Защита данных и непрерывная доступность

  • Published on
    19-Jul-2015

  • View
    166

  • Download
    1

Embed Size (px)

Transcript

<p>PowerPoint Presentation</p> <p> Data Protection Solutions 2015# EMC, 2014. . EMC, 2014. .#</p> <p> $1.8 million $45,000 $750 </p> <p> * Enterprise Management Associates - 2012 (- )# EMC, 2014. . EMC, 2014. .Availability is key and the question becomes</p> <p>What is the cost of data loss and downtime? What is the businesses tolerance? Minutes? Hours? Days?</p> <p>How expensive would that be? In terms of Lost Transactions, Lost Productivity, Lost Revenue?</p> <p>Its difficult to know the exact value for your data, but weve found some recent statistics that may surprise you.</p> <p>According to an Enterprise Management Associates study in 2012, outages in US-based data centers cost on average $45,000 per hour. That extrapolates to $750 for every minute and over $1 million per day. Of course, this is just an average and use cases will vary.</p> <p>The source of this comes from a number of areas, including lost revenue, the salaries of employees who may be sitting idle without access to the systems they need to do their job, the IT costs associated with finding and resolving the issues, to the possible penalties and fines paid for lack of governmental or regulatory compliance.</p> <p>The key point is that there is an economic impact associated with downtime, and the costs are tangible. Significant downtime can also impact the reputation of the business, something you cant put a price on and can be very costly to repair.</p> <p>Note to presenter:In order to understand a businesses tolerance to data loss and downtime - ask your customer:</p> <p>What is the impact of downtime on your business? How much does an hour of downtime cost you?How long of an outage would cause a serious problem?What if you lost data in your most critical applications?#</p> <p># EMC, 2014. . EMC, 2014. . LLJJJ LLLJJ LJLLJ KJLJJ LLKJJ LKKJJ LLJJJ LLLJJ LLJJJ / LLJJJ# EMC, 2014. . EMC, 2014. .4# # EMC, 2014. . EMC, 2014. . EMC# EMC, 2014. . EMC, 2014. . </p> <p>VPLEX : 0 : 0 </p> <p>RecoverPoint , : 0 : / </p> <p>Data Domain Data Protection Suite , , : 24 : / 100% # EMC, 2014. . EMC, 2014. . ..</p> <p>Data Protection can be thought of as a pyramid, and each layer a percentage of you applications that require different levels of protection.</p> <p>Note to Presenter: Click now in Slide Show mode for animation.</p> <p>As displayed on this slide, you can see that backup and recovery form the foundation of your Data Protection pyramid and we have spoken about Data Domain &amp; EMCs Data Protection Suite in previous sections. </p> <p>As you know, Backup and recovery provides a nightly full backup to prevent against data corruption, accidental file deletion, storage array failure and site disaster. </p> <p>Backups are fully recoverable point--in--time copies of data, typically performed once per day. </p> <p>You can think of backup and recovery as the minimum required data insurance. </p> <p># 3-2-1</p> <p>Peter Krogh, " ":</p> <p> / </p> <p> # EMC, 2014. . EMC, 2014. .8# # EMC, 2014. . EMC, 2014. .A robust data protection architecture should incorporate technologies and methodologies that follow these four guiding principles</p> <p>Diversification A copy of data should be stored on a different device to the sourceDecoupled A copy of data should be decoupled from the sourceIndependent A copy of data should be physically isolated from the sourceVerified The copies of data should be regularly verified for data integrity and authenticity</p> <p>9# 200% [&gt;10%] </p> <p># EMC, 2014. . EMC, 2014. .</p> <p> - </p> <p>-</p> <p># EMC, 2014. . EMC, 2014. .The current situation in many organizations todayMany of you found that even optimizing the disk centric approach for data protection did not prevent more change occurring in the data protection landscape.</p> <p>Data growth continued to accelerate faster than it could be protected and often at times the teams responsible for the protection of this data could be slow to respond as fast as the owners of the data would like. The result of which is a dissatisfaction or an actual rift between Business and IT. </p> <p>Now you might say this is nothing new. The difference today is that data owners have other alternatives to protecting their data. </p> <p>Click</p> <p>#</p> <p>-</p> <p># EMC, 2014. . EMC, 2014. .So application owners or lines of business go off on their own leaving the IT with less visibility and control then ever before. </p> <p>As a result this can lead to what we call the accidental architecture.You can see the application owners want to be in control of their data protection. So they repurpose plain disk to provide additional repositories for backups.Now this is hardly anything anyone would intentionally plan.#</p> <p># EMC, 2014. . EMC, 2014. .But change is constant, and right now were seeing waves of it.Its a time like never before in IT. Cloud. Big Data. Service-oriented approaches. Backup and archive are not immune its feeling this change. And it has to change itself again.# , # EMC, 2014. . EMC, 2014. .You dont get to be the leader and more importantly you cant maintain leadership with out staying out in front and moving to where the market is heading. </p> <p>We see three big transformational waves. </p> <p>Server-Centric Backup This is the traditional backup market, the largest component of the data protection category. $10B+ and its still growing. It is a market with 100% adoption (who doesnt have backup?), and the participants are all in a ground war to try to displace one another to gain that revenue. It is still a market with innovation e.g. the shift to disk (Data Domain, BOOST, Avamar), dealing with service providers, etc. EMC is the leader in this market and is continuing to grow and gain share. We expect to continue to do so.Infrastructure-Centric Data Protection. This is an increasingly strong market $2B+. This market is characterized by two big shifts. First - we are no longer talking about backup alone, but about data protection disaster recover, backup, and archive. The customers want to reduce the number of copies AND the set of processes that they manage. Second, the management of the protection process becomes more embedded in the infrastructure. Today, we see a lot of revenue in the storage-centric aspect of the market either NAS administrators managing their own protection, or delivering storage services (snapshots, deduplication) to application administrators. Over time, we believe that the application administrator will interface with the VM admin, rather than directly with the storage administrator because the VM admin will interface with the storage admin for services and capabilities. We see this wave as driving toward the converged infrastructure stacks that are gaining momentum in the industry.Cloud-Centric Data Management. This is an incipient market that is still being defined and explored e.g. backup as a service, sync n share, archival as a service, cloud bursting, etc. This market is also characterized by 2 significant shifts. First, we are no longer talking about data protection, but full data management. This includes protection, distributed access across geographies and devices, and on-demand data access (e.g. for test &amp; development). The customers expect an ever fuller reduction in the number or copies and processes to manage the application team should simply have access to the right data at the right time in the right form. Second, the management process becomes even more transparent truly SLA driven. The teams should have little concern over the physical infrastructure even whether that infrastructure is on/off premise. We see this wave as driving toward truly realizing the virtualization of the infrastructure of the environment compute, network, storage across the entire environment.#</p> <p> # EMC, 2014. . EMC, 2014. .How is EMC helping customers to stay ahead of these waves and help transform data protection into a real business enabler? It helps to put this into context by looking at this as an evolution over time, where we have been and where we are heading. Also the disruptive factors that are influencing the evolution, which by they way are not just technology oriented. This evolution can be thought of as phases but not necessarily always followed in this order. And as you will note, evolves from backup to data protection and ultimately data management. #</p> <p> Microsoft System Center ExchangeMicrosoft System Center SQL ServerOracle RMANSAP HANA StudioVMWare vCenter</p> <p> # EMC, 2014. . EMC, 2014. .This is the model we want to achieve in the infrastructure centric data protection wave. Consolidating data protection storage across backup, DR and archive. Protection process more embedded in the infrastructure allowing the choice of application, hypervisor and storage user interfaces. Overarching management services for visibility and ease of management.</p> <p>Continue to enable Protection as a service SLA based, self service, enterprise wide visibility</p> <p># : , BCDEFLGHABCDEFGHIJ, ABDAEFG, ABH, BI, ACK, EGJ , 50 710 5, 50 710 5KL, 50 710 5, 50 710 5 , 1T 5060 18 2,2 7,6 288 , 1T 24250# EMC, 2014. . EMC, 2014. .A technology overview of data deduplication will help illustrate how you can store more backups in a smaller footprint with Data Domain.Note to Presenter: Click now in Slide Show mode for animation.On Friday, the backup application initiates the first full backup of 1 TB, but only 250 GB is stored on Data Domain. This occurs because as the data stream is coming into Data Domain, the system is deduplicating before storing data to disk. On average this results in a two- to four-times reduction in data on a first full backup. Note to Presenter: Click now in Slide Show mode for animation.Over the course of the week, 50 GB daily incremental backups result in a seven- to 10-times reduction and only require 5 GB to be stored. As the graphic on the left shows, during the week incremental backups contain data that was already protected from the first full backup.Note to Presenter: Click now in Slide Show mode for animation.Finally, on the second Friday, the second full backup contains almost all redundant data. Therefore of the 1 TB backup dataset, only 18 GB needed to be stored.In total over the course of a week, 2.2 TB of data was backed up to Data Domain, but the system only required 288 GB of capacity to protect this dataset. Overall, this resulted in a 7.6-times reduction in one week.</p> <p># Data Domain CIFS, NFS, NDMP, DD Boost, Ethernet</p> <p> Library (VTL) DD Boost Fibre Channel Data Domain Data Domain</p> <p>EMCSymantecCommVaultEMCSymantecCommVaultVMwareHPIBMHPDellOpenTextOraclePivotalSQLSAPHANADB2# EMC, 2014. . EMC, 2014. .Now lets take a closer look at the Data Domain storage system itself moving from the outside in.This is a picture of what you would see in a Data Domain deployment. A Data Domain appliance is a storage system with shelves of disks and a controller. Its optimized, first to back up and second to archive applications, and supports the industry-leading backup, archiving and enterprise applications. The list on the left is composed primarily of leading backup, archive, and enterprise applicationsnot only EMCs offerings with EMC NetWorker &amp; SourceOne, but also Symantec, CommVault, Oracle and so onOn the way into the storage system, data can pass through either Ethernet or Fibre Channel. With Ethernet, it can use mass protocols and NFS or CIFS; it can also use optimized protocols or products, such as Data Domain Boost, a custom integration with leading backup applications. Fibre Channel connectivity enables a Data Domain system to act as a virtual tape library or you can use DD Boost over Fibre Channel to eliminate virtual tape management. After the data is stored and its deduplicated during the storage process, it can replicate for disaster recovery. Only the compressed deduplicated unique data segments that have been filtered out through the right process on the target tier are replicated. # Data Domain Data Invulnerability Architecture # EMC, 2014. . EMC, 2014. .Data Domain systems are designed as the storage of last resort built to ensure you can reliably recover your data with confidence. The EMC Data Domain Data Invulnerability Architecture is built into every Data Domain system to provide the industrys best defense against data integrity issues. Inline right and read verification protects against and automatically recovers from data integrity issues during data ingest and retrieval so data is stored correctly. Continuous fault detection and self healing ensure data stays correct and returns correctly so that data is recoverable and accessible throughout its lifecycle on a Data Domain system.</p> <p># Data Domain </p> <p>Data Domain Boost 50%Data Domain Encryption Data Domain Extended Retention 100 Data Domain Replicator 270 Data Domain Retention Lock </p> <p>Data Domain Virtual Tape Library IBM i</p> <p># EMC, 2014. . EMC, 2014. .EMC offers six different Data Domain software options that can enhance the value of a Data Domain system in your environment. The first is Data Domain Boost, which provides advanced integration with backup and enterprise applications for increased performance and ease of use.DD Replicator software provides network-efficient, encrypted replication for backup, archive and disaster recovery. In addition, you can replicate up to 270 remote sites into a single Data Domain system for consolidated protection of your distributed enterprise.DD Encryption software enhances the security of backup and archive data that resides on EMC Data Domain deduplication storage systems with encryption that is performed inlinebefore the data is written to disk. Encrypting data at rest satisfies internal governance rules and compliance regulations and protects against theft or loss of a physical system.DD Extended Retention software, which enables long-term retention of backup data on the higher end Data Domain systems with up to 100 PB of logical capacity. DD Retention Lock software provides governance and compliance retention to satisfy IT governance and compliance standards including SEC 17a-4(f) for archive data. Finally, DD Virtual Tape Library software provides high-speed, inline deduplication for storage area network (SAN) environments and eliminates tape-related failures by enabling all Data Domain systems to emulate multiple tape devices over a Fibre Channel interface. #Data Domain Boost 2014AppServer</p> <p>Backup Server</p> <p>AvamarNetWorkerNetBackupBackup ExecvRangerNetVaultData ProtectorRMANSAPSAPHANADB2SQL</p> <p>GreenplumDD Boost SANDD Boost LAN</p> <p>VDP Advanced</p> <p>DD Boost WAN</p> <p>VeeamNEWNEW# EMC, 2014. . EMC, 2014. .Here is a view of the full DD Boost Ecosystem, which conti...</p>

Recommended

View more >