16
DotHill Systems Data Management Services

DotHill Systems Data Management Services. Page 2 Agenda Why protect your data? Causes of data loss Hardware data protection DMS data protection

Embed Size (px)

Citation preview

Page 1: DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection

DotHill SystemsData Management Services

Page 2: DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection

Page 2

Agenda

• Why protect your data? Causes of data loss Hardware data protection DMS data protection Data protection metrics

• Reducing Data Loss & Improving Recovery Times Data Protection Strategies

Tape Backup vs. Snapshots

Reducing Data Loss Improving Recovery Times Improved Application Availability

• Reducing Backup Windows Customer Needs Reducing Backup Windows

• Data Management support Customer Needs Business Analytics Application Test & Development

• Snapshot Benefits Summary

• Close and Q&A

Page 3: DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection

Page 3

Why Protect Your Data?• Protect against accidental corruption or

loss of data Human or program errors System failures (hardware, software,

network)

• Protect against malicious corruption or loss of data Viruses, Sabotage

• Protect against local and wide area disasters Disaster Recovery/Business

Continuance

• Because you have to! HIPAA, Sarbanes-Oxley,

SEC 17 A, EU DPA, etc.

No longer an option!

Source: Horison Information Strategies

Page 4: DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection

Page 4

Interesting Points to Consider

• On average, companies value 100 megabytes of data at more than $1 million (Source: Ontrack Data International)

• Estimates show that 1 out of 500 data centers will have a severe disaster each year

• 93% of companies that lost their data center for 10 days or more due to a disaster filed for bankruptcy within one year of the disaster. 50% of businesses that found themselves without data management for this same time period filed for bankruptcy immediately. (Source: National Archives & Records Administration in Washington.)

The value and vulnerability of data, and the cost of not protecting

Page 5: DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection

human error

software program malfunction

computer virus

site disaster

hardware or system malfunction

44%

32%

3%

7% 14%

Causes of data loss source: Ontrack, a data availability service provider

Data Protection Problems

Page 6: DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection

44%

3%

14%

• RAID, clustering, and local/remote mirroring protect against hardware failure or malfunction

Causes of data loss source: Ontrack, a data availability service provider

Hardware protection is ½ the solution

RAID: 0,1,3,5,6,10,50

32%

3%

7% 14%

human error

software program malfunction

computer virus

site disaster

hardware or system malfunction

Page 7: DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection

44%

3%

14%

• RAID, clustering, and local/remote mirroring protect against hardware failure or malfunction

Causes of data loss source: Ontrack, a data availability service provider

DMS Software completes the solution

RAID: 0,1,3,5,6,10,50RAID: 0,1,3,5,6,10,50

32%

7%

human error

software program malfunction

computer virus

site disaster

hardware or system malfunction

3%

14%

• Complete independent volume copy

• Additional data protection against RAID set or volume failure

• Non-disruptive use of live volume

• Logical, point-in-time copy of a data volume

• Maintains Business Continuity• Reduces Backup Windows• Improves Data Recovery• Minimizes Data Loss

• Future offering• Independent volume

copy to a remote location

AssuredSnap AssuredCopy

RemoteSyncRemoteSync

Page 8: DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection

Page 9

Key Considerations

• Recovery Point Objective (RPO) How much data can you afford to lose?

• Recovery Time Objective (RTO) How long can you afford to be without

your data? What are downtime costs? What are downtime implications?

• Data Classification How critical is your data to the

operational and financial viability of the company?

All data is not created equal

• Budget How much money can you afford to

spend? Source: Enterprise Storage Group“The Evolution of Data Protection”

RTO vs. RPO vs. Budget $ trade-offsas one size does not fit all…

Page 9: DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection

Page 10

Data Protection Technology PositioningFeature Function

Data Loss (RPO)

Outage (RTO) Cost Protection

RAID Method for storing data across a number of hard disk drives to achieve data redundancy

None None $ Disk drive failure

Snapshots Point-in-time logical image of a physical volume Hours Minutes $$ Logical data loss or corruption

Volume Copy Complete physical and independent copy of a volume

Hours-Days Minutes $$$ Logical data loss or corruption

Remote Snapshot Replication

Remote snapshots of a primary volume Hours - Days

Minutes-Hours

$$$ Local or wide-area disasters

Semi-synchronous Replication

Replication of data to one or more geographically remote systems.

I/O to primary volume propagated to remote volume after sending host acknowledgement

Seconds-Minutes

Minutes-Hours

$$$$ Local or wide-area disasters

Synchronous Replication

Replication of data to one or more geographically remote systems.

I/O to primary volume propagated to remote volume before sending host acknowledgement

None Minutes-Hours

$$$$ Local-area disasters

Backup Traditional tape-based Days-Weeks

Hours - Days

$$ Local or wide-area disasters (w/ vaulting)

Archive Traditional tape-based - Days-Weeks

$$ -

Page 10: DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection

Page 11

Data Protection Strategies

• Traditional Tape Backup Nightly backup to tape

Full backup on weekends Incremental or differential

on weekdays

RPO = up to 24 hours

• Snapshots Snapshot taken every 2 hours

RPO = up to 2 hours

Risk Mitigation

Page 11: DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection

Page 12

Reducing Data Loss (RPO)

• Traditional Tape Backup 1. File share taken offline at 12:00 am

2. Backed up to tape

3. File share brought back online at 12:30 am

4. Corruption occurs at 4:30 pm

5. Previous night’s tape located

6. File share restored from previous night’s backup tape

7. File share back online at 6:00 pm

16 hours of work is lost!

• Snapshots1. Snapshot of File Share taken every

2 hours 12 am, 2 am, 4 am, 6 am, 8 am, 10 am,

12 pm, 2 pm, 4 pm, 6 pm, etc.

2. Corruption occurs at 4:30 pm

3. File share restored from 4:00 pm snapshot

4. File share back online at 4:45 pm

30 minutes of work is lost!

Risk Mitigation: Lost Revenue and Customer Confidence

Page 12: DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection

Page 13

Improving Recovery Time (RTO)

• Traditional Tape Backup 1. File share taken offline at 12:00 am

2. Backed up to tape

3. File share brought back online at 12:30 am

4. Corruption occurs at 4:30 pm

5. Previous night’s tape located

6. File share restored from previous night’s backup tape

7. File share back online at 6:00 pm

Data unavailable for 1 ½ hours!

• Snapshots1. Snapshot of File Share taken every 2

hours 12 am, 2 am, 4 am, 6 am, 8 am, 10 am,

12 pm, 2 pm, 4 pm, 6 pm, etc.

2. Corruption occurs at 4:30 pm

3. File share restored from 4:00 pm snapshot

4. File share back online at 4:45 pm

Data unavailable for 15 minutes!

Risk Mitigation: Lost Business and Customer Confidence

Page 13: DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection

AssuredSnap Benefits

Page 14: DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection

Page 15

AssuredSnap Benefits1. Minimizes Data Loss

Reduces the data protection interval period (i.e., Improved RPO) Reduces data loss and re-work

2. Improves Data Recovery and Business Continuity Rapid restore to any point-in-time snapshot Improves application and data availability (i.e., Improved RTO)

3. Drastically Reduces Backup Windows From hours to minutes Improves application & data availability

4. Supports Business Analytics & Rapid Application Development Use production data without effecting production data or impacting the production

application Improves quality and timeliness of business decisions Improves application time-to-deployment

5. Satisfies Regulatory Compliance Data is protected and recoverable

Significant Business Impact; Operational and Financial

Page 15: DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection

Page 16

AssuredSnap Benefits

• Risk Mitigation Data Loss

Application & Data Availability

Employee Productivity

Lost Business

Lost Revenue

Lost Customer Confidence

Lost Market Good Will

Customer Satisfaction, Loyalty and Retention

Financial Viability

Significant Business Impact; Risk Mitigation

Page 16: DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection

AssuredSnapQuestions