White. Paper. Symantec Backup Exec Addressing the Root Causes of Inefficiency in Data Protection. January, By Lauren Whitehouse

Similar documents
Market Report. Scale-out 2.0: Simple, Scalable, Services- Oriented Storage. Scale-out Storage Meets the Enterprise. June 2010.

i365 EVault for Microsoft System Center Data Protection Manager Date: October 2010 Authors: Ginny Roth, Lab Engineer, and Tony Palmer, Senior Engineer

Lab Validation Report

Lab Validation Report

Analyzing the Economic Benefits of Datrium Cloud DVX

Technology Insight Series

Protect enterprise data, achieve long-term data retention

Efficient Data Center Virtualization Requires All-flash Storage

WHITE PAPER. Controlling Storage Costs with Oracle Database 11g. By Brian Babineau With Bill Lundell. February, 2008

Video Surveillance Solutions from EMC and Brocade: Scalable and Future-proof

LAB VALIDATION REPORT

Lab Validation Report

Enabling Hybrid Cloud Transformation

Data Domain OpenStorage Primer

Symantec NetBackup 7 for VMware

Managing Data Growth and Storage with Backup Exec 2012

De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid

EMC DATA DOMAIN PRODUCT OvERvIEW

1 Quantum Corporation 1

Hyperconverged Infrastructure: Cost-effectively Simplifying IT to Improve Business Agility at Scale

ESG FIELD AUDIT. Asigra Hybrid Cloud Backup and Recovery Solutions. By Brian Garrett With Tony Palmer. May, 2009

DEDUPLICATION BASICS

Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments

WHITE PAPER: ENTERPRISE SOLUTIONS. Disk-Based Data Protection Achieving Faster Backups and Restores and Reducing Backup Windows

OPTIMISATION DE VOTRE SAUVEGARDE. Daniel De Prezzo Technical Sales & Services Presales Manager Symantec

Lab Validation Report

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.

Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution

Disk-based Backup with Data De-duplication

Always Available Dell Storage SC Series Date: October 2015 Author: Brian Garrett, VP ESG Lab

Analyzing the Economic Benefits of the HPE SimpliVity 380 All-flash Hyperconverged Portfolio

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Backup and Recovery: New Strategies Drive Disk-Based Solutions

Balakrishnan Nair. Senior Technology Consultant Back Up & Recovery Systems South Gulf. Copyright 2011 EMC Corporation. All rights reserved.

Business Benefits of Policy Based Data De-Duplication Data Footprint Reduction with Quality of Service (QoS) for Data Protection

Aligning Backup, Recovery and Archive

(TBD GB/hour) was validated by ESG Lab

WHY DO I NEED FALCONSTOR OPTIMIZED BACKUP & DEDUPLICATION?

EMC DATA DOMAIN OPERATING SYSTEM

Best Practices in Cloud-powered Data Protection

Copyright 2010 EMC Corporation. Do not Copy - All Rights Reserved.

Abstract: Data Protection Cloud Strategies

The Ultimate Guide for Virtual Server Protection

BACKUP AND RECOVERY OF A HIGHLY VIRTUALIZED ENVIRONMENT

A Candid Examination of Data Deduplication

Preserving the World s Most Important Data. Yours. SYSTEMS AT-A-GLANCE: KEY FEATURES AND BENEFITS

Simplify Backups. Dell PowerVault DL2000 Family

White. Paper. The Evolution of IP Storage and Its Impact on the Network. December 2014

White. Paper. Running Oracle on EMC. October, This ESG White Paper was commissioned by EMC and is distributed under license from ESG.

Veritas Resiliency Platform: The Moniker Is New, but the Pedigree Is Solid

Lab Validation Report

White. Paper. The Application Deluge and Visibility Imperative. How to Ensure Network Performance for Your Business-critical Applications.

Accelerate the Journey to 100% Virtualization with EMC Backup and Recovery. Copyright 2010 EMC Corporation. All rights reserved.

Veritas Storage Foundation for Oracle RAC from Symantec

15-MINUTE GUIDE. SMARTER BACKUP Transform your future

Who Better than Dell EMC to Offer Best-for-VMware Data Protection?

Abstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight

NetApp Clustered Data ONTAP 8.2 Storage QoS Date: June 2013 Author: Tony Palmer, Senior Lab Analyst

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

White. Paper. EMC Isilon Scale-out Without Compromise. July, 2012

A Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist

HP StorageWorks D2D Backup Systems and StoreOnce

Virtualizing disaster recovery helps ensure business resiliency while cutting operating costs.

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM

Symantec Backup Exec Blueprints

IBM Data Protection for Virtual Environments: Extending IBM Spectrum Protect Solutions to VMware and Hyper-V Environments

Tape Sucks for Long-Term Retention Time to Move to the Cloud. How Cloud is Transforming Legacy Data Strategies

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery

FOUR WAYS TO LOWER THE COST OF REPLICATION

Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures

Oracle s Engineered Systems Approach to Maximizing Database Protection

Reducing Costs in the Data Center Comparing Costs and Benefits of Leading Data Protection Technologies

The case for cloud-based data backup

IBM Data Protection for Virtual Environments:

The Data Protection Rule and Hybrid Cloud Backup

Global Headquarters: 5 Speen Street Framingham, MA USA P F

VMAX3: Adaptable Enterprise Resiliency

HYCU and ExaGrid Hyper-converged Backup for Nutanix

HPE SimpliVity Hyperconverged Infrastructure for VDI Environments

Zero Branch IT with Riverbed SteelFusion

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM

HP StoreOnce: reinventing data deduplication

IBM System Storage Data Protection and Security Chen Chee Khye ATS Storage

Symantec Backup Exec Blueprints

The Expanding Role of Backup and Recovery in the Hybrid Enterprise

Dell PowerVault DL2100 Powered by CommVault

A Roadmap for BYOD Adoption. By Jon Oltsik, Sr. Principal Analyst, and Bob Laliberte, Sr. Analyst

Evaluator Group Inc. Executive Editor: Randy Kerns

VMWARE PROTECTION WITH DELL EMC NETWORKER 9

50 TB. Traditional Storage + Data Protection Architecture. StorSimple Cloud-integrated Storage. Traditional CapEx: $375K Support: $75K per Year

Exam : Title : Administration of Symantec Backup Exec 12 for Windows Server. Version : Demo

Archive 7.0 for File Systems and NAS

Using Self-Protecting Storage to Lower Backup TCO

How Symantec Backup solution helps you to recover from disasters?

Flash Storage-based Data Protection with HPE

INTRODUCING VERITAS BACKUP EXEC SUITE

Symantec NetBackup Appliances: Key Considerations in Modernizing Your Backup and Deduplication Solutions. Directors of IT and IT Managers

Continuous data protection. PowerVault DL Backup to Disk Appliance

THE FOUR STEPS TO A TAPELESS BACKUP ENVIRONMENT: YOUR HOW-TO GUIDE FOR DATA MANAGEMENT SUCCESS INTRODUCTION

Combining HP StoreOnce and HP StoreEver Tape

Transcription:

White Paper Symantec Backup Exec 2010 Addressing the Root Causes of Inefficiency in Data Protection By Lauren Whitehouse January, 2010 2010, Enterprise Strategy Group, Inc. All Rights Reserved

Root Causes of Inefficiency in Data Protection 2 Contents Introductionn... 3 Root Causess of Storage Inefficiency... 3 Contributing Factors... 3 Addressing the Problem Without Optimization... 5 Storage Optimization... 5 Deduplication... 6 Archiving... 6 Backup Exec 2010... 7 Deduplication... 7 Archiving... 7 The Bigger Truth... 8 All trademark names are property of their respectivee companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of the Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at (508) 482-0188. This ESG White Paper was developed with the assistance and funding of Symantec.

Introduction White Paper: Symantec Backup Exec 2010: Addressing the Root Causes of Inefficiency in Data Protection 3 The continued upward trending of data growth, spending cuts driven by current economic factors, and pressure to meet increasingly inflexible service level agreements (SLAs) continue to beleaguer IT organizations. With data protection processes, IT is challenged to deliver cost and time savings while maintaining or improving backup and recovery SLAs an especially difficult task considering that ESG research respondents cited data protection as the application most responsiblee for storage growth over the next 24 months. 1 Such overabundance of data is often the result of a lack of policies focused on data retention and destruction. That s where Symantec Backup Exec 20100 comes in: one of the major themes associated with its introduction is storage optimization. In addition to the efficiency benefits of reducing capacity requirements for primary disk storage via integrated archiving, Backup Exec 2010 also includes block level data deduplication to eliminate redundancy in data protection processes. The combination of these features introduces capital and operational cost savings, greater operational efficiency, and improved SLAs. Root Causes of Storage Inefficiency Contributing Factors Data growth and poor data lifecycle management are two of the root causes of the storage capacity, bandwidth, and operational inefficiencies in IT. Many mid market organizatios are experiencing double digit ESG research found thatt 34% of data growth, making it difficult to keep pace with management, storage, and data protection. survey respondents report annual growth rates in the 11 20% range and 23% expect 21 30% percent growth per year. Still another 23% believe their storage capacity is growing at over 30% (see Figure 1). 2 Figure 1. The Data Growth Burden At approximately what rate do you believe your total amount of data storage is growing? (Percent of respondents, N=516) 40% 35% 34% 30% 25% 20% 18% 23% 15% 10% 5% 0% 1% to 10% 11% to 20% 21% to 30% Growth rates for primary storage directly impact the data protection environment. As the volume of primary data expands, so tooo does the amount of time it takes to make backup copies. For many organizations, the window of time to perform daily backup jobs is under pressure from the 24/7 nature of today s businesses. Many organizations struggle to complete backups within the prescribed off peak time period so that the process doesn t impact production workloads. 9% 31% to 40% 5% 41% to 50% 9% More than 50% 1% Don' t know Source: Enterprise Strategy Group, 2008 1 Source: ESG Research Report, Enterprise Storage Survey, December 2008. 2 Source: ESG Research Report, Medium Size Business Server and Storage Priorities, June 2008.

Root Causes of Inefficiency in Data Protection 4 The storage capacity glut is often exacerbated by dataa protection processes which retain multiple copies for data recovery purposes. Often, daily, weekly, and monthly copies are maintained both on and off premises. In many cases, duplicate data residing on multiple systems is backed up and replicated. Unchecked, the volume of backup data can easily exceed that of primary data. The lack of corporate governance regarding the retention and destruction of data further contributes to the problem. An overwhelming majority of corporate data is unchanging and infrequently accessed, yet is often maintained on premium data center real estate and is afforded the most stringent data protection policies perpetually even though its usage pattern has changed (and copies of the same data exist in several places). Not only does this persistent data create ongoing capacity requirements and a drag on production systems performance, it causes backup congestion and network bottlenecks. The result? Managing and protecting increasing volumes of data oftentimes with the same or less IT staff is constraining IT s ability to meet business needs. ESG research found that respondents were most challenged with keeping pace with the capacity of data to protect, followed by backup window issues and storage costs (see Figure 2). 3 Figure 2. Data Protection Challenges Which of the following would you characterize as the primary challenge with your organization's current data protection processes and technologies? (Percent of respondents, N=398) Keeping pace with capacity of data to protect Need to reduce backup times 13% 14% Cost of storage systems 11% Need to improve recovery reliability Need to improve backup reliability 8% 8% Meeting regulatory compliance requirements Difficult to validate backup/recovery success Need to reduce recovery times Limited or no ability to classify data for data protection purposes Searching for data across backups 4% 4% 7% 7% 7% Unacceptable level of data loss Tape media management 3% 3% 0% 2% 4% 6% 8% 10% 12% 14% 16% Source: Enterprise Strategy Group, 2008 3 Source: ESG Research Report, Data Protection Market Trends, January 2008.

Root Causes of Inefficiency in Data Protection 5 What s at risk? Service level agreements (SLAs) negotiated between IT and its business constituents regarding data recovery time and recovery point objectives (RTOs and RPOs) become difficult to meet. Costs rise for storage capacity, network bandwidth, and data center environmentals such as power and cooling. There can also be operational consequences as more manpower is required to protect and manage workloads. Addressing the Problem Without Optimization IT organizations often respond by treating symptoms instead of dealing with root causes. Making continual investments in infrastructure to support annual growth, such as ongoing primary and secondary storage capacity purchases, is just one of many IT band aids. To deal with backup windoww pressure, many organizations insert disk in the backup data path. This greatly improves the performance and reliability of backup and recovery processes when compared to a backup to tape reducing operator intervention for tape handling and troubleshooting. However, adding more infrastructure in perpetuity results in higher (and ongoing) costs. The root cause of the problem is not being approach. It also reduces dependence on tape media in backup and recovery processes, thereby addressed. Storage Optimization Creating efficiency is a top concern for IT organizations. An ESG poll regarding cost reduction initiatives found data reduction technology that optimizes storage capacity to be a top IT priority (seee Figure 3). 4 Figure 3. Top Storage Related Initiatives for Cost Reduction What do you believe will be the most important storage related the next 24 months? initiatives undertakenn by your organization over (Percent of respondents, multiple responses accepted) "Data reduction" technologies that reduce overall storage capacity 21% 33% Storage virtualization More power efficient storage hardware that runs cooler and/or uses less energy 22% 23% 32% 29% Organizations citing cost reduction initiatives as a major factor impacting storage spending (N=225) Tiered storage Remote data protection solutions for remote/branch offices 17% 27% 22% 24% All other organizations (N=279) Storage encryption solution 15% 22% 0% 5% 10% 15% 20% 25% 30% 35% Source: Enterprise Strategy Group, 2009 4 Source: ESG Research Report, Data Center Spending Intentions, January 2009.

Root Causes of Inefficiency in Data Protection 6 Optimizing storage to reduce overall storage capacity can be accomplished in a few ways. Data deduplication identifies and eliminates redundant data. After the data is initially seeded on a secondary storage device, subsequently written data is examined for redundancy. Replicate data is not written again; instead, only a pointer to the unique data is stored. Archiving persistent data involves moving unchangingg data from more costly primary storage to another, less costly tier in the storage hierarchy. It preservess a record for long term retention, pruning data from primary storage in the process. These technologies can be used independently; however, the combination of technologies amplifies results. Deduplication Data deduplication optimizes backup storage by identifying and eliminating redundant data within a defined domain. The cost implications of reducing the capacity of data transferred and stored in data protection processes can be significant. Deduplication has the potential to drive the cost of disk based backup closer to that of tape, making it more feasible to introduce disk based data protection. As previously noted, leveraging disk in backup and recovery processes improves performance, reducing the time required to complete these tasks. Since the footprint of backup copies is smaller with deduplication, more workloads can back up to disk, improving RTOs. Alternatively, the frequency of backup copies on disk can be increased, improving recovery point objectives (RPOs). Reduced capacity requirements reduces incremental capacity purchases. On the other hand, the disk capacity recovered via deduplication allows organizations to lengthen retention policies for data on disk, improving the likelihood that data will later be recovered from disk. The savings also impact sustainability efforts since a reduction in disk storage lowers power and cooling requirements. Deduplication has impact beyond storage capacity. Transferring one tenth of the data 5 in backup and recovery processes, including the LAN and SAN traffic between the source production system and backup storage as well as WAN transport between remote and branch offices and primary and disaster recovery sites, could yield significant bandwidth savings. Archiving Archiving for storage optimization should not be confused with the practice of keeping backup copies on tape in an offsite location for periodic recall. With archiving, a copy of a file is created as a separate object and stored in a disk based archive vault based on a time or threshold policy. It s retained for a specific period of time in the vault and offers the option of deleting the original copy residing on the source system. This process: Reclaims space on primary systems, potentially delaying incremental capacity purchases, contributing to performance improvements for source systems and applications, and saving money. Reduces the volume of data in backup/recovery processes, improving performancee (and associated backup and recovery SLAs), lowering bandwidth and capacity requirements, and saving money. Addresses retentionn and deletion of data, supporting compliance requirements, minimizing tape operations for long term staff responsible for media handling and tape troubleshooting, and offsite media storage retention/preservation of data, and saving money in terms of tape media, operational fees. 5 ESG research found that 48% of survey respondents using data deduplication reported a reduction ratio of 10 20x.

Backup Exec 2010 White Paper: Symantec Backup Exec 2010: Addressing the Root Causes of Inefficiency in Data Protection 7 Symantec Backup Exec is a leading backup/recovery solution suitable for small and medium sized Linux, Macintosh, Solaris, and organizations. It provides disk to disk to tape backup and recovery for systems running Windows, NetWare as well as VMware and Microsoft virtual machines. Backup Exec 20100 includes storage optimization enhancements including data deduplication and file and e mail archiving. Deduplication The block level data deduplication technology proven and popularized in Symantec NetBackup PureDisk is offered as an option in Backup Exec 2010. In addition, Backup Exec 2010 supports highly optimized integration with third points party target side deduplication solutions. Symantec supports multiple deduplication implementations. Users can implement deduplication at different in the backup data path to accommodate the performance requirements of various workloads. Client side and media server deduplication strategies benefit from Backup Exec s content awareness enabling the block size to be automatically adjusted based on the natural pattern breaks of the data. Client side deduplication. Deduplication processing occurs at the client/source system, delivering end to processes are distributed across clients and deduplication data is shared by all Backup Exec Agents backing end bandwidth efficiency as only a fraction of data traverses the LAN, WAN, and/or SAN. Deduplication up dataa to the same media server. Media server deduplication. This approach centralizes deduplication processing at the Backup Exec media server( s), offloading the process from source systems. Data from production serverss is transferred to the media server, wheree it is examined for redundancy. Only unique data is transferred to disk storage. Appliance deduplication. Backup data from production servers is transferred in its entirety across the LAN, WAN, and/or SAN and duplicate data is eliminated in a device purpose builclient side approach are eliminated. for the process at the end of the backup data path. The network efficiency gains of the Backup Exec 2010 supports a common interface for ntegrating third party disk targets: OpenStorage (OST). Through this interface, OST enabled for disaster recovery without engaging the Backup Exec media servers, but still tracking all disk targets optimize backup processes. An OST enabled device performs remote replication copies in Backup Exec s catalog. Backup copies made by the targett device still follow established retention policies. The OST interface can also optimize performance by removing CIFS/NFS overhead for NAS target devices. Just as third party target side solutions can efficiently move data between sites for disaster recovery or backup consolidation, Backup Exec 2010 can facilitate deduplicated copies of backup sets. Backup Exec 20100 facilitates copies of deduplicated data from one or more Backup Exec 2010 media serverss to a site running either Backup Exec 2010 media server or NetBackup PureDisk. Archiving The Backup Exec 2010 Archiving Options integrate file and e mail archiving capabilities based on technology in Symantec Enterprise Vault. Backup and archiving processes are delivered via a single Backup Exec 2010 agent and management interface. Federating backup and archiving allows consolidation of data lifecycle management activities such as retention and expiration. Some of the key features of Backup Exec 2010 archiving include: Off host processing. All archive activity is done at the Backup Exec Media Server, reducing overhead on contentt sources. Data is archived from backup copies, reducing data movement by transmitting data once during the backup of the contentt source. Disk only archive vault. Disk storage is optimized through single instance storage (file level deduplication). Policy based archiving. Archive processing is initiated based on size and/or date conditions.

Root Causes of Inefficiency in Data Protection 8 Administrator or user initiated retrieval. Self service retrieval of archived data is accomplished with the Backup Exec Retrieve Web Console. Conten indexing. Indexing of data enables end users and administrators to perform detailed searches of archived data. Migration path to Enterprise Vault. As sites grow or ediscovery needs expand, Symantec enables a transition from the archiving option in Backup Exec 2010 to the more full featured, ediscovery enabled archiving available with Enterprise Vault. The Bigger Truth Organizations are challenged to manage greater volumes of data based on growth rates and retention policies. The effect is an increase in capital and operational costs, performancee degradation of systems and applications, and an inability to meet backup windows and recovery objectives. Non compliance, data recoverability, and unmet SLA risks are also introduced. Symantec is addressing these issues by dealing with the root causes not just addressing the symptoms. The archiving and deduplication features available with Backup Exec 2010 drive storage optimization for primary and secondary disk storage and drive network optimization across the LAN, WAN, and/or SAN. The benefits of implementing Backup Exec 2010 with its storage optimization options are very compelling when financial, operational, and business benefits are considered. Backup Exec 2010 can protect more workloads while storing less data and saving more moree time and, importantly, more money.

20 Asylum Street Milford, MA 01757 Tel:508.482.0188 Fax: 508.482.0218 www.enterprisestrategygroup.com