Presentation is loading. Please wait.

Presentation is loading. Please wait.

VERITAS Confidential Disaster Recovery – Beyond Backup Jason Phippen – Director Product and Solutions Marketing, EMEA.

Similar presentations


Presentation on theme: "VERITAS Confidential Disaster Recovery – Beyond Backup Jason Phippen – Director Product and Solutions Marketing, EMEA."— Presentation transcript:

1 VERITAS Confidential Disaster Recovery – Beyond Backup Jason Phippen – Director Product and Solutions Marketing, EMEA

2 VERITAS Confidential Agenda Disaster Recovery Concepts Backup – Last Line of Defence Enhancing Backup with Replication Remote Site Replication and Mirroring Clustering for Disaster Recovery Questions

3 VERITAS Confidential Recovery Point Objective (RPO) – Point in time to which applications data must be recovered to resume business transactions Recovery Time Objective (RTO) – Maximum elapsed time allowed before lack of business function severely impacts an organization Disaster Recovery Concepts DaysMinsHrsWksSecs Recovery Point MinsDaysHrsSecsWks Recovery Time

4 VERITAS Confidential How much data loss can you endure? Recovery Point Objective (RPO) Tape Backup w/ Offsite Vaulting Replication MinsDaysHrsSecsWksDaysMinsHrsWksSecs Recovery Point Recovery Time

5 VERITAS Confidential How much downtime can you endure? Recovery Time Objective (RTO) Recovery from Tape Geographic Clustering MinsDaysHrsSecsWksDaysMinsHrsWksSecs Recovery Point Recovery Time

6 VERITAS Confidential “Far Enough” away –How far away from the main site? –What resources should it have? Site Strategies (Hot, Warm, Cold) Considerations –Fault zones –Flood plains –Power grids –Climate zones –Locality relative to other sites (e.g., airport) –Remote customers and employees Choosing a Recovery Site

7 VERITAS Confidential Backup – Your last line of Defense Redundant systems replicate user errors, viruses and data corruption System or component redundancy (RAID, mirroring) cannot replace backup Backup tapes may represent the last valid copy of data Backups are your last line of defense against total data loss

8 VERITAS Confidential Enhancing Backup with Replication

9 VERITAS Confidential Replicating the Backup Catalog server –Shave hours off a tape restore strategy –No need to re-catalog tapes –No need to rebuild the backup/restore server –Tape restores can begin immediately Backup Tape Copies Sent to Offsite Site ASite B Backup Clients Backup Master/Media Server Replicate Backup Catalogs Replication-enhanced Backup

10 VERITAS Confidential Remote Site Replication and Mirroring

11 VERITAS Confidential Replication and Mirroring Key Requirements… Must be “far enough” away No windows of data corruption at secondary Synchronous Asynchronous Recovery Point MinutesDays Hours SecondsWeeks

12 VERITAS Confidential Strengths Maximum data currency (RPO) Data available immediately at secondary (RTO) Weaknesses Potential to impact application performance Data writes lag by network latency Write commit latency across nodes Primary Site Secondary Site Synchronous Replication

13 VERITAS Confidential Strengths Maximum performance May have less application impact Data available immediately at secondary (RTO) Weaknesses Secondary may lag primary (RPO) Potential for data corruption (not a weakness for VERITAS) Primary Site Secondary Site Asynchronous Replication

14 VERITAS Confidential Secondary Site Application Volume Manager SAN Fabric Lower hardware costs –Groups physical disks into logical volumes –Hardware Independence, Greater IT productivity –Simplified administration of heterogeneous environments –Proactive management of applications Increased application ROI Can mirror over SAN distances Primary Site Logical Volume Management Remote Mirroring

15 VERITAS Confidential Clustering for Disaster Recovery

16 VERITAS Confidential Campus / MAN Disaster Recovery WAN Disaster Recovery Clustering for Disaster Recovery WAN Clustering, Replication, Global Clustering MAN Clustering, Replication Clustering, Remote Mirroring OR

17 VERITAS Confidential Campus / MAN Disaster Recovery St-r-e-t-c-h Cluster Over A SAN * Distance may vary depending upon infrastructure

18 VERITAS Confidential Global Global Clustering Geographically dispersed sites linked by public carrier wide area network Each site aware of the configuration and state of all of the sites Direct site level migration in event of catastrophe Global Availability Management Single point of monitoring and administration

19 VERITAS Confidential Replication Site Migration Wide Area Availability Application Clustering Global Clustering Application Clustering Global Clustering Application Clustering Global Clustering Failover

20 VERITAS Confidential VERITAS Cluster Server Volume Manager/ Foundation Suite NetBackup/ Backup Exec VERITAS Global Cluster Manager VERITAS Volume Replicator - NetBackup Vault - BMR / IDR Local Multi-site Availability Requirements VERITAS: Uniquely Qualified (HA and DR)

21 VERITAS Confidential Questions


Download ppt "VERITAS Confidential Disaster Recovery – Beyond Backup Jason Phippen – Director Product and Solutions Marketing, EMEA."

Similar presentations


Ads by Google