SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Disk-to-Cloud Backup Solution using Vizioncore vRanger Pro ™  DPP and CloudArray ™  software for VMware ®  virtualized server environments
Overview ,[object Object],[object Object],[object Object],[object Object]
Example Environment  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Backup Targets Tape and/or D2D Windows Proxy  Server running vRanger Pro 4 and  vCenter vRanger Pro 4 VM Ph. Host  VM disk files on  primary storage Data Center D2D Tape Host n SAN LAN Offsite Tape  Backup Storage Typical backup solution using vRanger Pro 4 VM data backup VM data restore (CIFS)
Backup Targets Tape and/or D2D Windows Proxy  Server running vRanger Pro 4 and  vCenter vRanger Pro 4 VM Ph. Host  VM disk files on  primary storage Data Center D2D Tape Host n SAN LAN Offsite Tape  Backup Storage ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],VM data backup VM data restore (CIFS)
Backup Targets Tape and/or D2D Windows Proxy  Server running vRanger Pro 4 and  vCenter vRanger Pro 4 VM Ph. Host  VM disk files on  primary storage Data Center D2D Tape Host n SAN LAN Offsite Tape  Backup Storage ,[object Object],[object Object],[object Object],VM data backup VM data restore (CIFS)
Backup Target Windows Proxy  Server running vRanger Pro 4 and  vCenter vRanger Pro 4 VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM data backup VM data restore Storing backup data for recovery in the Cloud offers many benefits, but how do we connect vRanger Pro to the Cloud…?
Backup Target Windows Proxy  Server running vRanger Pro 4 and  vCenter vRanger Pro 4 VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM data backup VM data restore … with CloudArray software!  CloudArray
Windows Proxy  Server running vRanger Pro 4 and  vCenter vRanger Pro 4 VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN CloudArray ESX … CloudArray Volumes CloudArray Virtual  Appliance CloudArray operates as a virtual appliance  It presents iSCSI volumes to physical and virtual servers Volumes are block-based and replicate data to cloud storage providers It’s local cache allows fast access to data
Windows Proxy  Server running vRanger Pro 4 and  vCenter vRanger Pro 4 VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN CloudArray ESX … CloudArray Volumes CloudArray Virtual  Appliance Provision CloudArray volume(s) using local storage as a cache or a full local copy
Windows Proxy  Server running vRanger Pro 4 and  vCenter vRanger Pro 4 VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN CloudArray ESX … Cloud Storage  Providers WAN CloudArray Volumes CloudArray Virtual  Appliance CloudArray volume(s) are mapped to your choice of Cloud storage service providers
Windows Server Windows Proxy  Server running vRanger Pro 4 and  vCenter vRanger Pro 4 VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM data backup VM data restore CloudArray ESX … Cloud Storage  Providers WAN CloudArray Volumes CloudArray Virtual  Appliance T: (CIFS) Present CloudArray volume to Windows Server Backup host Windows Server creates NTFS on the volume and mounts the drive
Windows Server Windows Proxy  Server running vRanger Pro 4 and  vCenter vRanger Pro 4 VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM data backup VM data restore CloudArray ESX … Cloud Storage  Providers WAN CloudArray Volumes CloudArray Virtual  Appliance T: (CIFS) Windows Server presents CloudArray volume as a CIFS share to Windows Server running vRanger Pro
Windows Server Windows Proxy  Server running vRanger Pro 4 and  vCenter vRanger Pro 4 VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM data backup VM data restore CloudArray ESX … Cloud Storage  Providers WAN CloudArray Volumes CloudArray Virtual  Appliance T: (CIFS) vRanger Pro initiates a backup of VMs and writes data to CIFS share
Windows Server Windows Proxy  Server running vRanger Pro 4 and  vCenter vRanger Pro 4 VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM data backup VM data restore CloudArray ESX … Cloud Storage  Providers WAN CloudArray Volumes CloudArray Virtual  Appliance T: (CIFS) The data set is written to CloudArray local cache
Windows Server Windows Proxy  Server running vRanger Pro 4 and  vCenter vRanger Pro 4 VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM data backup VM data restore CloudArray ESX … Cloud Storage  Providers WAN CloudArray Volumes CloudArray Virtual  Appliance T: (CIFS) The data set is replicated to one or more Cloud storage providers Encryption,  Compression,
Windows Server Windows Proxy  Server running vRanger Pro 4 and  vCenter vRanger Pro 4 VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM data backup VM data restore CloudArray ESX … Cloud Storage  Providers WAN CloudArray Volumes CloudArray Virtual  Appliance T: (CIFS) A restore operation from vRanger Pro retrieves data from CloudArray local cache and Cloud storage provider(s)
CloudArray vs. Existing Backup & Replication Solutions: 5 TB Environment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3 yr-TCO for CloudArray vs. Existing  Backup and Replication Solutions
Feature / Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Eval of CloudArray is Available Now ,[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Automating Backup & Archiving with AWS and CommVault
Automating Backup & Archiving with AWS and CommVaultAutomating Backup & Archiving with AWS and CommVault
Automating Backup & Archiving with AWS and CommVaultAmazon Web Services
 
Reference Architecture: Architecting Ceph Storage Solutions
Reference Architecture: Architecting Ceph Storage Solutions Reference Architecture: Architecting Ceph Storage Solutions
Reference Architecture: Architecting Ceph Storage Solutions Ceph Community
 
{code} and Containers - Open Source Infrastructure within Dell Technologies
{code} and Containers - Open Source Infrastructure within Dell Technologies{code} and Containers - Open Source Infrastructure within Dell Technologies
{code} and Containers - Open Source Infrastructure within Dell TechnologiesThe {code} Team
 
Using S3 Select to Deliver 100X Performance Improvements Versus the Public Cloud
Using S3 Select to Deliver 100X Performance Improvements Versus the Public CloudUsing S3 Select to Deliver 100X Performance Improvements Versus the Public Cloud
Using S3 Select to Deliver 100X Performance Improvements Versus the Public CloudDatabricks
 
Everything You Need To Know About Persistent Storage in Kubernetes
Everything You Need To Know About Persistent Storage in KubernetesEverything You Need To Know About Persistent Storage in Kubernetes
Everything You Need To Know About Persistent Storage in KubernetesThe {code} Team
 
Configuring Aerospike - Part 2
Configuring Aerospike - Part 2 Configuring Aerospike - Part 2
Configuring Aerospike - Part 2 Aerospike, Inc.
 
Ozone: Evolution of HDFS scalability & built-in GDPR compliance
Ozone: Evolution of HDFS scalability & built-in GDPR complianceOzone: Evolution of HDFS scalability & built-in GDPR compliance
Ozone: Evolution of HDFS scalability & built-in GDPR complianceDinesh Chitlangia
 
Pros and Cons of Erasure Coding & Replication vs. RAID in Next-Gen Storage
Pros and Cons of Erasure Coding & Replication vs. RAID in Next-Gen StoragePros and Cons of Erasure Coding & Replication vs. RAID in Next-Gen Storage
Pros and Cons of Erasure Coding & Replication vs. RAID in Next-Gen StorageEric Carter
 
Hyperconverged Cloud, Not just a toy anymore - Andrew Hatfield, Red Hat
Hyperconverged Cloud, Not just a toy anymore - Andrew Hatfield, Red HatHyperconverged Cloud, Not just a toy anymore - Andrew Hatfield, Red Hat
Hyperconverged Cloud, Not just a toy anymore - Andrew Hatfield, Red HatOpenStack
 
Getting The Most Out Of Your Flash/SSDs
Getting The Most Out Of Your Flash/SSDsGetting The Most Out Of Your Flash/SSDs
Getting The Most Out Of Your Flash/SSDsAerospike, Inc.
 
CEPH DAY BERLIN - WHAT'S NEW IN CEPH
CEPH DAY BERLIN - WHAT'S NEW IN CEPH CEPH DAY BERLIN - WHAT'S NEW IN CEPH
CEPH DAY BERLIN - WHAT'S NEW IN CEPH Ceph Community
 
Performance tuning in BlueStore & RocksDB - Li Xiaoyan
Performance tuning in BlueStore & RocksDB - Li XiaoyanPerformance tuning in BlueStore & RocksDB - Li Xiaoyan
Performance tuning in BlueStore & RocksDB - Li XiaoyanCeph Community
 
Aerospike Architecture
Aerospike ArchitectureAerospike Architecture
Aerospike ArchitecturePeter Milne
 
Red Hat Gluster Storage : GlusterFS
Red Hat Gluster Storage : GlusterFSRed Hat Gluster Storage : GlusterFS
Red Hat Gluster Storage : GlusterFSbipin kunal
 
NVMe over Fabrics and Composable Infrastructure - What Do They Mean for Softw...
NVMe over Fabrics and Composable Infrastructure - What Do They Mean for Softw...NVMe over Fabrics and Composable Infrastructure - What Do They Mean for Softw...
NVMe over Fabrics and Composable Infrastructure - What Do They Mean for Softw...Ceph Community
 
An intro to Ceph and big data - CERN Big Data Workshop
An intro to Ceph and big data - CERN Big Data WorkshopAn intro to Ceph and big data - CERN Big Data Workshop
An intro to Ceph and big data - CERN Big Data WorkshopPatrick McGarry
 
Let's Compare: A Benchmark review of InfluxDB and Elasticsearch
Let's Compare: A Benchmark review of InfluxDB and ElasticsearchLet's Compare: A Benchmark review of InfluxDB and Elasticsearch
Let's Compare: A Benchmark review of InfluxDB and ElasticsearchInfluxData
 
Glusterfs and openstack
Glusterfs  and openstackGlusterfs  and openstack
Glusterfs and openstackopenstackindia
 

Was ist angesagt? (20)

Automating Backup & Archiving with AWS and CommVault
Automating Backup & Archiving with AWS and CommVaultAutomating Backup & Archiving with AWS and CommVault
Automating Backup & Archiving with AWS and CommVault
 
Reference Architecture: Architecting Ceph Storage Solutions
Reference Architecture: Architecting Ceph Storage Solutions Reference Architecture: Architecting Ceph Storage Solutions
Reference Architecture: Architecting Ceph Storage Solutions
 
{code} and Containers - Open Source Infrastructure within Dell Technologies
{code} and Containers - Open Source Infrastructure within Dell Technologies{code} and Containers - Open Source Infrastructure within Dell Technologies
{code} and Containers - Open Source Infrastructure within Dell Technologies
 
Using S3 Select to Deliver 100X Performance Improvements Versus the Public Cloud
Using S3 Select to Deliver 100X Performance Improvements Versus the Public CloudUsing S3 Select to Deliver 100X Performance Improvements Versus the Public Cloud
Using S3 Select to Deliver 100X Performance Improvements Versus the Public Cloud
 
Everything You Need To Know About Persistent Storage in Kubernetes
Everything You Need To Know About Persistent Storage in KubernetesEverything You Need To Know About Persistent Storage in Kubernetes
Everything You Need To Know About Persistent Storage in Kubernetes
 
Configuring Aerospike - Part 2
Configuring Aerospike - Part 2 Configuring Aerospike - Part 2
Configuring Aerospike - Part 2
 
Ozone: Evolution of HDFS scalability & built-in GDPR compliance
Ozone: Evolution of HDFS scalability & built-in GDPR complianceOzone: Evolution of HDFS scalability & built-in GDPR compliance
Ozone: Evolution of HDFS scalability & built-in GDPR compliance
 
Pros and Cons of Erasure Coding & Replication vs. RAID in Next-Gen Storage
Pros and Cons of Erasure Coding & Replication vs. RAID in Next-Gen StoragePros and Cons of Erasure Coding & Replication vs. RAID in Next-Gen Storage
Pros and Cons of Erasure Coding & Replication vs. RAID in Next-Gen Storage
 
Hyperconverged Cloud, Not just a toy anymore - Andrew Hatfield, Red Hat
Hyperconverged Cloud, Not just a toy anymore - Andrew Hatfield, Red HatHyperconverged Cloud, Not just a toy anymore - Andrew Hatfield, Red Hat
Hyperconverged Cloud, Not just a toy anymore - Andrew Hatfield, Red Hat
 
Getting The Most Out Of Your Flash/SSDs
Getting The Most Out Of Your Flash/SSDsGetting The Most Out Of Your Flash/SSDs
Getting The Most Out Of Your Flash/SSDs
 
CEPH DAY BERLIN - WHAT'S NEW IN CEPH
CEPH DAY BERLIN - WHAT'S NEW IN CEPH CEPH DAY BERLIN - WHAT'S NEW IN CEPH
CEPH DAY BERLIN - WHAT'S NEW IN CEPH
 
Performance tuning in BlueStore & RocksDB - Li Xiaoyan
Performance tuning in BlueStore & RocksDB - Li XiaoyanPerformance tuning in BlueStore & RocksDB - Li Xiaoyan
Performance tuning in BlueStore & RocksDB - Li Xiaoyan
 
Aerospike Architecture
Aerospike ArchitectureAerospike Architecture
Aerospike Architecture
 
Red Hat Gluster Storage : GlusterFS
Red Hat Gluster Storage : GlusterFSRed Hat Gluster Storage : GlusterFS
Red Hat Gluster Storage : GlusterFS
 
Freezer - Vietnam OpenStack Technical Meetup #12
Freezer - Vietnam OpenStack Technical Meetup #12Freezer - Vietnam OpenStack Technical Meetup #12
Freezer - Vietnam OpenStack Technical Meetup #12
 
NVMe over Fabrics and Composable Infrastructure - What Do They Mean for Softw...
NVMe over Fabrics and Composable Infrastructure - What Do They Mean for Softw...NVMe over Fabrics and Composable Infrastructure - What Do They Mean for Softw...
NVMe over Fabrics and Composable Infrastructure - What Do They Mean for Softw...
 
An intro to Ceph and big data - CERN Big Data Workshop
An intro to Ceph and big data - CERN Big Data WorkshopAn intro to Ceph and big data - CERN Big Data Workshop
An intro to Ceph and big data - CERN Big Data Workshop
 
Let's Compare: A Benchmark review of InfluxDB and Elasticsearch
Let's Compare: A Benchmark review of InfluxDB and ElasticsearchLet's Compare: A Benchmark review of InfluxDB and Elasticsearch
Let's Compare: A Benchmark review of InfluxDB and Elasticsearch
 
Glusterfs and openstack
Glusterfs  and openstackGlusterfs  and openstack
Glusterfs and openstack
 
Ceph as software define storage
Ceph as software define storageCeph as software define storage
Ceph as software define storage
 

Andere mochten auch

Physical And Virtual Server Management
Physical And Virtual Server ManagementPhysical And Virtual Server Management
Physical And Virtual Server ManagementAmit Gatenyo
 
Backup And File Management
Backup And File ManagementBackup And File Management
Backup And File Managementmrbennett2009
 
Cloud Backup Overview
Cloud Backup OverviewCloud Backup Overview
Cloud Backup Overviewddaragh
 
InfiniFlux Backup
InfiniFlux BackupInfiniFlux Backup
InfiniFlux BackupInfiniFlux
 
Best Practices for Architecting Cloud Backup and Recovery Solutions - AWS Mar...
Best Practices for Architecting Cloud Backup and Recovery Solutions - AWS Mar...Best Practices for Architecting Cloud Backup and Recovery Solutions - AWS Mar...
Best Practices for Architecting Cloud Backup and Recovery Solutions - AWS Mar...Amazon Web Services
 
Vulnerability Scanning or Penetration Testing?
Vulnerability Scanning or Penetration Testing?Vulnerability Scanning or Penetration Testing?
Vulnerability Scanning or Penetration Testing?amiable_indian
 
Solution Brief - Cloud Backup Services
Solution Brief - Cloud Backup ServicesSolution Brief - Cloud Backup Services
Solution Brief - Cloud Backup ServicesCaitlin Brittingham
 

Andere mochten auch (9)

Physical And Virtual Server Management
Physical And Virtual Server ManagementPhysical And Virtual Server Management
Physical And Virtual Server Management
 
Management server internals
Management server internalsManagement server internals
Management server internals
 
Backup And File Management
Backup And File ManagementBackup And File Management
Backup And File Management
 
Backup & File Management
Backup & File ManagementBackup & File Management
Backup & File Management
 
Cloud Backup Overview
Cloud Backup OverviewCloud Backup Overview
Cloud Backup Overview
 
InfiniFlux Backup
InfiniFlux BackupInfiniFlux Backup
InfiniFlux Backup
 
Best Practices for Architecting Cloud Backup and Recovery Solutions - AWS Mar...
Best Practices for Architecting Cloud Backup and Recovery Solutions - AWS Mar...Best Practices for Architecting Cloud Backup and Recovery Solutions - AWS Mar...
Best Practices for Architecting Cloud Backup and Recovery Solutions - AWS Mar...
 
Vulnerability Scanning or Penetration Testing?
Vulnerability Scanning or Penetration Testing?Vulnerability Scanning or Penetration Testing?
Vulnerability Scanning or Penetration Testing?
 
Solution Brief - Cloud Backup Services
Solution Brief - Cloud Backup ServicesSolution Brief - Cloud Backup Services
Solution Brief - Cloud Backup Services
 

Ähnlich wie Backup / Restore to Cloud Storage with vRanger Pro and CloudArray software

Backup / Restore to Cloud Storage with esXpress and CloudArray software
Backup / Restore to Cloud Storage with esXpress and CloudArray softwareBackup / Restore to Cloud Storage with esXpress and CloudArray software
Backup / Restore to Cloud Storage with esXpress and CloudArray softwareTwinStrata
 
Backup / Restore to Cloud Storage with Veeam and CloudArray software
Backup / Restore to Cloud Storage with Veeam and CloudArray softwareBackup / Restore to Cloud Storage with Veeam and CloudArray software
Backup / Restore to Cloud Storage with Veeam and CloudArray softwareTwinStrata
 
Windows NAS on cloud storage using CloudArray software
Windows NAS on cloud storage using CloudArray softwareWindows NAS on cloud storage using CloudArray software
Windows NAS on cloud storage using CloudArray softwareTwinStrata
 
Twin stratacloudarraywindowsnas
Twin stratacloudarraywindowsnasTwin stratacloudarraywindowsnas
Twin stratacloudarraywindowsnasguestfbdd04
 
VMUG - Falconstor Presentation
VMUG - Falconstor PresentationVMUG - Falconstor Presentation
VMUG - Falconstor Presentation1CloudRoad.com
 
Efficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environmentsEfficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environmentsKingfin Enterprises Limited
 
Enterprise Storage NAS - Dual Controller
Enterprise Storage NAS - Dual ControllerEnterprise Storage NAS - Dual Controller
Enterprise Storage NAS - Dual ControllerFernando Barrientos
 
Introducing CloudBacko cloud / local backup software
Introducing CloudBacko cloud / local backup softwareIntroducing CloudBacko cloud / local backup software
Introducing CloudBacko cloud / local backup softwareAdeline Wong
 
Storage essentials (by Merlin Ran)
Storage essentials (by Merlin Ran)Storage essentials (by Merlin Ran)
Storage essentials (by Merlin Ran)gigix1980
 
Azure Backup component matrix
Azure Backup component matrixAzure Backup component matrix
Azure Backup component matrixAnthony Clendenen
 
Product to Try | Morro Data
Product to Try | Morro DataProduct to Try | Morro Data
Product to Try | Morro DataMorro Data
 
AWS re:Invent 2016: Getting Started with the Hybrid Cloud: Enterprise Backup ...
AWS re:Invent 2016: Getting Started with the Hybrid Cloud: Enterprise Backup ...AWS re:Invent 2016: Getting Started with the Hybrid Cloud: Enterprise Backup ...
AWS re:Invent 2016: Getting Started with the Hybrid Cloud: Enterprise Backup ...Amazon Web Services
 
Disaster Recovery Options on AWS Loft
Disaster Recovery Options on AWS LoftDisaster Recovery Options on AWS Loft
Disaster Recovery Options on AWS LoftAmazon Web Services
 
Presentacion NetApp Funcionalidades.pptx
Presentacion NetApp Funcionalidades.pptxPresentacion NetApp Funcionalidades.pptx
Presentacion NetApp Funcionalidades.pptxssuser97bdaf
 
Guaranteeing Storage Performance by Mike Tutkowski
Guaranteeing Storage Performance by Mike TutkowskiGuaranteeing Storage Performance by Mike Tutkowski
Guaranteeing Storage Performance by Mike Tutkowskibuildacloud
 
Scop Computers - 8sept2011
Scop Computers - 8sept2011Scop Computers - 8sept2011
Scop Computers - 8sept2011Agora Group
 
Best Practices for Backup and Recovery: Windows Workload on AWS
Best Practices for Backup and Recovery: Windows Workload on AWS Best Practices for Backup and Recovery: Windows Workload on AWS
Best Practices for Backup and Recovery: Windows Workload on AWS Amazon Web Services
 
Microsoft SharePoint Disaster Recovery to Azure
Microsoft SharePoint Disaster Recovery to AzureMicrosoft SharePoint Disaster Recovery to Azure
Microsoft SharePoint Disaster Recovery to AzureDavid J Rosenthal
 

Ähnlich wie Backup / Restore to Cloud Storage with vRanger Pro and CloudArray software (20)

Backup / Restore to Cloud Storage with esXpress and CloudArray software
Backup / Restore to Cloud Storage with esXpress and CloudArray softwareBackup / Restore to Cloud Storage with esXpress and CloudArray software
Backup / Restore to Cloud Storage with esXpress and CloudArray software
 
Backup / Restore to Cloud Storage with Veeam and CloudArray software
Backup / Restore to Cloud Storage with Veeam and CloudArray softwareBackup / Restore to Cloud Storage with Veeam and CloudArray software
Backup / Restore to Cloud Storage with Veeam and CloudArray software
 
Windows NAS on cloud storage using CloudArray software
Windows NAS on cloud storage using CloudArray softwareWindows NAS on cloud storage using CloudArray software
Windows NAS on cloud storage using CloudArray software
 
Twin stratacloudarraywindowsnas
Twin stratacloudarraywindowsnasTwin stratacloudarraywindowsnas
Twin stratacloudarraywindowsnas
 
VMUG - Falconstor Presentation
VMUG - Falconstor PresentationVMUG - Falconstor Presentation
VMUG - Falconstor Presentation
 
Efficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environmentsEfficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environments
 
Enterprise Storage NAS - Dual Controller
Enterprise Storage NAS - Dual ControllerEnterprise Storage NAS - Dual Controller
Enterprise Storage NAS - Dual Controller
 
Introducing CloudBacko cloud / local backup software
Introducing CloudBacko cloud / local backup softwareIntroducing CloudBacko cloud / local backup software
Introducing CloudBacko cloud / local backup software
 
Storage essentials (by Merlin Ran)
Storage essentials (by Merlin Ran)Storage essentials (by Merlin Ran)
Storage essentials (by Merlin Ran)
 
Azure Backup component matrix
Azure Backup component matrixAzure Backup component matrix
Azure Backup component matrix
 
Product to Try | Morro Data
Product to Try | Morro DataProduct to Try | Morro Data
Product to Try | Morro Data
 
AWS re:Invent 2016: Getting Started with the Hybrid Cloud: Enterprise Backup ...
AWS re:Invent 2016: Getting Started with the Hybrid Cloud: Enterprise Backup ...AWS re:Invent 2016: Getting Started with the Hybrid Cloud: Enterprise Backup ...
AWS re:Invent 2016: Getting Started with the Hybrid Cloud: Enterprise Backup ...
 
Double-Take Software
Double-Take SoftwareDouble-Take Software
Double-Take Software
 
Disaster Recovery Options on AWS Loft
Disaster Recovery Options on AWS LoftDisaster Recovery Options on AWS Loft
Disaster Recovery Options on AWS Loft
 
Presentacion NetApp Funcionalidades.pptx
Presentacion NetApp Funcionalidades.pptxPresentacion NetApp Funcionalidades.pptx
Presentacion NetApp Funcionalidades.pptx
 
Guaranteeing Storage Performance by Mike Tutkowski
Guaranteeing Storage Performance by Mike TutkowskiGuaranteeing Storage Performance by Mike Tutkowski
Guaranteeing Storage Performance by Mike Tutkowski
 
Scop Computers - 8sept2011
Scop Computers - 8sept2011Scop Computers - 8sept2011
Scop Computers - 8sept2011
 
Best Practices for Backup and Recovery: Windows Workload on AWS
Best Practices for Backup and Recovery: Windows Workload on AWS Best Practices for Backup and Recovery: Windows Workload on AWS
Best Practices for Backup and Recovery: Windows Workload on AWS
 
Nakivo overview
Nakivo overviewNakivo overview
Nakivo overview
 
Microsoft SharePoint Disaster Recovery to Azure
Microsoft SharePoint Disaster Recovery to AzureMicrosoft SharePoint Disaster Recovery to Azure
Microsoft SharePoint Disaster Recovery to Azure
 

Kürzlich hochgeladen

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 

Kürzlich hochgeladen (20)

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 

Backup / Restore to Cloud Storage with vRanger Pro and CloudArray software

  • 1. Disk-to-Cloud Backup Solution using Vizioncore vRanger Pro ™ DPP and CloudArray ™ software for VMware ® virtualized server environments
  • 2.
  • 3.
  • 4. Backup Targets Tape and/or D2D Windows Proxy Server running vRanger Pro 4 and vCenter vRanger Pro 4 VM Ph. Host VM disk files on primary storage Data Center D2D Tape Host n SAN LAN Offsite Tape Backup Storage Typical backup solution using vRanger Pro 4 VM data backup VM data restore (CIFS)
  • 5.
  • 6.
  • 7. Backup Target Windows Proxy Server running vRanger Pro 4 and vCenter vRanger Pro 4 VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM data backup VM data restore Storing backup data for recovery in the Cloud offers many benefits, but how do we connect vRanger Pro to the Cloud…?
  • 8. Backup Target Windows Proxy Server running vRanger Pro 4 and vCenter vRanger Pro 4 VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM data backup VM data restore … with CloudArray software! CloudArray
  • 9. Windows Proxy Server running vRanger Pro 4 and vCenter vRanger Pro 4 VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN CloudArray ESX … CloudArray Volumes CloudArray Virtual Appliance CloudArray operates as a virtual appliance It presents iSCSI volumes to physical and virtual servers Volumes are block-based and replicate data to cloud storage providers It’s local cache allows fast access to data
  • 10. Windows Proxy Server running vRanger Pro 4 and vCenter vRanger Pro 4 VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN CloudArray ESX … CloudArray Volumes CloudArray Virtual Appliance Provision CloudArray volume(s) using local storage as a cache or a full local copy
  • 11. Windows Proxy Server running vRanger Pro 4 and vCenter vRanger Pro 4 VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN CloudArray ESX … Cloud Storage Providers WAN CloudArray Volumes CloudArray Virtual Appliance CloudArray volume(s) are mapped to your choice of Cloud storage service providers
  • 12. Windows Server Windows Proxy Server running vRanger Pro 4 and vCenter vRanger Pro 4 VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM data backup VM data restore CloudArray ESX … Cloud Storage Providers WAN CloudArray Volumes CloudArray Virtual Appliance T: (CIFS) Present CloudArray volume to Windows Server Backup host Windows Server creates NTFS on the volume and mounts the drive
  • 13. Windows Server Windows Proxy Server running vRanger Pro 4 and vCenter vRanger Pro 4 VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM data backup VM data restore CloudArray ESX … Cloud Storage Providers WAN CloudArray Volumes CloudArray Virtual Appliance T: (CIFS) Windows Server presents CloudArray volume as a CIFS share to Windows Server running vRanger Pro
  • 14. Windows Server Windows Proxy Server running vRanger Pro 4 and vCenter vRanger Pro 4 VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM data backup VM data restore CloudArray ESX … Cloud Storage Providers WAN CloudArray Volumes CloudArray Virtual Appliance T: (CIFS) vRanger Pro initiates a backup of VMs and writes data to CIFS share
  • 15. Windows Server Windows Proxy Server running vRanger Pro 4 and vCenter vRanger Pro 4 VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM data backup VM data restore CloudArray ESX … Cloud Storage Providers WAN CloudArray Volumes CloudArray Virtual Appliance T: (CIFS) The data set is written to CloudArray local cache
  • 16. Windows Server Windows Proxy Server running vRanger Pro 4 and vCenter vRanger Pro 4 VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM data backup VM data restore CloudArray ESX … Cloud Storage Providers WAN CloudArray Volumes CloudArray Virtual Appliance T: (CIFS) The data set is replicated to one or more Cloud storage providers Encryption, Compression,
  • 17. Windows Server Windows Proxy Server running vRanger Pro 4 and vCenter vRanger Pro 4 VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM data backup VM data restore CloudArray ESX … Cloud Storage Providers WAN CloudArray Volumes CloudArray Virtual Appliance T: (CIFS) A restore operation from vRanger Pro retrieves data from CloudArray local cache and Cloud storage provider(s)
  • 18.
  • 19.
  • 20.