Situation Thank you for joining us. Today, operational efficiency is key for any size organization. Especially when it comes to IT and technology. The business requires that IT provide solutions that keep it functional, competitive, and efficient. Pain/Complication Unfortunately, IT has the challenge of aligning and support the business needs but under finite resources. A specified budget, specified headcount, and specific needs for implementation and maintenance. Implication Failure to have the right technology not only means you might not be able to conduct your business, but your critical business data is at risk, your business is not running efficiently, and your organization could even face legal exposure. Opening Before I continue, though, I’d like to know, how many of you are currently using Backup Exec in your environments and organizations? Take Poll Great. Thank you. Position As many/some of you are already Backup Exec users, today we’re going to cover Backup and Beyond. Covering areas of how to get the most out of your data protection solution. We’re going to go through a process that helps you identify bring new efficiencies to your organization, and help meet new regulatory compliance requirements. I will also discuss best practices and methodologies to help you fill any gaps, and protect the business critical information within your organization. Action We will go through specific questions you can ask yourself and areas of your environment you need to consider. So please, pay attention, keep note of any questions you have, because we will set aside specific time to address your questions and thoughts. Benefits When I’m, you will have learned about some new solutions that bring operational efficiencies, reduces costs, and the ability to efficiently manage your data and storage in light of business and even regulatory needs.
Note to speaker: This is a SMB specific slide – created around a Microsoft Windows environment. The next slide typifies a large, complex enterprise environment. Note that both SMB and enterprises face the same challenges of security, business continuity, and share the desire to reduce operating costs while streamlining operating efficiency. You can look at the notes on the following slide for differentiation or similar points to share with the audience. Convergence of pressure on IT to meet business and technical challenges.
To maximize efficiency, organizations need a comprehensive protection strategy. In working with our customers, VERITAS has identified three primary areas to focus on to ensure complete protection and operational efficiency – data protection, data recovery, and data management. When viewed as a whole, these provide 360 degrees of coverage. A comprehensive solution that protects your business critical information and brings greater efficiencies. And to determine if you have 360 degrees of coverage, there are three simple questions to ask yourself: Hit Page Down, Arrow Down, Or Enter Key Are you covered? Can you recover? Are you in control?
So when we began, we asked the question “Are You Covered?” Hit Page Down or click mouse And with the solutions we discussed today, you can answer that “yes.” Let’s review. For Local data protection, we improved application availability and backups with Backup Exec, and a number of its agents/options. Hit Page Down or click mouse For protection your mobile data, your desktops and laptops, we discussed the Desktop and Laptop Option. Hit Page Down or click mouse And finally, to protect the business critical data in your remote offices, we introduced you to centralized backups via VERITAS Storage Replicator.
In addition to understanding the criticality of your data, you must also ensure that you can not only get the important data back but that you can get the business up and running quickly. How much time will it take you. Can your business afford to be down for minutes, hours, days, weeks? Knowing this will help you determine what solution you need to have. As we consider rapid data recovery, we need to discuss two concepts – Recovery Point Objective and Recovery Time Objective. Recovery Point Objective (RPO) is how much data loss can you afford during a loss. Recovery Time Objective (RTO) means once a loss occurs, how much time can you afford to take to come back online? The RPO/RTO must be looked at for each application (not based on site) but based on individual application since each application may have different needs.
Your need should determine which technology you go with. You may decide that the application can withstand hours, or even days, of downtime, so a very simple tape-based backup solution might be enough for you. You may also decide that you've got a highly transactional mission-critical application, maybe it's an online web site, or your Exchange server, so you can only withstand minutes, or even seconds, of downtime. To get you back up in minutes, you would look at snapshot technologies.
Gaining visibility and control into the data in your organization lets you better manage that data and content, and maximize the efficiency of your environment. Let’s take a moment to talk about how to maximize your hardware resources and at the same time reduce your backup and restore times. There’s no disputing that data continues to grow. And to ensure an organization it protected, you want to back that data up. Hit Enter, space bar, or Page Down. You have Word files, PowerPoint Files, customer data, sales projections, databases full of information. But there are also MP3’s, AVI’s, pictures, viruses, even adult oriented material. Hit Enter, space bar, or Page Down. This information is sitting on employees’ desktops and laptops, on your corporate servers and network shares. And all this information is getting backed up. Unfortunately… Hit Enter, space bar, or Page Down. This non-business critical data. And this impact is Hit Enter, space bar, or Page Down. That this unnecessary business data is not only eating up your storage, but network efficiency, and backup time. To maximize your current hardware resources and open up your backup and restore windows, as well as avoid potential legal exposure, VERITAS offers VERITAS StorageCentral. Hit Enter, space bar, or Page Down. To maximize your current hardware resources and open up your backup and restore windows, as well as avoid potential legal exposure which we will talk about in a minute, organizations need a solution that can manage non-business oriented material. Something that will provide real-time enforcement of user storage allocations, file blocking policies through hard or soft quotas, and content checking. And that is automated to correct the situation without you have to do the clean up – or be the IT data police officer. Hit Enter, space bar, or Page Down. The benefit is that you get control over the non-business critical or data threatening files you don’t want on your servers or do not want to backup, and helps you reclaim 30% or more of your storage, and improve your backup and restore times.
VERITAS allows system administrators to more efficiently administer environments by virtualizing storage with logical volume management. Virtualization is the process of taking multiple heterogeneous physical storage devices and combining them into logical (virtual) storage devices that are allocated to applications and users at will. Once virtualized, the storage can be managed in a much more flexible manner, enabling it to be kept online during many of the operations in which the server previously had to be taken offline. Describe what you see on the slide With virtualization, you can do everything online without taking systems offline and disrupting access to data.
We have covered a lot of material here today. Under data protection, we discussed: Improving your application availability, beyond simply backing up your data Support and flexibility to meet advanced backup methods like NAS, SAN, or disk-based backup Ensuring your mobile data, your data off your servers and outside any datacenter, was protected with new Desktop and Laptop option Solutions for remote offices, whether you are backing up at that office or looking to centralize back to a primary location
Backup and Beyond Comprehensive Data Protection, Recovery, and Management Solutions Bruce W. Hunter November 10, 2004
Challenges IT Business Operational Efficiency Limited Budgets Regulatory Compliance Technology ROI Maximizing Resources Technical More Applications More Data Server Consolidation NT Migration Data Archiving Server Application Database Web Server SMB Environment Storage
Comprehensive Protection 360 o of Data Protection and Management DATA RECOVERY DATA PROTECTION DATA MANAGEMENT CAN YOU RECOVER? ARE YOU COVERED? ARE YOU IN CONTROL?
Are You Covered? VERITAS Backup Exec (Specific Agents and Options) VERITAS Storage Replicator Data Protection Exchange Server Network Share SQL Server File/Print Server SQL Server File/Print Server Web Server LAN Backup/Media Server Tape Library NAS or Disk-Based Backup Tape Library SAN Storage Tape Library Backup/Media Server WAN Desktops and Laptops VERITAS Backup Exec Desktop and Laptop Option
Determining Your Data Recovery Needs <ul><li>Amount of data loss acceptable </li></ul><ul><li>The point to which data must be restored </li></ul>RECOVERY POINT OBJECTIVE <ul><li>Amount of time it takes to come back online </li></ul><ul><li>The time by which data must be restored </li></ul>RECOVERY TIME OBJECTIVE Days Mins Hrs Wks Secs Recovery Point Mins Days Hrs Secs Wks Recovery Time
Determining Your Recovery Needs Days Mins Hrs Wks Secs Mins Days Hrs Secs Wks Recovery Point Recovery Time Tape Restore Clustering Snapshots Replication Tape Backup Periodic Replication Snapshots
Managing Content – Maximizing Efficiency Tape Library Backup/Media Server Storage Utilization Backup & Restore Times Network Share File/Print Server Web Server LAN ! ! ! ! ! ! ! ! EFFICIENCY METER X X X X X X X X
<ul><li>Virtualize physical disks into logical disks </li></ul><ul><li>Perform storage management on-line </li></ul><ul><li>Virtually eliminate the downtime associated with data migration or reconfiguration </li></ul><ul><li>Reduce single points of failure </li></ul>Improved Storage Management LAN Brand “A” Disk Array Virtualized Disks Host Server (Control Console) Brand “B” Disk Array data flow JBOD
Comprehensive Protection Backup And Beyond DATA RECOVERY DATA PROTECTION DATA MANAGEMENT Backup Exec Desktop & Laptop Option VERITAS Backup Exec VERITAS Storage Replicator VERITAS Storage Foundation for Windows VERITAS Backup Exec Intelligent Disaster Recovery Option VERITAS Storage Foundation for Windows VERITAS Storage Central