SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
white paper




a Cost-effective integrated
Solution for Backup and
Disaster recovery
white paper    A Cost-Effective Integrated Solution for Backup and Disaster Recovery                            | 2




introduction   Recovery is something for which all businesses must prepare. Most acknowledge the need for
               comprehensive business continuity plans, but the expense and complexity of fully implement-
               ing these plans leads many enterprises to only partially implement them. Business continuity
               plans generally cover information technology (IT) infrastructure (applications and data), commu-
               nications, people, and process recovery. This white paper discusses a cost-effective approach
               to providing IT infrastructure recovery solutions to meet remote (disaster recovery) and local
               (backup) requirements.
               IT infrastructure recovery generally revolves around application and data recovery, which
               translates to several separate types of products: backup software that is used for local back-
               up and restore, shipping services to transport backup tapes to remote locations, replication
               software that is used to replicate data to remote locations for disaster recovery (DR) purpos-
               es, and clustering products that are used to automatically recover applications when they fail
               (regardless of whether that is due to hardware or software failures). Operative concerns in-
               clude setting up cost-effective DR plans, minimizing data loss when recoveries are required,
               minimizing the time associated with recovering from data and/or application failures, and
               making recoveries easy and reliable. Recovery point objective (RPO) is an industry metric
               used to target the maximum allowable amount of data loss on recovery, while recovery time
               objective (RTO) is another industry term used to target the maximum time to recovery, and
               both metrics can be applied to either applications or data. Very stringent RPO/RTO require-
               ments can result in near zero data loss on recovery and very short recovery times. High data
               growth rates are compounding traditional recovery problems, in particular because dealing
               with ever larger amounts of data can impose performance degradation and/or disruptions
               and longer recovery times on application environments that are being protected.
               Conventional data protection approaches have tended to rely on backup software and tape-
               based infrastructure. As information stores have grown, the use of tape media for local back-
               up has led to a number of problems, including an inability to complete backups within the al-
               lotted time periods, manually intensive data protection operations, long recovery times, and
               poor recovery reliability. These issues have driven interest in the use of disk-based recovery
               technologies. Solutions built around disk-based technologies allow recovery operations to
               become more automated, minimize the impact of data protection on production applications,
               result in faster, more reliable recoveries, and can significantly improve DR performance rela-
               tive to plans which rely on shipping backup tapes to remote locations.
               If you are interested in moving to a more automated set of processes as the foundation
               for your DR plan, your current recovery processes are causing problems with production
               impacts, RPO/RTO, or recovery reliability, you are looking for easy, cost-effective ways to im-
               prove application availability, or you are thinking about investing in a virtual tape library (VTL),
               InMage Systems offers a disk-based recovery solution, targeted for use in heterogeneous
               environments, that combines application and data recovery into a single platform that can be
               used for DR, local backup and restore, automated application failover and recovery, or any
               combination of the three.
white paper                 A Cost-Effective Integrated Solution for Backup and Disaster Recovery                                                         | 3




Storage Realities for Mid Market Enterprises                       InMage: A Single Platform To Comprehensively
Several trends are impacting data protection planning – both       Manage DR, Backup, and Application Recovery
remote and local – for mid market enterprises today:               InMage offers InMage, a software-based recovery solution,
  •	Unprecedented	data	growth	rates	in	the	50%	-	60%	              deployed in the network, which combines remote DR, local
    range that are expected to continue for at least the           backup, and application failover (both local and remote) into a
    next	5	years                                                   single platform. Built upon a foundation of disk-based recovery
                                                                   technology, InMage definitively resolves backup window, RPO/
  •	Increasingly	stringent	RPO/RTO	requirements	driven	by	
                                                                   RTO, recovery reliability, and automated application recovery
    evolving business and regulatory mandates
                                                                   issues with a solution that can stand alone or be seamlessly
  •	IT	groups	that	are	oversubscribed	and	underbudgeted,	          integrated as a “front end” to existing tape-based infrastruc-
    leading to strong requirements for cost-effective              tures. Application-aware functionality is available for a number
    solutions that are easy to use                                 of key enterprise applications, plugging into the InMage core
Most mid market enterprises have implemented some form of          platform (called the CX) and leveraging a set of centralized
local backup which is tape-based, and it is increasingly appar-    management practices that are common across all protected
ent that tape-based solutions don’t cope well with the above       applications. InMage’s architectural design flexibly accommo-
trends. Despite known issues with DR plans that depend upon        dates	Windows,	Linux,	and	Unix	servers,	physical	and/or	virtual	
regularly shipping backup tapes to remote locations by truck,      servers, heterogeneous storage and storage architectures,
scalability, overhead, and/or cost issues may have prevented       and any application environment on a platform with a low
evaluation of replication technologies which can clearly im-       entry price point that scales cost-effectively to configurations
prove DR RPO/RTO. In an effort to improve overall application      protecting hundreds of servers across multiple locations.
availability, clustering solutions have often been considered
                                                                       LOCAL SITE                                                              REMOTE SITE
and even tried, but cost, complexity, and reliability issues are
                                                                   Production Server                All transmission occurs across           Recovery Server
stalling wider deployments.                                             Source                         cost-effective IP networks                Target

Managing heterogeneity is a fact of life for mid market
                                                                                         CDP                                   REPLICATION
enterprises, which generally have a variety of disparate server,
storage, network, and application technologies. Solutions
                                                                                                             InMage CX
which impose vendor lock-ins can limit the ability to integrate                           LAN                                         WAN
new functionality and technologies. Options which can
preserve existing investments in hardware and software while
                                                                                                                                               CDP log
at the same time providing maximum flexibility for integrating      Sources can be              •   Directs replication to targets
                                                                   either physical or           •   Fault management/recovery
newer hardware and software products ultimately allow IT           virtual machines             •   AppShot policy management
                                                                                                                                             Targets can be
                                                                                                                                            either physical or
                                                                                                •   Application recovery policies
managers to deploy the most cost-effective IT infrastructure.                                   •   WAN optimization
                                                                                                                                            virtual machines
                                                                                                •   Encryption
Finally, technology deployments built around application                                        •   I/O profiling
solutions can provide richer functionality that is easier to
deploy and use for a given application, particularly for smaller
                                                                                            APPLICATION FAILOVER/FAILBACK
IT groups. There is a risk, however, when horizontal solutions
(e.g. backup, DR) are application-specific and can only be used                                 •   Can select recovery point
for a single application environment – it can lead not only to            Data taps             •   Restarts application service(s)
                                                                                                •   Mounts recovery point
higher costs but also to additional management complexity                                       •   Updates AD + DNS entries
as each application solution imposes its own learning curve
on already overworked administrators. What would be most           Figure 1. To make it easy to understand InMage’s theory of operation, this figure shows a
interesting are solutions which are application-aware, offering    configuration with one production server source and one recovery server target, although
rich functionality specific to each application, and yet are       in production deployments there are generally multiple sources and multiple targets. The
deployed and managed within a common management                    storage owned by the sources and targets can be of any type (DAS, SAN, NAS). InMage
framework that spans multiple application environments.            captures data from sources using CDP across a LAN, then replicates them to targets using
                                                                   asynchronous replication over IP.
white paper                  A Cost-Effective Integrated Solution for Backup and Disaster Recovery                                   | 4




Simple, Cost-Effective DR                                            site can be restored, at which point application services can be
DR best practices recommend that DR sites be located at least        failed back while keeping all data changes incurred at the DR
200	miles	from	primary	sites	to	ensure	that	a	widespread	ca-         site. In sending this data back to the primary site, InMage uses
tastrophe like a tornado, earthquake, or hurricane cannot wipe       delta differencing technologies which determine the minimum
out both sites. If tapes are being regularly shipped to a DR site    number of blocks that have to be sent across the network to
and a recovery requires accessing these tapes, companies can         re-create the DR site data states at the primary site, another
generally expect to lose at least several days of data. Recover-     technique which minimizes network bandwidth requirements.
ing applications from tape-based data stored at remote loca-         Taken together, these technologies makes very efficient use
tions can also take anywhere from several days to a week.            of available bandwidth, allowing us to protect large application
                                                                     environments while meeting stringent RPO/RTO requirements
If, on the other hand, replication is used to deploy a DR capa-      with minimal bandwidth.
bility, data loss can be reduced to no more than a few minutes
and recovery times can be on the order of minutes to hours.          InMage offers several key advantages relative to more con-
This is primarily because replication collects data continuously     ventional replication-based DR products. First, we offer a more
as it is created, sending it immediately to target locations like    comprehensive recovery capability that includes not only the
DR sites across networks instead of on the trucks that physical      data but extends all the way up to the application. At the push
tapes require. Shipping physical tapes can introduce days of         of a single button, InMage will fail application services over to
transit time. Asynchronous replication can meet long distance        the target location. Instead of the manual process that conven-
DR requirements, supporting effectively unlimited distances          tional replication products require to get an application back up
between primary and DR sites.                                        and running, we have fully automated that process, making it
                                                                     faster and more reliable.
InMage leverages continuous data protection (CDP) and
replication technologies to move data from source servers            Second, we can enable that automated recovery to occur
(the production servers) through a network-based control             from any retroactively selected recovery point, given our
server called the CX to target servers. Target servers can be        underlying CDP foundation for local data capture. This recovery
either local or remote, as long as there is an IP-based network      granularity for a DR solution allows us to recover from data
connection to them from the CX. The storage attached to              corruption problems with minimal data loss, perform better
source servers can be any type (DAS, SAN, NAS, iSCSI,                root cause analyses of failure events, and potentially recover
FC) and from any vendor, and the same is true for target             an application to any previous point in time that may be desired
servers (we can replicate between heterogeneous storage              for reporting or maintenance purposes (a quarterly close, a pre
subsystems). This heterogeneous support provides significant         patch state, etc.).
deployment flexibility since any new equipment can be                Third, InMage gracefully manages transient network outages
purchased or pre-existing equipment can be re-purposed for           and transparently recovers from them without any data loss,
use in these configurations.                                         ensuring that protection is always continuous.
Applications that have large data sets can present DR challeng-      Fourth, InMage supports mixed physical/virtual server configu-
es, particularly if there is limited network bandwidth between       rations when setting up source and target server definitions.
primary and DR sites. Because it uses a variety of capacity          The use of virtual servers as recovery targets can significantly
optimization technologies, InMage can protect very large data        lower the cost of setting up DR configurations, and the fact
sets while using minimal bandwidth. Once an initial baseline is      that we support all three major virtual server environments –
established, it collects only data changes. As it moves this data    VMware, Hyper-V, and Xen – provides maximum deployment
between source and target servers, InMage employs WAN op-            flexibility.
timization to minimize the amount of data that has to be sent        And fifth, InMage’s “hot site” recovery capabilities support
to a given target to support recovery operations. WAN optimi-        much better recovery performance than “cold site” options.
zation algorithms include built-in TCP optimizations that mini-      That translates to faster, easier recovery, which is what you
mize the amount of data that has to be sent across the net-          want when time is of the essence.
work and compression, while bandwidth shaping is performed
by administrator-defined quality of service (QoS) policies for       Eliminate Backup Impacts While Improving
co-existing with other production traffic on the network. If a di-   Recovery Capabilities
saster occurs, InMage supports failover of application services
                                                                     InMage moves enterprises away from the “point in time” ori-
to the DR site so that business operations can be quickly re-
                                                                     entation of backups that impact production operations. Since
started despite a catastrophic failure at a primary site. Produc-
                                                                     data is being continuously captured as it is created, backup
tion operations can be run from this DR site until the primary
                                                                     windows become a thing of the past, yet enterprises have
white paper                   A Cost-Effective Integrated Solution for Backup and Disaster Recovery                                      | 5




more granular access to recovery points. InMage effectively             •	Application-specific	functionality	is	not	a	set	of	custom	
moves backup operations off production servers so that they               scripts put together in the field - it is fully productized,
do not impact business operations.                                        meaning that it is developed, tested, documented and
This approach can significantly minimize the need for tape-               supported by InMage, a fact which results in a reliable
based infrastructure. Since most local recoveries are per-                solution with predictable performance
formed from relatively recent backups, companies that use               •	Multiple	application	solutions	can	be	combined	on	a	single	
InMage to keep several days to several weeks of changes                   CX but managed through a single secure, web browser-
resident on disk will end up performing most recovery opera-              based	GUI	(a	command	line	interface	is	available	as	well)	
tions from disk, resulting in faster, more reliable recoveries            to produce well integrated solutions that are easy to
that, given InMage’s granular data capture and recovery point             install, deploy, and manage
selection capabilities, can meet much more stringent RPO/RTO          AppShots have other administrative value than just as opti-
requirements. Companies that before were performing a single          mum recovery points. They make it easy to cut off copies of
weekly full backup with six incrementals may decide to dump           production data sets at any time without impacting production
data to tape far less frequently, possibly once a week, only          operations. These AppShots can be mounted on non-produc-
after data ages out of an administrator-defined data stream           tion servers to support business intelligence tasks and other
retention period, after data has been replicated to a remote          reporting functions as well as test and development opera-
site, or only after data reaches a certain defined age at the         tions. Since AppShots can be retroactively created to repre-
remote site. Remote offices that previously were dealing with         sent any desired point in time, they can be used to time shift
tapes can now move to tape-less operations that rely on disk-         administrative operations to optimize operator productivity.
based recovery that is centrally managed. Enterprises that do
not keep “backup” data around for more than several months            InMage: Unique Hybrid Recovery Technology
may in fact be able to move to completely tape-less backup
operations.                                                           InMage uses an architecture that is unique in the industry. Key
                                                                      concerns this unique architecture was built to address include
Application-Aware Solutions                                           cost-effective scalability across a wide range of configurations
                                                                      from several to several hundred servers, non-disruptive deploy-
InMage supports a number of different application-aware               ment (in terms of both host impact and in failure modes), and
recovery solutions for key enterprise applications, including         an ability to accommodate heterogeneous servers and storage
Microsoft Exchange, SQL, and SharePoint, as well as Oracle,           as well as a variety of different storage architectures. Granular
MySQL, Blackberry Server, SAP and any Windows, Linux, or
                                  ,                                   data capture and selection of recovery points was a critical
Unix	file	systems,	among	others.	Multiple	application	solu-           design tenet, both for minimizing the impact of data protec-
tions can run on a single CX although each application solution       tion operations on protected servers but also in providing the
includes application-specific integration, particularly for instal-   maximum flexibility in selecting the optimum recovery point to
lation, tracking application-consistent recovery points (known        meet a variety of different RPO/RTO requirements.
as AppShots), and for managing application failover/failback.
This integration results in a solution that produces fast, reliable   Granular Data Capture and Recovery
application and data recovery but is managed under a set of
                                                                      Conventional backups are performed periodically, and as data
policies (installation, deployment, marking AppShot recovery
                                                                      sets grow this “point in time” approach presents problems.
points, creating and using AppShots, failover/failback, etc.) that
                                                                      InMage completely avoids the problems associated with trying
are common across all application environments. InMage’s
                                                                      to back up an ever increasing amount of data through static
ability to manage multiple application recovery solutions under
                                                                      network links and within given backup windows by collecting
a common management framework provides a compelling
                                                                      changes continuously, as they occur. This effectively spreads
alternative to application-specific solutions that support only
                                                                      the “backup” throughout the day and provides excellent
one application type.
                                                                      protection for even large data sets across network links with
There is a big difference between application-specific and appli-     very limited bandwidth. The changes appear to InMage as a
cation-aware solutions, and the latter offers significant benefits:   data stream, and this stream is annotated with time stamps as
  •	They	make	comprehensive	recovery	solutions	for	specific	          well as any number of markers that denote application events
    applications easy to buy and deploy                               of importance when it comes to recovery or other business
                                                                      operations. These markers, also referred to as bookmarks, can
  •	They	leverage	application-specific	domain	expertise	in	our	
                                                                      be inserted into the data stream either manually or through
    engineering groups to provide recovery capabilities tailored
                                                                      policies to mark any number of potential recovery points, such
    to application-specific requirements, producing better
    overall products
white paper                                  A Cost-Effective Integrated Solution for Backup and Disaster Recovery                                                   | 6




         as application-consistent points created using application APIs                                       Note that the data flow originates at the production server
         (e.g. VSS for Windows applications, RMAN for Oracle, etc.),                                           sources, flows through the CX, and then onto one or more
         pre- and post-patch points, or meaningful financial milestones                                        recovery server targets. This is a unique architecture that is nei-
         such as quarterly closes. The administrator specifies a reten-                                        ther host-based nor appliance-based replication. It is a unique
         tion time frame for this data (e.g. 3 days, 2 weeks, a month,                                         design – the only one of its kind in the storage industry – that
         etc.), and any point in that data stream of retained data can be                                      imposes minimal server overhead, offers graceful scalability
         retroactively selected and used for recovery purposes.                                                across a wide range, and can flexibly accommodate a number
         Once a recovery point has been selected, the administrator                                            of different source and target devices. It does not suffer from
         can choose between creating a physical or a virtual disk-based                                        the scalability and overhead problems of traditional host-based
         image of that point. Think of it as turning a dial back to any                                        replication, does not require appliance pairs at each loca-
         desired point and generating the desired image. These images                                          tion like traditional appliance-based replication, and does not
         can be designated as read only or read/write, depending on                                            impose the vendor lock-in that is a disadvantage in array-based
         what they will be used for. Image creation can be scheduled,                                          replication. It really is a hybrid model deploying elements of
         event-driven, or generated upon demand without impacting                                              both host-based and appliance-based replication, which is why
         production applications in any way, and are mounted on recov-                                         InMage refers to it as “hybrid recovery technology”   .
         ery server targets for use. AppShots (application-consistent                                          The CX includes the processing power necessary to provide
         points in time) are generally used for most application and                                           significant functionality, such as driving the data stream marking
         data recoveries since they support the shortest RTOs, but                                             policies, managing the creation and disposition of AppShots,
         other points that are generated based on time or other events                                         minimizing the amount of data that has to be sent over the
         can be valuable for root cause analysis, business intelligence,                                       WAN through capacity optimization technologies such as delta
         reporting, or other purposes.                                                                         differencing, compression, and bandwidth shaping, managing
                                                                                                               encryption for data that is in-flight across the WAN, handling
         What Makes InMage Unique                                                                              fault management issues such as transient network outages
         To manage data capture, InMage deploys filter drivers, referred                                       and application failover/failback, and performing I/O profiling.
         to as data taps, on each server for which protection is desired.                                      I/O profiling is an interesting area. The InMage Analyzer can be
         The data taps pass writes directly through to storage targets                                         installed prior to production deployment to determine I/O rates
         owned by the production server while at the same time asyn-                                           across the network, which provides valuable data in under-
         chronously passing them over to the local CX. The CX will then                                        standing what sort of RPO/RTO requirements you can meet
         replicate that data to one or more recovery server targets, and                                       with your existing infrastructure. This allows you to deploy
         those targets can be local and/or remote. The CX does not store                                       with confidence, knowing what your recovery performance will
         data over time, it only acts as a “way station” for the data. The                                     be. After deployment and during normal operation, the CX acts
         data is stored on the recovery server target(s). InMage uses                                          as a focal point through which the data streams of potentially
         both CDP and replication as foundation technologies.                                                  multiple servers flow. InMage can monitor these I/O streams
                                                                                                               over time, helping administrators understand how the I/O load
        LOCAL SITE                                                                     REMOTE SITE             on their networks may vary at different times of the day and
Production Server Source(s)                                                                                    over time. This trending analysis provides valuable input for
                                    Sources can be either                                                      network capacity planning.
                                 physical or virtual machines

                                A single CX can simultaneously
                                provide the recovery foundation
                                                                                                               Summary
                                    for multiple applications
                                                                                                               InMage is targeted for environments that have at least several
                                                                                                               servers that need either remote disaster recovery, better local
                                          InMage CX
                                                                                                               backup, and/or higher application availability managed through
                         LA N                                      WAN
                                                                                                               an automated failover/failback capability. It leverages low cost
                                             All transmission occurs across    Recovery Server Target(s)
                                                                                                               IP-based networks for all data capture and replication, support-
    Data taps                                   cost-effective IP networks                                     ing low entry price points. Its heterogeneous support allows
                                                                                                               the use of any storage devices using any type of architecture,
            Recovery Server Target(s)                                         Targets can be either physical
                                                                                   or virtual machines         and this investment preservation story contributes to its flex-
                                                                                                               ibility	and	cost-effective	deployment.	50%	of	our	customers	
         Figure 2. InMage collects data from source servers at a very granular level (write by write)          use InMage to meet both DR and local backup requirements,
         across a LAN, then replicates that data to one or more target servers which can be either
         local or remote.
white paper                                  A Cost-Effective Integrated Solution for Backup and Disaster Recovery                                                                                            | 7




       and find themselves able to remove heavyweight backup and                                                    InMage is a great solution for mid market companies that are
       other	agents	from	many	servers,	freeing	up	CPU	cycles	(a	par-                                                looking for cost-effective DR options, may be struggling with
       ticularly important issue in virtual server environments) through                                            tape-based backup infrastructure, are considering a virtual tape
       InMage’s “host off-load” design. Since most data recoveries                                                  library, and/or want higher application availability but are put off
       use the most recent data, customers generally keep several                                                   by the cost and complexity of conventional clustering solutions.
       days to several weeks of data within the InMage repository,                                                  It is the only block-based replication option available on the
       leveraging the advantages of InMage’s very granular data cap-                                                market that combines remote DR, local backup, and application
       ture and recovery capabilities as well as the benefits of disk-                                              failover/failback in a single, easy to deploy platform. Its’ non-
       based recovery to handle most recoveries. If customers want                                                  disruptive deployment, heterogeneous support, and granular
       to migrate older backup data into another application, such as                                               recovery capabilities offer a compelling value proposition for
       backup or archive software, that data can be staged from App-                                                enterprises concerned about DR, backup windows, RPO/RTO,
       Shots without imposing any production impacts whatsoever.                                                    recovery reliability, and/or application availability.




                                         3255-1 Scott Boulevard, Suite 104, Santa Clara, CA 95054 | 1.800.646.3617 | p: 408.200.3840 | f: 408.588.1590 | info@inmage.com
                                         www.inmage.com
                                                                                                                                                                                                                              2010V1




Copyright 2010, InMage Systems, Inc. All Rights Reserved. This document is provided for information purposes only, and the contents hereof are subject to change without notice. The information contained herein is the
proprietary and confidential information of InMage and may not be reproduced or transmitted in any form for any purpose without InMage’s prior written permission. InMage is a registered trademark of InMage Systems, Inc.

Weitere ähnliche Inhalte

Was ist angesagt?

High Availability og virtualisering, IBM Power Event
High Availability og virtualisering, IBM Power EventHigh Availability og virtualisering, IBM Power Event
High Availability og virtualisering, IBM Power EventIBM Danmark
 
Presentation SIG, Green IT Amsterdam workshop Green Software 12 apr 2011, Gre...
Presentation SIG, Green IT Amsterdam workshop Green Software 12 apr 2011, Gre...Presentation SIG, Green IT Amsterdam workshop Green Software 12 apr 2011, Gre...
Presentation SIG, Green IT Amsterdam workshop Green Software 12 apr 2011, Gre...Jaak Vlasveld
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingFonality
 
Classification of data center operations technology management tools
Classification of data center operations technology management toolsClassification of data center operations technology management tools
Classification of data center operations technology management toolsSchneider Electric India
 
Asigra Product Marketing Strategy
Asigra Product Marketing StrategyAsigra Product Marketing Strategy
Asigra Product Marketing StrategyJas Mann
 
Open Source for the 4th Industrial Revolution
Open Source for the 4th Industrial RevolutionOpen Source for the 4th Industrial Revolution
Open Source for the 4th Industrial RevolutionLiz Warner
 
EMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey WebinarEMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey WebinarErin Banks
 
Implementation Strategy Linda Doll
Implementation Strategy Linda Doll Implementation Strategy Linda Doll
Implementation Strategy Linda Doll Linda Doll
 
Datacenter Design Guide UNIQUE Panduit-Cisco
Datacenter Design Guide UNIQUE Panduit-Cisco Datacenter Design Guide UNIQUE Panduit-Cisco
Datacenter Design Guide UNIQUE Panduit-Cisco jpjobard
 
Data center Technologies
Data center TechnologiesData center Technologies
Data center TechnologiesEMC
 
Data Center Infrastructure Management
Data Center Infrastructure ManagementData Center Infrastructure Management
Data Center Infrastructure Managementshahzad ahmed
 
Belden Industrial Ethernet White Paper
Belden Industrial Ethernet White PaperBelden Industrial Ethernet White Paper
Belden Industrial Ethernet White Paperadventive1
 
SugarCON partner presentation by IBM
SugarCON partner presentation by IBMSugarCON partner presentation by IBM
SugarCON partner presentation by IBMBevdewitt
 
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End PointVirtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End PointHyTrust
 

Was ist angesagt? (19)

High Availability og virtualisering, IBM Power Event
High Availability og virtualisering, IBM Power EventHigh Availability og virtualisering, IBM Power Event
High Availability og virtualisering, IBM Power Event
 
Presentation SIG, Green IT Amsterdam workshop Green Software 12 apr 2011, Gre...
Presentation SIG, Green IT Amsterdam workshop Green Software 12 apr 2011, Gre...Presentation SIG, Green IT Amsterdam workshop Green Software 12 apr 2011, Gre...
Presentation SIG, Green IT Amsterdam workshop Green Software 12 apr 2011, Gre...
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Classification of data center operations technology management tools
Classification of data center operations technology management toolsClassification of data center operations technology management tools
Classification of data center operations technology management tools
 
Asigra Product Marketing Strategy
Asigra Product Marketing StrategyAsigra Product Marketing Strategy
Asigra Product Marketing Strategy
 
Open Source for the 4th Industrial Revolution
Open Source for the 4th Industrial RevolutionOpen Source for the 4th Industrial Revolution
Open Source for the 4th Industrial Revolution
 
EMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey WebinarEMC - Accelerate Cloud Journey Webinar
EMC - Accelerate Cloud Journey Webinar
 
Implementation Strategy Linda Doll
Implementation Strategy Linda Doll Implementation Strategy Linda Doll
Implementation Strategy Linda Doll
 
StruxureWare DCIM
StruxureWare DCIMStruxureWare DCIM
StruxureWare DCIM
 
Firstcomm construction of a DR plan
Firstcomm construction of a DR planFirstcomm construction of a DR plan
Firstcomm construction of a DR plan
 
Datacenter Design Guide UNIQUE Panduit-Cisco
Datacenter Design Guide UNIQUE Panduit-Cisco Datacenter Design Guide UNIQUE Panduit-Cisco
Datacenter Design Guide UNIQUE Panduit-Cisco
 
Data center Technologies
Data center TechnologiesData center Technologies
Data center Technologies
 
A blueprint for smarter storage management
A blueprint for smarter storage managementA blueprint for smarter storage management
A blueprint for smarter storage management
 
Data Center Infrastructure Management
Data Center Infrastructure ManagementData Center Infrastructure Management
Data Center Infrastructure Management
 
Belden Industrial Ethernet White Paper
Belden Industrial Ethernet White PaperBelden Industrial Ethernet White Paper
Belden Industrial Ethernet White Paper
 
SugarCON partner presentation by IBM
SugarCON partner presentation by IBMSugarCON partner presentation by IBM
SugarCON partner presentation by IBM
 
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End PointVirtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
 
EDIF-Cisco/EMC2
EDIF-Cisco/EMC2EDIF-Cisco/EMC2
EDIF-Cisco/EMC2
 
Best Practices for Migration
Best Practices for MigrationBest Practices for Migration
Best Practices for Migration
 

Andere mochten auch

Andere mochten auch (6)

SecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaSSecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaS
 
Zephyr 2.0: Comprehensive Test Management
Zephyr 2.0: Comprehensive Test ManagementZephyr 2.0: Comprehensive Test Management
Zephyr 2.0: Comprehensive Test Management
 
Haryana Real Estate
Haryana Real Estate Haryana Real Estate
Haryana Real Estate
 
Launch: Silicon Valley 2013
Launch: Silicon Valley 2013Launch: Silicon Valley 2013
Launch: Silicon Valley 2013
 
Launch: Silicon Valley 2012
Launch: Silicon Valley 2012Launch: Silicon Valley 2012
Launch: Silicon Valley 2012
 
Master Plan Guwahati
Master Plan GuwahatiMaster Plan Guwahati
Master Plan Guwahati
 

Ähnlich wie A Cost-Effective Integrated Solution for Backup and Disaster Recovery

Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...MaryJWilliams2
 
N-able and Arcserve® talk Backup and Recovery
N-able and Arcserve® talk Backup and RecoveryN-able and Arcserve® talk Backup and Recovery
N-able and Arcserve® talk Backup and RecoverySolarwinds N-able
 
DataCore + Fujitsu Business Solutions
DataCore + Fujitsu Business SolutionsDataCore + Fujitsu Business Solutions
DataCore + Fujitsu Business SolutionsDataCore Software
 
NEC UNIVERGE BLUE BACKUP
NEC UNIVERGE BLUE BACKUPNEC UNIVERGE BLUE BACKUP
NEC UNIVERGE BLUE BACKUPInteractiveNEC
 
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVERNEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVERInteractiveNEC
 
Storage Strategies Now- Virtualizaing Busines Critical applications
Storage Strategies Now- Virtualizaing Busines Critical applicationsStorage Strategies Now- Virtualizaing Busines Critical applications
Storage Strategies Now- Virtualizaing Busines Critical applicationsDataCore Software
 
Disaster recovery in the Cloud - whitepaper
Disaster recovery in the Cloud - whitepaper Disaster recovery in the Cloud - whitepaper
Disaster recovery in the Cloud - whitepaper Karolina Dryja
 
Symantec Netbackup Appliance Family
Symantec Netbackup Appliance FamilySymantec Netbackup Appliance Family
Symantec Netbackup Appliance FamilySymantec
 
Cloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium BusinessesCloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium BusinessesAl Sabawi
 
CONTINUOUS APPLICATION AVAILABILITY WITH EMC VPLEX
CONTINUOUS APPLICATION AVAILABILITY WITH EMC VPLEX	CONTINUOUS APPLICATION AVAILABILITY WITH EMC VPLEX
CONTINUOUS APPLICATION AVAILABILITY WITH EMC VPLEX Roy Wassili
 
Enterprise mobility solutions & systems
Enterprise mobility solutions & systemsEnterprise mobility solutions & systems
Enterprise mobility solutions & systemsInfosys
 
Removing Storage Related Barriers to Server and Desktop Virtualization
Removing Storage Related Barriers to Server and Desktop VirtualizationRemoving Storage Related Barriers to Server and Desktop Virtualization
Removing Storage Related Barriers to Server and Desktop VirtualizationDataCore Software
 
Solution magazine 2012_final_nl
Solution magazine 2012_final_nlSolution magazine 2012_final_nl
Solution magazine 2012_final_nlTTEC
 
Managing data to improve disaster recovery preparedness » data center knowledge
Managing data to improve disaster recovery preparedness » data center knowledgeManaging data to improve disaster recovery preparedness » data center knowledge
Managing data to improve disaster recovery preparedness » data center knowledgegeekmodeboy
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startupsSekhar Mohanty
 
Idc paper on disaster recovery
Idc paper on disaster recoveryIdc paper on disaster recovery
Idc paper on disaster recoveryEMC Forum India
 

Ähnlich wie A Cost-Effective Integrated Solution for Backup and Disaster Recovery (20)

Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
 
N-able and Arcserve® talk Backup and Recovery
N-able and Arcserve® talk Backup and RecoveryN-able and Arcserve® talk Backup and Recovery
N-able and Arcserve® talk Backup and Recovery
 
Connect July-Aug 2014
Connect July-Aug 2014Connect July-Aug 2014
Connect July-Aug 2014
 
DataCore + Fujitsu Business Solutions
DataCore + Fujitsu Business SolutionsDataCore + Fujitsu Business Solutions
DataCore + Fujitsu Business Solutions
 
NEC UNIVERGE BLUE BACKUP
NEC UNIVERGE BLUE BACKUPNEC UNIVERGE BLUE BACKUP
NEC UNIVERGE BLUE BACKUP
 
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVERNEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
 
Adopting the Cloud
Adopting the CloudAdopting the Cloud
Adopting the Cloud
 
Storage Strategies Now- Virtualizaing Busines Critical applications
Storage Strategies Now- Virtualizaing Busines Critical applicationsStorage Strategies Now- Virtualizaing Busines Critical applications
Storage Strategies Now- Virtualizaing Busines Critical applications
 
Disaster recovery in the Cloud - whitepaper
Disaster recovery in the Cloud - whitepaper Disaster recovery in the Cloud - whitepaper
Disaster recovery in the Cloud - whitepaper
 
Symantec Netbackup Appliance Family
Symantec Netbackup Appliance FamilySymantec Netbackup Appliance Family
Symantec Netbackup Appliance Family
 
Cloud
CloudCloud
Cloud
 
Cloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium BusinessesCloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium Businesses
 
CONTINUOUS APPLICATION AVAILABILITY WITH EMC VPLEX
CONTINUOUS APPLICATION AVAILABILITY WITH EMC VPLEX	CONTINUOUS APPLICATION AVAILABILITY WITH EMC VPLEX
CONTINUOUS APPLICATION AVAILABILITY WITH EMC VPLEX
 
Enterprise mobility solutions & systems
Enterprise mobility solutions & systemsEnterprise mobility solutions & systems
Enterprise mobility solutions & systems
 
Cloud capability for startups
Cloud capability for startupsCloud capability for startups
Cloud capability for startups
 
Removing Storage Related Barriers to Server and Desktop Virtualization
Removing Storage Related Barriers to Server and Desktop VirtualizationRemoving Storage Related Barriers to Server and Desktop Virtualization
Removing Storage Related Barriers to Server and Desktop Virtualization
 
Solution magazine 2012_final_nl
Solution magazine 2012_final_nlSolution magazine 2012_final_nl
Solution magazine 2012_final_nl
 
Managing data to improve disaster recovery preparedness » data center knowledge
Managing data to improve disaster recovery preparedness » data center knowledgeManaging data to improve disaster recovery preparedness » data center knowledge
Managing data to improve disaster recovery preparedness » data center knowledge
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
 
Idc paper on disaster recovery
Idc paper on disaster recoveryIdc paper on disaster recovery
Idc paper on disaster recovery
 

Mehr von xmeteorite

Launch: Silicon Valley 2013
Launch: Silicon Valley 2013Launch: Silicon Valley 2013
Launch: Silicon Valley 2013xmeteorite
 
Launch: Silicon Valley 2013, High-Value, High -Visibility Product Launch Even...
Launch: Silicon Valley 2013, High-Value, High -Visibility Product Launch Even...Launch: Silicon Valley 2013, High-Value, High -Visibility Product Launch Even...
Launch: Silicon Valley 2013, High-Value, High -Visibility Product Launch Even...xmeteorite
 
A video: Innovation in the Cloud
A video: Innovation in the CloudA video: Innovation in the Cloud
A video: Innovation in the Cloudxmeteorite
 
Innovation in the Cloud
Innovation in the CloudInnovation in the Cloud
Innovation in the Cloudxmeteorite
 
Disaster Recovery, Local Operational Recovery, and High Availability
Disaster Recovery, Local Operational Recovery, and High AvailabilityDisaster Recovery, Local Operational Recovery, and High Availability
Disaster Recovery, Local Operational Recovery, and High Availabilityxmeteorite
 
The Economics of Parallel System Design in Commercial-Scale Solar Plants
The Economics of Parallel System Design in Commercial-Scale Solar PlantsThe Economics of Parallel System Design in Commercial-Scale Solar Plants
The Economics of Parallel System Design in Commercial-Scale Solar Plantsxmeteorite
 
Disaster Recovery Coupled with High Exchange Availability
Disaster Recovery Coupled with High Exchange AvailabilityDisaster Recovery Coupled with High Exchange Availability
Disaster Recovery Coupled with High Exchange Availabilityxmeteorite
 
eIQ Datasheet - 350-WATT DC-TO-DC Converter Module
eIQ Datasheet - 350-WATT DC-TO-DC Converter ModuleeIQ Datasheet - 350-WATT DC-TO-DC Converter Module
eIQ Datasheet - 350-WATT DC-TO-DC Converter Modulexmeteorite
 
Installation and operations_manual
Installation and operations_manualInstallation and operations_manual
Installation and operations_manualxmeteorite
 
eIQ Datasheet - 250-WATT DC-TO-DC Converter Module
eIQ Datasheet - 250-WATT DC-TO-DC Converter ModuleeIQ Datasheet - 250-WATT DC-TO-DC Converter Module
eIQ Datasheet - 250-WATT DC-TO-DC Converter Modulexmeteorite
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCxmeteorite
 
SecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaSSecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaSxmeteorite
 
QuEST Global ranked World No.1 in Engineering Service Outsourcing by the Blac...
QuEST Global ranked World No.1 in Engineering Service Outsourcing by the Blac...QuEST Global ranked World No.1 in Engineering Service Outsourcing by the Blac...
QuEST Global ranked World No.1 in Engineering Service Outsourcing by the Blac...xmeteorite
 
Press Release: Intent-Driven Enterprise Marketing Automation 2.0 Solution Lau...
Press Release: Intent-Driven Enterprise Marketing Automation 2.0 Solution Lau...Press Release: Intent-Driven Enterprise Marketing Automation 2.0 Solution Lau...
Press Release: Intent-Driven Enterprise Marketing Automation 2.0 Solution Lau...xmeteorite
 
Big Blue sued for preventing mainframe customers from saving millions of dollars
Big Blue sued for preventing mainframe customers from saving millions of dollarsBig Blue sued for preventing mainframe customers from saving millions of dollars
Big Blue sued for preventing mainframe customers from saving millions of dollarsxmeteorite
 
Supercharge Your Savings and Mainframe Performance
Supercharge Your Savings and Mainframe PerformanceSupercharge Your Savings and Mainframe Performance
Supercharge Your Savings and Mainframe Performancexmeteorite
 
Outsourced Demo/Eval Program Management
Outsourced Demo/Eval Program ManagementOutsourced Demo/Eval Program Management
Outsourced Demo/Eval Program Managementxmeteorite
 
Retire Your Legacy Applications & Reduce Costs
Retire Your Legacy Applications & Reduce CostsRetire Your Legacy Applications & Reduce Costs
Retire Your Legacy Applications & Reduce Costsxmeteorite
 
Kudle Beach, Gokarna
Kudle Beach, GokarnaKudle Beach, Gokarna
Kudle Beach, Gokarnaxmeteorite
 
IT Consulting Services - Save your company money
IT Consulting Services - Save your company moneyIT Consulting Services - Save your company money
IT Consulting Services - Save your company moneyxmeteorite
 

Mehr von xmeteorite (20)

Launch: Silicon Valley 2013
Launch: Silicon Valley 2013Launch: Silicon Valley 2013
Launch: Silicon Valley 2013
 
Launch: Silicon Valley 2013, High-Value, High -Visibility Product Launch Even...
Launch: Silicon Valley 2013, High-Value, High -Visibility Product Launch Even...Launch: Silicon Valley 2013, High-Value, High -Visibility Product Launch Even...
Launch: Silicon Valley 2013, High-Value, High -Visibility Product Launch Even...
 
A video: Innovation in the Cloud
A video: Innovation in the CloudA video: Innovation in the Cloud
A video: Innovation in the Cloud
 
Innovation in the Cloud
Innovation in the CloudInnovation in the Cloud
Innovation in the Cloud
 
Disaster Recovery, Local Operational Recovery, and High Availability
Disaster Recovery, Local Operational Recovery, and High AvailabilityDisaster Recovery, Local Operational Recovery, and High Availability
Disaster Recovery, Local Operational Recovery, and High Availability
 
The Economics of Parallel System Design in Commercial-Scale Solar Plants
The Economics of Parallel System Design in Commercial-Scale Solar PlantsThe Economics of Parallel System Design in Commercial-Scale Solar Plants
The Economics of Parallel System Design in Commercial-Scale Solar Plants
 
Disaster Recovery Coupled with High Exchange Availability
Disaster Recovery Coupled with High Exchange AvailabilityDisaster Recovery Coupled with High Exchange Availability
Disaster Recovery Coupled with High Exchange Availability
 
eIQ Datasheet - 350-WATT DC-TO-DC Converter Module
eIQ Datasheet - 350-WATT DC-TO-DC Converter ModuleeIQ Datasheet - 350-WATT DC-TO-DC Converter Module
eIQ Datasheet - 350-WATT DC-TO-DC Converter Module
 
Installation and operations_manual
Installation and operations_manualInstallation and operations_manual
Installation and operations_manual
 
eIQ Datasheet - 250-WATT DC-TO-DC Converter Module
eIQ Datasheet - 250-WATT DC-TO-DC Converter ModuleeIQ Datasheet - 250-WATT DC-TO-DC Converter Module
eIQ Datasheet - 250-WATT DC-TO-DC Converter Module
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRC
 
SecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaSSecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaS
 
QuEST Global ranked World No.1 in Engineering Service Outsourcing by the Blac...
QuEST Global ranked World No.1 in Engineering Service Outsourcing by the Blac...QuEST Global ranked World No.1 in Engineering Service Outsourcing by the Blac...
QuEST Global ranked World No.1 in Engineering Service Outsourcing by the Blac...
 
Press Release: Intent-Driven Enterprise Marketing Automation 2.0 Solution Lau...
Press Release: Intent-Driven Enterprise Marketing Automation 2.0 Solution Lau...Press Release: Intent-Driven Enterprise Marketing Automation 2.0 Solution Lau...
Press Release: Intent-Driven Enterprise Marketing Automation 2.0 Solution Lau...
 
Big Blue sued for preventing mainframe customers from saving millions of dollars
Big Blue sued for preventing mainframe customers from saving millions of dollarsBig Blue sued for preventing mainframe customers from saving millions of dollars
Big Blue sued for preventing mainframe customers from saving millions of dollars
 
Supercharge Your Savings and Mainframe Performance
Supercharge Your Savings and Mainframe PerformanceSupercharge Your Savings and Mainframe Performance
Supercharge Your Savings and Mainframe Performance
 
Outsourced Demo/Eval Program Management
Outsourced Demo/Eval Program ManagementOutsourced Demo/Eval Program Management
Outsourced Demo/Eval Program Management
 
Retire Your Legacy Applications & Reduce Costs
Retire Your Legacy Applications & Reduce CostsRetire Your Legacy Applications & Reduce Costs
Retire Your Legacy Applications & Reduce Costs
 
Kudle Beach, Gokarna
Kudle Beach, GokarnaKudle Beach, Gokarna
Kudle Beach, Gokarna
 
IT Consulting Services - Save your company money
IT Consulting Services - Save your company moneyIT Consulting Services - Save your company money
IT Consulting Services - Save your company money
 

Kürzlich hochgeladen

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

A Cost-Effective Integrated Solution for Backup and Disaster Recovery

  • 1. white paper a Cost-effective integrated Solution for Backup and Disaster recovery
  • 2. white paper A Cost-Effective Integrated Solution for Backup and Disaster Recovery | 2 introduction Recovery is something for which all businesses must prepare. Most acknowledge the need for comprehensive business continuity plans, but the expense and complexity of fully implement- ing these plans leads many enterprises to only partially implement them. Business continuity plans generally cover information technology (IT) infrastructure (applications and data), commu- nications, people, and process recovery. This white paper discusses a cost-effective approach to providing IT infrastructure recovery solutions to meet remote (disaster recovery) and local (backup) requirements. IT infrastructure recovery generally revolves around application and data recovery, which translates to several separate types of products: backup software that is used for local back- up and restore, shipping services to transport backup tapes to remote locations, replication software that is used to replicate data to remote locations for disaster recovery (DR) purpos- es, and clustering products that are used to automatically recover applications when they fail (regardless of whether that is due to hardware or software failures). Operative concerns in- clude setting up cost-effective DR plans, minimizing data loss when recoveries are required, minimizing the time associated with recovering from data and/or application failures, and making recoveries easy and reliable. Recovery point objective (RPO) is an industry metric used to target the maximum allowable amount of data loss on recovery, while recovery time objective (RTO) is another industry term used to target the maximum time to recovery, and both metrics can be applied to either applications or data. Very stringent RPO/RTO require- ments can result in near zero data loss on recovery and very short recovery times. High data growth rates are compounding traditional recovery problems, in particular because dealing with ever larger amounts of data can impose performance degradation and/or disruptions and longer recovery times on application environments that are being protected. Conventional data protection approaches have tended to rely on backup software and tape- based infrastructure. As information stores have grown, the use of tape media for local back- up has led to a number of problems, including an inability to complete backups within the al- lotted time periods, manually intensive data protection operations, long recovery times, and poor recovery reliability. These issues have driven interest in the use of disk-based recovery technologies. Solutions built around disk-based technologies allow recovery operations to become more automated, minimize the impact of data protection on production applications, result in faster, more reliable recoveries, and can significantly improve DR performance rela- tive to plans which rely on shipping backup tapes to remote locations. If you are interested in moving to a more automated set of processes as the foundation for your DR plan, your current recovery processes are causing problems with production impacts, RPO/RTO, or recovery reliability, you are looking for easy, cost-effective ways to im- prove application availability, or you are thinking about investing in a virtual tape library (VTL), InMage Systems offers a disk-based recovery solution, targeted for use in heterogeneous environments, that combines application and data recovery into a single platform that can be used for DR, local backup and restore, automated application failover and recovery, or any combination of the three.
  • 3. white paper A Cost-Effective Integrated Solution for Backup and Disaster Recovery | 3 Storage Realities for Mid Market Enterprises InMage: A Single Platform To Comprehensively Several trends are impacting data protection planning – both Manage DR, Backup, and Application Recovery remote and local – for mid market enterprises today: InMage offers InMage, a software-based recovery solution, • Unprecedented data growth rates in the 50% - 60% deployed in the network, which combines remote DR, local range that are expected to continue for at least the backup, and application failover (both local and remote) into a next 5 years single platform. Built upon a foundation of disk-based recovery technology, InMage definitively resolves backup window, RPO/ • Increasingly stringent RPO/RTO requirements driven by RTO, recovery reliability, and automated application recovery evolving business and regulatory mandates issues with a solution that can stand alone or be seamlessly • IT groups that are oversubscribed and underbudgeted, integrated as a “front end” to existing tape-based infrastruc- leading to strong requirements for cost-effective tures. Application-aware functionality is available for a number solutions that are easy to use of key enterprise applications, plugging into the InMage core Most mid market enterprises have implemented some form of platform (called the CX) and leveraging a set of centralized local backup which is tape-based, and it is increasingly appar- management practices that are common across all protected ent that tape-based solutions don’t cope well with the above applications. InMage’s architectural design flexibly accommo- trends. Despite known issues with DR plans that depend upon dates Windows, Linux, and Unix servers, physical and/or virtual regularly shipping backup tapes to remote locations by truck, servers, heterogeneous storage and storage architectures, scalability, overhead, and/or cost issues may have prevented and any application environment on a platform with a low evaluation of replication technologies which can clearly im- entry price point that scales cost-effectively to configurations prove DR RPO/RTO. In an effort to improve overall application protecting hundreds of servers across multiple locations. availability, clustering solutions have often been considered LOCAL SITE REMOTE SITE and even tried, but cost, complexity, and reliability issues are Production Server All transmission occurs across Recovery Server stalling wider deployments. Source cost-effective IP networks Target Managing heterogeneity is a fact of life for mid market CDP REPLICATION enterprises, which generally have a variety of disparate server, storage, network, and application technologies. Solutions InMage CX which impose vendor lock-ins can limit the ability to integrate LAN WAN new functionality and technologies. Options which can preserve existing investments in hardware and software while CDP log at the same time providing maximum flexibility for integrating Sources can be • Directs replication to targets either physical or • Fault management/recovery newer hardware and software products ultimately allow IT virtual machines • AppShot policy management Targets can be either physical or • Application recovery policies managers to deploy the most cost-effective IT infrastructure. • WAN optimization virtual machines • Encryption Finally, technology deployments built around application • I/O profiling solutions can provide richer functionality that is easier to deploy and use for a given application, particularly for smaller APPLICATION FAILOVER/FAILBACK IT groups. There is a risk, however, when horizontal solutions (e.g. backup, DR) are application-specific and can only be used • Can select recovery point for a single application environment – it can lead not only to Data taps • Restarts application service(s) • Mounts recovery point higher costs but also to additional management complexity • Updates AD + DNS entries as each application solution imposes its own learning curve on already overworked administrators. What would be most Figure 1. To make it easy to understand InMage’s theory of operation, this figure shows a interesting are solutions which are application-aware, offering configuration with one production server source and one recovery server target, although rich functionality specific to each application, and yet are in production deployments there are generally multiple sources and multiple targets. The deployed and managed within a common management storage owned by the sources and targets can be of any type (DAS, SAN, NAS). InMage framework that spans multiple application environments. captures data from sources using CDP across a LAN, then replicates them to targets using asynchronous replication over IP.
  • 4. white paper A Cost-Effective Integrated Solution for Backup and Disaster Recovery | 4 Simple, Cost-Effective DR site can be restored, at which point application services can be DR best practices recommend that DR sites be located at least failed back while keeping all data changes incurred at the DR 200 miles from primary sites to ensure that a widespread ca- site. In sending this data back to the primary site, InMage uses tastrophe like a tornado, earthquake, or hurricane cannot wipe delta differencing technologies which determine the minimum out both sites. If tapes are being regularly shipped to a DR site number of blocks that have to be sent across the network to and a recovery requires accessing these tapes, companies can re-create the DR site data states at the primary site, another generally expect to lose at least several days of data. Recover- technique which minimizes network bandwidth requirements. ing applications from tape-based data stored at remote loca- Taken together, these technologies makes very efficient use tions can also take anywhere from several days to a week. of available bandwidth, allowing us to protect large application environments while meeting stringent RPO/RTO requirements If, on the other hand, replication is used to deploy a DR capa- with minimal bandwidth. bility, data loss can be reduced to no more than a few minutes and recovery times can be on the order of minutes to hours. InMage offers several key advantages relative to more con- This is primarily because replication collects data continuously ventional replication-based DR products. First, we offer a more as it is created, sending it immediately to target locations like comprehensive recovery capability that includes not only the DR sites across networks instead of on the trucks that physical data but extends all the way up to the application. At the push tapes require. Shipping physical tapes can introduce days of of a single button, InMage will fail application services over to transit time. Asynchronous replication can meet long distance the target location. Instead of the manual process that conven- DR requirements, supporting effectively unlimited distances tional replication products require to get an application back up between primary and DR sites. and running, we have fully automated that process, making it faster and more reliable. InMage leverages continuous data protection (CDP) and replication technologies to move data from source servers Second, we can enable that automated recovery to occur (the production servers) through a network-based control from any retroactively selected recovery point, given our server called the CX to target servers. Target servers can be underlying CDP foundation for local data capture. This recovery either local or remote, as long as there is an IP-based network granularity for a DR solution allows us to recover from data connection to them from the CX. The storage attached to corruption problems with minimal data loss, perform better source servers can be any type (DAS, SAN, NAS, iSCSI, root cause analyses of failure events, and potentially recover FC) and from any vendor, and the same is true for target an application to any previous point in time that may be desired servers (we can replicate between heterogeneous storage for reporting or maintenance purposes (a quarterly close, a pre subsystems). This heterogeneous support provides significant patch state, etc.). deployment flexibility since any new equipment can be Third, InMage gracefully manages transient network outages purchased or pre-existing equipment can be re-purposed for and transparently recovers from them without any data loss, use in these configurations. ensuring that protection is always continuous. Applications that have large data sets can present DR challeng- Fourth, InMage supports mixed physical/virtual server configu- es, particularly if there is limited network bandwidth between rations when setting up source and target server definitions. primary and DR sites. Because it uses a variety of capacity The use of virtual servers as recovery targets can significantly optimization technologies, InMage can protect very large data lower the cost of setting up DR configurations, and the fact sets while using minimal bandwidth. Once an initial baseline is that we support all three major virtual server environments – established, it collects only data changes. As it moves this data VMware, Hyper-V, and Xen – provides maximum deployment between source and target servers, InMage employs WAN op- flexibility. timization to minimize the amount of data that has to be sent And fifth, InMage’s “hot site” recovery capabilities support to a given target to support recovery operations. WAN optimi- much better recovery performance than “cold site” options. zation algorithms include built-in TCP optimizations that mini- That translates to faster, easier recovery, which is what you mize the amount of data that has to be sent across the net- want when time is of the essence. work and compression, while bandwidth shaping is performed by administrator-defined quality of service (QoS) policies for Eliminate Backup Impacts While Improving co-existing with other production traffic on the network. If a di- Recovery Capabilities saster occurs, InMage supports failover of application services InMage moves enterprises away from the “point in time” ori- to the DR site so that business operations can be quickly re- entation of backups that impact production operations. Since started despite a catastrophic failure at a primary site. Produc- data is being continuously captured as it is created, backup tion operations can be run from this DR site until the primary windows become a thing of the past, yet enterprises have
  • 5. white paper A Cost-Effective Integrated Solution for Backup and Disaster Recovery | 5 more granular access to recovery points. InMage effectively • Application-specific functionality is not a set of custom moves backup operations off production servers so that they scripts put together in the field - it is fully productized, do not impact business operations. meaning that it is developed, tested, documented and This approach can significantly minimize the need for tape- supported by InMage, a fact which results in a reliable based infrastructure. Since most local recoveries are per- solution with predictable performance formed from relatively recent backups, companies that use • Multiple application solutions can be combined on a single InMage to keep several days to several weeks of changes CX but managed through a single secure, web browser- resident on disk will end up performing most recovery opera- based GUI (a command line interface is available as well) tions from disk, resulting in faster, more reliable recoveries to produce well integrated solutions that are easy to that, given InMage’s granular data capture and recovery point install, deploy, and manage selection capabilities, can meet much more stringent RPO/RTO AppShots have other administrative value than just as opti- requirements. Companies that before were performing a single mum recovery points. They make it easy to cut off copies of weekly full backup with six incrementals may decide to dump production data sets at any time without impacting production data to tape far less frequently, possibly once a week, only operations. These AppShots can be mounted on non-produc- after data ages out of an administrator-defined data stream tion servers to support business intelligence tasks and other retention period, after data has been replicated to a remote reporting functions as well as test and development opera- site, or only after data reaches a certain defined age at the tions. Since AppShots can be retroactively created to repre- remote site. Remote offices that previously were dealing with sent any desired point in time, they can be used to time shift tapes can now move to tape-less operations that rely on disk- administrative operations to optimize operator productivity. based recovery that is centrally managed. Enterprises that do not keep “backup” data around for more than several months InMage: Unique Hybrid Recovery Technology may in fact be able to move to completely tape-less backup operations. InMage uses an architecture that is unique in the industry. Key concerns this unique architecture was built to address include Application-Aware Solutions cost-effective scalability across a wide range of configurations from several to several hundred servers, non-disruptive deploy- InMage supports a number of different application-aware ment (in terms of both host impact and in failure modes), and recovery solutions for key enterprise applications, including an ability to accommodate heterogeneous servers and storage Microsoft Exchange, SQL, and SharePoint, as well as Oracle, as well as a variety of different storage architectures. Granular MySQL, Blackberry Server, SAP and any Windows, Linux, or , data capture and selection of recovery points was a critical Unix file systems, among others. Multiple application solu- design tenet, both for minimizing the impact of data protec- tions can run on a single CX although each application solution tion operations on protected servers but also in providing the includes application-specific integration, particularly for instal- maximum flexibility in selecting the optimum recovery point to lation, tracking application-consistent recovery points (known meet a variety of different RPO/RTO requirements. as AppShots), and for managing application failover/failback. This integration results in a solution that produces fast, reliable Granular Data Capture and Recovery application and data recovery but is managed under a set of Conventional backups are performed periodically, and as data policies (installation, deployment, marking AppShot recovery sets grow this “point in time” approach presents problems. points, creating and using AppShots, failover/failback, etc.) that InMage completely avoids the problems associated with trying are common across all application environments. InMage’s to back up an ever increasing amount of data through static ability to manage multiple application recovery solutions under network links and within given backup windows by collecting a common management framework provides a compelling changes continuously, as they occur. This effectively spreads alternative to application-specific solutions that support only the “backup” throughout the day and provides excellent one application type. protection for even large data sets across network links with There is a big difference between application-specific and appli- very limited bandwidth. The changes appear to InMage as a cation-aware solutions, and the latter offers significant benefits: data stream, and this stream is annotated with time stamps as • They make comprehensive recovery solutions for specific well as any number of markers that denote application events applications easy to buy and deploy of importance when it comes to recovery or other business operations. These markers, also referred to as bookmarks, can • They leverage application-specific domain expertise in our be inserted into the data stream either manually or through engineering groups to provide recovery capabilities tailored policies to mark any number of potential recovery points, such to application-specific requirements, producing better overall products
  • 6. white paper A Cost-Effective Integrated Solution for Backup and Disaster Recovery | 6 as application-consistent points created using application APIs Note that the data flow originates at the production server (e.g. VSS for Windows applications, RMAN for Oracle, etc.), sources, flows through the CX, and then onto one or more pre- and post-patch points, or meaningful financial milestones recovery server targets. This is a unique architecture that is nei- such as quarterly closes. The administrator specifies a reten- ther host-based nor appliance-based replication. It is a unique tion time frame for this data (e.g. 3 days, 2 weeks, a month, design – the only one of its kind in the storage industry – that etc.), and any point in that data stream of retained data can be imposes minimal server overhead, offers graceful scalability retroactively selected and used for recovery purposes. across a wide range, and can flexibly accommodate a number Once a recovery point has been selected, the administrator of different source and target devices. It does not suffer from can choose between creating a physical or a virtual disk-based the scalability and overhead problems of traditional host-based image of that point. Think of it as turning a dial back to any replication, does not require appliance pairs at each loca- desired point and generating the desired image. These images tion like traditional appliance-based replication, and does not can be designated as read only or read/write, depending on impose the vendor lock-in that is a disadvantage in array-based what they will be used for. Image creation can be scheduled, replication. It really is a hybrid model deploying elements of event-driven, or generated upon demand without impacting both host-based and appliance-based replication, which is why production applications in any way, and are mounted on recov- InMage refers to it as “hybrid recovery technology” . ery server targets for use. AppShots (application-consistent The CX includes the processing power necessary to provide points in time) are generally used for most application and significant functionality, such as driving the data stream marking data recoveries since they support the shortest RTOs, but policies, managing the creation and disposition of AppShots, other points that are generated based on time or other events minimizing the amount of data that has to be sent over the can be valuable for root cause analysis, business intelligence, WAN through capacity optimization technologies such as delta reporting, or other purposes. differencing, compression, and bandwidth shaping, managing encryption for data that is in-flight across the WAN, handling What Makes InMage Unique fault management issues such as transient network outages To manage data capture, InMage deploys filter drivers, referred and application failover/failback, and performing I/O profiling. to as data taps, on each server for which protection is desired. I/O profiling is an interesting area. The InMage Analyzer can be The data taps pass writes directly through to storage targets installed prior to production deployment to determine I/O rates owned by the production server while at the same time asyn- across the network, which provides valuable data in under- chronously passing them over to the local CX. The CX will then standing what sort of RPO/RTO requirements you can meet replicate that data to one or more recovery server targets, and with your existing infrastructure. This allows you to deploy those targets can be local and/or remote. The CX does not store with confidence, knowing what your recovery performance will data over time, it only acts as a “way station” for the data. The be. After deployment and during normal operation, the CX acts data is stored on the recovery server target(s). InMage uses as a focal point through which the data streams of potentially both CDP and replication as foundation technologies. multiple servers flow. InMage can monitor these I/O streams over time, helping administrators understand how the I/O load LOCAL SITE REMOTE SITE on their networks may vary at different times of the day and Production Server Source(s) over time. This trending analysis provides valuable input for Sources can be either network capacity planning. physical or virtual machines A single CX can simultaneously provide the recovery foundation Summary for multiple applications InMage is targeted for environments that have at least several servers that need either remote disaster recovery, better local InMage CX backup, and/or higher application availability managed through LA N WAN an automated failover/failback capability. It leverages low cost All transmission occurs across Recovery Server Target(s) IP-based networks for all data capture and replication, support- Data taps cost-effective IP networks ing low entry price points. Its heterogeneous support allows the use of any storage devices using any type of architecture, Recovery Server Target(s) Targets can be either physical or virtual machines and this investment preservation story contributes to its flex- ibility and cost-effective deployment. 50% of our customers Figure 2. InMage collects data from source servers at a very granular level (write by write) use InMage to meet both DR and local backup requirements, across a LAN, then replicates that data to one or more target servers which can be either local or remote.
  • 7. white paper A Cost-Effective Integrated Solution for Backup and Disaster Recovery | 7 and find themselves able to remove heavyweight backup and InMage is a great solution for mid market companies that are other agents from many servers, freeing up CPU cycles (a par- looking for cost-effective DR options, may be struggling with ticularly important issue in virtual server environments) through tape-based backup infrastructure, are considering a virtual tape InMage’s “host off-load” design. Since most data recoveries library, and/or want higher application availability but are put off use the most recent data, customers generally keep several by the cost and complexity of conventional clustering solutions. days to several weeks of data within the InMage repository, It is the only block-based replication option available on the leveraging the advantages of InMage’s very granular data cap- market that combines remote DR, local backup, and application ture and recovery capabilities as well as the benefits of disk- failover/failback in a single, easy to deploy platform. Its’ non- based recovery to handle most recoveries. If customers want disruptive deployment, heterogeneous support, and granular to migrate older backup data into another application, such as recovery capabilities offer a compelling value proposition for backup or archive software, that data can be staged from App- enterprises concerned about DR, backup windows, RPO/RTO, Shots without imposing any production impacts whatsoever. recovery reliability, and/or application availability. 3255-1 Scott Boulevard, Suite 104, Santa Clara, CA 95054 | 1.800.646.3617 | p: 408.200.3840 | f: 408.588.1590 | info@inmage.com www.inmage.com 2010V1 Copyright 2010, InMage Systems, Inc. All Rights Reserved. This document is provided for information purposes only, and the contents hereof are subject to change without notice. The information contained herein is the proprietary and confidential information of InMage and may not be reproduced or transmitted in any form for any purpose without InMage’s prior written permission. InMage is a registered trademark of InMage Systems, Inc.