SlideShare a Scribd company logo
SOLUTION PROFILE




               IBM PROTECTIER: FROM BACKUP TO RECOVERY
                                               NOVEMBER 2011

                  When it comes to backup and recovery, backup performance numbers rule the
                  roost. It’s understandable really: far more data gets backed up than ever gets
                  restored, and backup length is one of most difficult problems facing
                  administrators today. But a reliance on backup numbers alone is dangerous.
                  Recovery may not happen as frequently as daily backup but recovery is the entire
reason for backup. Backing up because everyone does it isn’t good enough. Backing up for
compliance won’t cut it. Backing up because you’ll get fired otherwise isn’t the point. Because when
a recovery operation looms -- especially if the recovery is large and the potential loss is huge -- fast
recovery performance becomes more urgent than backup ever was.

Now, we know that backup is an important challenge in and of itself. Backup is the foundation for
recovery and slow backup performance can threaten the integrity of the entire backup and
recovery process. Today’s greater data volumes already take a long time to backup which threatens
service levels. IT must address these important issues by demanding acceptable backup
performance. But for all the attention we pay to backup performance, recovery performance is
equally crucial -- yet it remains an afterthought.

Why? Because it is frankly harder to plan for and deploy recovery than it is to install backup.
Recovery is not just its speed but is also its replication options, its bandwidth impact, and its
disaster recovery potential. To make it even more complicated, recovery planning must account for
different service level agreements. It must appropriately provide for every scenario from “we can
wait a week for this application to come up” to “if we lose the last half hour of transactions then we
might as well just go home.” Complicated, yes. But the consequences of not preparing for recovery
are far too high to take the easy way out.
Fortunately there are backup and recovery products out there that can make recovery planning far
easier and much more successful. One such product is IBM ProtecTIER, which has one of the fastest
recovery rates in the business. In this paper we will cover the ProtecTIER deduplication system’s
very fast restore speeds and excellent DR architecture. These capabilities and more make
ProtecTIER an exceptional leader in the crowded backup and recovery market.


Recovery Isn’t Just a Good Idea
Disaster recovery (DR) is the process of returning to normal operational levels following a serious
loss of applications and data. The reasons behind disasters come in lots of different flavors
including physical disaster, external hacking, administrator errors, computer-caused data loss or
corruption, and even internal malfeasance (fancy way of saying disgruntled employee revenge). In


Copyright The TANEJA Group, Inc. 2011. All Rights Reserved.                                          1 of 6
87 Elm Street, Suite 900  Hopkinton, MA 01748  T: 508.435.2556  F: 508.435.2557      www.tanejagroup.com
Solution Profile



all of these cases DR is accomplished by restoring applications and data to acceptable usage levels
without serious negative consequences to the business.

It’s a hard job. The modern data center struggles with hugely growing volumes of data that threaten
data protection service levels. When disaster strikes, the sheer enormity of dealing with this volume
of data (not to mention applications, systems, users and networks) can be overwhelming. Yet in
spite of the urgency of recovery, IT often concentrates on backup performance when evaluating
backup and recovery technology. Recovery planning is an afterthought and may be relegated to the
DR document that is gathering virtual dust on a network share.

IT can handle quick and dirty file restores and the occasional volume recovery from backup, no
problem. But then the Big One hits: the critical database goes down and stays down; the hurricane
hits the central data center; the earthquake knocks the server rack to smithereens and takes
attached storage with it. These things happen, and IT must be able to restore applications and data -
- and they have got to restore them fast.

RECOVERY READINESS
There are a set of requirements that any company serious about recovery should meet. They
include:

   Recovery performance. Recovery speed is the simplest of the recovery metrics and is crucial
    to timely restoration. Tape-based volume recovery can be very slow and combing backup
    catalogs for individual files is no picnic either. Virtual Tape Libraries (VTL) let users use disk-
    based recovery without making massive changes to their backup infrastructure. Adding
    deduplication deeply compresses the backup volume and is a basic method for speeding up
    disk-based backup and recovery.

   Recovery Time and Point Objectives. A recovery solution must address both Recovery Time
    Objective (RTO) and Recovery Point Objective (RPO). RTO is the maximum amount of time that
    a given application can be unavailable without damaging the business. Under 12 hours is a
    common RTO for priority applications and truly crucial applications may be set as low as a zero-
    hour RTO. RPO is the maximum allowable time that the replicated copy may lag behind the
    primary data. A period of 24 hours is common given nightly backup schedules, but in the case
    of critical data 12 hours down to zero data loss may be the only acceptable RPO.

   Replication. DR requires replicating data to a remote site for fast restoration to the primary
    site or for host failover. Replication is fast and bandwidth-efficient, protects data integrity, and
    enables quick virtual cartridge recovery at the secondary DR site.

   Bandwidth. Companies with remote DR sites need wide bandwidth but must control costs.
    Replication operations should optimize bandwidth to write and restore the replicated data
    within service level guidelines, at a price that won’t break a reasonable budget.

   Failover and failback. Failover/failback is the process of stopping replication from the
    primary site and switching operations over to the remote site. Once the primary site is up
    failback operations transfers processing and data back to the recovered production site. The
    more automated the process the better, since minutes matter when critical applications become
    unavailable. Look for recovery platforms that help to automate this process using policies.



Copyright The TANEJA Group, Inc. 2011. All Rights Reserved.                                         2 of 6
87 Elm Street, Suite 900  Hopkinton, MA 01748  T: 508.435.2556  F: 508.435.2557     www.tanejagroup.com
Solution Profile



   DR testing. Disaster recovery can be difficult to test over time. There are multiple points of
    failure to consider: LAN and WAN network connections, communications, secondary site status,
    operational plans, automation triggers, and more. No one technology can test everything and
    some concerns such as telephone availability will be out of IT’s hands. But data protection
    technologies should offer DR self-testing abilities, which removes some of the onus from
    overworked IT.

IBM ProtecTIER and Recovery Readiness
One of the best ways we know to accomplish these levels of recovery readiness is IBM’s ProtecTIER
deduplication system. ProtecTIER offers essential data protection with deduplicated backup and
very fast recovery rates. Features include powerful and flexible replication, highly automated
failover and failback, bandwidth optimization and DR testing capabilities. These features work
together to make ProtecTIER an excellent choice for backup and also for recovery.

ProtecTIER builds the foundation for recovery by dramatically reducing backup time: it replaces
tape with high performance backup disk, and deduplicates incoming data for big capacity and time
savings. Processing is extremely fast using an efficient index that resides in memory.
Recovery speeds are exceptionally fast at an up to sustained 2800 MB/sec (10 TB/hr) or above,
which lets it restore data very quickly when needed. The same rate of speed operates over the WAN
with replication and bandwidth optimization. Since ProtecTIER replicates only unique and
deduplicated data, it relieves the intensive load on the wide area network, and also provides
bandwidth control options for administrators. Replication can occur during its own time-window
or simultaneously with backup, which allows IT to fully protect the deduplicated data while it
enters primary ProtecTIER storage. ProtecTIER replication operates in one-to-one, many-to-one
and many-to-many modes to provide complete flexibility for data protection and disaster recovery.

Let’s take a closer look at ProtecTIER and the recovery enablers we mentioned above: recovery
speed, recovery time and point objectives, replication and bandwidth, failover/failback and DR
testing. It is this combination of capabilities that provides tremendous recovery advantages to
ProtecTIER users.

EXCEPTIONALLY FAST RECOVERY PERFORMANCE
         ProtecTIER’s restore performance is even faster than their already fast backup speeds of
         sustainable 2000-plus MB/sec. Recovery speeds hit 2800 MB/sec (10 TB/hr) and higher
         sustained recovery performance. ProtecTIER’s architecture enables this exceptionally fast
         performance by only storing unique, deduplicated data. When it comes time to recover, data
         restores efficiently and quickly.

         This is very good news, especially for Tier 1 applications like databases that require
         immediate or near-immediate recovery. For example, ProtecTIER is a popular choice with
         SAP administrators who back up large databases twice daily because they cannot afford
         data unavailability or corruption. ProtecTIER’s fast backup and recovery speeds greatly
         benefit data protection and enable quick recovery of mission-critical applications.

MEETING RPO AND RTO
         ProtecTIER fulfills RPO and RTO for even the most demanding recovery requirements.
         Replication schedules may be set to the proper service agreement level for any given

Copyright The TANEJA Group, Inc. 2011. All Rights Reserved.                                       3 of 6
87 Elm Street, Suite 900  Hopkinton, MA 01748  T: 508.435.2556  F: 508.435.2557   www.tanejagroup.com
Solution Profile



         application, which may range from immediate RPO or RTO to hours or even days depending
         on the application priority.

         RPO: A less critical application might be all right with restoring data from the point of the
         most recent backup, which might have run a maximum 24 hours ago with a single daily
         backup or a maximum of 12 hours ago
         with a twice-daily backup. But Tier 1
         applications may require RPOs within a
         few minutes. Zero-loss RPO scenarios            ProtecTIER Customers
         should be fully mirrored to redundant
         systems that take over immediately              #1: FROM TAPE TO PROTECTIER DISK
         should there be an interruption in              This company had backed up files to tape
         processing. For these circumstances,            for many years. One large recovery effort
         ProtecTIER supports running replication         involved 1 million files stored on 10GB of
         simultaneously with backup.                     tape. The restoration took over 17 hours to
                                                         complete.
         RTO: Using ProtecTIER to restore from
         disk instead of tape automatically speeds       The company quickly made the switch to
         up the recovery process to the tune of a        disk-based deduplication backup using IBM
         few hours instead of several days. As           ProtecTIER. They expected a faster recovery
         with RPO, one size does not fit all and IT      time but they did not expect the extreme
         needs to assign priority to application         recovery speed of their next restoration
         requirements. ProtecTIER enables fast           project, which was even larger than the
         and flexible recovery options for differing     first. This time they had to restore 1.6
         service level agreements. For example, IT       million files stored on 34GB on their
         can use ProtecTIER to create fully              ProtecTIER system. The grand total of
         redundant backup and restore systems            recovery time? 1 hour and 38 minutes; a far
         with immediate failover and up-to-the-          cry from the previous tape-based project.
         second data processing.
                                                                   #2: TRIPLED DATA GROWTH
POWERFUL REPLICATION                                               An IBM customer’s data had tripled in just a
         ProtecTIER offers integrated IP-based                     few years. Over a petabyte of this data was
         replication with the flexibility of one-to-               contained in mission-critical databases.
         one, many-to-one and many-to-many                         Over the years frequent tape-based backup
         choices. (Many-to-one copies data from                    had resulted in over 7 PB stored on physical
         multiple source repositories to a single                  tape. Backup to tape was taking 15 hours a
         destination repository; many-to-many                      day and recovery from this volume size was
         provides     bi-directional     replication               extraordinarily challenging.
         between 2-4 systems in a replication
         grid.) All of these replication options                   The company adopted IBM ProtecTIER
         allow IT to optimize backup data                          gateway clusters. In combination with TSM
         protection between data centers, DR sites                 they experienced much faster backup time
         and remote offices.                                       with better disk space reclamation and a
                                                                   smaller physical footprint. And recovery?
         Users may schedule replication by using                   Recovery time for their crucial Oracle
         either preset times or concurrent to                      database applications was slashed by more
         backup and deduplication. They may also                   than 50%.
         choose to manually launch the process.
         Best practice is to set scheduled
Copyright The TANEJA Group, Inc. 2011. All Rights Reserved.                                                  4 of 6
87 Elm Street, Suite 900  Hopkinton, MA 01748  T: 508.435.2556  F: 508.435.2557              www.tanejagroup.com
Solution Profile



         replication options in ProtecTIER’s policy engine so it can automatically identify data status
         and priority in the replication queue. ProtecTIER’s fast replication -- up to 128 cartridges
         simultaneously, each containing 32 concurrent data streams – provides for fast replication
         and fast recovery even over the WAN (256 cartridges and 64 concurrent data streams with
         a ProtecTIER dual-node cluster).

OPTIMIZED BANDWIDTH
         ProtecTIER preserves replication bandwidth by only replicating deduplicated data that is
         new and unique. It also provides optional bandwidth management features that allows IT to
         support the maximum replication transfer rate allowed for a specific repository. This
         capability reduces bandwidth needs by 90% and more compared to uncompressed,
         undeduplicated data transfer.

         This results in huge bandwidth cost savings, which allow users to protect all of their
         applications and not just a few chosen business-critical ones. Administrators can afford the
         level of bandwidth that they really need for restoring data between remote sites. Optimized
         bandwidth is crucial for this level of disaster recovery, where a remote host must restore
         critical data to a recently recovered primary site.

AUTOMATED FAILOVER/FAILBACK
         Failover and failback events require extremely high recovery performance. This requires
         recovery speed at and between multiple sites in several situations: 1) restoring data from a
         replication site to an operational primary site, 2) during failover at a secondary site when
         restoring backup cartridges to the new host and 3) during failback when the secondary host
         restores data back to the restored primary host.
         These scenarios all require high levels of preparation including secondary DR sites, creating
         ProtecTIER policies, and establishing replication procedures. But once the prep work is
         done, ProtecTIER will quickly accomplish failovers, failbacks and data restores as needed to
         get critical applications back up and running on time.

NATIVE DISASTER TESTING
         ProtecTIER provides disaster recovery testing capabilities for the replicated repository at
         the DR site, which makes IT’s job much easier. For example, IT might test DR settings by
         starting the remote ProtecTIER host and running a typical subset of deduplicated backup
         jobs. Production volumes will remain in read-only mode to prevent errors during testing.
         ProtecTIER also provides a command line interface (CLI) to allow many tools and
         capabilities to the user including checking for uncompleted replication jobs.

Taneja Group Opinion
Backup performance is relatively straightforward and it is simple to pay attention to the numbers
surrounding it. Yet because recovery is more complex and more infrequent than backup, it goes
begging far too often. But recovery is backup’s end game and poor recovery practices result in
sharp revenue losses, lost productivity, failed regulatory compliance, and unrecoverable critical
data.
Before this happens to you, look to backup and recovery systems that offer deduplication, high
backup performance AND high recovery performance. Make sure that those high recovery speeds

Copyright The TANEJA Group, Inc. 2011. All Rights Reserved.                                        5 of 6
87 Elm Street, Suite 900  Hopkinton, MA 01748  T: 508.435.2556  F: 508.435.2557    www.tanejagroup.com
Solution Profile



work locally for restoration data at the primary site and remotely for big disaster recovery. Then
add the really hard questions: Does the system have native replication that I can customize to my
needs? Does it optimize bandwidth so I can afford the level of DR protection I need? Can it
automatically failover to a secondary site and then failback, and can it do these things fast?

When the answer to all of these questions is an unqualified Yes – as it is with IBM ProtecTIER – then
we strongly suggest that you look very carefully at this platform for your backup, recovery and
complete disaster protection needs.




This document was developed with IBM funding. Although the document may utilize publicly available material
from various vendors, including IBM, it does not necessarily reflect the positions of such vendors on the issues
addressed in this document.

The information contained herein has been obtained from sources that we believe to be accurate and reliable, and
includes personal opinions that are subject to change without notice. Taneja Group disclaims all warranties as to
the accuracy of such information and assumes no responsibility or liability for errors or for your use of, or reliance
upon, such information. Brands and product names referenced may be trademarks of their respective owners.




Copyright The TANEJA Group, Inc. 2011. All Rights Reserved.                                                     6 of 6
87 Elm Street, Suite 900  Hopkinton, MA 01748  T: 508.435.2556  F: 508.435.2557                 www.tanejagroup.com

More Related Content

What's hot

Succor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackupSuccor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackup
Succor Consulting Group, Inc.
 
7 deadly sins of backup and recovery
7 deadly sins of backup and recovery7 deadly sins of backup and recovery
7 deadly sins of backup and recoverygeekmodeboy
 
4 Ways To Save Big Money in Your Data Center and Private Cloud
4 Ways To Save Big Money in Your Data Center and Private Cloud4 Ways To Save Big Money in Your Data Center and Private Cloud
4 Ways To Save Big Money in Your Data Center and Private Cloud
tervela
 
Mastering disaster e book Telehouse
Mastering disaster e book TelehouseMastering disaster e book Telehouse
Mastering disaster e book Telehouse
Telehouse
 
Infografía sobre la recuperación ante desastres
Infografía sobre la recuperación ante desastresInfografía sobre la recuperación ante desastres
Infografía sobre la recuperación ante desastres
Alejandro Marin
 
Mastering disaster a data center checklist
Mastering disaster a data center checklistMastering disaster a data center checklist
Mastering disaster a data center checklist
Chris Wick
 
DCIM
DCIMDCIM
Dp%20 fudamentals%20%28ch1%29
Dp%20 fudamentals%20%28ch1%29Dp%20 fudamentals%20%28ch1%29
Dp%20 fudamentals%20%28ch1%29
Navid Abbaspour
 
Green IT: Start Saving Money
Green IT: Start Saving MoneyGreen IT: Start Saving Money
Green IT: Start Saving Money
Symantec
 
A guide to modern it disaster recovery
A guide to modern it disaster recoveryA guide to modern it disaster recovery
A guide to modern it disaster recoveryJohn Brouillard
 
Disaster Recovery Planning: Best Practices, Templates, and Tools
Disaster Recovery Planning: Best Practices, Templates, and ToolsDisaster Recovery Planning: Best Practices, Templates, and Tools
Disaster Recovery Planning: Best Practices, Templates, and ToolsZetta Inc
 
New Essentials of Disaster Recovery Planning
New Essentials of Disaster Recovery PlanningNew Essentials of Disaster Recovery Planning
New Essentials of Disaster Recovery Planning
Jason Dea
 
2010 data protection best practices
2010 data protection best practices2010 data protection best practices
2010 data protection best practices
Mario Tabuada Mussio
 
Data Center Infrastructure Management
Data Center Infrastructure ManagementData Center Infrastructure Management
Data Center Infrastructure Management
shahzad ahmed
 
Agentless backup is not a myth
Agentless backup is not a mythAgentless backup is not a myth
Agentless backup is not a myth
Global Micro Solutions
 

What's hot (18)

Succor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackupSuccor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackup
 
HADRFINAL13112016
HADRFINAL13112016HADRFINAL13112016
HADRFINAL13112016
 
7 deadly sins of backup and recovery
7 deadly sins of backup and recovery7 deadly sins of backup and recovery
7 deadly sins of backup and recovery
 
4 Ways To Save Big Money in Your Data Center and Private Cloud
4 Ways To Save Big Money in Your Data Center and Private Cloud4 Ways To Save Big Money in Your Data Center and Private Cloud
4 Ways To Save Big Money in Your Data Center and Private Cloud
 
Mastering disaster e book Telehouse
Mastering disaster e book TelehouseMastering disaster e book Telehouse
Mastering disaster e book Telehouse
 
Infografía sobre la recuperación ante desastres
Infografía sobre la recuperación ante desastresInfografía sobre la recuperación ante desastres
Infografía sobre la recuperación ante desastres
 
Mastering disaster a data center checklist
Mastering disaster a data center checklistMastering disaster a data center checklist
Mastering disaster a data center checklist
 
DCIM
DCIMDCIM
DCIM
 
Dp%20 fudamentals%20%28ch1%29
Dp%20 fudamentals%20%28ch1%29Dp%20 fudamentals%20%28ch1%29
Dp%20 fudamentals%20%28ch1%29
 
Credium case study en
Credium case study enCredium case study en
Credium case study en
 
High Res CIO Review Article
High Res CIO Review ArticleHigh Res CIO Review Article
High Res CIO Review Article
 
Green IT: Start Saving Money
Green IT: Start Saving MoneyGreen IT: Start Saving Money
Green IT: Start Saving Money
 
A guide to modern it disaster recovery
A guide to modern it disaster recoveryA guide to modern it disaster recovery
A guide to modern it disaster recovery
 
Disaster Recovery Planning: Best Practices, Templates, and Tools
Disaster Recovery Planning: Best Practices, Templates, and ToolsDisaster Recovery Planning: Best Practices, Templates, and Tools
Disaster Recovery Planning: Best Practices, Templates, and Tools
 
New Essentials of Disaster Recovery Planning
New Essentials of Disaster Recovery PlanningNew Essentials of Disaster Recovery Planning
New Essentials of Disaster Recovery Planning
 
2010 data protection best practices
2010 data protection best practices2010 data protection best practices
2010 data protection best practices
 
Data Center Infrastructure Management
Data Center Infrastructure ManagementData Center Infrastructure Management
Data Center Infrastructure Management
 
Agentless backup is not a myth
Agentless backup is not a mythAgentless backup is not a myth
Agentless backup is not a myth
 

Similar to IBM PROTECTIER: FROM BACKUP TO RECOVERY

Data Protection and Disaster Recovery Solutions: Ensuring Business Continuity
Data Protection and Disaster Recovery Solutions: Ensuring Business ContinuityData Protection and Disaster Recovery Solutions: Ensuring Business Continuity
Data Protection and Disaster Recovery Solutions: Ensuring Business Continuity
MaryJWilliams2
 
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
MaryJWilliams2
 
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and ResilienceMastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
MaryJWilliams2
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - NotesKranthi
 
Idc paper on disaster recovery
Idc paper on disaster recoveryIdc paper on disaster recovery
Idc paper on disaster recoveryEMC Forum India
 
Disaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the differenceDisaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the difference
jeetendra mandal
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
Dell World
 
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | SysforeCloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Sysfore Technologies
 
The buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionThe buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protection
Kingfin Enterprises Limited
 
Decision Forward Cloud Backup-guide
Decision Forward Cloud Backup-guideDecision Forward Cloud Backup-guide
Decision Forward Cloud Backup-guide
David Soden
 
The economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your businessThe economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your businessServium
 
Backup and recovery_redesign
Backup and recovery_redesignBackup and recovery_redesign
Backup and recovery_redesigngeorgegaudi
 
ProfitBricks-white-paper-Disaster-Recovery-US
ProfitBricks-white-paper-Disaster-Recovery-USProfitBricks-white-paper-Disaster-Recovery-US
ProfitBricks-white-paper-Disaster-Recovery-USMudia Akpobome
 
Managing data to improve disaster recovery preparedness » data center knowledge
Managing data to improve disaster recovery preparedness » data center knowledgeManaging data to improve disaster recovery preparedness » data center knowledge
Managing data to improve disaster recovery preparedness » data center knowledgegeekmodeboy
 
Streamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup AppliancesStreamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup Appliances
MaryJWilliams2
 
Enterprise data protection meeting
Enterprise data protection meetingEnterprise data protection meeting
Enterprise data protection meeting
csandit
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanRishu Mehra
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery PlanRishu Mehra
 
Business Continuity Presentation
Business Continuity PresentationBusiness Continuity Presentation
Business Continuity Presentation
perry57123
 
Reduce time to complete backups and restores with Transparent Snapshots with ...
Reduce time to complete backups and restores with Transparent Snapshots with ...Reduce time to complete backups and restores with Transparent Snapshots with ...
Reduce time to complete backups and restores with Transparent Snapshots with ...
Principled Technologies
 

Similar to IBM PROTECTIER: FROM BACKUP TO RECOVERY (20)

Data Protection and Disaster Recovery Solutions: Ensuring Business Continuity
Data Protection and Disaster Recovery Solutions: Ensuring Business ContinuityData Protection and Disaster Recovery Solutions: Ensuring Business Continuity
Data Protection and Disaster Recovery Solutions: Ensuring Business Continuity
 
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
 
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and ResilienceMastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Idc paper on disaster recovery
Idc paper on disaster recoveryIdc paper on disaster recovery
Idc paper on disaster recovery
 
Disaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the differenceDisaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the difference
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | SysforeCloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
 
The buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionThe buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protection
 
Decision Forward Cloud Backup-guide
Decision Forward Cloud Backup-guideDecision Forward Cloud Backup-guide
Decision Forward Cloud Backup-guide
 
The economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your businessThe economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your business
 
Backup and recovery_redesign
Backup and recovery_redesignBackup and recovery_redesign
Backup and recovery_redesign
 
ProfitBricks-white-paper-Disaster-Recovery-US
ProfitBricks-white-paper-Disaster-Recovery-USProfitBricks-white-paper-Disaster-Recovery-US
ProfitBricks-white-paper-Disaster-Recovery-US
 
Managing data to improve disaster recovery preparedness » data center knowledge
Managing data to improve disaster recovery preparedness » data center knowledgeManaging data to improve disaster recovery preparedness » data center knowledge
Managing data to improve disaster recovery preparedness » data center knowledge
 
Streamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup AppliancesStreamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup Appliances
 
Enterprise data protection meeting
Enterprise data protection meetingEnterprise data protection meeting
Enterprise data protection meeting
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery Plan
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery Plan
 
Business Continuity Presentation
Business Continuity PresentationBusiness Continuity Presentation
Business Continuity Presentation
 
Reduce time to complete backups and restores with Transparent Snapshots with ...
Reduce time to complete backups and restores with Transparent Snapshots with ...Reduce time to complete backups and restores with Transparent Snapshots with ...
Reduce time to complete backups and restores with Transparent Snapshots with ...
 

More from IBM India Smarter Computing

Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments
IBM India Smarter Computing
 
All-flash Needs End to End Storage Efficiency
All-flash Needs End to End Storage EfficiencyAll-flash Needs End to End Storage Efficiency
All-flash Needs End to End Storage Efficiency
IBM India Smarter Computing
 
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
IBM India Smarter Computing
 
IBM FlashSystem 840 Product Guide
IBM FlashSystem 840 Product GuideIBM FlashSystem 840 Product Guide
IBM FlashSystem 840 Product Guide
IBM India Smarter Computing
 
IBM System x3250 M5
IBM System x3250 M5IBM System x3250 M5
IBM System x3250 M5
IBM India Smarter Computing
 
IBM NeXtScale nx360 M4
IBM NeXtScale nx360 M4IBM NeXtScale nx360 M4
IBM NeXtScale nx360 M4
IBM India Smarter Computing
 
IBM System x3650 M4 HD
IBM System x3650 M4 HDIBM System x3650 M4 HD
IBM System x3650 M4 HD
IBM India Smarter Computing
 
IBM System x3300 M4
IBM System x3300 M4IBM System x3300 M4
IBM System x3300 M4
IBM India Smarter Computing
 
IBM System x iDataPlex dx360 M4
IBM System x iDataPlex dx360 M4IBM System x iDataPlex dx360 M4
IBM System x iDataPlex dx360 M4
IBM India Smarter Computing
 
IBM System x3500 M4
IBM System x3500 M4IBM System x3500 M4
IBM System x3500 M4
IBM India Smarter Computing
 
IBM System x3550 M4
IBM System x3550 M4IBM System x3550 M4
IBM System x3550 M4
IBM India Smarter Computing
 
IBM System x3650 M4
IBM System x3650 M4IBM System x3650 M4
IBM System x3650 M4
IBM India Smarter Computing
 
IBM System x3500 M3
IBM System x3500 M3IBM System x3500 M3
IBM System x3500 M3
IBM India Smarter Computing
 
IBM System x3400 M3
IBM System x3400 M3IBM System x3400 M3
IBM System x3400 M3
IBM India Smarter Computing
 
IBM System x3250 M3
IBM System x3250 M3IBM System x3250 M3
IBM System x3250 M3
IBM India Smarter Computing
 
IBM System x3200 M3
IBM System x3200 M3IBM System x3200 M3
IBM System x3200 M3
IBM India Smarter Computing
 
IBM PowerVC Introduction and Configuration
IBM PowerVC Introduction and ConfigurationIBM PowerVC Introduction and Configuration
IBM PowerVC Introduction and Configuration
IBM India Smarter Computing
 
A Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization PerformanceA Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization Performance
IBM India Smarter Computing
 
IBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architectureIBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM India Smarter Computing
 
X6: The sixth generation of EXA Technology
X6: The sixth generation of EXA TechnologyX6: The sixth generation of EXA Technology
X6: The sixth generation of EXA Technology
IBM India Smarter Computing
 

More from IBM India Smarter Computing (20)

Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments
 
All-flash Needs End to End Storage Efficiency
All-flash Needs End to End Storage EfficiencyAll-flash Needs End to End Storage Efficiency
All-flash Needs End to End Storage Efficiency
 
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
 
IBM FlashSystem 840 Product Guide
IBM FlashSystem 840 Product GuideIBM FlashSystem 840 Product Guide
IBM FlashSystem 840 Product Guide
 
IBM System x3250 M5
IBM System x3250 M5IBM System x3250 M5
IBM System x3250 M5
 
IBM NeXtScale nx360 M4
IBM NeXtScale nx360 M4IBM NeXtScale nx360 M4
IBM NeXtScale nx360 M4
 
IBM System x3650 M4 HD
IBM System x3650 M4 HDIBM System x3650 M4 HD
IBM System x3650 M4 HD
 
IBM System x3300 M4
IBM System x3300 M4IBM System x3300 M4
IBM System x3300 M4
 
IBM System x iDataPlex dx360 M4
IBM System x iDataPlex dx360 M4IBM System x iDataPlex dx360 M4
IBM System x iDataPlex dx360 M4
 
IBM System x3500 M4
IBM System x3500 M4IBM System x3500 M4
IBM System x3500 M4
 
IBM System x3550 M4
IBM System x3550 M4IBM System x3550 M4
IBM System x3550 M4
 
IBM System x3650 M4
IBM System x3650 M4IBM System x3650 M4
IBM System x3650 M4
 
IBM System x3500 M3
IBM System x3500 M3IBM System x3500 M3
IBM System x3500 M3
 
IBM System x3400 M3
IBM System x3400 M3IBM System x3400 M3
IBM System x3400 M3
 
IBM System x3250 M3
IBM System x3250 M3IBM System x3250 M3
IBM System x3250 M3
 
IBM System x3200 M3
IBM System x3200 M3IBM System x3200 M3
IBM System x3200 M3
 
IBM PowerVC Introduction and Configuration
IBM PowerVC Introduction and ConfigurationIBM PowerVC Introduction and Configuration
IBM PowerVC Introduction and Configuration
 
A Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization PerformanceA Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization Performance
 
IBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architectureIBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architecture
 
X6: The sixth generation of EXA Technology
X6: The sixth generation of EXA TechnologyX6: The sixth generation of EXA Technology
X6: The sixth generation of EXA Technology
 

Recently uploaded

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 

Recently uploaded (20)

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 

IBM PROTECTIER: FROM BACKUP TO RECOVERY

  • 1. SOLUTION PROFILE IBM PROTECTIER: FROM BACKUP TO RECOVERY NOVEMBER 2011 When it comes to backup and recovery, backup performance numbers rule the roost. It’s understandable really: far more data gets backed up than ever gets restored, and backup length is one of most difficult problems facing administrators today. But a reliance on backup numbers alone is dangerous. Recovery may not happen as frequently as daily backup but recovery is the entire reason for backup. Backing up because everyone does it isn’t good enough. Backing up for compliance won’t cut it. Backing up because you’ll get fired otherwise isn’t the point. Because when a recovery operation looms -- especially if the recovery is large and the potential loss is huge -- fast recovery performance becomes more urgent than backup ever was. Now, we know that backup is an important challenge in and of itself. Backup is the foundation for recovery and slow backup performance can threaten the integrity of the entire backup and recovery process. Today’s greater data volumes already take a long time to backup which threatens service levels. IT must address these important issues by demanding acceptable backup performance. But for all the attention we pay to backup performance, recovery performance is equally crucial -- yet it remains an afterthought. Why? Because it is frankly harder to plan for and deploy recovery than it is to install backup. Recovery is not just its speed but is also its replication options, its bandwidth impact, and its disaster recovery potential. To make it even more complicated, recovery planning must account for different service level agreements. It must appropriately provide for every scenario from “we can wait a week for this application to come up” to “if we lose the last half hour of transactions then we might as well just go home.” Complicated, yes. But the consequences of not preparing for recovery are far too high to take the easy way out. Fortunately there are backup and recovery products out there that can make recovery planning far easier and much more successful. One such product is IBM ProtecTIER, which has one of the fastest recovery rates in the business. In this paper we will cover the ProtecTIER deduplication system’s very fast restore speeds and excellent DR architecture. These capabilities and more make ProtecTIER an exceptional leader in the crowded backup and recovery market. Recovery Isn’t Just a Good Idea Disaster recovery (DR) is the process of returning to normal operational levels following a serious loss of applications and data. The reasons behind disasters come in lots of different flavors including physical disaster, external hacking, administrator errors, computer-caused data loss or corruption, and even internal malfeasance (fancy way of saying disgruntled employee revenge). In Copyright The TANEJA Group, Inc. 2011. All Rights Reserved. 1 of 6 87 Elm Street, Suite 900  Hopkinton, MA 01748  T: 508.435.2556  F: 508.435.2557 www.tanejagroup.com
  • 2. Solution Profile all of these cases DR is accomplished by restoring applications and data to acceptable usage levels without serious negative consequences to the business. It’s a hard job. The modern data center struggles with hugely growing volumes of data that threaten data protection service levels. When disaster strikes, the sheer enormity of dealing with this volume of data (not to mention applications, systems, users and networks) can be overwhelming. Yet in spite of the urgency of recovery, IT often concentrates on backup performance when evaluating backup and recovery technology. Recovery planning is an afterthought and may be relegated to the DR document that is gathering virtual dust on a network share. IT can handle quick and dirty file restores and the occasional volume recovery from backup, no problem. But then the Big One hits: the critical database goes down and stays down; the hurricane hits the central data center; the earthquake knocks the server rack to smithereens and takes attached storage with it. These things happen, and IT must be able to restore applications and data - - and they have got to restore them fast. RECOVERY READINESS There are a set of requirements that any company serious about recovery should meet. They include:  Recovery performance. Recovery speed is the simplest of the recovery metrics and is crucial to timely restoration. Tape-based volume recovery can be very slow and combing backup catalogs for individual files is no picnic either. Virtual Tape Libraries (VTL) let users use disk- based recovery without making massive changes to their backup infrastructure. Adding deduplication deeply compresses the backup volume and is a basic method for speeding up disk-based backup and recovery.  Recovery Time and Point Objectives. A recovery solution must address both Recovery Time Objective (RTO) and Recovery Point Objective (RPO). RTO is the maximum amount of time that a given application can be unavailable without damaging the business. Under 12 hours is a common RTO for priority applications and truly crucial applications may be set as low as a zero- hour RTO. RPO is the maximum allowable time that the replicated copy may lag behind the primary data. A period of 24 hours is common given nightly backup schedules, but in the case of critical data 12 hours down to zero data loss may be the only acceptable RPO.  Replication. DR requires replicating data to a remote site for fast restoration to the primary site or for host failover. Replication is fast and bandwidth-efficient, protects data integrity, and enables quick virtual cartridge recovery at the secondary DR site.  Bandwidth. Companies with remote DR sites need wide bandwidth but must control costs. Replication operations should optimize bandwidth to write and restore the replicated data within service level guidelines, at a price that won’t break a reasonable budget.  Failover and failback. Failover/failback is the process of stopping replication from the primary site and switching operations over to the remote site. Once the primary site is up failback operations transfers processing and data back to the recovered production site. The more automated the process the better, since minutes matter when critical applications become unavailable. Look for recovery platforms that help to automate this process using policies. Copyright The TANEJA Group, Inc. 2011. All Rights Reserved. 2 of 6 87 Elm Street, Suite 900  Hopkinton, MA 01748  T: 508.435.2556  F: 508.435.2557 www.tanejagroup.com
  • 3. Solution Profile  DR testing. Disaster recovery can be difficult to test over time. There are multiple points of failure to consider: LAN and WAN network connections, communications, secondary site status, operational plans, automation triggers, and more. No one technology can test everything and some concerns such as telephone availability will be out of IT’s hands. But data protection technologies should offer DR self-testing abilities, which removes some of the onus from overworked IT. IBM ProtecTIER and Recovery Readiness One of the best ways we know to accomplish these levels of recovery readiness is IBM’s ProtecTIER deduplication system. ProtecTIER offers essential data protection with deduplicated backup and very fast recovery rates. Features include powerful and flexible replication, highly automated failover and failback, bandwidth optimization and DR testing capabilities. These features work together to make ProtecTIER an excellent choice for backup and also for recovery. ProtecTIER builds the foundation for recovery by dramatically reducing backup time: it replaces tape with high performance backup disk, and deduplicates incoming data for big capacity and time savings. Processing is extremely fast using an efficient index that resides in memory. Recovery speeds are exceptionally fast at an up to sustained 2800 MB/sec (10 TB/hr) or above, which lets it restore data very quickly when needed. The same rate of speed operates over the WAN with replication and bandwidth optimization. Since ProtecTIER replicates only unique and deduplicated data, it relieves the intensive load on the wide area network, and also provides bandwidth control options for administrators. Replication can occur during its own time-window or simultaneously with backup, which allows IT to fully protect the deduplicated data while it enters primary ProtecTIER storage. ProtecTIER replication operates in one-to-one, many-to-one and many-to-many modes to provide complete flexibility for data protection and disaster recovery. Let’s take a closer look at ProtecTIER and the recovery enablers we mentioned above: recovery speed, recovery time and point objectives, replication and bandwidth, failover/failback and DR testing. It is this combination of capabilities that provides tremendous recovery advantages to ProtecTIER users. EXCEPTIONALLY FAST RECOVERY PERFORMANCE ProtecTIER’s restore performance is even faster than their already fast backup speeds of sustainable 2000-plus MB/sec. Recovery speeds hit 2800 MB/sec (10 TB/hr) and higher sustained recovery performance. ProtecTIER’s architecture enables this exceptionally fast performance by only storing unique, deduplicated data. When it comes time to recover, data restores efficiently and quickly. This is very good news, especially for Tier 1 applications like databases that require immediate or near-immediate recovery. For example, ProtecTIER is a popular choice with SAP administrators who back up large databases twice daily because they cannot afford data unavailability or corruption. ProtecTIER’s fast backup and recovery speeds greatly benefit data protection and enable quick recovery of mission-critical applications. MEETING RPO AND RTO ProtecTIER fulfills RPO and RTO for even the most demanding recovery requirements. Replication schedules may be set to the proper service agreement level for any given Copyright The TANEJA Group, Inc. 2011. All Rights Reserved. 3 of 6 87 Elm Street, Suite 900  Hopkinton, MA 01748  T: 508.435.2556  F: 508.435.2557 www.tanejagroup.com
  • 4. Solution Profile application, which may range from immediate RPO or RTO to hours or even days depending on the application priority. RPO: A less critical application might be all right with restoring data from the point of the most recent backup, which might have run a maximum 24 hours ago with a single daily backup or a maximum of 12 hours ago with a twice-daily backup. But Tier 1 applications may require RPOs within a few minutes. Zero-loss RPO scenarios ProtecTIER Customers should be fully mirrored to redundant systems that take over immediately #1: FROM TAPE TO PROTECTIER DISK should there be an interruption in This company had backed up files to tape processing. For these circumstances, for many years. One large recovery effort ProtecTIER supports running replication involved 1 million files stored on 10GB of simultaneously with backup. tape. The restoration took over 17 hours to complete. RTO: Using ProtecTIER to restore from disk instead of tape automatically speeds The company quickly made the switch to up the recovery process to the tune of a disk-based deduplication backup using IBM few hours instead of several days. As ProtecTIER. They expected a faster recovery with RPO, one size does not fit all and IT time but they did not expect the extreme needs to assign priority to application recovery speed of their next restoration requirements. ProtecTIER enables fast project, which was even larger than the and flexible recovery options for differing first. This time they had to restore 1.6 service level agreements. For example, IT million files stored on 34GB on their can use ProtecTIER to create fully ProtecTIER system. The grand total of redundant backup and restore systems recovery time? 1 hour and 38 minutes; a far with immediate failover and up-to-the- cry from the previous tape-based project. second data processing. #2: TRIPLED DATA GROWTH POWERFUL REPLICATION An IBM customer’s data had tripled in just a ProtecTIER offers integrated IP-based few years. Over a petabyte of this data was replication with the flexibility of one-to- contained in mission-critical databases. one, many-to-one and many-to-many Over the years frequent tape-based backup choices. (Many-to-one copies data from had resulted in over 7 PB stored on physical multiple source repositories to a single tape. Backup to tape was taking 15 hours a destination repository; many-to-many day and recovery from this volume size was provides bi-directional replication extraordinarily challenging. between 2-4 systems in a replication grid.) All of these replication options The company adopted IBM ProtecTIER allow IT to optimize backup data gateway clusters. In combination with TSM protection between data centers, DR sites they experienced much faster backup time and remote offices. with better disk space reclamation and a smaller physical footprint. And recovery? Users may schedule replication by using Recovery time for their crucial Oracle either preset times or concurrent to database applications was slashed by more backup and deduplication. They may also than 50%. choose to manually launch the process. Best practice is to set scheduled Copyright The TANEJA Group, Inc. 2011. All Rights Reserved. 4 of 6 87 Elm Street, Suite 900  Hopkinton, MA 01748  T: 508.435.2556  F: 508.435.2557 www.tanejagroup.com
  • 5. Solution Profile replication options in ProtecTIER’s policy engine so it can automatically identify data status and priority in the replication queue. ProtecTIER’s fast replication -- up to 128 cartridges simultaneously, each containing 32 concurrent data streams – provides for fast replication and fast recovery even over the WAN (256 cartridges and 64 concurrent data streams with a ProtecTIER dual-node cluster). OPTIMIZED BANDWIDTH ProtecTIER preserves replication bandwidth by only replicating deduplicated data that is new and unique. It also provides optional bandwidth management features that allows IT to support the maximum replication transfer rate allowed for a specific repository. This capability reduces bandwidth needs by 90% and more compared to uncompressed, undeduplicated data transfer. This results in huge bandwidth cost savings, which allow users to protect all of their applications and not just a few chosen business-critical ones. Administrators can afford the level of bandwidth that they really need for restoring data between remote sites. Optimized bandwidth is crucial for this level of disaster recovery, where a remote host must restore critical data to a recently recovered primary site. AUTOMATED FAILOVER/FAILBACK Failover and failback events require extremely high recovery performance. This requires recovery speed at and between multiple sites in several situations: 1) restoring data from a replication site to an operational primary site, 2) during failover at a secondary site when restoring backup cartridges to the new host and 3) during failback when the secondary host restores data back to the restored primary host. These scenarios all require high levels of preparation including secondary DR sites, creating ProtecTIER policies, and establishing replication procedures. But once the prep work is done, ProtecTIER will quickly accomplish failovers, failbacks and data restores as needed to get critical applications back up and running on time. NATIVE DISASTER TESTING ProtecTIER provides disaster recovery testing capabilities for the replicated repository at the DR site, which makes IT’s job much easier. For example, IT might test DR settings by starting the remote ProtecTIER host and running a typical subset of deduplicated backup jobs. Production volumes will remain in read-only mode to prevent errors during testing. ProtecTIER also provides a command line interface (CLI) to allow many tools and capabilities to the user including checking for uncompleted replication jobs. Taneja Group Opinion Backup performance is relatively straightforward and it is simple to pay attention to the numbers surrounding it. Yet because recovery is more complex and more infrequent than backup, it goes begging far too often. But recovery is backup’s end game and poor recovery practices result in sharp revenue losses, lost productivity, failed regulatory compliance, and unrecoverable critical data. Before this happens to you, look to backup and recovery systems that offer deduplication, high backup performance AND high recovery performance. Make sure that those high recovery speeds Copyright The TANEJA Group, Inc. 2011. All Rights Reserved. 5 of 6 87 Elm Street, Suite 900  Hopkinton, MA 01748  T: 508.435.2556  F: 508.435.2557 www.tanejagroup.com
  • 6. Solution Profile work locally for restoration data at the primary site and remotely for big disaster recovery. Then add the really hard questions: Does the system have native replication that I can customize to my needs? Does it optimize bandwidth so I can afford the level of DR protection I need? Can it automatically failover to a secondary site and then failback, and can it do these things fast? When the answer to all of these questions is an unqualified Yes – as it is with IBM ProtecTIER – then we strongly suggest that you look very carefully at this platform for your backup, recovery and complete disaster protection needs. This document was developed with IBM funding. Although the document may utilize publicly available material from various vendors, including IBM, it does not necessarily reflect the positions of such vendors on the issues addressed in this document. The information contained herein has been obtained from sources that we believe to be accurate and reliable, and includes personal opinions that are subject to change without notice. Taneja Group disclaims all warranties as to the accuracy of such information and assumes no responsibility or liability for errors or for your use of, or reliance upon, such information. Brands and product names referenced may be trademarks of their respective owners. Copyright The TANEJA Group, Inc. 2011. All Rights Reserved. 6 of 6 87 Elm Street, Suite 900  Hopkinton, MA 01748  T: 508.435.2556  F: 508.435.2557 www.tanejagroup.com