Upload
derrick-hancock
View
218
Download
0
Tags:
Embed Size (px)
Citation preview
DotHill SystemsData Management Services
Page 2
Agenda
• Why protect your data? Causes of data loss Hardware data protection DMS data protection Data protection metrics
• Reducing Data Loss & Improving Recovery Times Data Protection Strategies
Tape Backup vs. Snapshots
Reducing Data Loss Improving Recovery Times Improved Application Availability
• Reducing Backup Windows Customer Needs Reducing Backup Windows
• Data Management support Customer Needs Business Analytics Application Test & Development
• Snapshot Benefits Summary
• Close and Q&A
Page 3
Why Protect Your Data?• Protect against accidental corruption or
loss of data Human or program errors System failures (hardware, software,
network)
• Protect against malicious corruption or loss of data Viruses, Sabotage
• Protect against local and wide area disasters Disaster Recovery/Business
Continuance
• Because you have to! HIPAA, Sarbanes-Oxley,
SEC 17 A, EU DPA, etc.
No longer an option!
Source: Horison Information Strategies
Page 4
Interesting Points to Consider
• On average, companies value 100 megabytes of data at more than $1 million (Source: Ontrack Data International)
• Estimates show that 1 out of 500 data centers will have a severe disaster each year
• 93% of companies that lost their data center for 10 days or more due to a disaster filed for bankruptcy within one year of the disaster. 50% of businesses that found themselves without data management for this same time period filed for bankruptcy immediately. (Source: National Archives & Records Administration in Washington.)
The value and vulnerability of data, and the cost of not protecting
human error
software program malfunction
computer virus
site disaster
hardware or system malfunction
44%
32%
3%
7% 14%
Causes of data loss source: Ontrack, a data availability service provider
Data Protection Problems
44%
3%
14%
• RAID, clustering, and local/remote mirroring protect against hardware failure or malfunction
Causes of data loss source: Ontrack, a data availability service provider
Hardware protection is ½ the solution
RAID: 0,1,3,5,6,10,50
32%
3%
7% 14%
human error
software program malfunction
computer virus
site disaster
hardware or system malfunction
44%
3%
14%
• RAID, clustering, and local/remote mirroring protect against hardware failure or malfunction
Causes of data loss source: Ontrack, a data availability service provider
DMS Software completes the solution
RAID: 0,1,3,5,6,10,50RAID: 0,1,3,5,6,10,50
32%
7%
human error
software program malfunction
computer virus
site disaster
hardware or system malfunction
3%
14%
• Complete independent volume copy
• Additional data protection against RAID set or volume failure
• Non-disruptive use of live volume
• Logical, point-in-time copy of a data volume
• Maintains Business Continuity• Reduces Backup Windows• Improves Data Recovery• Minimizes Data Loss
• Future offering• Independent volume
copy to a remote location
AssuredSnap AssuredCopy
RemoteSyncRemoteSync
Page 9
Key Considerations
• Recovery Point Objective (RPO) How much data can you afford to lose?
• Recovery Time Objective (RTO) How long can you afford to be without
your data? What are downtime costs? What are downtime implications?
• Data Classification How critical is your data to the
operational and financial viability of the company?
All data is not created equal
• Budget How much money can you afford to
spend? Source: Enterprise Storage Group“The Evolution of Data Protection”
RTO vs. RPO vs. Budget $ trade-offsas one size does not fit all…
Page 10
Data Protection Technology PositioningFeature Function
Data Loss (RPO)
Outage (RTO) Cost Protection
RAID Method for storing data across a number of hard disk drives to achieve data redundancy
None None $ Disk drive failure
Snapshots Point-in-time logical image of a physical volume Hours Minutes $$ Logical data loss or corruption
Volume Copy Complete physical and independent copy of a volume
Hours-Days Minutes $$$ Logical data loss or corruption
Remote Snapshot Replication
Remote snapshots of a primary volume Hours - Days
Minutes-Hours
$$$ Local or wide-area disasters
Semi-synchronous Replication
Replication of data to one or more geographically remote systems.
I/O to primary volume propagated to remote volume after sending host acknowledgement
Seconds-Minutes
Minutes-Hours
$$$$ Local or wide-area disasters
Synchronous Replication
Replication of data to one or more geographically remote systems.
I/O to primary volume propagated to remote volume before sending host acknowledgement
None Minutes-Hours
$$$$ Local-area disasters
Backup Traditional tape-based Days-Weeks
Hours - Days
$$ Local or wide-area disasters (w/ vaulting)
Archive Traditional tape-based - Days-Weeks
$$ -
Page 11
Data Protection Strategies
• Traditional Tape Backup Nightly backup to tape
Full backup on weekends Incremental or differential
on weekdays
RPO = up to 24 hours
• Snapshots Snapshot taken every 2 hours
RPO = up to 2 hours
Risk Mitigation
Page 12
Reducing Data Loss (RPO)
• Traditional Tape Backup 1. File share taken offline at 12:00 am
2. Backed up to tape
3. File share brought back online at 12:30 am
4. Corruption occurs at 4:30 pm
5. Previous night’s tape located
6. File share restored from previous night’s backup tape
7. File share back online at 6:00 pm
16 hours of work is lost!
• Snapshots1. Snapshot of File Share taken every
2 hours 12 am, 2 am, 4 am, 6 am, 8 am, 10 am,
12 pm, 2 pm, 4 pm, 6 pm, etc.
2. Corruption occurs at 4:30 pm
3. File share restored from 4:00 pm snapshot
4. File share back online at 4:45 pm
30 minutes of work is lost!
Risk Mitigation: Lost Revenue and Customer Confidence
Page 13
Improving Recovery Time (RTO)
• Traditional Tape Backup 1. File share taken offline at 12:00 am
2. Backed up to tape
3. File share brought back online at 12:30 am
4. Corruption occurs at 4:30 pm
5. Previous night’s tape located
6. File share restored from previous night’s backup tape
7. File share back online at 6:00 pm
Data unavailable for 1 ½ hours!
• Snapshots1. Snapshot of File Share taken every 2
hours 12 am, 2 am, 4 am, 6 am, 8 am, 10 am,
12 pm, 2 pm, 4 pm, 6 pm, etc.
2. Corruption occurs at 4:30 pm
3. File share restored from 4:00 pm snapshot
4. File share back online at 4:45 pm
Data unavailable for 15 minutes!
Risk Mitigation: Lost Business and Customer Confidence
AssuredSnap Benefits
Page 15
AssuredSnap Benefits1. Minimizes Data Loss
Reduces the data protection interval period (i.e., Improved RPO) Reduces data loss and re-work
2. Improves Data Recovery and Business Continuity Rapid restore to any point-in-time snapshot Improves application and data availability (i.e., Improved RTO)
3. Drastically Reduces Backup Windows From hours to minutes Improves application & data availability
4. Supports Business Analytics & Rapid Application Development Use production data without effecting production data or impacting the production
application Improves quality and timeliness of business decisions Improves application time-to-deployment
5. Satisfies Regulatory Compliance Data is protected and recoverable
Significant Business Impact; Operational and Financial
Page 16
AssuredSnap Benefits
• Risk Mitigation Data Loss
Application & Data Availability
Employee Productivity
Lost Business
Lost Revenue
Lost Customer Confidence
Lost Market Good Will
Customer Satisfaction, Loyalty and Retention
Financial Viability
Significant Business Impact; Risk Mitigation
AssuredSnapQuestions