Carbonite: Complete data protection

Similar documents
How to blend backup and high availability

Buyer s Guide: DRaaS features and functionality

Carbonite Availability. Technical overview

Evolved Backup and Recovery for the Enterprise

Disaster Happens; Don t Be Held

Elevate the Conversation: Put IT Resilience into Practice for Cloud Service Providers

PUT DATA PROTECTION WHERE YOU NEED IT

arcserve r16.5 Hybrid data protection

Complete Business Data Protection Solutions and Services. Backup and Recovery to the rescue. Jean Vangramberen UK Sales Director.

Asigra Cloud Backup Provides Comprehensive Virtual Machine Data Protection Including Replication

IBM SmartCloud Resilience offers cloud-based services to support a more rapid, reliable and cost-effective enterprise-wide resiliency.

Cloud Confidence: Simple Seamless Secure. Dell EMC Data Protection for VMware Cloud on AWS

Disaster Recovery Guide

C H A P T E R Overview Figure 1-1 What is Disaster Recovery as a Service?

Protecting Microsoft Hyper-V 3.0 Environments with Arcserve

Disaster Recovery Is A Business Strategy

Microsoft Operations Management Suite (OMS) Fernando Andreazi RED CLOUD

How CloudEndure Disaster Recovery Works

White P C aper Title Here arbonite Cloud Migration Te T c e hnica ic l a G l g uide VM VM

Shift CAPEX to OPEX. With an Expedient On-Site Private Cloud

Veritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW

Understanding Virtual System Data Protection

How CloudEndure Works

Reasons to Deploy Oracle on EMC Symmetrix VMAX

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery

Data center interconnect for the enterprise hybrid cloud

Protecting VMware vsphere/esx Environments with CA ARCserve

How CloudEndure Works

What s new. James De Clercq (RealDolmen) Timothy Dewin (Veeam Software)

The Data Protection Rule and Hybrid Cloud Backup

Maximizing Availability With Hyper-Converged Infrastructure

Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability

Architecture and Deployment

Comprehensive Agentless Cloud Backup and Recovery for the Enterprise

How CloudEndure Disaster Recovery Works

Easy VMware Disaster Recovery & Business Continuity in Amazon Web Services

Disaster Recovery as a Service

Simple Data Protection for the Cloud Era

Complete Data Protection & Disaster Recovery Solution

Simplify Backups. Dell PowerVault DL2000 Family

Hybrid Cloud Data Protection & Storage

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.

VEMBU VS VEEAM Why Vembu is Better. VEMBU TECHNOLOGIES

Acronis Hybrid Cloud Architecture Unified Centralized Data Protection Web-based User Interface Deployed On-premises or in the Cloud.

The case for cloud-based data backup

The Data-Protection Playbook for All-flash Storage KEY CONSIDERATIONS FOR FLASH-OPTIMIZED DATA PROTECTION

Controlling Costs and Driving Agility in the Datacenter

Protecting VMware vsphere/esx Environments with Arcserve

IT your way - Hybrid IT FAQs

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

Microsoft hybrid business continuity and disaster recovery solutions

Hyper-Convergence De-mystified. Francis O Haire Group Technology Director

TOP REASONS TO CHOOSE DELL EMC OVER VEEAM

Vembu Technologies. Experience. Headquartered in Chennai Countries

vsan Disaster Recovery November 19, 2017

Vembu BDR Suite. Free vs Paid Edition. Backup & Disaster Recovery. VEMBU TECHNOLOGIES TRUSTED BY OVER 60,000 BUSINESSES

Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution

Modernize Your Backup and DR Using Actifio in AWS

VMware Backup and Replication using Vembu VMBackup

That Set the Foundation for the Private Cloud

Availability for the modern datacentre Veeam Availability Suite v9.5

Why is Office 365 the right choice?

Backup & Disaster Recovery. Vembu BDR Suite. Free vs Paid Edition. VEMBU TECHNOLOGIES Copyright Vembu Technologies. All Rights Reserved

Business Continuity and Disaster Recovery. Ed Crowley Ch 12

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure

Virtualization with Arcserve Unified Data Protection

Data Protection, Disaster Recovery, and Ransomware Protection with DRaaS

INTRODUCING VERITAS BACKUP EXEC SUITE

Offers easy management of all protected devices and data through a unified secure touchfriendly web-based management console.

Executive Brief CHOOSING THE RIGHT MODEL FOR ENTERPRISE BACKUP & RECOVERY. The Executive Guide Q417-CON-10681

Virtual protection gets real

EBOOK: VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud

VMware Backup and Replication Enterprise Edition

UNITRENDS & NUTANIX ARCHITECTURE & IMPLEMENTATION GUIDE

Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments. Solution Overview Cisco Public

How unified backup and cloud enable your digital transformation success

WHITE PAPER. Header Title. Side Bar Copy. Header Title 5 Reasons to Consider Disaster Recovery as a Service for IBM i WHITEPAPER

The Key to Disaster Recovery

FUJITSU Backup as a Service Rapid Recovery Appliance

Vembu ImageBackup. Microsoft Windows Servers Desktops Laptops VEMBU TECHNOLOGIES PARTNERS.

Cloud Computing: Making the Right Choice for Your Organization

5 Things Small Businesses Need to Know About Disaster Recovery

Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments

IBM Spectrum Protect Plus

THE FOUR STEPS TO A TAPELESS BACKUP ENVIRONMENT: YOUR HOW-TO GUIDE FOR DATA MANAGEMENT SUCCESS INTRODUCTION

Dell Storage Point of View: Optimize your data everywhere

unparalleled protection of

NEXT BIG THING. Edgemo Summit Martin Plesner-Jacobsen Team Lead Nordic

3 Ways Businesses Use Network Virtualization. A Faster Path to Improved Security, Automated IT, and App Continuity

Building Business Continuity and Enabling Smart Disaster Recovery with Azure Site Recovery (ASR) WHITEPAPER. By Pawan Kumar Dontula

Why the Cloud is Changing the Face of DR

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

Hitachi Unified Compute Platform Pro for VMware vsphere

Countering ransomware with HPE data protection solutions

BACKUP AND DRAAS IT BUYER S GUIDE FOUR WAYS TO BEAT DOWNTIME

CIO Guide: Disaster recovery solutions that work. Making it happen with Azure in the public cloud

Microsoft Hyper-V backup using Vembu VMBackup

White Paper. How to select a cloud disaster recovery method that meets your requirements.

Copyright 2015 EMC Corporation. All rights reserved. Published in the USA.

Vembu VMBackup VEMBU TECHNOLOGIES PARTNERS.

Transcription:

Carbonite: Complete data protection All the strategic tools necessary to protect any type of data

Complete data protection Data protection is a balancing act between the need to protect data and the need to protect access to data. The trick lies with deploying the right protection across the different systems and types of data, since they each require different forms of protection. IT pros need confidence that the protection they deploy can: Ensure long-term survivability of historical data. Deliver data securely to different waypoints. Extend protection as environments change. Carbonite s complete Data Protection Platform ensures both the survivability and availability of data for various strategic purposes, including: information governance, regulatory compliance support, business intelligence, agility and user productivity. Carbonite backup, disaster recovery and high availability solutions help businesses of all sizes and in every industry protect their data. From simple, secure cloud backup and disaster recovery as a service (DRaaS) to high availability and non-disruptive migration, Carbonite offers all the tools necessary to deploy a comprehensive data resiliency strategy for any type of data, on any system, across any distance. 2

Destination resiliency With the rapid pace of technology innovation today, it s common for data to be spread across a range of physical, virtual and cloud platforms, and across wider geographic distances. This heightens the need for aligning protection with urgency. By aligning data protection with urgency, businesses can ensure predetermined service levels for all types of data, eliminate unnecessary demands on internal resources, and maintain business agility, all at a lower total cost of ownership than with traditional solutions. Determining factors Several factors will determine the appropriate type of protection, including the nature of the system, the purpose of protection, and the procedures and technology available to achieve desired outcomes. The nature of the source is a strong indicator for the type of protection it requires. A system that acts as a repository will require different protection than an intermediary. A repository stores historical data that s less urgent than other types of data but still necessary to protect. An intermediary system delivers critical services as well as actively changing data that users need to be able to access. When determining protection, the ultimate decision comes down to outcomes. Starting with outcomes, IT decision makers can easily eliminate solutions lacking the minimum feature set. Specific outcomes businesses seek to control include: System uptime Recovery speed Data survivability Document retention Discoverability Non-disruptive migration Procedures and technology are additional factors. Rate of change and bandwidth will determine the need for periodic or real-time replication, or a blended approach that analysts now recommend. 1 Geographic distribution of networks combined with mixed physical, virtual and cloud deployments also serve to increase complexity and demand for resources. 3

Destination resiliency Aligning protection with urgency How long a company can wait to get data back High Phone systems Email POS E-commerce/websites Medium Low Seconds Meeting apps Customer support systems Manufacturing systems Software development tools QA/Testing tools ERP systems Customer relationship management Hours Corporate intranet Payroll systems Accounting systems SharePoint document sharing systems Days HR systems Weeks Seconds Frequency of change 4

Data-defined protection Data-defined protection isn t new. Historically, the lack of automated tools left the provisioning of protection subject to the clout of individual stakeholders. Today, traditional criteria for determining protection such as business size or total data footprint seem superficial and antiquated. The practices and procedures for data protection have evolved alongside mobile and cloud platforms. Businesses now have a complete spectrum of solutions to address critical needs for all types of data in any organization. Information governance Federal and industry regulations impose requirements for handling data that businesses must satisfy or risk compliance and certification. Requirements for record retention, email archiving and discoverability fall under the label of information governance. Traditional solutions were expensive, laborintensive and prone to failure. Today, technology exists for ensuring the long-term survivability of semi-active or inactive data while reducing costs and improving the performance of more critical areas of protection. The ideal solution for archiving and document retention is one that automates backup to a secure target using low-cost, scalable storage. Disaster recovery Data loss becomes increasingly costly as organizations depend more on data to pursue strategic objectives. As organizations grow, so does the amount of data they generate. Modern infrastructures are more complex than those from just a few years ago. Today s environments support a wider range of operating systems, applications, physical servers, virtualized workloads and cloud deployments, with networks extending beyond the central office. At the same time, risks are more pervasive. Malware and ransomware infections are on the rise, and businesses are increasingly targeted due to the value and sensitive nature of data. Backup is essential to mitigate these threats. In a data-defined protection strategy, deployment aligns with predetermined objectives establishing the urgency of each system under protection. This affects scheduling, retention, and the provisioning of onsite, offsite or hybrid protection. By protecting data at an offsite location in a separate FEMA zone from the source, organizations can ensure access to critical data if there s a disruption at the main location. Service vs. purchase Disaster recovery as a service (DRaaS) is an increasingly common option for all organizations. With DRaaS, a third party provides a remotely hosted environment that mirrors production in real time. If there s an interruption at the source, the replica can be made available through either self-service or managed failover. All infrastructure and maintenance is the responsibility of the provider. Technology analysts predict the share of businesses using DRaaS to grow for small, medium and large organizations as the economics of the cloud continue to drive greater cost savings and scalability. Whether an organization uses a traditional backup approach or DRaaS, any solution designed for recovery should provide simple procedures for restoring files, folders and full systems in the event of human error, hardware failures, malware and natural disasters. If a user becomes infected with a ransomware virus, an IT admin should be able to revert to an earlier, non-corrupt version without being forced to pay a ransom to cyber-criminals. User productivity Today s markets are highly competitive, mobile and global. To stay productive, users need always-on access to critical data. A lost or stolen laptop, coffee spill or server outage can be extremely costly for data-dependent organizations. IT departments need tools for protecting laptop and mobile data from common forms of data loss. And they need failover capabilities for when a server or database experiences an outage. Data protection should offer businesses advanced feature sets for ensuring always-on access to critical data, servers and applications for any type or disruptive event. Today, system complexity and the mobile nature of the workforce necessitate a wide range of configuration options, including ground-to-cloud, cloud-to-ground, cloud-tocloud, one-to-many and many-to-one, to name a few. 5

Data protection from Carbonite Carbonite offers a complete Data Protection Platform with multiple options for backup, high availability, DRaaS and data migration for all types of data, including heterogeneous environments and dispersed networks. Carbonite allows organizations to implement a blended data protection strategy for any hardware, software or virtual platform. By blending different forms of protection, businesses can deploy the right level of protection for each system in their network, ensuring that recovery objectives and service levels align with the urgency of data under protection. All Carbonite solutions include complete documentation, online access to a user community and knowledge base, and award-winning global customer support from certified experts. Carbonite complete Data Protection Platform Disaster recovery Data migration Backup High availability Hours Minutes Seconds 6

Data protection from Carbonite Carbonite Server Backup Physical Edition Carbonite Server Backup Physical Edition is a powerful disaster recovery solution that satisfies the need to protect the three types of data that comprise a multi-tier protection strategy: historical, semi-active and mission-critical. It also satisfies the need to protect data in two places: onsite and offsite. Onsite backup enables LAN-speed recovery of critical data, while offsite backup ensures a secondary copy persists in the event of a local failure, regional outage or natural disaster. Flexible options allow you to deploy the right level of protection for any type of data. Key features Protect heterogeneous networks with a single solution Accelerate recovery time performance Full system backup with forever incrementals Ensure flexible daily and monthly recovery points Centralize protection for distributed environments Carbonite Server Backup Physical Edition is available as a software-only solution or as hardware with subscription pricing for reducing or eliminating capital expenditure (capex). Feature detail Restoring from the local appliance System image and granular recovery options Advanced 256-bit private key encryption Dissimilar hardware restore Central management via browser-based portal With fully customizable scheduling and retention settings, Carbonite Server Backup gives businesses options for addressing the speed of recovery, the point in time they wish to recover from, storage footprint and network bandwidth. Choose desired recovery point 7

Data protection from Carbonite Carbonite Server Backup Edition Carbonite Server Backup Edition is our server backup solution purposebuilt for virtual environments. With Carbonite Server Backup Edition, protection is configured both onsite and in the cloud. This enables fast, flexible recovery of data in minutes. The solution is fully cloud-integrated, so there s no need to procure additional cloud services. Key features Image backup with forever incrementals Accelerated backup using SAN access or hot-add disk mounting Data compression AES 256-bit encryption Restore to host (ESXi, vcenter, Hyper-V, including cross-hypervisor) Granular recovery (files, folders, Exchange, SharePoint, SQL, Active Directory) Local failover for quick recovery and minimal downtime Mount backup data for fast granular access Download (VHD, DK, RAW, etc.) Backup server Hypervisor Host Onsite backup Offsite backup 8

Data protection from Carbonite Carbonite Availability Carbonite Availability provides always-on protection for critical, time-sensitive data and applications. It creates a perfectly mirrored secondary copy that assumes responsibility for server workloads the moment there s a disruption to the primary source. Key features Changes continuously sent ensure virtually no data loss Replicate any source data to any secondary target in real time Primary system Target system Perform automatic or triggered failover with virtually no disruption in service Execute tests with live data to ensure cross-dependent functionality Simplify administrative tasks and eliminate disaster recovery fire drills Carbonite Availability continuously replicates to the secondary target, eliminating the potential for data loss from changes that can occur post-snapshot. In the event of a disruption at the source, push-button or automated failover ensures uninterrupted access to application data from the secondary source. Feature detail Primary system Automatic or manual failover Near zero downtime Target system Real-time, byte-level replication for physical, virtual or cloud environments DNS mapping with automatic application dependency discovery Software development kit (SDK) for seamless integration via API Once the issue is resolved, users fail back to the production environment, usually without noticing. The entire solution is managed through the console. 9

Data protection from Carbonite Carbonite Recover Carbonite Recover is our DRaaS offering. It securely replicates critical systems from your primary environment to the cloud, ensuring that an up-to-date secondary copy is available for failover at any moment, minimizing downtime as well as costs. There s no need for a secondary data center. Carbonite handles all infrastructure and maintenance. Changes sent continuously Real-time replication and near-zero downtime Primary system Carbonite cloud With Carbonite Recover, replication from the primary server to the cloud happens continuously at the byte level. The replica at the secondary cloud location is constantly synchronizing with the source, ensuring the currency of the data. Any outage that exceeds the failure threshold you ve established results in immediate failover to the cloud-based replica. The total downtime or RTO, is measured in minutes, and the recovery point (RPO) is only seconds old, virtually eliminating the business impact of the outage. Key features Failover with near zero downtime Recovery times and recovery points measured in minutes or seconds Orchestration for multi-tier applications, with boot order, scripting and automated discovery of systems in your environment Non-disruptive, self-service testing Bandwidth-optimized for limited network impact Built-in encryption, both at rest and in flight Carbonite technical support, from initial deployment to testing to failover and failback Support for iseries and AIX with our Carbonite Disaster Recovery offering Primary system Carbonite cloud 10

Data protection from Carbonite Carbonite Endpoint Protection Carbonite Endpoint Protection is a hybrid cloud solution for endpoint backup and archiving that allows IT to mitigate data loss and data breach at the frontiers while maximizing network and end user performance. Deployment flexibility Our endpoint protection is engineered with central management and control features that simplify deployment while minimizing disruptions due to bandwidth restrictions or geographic dispersion of networks. Mitigate data loss and data breach Carbonite Endpoint Protection protects mobile devices and data from internal and external threats while addressing regulatory requirements and the consequences of lost or stolen laptops and tablets. Key features Global deduplication of encrypted data increases security and efficiency Maximum deployment flexibility and scalability for large, distributed organizations QuickCache QuickCache technology reduces bandwidth usage and accelerates time-to-protection Policy-controlled backups that don t interfere with end user productivity Support for laptop, tablet and smartphone data protection Global location tracking Secure, remote data access from any device, anywhere, anytime Quick, silent and centralized deployment & management Vault Remote wipe and poison pill 11

Data protection from Carbonite Carbonite Migrate Carbonite Migrate quickly and easily migrates physical, virtual and cloud workloads over any distance with minimal risk and near-zero downtime. The streamlined process automates and consolidates numerous manual and error-prone steps into just a few simple tasks, reducing the amount of work you need to do to reach your migration goals. Test cutovers can be performed anytime without impacting production systems. Real-time replication from any system to any system Key features: Primary system Structured, repeatable migration with near-zero downtime Highly automated process that eliminates common risks and streamlines migrations Freedom from lock-in to a specific cloud, hypervisor or piece of hardware 24x7 award-winning customer support Target environments include: ware vsphere ware vcloud Director Amazon Web Services Microsoft Azure Classic Microsoft Azure Resource Manager Google Cloud Target system Planned cutover Near zero downtime Decommissioned system New primary system 12

Deployment Businesses have more options than ever for blending data protection to form a holistic strategy: Backup Deploy across all systems for information governance and rapid recovery for both small-scale data loss and extreme adverse events. High availability Deploy for critical, time-sensitive systems requiring continuous or nearcontinuous operation. DRaaS Leverage our experts and infrastructure to keep a replica of critical systems on standby if there s ever an interruption at the source. Data migration Deploy for hardware or platform upgrades, software patches and for changing vendors. 13

Deployment Backup To satisfy demands for document retention and recoverability, businesses should deploy backup for all types of data. Backup captures snapshots at periodic intervals and protects them according to a set retention schedule. A daily snapshot taken during off-peak hours and protected onsite will allow a business to perform rapid recovery from a specific point in time. A retention schedule consisting of the most recent snapshots 30 daily and 12 monthly is usually sufficient to address most forms of data loss, including accidental deletions, hardware failures and malware. Large-scale interruptions like power outages, natural disasters and critical hardware failures, while less common, can be far more detrimental. Backup protection should allow IT to perform both simple file and folder restore as well as full-system recovery for the worst types of data loss. Businesses also need to create a second backup copy and store it at a secure, offsite location, such as the cloud. Because regional outages can affect both the backup and the original, cloud backup allows businesses to recover server data remotely. Recovery time using backup is typically measured in hours or days, depending on the scale of the disruption and the time it takes to resolve the underlying issue. When it comes to protecting virtual environments, a solution that backs up frequently, efficiently and at the hypervisor level provides a secondary environment for data without creating network bottlenecks. data should be protected both onsite and offsite to ensure data remains accessible, even if the itself isn t. 14

Deployment High availability Critical systems require urgent protection. An outage to an email server or transactional database could disrupt essential operations. This is where high availability comes in. High availability can share the same architectural structure as backup, with a copy onsite and one in the cloud. The difference lies in the frequency of replication, which has implications for system uptime and potential for data loss. A high availability solution mirrors server data in real time. If there s a server outage in a high availability environment, the secondary server becomes the source and users fail over to the replicated server. Recovery time in this scenario is measured in seconds or minutes. Workloads continue to run on the secondary system until the primary server is brought back online. The entire process can be automated or triggered. As with cloud backup, if both the primary and secondary servers are affected, the cloud target is available remotely until the onsite disruption is resolved. Since the replication process occurs in real time, a high availability solution can ensure zero or near-zero data loss. High availability also allows IT admins to perform test failovers without disrupting users or asking staff to work irregular hours. Any time there s a change to network topology, IT can test performance with a high degree of confidence. 15

Deployment DRaaS Stagnant budgets are forcing IT departments to weigh investments more carefully, and shift spending from capital expenditures to operational expenditures. With DRaaS, you don t need secondary hardware to store replicated data for recovery purposes. You can enjoy all the benefits of resilient IT without owning the hardware or being responsible for maintenance. Many businesses have decided that, while their data is crucial for their success and survival, it s not necessary to invest in a secondary data center as a precaution. The emergence of cheap storage combined with advancements in data protection changes the way IT decision-makers think about backup. It s now easier and more cost effective than ever to ensure high service levels for critical applications through a DRaaS provider while protecting secondary and archival systems with cloud or hybrid backup. 16

Deployment Migration Public cloud platforms like Amazon Web Services (AWS) and Microsoft Azure are disruptive technology innovations that help businesses lower expenditures and stretch resources further with less infrastructure. But if businesses can t migrate efficiently, it limits their ability to leverage new technology platforms and increases the risk of getting locked into a platform. This brings security into question as vulnerabilities emerge due to the absence of periodic software patches. Sooner or later, businesses will be forced to migrate as the platforms they re on are sunsetted. By onboarding the necessary resources to perform efficient, non-disruptive migration, businesses can ensure the success of migration projects and thereby protect long-term agility and competitiveness. 17

The data protection sweet spot A blended approach to data protection with high availability combined with backup and non-disruptive data migration gives IT decision-makers confidence in their ability to mitigate disruptions, preserve historical data and maintain business agility. It also simplifies administrative tasks and allows IT staff to focus on strategic initiatives. Carbonite s complete Data Protection Platform enables businesses of any size and in any industry to deploy comprehensive protection for any physical, virtual, cloud, legacy or heterogeneous environment. Contact us to learn more. Phone: 877-542-8639 Email: DataProtectionSales@carbonite.com 1 Enterprise Strategy Group, Why and How Organizations Need to Align Business Priorities and Data Protection Strategies, April 2017. 18