• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content

Loading…

Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Like this presentation? Why not share!

3 oficinas remotas - repli stor oncourse

on

  • 659 views

 

Statistics

Views

Total Views
659
Views on SlideShare
659
Embed Views
0

Actions

Likes
0
Downloads
3
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Note to Presenter: Present to customers and prospects to provide them with an overview of EMC RepliStor. This presentation covers the importance and relevance of how RepliStor provides greater levels of data protection, while also providing recoverability in the event of an outage. RepliStor ensures remote-office data-backup consolidation and business continuity by ensuring host-based replication for Microsoft Windows environments.
  • EMC View of ILM Infrastructures for Enterprise Customers (Example only)
  • The next generation Model will utilise Virtualisation technologies. Allows discussion on VMWare in the production environment and Storage Virtualisation solutions.
  • Note to Presenter: Present to customers and prospects to provide them with an overview of EMC RepliStor. This presentation covers the importance and relevance of how RepliStor provides greater levels of data protection, while also providing recoverability in the event of an outage. RepliStor ensures remote-office data-backup consolidation and business continuity by ensuring host-based replication for Microsoft Windows environments.
  • Note to Presenter: View in Slide Show mode for animation. Let’s start with use cases showing how RepliStor can provide tremendous value to your environment. For each use case into which we delve, we will start with its challenges, and how RepliStor resolves those challenges. The four different use cases we will discuss today are: Exchange recoverability Data recoverability Branch-office data protection Data distribution Each of these use cases concerns various people within the environment. The requirement for data recoverability for Exchange disaster recovery, for example, affects the E-mail Administrator. The ability to recover data from a hard crash is critical to executives who use e-mail as a document folder, as it is to all the other employees in the environment who rely on e-mail for communicating with customers and users. Data recoverability for Exchange disaster recovery —RepliStor integrates replication and application-consistent snapshots to ensure the recoverability of your Exchange database in the event of a site disaster. RepliStor is the only solution that provides this recoverability assurance without degrading production Exchange performance or exerting additional network load. Data disaster-recovery protection and data recoverability —Replication over any distance enables a secondary copy of production data to be created at any location. When one server becomes unavailable, RepliStor automatically switches file-system services and restarts application services on the second server, preserving end-user access to data and applications. Branch-office data consolidation —Remote offices can replicate their data to a central location for simplifying and consolidating backup operations. This can reduce costs by significantly reducing IT requirements at remote locations, while leveraging administration and hardware at the data center. With a current copy of data on a second system, backups can be run from the second set of data at any time without affecting production users. Data distribution —When maintaining multiple systems that require identical datasets for sharing information in Web farms, multiple file servers, or content-publication applications; or in any deployment in which data changes dynamically, RepliStor ensures these changes are propagated to the other servers quickly, efficiently, and with no need for manual steps in the process. Let’s first take a look at Exchange recoverability in more detail.
  • Here is a summary of the solution benefits of RepliStor’s Exchange recoverability: It is vital to the protection of your Exchange data that you choose a replication technology that can integrate with VSS. RepliStor also ensures minimal impact on the Exchange production system, and no impact on the network, when it is replicating data from one server to one or more servers. To provide the greatest level of flexibility, you can configure your environment to have one-to-one, many-to-one, or, finally, MSCS-to-MSCS. RepliStor is easy to use and can work with any storage array. Scales from small to large deployments of Exchange Note to Presenter: Remember, this functionality is available with V6.1.1.
  • Tape backup is necessary. But if your last tape backup was at midnight and your business experienced an outage at 11:00 a.m., you need to ask yourself, “Can I afford to lose 11 hours of data?” Additionally, recovering your data from tape is long and error-prone. To recover just catalogs can take 20 minutes per tape—if you have 100 catalogs, that could take up to 33 hours. Replication can further protect your data by replicating it in real time to another location. As RepliStor provides asynchronous replication, you may have a few seconds of data loss in the event of an outage. The advantage of asynchronous replication is that you don’t have to wait for the writes to commit to the secondary site before another write can take place at the primary. In that scenario, known as synchronous replication, performance would be unacceptable if your sites were far apart and connectivity between them were poor. RepliStor can provide the best of both worlds. It can replicate data over any distance using TCP/IP. Performance doesn’t take a hit because the replication is taking place in real time, but the writes do not need to be committed at the secondary site. It is essential to determine the ideal balance between your recovery-point objective (RPO)—that is, how much data loss you can endure—and your recovery-time objective (RTO)—that is, how long it takes you to recover. Logical threats, which include site maintenance and server and application upgrades, account for about 80% of downtime. In reality, you are protecting your environment from planned outages, but also against disasters.
  • RepliStor can protect data, regardless of distance. It continuously replicates your changed files and registry and directory data to the secondary site, whether the files are open or closed. But RepliStor goes beyond just data replication and protection. Note to Presenter: Click now in Slide Show mode for animation. When a server fault occurs, RepliStor restarts the applications and reconnects data and users to the secondary location without the users knowing what took place. To protect yourself against data loss as well as server faults, RepliStor is an ideal choice. And with RepliStor’s integration with Microsoft’s Volume Shadow Copy Service, you can ensure application-consistent shadow copies are recoverable for SQL Server 2005 data. As RepliStor is not application-aware, it can integrate with other clustering solutions that have more sophisticated application monitoring to understand whether it is the application, the network, or the hardware that is faulting. Before investigating this in more detail, let’s jump to a screenshot of RepliStor and see its synchronization options…
  • EMC AutoStart provides application-aware clustering technology to ensure that the health of your applications, networks, and hardware is properly monitored. In the event of an outage or fault, AutoStart seamlessly transfers control of the application and storage resources to another location, regardless of distance. Not only does AutoStart provide automation to shut down the applications and then restart them on another server, it also ensures they restart using the right storage resources. For the ultimate protection and flexibility in disaster-recovery testing, AutoStart provides failback capabilities, so that you can test migration of services from one site to another without worrying. EMC is all about recovery, and AutoStart’s unique failback capabilities are an important piece of the story. Just as AutoStart integrates with SRDF/A and SRDF/S, it also integrates with RepliStor. As RepliStor monitors server outages only, you may also need AutoStart technology to monitor your applications, too. Note to Presenter: Click now in Slide Show mode for animation. In the event of a disaster, AutoStart relocates the application resources from one site to another, ensures read-write access to the remote replica, and restarts the application resources on the secondary site. Note to Presenter: Be sure to note that today, EMC supports only two nodes with AutoStart and RepliStor. Emphasize again that this is a Windows-only environment. Customers with UNIX must use AutoStart with SRDF/A or SRDF/S.
  • Note to Presenter: View in Slide Show mode for animation. Here is an example of branch-office consolidation. RepliStor first ensures data replication from the primary site to a secondary site, or to more than one secondary site. This is done continuously in real time to ensure that all satellite-office data is protected and centrally backed up, which reduces the risk to your business of not meeting compliance regulations. The cost savings of not needing media and backup servers at each site is extremely high.
  • Note to Presenter: View in Slide Show mode for animation. RepliStor’s replication process is also extremely flexible, offering several unique options that allow you to determine when and how replication will occur. The Pause Updates option allows users to temporarily stop updating on the target system. When this option is enabled, the source system will still capture file updates and forward them to the target system, but instead of applying these updates to the corresponding files on the target system, RepliStor writes them to a log file in the RepliStor Data Directory on that system. Once Pause Updates is disabled, the updates that were written to the log file are then applied to the appropriate files. This option is most often used in conjunction with a backup utility on the target system, or to perform system maintenance on the target system. The Throttling option allows users to determine the rate at which RepliStor data moves across the network, in kilobytes per second. This option can also be scheduled to happen at a particular time, or at regular intervals of time. The Scheduling option allows users to schedule either a full syncrhronization (complete file copy) or an incremental synchronization (copy of file changes). The standard incremental synchronization is a binary-compare checksum operation that compares files between the source and target systems, and copies only the bytes in the file that have changed. The Attribute Only option skips the checksum and instead compares timestamps and file sizes. If they do not match for a file between the two systems, RepliStor recopies the entire file from the source to the target system. This option can speed up the incremental synch in situations where there are few updates. The synchronization can be scheduled to happen at a particular time or on a recurring basis. All of these options can be configured via the RepliStor GUI, as shown on this slide, or via the command-line interface (CLI).
  • Note to Presenter: View in Slide Show mode for animation. RepliStor offers three levels of security for protecting users’ data during the replication process: Connection Digital Signature Encryption Security levels can be configured and viewed at any time via the RepliStor GUI. Connection is the minimum, as well as the default, security level. Connection security means that all server-to-server and client-to-server connections are authenticated, using a “challenge/response” type of algorithm that never passes the account, password, or domain information unencrypted between the servers. It also prevents third parties from recording the exchange and replaying it at a later time. The Digital Signature security level creates an additional element of security by “signing” all messages—in other words, adding a small signature (about 16 bytes in size) to each message. While a signature does not add privacy, it does guard against tampering and “man-in-the-middle” types of security attacks. It will detect: Message alteration Out-of-sequence messages Replayed messages Encryption is the highest security level. It performs all the functions of the “Connection” and “Digital” Signature” security levels, but also adds privacy—in addition to getting a digital signature, all messages are fully encrypted. This is appropriate when sensitive data needs to travel over a public network, such as the Internet.
  • Note to Presenter: View in Slide Show mode for animation. RepliStor provides a secure and reliable solution for distributing data across a variety of Windows-server platforms. Rather than putting data on a disk or tape, then shipping it to remote facilities where security can be at risk, you can encrypt the data and send it directly to the satellite offices for use.
  • Here is a summary of what RepliStor provides to your business: Increases high availability for data Decreases cost, complexity, total cost of ownership, and risk Improves time to recovery Provides data compression With data recoverability, disaster-recovery protection, branch-office data consolidation, and data distribution, RepliStor can provide tremendous value-add to your Windows environment. Note to Presenter: You can go through each line item as a recap to the benefits of RepliStor.
  • Note to Presenter : Presenter to customers and prospects to provide them with an overview of OnCourse, which provides the ultimate in data mobility—secure, automated host-based file transfer across heterogeneous systems.
  • The key value of OnCourse is to help protect your data at remote sites and perform secure and reliable data transfers. OnCourse will allow you to achieve easier compliance with data regulatory issues. OnCourse will speed the flow of information and allow greater efficiency of business workflow. One example of this is a customer who moved large data files to end users. Upon completion of transfer, OnCourse sent back a digital immutable receipt, which instantly activated a billing application that sent an invoice. This automation customization greatly sped time to revenue for the entire operation. OnCourse is comprised of a central Data Transfer Manager. The Data Transfer Manager links with lightweight agents at the edge to perform core-to-edge, edge-to-core, and edge-to-edge file transfers. These agents can sit at edge sites that will never be NAS- or SAN-attached, allowing the total storage solution and management to be extended out to edge sites that were previously not addressed. Note to Presenter : The target market for OnCourse is central headquarter sites with distributed branch offices.
  • The most common use cases for OnCourse are: Data consolidation—moving data from edge to core for centralized backups—reduces the need for separate backup procedures in branch office while bringing data from the edge to be included in data center backup procedures. File synchronization—OnCourse can move data at pre-determined intervals or scheduled periods to assure that information and data stays up to date and accurate. Content distribution, push or pull data from edge to core, core to edge, or edge to edge to publish and aggregate business information.
  • The OnCourse GUI allows authorized users to access the Data Transfer Manager and control the movement of data and execution of business rules. This GUI can be accessed from anywhere using a web browser, though access can be restricted easily by login. The GUI allows users to easily model the movement of files between two or more servers, and to specify programs, commands, or scripts to be executed as part of the data movement process. Scheduling of movement is flexible, allowing transfer of files to occur regularly. Success and failure notification can be sent by e-mail. The GUI allows users to see the status of each transfer job while in process, and to report on the results of each job when completed. Reports show how long a job took to complete, how much network resource was used, and other useful statistics.
  • Business rules that govern the data flow are stored in the Business Rules database. Business Rules are expressed as linked automation packages… Each automation package is a discrete task in a data transfer process. Automation packages can be grouped to run in sequence or in parallel. Execution of packages can be triggered based on the results of other packages. Note to Presenter: Using the GUI icon-based setup method can allow fast modeling of complex file movements.
  • This is a segmentation of use cases for OnCourse: 55% are using OnCourse for backup consolidation (many to one). 22% are using OnCourse for one-to-many, many-to-many data distribution. 17% are using OnCourse for directory and software synchronization. This can be used for applications like outsourced development, collaborative work groups, or software development synchronization.
  • In this example, OnCourse was able to replace the manually intensive and costly old way of distributing data via CD, greatly reducing costs and speeding up information transfer. They significantly reduced costs and added integrity to the distribution process.
  • Here is another common situation in which OnCourse can greatly reduce administration burden and cost. Many companies have to frequently update numerous distributed systems with either information or software updates, and these updates are applied individually by administrative personnel. Problem: Labor and travel costs are high. Since there are too many to perform simultaneously, systems are out of synch. It’s difficult to track version levels and know which systems have which updates. Solution: Use OnCourse to execute commands on each remote server that determine version levels and send that data back to the central node. Send the correct version levels required. Execute the software update on schedule. Update the central database. Benefits: Significantly reduced labor costs—many times you can essentially eliminate it, leading to as much as 75% or greater savings or people time. Greater manageability since updates are no longer huge efforts Predictability and consistency, since all systems are on the same revision or update level
  • Strong security is an integral component of OnCourse. Security functions are natively built into the OnCourse code, unlike other software packages that require “bolt-on” or third-party security software. This integration makes administration and integrity much simpler and more effective. The OnCourse security architecture makes sure that data is directed to the correct hosts, with the correct permissions. OnCourse ensures data integrity through digital signatures and offers data confidentiality choices of four levels of in-stream encryption. Not only is the delivery of the file data guaranteed with OnCourse, but OnCourse can prove that files have been delivered to a particular server at a particular time with certified delivery. This strong security capability saves money for companies by allowing them to use inexpensive Internet network connections to transmit sensitive data instead of expensive private networks, both internally and to partners and customers.
  • Here are highlights of some of the unique functionality found in OnCourse.
  • Thank you.

3 oficinas remotas - repli stor oncourse 3 oficinas remotas - repli stor oncourse Presentation Transcript

  • CENTRALIZACIÓN DE COPIAS DE LAS OFICINAS EMC Replistor - EMC OnCourse Alberto Tapias (Tapias_Alberto@emc.com)
  • 4.- Consolidar oficinas remotas WAN
  • Information Infrastructure Model – EMC View (Enterprise) Networked Storage DMX-2 DMX800 CX700 CX500 CENTERA Disk Backup Connectrix Celerra Control Centre PowerPath V4 Oncourse Replistor Storagescope SanCopy ARM SRDF Timefinder Mirrorview Snapview SANMgr LAN LAN WAN Networker Xtender Family Autostart VMWare Product Family Documentum /Captiva / Authentica Content Management Family TAPE SMARTS Management INVISTA SMARTS InCharge AX Remote Data RainStorage RainWall DMX-3 NeoScale RSA Secure Access Lifecycle Management
  • ILM Virtual Infrastructure Model – Next Generation L4=Archive Central Mgt Networked Storage Virtual Storage VLUN’s Remove the Badges Virtual Servers – The Servers Becomes Data Services Oriented Architecture Universal, Description, Discovery and Integration ( UDDI ) Service Based Management Central Mgt L1=MC L2=BC L3=DEPT L5=B-Up Object Storage Correlation / Analytics
  • EMC RepliStor
  • Solutions for Data Recoverability—Use Cases Compliance All data is backed up properly End User Access to e-mail online/offline, personal archiving E-mail Administrator Mailbox management, risk/policy enforcement, storage-cost management Storage Administrator Data protection, availability, performance, and scalability Records Manager Corporate file-plan creation; broad books and records-policy enforcement
    • Exchange Recoverability
      • Ensure the recoverability of your Exchange database
    • Data Recoverability
      • Secondary copy of production data located on any server; provides quick recoverability; and, for SQL Server 2005, ensured recoverability with VSS
    • Data Distribution
      • A solution that propagates identical datasets for sharing information
    • Branch-Office Data Protection
      • Ensure data at remote offices is protected and backed up
  • Solution Benefits to RepliStor Exchange Recoverability © Copyright 2006 EMC Corporation. All rights reserved. Scales from small to large deployments of Exchange; efficient use of network bandwidth Scalability Provides storage-agnostic solutions Flexible storage configuration Supports one-to-one, many-to-one, and MSCS-to-MSCS Flexible server configuration Does not increase network load No impact on the network Minimal operation/overhead on Exchange production system Minimal impact Recover from a VSS snapshot, if replica is not recoverable Ensured recoverability Description Benefits
  • Challenges to Data Recoverability
    • Secondary copy of data needed to meet disaster-recovery requirements
      • Current RPO with traditional tape backup has high risk of data loss
    • Restoring from tape can take weeks
      • Long outages mean lost productivity and revenue
    • Logical threats, such as operator error, account for 80% of outages
    • Users need continuous access to the data
    Event Recovery-Point Objective (Data loss) Recovery-Time Objective (Time to recover) Sec. Days Weeks Hrs. Days Weeks Sec. Min. Min. Hrs. Replication Replication Tape backup Restore from tape
  • RepliStor Protects the Business
    • Replicate data continuously to one or more servers, regardless of distance
    • Ensure data can be available immediately after a fault
    • Replicate open and closed files
    • Replicate data from a Microsoft Cluster
    • Ensure SQL Server 2005 data recoverability with application-consistent VSS snapshot
    IP network Site A or Server A Site B or Server B Asynchronous Unlimited distance
    • On a Server Fault…
    • RepliStor restarts the application, reconnects the data, and reconnects the users at the secondary location
    RepliStor RepliStor
  • What About Monitoring Application Faults?
    • In the event of a site disaster, AutoStart would relocate application resources from Site A to Site B:
      • Ensure read-write access to remote replica
      • Start application resources
      • Start RepliStor replication from Site B to Site A
    • EMC AutoStart manages automated application and data restart on an alternate server, either local or remote
    • AutoStart seamlessly transfers control of application and storage resources to a local or remote facility in the event of an outage
    • AutoStart provides functionality to assist in automating failback of services, applications, and data
    • AutoStart manages RepliStor remote replication as a data source
    Site A Site B Unlimited distance RepliStor AutoStart AutoStart RepliStor
  • RepliStor Ensures Remote-Office Data is Protected 1111010100110100 1111010100110100 1111010100110100 11110101001 1111010100110100101010 RepliStor Satellite office RepliStor Satellite office RepliStor Satellite office Satellite office RepliStor Server A Server B Storage (data resides) Primary site RepliStor RepliStor
  • RepliStor Provides Flexible Scheduling Options You Determine When and How Replication Will Occur Pause Updates Throttling Synchronization
  • RepliStor Provides Flexible Security Options Protect Users’ Data During the Replication Process Connection Digital Signature Encryption
  • RepliStor for Data Distribution
    • Provides a secure and reliable solution for distributing data across a variety of Windows server platforms
      • Replicate data in one-to-one, one-to-many, many-to-one, or many-to-many configurations
    • Offers easy-to-configure performance settings to maximize network efficiencies
      • Bandwidth throttling
      • Data compression
    © Copyright 2006 EMC Corporation. All rights reserved.
  • Summary of RepliStor Features and Functionality © Copyright 2006 EMC Corporation. All rights reserved. Provides full application and data restart for disaster recovery Integration with AutoStart Recover from snapshot if replica is not recoverable Ensured recoverability Scales from small to large deployments of Exchange; efficient use of network bandwidth Scalability Allows users to limit the amount of network bandwidth used for RepliStor replication Network-bandwidth throttling Provides three levels of security—Connection, Digital Signature, and Encryption—to meet the most stringent security requirements Security Maintains write-order consistency to ensure data integrity for all applications Data integrity Does not require proprietary or specialized hardware Hardware-independent Captures and replicates changes in real time over unlimited distances with a negligible effect on application performance Consumes minimal server and network resources after initial synchronization Continuous, asynchronous, byte-level replication Benefits Features
  • EMC OnCourse Secure, Automated File Transfer Among Heterogeneous Systems
  • What Does OnCourse Do?
    • Policy-based software that provides the most comprehensive, scaleable, and secure solution for automating file movement
    • Automates the consolidation and distribution of files among distributed heterogeneous systems
    • Centrally managed and scalable solution with intelligent process automation
    Edge to core, core to edge, edge to edge Internet Agent 10010110 Agent 10010110 Corporate Intranet Agent 10010110 Agent 10010110 Agent 10010110 Heterogeneous Transfer Agents Transfer Manager
  • Usage Models Secure, Automated Data Transfer Among Heterogeneous Systems
    • Data Consolidation
      • Example: Centralized backups, centralized reporting
    A A
    • File Synchronization
      • Example: periodic replication for third site, collaborative development, application integration (data level)
    A A A A A A A A A A A A A A A A A A
    • Content and Data Distribution
      • Example: Retail price lists to branches, B2B distribution, regulatory for airlines, etc.
  • OnCourse Graphical User Interface
    • Modeling business rules
    • Scheduling
    • Monitoring
    • Reporting
  • Business Rules Creation via GUI
    • Package group
      • Collects groups of other objects
    • File transfer package
      • Controls file transfer processes
    • Remote command package
      • Controls execution of remote commands
    • Process target package
      • Controls piping of output data between systems
    Business Rules Modeling Objects
  • Why are EMC Customers Buying OnCourse? Data from over 200 closed and prospective customers Backup consolidation Long-distance disaster recovery Branch office data updates Shared information Development team synch Directory Synch 11% Other 6% Software Synch 6% Data Distribution 22% File Consolidation 55%
  • Example: Inter-company Distribution
    • Opportunity:
      • Geo-imaging company distributes new images to its customers via CD
    • Problems:
      • High cost, manual intensive, slow, unreliable
      • Hard to verify delivery and trigger invoice
    • Solution:
      • Automate distribution to resellers and customers
      • Using certified delivery option to automatically trigger invoicing
    • Benefits:
      • Significantly reduced distribution cost
      • Immediate delivery, availability to users
      • Improved TTR
    Geo-imaging company Image delivered Delivery confirmed Invoice sent Customer A A Internet $
    • Opportunity:
      • Telecom company IT organization maintains software levels consistency on servers throughout the organization
    • Solution specifics:
      • Systems are remotely queried to determine current rev level
      • Appropriate updates and patches are distributed automatically
      • Update processes triggered automatically after hours or after prerequisite process complete
      • Cascade topology used to service large number of servers
    Example: Software and Patch Management Data Transfer Manager
  • Security Architecture
    • Tightly integrated security architecture
      • Encryption and authentication fully integrated into framework
    • Multiple levels of security:
      • Source and target authentication
        • Authentication handled by digital certificates
        • Selectable encryption (none, XOR (64 bit), IDEA (128 bit), 3DES (168 bit), AES (256 bit)
        • Supports receipt confirmation (certified delivery)
    A A A A Agent 10010110 I am host2.emca.com (certificate ) I am host1.acme.com (certificate ) Agent 10010110
  • OnCourse Unique Functionality
    • Bandwidth throttling —Allows you to limit the transmission bandwidth so you use only a fixed number of bytes per second in the transmission channel, optimizing the use of the network without causing a bottleneck
    • Incremental transfer —Users can choose to send only the changed bytes in a file to be transmitted, reducing network usage
    • Encryption —Users can choose difference encryption standards, up to 3DES encryption or external encryption (Verisign, DOD, etc.)
    • Synchronizing transfers —Users can make the directories on both sides exactly the same; files that are added at the source node are shipped over to the target node, while unchanged data is skipped; fields that are deleted in the source node will also be deleted in the target node
    • Certified delivery —Immutable receipt; the log file in the DTM host will contain proof of delivery
    • Notification —Users can enable e-mail notification of successful file transfers as well as failures; log files of the submitted jobs can be attached in the e-mail
    • Rollback —This function ensures that all the specified files arrive correctly in a group; otherwise, none of the files are applied
    • Move directories —This allows directories and their contents to be moved recursively so that the child directories and their contents are also copied
    • Core-to-edge, edge-to-core, peer-to-peer —The transfers can be in any direction, in both push and pull modes
    • Content distribution —Securely copies large files over the Internet
    • Content aggregation —Collects files from branch offices, back to the central office
    • Directory synchronization —Users can use the synchronization option to replicate one remote directory to a local directory, or vice versa
  •