Download presentation
Presentation is loading. Please wait.
Published byCornelius Holt Modified over 9 years ago
1
www.doubletake.com Double-Take Software Overview A Platform for Recoverability
2
www.doubletake.com Agenda Introduction to Double-Take Software Double-Take Software Products and Technology Client testomonial Q & A
3
www.doubletake.com About Double-Take Software, Inc. Headquartered in Southborough, MA Worldwide Reach - North America, South America, Europe, Pacific Rim Focused on the protection of business-critical applications –125,000 licenses of Double-Take in over 10,000 customers –35,000+ licenses protecting Exchange –35,000+ licenses to protecting SQL Comprehensive Professional Services Offerings Prestigious Microsoft Certifications Leading Provider of Software Solutions for Recoverability Including Continuous Data Replication, Application Availability and System State Protection.
4
www.doubletake.com Your Solution Needs What challenges are you facing in your DR plan? What types of servers do you want to protect? About how much data do you have to protect? Have you chosen a DR Site? What kind of connection will you have? Do you have an RTO and RPO defined?
5
www.doubletake.com The Keys to Recoverability Replication Host-based, real-time, byte-level, asynchronous replication across any distance with WAN optimization to minimize bandwidth usage and requirements Failover Real-time monitoring for automatic or manual failover for individual applications, file shares, and whole servers - locally or remotely Recovery Recover data or entire servers over any distance while users remain online, with minimum downtime
6
www.doubletake.com Data Protection System Friendly Asynchronous Replication –Low CPU Overhead –Defined Memory and Disk Usage –Write Order Intact Replication Bandwidth Friendly Data Movement –User-definable Replication Sets –Compression, Scheduling, Scheduled Bandwidth Throttling capabilities Point-in-Time Recovery –Integration w/Volume Shadow Copy Services
7
www.doubletake.com Double-Take – Technology Overview Applications OS Disk Systems Source Applications OS Disk Systems Target Double-Take Filter
8
www.doubletake.com Double-Take – Technology Overview Protected File? Write or Change? Applications OS Disk Systems Source Yes No I/O Operations examined in Kernel Memory
9
www.doubletake.com Double-Take – Technology Overview Applications OS Disk Systems Target Always: Same I/O order Same Data Same File Option: Different Directory
10
www.doubletake.com Double-Take – Queuing and Error Correction Rcv Queue Ack Queue Send Queue
11
www.doubletake.com Failover Solutions Application-Level Failover (RTO = ~30min) –Applications like Exchange, SQL and File Servers using the Application Manager capabilities –Works with Cluster-based Deployments Full-Server Failover (RTO = ~30min) –Custom-developed applications or applications dependent on system state information –Replicate and Failover OS, Applications and Data –Works for all stand-alone Windows Servers –Assists in One-to-One Server Migrations
12
www.doubletake.com How Application Failover Works Failover Monitoring Replication IP ICMP or Heartbeat Monitoring Detect Failure in Seconds or Minutes Application Services Started Failover Name, IP and/or DNS Records Failover Active Directory Hostname Users can reconnect within minutes of failure Failover can occur across a LAN, WAN and even NAT Failover more than one Server Identity to the Same Target Server Failover Scripting for Custom Configurations Source Target
13
www.doubletake.com How Application Failback Works Failover Monitoring Restoration Source Target Recover or Replace Source Server Restore Data to the Source Server Failback Source Identity Bring Source Application Online Users Reconnect Within Minutes Start Replication and Resume Failover Monitoring for Continued Protection Replication
14
www.doubletake.com How Full-Server Failover Works OS and Applications Data Volumes User and Application Data Staging Area
15
www.doubletake.com Server Recovery Option Tier 2/Tier 3 Server Recovery (RTO = 4-24 hours) Same Recovery Type as FFO Local, Remote or Both Restore to Physical or Virtual Systems Assists with “Swing-Server” Migrations
16
www.doubletake.com Double-Take Server Recovery Option Protect Multiple Production Servers With One SRO Image Server Recover Back to the Original Server, to New Hardware, or to a Virtual Machine
17
www.doubletake.com Double-Take Virtual Recovery Assistant Protect physical or virtual servers directly into VMWare.VMDK files with real-time replication Protect the entire server including the OS, applications and data Protect multiple source servers with a single virtual target server Failover automatically or manually within minutes Lower TCO with virtualization and many-to-one consolidation.
18
www.doubletake.com Virtual Recovery Assistant FS-System.vmdk FS-Data.vmdk EX-System.vmdk EX-Data.vmdk DB-System.vmdk DB-Data.vmdk C: System.vmdk DT-VRA FS-System FS-Data File Server Exchange Database C: E: EX-System.vmdk EX-Data.vmdk DB-System.vmdk DB-Data.vmdk C: System.vmdk DT-VRA FS-System.vmdk FS-Data.vmdk File Server C: E: EX-System EX-Data C: E: DB-System DB-Data C: E:
19
www.doubletake.com How DTVI Works Must be running ESX Server 3.0.0 and VMware VirtualCenter 2.0.0 Leverages VMware APIs for virtual machine snapshot functionality Snapshots include the entire VM (OS, Apps, Data) and can be used with a non-Windows Guest OS Snapshots are time-coherent across all virtual disks configured for a protected virtual machine Extends staging of virtual machines across geographical boundaries (WAN replication)
20
www.doubletake.com *-delta.vmdk *.vmsd *-delta.vmdk *.vmsd Replicating (SCP) *-delta.vmdk *.vmsd How DTVI Works *.vmdk *-flat.vmdk *.vmx Synchronizing (SCP) Committing (remove_snapshot) Source VM Files Replica VM Files Administrative Client Source ESX Server Datastore (Source) Target ESX Server Datastore (Target) SSH Web Services *.vmdk *-flat.vmdk *.vmx Monitoring (Time/Size)
21
www.doubletake.com Greg Saraydarian Financial Services Organization
22
www.doubletake.com Customer Solution Solution set for data protection and availability Used: –Double-Take Replication –Double-Take Application Manager Protecting/has protected several versions of Exchange Server
23
www.doubletake.com Q&A
24
www.doubletake.com Thanks! For More Information http://www.double-take.com You may close the webinar window at any time.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.