why your backup/recovery solution probably isn’t good enough - … · appt0512wbtt • netvault...
TRANSCRIPT
Why Your Backup/Recovery Solution Probably Isn’t Good Enough
“Whatever can go wrong, will go wrong.”
“Whatever can go wrong, will go wrong.”
4 Confidential
Are you prepared?
10/2
8/20
13
Not Prepared
50% of all data restored fail
All data is lost
Restored ?
18.5 Hours downtime
Decreased productivity
$5,600/Min costs
50%
Complex
Virtual
Mission Critical
@
!
@
!
5 Confidential
Complex Infrastructures
Complex IT infrastructures present new data protection challenges
Remote office
Scarce IT staff, space, time and bandwidth resources
Cloud
Big & dynamic data volumes, multi clients
Virtual
Highly consolidated environments, virtual sprawl
SAN & NAS
Exponential growth of highly redundant data
Applications
Complex and high load data volumes, fault-tolerant architectures
Growing data Compliance 24x7x365 Operations
Where are your pain points?
7
57%
Of all new server workloads are virtualized
Source: Gartner1
1 Gartner, Inc., “Best Practice: Virtualize Your IT Systems Incrementally to Reduce Costs,” G00218910. Philip Dawson, September 23, 2011
2 Virtualization Data Protection Report 2013 Vanson Bourne, an independent market research organization
Virtualization creating new protection problems
Missed or unambitious SLAs, cost and complexity still vex you.
71% of organizations recover more than needed because they lack granular recovery. 2
Recovery time for a virtual server can take 5 hours or more. 2
68% of organizations see increasing recovery times as virtualization increases 2
Most organizations have separate backup and disaster recovery1
Confidential 8
“There are two fundamental considerations when implementing a failproof backup and recovery capability: how quickly the organization needs to recover the data and how much data it can afford to lose.
The challenge is finding the balance between data protection/recovery and the amount of investment required.”
David Vellante, Wikibon
“Implementing fail proof backup and recovery” January 2009
Understanding RPO and RTO Objectives
Customers require a protection solution that spans a wide range of RPOs and RTOs
2 AM 3 AM 4 AM 5 AM 6 AM 7 AM 8 AM 9 AM 10 AM 11 AM 12 PM 1 PM 2 PM 3 PM
• Near CDP
• Nightly Backups
• Failover to replicated VM within minutes or Live recovery
RPO Hours Seconds
OU
TA
GE
RTO Seconds Hours
• Traditional Restore
• Storage Snapshots • Restore from snapshots
Understanding RPO and RTO Objectives
Why not have CDP for the entire infrastructure?
• Near CDP solutions require additional time, effort and money to deploy
• Many systems don’t need to be recovered to the point of failure as they contain static data
• Nightly backup and recovery solutions for those systems can save time and money protecting stable data
• The Holy Grail of near-real time CDP is being able to recover to any point in time in seconds – not just to the point of failure
Business Vital
Static Mission Critical
Data Protection
Requirements
Data Protection
Approaches
Data & Applications Classification
• Back up to tape
• Archive data
• RTO 6-24 Hours
• RPO 2-12 Hours
• Some regulations
• RTO < 15 Minutes
• RPO < 15 Minutes
• Strict regulations
• Instant Recovery
• Disk-based backup
• Backup to tape
• Bare metal recovery
• Fast recovery
• Disk-based backup
• Backup to tape
• Bare metal recovery
• RTO < 72 Hours
• RPO < 1 Day
• Limited regulations
Create your data protection strategy
12
Balancing asset value against availability costs
Cost / Risk
RTO RPO
Cost of
Data
Availability
Cost of
System
Availability
Ideal solution
Hours to restore data Hours of lost data
Seconds Hours Hours
Risk of
Data Loss
Risk of
System
Downtime
Op
tio
n:
pre
sen
t o
n w
hit
eb
oard
This
slid
e h
as
an
imati
on
The lower the RPO/RTO requirements, the greater the cost of meeting them
The higher the RPO/RTO requirements, the greater the risk of data loss & system downtime
The ideal solution meets or exceeds RPO/RTO requirements for a cost that does not exceed the value of the assets, the cost of downtime
The risk versus cost conundrum
Align protection strategies with application value
Standardize, consolidate & converge infrastructure
Automate & modernize; add self-protecting storage
Address whole picture – people, process, technology
Minimize data captured, moved, stored & protected
This
slid
e is
a b
uild
(p
rese
nte
r ad
van
ce
s)
Our point of view for data protection
End-to-end data protection solutions
Modular, scalable systems
Tape De-dupe Snapshots CDP Replication Disk Integration
Consulting, support & service
Backup & recovery Self-protecting storage
Built on a modern data protection platform
Reduce data loss Protect large environments Improve recovery times
Protect continuously, move anywhere, recover everything.
Back up and restore VMs at same time – without limits.
Protect large volumes of data across a wide range of platforms and
applications.
Recover from system failure in
15 min or less
Scale to protect data on
100s and 1000s servers
Generate recovery points every
5 mins
Protect everything. Every time. On time.
Protect continuously, move anywhere, & recover everything in as little as seconds every time.
Protect Virtual or physical; Up to 288 snapshots/day; Bootable virtual standby; No Backup Window
Recover from system failure in 15 minutes or less.
Move WAN-optimized replication; Built-in replication workflows; Customizable
Recover Physical, virtual or cloud; Instantaneous & granular restore; Validate nightly; Track & monitor
Dell AppAssure
AppAssure offers:
• Block level incremental backups for Windows,
Linux, & virtual environments, including SQL,
Exchange & SharePoint
• Auto-verifies protected apps
• Advanced deduplication & compression
Enhances your environment:
• Ensure recoverability of apps & data
• Provide users near-immediate access to critical
applications after an outage
l
AppAssure
Take Backup as frequent as every 5 minutes
Ultra Fast Restores
AppAssure Agents capture changed blocks to allow very frequent backup of data Technology ensures minimal impact on protected machine
All other processing (deduplication/compression/encryption) is done on the backup server
DAS/SAN/iSCSI
Dedupe Compression
Encryption
AppAssure Core
Protected hosts & applications
Physical
Virtual
Snapshot
Make data available within minutes through AppAssure Live Recovery Administrators can bring applications back online within minutes after the restore process has started. Through the use of Smart Agents technology it is possible to hide the complete restore process from the end-user. Data will be available within minutes after the restore process has started, regardless of the volume.
Users access data immediately”
Virtual Standby VM (continually
updated)
Protected hosts & applications
Physical
Virtual
AppAssure Core
Virtual Standby Administrators can use backups of any physical or virtual system to create a warm standby virtual machine.
Use Case – AppAssure
a
Fast, scalable, simple-to-use VMware data protection
Backup High-speed, scalable backup of VMware virtual infrastructures and physical Windows servers
Replicate Cost-effective data replication of key VMs and clusters provides failover/failback between primary and DR sites
Recover Catalog search and fast restore for VMs, physical servers, and even individual files
vRanger offers:
• Deep VMware integration automatically discovers
and protects new VMs
• Virtual infrastructure and physical Windows server
backup/restore from one easy-to-use interface
• Patented Active Block Mapping (ABM) and backup
to Dell and 3rd party deduplication solutions
Enhances your environment:
• Minimize time and risk of managing VMware virtual
infrastructures
• Reduce backup storage requirements and shorten
restore times
Dell vRanger
AppAssure
• Simple, scalable backup and recovery for VMware and physical Windows servers
• Agentless architecture and cost-effective pricing
• Catalog search file level restore from both virtual and physical backups
• Integrated VM replication provides disaster recovery for critical virtual applications
Comprehensive, cost-effective VMware and Windows server data protection
Primary Data Center
WAN or LAN Physical
Virtual
vRanger Backup Repositories
Secondary Data Center
Replicated VMs
vRanger Server Virtual or Physical
Use Case – vRanger
Enterprise backup and recovery that’s easy to use.
Protect Reliably protect large volumes of data across diverse IT environments.
Store Target disk- or tape-based devices, and deduplicate data to save on storage
Scale Accommodate for growth with an easy-to-deploy, easy-to-manage modular architecture
NetVault Backup offers:
• Support for heterogeneous OSs, applications &
databases
• Integration with both SAN & NAS primary storage
• Point-and-click backup & restore with deep application-
level recovery
• Intuitive user interface for easy management
Enhances your environment:
• Enables flexible options for data protection as the
complexity of your environment grows
• Uses inherent benefits of centralized storage
architectures for data protection
• Resume applications quickly after outages
Dell NetVault Backup
AppAssure Use Case – NetVault Backup
Protect heterogeneous applications and operating systems
• Highly scalable, cross-platform backup and recovery across a wide range of applications and operating systems
• Intuitive interface for fast and easy data recovery
Protect disparate enterprise storage platforms
• Flexible data protection and recovery for a variety of storage architectures and technologies
• Support for wide variety of tape- and disk-based platforms including libraries, VTLs, & deduplication devices
• Supports both traditional and next-generation backup devices
Protect heterogeneous applications and operating systems
Store it on disk or tape
Complex enterprise IT environment
Easy-to-use
management console
@
Reduction in events affecting performance 67%
Valuable, actionable information
in minutes, not days
Focused. Clear phases. Repeatable. Flexible.
Design and Optimize
Implement and Deploy
Protect Manage Support End to End Lifecycle Services
Understand the potential
Make informed decisions
Lay the path for success
Capture the value Ongoing success
Workshop Assessment Design Implementation Manage/support
Repurchase rate of Dell services due to high level of satisfaction
95.1%
Our point of view for data protection
Let’s get started
Engage with Dell subject matter experts at the Solution Showcase
Schedule a post-event Whiteboard Session to address your specific requirements. Contact your account team.
Visit a Dell Solution Center near you
Gain hands on experience, see demonstrations: AppAssure, vRanger, NetVault, DR4100
Visit www.Dell.com
Systems Management
• Client management
• Performance monitoring (ETA: 11/1)
• Virtualization & cloud (ETA: 11/1)
• Windows server management
Information Management
• Database management
• Identity & access management
• Network security
Security Data Protection
Dell PartnerDirect – Software Specialization Tracks
To access on-line training: Log-in to www.Dell.com/partner. Click “Competencies”
• Four Required Courses:
• Data Protection
Competency Overview -
DAPR0913WBTS
• AppAssure Sales
Overview -
APP0412WBTS
• NetVault Sales Training -
NETS0913WBTS
• vRanger Sales Training -
VRANS0913WBTS
Sales (2/4 individuals, ~2.75 hr)
Upsell Optional Data Protection Curriculum:
• Recovery Manager Sales Training
• Data Protection Fundamentals (Sales)
Dell PartnerDirect – Data Protection
To access on-line training: Log-in to www.Dell.com/partner. Click “Competencies”
• Three Required Courses:
• Data Protection Competency
Overview - DAPR0913WBTS
• Choose two (required):
• AppAssure Technical Overview -
APPT0512WBTT
• NetVault Backup Technical
Training - NETT0913WBTT
• vRanger Presales Value
Proposition - VRANT0913WBTT
AND vRanger User Interface
Navigation and Usage -
VRUN0913WBTT
Technical (2/4 individuals, ~6-9 hrs)
Thank you
Thank you