Защита данных и непрерывная доступность

Embed Size (px)

Text of Защита данных и непрерывная доступность

PowerPoint Presentation

Data Protection Solutions 2015# EMC, 2014. . EMC, 2014. .#

$1.8 million $45,000 $750

* Enterprise Management Associates - 2012 (- )# EMC, 2014. . EMC, 2014. .Availability is key and the question becomes

What is the cost of data loss and downtime? What is the businesses tolerance? Minutes? Hours? Days?

How expensive would that be? In terms of Lost Transactions, Lost Productivity, Lost Revenue?

Its difficult to know the exact value for your data, but weve found some recent statistics that may surprise you.

According to an Enterprise Management Associates study in 2012, outages in US-based data centers cost on average $45,000 per hour. That extrapolates to $750 for every minute and over $1 million per day. Of course, this is just an average and use cases will vary.

The source of this comes from a number of areas, including lost revenue, the salaries of employees who may be sitting idle without access to the systems they need to do their job, the IT costs associated with finding and resolving the issues, to the possible penalties and fines paid for lack of governmental or regulatory compliance.

The key point is that there is an economic impact associated with downtime, and the costs are tangible. Significant downtime can also impact the reputation of the business, something you cant put a price on and can be very costly to repair.

Note to presenter:In order to understand a businesses tolerance to data loss and downtime - ask your customer:

What is the impact of downtime on your business? How much does an hour of downtime cost you?How long of an outage would cause a serious problem?What if you lost data in your most critical applications?#

# EMC, 2014. . EMC, 2014. . LLJJJ LLLJJ LJLLJ KJLJJ LLKJJ LKKJJ LLJJJ LLLJJ LLJJJ / LLJJJ# EMC, 2014. . EMC, 2014. .4# # EMC, 2014. . EMC, 2014. . EMC# EMC, 2014. . EMC, 2014. .

VPLEX : 0 : 0

RecoverPoint , : 0 : /

Data Domain Data Protection Suite , , : 24 : / 100% # EMC, 2014. . EMC, 2014. . ..

Data Protection can be thought of as a pyramid, and each layer a percentage of you applications that require different levels of protection.

Note to Presenter: Click now in Slide Show mode for animation.

As displayed on this slide, you can see that backup and recovery form the foundation of your Data Protection pyramid and we have spoken about Data Domain & EMCs Data Protection Suite in previous sections.

As you know, Backup and recovery provides a nightly full backup to prevent against data corruption, accidental file deletion, storage array failure and site disaster.

Backups are fully recoverable point--in--time copies of data, typically performed once per day.

You can think of backup and recovery as the minimum required data insurance.

# 3-2-1

Peter Krogh, " ":

/

# EMC, 2014. . EMC, 2014. .8# # EMC, 2014. . EMC, 2014. .A robust data protection architecture should incorporate technologies and methodologies that follow these four guiding principles

Diversification A copy of data should be stored on a different device to the sourceDecoupled A copy of data should be decoupled from the sourceIndependent A copy of data should be physically isolated from the sourceVerified The copies of data should be regularly verified for data integrity and authenticity

9# 200% [>10%]

# EMC, 2014. . EMC, 2014. .

-

-

# EMC, 2014. . EMC, 2014. .The current situation in many organizations todayMany of you found that even optimizing the disk centric approach for data protection did not prevent more change occurring in the data protection landscape.

Data growth continued to accelerate faster than it could be protected and often at times the teams responsible for the protection of this data could be slow to respond as fast as the owners of the data would like. The result of which is a dissatisfaction or an actual rift between Business and IT.

Now you might say this is nothing new. The difference today is that data owners have other alternatives to protecting their data.

Click

#

-

# EMC, 2014. . EMC, 2014. .So application owners or lines of business go off on their own leaving the IT with less visibility and control then ever before.

As a result this can lead to what we call the accidental architecture.You can see the application owners want to be in control of their data protection. So they repurpose plain disk to provide additional repositories for backups.Now this is hardly anything anyone would intentionally plan.#

# EMC, 2014. . EMC, 2014. .But change is constant, and right now were seeing waves of it.Its a time like never before in IT. Cloud. Big Data. Service-oriented approaches. Backup and archive are not immune its feeling this change. And it has to change itself again.# , # EMC, 2014. . EMC, 2014. .You dont get to be the leader and more importantly you cant maintain leadership with out staying out in front and moving to where the market is heading.

We see three big transformational waves.

Server-Centric Backup This is the traditional backup market, the largest component of the data protection category. $10B+ and its still growing. It is a market with 100% adoption (who doesnt have backup?), and the participants are all in a ground war to try to displace one another to gain that revenue. It is still a market with innovation e.g. the shift to disk (Data Domain, BOOST, Avamar), dealing with service providers, etc. EMC is the leader in this market and is continuing to grow and gain share. We expect to continue to do so.Infrastructure-Centric Data Protection. This is an increasingly strong market $2B+. This market is characterized by two big shifts. First - we are no longer talking about backup alone, but about data protection disaster recover, backup, and archive. The customers want to reduce the number of copies AND the set of processes that they manage. Second, the management of the protection process becomes more embedded in the infrastructure. Today, we see a lot of revenue in the storage-centric aspect of the market either NAS administrators managing their own protection, or delivering storage services (snapshots, deduplication) to application administrators. Over time, we believe that the application administrator will interface with the VM admin, rather than directly with the storage administrator because the VM admin will interface with the storage admin for services and capabilities. We see this wave as driving toward the converged infrastructure stacks that are gaining momentum in the industry.Cloud-Centric Data Management. This is an incipient market that is still being defined and explored e.g. backup as a service, sync n share, archival as a service, cloud bursting, etc. This market is also characterized by 2 significant shifts. First, we are no longer talking about data protection, but full data management. This includes protection, distributed access across geographies and devices, and on-demand data access (e.g. for test & development). The customers expect an ever fuller reduction in the number or copies and processes to manage the application team should simply have access to the right data at the right time in the right form. Second, the management process becomes even more transparent truly SLA driven. The teams should have little concern over the physical infrastructure even whether that infrastructure is on/off premise. We see this wave as driving toward truly realizing the virtualization of the infrastructure of the environment compute, network, storage across the entire environment.#

# EMC, 2014. . EMC, 2014. .How is EMC helping customers to stay ahead of these waves and help transform data protection into a real business enabler? It helps to put this into context by looking at this as an evolution over time, where we have been and where we are heading. Also the disruptive factors that are influencing the evolution, which by they way are not just technology oriented. This evolution can be thought of as phases but not necessarily always followed in this order. And as you will note, evolves from backup to data protection and ultimately data management. #

Microsoft System Center ExchangeMicrosoft System Center SQL ServerOracle RMANSAP HANA StudioVMWare vCenter

# EMC, 2014. . EMC, 2014. .This is the model we want to achieve in the infrastructure centric data protection wave. Consolidating data protection storage across backup, DR and archive. Protection process more embedded in the infrastructure allowing the choice of application, hypervisor and storage user interfaces. Overarching management services for visibility and ease of management.

Continue to enable Protection as a service SLA based, self service, enterprise wide visibility

# : , BCDEFLGHABCDEFGHIJ, ABDAEFG, ABH, BI, ACK, EGJ , 50 710 5, 50 710 5KL, 50 710 5, 50 710 5 , 1T 5060 18 2,2 7,6 288 , 1T 24250# EMC, 2014. . EMC, 2014. .A technology overview of data deduplication will help illustrate how you can store more backups in a smaller footprint with Data Domain.Note to Presenter: Click now in Slide Show mode for animation.On Friday, the backup application initiates the first full backup of 1 TB, but only 250 GB is stored on Data Domain. This occurs because as the data stream is coming into Data Domain, the system is deduplicating before storing data to disk. On average this