Unified Recovery Management


Published on

Data protection and recovery has become exceedingly complex and costly as IT environments have become larger and more distributed, virtualized, and more critical to the survival of the business. This presentation describes how IBM is addressing these challenges by simplifying and unifying data protection.

Published in: Technology
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Unified Recovery Management

  1. 1. © 2011 IBM CorporationUnified Recovery ManagementSimplify your Life, Reduce your RiskPresenter‟s Name - Presenter‟s TitlePresentation Datesmarter storagemanagement
  2. 2. © 2011 IBM CorporationUnified Recovery Management2AgendaThe complexities of data protection and recoveryIBM Unified Recovery Management SolutionsSample Recovery CapabilitiesSummaryWhy IBM?Next stepsMore information
  3. 3. © 2011 IBM CorporationUnified Recovery Management3Data protection and recovery is complex The amount of digital information continues to grow exponentially … The number of different kinds of systems you‟re using continues toexpand … Each application is more important the next … The places where important data is being created and stored aremultiplying … There are way too many things that can go wrong … Every vendor claims to be able to fix all your problems …You Need to do More with Less,and you need to do it smarter
  4. 4. © 2011 IBM CorporationUnified Recovery Management4Where is the data?InfrastructureHardwarePlatformsOperatingSystemsLocationsNetworksDesktopsLaptops Computers: x86, Power, RISC, Mainframe, etc. Storage: DAS, NAS, SAN, tape, optical, etc. AIX, HP-UX, Linux, Solaris, Windows, z/OS, etc. Data center, staff offices, production facility,remote/branch offices, DR site, warehouse, etc. LAN, SAN, WAN, MAN, Cable, USB, telecom, etc. Connected, disconnected, mobile, etc.
  5. 5. © 2011 IBM CorporationUnified Recovery Management5File and PrintMessagingDatabaseMission CriticalApplicationsInfrastructureHardwarePlatformsOperatingSystemsLocationsNetworksDesktopsLaptops File servers, NAS, content management,general storage Exchange/Domino, IM, collaboration DB2, Oracle, SAP, SQL, mySQL, etc. MRP, CRM, engineering/development, etc.Who owns the data?
  6. 6. © 2011 IBM CorporationUnified Recovery Management6Failure TypesFile/EmailDeletionVirusAttackDisk/ServerCrashLocalDisasterRegionalOutageFile and PrintMessagingDatabaseMission CriticalApplicationsInfrastructureHardwarePlatformsOperatingSystemsLocationsNetworksDesktopsLaptops User error Malicious actions May go undetected Hardware failure Fire, flood, etc. Earthquake, power grid WarWhat can go wrong?
  7. 7. © 2011 IBM CorporationUnified Recovery Management7RPORecoveryConsiderationsFailure TypesFile/EmailDeletionVirusAttackDisk/ServerCrashLocalDisasterRegionalOutageRTOLabor, SystemsBandwidth CostsImpact onApplicationsFile and PrintMessagingDatabaseMission CriticalApplicationsInfrastructureHardwarePlatformsOperatingSystemsLocationsNetworksDesktopsLaptopsHow much data canyou afford to lose?How long can youafford to be down?How much is thisgoing to cost?Will the cure kill thepatient?How do you balance needs and costs?
  8. 8. © 2011 IBM CorporationUnified Recovery Management8It‟s a very complex matrix; here‟s an example scenarioSituation: Large software company with HQ in NY Development office in San Jose, CA w/: Microsoft Exchange server– 3 file servers– Solaris server for developmentEvent: Local admin gets angry, quits, deletes VP‟semail inboxWhat would you do to recover? What tools would you use? Where / who? How long would it take? How much data would be lost?RPORecoveryConsiderationsFailure TypesFile/EmailDeletionVirusAttackDisk/ServerCrashLocalDisasterRegionalOutageRTOLabor, SystemsBandwidth CostsImpact onApplicationsFile and PrintMessagingDatabaseMission CriticalApplicationsInfrastructureHardwarePlatformsOperatingSystemsLocationsNetworksDesktopsLaptopsWhat if an earthquake knocked thebuilding off its foundation? Then howwould you answer these questions?Could you answer these questions for every possible event, in every location, for every different system & application type?
  9. 9. © 2011 IBM CorporationUnified Recovery Management9RPORecoveryConsiderationsFailure TypesFile/EmailDeletionVirusAttackDisk/ServerCrashLocalDisasterRegionalOutageRTOLabor, SystemsBandwidth CostsImpact onApplicationsFile and PrintMessagingDatabaseMission CriticalApplicationsSolutions &TechnologiesBackupCDPReplicationSnapshotsDR / BCDeduplicationDisk & TapeVirtual TapeReportingInfrastructureHardwarePlatformsOperatingSystemsLocationsNetworksDesktopsLaptopsWhich tool for which problem?
  10. 10. © 2011 IBM CorporationUnified Recovery Management10The complexities of data protection and recovery How many different tools are you using tomanage data protection and recovery? How many different admin tools do you have touse? Are they all located in one place, or scatteredaround the organization? Can one person have true visibility and control ofthe entire data protection and recoveryinfrastructure? How do you handle changes in theenvironment?Solutions &TechnologiesBackupCDPReplicationSnapshotsDR / BCDeduplicationDisk & TapeVirtual TapeReporting
  11. 11. © 2011 IBM CorporationUnified Recovery Management11Recovery management is challenging Meeting service level objectives and providingcontinuous availability of valuable files– Including email and mission critical application data Waiting for data to be restored– It can take hours or days to restore a large system Trying to restore data that wasn‟t backed-up– Once-a-night backup = 24 hrs of data at risk– Unreliable manual backup processes = more risk Shortage of skilled data administrators to managethe influx of disparate data– What about data in remote/branch offices? Shrinking backup windows– Difficult to back everything up within allotted „downtime‟
  12. 12. © 2011 IBM CorporationUnified Recovery Management12AgendaThe complexities of data protection and recoveryIBM Unified Recovery Management SolutionsSample Recovery CapabilitiesSummaryWhy IBM?Next stepsMore information
  13. 13. © 2011 IBM CorporationUnified Recovery Management13IBM Software – Unified Recovery Management Multi-year strategic initiative in Tivoli Storage Software Goals:– To manage the entire data protection and recovery infrastructure from a singleadministrative interface– To unify the management of data with an integrated portfolio: understandwhere all the recovery points are, manage them efficiently, and provide theinterfaces to recover whatever data is needed, where ever it resides Tivoli Storage Manager has always been a leader in broad,heterogeneous, multi-location recovery management Many improvements made in last 3 years:– Streamlined TSM Admin Center & Integrated Solutions Console– New, built-in reporting and monitoring– Integration of TSM, FastBack and FastBack for Workstations– Integration of Tivoli Storage FlashCopy Manager– Added non-disruptive backup/recovery of virtualized servers– Integrated off-site replication for “hot standby” disaster recovery
  14. 14. © 2011 IBM CorporationUnified Recovery Management14Tivoli Unified Recovery Management Offerings Tivoli Storage Manager– The leader in enterprise-wide data protection, unified recovery management andeffective data reduction; supporting hundreds of devices and operating platforms withmany application-specific connectors Tivoli Storage Manager for Virtual Environments– Advanced nondisruptive backup and flexible recovery capabilities for virtualized servers,leveraging VMware‟s vStorage APIs for Data Protection and Changed Block Tracking Tivoli Storage Manager FastBack– Advanced continuous data protection and near-instant recovery software solution forbusiness-critical Windows and Linux servers, remote offices and small- to mid-sizedenterprises Tivoli Storage Manager FastBack for Workstations– Automated, continuous data protection and recovery software solution for desktop andlaptop computers, with central management for thousands of systems Tivoli Storage FlashCopy Manager– Performs and manage frequent, near-instant, non-disruptive, application-aware backupsand restores, leveraging advanced FlashCopy snapshot technologies in IBM storagesystems Tivoli Storage Manager Suite for Unified Recovery– A bundle of 10 TSM and FastBack products, licensed by the amount of backup, archiveand HSM data being managed (1st copy only)
  15. 15. © 2011 IBM CorporationUnified Recovery Management15The scalability to meet any size challengeData growth of 40%-60% per year?NO PROBLEM !!! The best-in-class in scalability justGREW 100% for the 3rd straight year Now managing up to 4 BILLION dataobjects in a single TSM Server– Files and chunks of deduplicated files– Databases– Images Single server architecture– No need for additional “media servers”as you scale– 87.5% reduction in the number ofbackup servers needed to manage 4Bobjects (vs. TSM v5.5)– Reduced cost of ownershipTSM v5.52008TSM v6.12009TSM v6.22010TSM v6.320111B2B3B4B# of data objects managedby a TSM Server
  16. 16. © 2011 IBM CorporationUnified Recovery Management1616Vision: Tiered Recovery with Unified ManagementTier 1WANLANSANData RecoveryService Levels(RTO, RPO, ApplicationSynchronization, etc.)Tier 2RecoveryManagement Tier 3Recoverytechnologiesaligned withbusinessprioritiesTraditionalBackupMirroring,ReplicationSnapshots, CDPMobile OfficeLaptopsTSM FastBack forWorkstationsRemote OfficeBranch OfficeTSM FastBackEnterpriseData CenterTSM, TPC-R,FlashCopy Manager
  17. 17. © 2011 IBM CorporationUnified Recovery Management17AgendaThe complexities of data protection and recoveryIBM Unified Recovery Management SolutionsSample Recovery CapabilitiesSummaryWhy IBM?Next stepsMore information
  18. 18. © 2011 IBM CorporationUnified Recovery Management18Backup used to be so easy Install a backup agent on production server, schedule the backup, copythe data periodically to the backup serverProduction ServersBackup Server Tiered Storage
  19. 19. © 2011 IBM CorporationUnified Recovery Management19Tivoli Storage Manager for Virtual Environments Utilizes VMware‟s vStorage APIs forData Protection, including block-levelincremental backups based onVMware‟s Change Block Tracking– Support for vSphere 4.1, 5.0 andabove Offloads the backup workload fromvirtual machines and production ESXhosts to vStorage backup servers
  20. 20. © 2011 IBM CorporationUnified Recovery Management20Tivoli Storage Manager for Virtual Environments Provides flexible recovery options – file, volume or image – from a single-pass backup Near-instant restore of Windows and Linux disk volumes– Data is made available immediately while it is copied in the background Simplifies day-to-day administration with the centralized Tivoli StorageManager console– TSM for VE is supported on TSM Server v5.5 and above Automated discovery of new VMs; automatically applies backup policies vCenter plug-in for management within the VMware environment
  21. 21. © 2011 IBM CorporationUnified Recovery Management21Protecting Virtualized Servers Data is accessed directly from the VM storage and passed directly to the backupserver (single hop, data is not stored on the vStorage Server) Changed Block Tracking allows incremental backups (with periodic fulls) withoutforcing a scan of the guest OS file systemVMware ESX / ESXi ServerHypervisorVirtual MachinesvStorageServerTSMServervStorage API (VADP)Virtual DiskVolumesBackup/Restore Data
  22. 22. © 2011 IBM CorporationUnified Recovery Management22TSM FastBack also works great in virtual environments The TSM FastBack client is installed on individual virtual machines– No need for a proxy server– TSM FastBack‟s block-level, incremental-forever backup technology virtually eliminatesthe backup window and the load on the CPU– FastBack uses only about 2% of CPU cycles when running a backup job Can do bare machine recoveries of virtual servers to another virtual machine or toa physical machine (P-to-P, P-to-V, V-to-V, V-to-P)– Use for loading and migrating test environments and for on-demand disaster recovery The TSM FastBack Server component can also be run in a virtual machine
  23. 23. © 2011 IBM CorporationUnified Recovery Management23Near-Instant Restore with Tivoli Storage Manager FastBackFor critical Windows and Linux servers in the data center and remoteofficesBlock-level incremental backup Non-disruptive to applications, resource efficientFastBack Mount Recovers individual files and folders, from any point-in-time Opens an Explorer-like view into the FastBack repository Simple „drag-and-drop‟ operationVirtual Recovery Mounts an entire volume to be recovered Select any previous point-in-time (Recovery Point) New volume becomes available within seconds Read-write requests serviced by FastBack Data is restored in the background to target disk
  24. 24. © 2011 IBM CorporationUnified Recovery Management24Bare Machine Recovery with TSM FastBack for BMR Restore the Operating System volume in lessthan 1 hour– Recover on a similar server, to a completelydifferent server, or to a Virtual Machine Full access within minutes– With TSM FastBack‟s Virtual Restore technology,data volumes are made available as soon as thedata recovery process starts Great tool for cost-effective Business Continuity– “N-to-1” standby server ratio: one standby servercan provide cover for many production servers Can be used to quickly perform servermigrationsOther BMR solutions: TSM for System Backup and Recovery, and Cristie CBMR/TBMR
  25. 25. © 2011 IBM CorporationUnified Recovery Management25Granular Restore of Microsoft Exchange ObjectsCommon capabilities in TSM for Mail, Tivoli Storage FlashCopy Manager, andTSM FastBack for Microsoft Exchange Any Exchange e-mail object can be restored quickly: Messages Attachments Calendar entries Contacts Notes Tasks Journal entries Supports Shared / Public Folders Supports Exchange 2003, 2007 & 2010
  26. 26. © 2011 IBM CorporationUnified Recovery Management26Disaster Recovery Planning and ManagementIncluded in Tivoli Storage Manager Extended Edition Automated generation of a customizedserver disaster recovery plan Detailed off-site recovery mediamanagement Inventory of machine informationrequired to recover the server and itsclients Centralized management of the disasterrecovery process Executable scripts that assist in recoveryautomation Electronic vaulting of storage pool anddatabase backups
  27. 27. © 2011 IBM CorporationUnified Recovery Management27TSM client data replication for FASTER Disaster Recovery TSM server replicates all data and metadata for specified client data sets toanother server, ensuring completeness and consistency of data/metadata– Incremental client data transfer with deduplication to minimize bandwidth consumption– Many-to-1 transfer to target server Remote TSM server could be hot standby for primary server, for improved RTO Native TSM solution with no dependency on specific storage device– Supports dissimilar hardware and configuration at primary and remote sites Restore on a per-client basis without re-hydrating deduplicated dataStorage HierarchyMetadata and deduplicated dataDB2Site ATSM EEServer ASite BTSM EEServer BDatabaseStorage HierarchyDB2DatabaseClient AClient BClient CClient YClient X“HotStandby”for betterD/R SLAs
  28. 28. © 2011 IBM CorporationUnified Recovery Management28Disaster RecoveryLots of OptionsConfiguration options Source to target Between two activesources Many to one Round robin
  29. 29. © 2011 IBM CorporationUnified Recovery Management29AgendaThe complexities of data protection and recoveryIBM Unified Recovery Management SolutionsSample Recovery CapabilitiesSummaryWhy IBM?Next stepsMore information
  30. 30. © 2011 IBM CorporationUnified Recovery Management30Summary – IBM Unified Recovery Management
  31. 31. © 2011 IBM CorporationUnified Recovery Management31
  32. 32. © 2011 IBM CorporationUnified Recovery Management32Summary The Tivoli Storage Manager family is your “one stop shop” for all yourdata protection and unified recovery needs: Backup and restore Data lifecycle management, including archiving and HSM Broad support across operating systems, applications, server platforms,storage systems Seamless protection of virtualized servers, remote offices andworkstations: “from laptop to mainframe” Integrated disaster recovery planning and off-site replication
  33. 33. © 2011 IBM CorporationUnified Recovery Management33Unified Recovery ManagementSupporting a Dynamic Infrastructure Reduce your costs– Fewer tools to license & manage,simplified administration Eliminate risks– Fewer „moving parts‟ enables faster,more reliable backup & recovery Improve service levels– Cost and time savings enable greaterinvestment in the business– Improve competitiveness– Meet external & internal customer SLAs“IBM Tivoli StorageManager is the grand-daddy of unifiedrecovery management”Lauren Whitehouse,Sr. Analyst,Enterprise Strategy Group
  34. 34. © 2011 IBM CorporationUnified Recovery Management34AgendaThe complexities of data protection and recoveryIBM Unified Recovery Management SolutionsSample Recovery CapabilitiesSummaryWhy IBM?Next stepsMore information
  35. 35. © 2011 IBM CorporationUnified Recovery Management35Why IBM IBM has the global resources to help solve the IT and servicemanagement problems of even the largest organizations, almostanywhere they do business IBM is on solid financial footing and will be here to support our customersfor the long term IBM continues to invest heavily in research and development, providingcustomers with product roadmaps that will continue to add value to theirrelationship with IBM IBM offers the broadest range of products, services and financing optionsto help customers realize significant return on their investment
  36. 36. © 2011 IBM CorporationUnified Recovery Management36Next steps IBM Global Technology Services and IBMBusiness Partners stand ready to help youassess your current situation and recommendnext steps. We can help you determine which data protectionand recovery techniques will have the most cost-effective impact on your operations. Ask for a comprehensive ROI analysis usingIBM‟s comprehensive Business Value Analyst(BVA) tool.
  37. 37. © 2011 IBM CorporationUnified Recovery Management37For more informationLinks active in slideshow mode Storage Management Solutions Unified Recovery Management Backup and Recovery Solutions Remote Office Data Protection Data Reduction Solutions Storage Management in Cloud IBM Cloud Computing IBM Smart Business Storage Cloud Tivoli Storage Manager TSM Suite for Unified Recovery TSM for Virtual Environments Tivoli Storage Manager FastBack Tivoli Storage FlashCopy Manager Tivoli Storage Productivity Center SAN Volume Controller IBM Storage Blog
  38. 38. © 2011 IBM CorporationUnified Recovery Management38Get involved in IBM Storage Social Media Getting started and signing up for an ibm.com ID–If you do not have an ibm.com ID, you need to register for one–Note: Get help if youre not sure if you have an ibm.com ID or forgot yourpassword Creating your ibm.com profile in Lotus Connections–Once you have your ibm.com ID and password, go to ibm.com profilesand click on the MyProfile tab Join the IBM Storage community Are you on Twitter?–Follow IBM Storage on Twitter Are you LinkedIn?–Join the IBM Storage Group Follow our Blog
  39. 39. © 2011 IBM CorporationTHANK YOUContact Info:Richard Vining, Tivoli Storage Product Marketing Manager (rvining@us.ibm.com)smarter storagemanagement
  40. 40. © 2011 IBM CorporationUnified Recovery Management40Trademarks and disclaimersIntel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registeredtrademarks of Intel Corporation or its subsidiaries in the United States and other countries./ Linux is a registered trademark of Linus Torvalds in the United States, othercountries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. ITInfrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Government Commerce. ITILis a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office.UNIX is a registered trademark of The Open Group in the United States and other countries. Java and all Java-based trademarks are trademarks of Sun Microsystems,Inc. in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. Information is provided"AS IS" without warranty of any kind.The customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actualenvironmental costs and performance characteristics may vary by customer.Information concerning non-IBM products was obtained from a supplier of these products, published announcement material, or other publicly available sources and doesnot constitute an endorsement of such products by IBM. Sources for non-IBM list prices and performance numbers are taken from publicly available information,including vendor announcements and vendor worldwide homepages. IBM has not tested these products and cannot confirm the accuracy of performance, capability, orany other claims related to non-IBM products. Questions on the capability of non-IBM products should be addressed to the supplier of those products.All statements regarding IBM future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.Some information addresses anticipated future capabilities. Such information is not intended as a definitive statement of a commitment to specific levels of performance,function or delivery schedules with respect to any future products. Such commitments are only made in IBM product announcements. The information is presented hereto communicate IBMs current investment and development activities as a good faith effort to help with our customers future planning.Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that anyuser will experience will vary depending upon considerations such as the amount of multiprogramming in the users job stream, the I/O configuration, the storageconfiguration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput or performance improvementsequivalent to the ratios stated here.Prices are suggested U.S. list prices and are subject to change without notice. Starting price may not include a hard drive, operating system or other features. Contactyour IBM representative or Business Partner for the most current pricing in your geography.Photographs shown may be engineering prototypes. Changes may be incorporated in production models.© IBM Corporation 1994-2010. All rights reserved.References in this document to IBM products or services do not imply that IBM intends to make them available in every country.Trademarks of International Business Machines Corporation in the United States, other countries, or both can be found on the World Wide Web athttp://www.ibm.com/legal/copytrade.shtml.