AXCIENT FUSION: TECHNICAL WHITE PAPER

Similar documents
Intermedia s Private Cloud Exchange

UNITRENDS & NUTANIX ARCHITECTURE & IMPLEMENTATION GUIDE

This presentation is intended to provide an overview of GDPR and is not a definitive statement of the law.

Security & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web

Security & Compliance in the AWS Cloud. Amazon Web Services

What is Dell EMC Cloud for Microsoft Azure Stack?

TRACKVIA SECURITY OVERVIEW

Morgan Independent Software Vendor Lead

Evolved Backup and Recovery for the Enterprise

The Technology Behind Datrium Cloud DVX

SECURE CLOUD BACKUP AND RECOVERY

Maximizing Availability With Hyper-Converged Infrastructure

What s new. James De Clercq (RealDolmen) Timothy Dewin (Veeam Software)

Elevate the Conversation: Put IT Resilience into Practice for Cloud Service Providers

Disaster Happens; Don t Be Held

VMWARE PROTECTION WITH DELL EMC NETWORKER 9

Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability

The Data Protection Rule and Hybrid Cloud Backup

How to blend backup and high availability

Compliance & Security in Azure. April 21, 2018

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

COMPLIANCE IN THE CLOUD

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

Real-time Protection for Microsoft Hyper-V

By 2020, a corporate no-cloud policy will be as rare as a no-internet policy is today. 1

Choosing the Right Cloud. ebook

Comprehensive Agentless Cloud Backup and Recovery for the Enterprise

FIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates

DELL EMC DATA DOMAIN OPERATING SYSTEM

DATA PROTECTION FOR THE CLOUD

Backup and Recovery Solutions offered in partnership with Infrascale

Availability for the Always-On Enterprise

CyberStore Veeam. Backup & Replication Appliances. Broadberry. CyberStore Veeam. Backup Storage Appliances. Powering these organisations

DELL EMC DATA DOMAIN OPERATING SYSTEM

Buyer s Guide: DRaaS features and functionality

Protect Your Data At Every Point Possible. Reduce risk while controlling costs with Dell EMC and Intel #1 in data protection 1

How to solve your backup problems with HP StoreOnce

Simple Data Protection for the Cloud Era

Hystax. Live Migration and Disaster Recovery. Hystax B.V. Copyright

Security and Compliance at Mavenlink

INTRODUCING VERITAS BACKUP EXEC SUITE

arcserve r16.5 Hybrid data protection

NEXT BIG THING. Edgemo Summit Martin Plesner-Jacobsen Team Lead Nordic

RECOVERY & BUSINESS CONTINUITY SERVICES. Protect your data. Recover your environment. Manage your recovery.

Asigra Cloud Backup Provides Comprehensive Virtual Machine Data Protection Including Replication

Hyper-Convergence De-mystified. Francis O Haire Group Technology Director

WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM

10 Considerations for a Cloud Procurement. March 2017

Hybrid Cloud Data Protection & Storage

Accelerate GDPR compliance with the Microsoft Cloud Ole Tom Seierstad National Security Officer Microsoft Norway

PUT DATA PROTECTION WHERE YOU NEED IT

Controlling Costs and Driving Agility in the Datacenter

Migration and Building of Data Centers in IBM SoftLayer

Backup and Recovery. Backup and Recovery from Redstor. Making downtime a thing of the past Making downtime a thing of the past

Introduction: Is Amazon Web Service (AWS) cloud supports best cost effective & high performance modern disaster recovery.

Data Protection for Virtualized Environments

TOP REASONS TO CHOOSE DELL EMC OVER VEEAM

The Nasuni Security Model

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.

HCI: Hyper-Converged Infrastructure

Don t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud

vsan Disaster Recovery November 19, 2017

Cloud Services. Introduction

Avanade Zerouno : Cloud Experience. Version 1.0 May 16, 2017 Author(s): Ivan Loreti

Arcserve Solutions for Amazon Web Services (AWS)

Availability for the modern datacentre Veeam Availability Suite v9.5

How CloudEndure Disaster Recovery Works

Protecting Microsoft Hyper-V 3.0 Environments with Arcserve

How CloudEndure Works

How CloudEndure Disaster Recovery Works

Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments. Solution Overview Cisco Public

Ten things hyperconvergence can do for you

How Managed Service Providers Can Meet Market Growth with Maximum Uptime

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure

NS2 Cloud Overview The Cloud Built for Federal Security and Export Controlled Environments. Hunter Downey, Cloud Solution Director

Disaster Recovery Guide

Backup-as-a-Service Powered by Veritas

I D C T E C H N O L O G Y S P O T L I G H T. V i r t u a l and Cloud D a t a Center Management

An Open Architecture for Hybrid Delivery

Hybrid Cloud NAS for On-Premise and In-Cloud File Services with Panzura and Google Cloud Storage

A Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist

FUJITSU Backup as a Service Rapid Recovery Appliance

Cloud Transformation and Significance of Security

Transform Availability

Converged and Hyper-Converged: Factory-Integrated Data Protection for Simplicity and Lifecycle Assurance

Tintri Cloud Connector

50 TB. Traditional Storage + Data Protection Architecture. StorSimple Cloud-integrated Storage. Traditional CapEx: $375K Support: $75K per Year

Protecting Miscrosoft Hyper-V Environments

SimpliVity OmniStack with the HyTrust Platform

Cloud Confidence: Simple Seamless Secure. Dell EMC Data Protection for VMware Cloud on AWS

Tech Note: vsphere Replication with vsan First Published On: Last Updated On:

Copyright 2012 EMC Corporation. All rights reserved.

UNIFIED DATA PROTECTION SOLUTION BRIEF

MOVING TOWARDS ZERO DOWNTIME FOR WINTEL Caddy Tan 21 September Leaders Have Vision visionsolutions.com 1

Transforming Data Protection with HPE: A Unified Backup and Recovery June 16, Copyright 2016 Vivit Worldwide

Symantec NetBackup 7 for VMware

IBM Spectrum Protect Plus

Complete Data Protection & Disaster Recovery Solution

Editions comparison. Veeam Availability Suite. Veeam Availability Suite includes Veeam ONE

The Data-Protection Playbook for All-flash Storage KEY CONSIDERATIONS FOR FLASH-OPTIMIZED DATA PROTECTION

Transcription:

AXCIENT FUSION: TECHNICAL WHITE PAPER

Table of Contents The True Cost of Legacy Solutions to Businesses 3 Axcient Fusion Overview 4 Fusion Infrastructure 5 Availability, Security, and Compliance 6 Deployment and Configuration 7 Secure and Efficient Replication 8 Disaster Recovery and Business Continuity 9 Data Protection (Backup and Recovery) 11 Testing and Development 13 Summary 14 2

The True Cost of Legacy Solutions to Businesses North American businesses operate in an era where the cost of downtime is more than $700 Billion annually. IT leaders are under constant pressure to protect their business with the ability to rapidly recover from a disaster or site-wide outage, thereby ensuring employees remain productive and applications and data are always accessible. This constant pressure has increased the demand on IT leaders to make certain their businesses and IT environments are as resilient and agile as possible. IT resilience is defined by Gartner as the sustained availability and agile delivery of IT services, as well as the confidentiality assurance for business information assets, and encompasses a range of workloads including disaster recovery, data protection, and long-term retention. In addition to ensuring complete resilience for their infrastructure, applications, and data, today s IT leaders are asked to find new ways to deliver higher levels of service at lower cost and using fewer resources. Legacy on-premises products used for IT resilience such as target storage appliances and backup and replication software have led to complex, fragmented, and redundant silos of infrastructure. The hub-and-spoke model of legacy infrastructure creates redundant silos of hardware and software, and has resulted in multiple copies of data sprawled across the IT environment. According to industry analyst ESG, 78% of businesses report having five or more copies of their production data that are used for other use cases like disaster recovery and data protection. This not only increases complexity and cost, but also drastically limits an IT department s ability to quickly respond to incidents, outages and security breaches. According to industry analyst IHS, downtime costs North American businesses more than $700 Billion each year. (IHS, The Cost of Server, Application, and Network Downtime: North American Enterprise Survey, January 2016) 3

Axcient Fusion Overview Axcient created Fusion to achieve IT resilience by eliminating the cost and operational overhead of legacy on-premises solutions. Fusion consolidates and converges the full suite of resilience workloads disaster recovery, data protection, archiving, long-term retention, and testing and development into a single cloud platform. With Fusion, businesses can eliminate the need to operate and maintain multiple data centers while achieving greater uptime for their applications and data. Fusion enables businesses to converge and consolidate critical workloads for IT resilience into a single cloud platform. BUSINESS CONTINUITY AND DISASTER RECOVERY DATA PROTECTION TESTING AND DEVELOPMENT ARCHIVING FEATURE AXCIENT S KEY ADVANTAGES Cloud-Converged Platform Critical non-production workloads consolidated into one cloud-converged platform. Unmatched Recovery Times Go from catastrophic infrastructure failure to full IT productivity in under 60 minutes. Sandbox Testing One-click, on-demand testing and development environments. Global Data Deduplication 30x reduction in data storage footprint with data deduplication. WAN Optimization 90% reduction in bandwidth consumption with in-line WAN optimization. Near-Continuous Replication Customizable Retention Policies Data Security Snapshots replicated to the cloud in as fast as 90 seconds. Achieve long-term retention requirements with one-, three- and seven- year retention options. Hardened transport and data security with AES-256 key-based encryption. Faster Time to Value Setup and deploy Fusion in under 10 minutes. 4

Fusion Infrastructure Axcient Fusion protects virtualized environments running Windows and Linux based virtual machines by deploying an Axcient Virtual Manager (AVM) on the host where the virtual machines are located. The overall Fusion solution architecture is referred to as the Fusion Infrastructure. The Fusion Infrastructure consists of: 1. Axcient Virtual Manager (AVM): Agentless software that is used to protect on-premises virtualized environments by replicating to the Axcient Cloud. The AVM establishes an encrypted connection to the Fusion Engine for securely replicating data to the Axcient Cloud. 2. Web Management Interface: Provides end-users with a single pane-of-glass self-service interface to manage protection, recovery, and orchestration operations. 3. Virtual Office: An on-demand, private cloud replica of an on-premises environment used for systems failover, data recovery, and testing and development activities. 4. Fusion Engine: Consists of elastic backend services that ensure data is optimized, secured, and protected. These include: A secure gateway for communication between AVMs and the Axcient Cloud An index for data deduplication, WAN optimization, and reconstituting data for recovery and failover Recovery services, including automated orchestration and automation for failover operations, that ensure recovery time objectives (RTOs) are met Infrastructure support that maintains high availability of the Fusion service 5

Availability, Security, and Compliance Fusion is built to accommodate global scalability for applications. It takes advantage of infrastructure in multiple geographic regions and availability zones to optimize performance, data availability, and redundancy. The Fusion Infrastructure meets a number of security standards, including: CERTIFICATIONS / ATTESTATIONS LAWS, REGULATIONS & PRIVACY ALIGNMENTS / FRAMEWORKS DoD SRG HIPAA CIS FedRAMP EAR CJIS FIPS EU Model Clauses CLIA IRAP FERPA CMS EDGE ISO 9001 GLBA CMSR ISO 27001 VPAT / Section 508 CSA ISO 27017 HITECH EU-US Privacy Shield ISO 27018 IRS 1075 FISC MLPS Level 3 ITAR FISMA MTCS GxP (FDA CFR 21 Part 11) PCI DSS Level 1 ICREA SEC Rule 17-a-4(f) MITA 3.0 SOC 1, SOC 2, SOC 3 NIST All communication between the on-premises environment and the Axcient Cloud is over a secure HTTPS TLS 2.1 connection. In addition, data at rest in the Axcient Cloud is secured with AES 256-bit key-based encryption. Software updates are automatically propagated to AVMs by the Axcient Cloud so that users have access to all the latest Fusion features and security updates without having to manually track AVM releases. 6

Deployment and Configuration The first-time deployment process requires the user to perform an initial service configuration in the Web Management Interface. Once the service is configured, an.ovf download link is generated. The user downloads the.ovf and uses it to deploy the Axcient Virtual Manager (AVM) as a new virtual machine on the hosts to be protected. During the service configuration, the user can tailor Fusion to meet specific replication requirements. These include the desired recovery point objective (RPO), when to start the initial seed replication, and how much network bandwidth Fusion should consume during and outside business hours. It is also possible to configure the health status thresholds for protected devices and the AVM. Thresholds dictate when health status changes occur in the Web Management Interface to alert the user that attention is needed. Once the AVM is successfully deployed, it phones home to the Axcient Cloud and establishes a secure connection. The Axcient Cloud monitors a heartbeat from the AVM to confirm ongoing connectivity. If the AVM fails to send a heartbeat, the health status of the service changes and the user is notified in the Web Management Interface. Fusion setup and deployment time is under 10 minutes. 7

Secure and Efficient Replication Fusion is built with data efficiency and security in mind. After the Fusion service is deployed and configured, Fusion automatically discovers all the VMs on the host where the AVM is installed. All virtual machines are automatically chosen to be protected, but users can choose to exclude virtual machines that they do not wish to protect. Fusion uses an incremental-forever replication topology. For the initial seed replication, an application-consistent snapshot is taken of each VM. Data deduplication then determines if there are any redundant blocks of data across the virtual machines and optimizes network and cloud storage utilization. For all subsequent replications after the initial seed, only deduplicated, incremental changes are sent to the Axcient Cloud, minimizing the time it takes to update the cloud with new restore points and ensuring desired Recovery Point Objectives (RPOs) are met. As data is replicated to the Axcient Cloud, Fusion stores the metadata blocks, encrypts the data using a 256-bit AES encryption key, and stores the data in a deduplicated store. While replication processes are running, Fusion is continually working to ensure the desired Recovery Time Objectives (RTOs) for the virtual machines can be met. To achieve sub 1-hour RTOs, restore points are hydrated at regular intervals and cached. Finally, load balancing and infrastructure management facilitate the entire process by optimizing performance, ensuring redundancy and resilience of Fusion Engine components, and monitoring the health of the overall Fusion infrastructure. Fusion ensures complete IT resilience with 1-hour RPOs and RTOs for all IT services. 8

Business Continuity and Disaster Recovery One of the core use cases for Axcient Fusion is to provide an on-demand service for disaster recovery and business continuity for businesses. With Fusion, businesses are able to eliminate the need to maintain and operate multiple datacenters while still achieving enterprise-grade RTOs and RPOs for their IT services. In a disaster event, an authorized user can log into the Fusion Web Management Interface to create a virtual private cloud called a Virtual Office. The Virtual Office ensures security, privacy and reliability for every organization needing to run one or more failover virtual machines in the Axcient Cloud. The Virtual Office is an on-demand replica in the Axcient Cloud of the protected on-premises environment. There are several options for accessing VMs running in a Virtual Office, including Remote Desktop Protocol (RDP), Virtual Private Network (VPN), Site-to-Site VPN, and port-forwarding. A Virtual Office can be stood up either manually or by utilizing Fusion s built-in automation and orchestration features in the Web Management Interface. 9

To simplify the ease of recovery and failover in the event of a disaster, Axcient has created Runbooks to orchestrate and automate tasks. A Runbook is a detailed deployment plan for a Virtual Office. Runbooks can be implemented for any number of use cases, such as failing over an environment during an outage, running a short server test, or exercising a disaster recovery test plan. A Runbook can be configured to specify a specific order for starting VMs in the Virtual Office along with the allocation of compute resources for each VM. The Runbook also specifies network settings within the Virtual Office, such as assigning sets of VMs to particular subnets. Once a Runbook is configured and saved, it can be used to stand up an entire Virtual Office with a single click of a button. When the Virtual Office is no longer needed, data from the Virtual Office can be failed back to the user s production hardware and/or datacenter. This is accomplished by exporting data in the form of virtual servers from the Axcient Cloud as system images and loading them back to the production environment. Axcient provides 30 days of free Cloud usage for a production Virtual Office disaster recovery scenario. Beyond 30 days, Axcient charges a minimal overage per server per hour for servers in the production Virtual Office in the Axcient Cloud. While the Virtual Office can be run for as long as required, Axcient strongly recommends to start preparing for failback within those 30 days. 10

Data Protection (Backup and Recovery) In addition to protecting on-premises environments for disaster recovery and business continuity, Axcient Fusion provides granular recovery options to eliminate the need for legacy solutions for backup and recovery. With Fusion, businesses can protect their critical information and applications in the cloud and enable self-service recovery for objects, files, folders, and VMs. When setting up a Fusion service for data protection, users select their desired cloud retention policy, when the initial seed replication should begin, and the protection frequency (RPO). To accommodate long-term retention and compliance requirements, cloud retention policies with Fusion range from 1 week to 7 years. After the retention policy is set for the service, Fusion generates restore points according to the user-defined RPOs. Unlike other data protection solutions that use a graduated (grandfatherfather-son) retention policy, Axcient Fusion keeps all restore points for a given environment based on the user-defined retention policy. 11

As restore points are created, they are listed in the recovery window to provide rapid recovery from any particular point in time. The recovery process is performed through the Web Management Interface by selecting a device and an available restore point, and then selecting the desired files and/or folders to recover. Once the desired data has been selected, a compressed.tar file is generated as a clickable and shareable link. This link can be used to download the data. 12

Testing and Development When it comes to IT resilience, reactive capabilities for recovery and failover are often not enough. That s why Fusion has incorporated testing and development into its suite of capabilities to minimize outages and disruptions caused by application rollouts, software updates, or patches. A Virtual Office can be used to deploy an isolated sandbox environment for test and development activities, such as applying software patches and updates to determine their potential impact on production systems. The Virtual Office will not interact with any device outside the sandbox environment, making it ideal for testing and development without impacting the production environment. Testing and development can also be pre-configured using Runbooks. A Runbook can be created to spin up an on-demand sandbox environment with a single click rather than having to manually configure the environment each time. 13

Summary IT resilience is more than just making sure that data and applications are protected and recoverable. It s about ensuring that the business can proactively prevent and minimize disruptions through extensive planning, choosing the right solutions for the business, and testing those solutions prior to a disaster event. Axcient has rethought the way businesses can architect their IT resilience strategy by harnessing the power, scalability, and on-demand nature of the cloud in its product Fusion. Unlike legacy solutions, which result in redundant copies of infrastructure and data, Fusion optimizes and replicates data to the cloud for disaster recovery and data protection, and offers additional leverage by letting customers use a single copy of that data for other use cases such as testing, development, and long-term archiving. With Fusion, businesses can take a more proactive and preventative approach to fortifying their IT resilience strategy by conducting complete failover tests of their entire data center, achieve higher uptime for services, and eliminate the need to operate and maintain multiple data centers. Axcient Fusion empowers businesses of all sizes to have the IT resilience and agility of the world s largest enterprises - at a fraction of the cost. With Fusion, IT leaders can be confident that they can quickly and easily recover their business following a disaster event. 14

About Axcient Axcient solves complicated technology problems with powerfully simple cloud solutions to enable businesses to run at their full potential. Fusion, the world s first cloud-converged solution for IT resilience, empowers businesses of all sizes to operate with the resilience and agility of the world s largest enterprises while dramatically reducing data center footprint, complexity and cost. Thousands of businesses trust Axcient to keep their applications running, their data centers lean and employees productive. The company is headquartered in Mountain View, California. For more information about IT resilience, visit axcient.com/fusion or call 800.715.2339. Acknowledgments Authors: Yoav Naveh, Saurabh Modh, Mike Dupuy Publication Date: December 1, 2016 Version Number: 1.4 15 15