VERITAS Confidential Disaster Recovery – Beyond Backup Jason Phippen – Director Product and Solutions Marketing, EMEA.

Slides:



Advertisements
Similar presentations
NetApp Confidential - Limited Use
Advertisements

Information Technology Disaster Recovery Awareness Program.
Business Plug-In B4 MIS Infrastructures.
© 2010 IBM Corporation ® Tivoli Storage Productivity Center for Replication Billy Olsen.
Elements of Business Continuity Disaster Recovery Recover mission-critical technology and applications at an alternate site. Business Recovery Recover.
SQL Server Disaster Recovery Chris Shaw Sr. SQL Server DBA, Xtivia Inc.
Protect Your Business and Simplify IT with Symantec and VMware Presenter, Title, Company Date.
Business Continuity Section 3(chapter 8) BC:ISMDR:BEIT:VIII:chap8:Madhu N PIIT1.
Data Protection, Availability and Replication Andreas Tsangaris CTO, Performance Technologies.
1EMC CONFIDENTIAL—INTERNAL USE ONLY Overview of SQL Server 2012 High Availability and Disaster Recovery (HADR) Wei Fan Technical Partner Management – Microsoft.
© 2009 EMC Corporation. All rights reserved. Introduction to Business Continuity Module 3.1.
High Availability Group 08: Võ Đức Vĩnh Nguyễn Quang Vũ
1 Disk Based Disaster Recovery & Data Replication Solutions Gavin Cole Storage Consultant SEE.
Copyright ©2003 Digitask Consultants Inc., All rights reserved Storage Area Networks Digitask Seminar April 2000 Digitask Consultants, Inc.
Oracle Data Guard Ensuring Disaster Recovery for Enterprise Data
Disaster Recovery in IT David Irakiza CSC 585-High Availability and Performance Computing 2012.
Determining BC/DR Methods Recovery Time Objective – (RTO) Time needed to recover from a disaster How long can you afford to be without your systems Recovery.
1 © Copyright 2010 EMC Corporation. All rights reserved. EMC RecoverPoint/Cluster Enabler for Microsoft Failover Cluster.
Keith Burns Microsoft UK Mission Critical Database.
Disaster Prevention and Recovery Presented By: Sean Snodgrass and Theodore Smith.
1 Choosing Disaster Recovery Solution for Database Systems EECS711 : Security Management and Audit Spring 2010 Presenter : Amit Dandekar Instructor : Dr.
Module – 12 Remote Replication
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES CHAPTER.
1© Copyright 2011 EMC Corporation. All rights reserved. EMC RECOVERPOINT/ CLUSTER ENABLER FOR MICROSOFT FAILOVER CLUSTER.
SQL Server 2012 Always On Premier Field Engineer Microsoft Corporation Lisa Gardner
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE
IBM TotalStorage ® IBM logo must not be moved, added to, or altered in any way. © 2007 IBM Corporation Break through with IBM TotalStorage Business Continuity.
Building Highly Available Systems with SQL Server™ 2005 Vineet Gupta Evangelist – Data and Integration Microsoft Corp.
Disaster Recovery as a Cloud Service Chao Liu SUNY Buffalo Computer Science.
Business Continuity & Disaster Recovery Daniel Griggs Solutions Architect Ohio Valley September 30, 2008.
But what if there is a catastrophic event? Fire, flood, earthquake …
Enhanced HA and DR with MetroCluster & Vmware
Implementing Multi-Site Clusters April Trần Văn Huệ Nhất Nghệ CPLS.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
1© Copyright 2014 EMC Corporation. All rights reserved. ORACLE CONTINUOUS AVAILABILITY NOVEMBER 2014.
CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES
© Novell, Inc. All rights reserved. 1 PlateSpin Protect Virtualize your Disaster Recovery.
DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection.
Virtualization for Storage Efficiency and Centralized Management Genevieve Sullivan Hewlett-Packard
Continuous Access Overview Damian McNamara Consultant.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Storage 101: Bringing Up SAN Garry Moreau Senior Staff Alliance Consultant Ciena Communications (763)
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
Hosted by Why You Need a Storage Management Organization Ray Paquet Vice President & Research Director Gartner.
1 Nassau Community CollegeProf. Vincent Costa Session 7 Infrastructures Sustainable Technologies CMP 117 Business Computing: Concepts &Applications.
Storage Trends: DoITT Enterprise Storage Gregory Neuhaus – Assistant Commissioner: Enterprise Systems Matthew Sims – Director of Critical Infrastructure.
Availability on Demand (Business Continuity and DR, and more…)
VERITAS Confidential Copyright © 2005 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS Logo and all other VERITAS product names.
Business Continuity Overview
Enhancing Scalability and Availability of the Microsoft Application Platform Damir Bersinic Ruth Morton IT Pro Advisor Microsoft Canada
TRUE CANADIAN CLOUD Cloud Experts since The ORION Nebula Ecosystem.
DISASTER RECOVERY PLAN By: Matthew Morrow. WHAT HAPPENS WHEN A DISASTER OCCURS  What happens to a business during a disaster?  What steps does a business.
Narasimha Reddy Gopu Jisha J. Agenda Introduction to AlwaysOn * AlwaysOn Availability Groups (AG) & Listener * AlwaysOn Failover * AlwaysOn Active Secondaries.
SWIFT Business Continuity & Connectivity
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Deploying Highly Available SAP in the Cloud
Windows Server Failover Clustering (WSFC) with SQL Server.
Database recovery contd…
Module – 9 Introduction to Business continuity
iSCSI Storage Area Network
Determining BC/DR Methods
Navigating the options for Data Redundancy
A Technical Overview of Microsoft® SQL Server™ 2005 High Availability Beta 2 Matthew Stephen IT Pro Evangelist (SQL Server)
CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE
Disaster Recovery Services
Business Continuity Technology
Storage Trends: DoITT Enterprise Storage
Using the Cloud for Backup, Archiving & Disaster Recovery
Designing Database Solutions for SQL Server
Presentation transcript:

VERITAS Confidential Disaster Recovery – Beyond Backup Jason Phippen – Director Product and Solutions Marketing, EMEA

VERITAS Confidential Agenda Disaster Recovery Concepts Backup – Last Line of Defence Enhancing Backup with Replication Remote Site Replication and Mirroring Clustering for Disaster Recovery Questions

VERITAS Confidential Recovery Point Objective (RPO) – Point in time to which applications data must be recovered to resume business transactions Recovery Time Objective (RTO) – Maximum elapsed time allowed before lack of business function severely impacts an organization Disaster Recovery Concepts DaysMinsHrsWksSecs Recovery Point MinsDaysHrsSecsWks Recovery Time

VERITAS Confidential How much data loss can you endure? Recovery Point Objective (RPO) Tape Backup w/ Offsite Vaulting Replication MinsDaysHrsSecsWksDaysMinsHrsWksSecs Recovery Point Recovery Time

VERITAS Confidential How much downtime can you endure? Recovery Time Objective (RTO) Recovery from Tape Geographic Clustering MinsDaysHrsSecsWksDaysMinsHrsWksSecs Recovery Point Recovery Time

VERITAS Confidential “Far Enough” away –How far away from the main site? –What resources should it have? Site Strategies (Hot, Warm, Cold) Considerations –Fault zones –Flood plains –Power grids –Climate zones –Locality relative to other sites (e.g., airport) –Remote customers and employees Choosing a Recovery Site

VERITAS Confidential Backup – Your last line of Defense Redundant systems replicate user errors, viruses and data corruption System or component redundancy (RAID, mirroring) cannot replace backup Backup tapes may represent the last valid copy of data Backups are your last line of defense against total data loss

VERITAS Confidential Enhancing Backup with Replication

VERITAS Confidential Replicating the Backup Catalog server –Shave hours off a tape restore strategy –No need to re-catalog tapes –No need to rebuild the backup/restore server –Tape restores can begin immediately Backup Tape Copies Sent to Offsite Site ASite B Backup Clients Backup Master/Media Server Replicate Backup Catalogs Replication-enhanced Backup

VERITAS Confidential Remote Site Replication and Mirroring

VERITAS Confidential Replication and Mirroring Key Requirements… Must be “far enough” away No windows of data corruption at secondary Synchronous Asynchronous Recovery Point MinutesDays Hours SecondsWeeks

VERITAS Confidential Strengths Maximum data currency (RPO) Data available immediately at secondary (RTO) Weaknesses Potential to impact application performance Data writes lag by network latency Write commit latency across nodes Primary Site Secondary Site Synchronous Replication

VERITAS Confidential Strengths Maximum performance May have less application impact Data available immediately at secondary (RTO) Weaknesses Secondary may lag primary (RPO) Potential for data corruption (not a weakness for VERITAS) Primary Site Secondary Site Asynchronous Replication

VERITAS Confidential Secondary Site Application Volume Manager SAN Fabric Lower hardware costs –Groups physical disks into logical volumes –Hardware Independence, Greater IT productivity –Simplified administration of heterogeneous environments –Proactive management of applications Increased application ROI Can mirror over SAN distances Primary Site Logical Volume Management Remote Mirroring

VERITAS Confidential Clustering for Disaster Recovery

VERITAS Confidential Campus / MAN Disaster Recovery WAN Disaster Recovery Clustering for Disaster Recovery WAN Clustering, Replication, Global Clustering MAN Clustering, Replication Clustering, Remote Mirroring OR

VERITAS Confidential Campus / MAN Disaster Recovery St-r-e-t-c-h Cluster Over A SAN * Distance may vary depending upon infrastructure

VERITAS Confidential Global Global Clustering Geographically dispersed sites linked by public carrier wide area network Each site aware of the configuration and state of all of the sites Direct site level migration in event of catastrophe Global Availability Management Single point of monitoring and administration

VERITAS Confidential Replication Site Migration Wide Area Availability Application Clustering Global Clustering Application Clustering Global Clustering Application Clustering Global Clustering Failover

VERITAS Confidential VERITAS Cluster Server Volume Manager/ Foundation Suite NetBackup/ Backup Exec VERITAS Global Cluster Manager VERITAS Volume Replicator - NetBackup Vault - BMR / IDR Local Multi-site Availability Requirements VERITAS: Uniquely Qualified (HA and DR)

VERITAS Confidential Questions