Breakthrough Data Recovery for IBM AIX Environments

Similar documents
Achieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX

Achieving Rapid Data Recovery for Credit Union Core Processing Applications An Executive Overview of EchoStream for AIX

Real-time Protection for Microsoft Hyper-V

IBM TS7700 grid solutions for business continuity

Disaster Recovery Is A Business Strategy

IBM Resiliency Services:

arcserve r16.5 Hybrid data protection

Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments

Business Continuity and Disaster Recovery Workbook: All about Business Continuity and DR

Backups and archives: What s the scoop?

The 10 Disaster Planning Essentials For A Small Business Network

Introduction. Read on and learn some facts about backup and recovery that could protect your small business.

How to Protect Your Small or Midsized Business with Proven, Simple, and Affordable VMware Virtualization

Protecting Microsoft Hyper-V 3.0 Environments with Arcserve

The Nuances of Backup and Recovery Solutions

Step into the future. HP Storage Summit Converged storage for the next era of IT

WHITE PAPER. Header Title. Side Bar Copy. Header Title 5 Reasons to Consider Disaster Recovery as a Service for IBM i WHITEPAPER

High availability and disaster recovery with Microsoft, Citrix and HP

Evolved Backup and Recovery for the Enterprise

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc.

esureit Online Backup vs. Portable Media

The Microsoft Large Mailbox Vision

Module 4 STORAGE NETWORK BACKUP & RECOVERY

Balancing RTO, RPO, and budget. Table of Contents. White Paper Seven steps to disaster recovery nirvana for wholesale distributors

Veritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW

The Future of Business Continuity & Resiliency

Why the Threat of Downtime Should Be Keeping You Up at Night

TOP REASONS TO CHOOSE DELL EMC OVER VEEAM

THE STATE OF CLOUD & DATA PROTECTION 2018

Protecting VMware vsphere/esx Environments with Arcserve

RealTime. RealTime. Real risks. Data recovery now possible in minutes, not hours or days. A Vyant Technologies Product. Situation Analysis

Hitachi Adaptable Modular Storage and Workgroup Modular Storage

Hitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage

Protecting VMware vsphere/esx Environments with CA ARCserve

Roadmap to Availability

Backup vs. Business Continuity

A Practical Guide to Cost-Effective Disaster Recovery Planning

Berdon Ledger Shows Net Gains in Productivity, Scalability Due to Symantec Security and Data Protection Solutions

BUSINESS CONTINUITY: THE PROFIT SCENARIO

Repairing the Broken State of Data Protection

Using Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager

An Introduction to High Availability for Power Systems Running IBM i Get to know the core components of HA solutions and important installation

White Paper: Backup vs. Business Continuity. Backup vs. Business Continuity: Using RTO to Better Plan for Your Business

OL Connect Backup licenses

BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide

Symantec Business Continuity Solutions for Operational Risk Management

WHITE PAPER: ENTERPRISE SOLUTIONS

Introduction to Business continuity Planning

Transform Availability

What is Data Protection and Disaster Recovery?

MOVING TOWARDS ZERO DOWNTIME FOR WINTEL Caddy Tan 21 September Leaders Have Vision visionsolutions.com 1

A CommVault White Paper: Business Continuity: Architecture Design Guide

White paper. The three levels of high availability Balancing priorities and cost

Zero Data Loss Recovery Appliance DOAG Konferenz 2014, Nürnberg

KEYCLOUD BACKUP AND RECOVERY AS-A-SERVICE (BRAAS): A fully-managed backup and recovery solution for your mission critical data

Backup and Archiving for Office 365. White Paper

Integrated Data Management:

Protecting Miscrosoft Hyper-V Environments

ZYNSTRA TECHNICAL BRIEFING NOTE

Data Protection for Cisco HyperFlex with Veeam Availability Suite. Solution Overview Cisco Public

PRODUCT OVERVIEW. Storage and Backup. Flexible Scalable Storage Solutions for. Product Overview. Storage and Backup

Downtime Prevention Buyer s Guide. 6 QUESTIONS to help you choose the right availability protection for your applications

High Availability and Disaster Recovery Solutions for Perforce

Availability and the Always-on Enterprise: Why Backup is Dead

White Paper. Disaster Recovery in the Cloud

NON-RESTRICTIVE TECHNOLOGY. THE REBOOT TO RESTORE CONCEPT in Computer-based Businesses and Services

UNCLASSIFIED. Mimecast UK Archiving Service Description

Guide. A small business guide to data storage and backup

Rapid Recovery from Logical Corruption

WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY

Backup and Recovery Trends: How Businesses Are Benefiting from Data Protector

MAKING A COMEBACK: Everything You Need to Know About Backup and Disaster Recovery

PowerVault MD3 Storage Array Enterprise % Availability

ACHIEVING ENHANCED BUSINESS CONTINUITY USING BAKBONE NETVAULT : BACKUP AND NETAPP NEARSTORE

CA ARCserve Backup. Benefits. Overview. The CA Advantage

What can the OnBase Cloud do for you? lbmctech.com

Where s Your Third Copy?

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.

Backup and Restore Strategies

Virtualizing disaster recovery helps ensure business resiliency while cutting operating costs.

5 Things Small Businesses Need to Know About Disaster Recovery

Backup vs. Business Continuity: Using RTO to Better Plan for Your Business

The Data-Protection Playbook for All-flash Storage KEY CONSIDERATIONS FOR FLASH-OPTIMIZED DATA PROTECTION

Aras Innovator 11. Backup and Recovery Procedures

Copyright 2012 EMC Corporation. All rights reserved.

StoreVault and NetApp Snapshot Technology

ARC BRIEF. Application Downtime, Your Productivity Killer. Overview. Trends in Plant Application Adoption. By John Blanchard and Greg Gorbach

Protect enterprise data, achieve long-term data retention

Maximizing Availability With Hyper-Converged Infrastructure

The Data Protection Rule and Hybrid Cloud Backup

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery

Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability

Comprehensive Agentless Cloud Backup and Recovery for the Enterprise

Virtualizing disaster recovery using cloud computing

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies:

Disk-to-Disk-to-Tape (D2D2T)

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

Build a viable plan for disaster recovery and crisis management.

Meeting Today s Enterprise Storage Challenges: A Better Backup and Recovery Solution

Microsoft SQL Server on Stratus ftserver Systems

Transcription:

Breakthrough Data Recovery for IBM AIX Environments How New Technologies Are Making Data Protection, Recovery and High Availability Easier and More Affordable

Introduction Downtime and data loss pose intolerable risks to every business today. From IT departments to the Board Room, managers have seen the importance of business uptime and data protection to continued success, productivity and profitability. This white paper will provide a road map to the most effective strategies and technologies to protect data and provide fast recovery should data be lost or corrupted due to accident or malicious action. Planning for recovery designing and implementing a solution to reduce the amount of recovery time needed after an interruption is a pressing requirement for businesses of all sizes. In implementing an operational plan that ensures that both data and applications can be recovered quickly, IT managers are generally confronted with several challenges: How can I ensure my applications and data are recoverable without impacting business operations? Do I have data protection strategies available to me that meet my recovery point and recovery time objectives? Can I afford to implement a comprehensive plan that covers both local and remote (disaster) recovery requirements? Are there cost-effective alternatives that meet my requirements? Bottom Line: Businesses face a variety of risks to their data such as accidentally deleted files, data corruption from viruses or hacker attacks, software/hardware failures, power outages or any of a wide range of natural disasters. Business and IT managers need a data protection and recovery strategy that keeps the organization s business doing business. For AIX IT departments, this is a high priority. 1 visionsolutions.com

Tape Backups: First Line of Defense If you re like most businesses, you re using some form of data protection today probably tape-based backup. Periodically, someone shuts applications down to perform a backup to tape. Depending on the volume of data that is being copied, this may take several hours and requires manual intervention to set up the backup job, run it, confirm that it occurred, and then return the application to operation. The backup copy may be kept locally in case data needs to be recovered in the near term, and eventually it may be moved to an offsite location for archival storage purposes. The reason to make and keep copies of your data is so that, in the event of some sort of event or catastrophe that deletes or destroys data, you have a clean copy safely tucked away to use for recovery purposes. Tape is used for backup and archive because it is very inexpensive, but it is an old technology that has been available almost since the dawn of computing. There are several issues with tape-based backup: Tape-based backup is a time-intensive process that is potentially disruptive to your applications; this issue is commonly referred to as the backup window problem. Because of its impact on applications and resources, tape-based backups are usually not performed more than once a day, and often only once every several days, meaning that there are very few tape-based recovery points available for use over the course of a week. Because your data is changing very frequently (on the order of seconds or minutes), fewer recovery points mean you are risking the loss of large amounts of current data for a given recovery. Once it is clear that a recovery needs to occur, it takes time to perform recovery tasks including locating the correct tape, transporting it (if it s offsite), restoring it to disk and restarting the application with the recovered data. As a storage media for backup, tape is not entirely reliable; in fact, leading analyst groups such as the Gartner Group, the Enterprise Strategy Group and the Taneja Group state that as many as 1 in 4 backup tapes suffer from some sort of problem that precludes performing a recovery Tape-only backups are no longer a feasible data protection strategy in today s business environment. Transporting tapes to offsite facilities for archival purposes also has inherent risks. Recently publicized tape losses during physical transport (by truck) have hit large companies like Bank of America, Citigroup Inc., ChoicePoint Inc. and LexisNexis in the U.S. and resulted in the loss of hundreds of thousands of company records. Replication of data across secure IP-based networks is a much faster, easier and safer way to transport data to offsite locations for archival storage purposes. If you are driven by either business or regulatory requirements to deploy a disaster recovery solution, a pure tape-based strategy can subject you to undue risk. As all of these issues illustrate, tape-only backups are no longer a feasible data protection strategy in business environments that require frequent access and updates to critical business data. The two most important metrics for determining the optimal capabilities of any data protection strategy are the recovery point objective (RPO) and recovery time objective (RTO). 2 visionsolutions.com

Most restore requests are driven by issues such as an inadvertently deleted file or data corruption that is introduced by a virus or a hacker. Recovery Time Objective (RTO). RTO defines how quickly you need to restore data and applications and have them fully functional again. The faster your RTO requirement, the closer you move to zero interruption in uptime and the highest level of data protection. Recovery Point Objective (RPO). RPO defines the point at which the business absolutely cannot afford to lose data. It points to a place in each data stream where information must be available to put the data back in operation. Again, the closer you come to zero data loss and real-time access, the more continuous protection of data will be required. Pinpoint the Most Valuable Data for Your Business It has been proven over time that most data recovery requests are for relatively recent data, and that there is a direct correlation between the age of data and the possibility that it would be required for restore purposes. Most restore requests are driven by issues such as an inadvertently deleted file or data corruption that is introduced by a virus or a hacker. Typically these problems are discovered within several hours or at most a few days from when they first occur, resulting in restore requests for more recent data. In general, the only time you may need to restore data that has already been archived would be in the event of a disaster that physically destroys computer equipment and facilities, such as an earthquake or a tornado. While it pays to be prepared against these occurrences, they are very rare. The slope of the orange line in Figure 1 varies by company type, but it reflects the general relationship in all industries between the age of data and the chance that it would need to be restored. The Correlation Between Data Age and Possibility of Re-Use/Restore Data Reference Patterns Online (ms) 100% References decline as data ages. Data is being kept for longer periods of time. Retrieval activity The percent of total data deleted is declining. 50% TCO encourages migration Nearline of less active data. (sec) 0% Amount of data Archival/deletion (sec/mins) 1 3 7 15 30 60 90 Days since creation Source: Harison Information Strategies Figure 1. As data ages, it it less likely to be the focus of a restore request. Another key factor to note is that as data ages, it becomes less important to support the ability to restore to any point in time. Note the inflection point in the orange line in Figure 1 that occurs around Day 3. Restore requests for data drop off significantly after that point. 3 visionsolutions.com

Matching Business Needs to Data Protection and Recovery Solutions How do you best meet the data recovery requirements of each system in your organization and achieve the optimum RTO and RPO appropriate for your organization? Some organizations, or some particularly critical information within an organization, may require an exceptionally fast level of recoverability. You may have different RTOs and RPOs for different types of business critical information. For example, a supply chain application that feeds a production plant may require a recovery time of only a few minutes with very minimal data loss. A payroll system that is updated weekly with only a few records may only require a recovery time of 12 hours and a recovery point of 24 hours or more before the impact will affect the business. Any data protection strategy must ensure that information remains as accessible and available as needed to continue to drive revenue, profitability and productivity at acceptable levels no matter what planned or unplanned events occur. The data protection solution you choose should: Protect your data to a level that meets your business requirements and RTO and RPOs. Manage business uptime as automatically as possible to streamline operations and save time. Assure the integrity and quality of your data during interruptions and when it returns to full operations. Continuous Data Protection (CDP): A Breakthrough Innovation CDP technology does not require the interruption of applications to perform backups. It works continuously to back up your critical data to an alternate server so you can immediately recover data from any point in time. The goods news for businesses is that the technology for data protection is easier and more effective than ever before. Innovations have kept pace with the need to provide comprehensive data protection and make data recovery a quick and easy process. Perhaps the most exciting recent innovation in this area is the introduction of continuous data protection, or CDP. CDP is a flexible disk-based technology that enables businesses to quickly and easily recover their data to any point in time. For example, it s not uncommon for a user to accidentally delete a critical file. Or for a virus to corrupt business data. These actions render the data unusable, even though the server or other hardware resources continue to work as expected. CDP enables you to recover a version of your data to a point in time just prior to the accidental deletion or virus corruption. This earlier version of the data can then be restored to the production environment. Unlike tape backups, CDP technology does not require the interruption of applications to perform backups. It works continuously to back up your critical data to an alternate server so you can immediately recover data from any point in time. If you accidentally delete an important document or experience data corruption due to a virus or hacker attack, you could return to the point in time just before the problem occurred. Recovery occurs immediately with just the push of a button. Recovery for much larger amounts of data takes only minutes as shown in Figure 2. With CDP, both data protection and data recovery occur with only a fraction of the time and labor resources required by a tape-only strategy. It also eliminates the threat of major data loss posed by the infrequent recovery points of a tape-only strategy. 4 visionsolutions.com

By 2011, some form of CDP will be deployed in 80 percent of the Fortune 2000. Gartner Continuous Data Protection incorporates several techniques from traditional backup, replication and snapshot solutions. How the CDP solution achieves its goals has much to do with its architecture and how it s configured. It s important to note the difference between True CDP and Near CDP solutions when evaluating your data protection strategy. True CDP True CDP captures every data write and transfers them to a secondary disk. True CDP enables a data undo by allowing recovery to any point in time. This is especially beneficial for a data corruption issue, such as a virus. With true CDP, you can identify a tainted email, for example, then roll back to a point just prior to the time the email was received. Near CDP Near-CDP differs from True-CDP in that you can CDP Recovery Review & Roll back from Historical View Apply Roll Back to Production Server Rebuild Volumes Apply Archive Logs Resynchronize Volumes Apply Archive Logs Restore Data Files from Tape Apply Archive Logs Hours 20 15 10 5 0 Recovery Time for 1 TB of Data Recovery from Local Copy Recovery from Offsite Copy Recovery from Tape only recover to specific points in time. For example, near-cdp will copy data when a file is saved or closed so the recovery point is only to the last known saved file. In some cases this could be several hours or more. In high transaction environments or environments with rigid compliance or governance regulations, this may not be sufficient. CDP Local Offsite Tape 20 Min 3 Hrs 9 Hrs 17 Hrs Figure 2. CDP offers significant savings in recovery time that can translate directly to cost savings. The efficiencies and flexibility of CDP translate into much superior data protection and recovery, as well as cost savings realized through the elimination of both planned downtime for backups and lengthy, error-prone tape recovery processes. Any Point-in-Time Data Recovery plus High Availability High availability solutions are especially useful for data protection because they provide the power to keep your applications operating continuously, regardless of planned or unplanned downtime. HA solutions replicate your production environment to a backup server in real-time, and enable you to switch operations to the backup in the event of downtime. With recent innovations in automation and ease of use, they require little management or intervention to remain effective around the clock. 5 visionsolutions.com

But in certain data corruption situations, high availability solutions could use some help. Because HA solutions replicate data in real time to a backup server, they also replicate the data corruption to the backup environment. Options for recovering data that was accidentally deleted or corrupted run the spectrum from manually re-entering the work to utilizing advanced database technologies, such as journaling or logging, and generally require a tape restore. However, when high availability is combined with CDP the issue of data corruption is no longer a problem. CDP enables you to simply return to any point in time previous to the corruption for instant recovery. The combination of HA and CDP provides seamless protection against data loss, data corruption and any type of IT or application downtime. A high availability solution with built-in CDP capabilities is currently the state-of-the-art for data protection and recovery. CDP Solutions for AIX, from Vision Solutions All the benefits of continuous data protection are now available for businesses running on IBM System p servers. Affordable and easy to use, these innovative solutions from Vision Solutions make data protection and recovery for AIX faster, more reliable and more efficient than ever before. Continuous Data Protection for AIX provides true continuous data protection for nearly instantaneous recovery of your applications and data at the push of a button. Unlike traditional backup solutions, it enables you to recover data from any point in time, easily and immediately. So when your business encounters accidental or malicious data corruption you can reverse the damage and continue on. Use it to make your data more secure, as a cost-effective business continuity and disaster recovery strategy. Dial back to quickly and easily return any application or database to any previous point in time. Recover large amounts of data in only minutes. Reverse data corruption in a fraction of the time/labor required for recovery from tape. Eliminate the exposure to major data loss of conventional backup and restore technologies. Achieve your recovery point objectives (RPOs) and recovery time objectives (RTOs) simply and affordably. Get reliable disaster recovery by replicating your data to a remote location. Continuous Data Protection and High Availability for AIX keeps your critical applications and data up and running no matter what happens. It eliminates both unexpected IT outages and the planned downtime required for routine system maintenance. Plus, with powerful clustering, replication and true continuous data protection (CDP) capabilities you can immediately roll back your production environment to any point in time for an instant fix to accidental or malicious data corruption. It s the easy, automated way to ensure your business continuity. 6 visionsolutions.com

The definitive solution for recovery from data corruption issues, providing the widest range of available recovery points. Boost productivity and accelerate your business processes. Ensure business continuity for your customers, partners and employees. Eliminate the IT costs and business consequences of system downtime. Perform maintenance, upgrades and test new applications with no interruptions to business operations. Easy, affordable and innovative solution for local and remote recovery that addresses high availability, disaster recovery and compliance requirements. Conclusion For businesses looking to take the next step in their data protection strategies, CDP is an essential consideration. Most IT analysts agree that businesses will be incorporating this strategy in the next few years as part of an integrated solution. CDP enables you to reverse data corruption in a fraction of the time and labor required for recovery from tape. It doesn t require planned downtime for backups and recovers data instantly at the push of a button. Whether as a standalone solution or integrated into an HA solution, CDP provides the easiest and most effective protection against the loss of critical business data. Easy. Affordable. Innovative. Vision Solutions. Vision Solutions, Inc. is the world s leading provider of high availability, disaster recovery, and data management solutions for the IBM System p market. With a portfolio that spans the industry s most innovative and trusted HA brands, Vision s itera, MIMIX, and ORION solutions keep business-critical information continuously protected and available. Affordable and easy to use, Vision products help to ensure business continuity, increase productivity, reduce operating costs, and satisfy compliance requirements. Vision also offers advanced cluster management, data management, and systems management solutions, and provides support for AIX, i5/os and Windows operating environments. As IBM s largest high availability Premier Business Partner, Vision Solutions oversees a global network of business partners and services and certified support professionals to help our customers achieve their business goals. Privately held by Thoma Cressey Bravo, Inc., Vision Solutions is headquartered in Irvine, California with offices worldwide. For more information call 801-799-0300 or toll free at 800-957-4511, or visit visionsolutions.com. itera HA MIMIX HA ORION HA 17911 Von Karman Avenue, Suite 500 Irvine, CA 92614 800-957-4511 801-799-0300 visionsolutions.com Copyright 2007, Vision Solutions, Inc. All rights reserved. IBM and System i are trademarks of International Business Machines Corporation. WP_AIXBreakthrough_E_0712