Where s Your Third Copy?

Similar documents
Business Continuity and Disaster Recovery. Ed Crowley Ch 12

ZYNSTRA TECHNICAL BRIEFING NOTE

Table of Contents. Introduction 3

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc.

arcserve r16.5 Hybrid data protection

A Practical Guide to Cost-Effective Disaster Recovery Planning

How to license Oracle Database programs in DR environments

Igneous Unstructured Data Management

Microsoft SQL AlwaysOn and High Availability

Data Replication Whitepaper

Breakthrough Data Recovery for IBM AIX Environments

HP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version :

Replication is the process of creating an

In this unit we are going to review a set of computer protection measures also known as countermeasures.

What is Data Protection and Disaster Recovery?

Virtual protection gets real

An Oracle White Paper May Oracle VM 3: Overview of Disaster Recovery Solutions

Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability

The Microsoft Large Mailbox Vision

Rio-2 Hybrid Backup Server

Welcome! Considering a Warm Disaster Recovery Site?

Don t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud

Dell DR4000 Replication Overview

Building Backup-to-Disk and Disaster Recovery Solutions with the ReadyDATA 5200

Virtualization with Protection for SMBs Using the ReadyDATA 5200

CLOUDALLY EBOOK. Best Practices for Business Continuity

What to Look for in a DRaaS Solution

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies:

5 Things Small Businesses Need to Know About Disaster Recovery

Microsoft SQL AlwaysOn and High Availability

What's in this guide... 4 Documents related to NetBackup in highly available environments... 5

Disaster Recovery Options

Arcserve Unified Data Protection Virtualization Solution Brief

High Availability and Disaster Recovery Solutions for Perforce

Why Continuity Matters

Controlling Costs and Driving Agility in the Datacenter

Data Protection for Cisco HyperFlex with Veeam Availability Suite. Solution Overview Cisco Public

Chapter 2 CommVault Data Management Concepts

Disaster Unpreparedness June 3, 2013

SAN for Business Continuity

Copyright 2010 EMC Corporation. Do not Copy - All Rights Reserved.

Step into the future. HP Storage Summit Converged storage for the next era of IT

Chapter 3 `How a Storage Policy Works

Guide. A small business guide to data storage and backup

COMPLETE ONLINE MICROSOFT SQL SERVER DATA PROTECTION

Data Protection in a Nutshell

Virtual Disaster Recovery

Advanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER

How to blend backup and high availability

VERITAS Volume Replicator. Successful Replication and Disaster Recovery

Using QNAP Local and Remote Snapshot To Fully Protect Your Data

DISASTER RECOVERY IN AN EMC DISKXTENDER FOR WINDOWS ENVIRONMENT

Glossary of Terms Used in Actifio Products

IBM TS7700 grid solutions for business continuity

SAP HANA Disaster Recovery with Asynchronous Storage Replication

Hitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM

The Actifio Glossary A B C D E F G H I-K L M N-O P-Q R S T U V W-Z

Asigra Cloud Backup Provides Comprehensive Virtual Machine Data Protection Including Replication

Aras Innovator 11. Backup and Recovery Procedures


Achieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX

Protect enterprise data, achieve long-term data retention

VMware Backup and Replication Enterprise Edition

White Paper. How to select a cloud disaster recovery method that meets your requirements.

MAKING A COMEBACK: Everything You Need to Know About Backup and Disaster Recovery

Bullet Proof. Dimension Technology Solutions, Inc. Methodologies and Practice Concerning. Monitoring, Backups and Recovery

The Nuances of Backup and Recovery Solutions

FOUR WAYS TO LOWER THE COST OF REPLICATION

White paper ETERNUS CS800 Data Deduplication Background

All about the New Vembu BDR Suite v3.9

C H A P T E R Overview Figure 1-1 What is Disaster Recovery as a Service?

HYCU and ExaGrid Hyper-converged Backup for Nutanix

BUSINESS CONTINUITY: THE PROFIT SCENARIO

Database Tables to Storage Bits: Data Protection Best Practices for Oracle Database

Zero Data Loss Recovery Appliance DOAG Konferenz 2014, Nürnberg

How to Protect Your Small or Midsized Business with Proven, Simple, and Affordable VMware Virtualization

Migration and Building of Data Centers in IBM SoftLayer

Disk-Based Data Protection Architecture Comparisons

Dell Fluid Data solutions. Powerful self-optimized enterprise storage. Dell Compellent Storage Center: Designed for business results

USING ARTIFACTORY TO MANAGE BINARIES ACROSS MULTI-SITE TOPOLOGIES

Microsoft SQL Server

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM

Why SaaS isn t Backup

ECE Enterprise Storage Architecture. Fall 2018

An Introduction to Business Disaster Recovery

Catalogic DPX: Backup Done Right

Opendedupe & Veritas NetBackup ARCHITECTURE OVERVIEW AND USE CASES

Branch Office Data Consolidation

DELL EMC UNITY: REPLICATION TECHNOLOGIES

Availability for the modern datacentre Veeam Availability Suite v9.5

Module 4 STORAGE NETWORK BACKUP & RECOVERY

EMC DiskXtender for Windows and EMC RecoverPoint Interoperability

Transactional Replication New Features for AlwaysOn AG in SQL Henry Weng Premier Field Engineer SQL Server & AI

AlwaysOn Availability Groups: Backups, Restores, and CHECKDB

Copyright 2012 EMC Corporation. All rights reserved.

Benefits of Multi-Node Scale-out Clusters running NetApp Clustered Data ONTAP. Silverton Consulting, Inc. StorInt Briefing

Go From Backup Pain to Gain Keys to Better Backup and Disaster Recovery in a Virtual World

InterSystems High Availability Solutions

Transcription:

Where s Your Third Copy? Protecting Unstructured Data 1 Protecting Unstructured Data

Introduction As more organizations put their critical data on NAS systems, a complete, well thought out data protection strategy is critical. Data is constantly at risk from corruption as well as accidental, erroneous, or malicious updates and deletions. In a recent survey, 65% of companies reported lost productivity due to data loss or outages suggesting that current protection efforts are inadequate. Traditional data protection strategies, though essential, are insufficient in completely protecting an organization s NAS data. Companies that are looking for more than hope-as-a-strategy are implementing third (or even fourth) data copy strategies to give them the best chance of recovering from data loss and corruption. 2 Protecting Unstructured Data

Your NAS Protection Strategy You can think of NAS data protection strategies as layers of protection. Each layer provides a copy of data which can be used to restore availability should the worst happen. And each layer also provides for different Recovery Point Objectives and Recovery Time Objectives as well as different recovery scopes ranging from individual bits of data, or files, to complete data sets. These data protection strategies typically consist of local copies (RAID, Snapshots, Local Backups) and off-site copies (replicated copies and synchronized copies). 3 Protecting Unstructured Data

Your NAS Protection Strategy Beyond the production copy, a typical strategy is to regularly copy data to a secondary system in an offsite facility. From this system, data can be restored or the users and applications can be redirected to that secondary system if the production system Data outage costs run at over $300K/hr becomes unavailable or its data unusable. But for most organizations, loss of data from their primary and Distaster Recovery (DR) site means a complete loss. Even if they can restore from an off-site tape, it could be days or weeks later, creating a substantial business impact given that average data outage costs run at over $300K/hr. 4 Protecting Unstructured Data

What s Special About NAS? While replicating block data is relatively straightforward simply copy raw blocks from one system to another with no need for an understanding of the actual data or how it is used, structured or controlled the replication of NAS data is far more complicated. X With NAS storage, beyond just having a copy of the actual data, the remote site must also contain a regular mirror of the file system structure, the shares and exports required for end user and application access, and all permissions (NFS and/or SMB) that control file access. Without all this information applied, it would be nearly impossible to have a secondary or tertiary NAS system take over the responsibility of serving data to end users and applications when the source data becomes unusable. 5 Protecting Unstructured Data

The Limits of Backup and In-Family Replication Although many organizations protect their NAS data with local copies and implement in-family off-site replication, data still remains at risk due to the inherent limitations of data protection strategies. 6 Protecting Unstructured Data

The Limits of Backup and In-Family Replication Local Copies Typically local copies of data used in a data protection scheme fall into two categories: Snapshots offer near instant recovery but are very expensive as they consume local disk storage space for each copy created, so relatively few copies are kept meaning limited options in terms of historical copies. Backups take far longer to recover and present an extended outage event as data must be restored to the NAS platform from a different storage media such as another disk system or tape. Both of these solutions create point-in-time copies which is ideal, but recovery depends on a valid copy being available which may not be the case as both snapshot and backup copies are expensive to maintain and will be aged out and discarded over time. In addition, both solutions are vulnerable to a single site loss or outage. 7 Protecting Unstructured Data

The Limits of Backup and In-Family Replication Off-Site Copies In-family replication solutions provide the ability to instantly failover to a replica in case the production data system is unavailable or its data unusable this solves the issue of a loss of the primary production site. But, the very nature of this replication process, while solving the site loss issue, introduces a new risk: the remote copies are typically not point-in-time copies but ones that are constantly updated. The very nature of this replication process introduces a new risk This means that if corruption or an accidental or malicious update or deletion takes place on the source system, it is quite likely going to immediately propagate to the off-site target, making the copy of no value in a recovery effort. 8 Protecting Unstructured Data

Where s Your Third Copy? Every organization should have a NAS protection strategy that includes not only local and in-family replication options but also a third copy of data. There are two distinct replication strategies to be considered, and potentially both implemented, depending on your requirements: Replicating to a NAS platform at the tertiary site which exactly mirrors the production system. This allows the replicated environment to be used to fill in for the production system should the need arise. Ideally the tertiary site would exist in a bunker or behind an air-gap (a break in the network that only allows full access during a replication window). Syncing a copy of data is a point-in-time Golden Copy of the data that may never be updated or is updated very infrequently. This allows for data to be restored at a point time before corruption or unwanted updates took place. Syncing can use another NAS or the Cloud as a target. 9 Protecting Unstructured Data

The Datadobi Solution Datadobi has created two unique solutions to address heterogenous off-site NAS data copy needs. In addition to many other benefits, both allow for controlled granular copy and restore, giving companies full control over what data they replicate. Replicating all data as well as file system structure, shares and exports required for end user and application access, and all permissions that control file access to another NAS typically behind an air-gapped environment in a bunker site. This enables users to be failed-over to their third copy environment. A Golden Copy of data on another NAS or in the Cloud. This keeps a point-in-time version of the data so a restore can be done at a time before corruption can take place. 10 Protecting Unstructured Data

The Datadobi Solution Product Benefits Purpose-built to successfully carry out the data copy tasks with the greatest flexibility, including heterogeneous targets and scheduled replication Ability to plan and design the data copy process within the same solution that will execute it All aspects of data copy execution and recovery is managed from a single pane of glass Provide real-time monitoring and easily consumed, on-demand and automated reports Can perform discovery and analysis to provide a clear picture of the source and target systems data Natively store and retrieve/restore data from a cloud repository Execute a failover to a target system automatically with full management and outcome tracking of the process Execute a failback to a target system automatically with full management and outcome tracking of the process Compare All Product Benefits 11 Protecting Unstructured Data

Conclusion When considering implementing the use of off-site data copies as part of your overall data protection and availability strategies, it is crucial to understand that while a secondary copy of data eliminates some risk, the need for at least a tertiary copy is vital to protect an organizations critical data and to maintain business continuity. Implementing a tertiary copy should be simple, fast, cost-effective, and above all reliable. However, due to the disparity between NAS platforms and the complexity of keeping that data syncronized, without proper tools and methodology, you will likely encounter numerous challenges. Datadobi has created purpose-built solutions for the needs of heterogeneous data replication and syncing. 12 Protecting Unstructured Data

Protect Your Unstructured Data Now Contact Datadobi today to learn more about how we can help with your company s data copy and off-site protection efforts: info@datadobi.com June 2018. Copyright Datadobi, all rights reserved.