Integrated Data Management:
|
|
- Ernest George
- 5 years ago
- Views:
Transcription
1 Integrated Data Management: An Innovative Approach to Improved IT Productivity and Flexibility VS Joshi, Ravi Chalaka, Network Appliance, April 2006, TR-3467 Executive Summary Typical IT organizations have formed separate but highly interdependent groups to manage applications, servers, data, and storage. The administrators in each group are highly specialized and focused on the efficient management of their individual areas, but many tasks require collaboration between functional areas for effective execution. The absence of linkage between these areas has resulted in operational inefficiencies and rapid escalation in storage management costs. Integrated data management (IDM) is a new approach to simplifying data management and improving IT productivity by linking application data requirements to storage management processes. The IDM approach combines process automation with role-based access security to deliver significant increases in IT management efficiency and storage resource utilization. In the current environment of changing business conditions, the IDM approach increases flexibility of the business by enabling owners of the data to take quick action on the data. This is done within the confines set by the storage administrator.
2 Table of Contents 1. Introduction Traditional Storage Management: Managing the Containers A New Approach Is Needed Integrated Data Management Integration and Automation Datasets Policies Maximum Productivity for IT Operations IDM: An Innovative Approach to Simplifying Data Management... 8 Conclusion
3 1. Introduction In a typical IT organization, separate groups manage applications, servers, data, and storage, and each group focuses on the efficient management of its particular area. In this environment, traditional storage management processes have evolved to satisfy the needs of the storage administrator to discover, monitor, and control storage devices and other elements of the storage infrastructure. These processes have had little linkage to those used by system, application, and database administrators, who as a group might be called data administrators, in their efforts to establish and sustain a high quality of service (QOS) level for business applications and processes. To meet their objectives, this latter group concentrates on the control and management of data and would prefer to do so without dealing with the details and intricacies of storage infrastructure management. To put it another way, traditional approaches to storage and storage resource management may be thought of as dealing with storage devices, capacity, and connections, while data management concerns itself with data movement, protection, and recovery. This difference in focus has led to a natural divergence in the development of management processes that typically focus narrowly on satisfying the needs of either the storage administrators or the data administrators with little linkage or correlation between the activities of these groups. In effect, this has led to operational inefficiency and a high degree of interdependence among the different classes of administrators. Integrated data management (IDM) is an innovative approach to simplifying data management that encompasses both the management of storage devices and the data that resides on those devices. Using an IDM approach, storage administrators operate more efficiently and with minimal interruptions by automating routine storage management processes and by linking those processes to specific application requirements. This is accomplished without sacrificing control over the storage environment by defining appropriate, reusable policies that support different QOS requirements for each application. By creating linkages between application requirements and storage management processes in a controlled environment, IDM addresses the needs of system, application, and database administrators to control their data in a language that they understand, without the need for extensive storage management skills. Because the data owners can perform certain data management tasks by themselves, their ability to respond to changing business conditions is enhanced, thus increasing the flexibility of the entire business. The use of process automation, role-based access, and policy-based management enables business-centric control of data and reduces the interdependencies between storage and data administrators to deliver dramatic productivity and flexibility gains. NetApp is continuing its tradition of simplifying data management by assuming a leadership role in defining integrated data management. 2. Traditional Storage Management: Managing the Containers The management of storage began as a hardware-oriented activity, with relatively few and simple software tools. While these tools were adequate to handle early storage environments, which often were supplied by a single vendor and supported only one application and operating environment, the situation today is much different. The continuing explosive growth of enterprise data represents ever-increasing demands for storage capacity. At the same time, storage environments have become much more complex, with distributed applications and storage, pervasive networking, multiple operating environments, and different classes of tiered networked storage being deployed. These changes have spurred the development of storage management approaches geared toward managing the increased capacity and complexity. These new strategies have generally retained a storage-centric approach to the problem, with little or no linkage to application requirements. Trends in storage management using traditional methods have succeeded in masking the complexity of the problem rather than simplifying the solution. They give IT administrators limited ability to be self-sufficient in responding to changing data requirements, leaving them little alternative to managing storage as a collection of containers and connections. 3
4 Only by understanding data in an application context can intelligent storage management choices be made to deliver the required level of performance, availability, and data protection. From the database or application administrator's point of view, the data or contents are of the highest level of concern, while the details of the storage configuration (providing the configuration supports the desired service level) are of little importance. 3. A New Approach Is Needed In traditional IT organizations application, database, system, and storage administrators each focus narrowly on only a part of the data/storage management problem. Each has different and distinct areas of responsibility and accountability. As a result, end-to-end data management depends upon manual communication between the data administrator and storage administrator and manual mapping of data to storage and upon the storage administrator to perform the actual data movement and copy operations. This is a disruptive and potentially error-prone process that results in critical errors and lost productivity. One way to understand how the traditional approach can contribute to inefficiency is to examine how the needs of the different administrators help shape the storage and data management workflow. Table 1 highlights some of these needs. Application administrators Enhance data protection/access/retention service levels Support for dynamic data growth Reduced dependence on other admins Data administrators Support for data classification and compliance initiatives Simplified management of data protection and disaster recovery Easy data migration and storage consolidation Server administrators Simplified storage provisioning without learning storage skills Server-independent management of storage Automated LUN management/attachment Storage administrators Freedom from interruption Consolidated management of storage infrastructure Ability to focus on high-value activities (performance, utilization, RPO, RTO) Table 1) The important things to notice in Table 1 are that each of the administrators requires a different set of storage services and that, with the exception of the storage administrator, the central focus of their efforts is not directly on the management of storage. For example, as database sizes increase, application and database administrators can be expected to require additional high-performance storage allocated and provisioned to support their availability and QOS requirements. They will also need to create periodic dataconsistent snapshot copies and possibly copies on secondary storage to support data protection, disaster recovery, and compliance. Finally, in the event of failure, the proper files, tables, and logs must be located and used for system recovery. In the traditional approach, each of these situations triggers a series of dialogues and requests among application, database, systems, and storage administrators. The typical storage provisioning or recovery 4
5 process can be both inefficient and error-prone, since it involves dozens of steps that must be performed correctly and in the proper sequence by different people in different parts of the IT organization. Figure 1 illustrates a traditional IT organization in which application and server administrators call upon the storage administrator to satisfy even the most routine requests for storage services. This affords the storage administrator a high degree of control over the storage environment but subjects the storage administrator to frequent interruptions. Dependence on the storage administrator as a help desk, troubleshooter, and recovery facilitator detracts from the ability to concentrate on higher-value storage management activities. To address these challenges, IT organizations have little choice but to assign more people to keep the mission-critical environment from being underserved. Ultimately, both storage utilization and management efficiency tend to decline dramatically as the scale and complexity of the storage environment increase. Figure 1) In one common approach to dealing with these inefficiencies, interdisciplinary teams are formed to manage critical application areas such as ERP, messaging, and business intelligence. Each of these teams draws upon the resources and specialized knowledge of the storage, server, database, and application administrators and collectively manages the infrastructure associated with a particular application. The advantage of this approach is that it encourages increased communication and sharing of localized expertise and has the potential to improve cross-organization efficiencies. Its downside is that it still requires personal involvement from multiple administrative layers even for routine activities. This often results in inefficient utilization of operational resources across the groups. Because functional capabilities and 5
6 responsibilities remain distributed across the administrative layers of the IT organization in this model, application service levels are hard to manage, and process automation is difficult. In many organizations, operational inefficiencies have pushed the cost of managing storage to a disproportionate and unacceptably high fraction of the overall storage budget. The underlying cause of this inefficiency can be traced back to a mismatch between the different interests and needs of the various administrative groups and the processes and software capabilities available to them. To overcome the shortcomings in these areas, a fundamentally different approach to storage management is needed. 4. Integrated Data Management 4.1 Integration and Automation Integrated data management is a new approach that takes an application-centric and data-centric view of storage management and allows the controlled automation of essential storage management activities. The strategy of IDM is to integrate many of the key functions of data management with applications and to allow each administrative layer to become more self-sufficient. IDM satisfies the needs of the storage administrator by reducing the frequency of outside interruptions without sacrificing management control over the storage environment. It addresses the needs of server, application, and database administrators to control their data and, within limits, to manage their own storage requirements without the need for extensive storage management skills. This win-win combination allows each of the administrative groups to function more autonomously and to work together more efficiently and helps reduce the overall cost of managing both storage and data. One way to understand how moving from traditional methods to an IDM approach can improve efficiency is to think of it as analogous to the banking industry deploying ATM machines. When an ATM is used, customers no longer need to stand in line and wait for someone else to help them deposit or withdraw their money or to verify balances. Instead, the process has been automated to give customers secure self-service access to their own funds and account information 24 hours a day. Throughout the process the bank remains in complete control of how much money can be taken out and to which accounts the customer has access. These controls are defined by preestablished policies and are enforced by automated processes. This system is better for the bank because there aren t lines of people waiting for service, so bank employees can be more efficient and can concentrate on higher value activities. It s also better for the customers, who no longer have to wait for service and have access to their funds and account information whenever they want. In much the same way an ATM provides banking customers with self-service access to funds and information, the IDM approach can provide application and system administrators with secure, controlled, self-service access to storage capacity and services. This gives them more flexibility in their choices and allows them to respond more quickly to changing conditions. To understand how this takes place, it is first necessary to understand some underlying concepts that are central in enabling IDM. 4.2 Datasets Datasets separate the notion of data from the physical storage on which it resides and group together related data elements for a particular use or application. A dataset consists of one or more copies of data associated with a particular application or data use. For example, a dataset for a business-critical database application might include two or more synchronized replicas of the active database residing on high-performance primary storage. These may be collocated or housed in different locations to support high application availability and disaster recovery. It would also be likely to include some number of secondary copies such as backups, point-in-time snapshot copies, transaction logs, and other files and information necessary to recover the database following data loss or corruption. Finally, the dataset might include long-term archival copies and data held to meet regulatory or 6
7 business practice compliance requirements. Additional datasets consisting of different groups of related data elements may be defined to support specific activities (for example, backup) for the same application. Datasets for different uses and applications typically vary in structure to accommodate different business priorities. They may contain different numbers of copies or be allocated to different classes of storage. These decisions need to be made based on the quality of service requirements of the application and on the capabilities, cost, and availability of different classes of storage and may involve input from a number of different parts of the IT and business management organizations. In an IDM context the utility of a dataset is that it represents a predictable, reusable, application-specific structure that makes it much easier to manage and provision storage for an existing application or a new instance of the application. This predictability, plus the flexibility to create multiple datasets for different uses, makes it possible to combine datasets with policies to automate many storage and data management activities. 4.3 Policies A policy defines the business logic regarding how data is to be managed (that is, protected, copied, moved, provisioned, or accessed) and defines a set of actions to be applied to a dataset to perform a particular operation or when certain conditions are met. Policies enable automated data management with distributed control. Any number of policies may be defined to accomplish different tasks associated with a particular dataset. For example, one policy may specify that primary data storage must be provisioned only from the highest performance storage system class and that such storage be allocated only in replicated pairs. Another policy may determine the time interval between creation of snapshot copies and specify the location or class of storage where they should be stored. A third policy may describe how data is to be selected for movement to long-term archive; a fourth policy is related to how long it is to be retained, a fifth policy about how it is to be disposed of, and so on. Many applications are supplied with a set of predefined policies or policy templates for common data management tasks. These can be used directly or can be modified easily by the storage administrator to create policies that support an integrated data management approach. Just as dataset definition requires collaboration, establishing effective policies is likely to require input from different parts of the organization. This dialogue between the groups allows requests stated in terms of application service objectives, for example, to be translated by the storage administrator into a series of repeatable storage management and data movement activities that taken together constitute a policy. In the future, similar application storage service requests can be met simply by invoking this same policy. 4.4 Maximum Productivity for IT Operations A major objective of integrated data management is to create the most productive IT operations environment possible. The use of policies and datasets is central to the IDM approach and makes it possible to safely and repeatably automate a great many storage and data management processes to satisfy higher-level service requests. Policy-based automation gives application, database, and storage administrators ATM-like self-service access to storage capacity and services. In the IDM model, the application administrator can get storage provisioned as needed, right away, without having to interrupt the storage administrator or wait for a response, providing the request is within the limits of the policies that have been set. This reduces the turnaround time to satisfy these requests and leads to greater efficiency and productivity. Another advantage to the use of policies is that they are created with input from the storage administrator and can take full advantage of the most advanced storage system features for example, virtualization, thin provisioning, and instant snapshot copies that might otherwise be overlooked by the application, database, 7
8 or system administrator. Figure 2 shows how the storage administrator is relieved of interruptions and operational workflows are improved when datasets and policies are combined in an IDM environment. Figure 2) It's important to emphasize that this automation does not take the storage administrator out of the loop, nor does it reduce the administrator s ability to control the storage environment. It just changes the nature of the job and allows the storage administrator to be more productive. Instead of focusing on a ceaseless stream of interruptions, the administrator can concentrate on higher value storage management functions such as creating effective policies, improving storage utilization, and managing tiered storage. Just as the bank retained complete control over access to funds and account information in the ATM example, the storage administrator continues to control the storage environment by defining appropriate automation policies. 5. IDM: An Innovative Approach to Simplifying Data Management Integrated data management is intended to provide a holistic approach to managing data by combining the functions and benefits of data, storage, and storage resource management. Two primary technology elements that allow the IDM model to work are effective storage virtualization and policy-based automation. Without these it would be difficult or impossible to achieve the goals of integrated data management. For IDM to be widely adopted, its benefits must appeal to a wide range of information technology professionals by promising to simplify their daily activities. The IDM approach would support the most commonly used enterprise operating systems and would be integrated with enterprise databases and applications, including Oracle, SAP, Microsoft Exchange, and Microsoft SQL Server. It would leverage familiar concepts, make use of management consoles and other tools already in place, and provide for future growth and expansion by providing open interfaces and making use of standards-based technology. Finally, it would provide role-based security and access control to a simple, uniform, and highly usable human interface. 8
9 Figure 3) IDM represents a new paradigm of storage management in which requirements are set as data priorities linked to the needs of different applications and data uses. Such a solution is illustrated in Figure 3. Virtualization and automation allow storage administrators to easily and dynamically manage massive storage pools and to create controlled, self-service policies for use by application and system administrators. This means many application requests for storage capacity and services may be satisfied automatically while storage administrators maintain control over the storage environment. Under policy control, data can be replicated, stored, and migrated among different classes of storage to satisfy the needs of different virtualized datasets for data protection, business continuance, disaster recovery, archiving, and compliance. Conclusion Traditional approaches have left a gap between the management of data and the management of storage. This has resulted in inefficient operations, with considerable duplication of effort and with frequent interruptions to the activities of highly interdependent administrative groups. Integrated data management is an emerging, holistic approach to managing both data and storage more efficiently. In this approach, policy-based automation is used to deliver self-service administrative access to many storage and data management activities without sacrificing control over the storage environment. With IDM, data administrators can maximize the benefit from storage investments by using policies to take full advantage of the most advanced storage system features. IDM also elevates interactions between data and storage administrators to a higher functional level, reducing the frequency of interruptions and making both groups more productive. Finally, IDM shortens the time needed to react to changing conditions, increasing the flexibility and responsiveness of the data management process. 9
10 Figure 4) Many of the elements of a successful integrated data management approach can be deployed today and can deliver dramatic improvements in IT productivity and storage resource utilization. NetApp is continuing its efforts to simplify data management by assuming a leadership role in defining integrated data management Network Appliance, Inc. All rights reserved. Specifications subject to change without notice. NetApp and the Network Appliance logo are registered trademarks and Network Appliance and Snapshot are trademarks of Network Appliance, Inc. in the U.S. and other countries. Microsoft and Windows are registered trademarks of Microsoft Corporation. Oracle is a registered trademark of Oracle Corporation. UNIX is a registered trademark of The Open Group. All other brands or products are trademarks or registered trademarks of their respective holders and should be treated as such.
Optimizing and Managing File Storage in Windows Environments
Optimizing and Managing File Storage in Windows Environments A Powerful Solution Based on Microsoft DFS and Virtual File Manager September 2006 TR-3511 Abstract The Microsoft Distributed File System (DFS)
More informationMoving From Reactive to Proactive Storage Management with an On-demand Cloud Solution
Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution The Ever-Present Storage Management Conundrum In the modern IT landscape, the storage management conundrum is as familiar
More informationVeritas Storage Foundation for Windows by Symantec
Veritas Storage Foundation for Windows by Symantec Advanced online storage management Data Sheet: Storage Management Overview Veritas Storage Foundation 6.0 for Windows brings advanced online storage management
More informationA Practical Guide to Cost-Effective Disaster Recovery Planning
White Paper PlateSpin A Practical Guide to Cost-Effective Disaster Recovery Planning Organizations across the globe are finding disaster recovery increasingly important for a number of reasons. With the
More informationArchiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments
Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that
More informationSimplifying HDS Thin Image (HTI) Operations
Simplifying HDS Thin Image (HTI) Operations USING COMMVAULT INTELLISNAP TECHNOLOGY Simplifying the Move to Snapshots: As application data sizes grow ever larger, more organizations are turning to storage
More informationData Protection for Virtualized Environments
Technology Insight Paper Data Protection for Virtualized Environments IBM Spectrum Protect Plus Delivers a Modern Approach By Steve Scully, Sr. Analyst February 2018 Modern Data Protection for Virtualized
More informationGlobal Headquarters: 5 Speen Street Framingham, MA USA P F
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R T h e R e a l i t y o f D a t a P r o t e c t i o n a n d R e c o v e r y a n
More informationThe Data Protection Rule and Hybrid Cloud Backup
The 3-2-1 Data Protection Rule and Hybrid Cloud Backup IT teams are under extreme pressure to improve backup, disaster recovery and data protection to eliminate downtime and facilitate digital transformation.
More informationTOP REASONS TO CHOOSE DELL EMC OVER VEEAM
HANDOUT TOP REASONS TO CHOOSE DELL EMC OVER VEEAM 10 This handout overviews the top ten reasons why customers choose Data Protection from Dell EMC over Veeam. Dell EMC has the most comprehensive data protection
More informationCA ARCserve Backup. Benefits. Overview. The CA Advantage
PRODUCT BRIEF: CA ARCSERVE BACKUP R12.5 CA ARCserve Backup CA ARCSERVE BACKUP, A HIGH-PERFORMANCE, INDUSTRY-LEADING DATA PROTECTION PRODUCT, UNITES INNOVATIVE DATA DEDUPLICATION TECHNOLOGY, POWERFUL STORAGE
More informationDe-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid
De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (CRC)
More informationRED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.
RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not
More informationPROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS
>> PROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS COMPUTACENTER HELPS ORGANISATIONS INCREASE THE AVAILABILITY AND INTEGRITY OF THEIR INFORMATION ASSETS WITH NEW-GENERATION DATA PROTECTION SOLUTIONS >> PROTECT
More informationTHE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD
OVERVIEW Accenture is in the process of transforming itself into a digital-first enterprise. Today, Accenture is 80 percent in a public cloud. As the journey continues, Accenture shares its key learnings
More informationProtecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery
White Paper Business Continuity Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery Table of Contents Executive Summary... 1 Key Facts About
More informationChapter 11. SnapProtect Technology
Chapter 11 SnapProtect Technology Hardware based snapshot technology provides the ability to use optimized hardware and disk appliances to snap data on disk arrays providing quick recovery by reverting
More informationProtect enterprise data, achieve long-term data retention
Technical white paper Protect enterprise data, achieve long-term data retention HP StoreOnce Catalyst and Symantec NetBackup OpenStorage Table of contents Introduction 2 Technology overview 3 HP StoreOnce
More informationMaximizing Availability With Hyper-Converged Infrastructure
Maximizing Availability With Hyper-Converged Infrastructure With the right solution, organizations of any size can use hyper-convergence to help achieve their most demanding availability objectives. Here
More informationIBM Storwize V7000: For your VMware virtual infrastructure
IBM Storwize V7000: For your VMware virtual infrastructure Innovative midrange disk system leverages integrated storage technologies Highlights Complement server virtualization, extending cost savings
More informationEBOOK. NetApp ONTAP Cloud FOR MICROSOFT AZURE ENTERPRISE DATA MANAGEMENT IN THE CLOUD
EBOOK NetApp ONTAP Cloud FOR MICROSOFT AZURE ENTERPRISE DATA MANAGEMENT IN THE CLOUD NetApp ONTAP Cloud for Microsoft Azure The ONTAP Cloud Advantage 3 Enterprise-Class Data Management 5 How ONTAP Cloud
More informationMicrosoft DPM Meets BridgeSTOR Advanced Data Reduction and Security
2011 Microsoft DPM Meets BridgeSTOR Advanced Data Reduction and Security BridgeSTOR Deduplication, Compression, Thin Provisioning and Encryption Transform DPM from Good to Great BridgeSTOR, LLC 4/4/2011
More information7 Ways Compellent Optimizes VMware Server Virtualization WHITE PAPER FEBRUARY 2009
7 Ways Compellent Optimizes ware Virtualization WHITE PAPER FEBRUARY 2009 Introduction Increasingly, enterprises are turning to server virtualization to enhance IT flexibility while reducing costs. virtualization
More informationBoost your data protection with NetApp + Veeam. Schahin Golshani Technical Partner Enablement Manager, MENA
Boost your data protection with NetApp + Veeam Schahin Golshani Technical Partner Enablement Manager, MENA NetApp Product Strategy Market-leading innovations, that are NetApp Confidential Limited Use 3
More informationINTRODUCING VERITAS BACKUP EXEC SUITE
INTRODUCING VERITAS BACKUP EXEC SUITE January 6, 2005 VERITAS ARCHITECT NETWORK TABLE OF CONTENTS Managing More Storage with Fewer Resources...3 VERITAS Backup Exec Suite...3 Continuous Data Protection...
More informationMODERNISE WITH ALL-FLASH. Intel Inside. Powerful Data Centre Outside.
MODERNISE WITH ALL-FLASH Intel Inside. Powerful Data Centre Outside. MODERNISE WITHOUT COMPROMISE In today s lightning-fast digital world, it s critical for businesses to make their move to the Modern
More informationTHE STATE OF CLOUD & DATA PROTECTION 2018
THE STATE OF CLOUD & DATA PROTECTION 2018 Survey Results: 10 Findings on how over 800 IT Pros handle Disaster Recovery & Cloud Adoption. INTRODUCTION The Unitrends 2018 annual survey of IT professionals
More informationNetworking for a smarter data center: Getting it right
IBM Global Technology Services October 2011 Networking for a smarter data center: Getting it right Planning the network needed for a dynamic infrastructure 2 Networking for a smarter data center: Getting
More informationReal-time Protection for Microsoft Hyper-V
Real-time Protection for Microsoft Hyper-V Introduction Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate of customer adoption. Moving resources to
More informationWhite Paper BC/DR in the Cloud Era
BC/DR in the Cloud Era Today, enterprises of all sizes are virtualizing their mission-critical applications, either within their own data center, or with an external cloud vendor. One key driver is to
More informationControlling Costs and Driving Agility in the Datacenter
Controlling Costs and Driving Agility in the Datacenter Optimizing Server Infrastructure with Microsoft System Center Microsoft Corporation Published: November 2007 Executive Summary To help control costs,
More informationReasons to Deploy Oracle on EMC Symmetrix VMAX
Enterprises are under growing urgency to optimize the efficiency of their Oracle databases. IT decision-makers and business leaders are constantly pushing the boundaries of their infrastructures and applications
More informationBackup-as-a-Service Powered by Veritas
Backup-as-a-Service Powered by Veritas FOCUS MORE ON YOUR BUSINESS, LESS ON YOUR INFRASTRUCTURE Table of Contents Better data protection from the ground up... 3 Significant challenges in the modern enterprise...
More informationVeritas Storage Foundation for Windows by Symantec
Veritas Storage Foundation for Windows by Symantec Advanced online storage management Veritas Storage Foundation 5.1 for Windows brings advanced online storage management to Microsoft Windows Server environments,
More informationFROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE
FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE The demand for cloud infrastructure is rapidly increasing, the world of information is becoming application and
More informationTHE FOUR STEPS TO A TAPELESS BACKUP ENVIRONMENT: YOUR HOW-TO GUIDE FOR DATA MANAGEMENT SUCCESS INTRODUCTION
THE FOUR STEPS TO A TAPELESS BACKUP ENVIRONMENT: YOUR HOW-TO GUIDE FOR DATA MANAGEMENT SUCCESS WHITE PAPER CONTENTS 1 INTRODUCTION 2 ASSESSMENT 3 EVALUATION 6 IMPLEMENTATION 7 MANAGEMENT 8 CONCLUSION INTRODUCTION
More informationThe Future of Business Continuity & Resiliency
The Future of Business Continuity & Resiliency Richard Cocchiara: IBM Distinguished Engineer; CTO IBM Business Continuity & Resiliency Services (BCRS); Managing Partner IBM Resiliency Consulting Services
More informationWHITE PAPER: ENTERPRISE SOLUTIONS
WHITE PAPER: ENTERPRISE SOLUTIONS Integrating Network Appliance Snapshot and SnapRestore with Veritas NetBackup in an Oracle Backup Environment (Now from Symantec ) White Paper: Symantec Enterprise Solutions
More informationAvailability and the Always-on Enterprise: Why Backup is Dead
Availability and the Always-on Enterprise: Why Backup is Dead Backups certainly fit the bill at one time, but data center needs have evolved and expanded. By Nick Cavalancia Every business has experienced
More informationMidsize Enterprise Solutions Selling Guide. Sell NetApp s midsize enterprise solutions and take your business and your customers further, faster
Midsize Enterprise Solutions Selling Guide Sell NetApp s midsize enterprise solutions and take your business and your customers further, faster Many of your midsize customers might have tried to reduce
More informationAchieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX
Achieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX Introduction Planning for recovery is a requirement in businesses of all sizes. In implementing an operational
More informationSymantec NetBackup 7 for VMware
V-Ray visibility into virtual machine protection Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing
More informationSymantec Enterprise Vault
Store, Manage, and Discover Critical Business Information The pressure on organizations to protect and manage data has intensified with the recent growth in unstructured data and the reliance on email
More informationPreserving the World s Most Important Data. Yours. SYSTEMS AT-A-GLANCE: KEY FEATURES AND BENEFITS
Preserving the World s Most Important Data. Yours. SYSTEMS AT-A-GLANCE: KEY FEATURES AND BENEFITS We are the only company to integrate disk, tape, and replication in a single solution set for better near-term
More informationHitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage
O V E R V I E W Hitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage Modular Hitachi Storage Delivers Enterprise-level Benefits Hitachi Adaptable Modular Storage and Hitachi Workgroup
More informationNot all SD-WANs are Created Equal: Performance Matters
SD-WAN Lowers Costs and Increases Productivity As applications increasingly migrate from the corporate data center into the cloud, networking professionals are quickly realizing that traditional WANs were
More informationVirtualization with Arcserve Unified Data Protection
Virtualization with Arcserve Unified Data Protection Server and desktop virtualization have become very pervasive in most organizations, and not just in the enterprise. Everybody agrees that server virtualization
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationA Ready Business rises above infrastructure limitations. Vodacom Power to you
A Ready Business rises above infrastructure limitations Vodacom Power to you Vodacom Business Nigeria Managed Hosted Services Get Ready to free up your business. To succeed in today s world of dramatic
More informationNetworking for a dynamic infrastructure: getting it right.
IBM Global Technology Services Networking for a dynamic infrastructure: getting it right. A guide for realizing the full potential of virtualization June 2009 Executive summary June 2009 Networking for
More informationData Sheet: High Availability Veritas Cluster Server from Symantec Reduce Application Downtime
Reduce Application Downtime Overview is an industry-leading high availability solution for reducing both planned and unplanned downtime. By monitoring the status of applications and automatically moving
More informationEnhanced Protection and Manageability of Virtual Servers Scalable Options for VMware Server and ESX Server
PARTNER SOLUTION BRIEF Enhanced Protection and Manageability of Virtual Servers Scalable Options for VMware Server and ESX Server Companies relying on the benefits of virtualized environments to reduce
More informationThe Nuances of Backup and Recovery Solutions
DEFINING THE RIGHT DATA PROTECTION STRATEGY The Nuances of Backup and Recovery Solutions Cindy LaChapelle, Principal Consultant, ISG ISG WHITE PAPER 2012 Information Services Group, Inc. All Rights Reserved
More informationThe Data-Protection Playbook for All-flash Storage KEY CONSIDERATIONS FOR FLASH-OPTIMIZED DATA PROTECTION
The Data-Protection Playbook for All-flash Storage KEY CONSIDERATIONS FOR FLASH-OPTIMIZED DATA PROTECTION The future of storage is flash The all-flash datacenter is a viable alternative You ve heard it
More informationRepairing the Broken State of Data Protection
Repairing the Broken State of Data Protection April 2016 Oracle s modern data protection solutions address both business continuity and disaster recovery, reducing IT costs and simplifying data protection
More informationIBM Tivoli Storage Manager 6
Leverage next-generation data storage and recovery management capabilities IBM Tivoli Storage Manager 6 IBM Tivoli Storage Manager is the core component of an enterprise-wide data protection and recovery
More informationTop 4 considerations for choosing a converged infrastructure for private clouds
Top 4 considerations for choosing a converged infrastructure for private clouds Organizations are increasingly turning to private clouds to improve efficiencies, lower costs, enhance agility and address
More informationSTATE OF STORAGE IN VIRTUALIZED ENVIRONMENTS INSIGHTS FROM THE MIDMARKET
STATE OF STORAGE IN VIRTUALIZED ENVIRONMENTS INSIGHTS FROM THE MIDMARKET PAGE 1 ORGANIZATIONS THAT MAKE A GREATER COMMITMENT TO VIRTUALIZING THEIR OPERATIONS GAIN GREATER EFFICIENCIES. PAGE 2 SURVEY TOPLINE
More informationData Sheet: Storage Management Veritas Storage Foundation by Symantec Heterogeneous online storage management
Heterogeneous online storage management Overview Veritas Storage Foundation provides a complete solution for heterogeneous online storage management. Based on the industry-leading Veritas Volume Manager
More informationORACLE DATABASE LIFECYCLE MANAGEMENT PACK
ORACLE DATABASE LIFECYCLE MANAGEMENT PACK ORACLE DATABASE LIFECYCLE MANAGEMENT PACK KEY FEATURES Auto Discovery of hosts Inventory tracking and reporting Database provisioning Schema and data change management
More informationIndustry-leading solutions for transforming data centers into drivers of business value and innovation. Symantec in the Data Center
Industry-leading solutions for transforming data centers into drivers of business value and innovation Symantec in the Data Center 1 In today s wired world, all companies depend on enterprise applications
More informationVeeam Availability Solution for Cisco UCS: Designed for Virtualized Environments. Solution Overview Cisco Public
Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments 1 2017 2017 Cisco Cisco and/or and/or its
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationDisaster Recovery Is A Business Strategy
Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...
More informationUnderstanding Virtual System Data Protection
Understanding Virtual System Data Protection Server virtualization is the most important new technology introduced in the data center in the past decade. It has changed the way we think about computing
More informationIBM Storage Systems Group IBM TotalStorage Connected. Protected. Complete.
connec IBM Storage Systems Group IBM TotalStorage Connected. Protected. Complete. total storage total The IBM TotalStorage value-add The IBM TotalStorage family of products is designed to deliver the quality
More informationCENTRALIZED MANAGEMENT DELL POWERVAULT DL 2100 POWERED BY SYMANTEC
CENTRALIZED MANAGEMENT DELL POWERVAULT DL 2100 POWERED BY SYMANTEC EXECUTIVE SUMMARY The PowerVault DL2100 Powered by Symantec Backup Exec offers the industry s only fully integrated backup-to-disk solution
More informationOneUConn IT Service Delivery Vision
OneUConn IT Service Delivery Vision The University s Academic Vision establishes a foundation and high expectations for excellence in research, teaching, learning, and outreach for all of UConn s campuses.
More informationSoftware-defined storage systems from Lenovo
Intel Xeon processor Software-defined storage systems from Lenovo The IT environment of the future will be software-defined There is a broad consensus among IT experts that data centres do not currently
More informationAn Oracle White Paper May Oracle VM 3: Overview of Disaster Recovery Solutions
An Oracle White Paper May 2014 Oracle VM 3: Overview of Disaster Recovery Solutions Contents Introduction... 1 Overview of DR Solutions with Oracle VM... 2 Choose your DR solution path... 2 Continuous
More informationVMware vsphere 4 and Cisco Nexus 1000V Series: Accelerate Data Center Virtualization
VMware vsphere 4 and Cisco Nexus 1000V Series: Accelerate Data Center Virtualization Executive Summary VMware for the past decade has been the thought leader in driving virtualization of the data center
More informationINTELLIGENCE DRIVEN GRC FOR SECURITY
INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to
More informationPaper. Delivering Strong Security in a Hyperconverged Data Center Environment
Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and
More informationScale-Out Architectures for Secondary Storage
Technology Insight Paper Scale-Out Architectures for Secondary Storage NEC is a Pioneer with HYDRAstor By Steve Scully, Sr. Analyst February 2018 Scale-Out Architectures for Secondary Storage 1 Scale-Out
More informationCyberStore Veeam. Backup & Replication Appliances. Broadberry. CyberStore Veeam. Backup Storage Appliances. Powering these organisations
CyberStore Veeam Backup & Replication Appliances CyberStore Veeam CyberStore ARC Archiving Appliances: Backup Storage Appliances 's range of multi-award winning CyberStore storage appliances configured
More information<Insert Picture Here> Enterprise Data Management using Grid Technology
Enterprise Data using Grid Technology Kriangsak Tiawsirisup Sales Consulting Manager Oracle Corporation (Thailand) 3 Related Data Centre Trends. Service Oriented Architecture Flexibility
More informationVeritas InfoScale Enterprise for Oracle Real Application Clusters (RAC)
Veritas InfoScale Enterprise for Oracle Real Application Clusters (RAC) Manageability and availability for Oracle RAC databases Overview Veritas InfoScale Enterprise for Oracle Real Application Clusters
More informationSymantec Business Continuity Solutions for Operational Risk Management
Symantec Business Continuity Solutions for Operational Risk Management Manage key elements of operational risk across your enterprise to keep critical processes running and your business moving forward.
More informationWith Hyperconverged Infrastructure
Getting More out of Oracle With Hyperconverged Infrastructure WHITE PAPER When it comes to enterprise databases, there is no bigger player than Oracle. For more than three decades, Oracle has been synonymous
More informationDell EMC All-Flash solutions are powered by Intel Xeon processors. Learn more at DellEMC.com/All-Flash
N O I T A M R O F S N A R T T I L H E S FU FLA A IN Dell EMC All-Flash solutions are powered by Intel Xeon processors. MODERNIZE WITHOUT COMPROMISE I n today s lightning-fast digital world, your IT Transformation
More informationEMC Virtual Infrastructure for Microsoft Applications Data Center Solution
EMC Virtual Infrastructure for Microsoft Applications Data Center Solution Enabled by EMC Symmetrix V-Max and Reference Architecture EMC Global Solutions Copyright and Trademark Information Copyright 2009
More informationVeritas Volume Replicator Option by Symantec
Veritas Volume Replicator Option by Symantec Data replication for disaster recovery The provides organizations with a world-class foundation for continuous data replication, enabling rapid and reliable
More informationTechnology Insight Series
EMC Avamar for NAS - Accelerating NDMP Backup Performance John Webster June, 2011 Technology Insight Series Evaluator Group Copyright 2011 Evaluator Group, Inc. All rights reserved. Page 1 of 7 Introduction/Executive
More informationBUSINESS CONTINUITY: THE PROFIT SCENARIO
WHITE PAPER BUSINESS CONTINUITY: THE PROFIT SCENARIO THE BENEFITS OF A COMPREHENSIVE BUSINESS CONTINUITY STRATEGY FOR INCREASED OPPORTUNITY Organizational data is the DNA of a business it makes your operation
More informationGlossary of Terms Used in Actifio Products
Glossary of s Used in Actifio Products A B C D E F G H I-K L M N-O P-Q R S T U V W-Y Z A Actifio CDS Actifio Connector Actifio Desktop Actifio Global Manager Actifio Sky for AWS Actifio Sky AGM App or
More informationSymantec Data Center Transformation
Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments
More informationWAN Cost Savings Report From Talari. This custom report was created for: Quinn Philips, Cogent ROI - December 15, 2015.
WAN Cost Savings Report From Talari This custom report was created for: Quinn Philips, Cogent ROI - December 15, 2015 Personalized Personalized based on vertical industry identified by the prospect. Introduction
More informationServer Fault Protection with NetApp Data ONTAP Edge-T
Technical Report Server Fault Protection with NetApp Data ONTAP Edge-T Jeff Whitaker, NetApp March 2013 TR-4154 TABLE OF CONTENTS 1 Introduction... 3 2 Backup and Disaster Recovery Technology... 4 2.1
More informationHitachi Adaptable Modular Storage and Workgroup Modular Storage
O V E R V I E W Hitachi Adaptable Modular Storage and Workgroup Modular Storage Modular Hitachi Storage Delivers Enterprise-level Benefits Hitachi Data Systems Hitachi Adaptable Modular Storage and Workgroup
More informationData safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.
WHITE PAPER Data safety for digital business. One solution for hybrid, physical, and virtual environments. It s common knowledge that the cloud plays a critical role in helping organizations accomplish
More informationProtecting Microsoft Hyper-V 3.0 Environments with Arcserve
Protecting Microsoft Hyper-V 3.0 Environments with Arcserve Adding value to your Hyper-V environment. Today, you face demanding service level agreements (SLAs) while having to address staffing and budget
More informationNasuni for Oil & Gas. The Challenge: Managing the Global Flow of File Data to Improve Time to Market and Profitability
Solution Brief Highlights Optimize collaboration processes for geophysicists with high performance global file sharing. Support a dynamic business environment with easy integration of new acquisitions.
More information3 Ways Businesses Use Network Virtualization. A Faster Path to Improved Security, Automated IT, and App Continuity
3 Ways Businesses Use Network Virtualization A Faster Path to Improved Security, Automated IT, and App Continuity INTRODUCTION 2 Today s IT Environments Are Demanding Technology has made exciting leaps
More informationIBM Storage Software Strategy
IBM Storage Software Strategy Hakan Turgut 1 Just how fast is the data growing? 128 GB/ person The World s total data per person No Problem I I think I can do this We have a problem 24 GB/ person 0.8 GB/
More informationSAFEGUARD INFORMATION AND ENSURE AVAILABILITY WITH THE NETAPP BACKUP AND RECOVERY SOLUTION
enterprise storage solutions SAFEGUARD INFORMATION AND ENSURE AVAILABILITY WITH THE NETAPP BACKUP AND RECOVERY SOLUTION backup and recovery solution Network Appliance unleashes the full potential of disk-based
More informationFUJITSU Storage ETERNUS AF series and ETERNUS DX S4/S3 series Non-Stop Storage Reference Architecture Configuration Guide
FUJITSU Storage ETERNUS AF series and ETERNUS DX S4/S3 series Non-Stop Storage Reference Architecture Configuration Guide Non-stop storage is a high-availability solution that combines ETERNUS SF products
More informationVeritas Storage Foundation for Windows by Symantec
Veritas Storage Foundation for Windows by Symantec Advanced online storage management Veritas Storage Foundation 5.0 for Windows brings advanced online storage management to Microsoft Windows Server environments.
More informationBuyer s Guide: DRaaS features and functionality
Buyer s Guide: DRaaS features and functionality Disaster recovery without a secondary site DRaaS for the midmarket When a server stops responding, for whatever reason, the fastest way to resume service
More informationALERT LOGIC LOG MANAGER & LOG REVIEW
SOLUTION OVERVIEW: ALERT LOGIC LOG MANAGER & LOG REVIEW CLOUD-POWERED LOG MANAGEMENT AS A SERVICE Simplify Security and Compliance Across All Your IT Assets. Log management is an essential infrastructure
More informationNew Zealand Government IBM Infrastructure as a Service
New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand
More information