DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection.

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

© 2006 DataCore Software Corp DataCore Traveller Travel in Time : Do More with Time The Continuous Protection and Recovery (CPR) Solution Time Optimized.
NetApp Confidential - Limited Use
Information Technology Disaster Recovery Awareness Program.
Creating a Data Disaster Recovery Plan. What is a DR Plan? Is your best solution to: Continuous business services Prompt and smooth recovery Prepare for.
How to Ensure Your Business Survives, Even if Your Server Crashes Backup Fast, Recover Faster Fast and Reliable Disaster Recovery, Data Protection, System.
Building the business case for Business Continuity Justin Davey Senior Consultant CA.
© 2014 Vicom Infinity Storage System High-Availability & Disaster Recovery Overview [638] John Wolfgang Enterprise Storage Architecture & Services
SQL Server Disaster Recovery Chris Shaw Sr. SQL Server DBA, Xtivia Inc.
Module – 9 Introduction to Business continuity
Business Continuity Section 3(chapter 8) BC:ISMDR:BEIT:VIII:chap8:Madhu N PIIT1.
VERITAS Confidential Disaster Recovery – Beyond Backup Jason Phippen – Director Product and Solutions Marketing, EMEA.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
© 2009 EMC Corporation. All rights reserved. Introduction to Business Continuity Module 3.1.
Business Continuity The Business of Keeping A Business Running John Dooly Senior Analyst CEMA Region Prague, Czech Republic.
1 Disk Based Disaster Recovery & Data Replication Solutions Gavin Cole Storage Consultant SEE.
Copyright ©2003 Digitask Consultants Inc., All rights reserved Storage Area Networks Digitask Seminar April 2000 Digitask Consultants, Inc.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
June 23rd, 2009Inflectra Proprietary InformationPage: 1 SpiraTest/Plan/Team Deployment Considerations How to deploy for high-availability and strategies.
Barracuda Backup Service Data Backup and Disaster Recovery.
1 © Copyright 2010 EMC Corporation. All rights reserved. EMC RecoverPoint/Cluster Enabler for Microsoft Failover Cluster.
Information Means The World.. Enhanced Data Recovery Agenda EDR defined Backup to Disk (DDT) Tape Emulation (Tape Virtualization) Point-in-time Copy Replication.
Lesson 11 – NETWORK DISASTER RECOVERY Disaster recovery plans Network backup and restoration OVERVIEW.
Disaster Prevention and Recovery Presented By: Sean Snodgrass and Theodore Smith.
1 Choosing Disaster Recovery Solution for Database Systems EECS711 : Security Management and Audit Spring 2010 Presenter : Amit Dandekar Instructor : Dr.
Section 3 : Business Continuity Lecture 29. After completing this chapter you will be able to:  Discuss local replication and the possible uses of local.
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
1© Copyright 2011 EMC Corporation. All rights reserved. EMC RECOVERPOINT/ CLUSTER ENABLER FOR MICROSOFT FAILOVER CLUSTER.
Saving Your Business from a Data Loss Randy Clark.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo.
Module 8 Implementing Backup and Recovery. Module Overview Planning Backup and Recovery Backing Up Exchange Server 2010 Restoring Exchange Server 2010.
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
Procedures for Backup and Recovery Section 14. Key points and questions What data should be backed up and how often? What do we mean by full backup, incremental.
IBM TotalStorage ® IBM logo must not be moved, added to, or altered in any way. © 2007 IBM Corporation Break through with IBM TotalStorage Business Continuity.
ORACLE DATABASE HIGH AVAILABILITY 1. OUTLINE I. Overview Of High Availability II. Oracle Database High Availability Architecture III. Determining Your.
Disaster Recovery as a Cloud Service Chao Liu SUNY Buffalo Computer Science.
Presented By: MICHAEL HOFFMAN President & CEO - Bolt Data Systems June 16, 2010 Data Backup for the Shared Platform.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
IS 380.  Provides detailed procedures to keep the business running and minimize loss of life and money  Identifies emergency response procedures  Identifies.
© Novell, Inc. All rights reserved. 1 PlateSpin Protect Virtualize your Disaster Recovery.
Data Management Services AssuredSnap. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection  Data.
#unitrends | THE FUTURE IS NOW Brad Gunderson Senior Sales Engineer – WI/IL Is Your Data Insured?
A Case Study The Next Step Business Continuity Workshop For major Medical Center.
David N. Wozei Systems Administrator, IT Auditor.
Meeting the Data Protection Demands of a 24x7 Economy Steve Morihiro VP, Programs & Technology Quantum Storage Solutions Group
Virtualization for Storage Efficiency and Centralized Management Genevieve Sullivan Hewlett-Packard
By Srosh Abdali.  Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Your business runs even when your server doesn’t DR Recommendation November 2011.
Disaster Recovery and Business Continuity Planning.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Disaster Recovery.
VERITAS Confidential Copyright © 2005 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS Logo and all other VERITAS product names.
Business Continuity Overview
COMP-01: How to Save Your Company Money and Look Like a Hero in 5 Easy Steps Cyril Gleiman Senior Technical Support Engineer.
DISASTER RECOVERY PLAN By: Matthew Morrow. WHAT HAPPENS WHEN A DISASTER OCCURS  What happens to a business during a disaster?  What steps does a business.
BACKUP AND RESTORE. The main area to be consider when designing a backup strategy Which information should be backed up Which technology should be backed.
Database recovery contd…
Planning for Application Recovery
Providing Application High Availability
Server Upgrade HA/DR Integration
AS ICT Module 2 Objectives: Security of Data
Determining BC/DR Methods
SpiraTest/Plan/Team Deployment Considerations
Backup and restoration of data, redundancy
Using the Cloud for Backup, Archiving & Disaster Recovery
Presentation transcript:

DotHill Systems Data Management Services

Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection  Data protection metrics Reducing Data Loss & Improving Recovery Times  Data Protection Strategies  Tape Backup vs. Snapshots  Reducing Data Loss  Improving Recovery Times  Improved Application Availability Reducing Backup Windows  Customer Needs  Reducing Backup Windows Data Management support  Customer Needs  Business Analytics  Application Test & Development Snapshot Benefits Summary Close and Q&A

Page 3 Why Protect Your Data? Protect against accidental corruption or loss of data  Human or program errors  System failures (hardware, software, network) Protect against malicious corruption or loss of data  Viruses, Sabotage Protect against local and wide area disasters  Disaster Recovery/Business Continuance Because you have to!  HIPAA, Sarbanes-Oxley, SEC 17 A, EU DPA, etc. No longer an option! Source: Horison Information Strategies

Page 4 Interesting Points to Consider On average, companies value 100 megabytes of data at more than $1 million (Source: Ontrack Data International) Estimates show that 1 out of 500 data centers will have a severe disaster each year 93% of companies that lost their data center for 10 days or more due to a disaster filed for bankruptcy within one year of the disaster. 50% of businesses that found themselves without data management for this same time period filed for bankruptcy immediately. (Source: National Archives & Records Administration in Washington.) The value and vulnerability of data, and the cost of not protecting

human error software program malfunction computer virus site disaster hardware or system malfunction 44% 32% 3% 7% 14% Causes of data loss source: Ontrack, a data availability service provider Data Protection Problems

44% 3% 14% RAID, clustering, and local/remote mirroring protect against hardware failure or malfunction Causes of data loss source: Ontrack, a data availability service provider Hardware protection is ½ the solution RAID: 0,1,3,5,6,10,50 32% 3% 7% 14% human error software program malfunction computer virus site disaster hardware or system malfunction

44% 3% 14% RAID, clustering, and local/remote mirroring protect against hardware failure or malfunction Causes of data loss source: Ontrack, a data availability service provider DMS Software completes the solution RAID: 0,1,3,5,6,10,50 32% 7% human error software program malfunction computer virus site disaster hardware or system malfunction 3% 14% Complete independent volume copy Additional data protection against RAID set or volume failure Non-disruptive use of live volume Logical, point-in-time copy of a data volume Maintains Business Continuity Reduces Backup Windows Improves Data Recovery Minimizes Data Loss Future offering Independent volume copy to a remote location AssuredSnap AssuredCopy RemoteSync

RAID, clustering, and local/remote mirroring protect against hardware failure or malfunction Complete independent volume copy Additional data protection against RAID set or volume failure Non-disruptive use of live volume Causes of data loss source: Ontrack, a data availability service provider Dot Hill’s Data Protection Solutions RAID: 0,1,3,5,6,10,50 AssuredSnap AssuredCopy human error software program malfunction computer virus site disaster hardware or system malfunction 44% 32% 3% 7% 14% RemoteSync Future offering Independent volume copy to a remote location Logical, point-in-time copy of a data volume Maintains Business Continuity Reduces Backup Windows Improves Data Recovery Minimizes Data Loss

Page 9 Key Considerations Recovery Point Objective (RPO)  How much data can you afford to lose? Recovery Time Objective (RTO)  How long can you afford to be without your data?  What are downtime costs?  What are downtime implications? Data Classification  How critical is your data to the operational and financial viability of the company?  All data is not created equal Budget  How much money can you afford to spend? Source: Enterprise Storage Group “The Evolution of Data Protection” RTO vs. RPO vs. Budget $ trade-offs as one size does not fit all…

Page 10 Data Protection Technology Positioning FeatureFunction Data Loss (RPO) Outage (RTO)CostProtection RAIDMethod for storing data across a number of hard disk drives to achieve data redundancy None $Disk drive failure SnapshotsPoint-in-time logical image of a physical volume HoursMinutes$$Logical data loss or corruption Volume CopyComplete physical and independent copy of a volume Hours-DaysMinutes$$$Logical data loss or corruption Remote Snapshot Replication Remote snapshots of a primary volume Hours - Days Minutes- Hours $$$Local or wide-area disasters Semi- synchronous Replication Replication of data to one or more geographically remote systems.  I/O to primary volume propagated to remote volume after sending host acknowledgement Seconds- Minutes Minutes- Hours $$$$Local or wide-area disasters Synchronous Replication Replication of data to one or more geographically remote systems.  I/O to primary volume propagated to remote volume before sending host acknowledgement NoneMinutes- Hours $$$$Local-area disasters BackupTraditional tape-based Days- Weeks Hours - Days $$Local or wide-area disasters (w/ vaulting) ArchiveTraditional tape-based -Days- Weeks $$-

Page 11 Data Protection Strategies Traditional Tape Backup  Nightly backup to tape  Full backup on weekends  Incremental or differential on weekdays  RPO = up to 24 hours Snapshots  Snapshot taken every 2 hours  RPO = up to 2 hours Risk Mitigation

Page 12 Reducing Data Loss (RPO) Traditional Tape Backup 1.File share taken offline at 12:00 am 2.Backed up to tape 3.File share brought back online at 12:30 am 4.Corruption occurs at 4:30 pm 5.Previous night’s tape located 6.File share restored from previous night’s backup tape 7.File share back online at 6:00 pm 16 hours of work is lost! Snapshots 1.Snapshot of File Share taken every 2 hours  12 am, 2 am, 4 am, 6 am, 8 am, 10 am, 12 pm, 2 pm, 4 pm, 6 pm, etc. 2.Corruption occurs at 4:30 pm 3.File share restored from 4:00 pm snapshot 4.File share back online at 4:45 pm 30 minutes of work is lost! Risk Mitigation: Lost Revenue and Customer Confidence

Page 13 Improving Recovery Time (RTO) Traditional Tape Backup 1.File share taken offline at 12:00 am 2.Backed up to tape 3.File share brought back online at 12:30 am 4.Corruption occurs at 4:30 pm 5.Previous night’s tape located 6.File share restored from previous night’s backup tape 7.File share back online at 6:00 pm  Data unavailable for 1 ½ hours! Snapshots 1.Snapshot of File Share taken every 2 hours  12 am, 2 am, 4 am, 6 am, 8 am, 10 am, 12 pm, 2 pm, 4 pm, 6 pm, etc. 2.Corruption occurs at 4:30 pm 3.File share restored from 4:00 pm snapshot 4.File share back online at 4:45 pm  Data unavailable for 15 minutes! Risk Mitigation: Lost Business and Customer Confidence

AssuredSnap Benefits

Page 15 AssuredSnap Benefits 1.Minimizes Data Loss  Reduces the data protection interval period (i.e., Improved RPO)  Reduces data loss and re-work 2.Improves Data Recovery and Business Continuity  Rapid restore to any point-in-time snapshot  Improves application and data availability (i.e., Improved RTO) 3.Drastically Reduces Backup Windows  From hours to minutes  Improves application & data availability 4.Supports Business Analytics & Rapid Application Development  Use production data without effecting production data or impacting the production application  Improves quality and timeliness of business decisions  Improves application time-to-deployment 5.Satisfies Regulatory Compliance  Data is protected and recoverable Significant Business Impact; Operational and Financial

Page 16 AssuredSnap Benefits Risk Mitigation  Data Loss  Application & Data Availability  Employee Productivity  Lost Business  Lost Revenue  Lost Customer Confidence  Lost Market Good Will  Customer Satisfaction, Loyalty and Retention  Financial Viability Significant Business Impact; Risk Mitigation

AssuredSnap Questions