Presentation is loading. Please wait.

Presentation is loading. Please wait.

DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection.

Similar presentations


Presentation on theme: "DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection."— Presentation transcript:

1 DotHill Systems Data Management Services

2 Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection  Data protection metrics Reducing Data Loss & Improving Recovery Times  Data Protection Strategies  Tape Backup vs. Snapshots  Reducing Data Loss  Improving Recovery Times  Improved Application Availability Reducing Backup Windows  Customer Needs  Reducing Backup Windows Data Management support  Customer Needs  Business Analytics  Application Test & Development Snapshot Benefits Summary Close and Q&A

3 Page 3 Why Protect Your Data? Protect against accidental corruption or loss of data  Human or program errors  System failures (hardware, software, network) Protect against malicious corruption or loss of data  Viruses, Sabotage Protect against local and wide area disasters  Disaster Recovery/Business Continuance Because you have to!  HIPAA, Sarbanes-Oxley, SEC 17 A, EU DPA, etc. No longer an option! Source: Horison Information Strategies

4 Page 4 Interesting Points to Consider On average, companies value 100 megabytes of data at more than $1 million (Source: Ontrack Data International) Estimates show that 1 out of 500 data centers will have a severe disaster each year 93% of companies that lost their data center for 10 days or more due to a disaster filed for bankruptcy within one year of the disaster. 50% of businesses that found themselves without data management for this same time period filed for bankruptcy immediately. (Source: National Archives & Records Administration in Washington.) The value and vulnerability of data, and the cost of not protecting

5 human error software program malfunction computer virus site disaster hardware or system malfunction 44% 32% 3% 7% 14% Causes of data loss source: Ontrack, a data availability service provider Data Protection Problems

6 44% 3% 14% RAID, clustering, and local/remote mirroring protect against hardware failure or malfunction Causes of data loss source: Ontrack, a data availability service provider Hardware protection is ½ the solution RAID: 0,1,3,5,6,10,50 32% 3% 7% 14% human error software program malfunction computer virus site disaster hardware or system malfunction

7 44% 3% 14% RAID, clustering, and local/remote mirroring protect against hardware failure or malfunction Causes of data loss source: Ontrack, a data availability service provider DMS Software completes the solution RAID: 0,1,3,5,6,10,50 32% 7% human error software program malfunction computer virus site disaster hardware or system malfunction 3% 14% Complete independent volume copy Additional data protection against RAID set or volume failure Non-disruptive use of live volume Logical, point-in-time copy of a data volume Maintains Business Continuity Reduces Backup Windows Improves Data Recovery Minimizes Data Loss Future offering Independent volume copy to a remote location AssuredSnap AssuredCopy RemoteSync

8 RAID, clustering, and local/remote mirroring protect against hardware failure or malfunction Complete independent volume copy Additional data protection against RAID set or volume failure Non-disruptive use of live volume Causes of data loss source: Ontrack, a data availability service provider Dot Hill’s Data Protection Solutions RAID: 0,1,3,5,6,10,50 AssuredSnap AssuredCopy human error software program malfunction computer virus site disaster hardware or system malfunction 44% 32% 3% 7% 14% RemoteSync Future offering Independent volume copy to a remote location Logical, point-in-time copy of a data volume Maintains Business Continuity Reduces Backup Windows Improves Data Recovery Minimizes Data Loss

9 Page 9 Key Considerations Recovery Point Objective (RPO)  How much data can you afford to lose? Recovery Time Objective (RTO)  How long can you afford to be without your data?  What are downtime costs?  What are downtime implications? Data Classification  How critical is your data to the operational and financial viability of the company?  All data is not created equal Budget  How much money can you afford to spend? Source: Enterprise Storage Group “The Evolution of Data Protection” RTO vs. RPO vs. Budget $ trade-offs as one size does not fit all…

10 Page 10 Data Protection Technology Positioning FeatureFunction Data Loss (RPO) Outage (RTO)CostProtection RAIDMethod for storing data across a number of hard disk drives to achieve data redundancy None $Disk drive failure SnapshotsPoint-in-time logical image of a physical volume HoursMinutes$$Logical data loss or corruption Volume CopyComplete physical and independent copy of a volume Hours-DaysMinutes$$$Logical data loss or corruption Remote Snapshot Replication Remote snapshots of a primary volume Hours - Days Minutes- Hours $$$Local or wide-area disasters Semi- synchronous Replication Replication of data to one or more geographically remote systems.  I/O to primary volume propagated to remote volume after sending host acknowledgement Seconds- Minutes Minutes- Hours $$$$Local or wide-area disasters Synchronous Replication Replication of data to one or more geographically remote systems.  I/O to primary volume propagated to remote volume before sending host acknowledgement NoneMinutes- Hours $$$$Local-area disasters BackupTraditional tape-based Days- Weeks Hours - Days $$Local or wide-area disasters (w/ vaulting) ArchiveTraditional tape-based -Days- Weeks $$-

11 Page 11 Data Protection Strategies Traditional Tape Backup  Nightly backup to tape  Full backup on weekends  Incremental or differential on weekdays  RPO = up to 24 hours Snapshots  Snapshot taken every 2 hours  RPO = up to 2 hours Risk Mitigation

12 Page 12 Reducing Data Loss (RPO) Traditional Tape Backup 1.File share taken offline at 12:00 am 2.Backed up to tape 3.File share brought back online at 12:30 am 4.Corruption occurs at 4:30 pm 5.Previous night’s tape located 6.File share restored from previous night’s backup tape 7.File share back online at 6:00 pm 16 hours of work is lost! Snapshots 1.Snapshot of File Share taken every 2 hours  12 am, 2 am, 4 am, 6 am, 8 am, 10 am, 12 pm, 2 pm, 4 pm, 6 pm, etc. 2.Corruption occurs at 4:30 pm 3.File share restored from 4:00 pm snapshot 4.File share back online at 4:45 pm 30 minutes of work is lost! Risk Mitigation: Lost Revenue and Customer Confidence

13 Page 13 Improving Recovery Time (RTO) Traditional Tape Backup 1.File share taken offline at 12:00 am 2.Backed up to tape 3.File share brought back online at 12:30 am 4.Corruption occurs at 4:30 pm 5.Previous night’s tape located 6.File share restored from previous night’s backup tape 7.File share back online at 6:00 pm  Data unavailable for 1 ½ hours! Snapshots 1.Snapshot of File Share taken every 2 hours  12 am, 2 am, 4 am, 6 am, 8 am, 10 am, 12 pm, 2 pm, 4 pm, 6 pm, etc. 2.Corruption occurs at 4:30 pm 3.File share restored from 4:00 pm snapshot 4.File share back online at 4:45 pm  Data unavailable for 15 minutes! Risk Mitigation: Lost Business and Customer Confidence

14 AssuredSnap Benefits

15 Page 15 AssuredSnap Benefits 1.Minimizes Data Loss  Reduces the data protection interval period (i.e., Improved RPO)  Reduces data loss and re-work 2.Improves Data Recovery and Business Continuity  Rapid restore to any point-in-time snapshot  Improves application and data availability (i.e., Improved RTO) 3.Drastically Reduces Backup Windows  From hours to minutes  Improves application & data availability 4.Supports Business Analytics & Rapid Application Development  Use production data without effecting production data or impacting the production application  Improves quality and timeliness of business decisions  Improves application time-to-deployment 5.Satisfies Regulatory Compliance  Data is protected and recoverable Significant Business Impact; Operational and Financial

16 Page 16 AssuredSnap Benefits Risk Mitigation  Data Loss  Application & Data Availability  Employee Productivity  Lost Business  Lost Revenue  Lost Customer Confidence  Lost Market Good Will  Customer Satisfaction, Loyalty and Retention  Financial Viability Significant Business Impact; Risk Mitigation

17 AssuredSnap Questions


Download ppt "DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection."

Similar presentations


Ads by Google