor Enterprise Unified Storage System. HyperReplication Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD. HUAWEI OceanStor Enterprise Unified Storage System HyperReplication Technical White Paper Issue 01 Date 2014-03-20 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may

More information

Where s Your Third Copy?

Where s Your Third Copy? Where s Your Third Copy? Protecting Unstructured Data 1 Protecting Unstructured Data Introduction As more organizations put their critical data on NAS systems, a complete, well thought out data protection

More information

Simplifying Downtime Prevention for Industrial Plants. A Guide to the Five Most Common Deployment Approaches

Simplifying Downtime Prevention for Industrial Plants. A Guide to the Five Most Common Deployment Approaches Simplifying Downtime Prevention for Industrial Plants A Guide to the Five Most Common Deployment Approaches Simplifying Downtime Prevention for Industrial Plants: A Guide to the Five Most Common Deployment

More information

Copyright 2012 EMC Corporation. All rights reserved.

Copyright 2012 EMC Corporation. All rights reserved. 1 TRANSFORM IT+BUSINESS+YOURSELF DISASTER RECOVERY FOR MISSION CRITICAL APPLICATIONS EMC FORUM 2012 SKOPJE Dejan Živanović Presales Manager Dejan.Zivanovic@emc.com 2 Cloud A New Architecture Old World

More information

Protect enterprise data, achieve long-term data retention

Protect enterprise data, achieve long-term data retention Technical white paper Protect enterprise data, achieve long-term data retention HP StoreOnce Catalyst and Symantec NetBackup OpenStorage Table of contents Introduction 2 Technology overview 3 HP StoreOnce

More information

HA-AP Hardware Appliance

HA-AP Hardware Appliance HA-AP Hardware Appliance Solution Whitepaper: High Availability SAN Appliance - Guarantees Data Access and Complete Transparency November 2013 Loxoll Inc. California U.S.A. Protection against workflow

More information

SAP HANA Disaster Recovery with Asynchronous Storage Replication

SAP HANA Disaster Recovery with Asynchronous Storage Replication Technical Report SAP HANA Disaster Recovery with Asynchronous Storage Replication Using SnapCenter 4.0 SAP HANA Plug-In Nils Bauer, Bernd Herth, NetApp April 2018 TR-4646 Abstract This document provides

More information

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered Over the last decade, cloud backup, recovery and restore (BURR) options have emerged

More information

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper By Anton Els

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper By Anton Els Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper By Anton Els Copyright 2017 Dbvisit Software Limited. All Rights Reserved V3, Oct 2017 Contents Executive Summary...

More information

High availability and disaster recovery with Microsoft, Citrix and HP

High availability and disaster recovery with Microsoft, Citrix and HP High availability and disaster recovery White Paper High availability and disaster recovery with Microsoft, Citrix and HP Using virtualization, automation and next-generation storage to improve business

More information

SAP HANA. HA and DR Guide. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.

SAP HANA. HA and DR Guide. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 03 Date 2018-05-23 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

C H A P T E R Overview Figure 1-1 What is Disaster Recovery as a Service?

C H A P T E R Overview Figure 1-1 What is Disaster Recovery as a Service? CHAPTER 1 Cisco Disaster Recovery as a Service Solution (DRaaS) architecture described in this document is designed to provide a new set of related capabilities allowing Virtualized Multi-Tenant Data Center

More information

Dell PowerVault MD3600f/MD3620f Remote Replication Functional Guide

Dell PowerVault MD3600f/MD3620f Remote Replication Functional Guide Dell PowerVault MD3600f/MD3620f Remote Replication Functional Guide Page i THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT

More information

Achieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX

Achieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX Achieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX Introduction Planning for recovery is a requirement in businesses of all sizes. In implementing an operational

More information

Virtual Disaster Recovery

Virtual Disaster Recovery The Essentials Series: Managing Workloads in a Virtual Environment Virtual Disaster Recovery sponsored by by Jaime Halscott Vir tual Disaster Recovery... 1 Virtual Versus Physical Disaster Recovery...

More information

Oracle Rdb Hot Standby Performance Test Results

Oracle Rdb Hot Standby Performance Test Results Oracle Rdb Hot Performance Test Results Bill Gettys (bill.gettys@oracle.com), Principal Engineer, Oracle Corporation August 15, 1999 Introduction With the release of Rdb version 7.0, Oracle offered a powerful

More information

vsan Remote Office Deployment January 09, 2018

vsan Remote Office Deployment January 09, 2018 January 09, 2018 1 1. vsan Remote Office Deployment 1.1.Solution Overview Table of Contents 2 1. vsan Remote Office Deployment 3 1.1 Solution Overview Native vsphere Storage for Remote and Branch Offices

More information

A Crash Course In Wide Area Data Replication. Jacob Farmer, CTO, Cambridge Computer

A Crash Course In Wide Area Data Replication. Jacob Farmer, CTO, Cambridge Computer A Crash Course In Wide Area Data Replication Jacob Farmer, CTO, Cambridge Computer SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals

More information

TANDBERG Management Suite - Redundancy Configuration and Overview

TANDBERG Management Suite - Redundancy Configuration and Overview Management Suite - Redundancy Configuration and Overview TMS Software version 11.7 TANDBERG D50396 Rev 2.1.1 This document is not to be reproduced in whole or in part without the permission in writing

More information

A Practical Guide to Cost-Effective Disaster Recovery Planning

A Practical Guide to Cost-Effective Disaster Recovery Planning White Paper PlateSpin A Practical Guide to Cost-Effective Disaster Recovery Planning Organizations across the globe are finding disaster recovery increasingly important for a number of reasons. With the

More information

FOUR WAYS TO LOWER THE COST OF REPLICATION

FOUR WAYS TO LOWER THE COST OF REPLICATION WHITE PAPER I JANUARY 2010 FOUR WAYS TO LOWER THE COST OF REPLICATION How an Ultra-Efficient, Virtualized Storage Platform Brings Disaster Recovery within Reach for Any Organization FOUR WAYS TO LOWER

More information

NEC Express5800 R320f Fault Tolerant Servers & NEC ExpressCluster Software

NEC Express5800 R320f Fault Tolerant Servers & NEC ExpressCluster Software NEC Express5800 R320f Fault Tolerant Servers & NEC ExpressCluster Software Downtime Challenges and HA/DR Solutions Undergoing Paradigm Shift with IP Causes of Downtime: Cost of Downtime: HA & DR Solutions:

More information

Native vsphere Storage for Remote and Branch Offices

Native vsphere Storage for Remote and Branch Offices SOLUTION OVERVIEW VMware vsan Remote Office Deployment Native vsphere Storage for Remote and Branch Offices VMware vsan is the industry-leading software powering Hyper-Converged Infrastructure (HCI) solutions.

More information

White Paper. Disaster Recovery in the Cloud

White Paper. Disaster Recovery in the Cloud White Paper Disaster Recovery in the Cloud Disaster Recovery in the Cloud Disaster recovery (DR) is the ability to handle site failures with minimal disruptions to a business. This is an essential capability

More information

Microsoft SQL Server on Stratus ftserver Systems

Microsoft SQL Server on Stratus ftserver Systems W H I T E P A P E R Microsoft SQL Server on Stratus ftserver Systems Security, scalability and reliability at its best Uptime that approaches six nines Significant cost savings for your business Only from

More information

Data Sheet: Storage Management Veritas Storage Foundation for Oracle RAC from Symantec Manageability and availability for Oracle RAC databases

Data Sheet: Storage Management Veritas Storage Foundation for Oracle RAC from Symantec Manageability and availability for Oracle RAC databases Manageability and availability for Oracle RAC databases Overview Veritas Storage Foundation for Oracle RAC from Symantec offers a proven solution to help customers implement and manage highly available

More information

Maximum Availability Architecture: Overview. An Oracle White Paper July 2002

Maximum Availability Architecture: Overview. An Oracle White Paper July 2002 Maximum Availability Architecture: Overview An Oracle White Paper July 2002 Maximum Availability Architecture: Overview Abstract...3 Introduction...3 Architecture Overview...4 Application Tier...5 Network

More information

5 Things Small Businesses Need to Know About Disaster Recovery

5 Things Small Businesses Need to Know About Disaster Recovery 5 Things Small Businesses Need to Know About Disaster Recovery WHY WORRY ABOUT DISASTER RECOVERY? THERE WOULD BE NO NEED TO THINK ABOUT DISASTER RECOVERY IF ANY OF THE FOLLOWING WERE TRUE: Your chance

More information

The Microsoft Large Mailbox Vision

The Microsoft Large Mailbox Vision WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more email has many advantages. Large mailboxes

More information

Veritas InfoScale Enterprise for Oracle Real Application Clusters (RAC)

Veritas InfoScale Enterprise for Oracle Real Application Clusters (RAC) Veritas InfoScale Enterprise for Oracle Real Application Clusters (RAC) Manageability and availability for Oracle RAC databases Overview Veritas InfoScale Enterprise for Oracle Real Application Clusters

More information

High Availability- Disaster Recovery 101

High Availability- Disaster Recovery 101 High Availability- Disaster Recovery 101 DBA-100 Glenn Berry, Principal Consultant, SQLskills.com Glenn Berry Consultant/Trainer/Speaker/Author Principal Consultant, SQLskills.com Email: Glenn@SQLskills.com

More information

VMware vsphere Clusters in Security Zones

VMware vsphere Clusters in Security Zones SOLUTION OVERVIEW VMware vsan VMware vsphere Clusters in Security Zones A security zone, also referred to as a DMZ," is a sub-network that is designed to provide tightly controlled connectivity to an organization

More information

Copyright 2010 EMC Corporation. Do not Copy - All Rights Reserved.

Copyright 2010 EMC Corporation. Do not Copy - All Rights Reserved. 1 Using patented high-speed inline deduplication technology, Data Domain systems identify redundant data as they are being stored, creating a storage foot print that is 10X 30X smaller on average than

More information

A CommVault White Paper: Business Continuity: Architecture Design Guide

A CommVault White Paper: Business Continuity: Architecture Design Guide A CommVault White Paper: Business Continuity: Architecture Design Guide CommVault Corporate Headquarters 2 Crescent Place Oceanport, New Jersey 07757-0900 USA Telephone: 888.746.3849 or 732.870.4000 2007

More information

iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard

iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard On February 11 th 2003, the Internet Engineering Task Force (IETF) ratified the iscsi standard. The IETF was made up of

More information

SYSTEM UPGRADE, INC Making Good Computers Better. System Upgrade Teaches RAID

SYSTEM UPGRADE, INC Making Good Computers Better. System Upgrade Teaches RAID System Upgrade Teaches RAID In the growing computer industry we often find it difficult to keep track of the everyday changes in technology. At System Upgrade, Inc it is our goal and mission to provide

More information

INTRODUCTION TO XTREMIO METADATA-AWARE REPLICATION

INTRODUCTION TO XTREMIO METADATA-AWARE REPLICATION Installing and Configuring the DM-MPIO WHITE PAPER INTRODUCTION TO XTREMIO METADATA-AWARE REPLICATION Abstract This white paper introduces XtremIO replication on X2 platforms. XtremIO replication leverages

More information

Real-time Protection for Microsoft Hyper-V

Real-time Protection for Microsoft Hyper-V Real-time Protection for Microsoft Hyper-V Introduction Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate of customer adoption. Moving resources to

More information

A Digium Solutions Guide. Switchvox On-Premise Options: Is it Time to Virtualize?

A Digium Solutions Guide. Switchvox On-Premise Options: Is it Time to Virtualize? A Digium Solutions Guide Switchvox On-Premise Options: Is it Time to Virtualize? Businesses of all sizes can now realize the advantages of a fully-featured UC solution, whether it be virtualized, cloud/hosted

More information

Veritas Storage Foundation for Oracle RAC from Symantec

Veritas Storage Foundation for Oracle RAC from Symantec Veritas Storage Foundation for Oracle RAC from Symantec Manageability, performance and availability for Oracle RAC databases Data Sheet: Storage Management Overviewview offers a proven solution to help

More information

vsan Security Zone Deployment First Published On: Last Updated On:

vsan Security Zone Deployment First Published On: Last Updated On: First Published On: 06-14-2017 Last Updated On: 11-20-2017 1 1. vsan Security Zone Deployment 1.1.Solution Overview Table of Contents 2 1. vsan Security Zone Deployment 3 1.1 Solution Overview VMware vsphere

More information

Highly Available Forms and Reports Applications with Oracle Fail Safe 3.0

Highly Available Forms and Reports Applications with Oracle Fail Safe 3.0 Highly Available Forms and Reports Applications with Oracle Fail Safe 3.0 High Availability for Windows NT An Oracle Technical White Paper Robert Cheng Oracle New England Development Center System Products

More information

Step into the future. HP Storage Summit Converged storage for the next era of IT

Step into the future. HP Storage Summit Converged storage for the next era of IT HP Storage Summit 2013 Step into the future Converged storage for the next era of IT 1 HP Storage Summit 2013 Step into the future Converged storage for the next era of IT Karen van Warmerdam HP XP Product

More information

Microsoft SQL Server

Microsoft SQL Server Microsoft SQL Server Abstract This white paper outlines the best practices for Microsoft SQL Server Failover Cluster Instance data protection with Cohesity DataPlatform. December 2017 Table of Contents

More information

Preparing for Server 2012 Hyper-V: Seven Questions to Ask Now Greg Shields

Preparing for Server 2012 Hyper-V: Seven Questions to Ask Now Greg Shields Preparing for Server 2012 Hyper-V: Seven Questions to Ask Now Greg Shields Microsoft MVP and VMware vexpert September, 2012 may be the release date for Windows Server 2012, but odds are good that your

More information

Building Backup-to-Disk and Disaster Recovery Solutions with the ReadyDATA 5200

Building Backup-to-Disk and Disaster Recovery Solutions with the ReadyDATA 5200 Building Backup-to-Disk and Disaster Recovery Solutions with the ReadyDATA 5200 WHITE PAPER Explosive data growth is a challenging reality for IT and data center managers. IDC reports that digital content

More information

High Availability- Disaster Recovery 101

High Availability- Disaster Recovery 101 High Availability- Disaster Recovery 101 DBA-100 Glenn Berry, Principal Consultant, SQLskills.com Glenn Berry Consultant/Trainer/Speaker/Author Principal Consultant, SQLskills.com Email: Glenn@SQLskills.com

More information

Whitepaper Wishful Thinking vs. Reality in Regards to Virtual Backup and Restore Environments

Whitepaper Wishful Thinking vs. Reality in Regards to Virtual Backup and Restore Environments Whitepaper Wishful Thinking vs. Reality in Regards to Virtual Backup and Restore Environments Best practices for backing up virtual environments Table of Contents Why choose virtualization?... 3 What is

More information

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery White Paper Business Continuity Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery Table of Contents Executive Summary... 1 Key Facts About

More information

How to license Oracle Database programs in DR environments

How to license Oracle Database programs in DR environments How to license Oracle Database programs in DR environments Author: Andra Tarata It is commonly known that the use of almost any Oracle software program requires a license. But how does that work when you

More information

Symantec NetBackup 7 for VMware

Symantec NetBackup 7 for VMware V-Ray visibility into virtual machine protection Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing

More information

StarWind Virtual SAN Free

StarWind Virtual SAN Free #1 HyperConverged Appliance for SMB and ROBO StarWind Virtual SAN Free Value Proposition For virtualization admins, IT geeks, bloggers, students or those who look to build and maintain virtualization infrastructure

More information

Downtime Prevention Buyer s Guide. 6 QUESTIONS to help you choose the right availability protection for your applications

Downtime Prevention Buyer s Guide. 6 QUESTIONS to help you choose the right availability protection for your applications Downtime Prevention Buyer s Guide 6 QUESTIONS to help you choose the right availability protection for your applications Question 6 questions to help you choose the right availability protection for your

More information

Simplify Backups. Dell PowerVault DL2000 Family

Simplify Backups. Dell PowerVault DL2000 Family Simplify Backups Dell PowerVault DL2000 Family SIMPLIFYING I T The Dell PowerVault DL2000 family helps reduce the cost and complexity of backups and restores, freeing up valuable resources that you can

More information

USING ARTIFACTORY TO MANAGE BINARIES ACROSS MULTI-SITE TOPOLOGIES

USING ARTIFACTORY TO MANAGE BINARIES ACROSS MULTI-SITE TOPOLOGIES USING ARTIFACTORY TO MANAGE BINARIES ACROSS MULTI-SITE TOPOLOGIES White Paper June 2016 www.jfrog.com INTRODUCTION Distributed software development has become commonplace, especially in large enterprises

More information

Red Hat Enterprise Virtualization (RHEV) Backups by SEP

Red Hat Enterprise Virtualization (RHEV) Backups by SEP Red Hat Enterprise Virtualization (RHEV) Backups by SEP info@sepusa.com www.sepusa.com Table of Contents INTRODUCTION AND OVERVIEW AGENT BASED BACKUP IMAGE LEVEL BACKUP VIA RHEV API RHEV BACKUP WITH SEP

More information

How to Protect Your Small or Midsized Business with Proven, Simple, and Affordable VMware Virtualization

How to Protect Your Small or Midsized Business with Proven, Simple, and Affordable VMware Virtualization How to Protect Your Small or Midsized Business with Proven, Simple, and Affordable VMware Virtualization January 2011 Business continuity and disaster recovery (BC/DR) planning is becoming a critical mandate

More information

Backup challenge for Home Users

Backup challenge for Home Users PARAGON Technologie GmbH, Systemprogrammierung Heinrich-von-Stephan-Str. 5c 79100 Freiburg, Germany Tel. +49 (0) 761 59018201 Fax +49 (0) 761 59018130 Internet www.paragon-software.com Email sales@paragon-software.com

More information

Disaster Recovery Is A Business Strategy

Disaster Recovery Is A Business Strategy Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...

More information

INTRODUCING VERITAS BACKUP EXEC SUITE

INTRODUCING VERITAS BACKUP EXEC SUITE INTRODUCING VERITAS BACKUP EXEC SUITE January 6, 2005 VERITAS ARCHITECT NETWORK TABLE OF CONTENTS Managing More Storage with Fewer Resources...3 VERITAS Backup Exec Suite...3 Continuous Data Protection...

More information

Microsoft E xchange 2010 on VMware

Microsoft E xchange 2010 on VMware : Microsoft E xchange 2010 on VMware Availability and R ecovery Options This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more

More information

ZYNSTRA TECHNICAL BRIEFING NOTE

ZYNSTRA TECHNICAL BRIEFING NOTE ZYNSTRA TECHNICAL BRIEFING NOTE Backup What is Backup? Backup is a service that forms an integral part of each Cloud Managed Server. Its purpose is to regularly store an additional copy of your data and

More information

How to Increase VMware Application Availability with Shared Storage

How to Increase VMware Application Availability with Shared Storage WHITE PAPER How to Increase VMware Application Availability with Shared Storage The Essential Guide to Using Shared Storage with VMware to Achieve High Availability While Reducing Operating Costs INTRODUCTION

More information

Whitepaper. StorTrends Testing Guide: 3400i Controller Failover

Whitepaper. StorTrends Testing Guide: 3400i Controller Failover Whitepaper StorTrends Testing Guide: 3400i Controller Failover 2012 Copyright American Megatrends, Inc. All rights reserved. American Megatrends, Inc. 5555 Oakbrook Parkway, Building 200 Norcross, GA 30093

More information

Carbonite Availability. Technical overview

Carbonite Availability. Technical overview Carbonite Availability Technical overview Table of contents Executive summary The availability imperative...3 True real-time replication More efficient and better protection... 4 Robust protection Reliably

More information

Choosing the Right Deduplication Solution for Your Organization

Choosing the Right Deduplication Solution for Your Organization Choosing the Right Deduplication Solution for Your Organization Application-based deduplication versus appliance-based deduplication Introduction Due to the significant data growth and extended retention

More information

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure Nutanix Tech Note Virtualizing Microsoft Applications on Web-Scale Infrastructure The increase in virtualization of critical applications has brought significant attention to compute and storage infrastructure.

More information

TOP REASONS TO CHOOSE DELL EMC OVER VEEAM

TOP REASONS TO CHOOSE DELL EMC OVER VEEAM HANDOUT TOP REASONS TO CHOOSE DELL EMC OVER VEEAM 10 This handout overviews the top ten reasons why customers choose Data Protection from Dell EMC over Veeam. Dell EMC has the most comprehensive data protection

More information

Business Benefits of Policy Based Data De-Duplication Data Footprint Reduction with Quality of Service (QoS) for Data Protection

Business Benefits of Policy Based Data De-Duplication Data Footprint Reduction with Quality of Service (QoS) for Data Protection Data Footprint Reduction with Quality of Service (QoS) for Data Protection By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (Auerbach) October 28th,

More information

Protecting Mission-Critical Workloads with VMware Fault Tolerance W H I T E P A P E R

Protecting Mission-Critical Workloads with VMware Fault Tolerance W H I T E P A P E R Protecting Mission-Critical Workloads with VMware Fault Tolerance W H I T E P A P E R Table of Contents Fault Tolerance and Virtualization... 3 Fault Tolerance in the Physical World... 3 VMware Fault Tolerance...

More information

SAN for Business Continuity

SAN for Business Continuity SAN for Business Continuity How Cisco IT Achieves Subminute Recovery Point Objective A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Improve recovery point objective (RPO) and recovery

More information

VERITAS Storage Foundation 4.0 TM for Databases

VERITAS Storage Foundation 4.0 TM for Databases VERITAS Storage Foundation 4.0 TM for Databases Powerful Manageability, High Availability and Superior Performance for Oracle, DB2 and Sybase Databases Enterprises today are experiencing tremendous growth

More information

Chapter 11. SnapProtect Technology

Chapter 11. SnapProtect Technology Chapter 11 SnapProtect Technology Hardware based snapshot technology provides the ability to use optimized hardware and disk appliances to snap data on disk arrays providing quick recovery by reverting

More information

IBM TS7700 grid solutions for business continuity

IBM TS7700 grid solutions for business continuity IBM grid solutions for business continuity Enhance data protection and business continuity for mainframe environments in the cloud era Highlights Help ensure business continuity with advanced features

More information

EMC Integrated Infrastructure for VMware. Business Continuity

EMC Integrated Infrastructure for VMware. Business Continuity EMC Integrated Infrastructure for VMware Business Continuity Enabled by EMC Celerra and VMware vcenter Site Recovery Manager Reference Architecture Copyright 2009 EMC Corporation. All rights reserved.

More information

iscsi Target Usage Guide December 15, 2017

iscsi Target Usage Guide December 15, 2017 December 15, 2017 1 Table of Contents 1. Native VMware Availability Options for vsan 1.1.Native VMware Availability Options for vsan 1.2.Application Clustering Solutions 1.3.Third party solutions 2. Security

More information

Disk-Based Data Protection Architecture Comparisons

Disk-Based Data Protection Architecture Comparisons Disk-Based Data Protection Architecture Comparisons Abstract The dramatic drop in the price of hard disk storage combined with its performance characteristics has given rise to a number of data protection

More information

Continuous data protection. PowerVault DL Backup to Disk Appliance

Continuous data protection. PowerVault DL Backup to Disk Appliance Continuous data protection PowerVault DL Backup to Disk Appliance Current Situation The PowerVault DL Backup-to-Disk Appliance Powered by Symantec Backup Exec offers the industry s only fully integrated

More information

Become a MongoDB Replica Set Expert in Under 5 Minutes:

Become a MongoDB Replica Set Expert in Under 5 Minutes: Become a MongoDB Replica Set Expert in Under 5 Minutes: USING PERCONA SERVER FOR MONGODB IN A FAILOVER ARCHITECTURE This solution brief outlines a way to run a MongoDB replica set for read scaling in production.

More information

White Paper. EonStor GS Family Best Practices Guide. Version: 1.1 Updated: Apr., 2018

White Paper. EonStor GS Family Best Practices Guide. Version: 1.1 Updated: Apr., 2018 EonStor GS Family Best Practices Guide White Paper Version: 1.1 Updated: Apr., 2018 Abstract: This guide provides recommendations of best practices for installation and configuration to meet customer performance

More information

MOVING TOWARDS ZERO DOWNTIME FOR WINTEL Caddy Tan 21 September Leaders Have Vision visionsolutions.com 1

MOVING TOWARDS ZERO DOWNTIME FOR WINTEL Caddy Tan 21 September Leaders Have Vision visionsolutions.com 1 MOVING TOWARDS ZERO DOWNTIME FOR WINTEL Caddy Tan 21 September 2010 Leaders Have Vision visionsolutions.com 1 MOVING TOWARDS ZERO DOWNTIME Recovery Point Objective (RPO) How much data can you afford to

More information

Continuous Processing versus Oracle RAC: An Analyst s Review

Continuous Processing versus Oracle RAC: An Analyst s Review Continuous Processing versus Oracle RAC: An Analyst s Review EXECUTIVE SUMMARY By Dan Kusnetzky, Distinguished Analyst Most organizations have become so totally reliant on information technology solutions

More information

Asigra Cloud Backup Provides Comprehensive Virtual Machine Data Protection Including Replication

Asigra Cloud Backup Provides Comprehensive Virtual Machine Data Protection Including Replication Datasheet Asigra Cloud Backup Provides Comprehensive Virtual Machine Data Protection Including Replication Virtual Machines (VMs) have become a staple of the modern enterprise data center, but as the usage

More information

Copyright 2012 EMC Corporation. All rights reserved.

Copyright 2012 EMC Corporation. All rights reserved. 1 TRANSFORMING MICROSOFT APPLICATIONS TO THE CLOUD Louaye Rachidi Technology Consultant 2 22x Partner Of Year 19+ Gold And Silver Microsoft Competencies 2,700+ Consultants Worldwide Cooperative Support

More information

Data Protection for Cisco HyperFlex with Veeam Availability Suite. Solution Overview Cisco Public

Data Protection for Cisco HyperFlex with Veeam Availability Suite. Solution Overview Cisco Public Data Protection for Cisco HyperFlex with Veeam Availability Suite 1 2017 2017 Cisco Cisco and/or and/or its affiliates. its affiliates. All rights All rights reserved. reserved. Highlights Is Cisco compatible

More information

Maximizing Availability With Hyper-Converged Infrastructure

Maximizing Availability With Hyper-Converged Infrastructure Maximizing Availability With Hyper-Converged Infrastructure With the right solution, organizations of any size can use hyper-convergence to help achieve their most demanding availability objectives. Here

More information