SlideShare a Scribd company logo
1 of 17
1© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
EMC
RecoverPoint for
Virtual Machines
Protects VMs with Continuous Data
Protection for Any PiT Recovery
Date: August 14, 2014
Presenter: Sharon Yen, RecoverPoint Product Marketing
2© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
Student Guide & Workshop & Internal Training & Confidential Update Daily
https://goo.gl/VVmVZ0
recoverpoint_family_for_vnx http://ouo.io/8c90D
recoverpoint_continuous_data_protectio
n http://ouo.io/T0AvN5
recoverpoint-vm-customer-presentation http://ouo.io/O53Vc
recoverpoint-4-1-whats-new http://ouo.io/MM7MP
3© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
RecoverPoint for Virtual Machines
VM Protection and Recovery to Any Point With Built-in DR Orchestration
• Fully virtualized, hypervisor-based, software only data protection solution
• Protect VMs in VMware environments with VM level granularity
• Support all storage types: SAN/vSAN/NAS/DAS
• Disaster Recovery offering with built-in orchestration and automation
accessible via VMware vCenter
Key Benefits:
• Optimize RPO & RTO to meet Service Level Agreements (SLAs)
• Streamline recovery workflows, eliminate complexity and save time
• Lower TCO by improving resource utilization and efficiency for Operational
Recovery (OR) & Disaster Recovery (DR)
• SW only solution that reduces floor space and port consumption
4© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
Data Protection Challenges in Virtualized Environments
Pain points that vAdministrators and IT Managers Face
• Lack of VM protection
granularity
• Growing RPO & RTO Gap
• Unable to meet stringent
data protection SLAs
• Lack of visibility and control
• Too many disparate
management GUIs
• Disjointed workflows
• Lack of automated recovery
processes
• Suboptimal utilization of
resources
• Data protection
infrastructure silos
• Rising Disaster Recovery
TCO
Limited IT Budget
and Rising TCO
Increasing Management
Complexity
Proliferation of VMs
5© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
RecoverPoint for Virtual Machines
• Protect VMware VMs with VM level granularity
• Perform automated discovery, provisioning and
orchestrated DR test, failover, failback to any PiT
• Provide local or remote data replication over any
distance sync or async
• Ensure app-consistent recovery of inter-dependent
apps that span across ESXi clusters
• Integrated with VMware vCenter
• Storage agnostic, supporting SAN/vSAN/NAS/DAS
Data protection for DR & OR
6© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
RecoverPoint for
Virtual Machines
RecoverPoint
EMC Unisphere Management VMware vCenter Plug-in
RecoverPoint
Virtual Edition
Embedded Array Splitter Embedded Hypervisor Splitter
VNX
Storage Agnostic
SAN/vSAN/NAS/DAS
Protects Storage Array LUNs Protects VMs
RecoverPoint Product Family
Continuous Data Protection for Physical & VMware Virtual Environments
RecoverPoint Appliance
For Storage Admins For VMware vAdmins
8© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
VMware
ESXi
New York
New York London
Production Journal
VMware
vCenter
Plug-in
RecoverPoint for VMs: How it works
New Jersey
RDM
WAN
Journal Replica
VMware
ESXi
VMware
vCenter
Plug-in
RDM
9© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
RecoverPoint for VMs Managed Through vSphere
Access vCenter Plug-in
10© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
Wizard Driven Workflows…
Select VM
Protection
Specify
Consistency
Group
Create
Target VM
Define
Replication
Policy
Specify
Target VM’s
Datastore
11© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
Set Data Protection Policies
Optimizing RPO/RTO To Meet Protection SLAs
• Enable Zero or near zero RPO
• Can be configured to meet specific
protection, performance and cost goals
• Eliminate Or minimize data loss
• Dynamically switch between sync & async
based on available bandwidth
12© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
Streamline Data Protection for VMs
Automated Provisioning
• Discovering VMs (VMDK & RDM) configurations
• Provisioning VMs and Journals
• Creating replica VMs
Orchestration: Protect, Test and Recover
• Single VM or Multiple VMs in a single Consistency
Group (CG)
• CG or CG group set can span across multiple ESX
clusters
• Deliver consist recovery of Interdependent Apps
Eliminate Complexity and Increase Operational Efficiency
13© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
Empower vAdmins to Manage VM protection
Make changes on the fly
• Make changes to the underlying ESXi
infrastructure
• Add & remove VMDKs from protected
VMs
• Auto-provision VMDKs on the target
• Perform Any vMotion for protected VMs
or storage vMotion
14© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
Simplify Recovery Process for vAdmins
Scenario: One of the VM’s virtual disk was deleted accidentally
RecoverPoint for VMs
1. Using vSphere Web Client,
vAdmin locates the affected VM
and tests the point-in-time copies
2. vAdmin locates the best PiT and
recovers that VM enabled by the
automated recovery process,
including shutting down and
reconfiguring VM
3. vAdmin resumes the VM
replication
Array based replication
1. vAdmin contacts Storage admin in
order to correlate VM to storage
array LUN
2. vAdmin identifies other VMs running
on the affected datastore
3. vAdmin shuts down all VMs: VM
with the failure and other VMs in
the datastore
4. Storage admin performs replication
recovery
5. vAdmin reconfigures the affected
VM and starts up all VMs
6. Storage admin resumes the LUN
replication
15© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
EMC RecoverPoint for VMs Benefits
Meet Stringent
Protection SLAs
Eliminate VM
Recovery Complexity
and Lower TCO
Leverage
RecoverPoint
Technology
Simple
• Protect and replicate VMs with
Continuous Data Protection for
any PiT recovery
• Ensure app-consistent recovery
of interdependent apps that
span across ESXi clusters
• Optimize RPO and RTO
Efficient
• Empower vAdmins and App
owners to specify VM protection
at creation
• Streamline recovery workflows
• Enable non-disruptive data
migration
• Lower communication costs
through WAN efficiency
Proven
• Built on EMC RecoverPoint
engine with 250+ million run
hours
• Over 20,000 units deployed
• Protecting over 1 EB of data
Simple, Efficient and Proven Data Protection for VMware
16© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
RecoverPoint for VMs Use Cases Overview
Protect, Replicate and Recover
Disaster Recovery
Protect customers
against outages
caused by
• Natural disasters
• Accidents
• Utility outages
• Technical
malfunctions
Operational
Recovery
Protect customers
against outages
caused by
• Human errors
• Data corruptions
• Virus attacks
Tech Refresh
Data Migration
Replicate data for
• Tech refresh,
system upgrade
• Data center move
or expansion
17© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved.
Data Protection Continuum
Availability, Replication, Backup And Archive
Applications Have Different
Data Protection Requirements
You Need Complementary Protection
Levels To Meet All Service Levels
SnapshotReplicationAvailability Backup Archive
Emc recoverpoint technical

More Related Content

What's hot

Boosting I/O Performance with KVM io_uring
Boosting I/O Performance with KVM io_uringBoosting I/O Performance with KVM io_uring
Boosting I/O Performance with KVM io_uring
ShapeBlue
 

What's hot (20)

Five common customer use cases for Virtual SAN - VMworld US / 2015
Five common customer use cases for Virtual SAN - VMworld US / 2015Five common customer use cases for Virtual SAN - VMworld US / 2015
Five common customer use cases for Virtual SAN - VMworld US / 2015
 
VMware vSphere
VMware vSphereVMware vSphere
VMware vSphere
 
VMware VSAN Technical Deep Dive - March 2014
VMware VSAN Technical Deep Dive - March 2014VMware VSAN Technical Deep Dive - March 2014
VMware VSAN Technical Deep Dive - March 2014
 
CloudStack Networking
CloudStack NetworkingCloudStack Networking
CloudStack Networking
 
Boosting I/O Performance with KVM io_uring
Boosting I/O Performance with KVM io_uringBoosting I/O Performance with KVM io_uring
Boosting I/O Performance with KVM io_uring
 
Xen on ARM for embedded and IoT: from secure containers to dom0less systems
Xen on ARM for embedded and IoT: from secure containers to dom0less systemsXen on ARM for embedded and IoT: from secure containers to dom0less systems
Xen on ARM for embedded and IoT: from secure containers to dom0less systems
 
VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 
CloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and TroubleshootingCloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and Troubleshooting
 
Ransomeware Recovery by Veeam
Ransomeware Recovery by VeeamRansomeware Recovery by Veeam
Ransomeware Recovery by Veeam
 
Docker vs VM | | Containerization or Virtualization - The Differences | DevOp...
Docker vs VM | | Containerization or Virtualization - The Differences | DevOp...Docker vs VM | | Containerization or Virtualization - The Differences | DevOp...
Docker vs VM | | Containerization or Virtualization - The Differences | DevOp...
 
VMware Tanzu Kubernetes Connect
VMware Tanzu Kubernetes ConnectVMware Tanzu Kubernetes Connect
VMware Tanzu Kubernetes Connect
 
vSAN architecture components
vSAN architecture componentsvSAN architecture components
vSAN architecture components
 
A day in the life of a VSAN I/O - STO7875
A day in the life of a VSAN I/O - STO7875A day in the life of a VSAN I/O - STO7875
A day in the life of a VSAN I/O - STO7875
 
Virtualization with KVM (Kernel-based Virtual Machine)
Virtualization with KVM (Kernel-based Virtual Machine)Virtualization with KVM (Kernel-based Virtual Machine)
Virtualization with KVM (Kernel-based Virtual Machine)
 
ALSS14: Xen Project Automotive Hypervisor (Demo)
ALSS14: Xen Project Automotive Hypervisor (Demo)ALSS14: Xen Project Automotive Hypervisor (Demo)
ALSS14: Xen Project Automotive Hypervisor (Demo)
 
Microsoft Hyper-V explained
Microsoft Hyper-V explainedMicrosoft Hyper-V explained
Microsoft Hyper-V explained
 
Live migrating a container: pros, cons and gotchas
Live migrating a container: pros, cons and gotchasLive migrating a container: pros, cons and gotchas
Live migrating a container: pros, cons and gotchas
 
Veeam Presentation
Veeam PresentationVeeam Presentation
Veeam Presentation
 
Virtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMwareVirtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMware
 

Viewers also liked

Viewers also liked (20)

EMC RecoverPoint Screenshots
EMC RecoverPoint ScreenshotsEMC RecoverPoint Screenshots
EMC RecoverPoint Screenshots
 
White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...
White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...
White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...
 
EMC VPLEX Continuous availability and non disruptive
EMC VPLEX Continuous availability and non disruptiveEMC VPLEX Continuous availability and non disruptive
EMC VPLEX Continuous availability and non disruptive
 
RecoverPoint Deep Dive
RecoverPoint Deep DiveRecoverPoint Deep Dive
RecoverPoint Deep Dive
 
Emc vmax3 technical deep workshop
Emc vmax3 technical deep workshopEmc vmax3 technical deep workshop
Emc vmax3 technical deep workshop
 
Networking for Storage Virtualization and EMC RecoverPoint TechBook
Networking for Storage Virtualization and EMC RecoverPoint TechBook Networking for Storage Virtualization and EMC RecoverPoint TechBook
Networking for Storage Virtualization and EMC RecoverPoint TechBook
 
How to select the best business continuity strategy and solution?
How to select the best business continuity strategy and solution?How to select the best business continuity strategy and solution?
How to select the best business continuity strategy and solution?
 
Bcp
BcpBcp
Bcp
 
SplunkLive! Presentation - Data Onboarding with Splunk
SplunkLive! Presentation - Data Onboarding with SplunkSplunkLive! Presentation - Data Onboarding with Splunk
SplunkLive! Presentation - Data Onboarding with Splunk
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
 
VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld 2013: Operational Best Practices for NSX in VMware Environments
 
Splunk for DevOps - Faster Insights - Better Code
Splunk for DevOps - Faster Insights - Better CodeSplunk for DevOps - Faster Insights - Better Code
Splunk for DevOps - Faster Insights - Better Code
 
VMworld 2016 Recap
VMworld 2016 RecapVMworld 2016 Recap
VMworld 2016 Recap
 
VMworld Europe 2014: Advanced Network Services with NSX
VMworld Europe 2014: Advanced Network Services with NSXVMworld Europe 2014: Advanced Network Services with NSX
VMworld Europe 2014: Advanced Network Services with NSX
 
もう一つのHCI VxRackとVBlock
もう一つのHCI VxRackとVBlockもう一つのHCI VxRackとVBlock
もう一つのHCI VxRackとVBlock
 
Splunk資安智慧分析平台
Splunk資安智慧分析平台Splunk資安智慧分析平台
Splunk資安智慧分析平台
 
Blue Medora - VMware vROps Management Pack for VCE Vblock Overview
Blue Medora - VMware vROps Management Pack for VCE Vblock OverviewBlue Medora - VMware vROps Management Pack for VCE Vblock Overview
Blue Medora - VMware vROps Management Pack for VCE Vblock Overview
 
Self service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxSelf service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsx
 
NSX for vSphere Logical Routing Deep Dive
NSX for vSphere Logical Routing Deep DiveNSX for vSphere Logical Routing Deep Dive
NSX for vSphere Logical Routing Deep Dive
 

Similar to Emc recoverpoint technical

PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMware
Devansh Chowdhary
 

Similar to Emc recoverpoint technical (20)

Emc vipr srm workshop
Emc vipr srm workshopEmc vipr srm workshop
Emc vipr srm workshop
 
The Future of Storage : EMC Software Defined Solution
The Future of Storage : EMC Software Defined Solution The Future of Storage : EMC Software Defined Solution
The Future of Storage : EMC Software Defined Solution
 
VMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & Replication
VMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & ReplicationVMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & Replication
VMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & Replication
 
Cisco Live
Cisco LiveCisco Live
Cisco Live
 
Manage your enterprise with System Center
Manage your enterprise with System CenterManage your enterprise with System Center
Manage your enterprise with System Center
 
Emc vi pr controller
Emc vi pr controllerEmc vi pr controller
Emc vi pr controller
 
VMware Site Recovery Manager
VMware Site Recovery ManagerVMware Site Recovery Manager
VMware Site Recovery Manager
 
Emc vi pr controller tecnical customer presentation
Emc vi pr controller tecnical customer presentationEmc vi pr controller tecnical customer presentation
Emc vi pr controller tecnical customer presentation
 
Itzik Reich-EMC World 2015-Best Practices for running virtualized workloads o...
Itzik Reich-EMC World 2015-Best Practices for running virtualized workloads o...Itzik Reich-EMC World 2015-Best Practices for running virtualized workloads o...
Itzik Reich-EMC World 2015-Best Practices for running virtualized workloads o...
 
VMworld 2013: VMware vCenter Site Recovery Manager – Solution Overview and Le...
VMworld 2013: VMware vCenter Site Recovery Manager – Solution Overview and Le...VMworld 2013: VMware vCenter Site Recovery Manager – Solution Overview and Le...
VMworld 2013: VMware vCenter Site Recovery Manager – Solution Overview and Le...
 
V mware v sphere 5 fundamentals services kit
V mware v sphere 5 fundamentals services kitV mware v sphere 5 fundamentals services kit
V mware v sphere 5 fundamentals services kit
 
Comm vault Simpana e a nuvem AWS
Comm vault Simpana e a nuvem AWSComm vault Simpana e a nuvem AWS
Comm vault Simpana e a nuvem AWS
 
PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMware
 
Presentation deduplication backup software and system
Presentation   deduplication backup software and systemPresentation   deduplication backup software and system
Presentation deduplication backup software and system
 
L'agilité du cloud public dans votre datacenter avec ECS & Neutrino
L'agilité du cloud public dans votre datacenter avec ECS & NeutrinoL'agilité du cloud public dans votre datacenter avec ECS & Neutrino
L'agilité du cloud public dans votre datacenter avec ECS & Neutrino
 
VMworld 2014: Site Recovery Manager and vSphere Replication
VMworld 2014: Site Recovery Manager and vSphere ReplicationVMworld 2014: Site Recovery Manager and vSphere Replication
VMworld 2014: Site Recovery Manager and vSphere Replication
 
EMC Vipr srm-technical Deep dive
EMC Vipr srm-technical Deep diveEMC Vipr srm-technical Deep dive
EMC Vipr srm-technical Deep dive
 
Le Software Defined Solutions, ou comment automatiser les ressources IT ?
Le Software Defined Solutions, ou comment automatiser les ressources IT ?Le Software Defined Solutions, ou comment automatiser les ressources IT ?
Le Software Defined Solutions, ou comment automatiser les ressources IT ?
 
EMC - Copaco Cloud Event 2015 (break-out 3)
EMC - Copaco Cloud Event 2015 (break-out 3)EMC - Copaco Cloud Event 2015 (break-out 3)
EMC - Copaco Cloud Event 2015 (break-out 3)
 
Emc vplex deep dive
Emc vplex deep diveEmc vplex deep dive
Emc vplex deep dive
 

More from solarisyougood

More from solarisyougood (20)

EMC Atmos for service providers
EMC Atmos for service providersEMC Atmos for service providers
EMC Atmos for service providers
 
Cisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overviewCisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overview
 
Designing your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guideDesigning your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guide
 
Ibm aix technical deep dive workshop advanced administration and problem dete...
Ibm aix technical deep dive workshop advanced administration and problem dete...Ibm aix technical deep dive workshop advanced administration and problem dete...
Ibm aix technical deep dive workshop advanced administration and problem dete...
 
Ibm power ha v7 technical deep dive workshop
Ibm power ha v7 technical deep dive workshopIbm power ha v7 technical deep dive workshop
Ibm power ha v7 technical deep dive workshop
 
Power8 hardware technical deep dive workshop
Power8 hardware technical deep dive workshopPower8 hardware technical deep dive workshop
Power8 hardware technical deep dive workshop
 
Power systems virtualization with power kvm
Power systems virtualization with power kvmPower systems virtualization with power kvm
Power systems virtualization with power kvm
 
Power vc for powervm deep dive tips & tricks
Power vc for powervm deep dive tips & tricksPower vc for powervm deep dive tips & tricks
Power vc for powervm deep dive tips & tricks
 
Emc data domain technical deep dive workshop
Emc data domain  technical deep dive workshopEmc data domain  technical deep dive workshop
Emc data domain technical deep dive workshop
 
Ibm flash system v9000 technical deep dive workshop
Ibm flash system v9000 technical deep dive workshopIbm flash system v9000 technical deep dive workshop
Ibm flash system v9000 technical deep dive workshop
 
Emc vnx2 technical deep dive workshop
Emc vnx2 technical deep dive workshopEmc vnx2 technical deep dive workshop
Emc vnx2 technical deep dive workshop
 
Emc isilon technical deep dive workshop
Emc isilon technical deep dive workshopEmc isilon technical deep dive workshop
Emc isilon technical deep dive workshop
 
Emc ecs 2 technical deep dive workshop
Emc ecs 2 technical deep dive workshopEmc ecs 2 technical deep dive workshop
Emc ecs 2 technical deep dive workshop
 
Cisco mds 9148 s training workshop
Cisco mds 9148 s training workshopCisco mds 9148 s training workshop
Cisco mds 9148 s training workshop
 
Cisco cloud computing deploying openstack
Cisco cloud computing deploying openstackCisco cloud computing deploying openstack
Cisco cloud computing deploying openstack
 
Se training storage grid webscale technical overview
Se training   storage grid webscale technical overviewSe training   storage grid webscale technical overview
Se training storage grid webscale technical overview
 
Vmware 2015 with vsphereHigh performance application platforms
Vmware 2015 with vsphereHigh performance application platformsVmware 2015 with vsphereHigh performance application platforms
Vmware 2015 with vsphereHigh performance application platforms
 
Deep dive into new features in v realizeoperations 6.0
Deep dive into new features in v realizeoperations 6.0Deep dive into new features in v realizeoperations 6.0
Deep dive into new features in v realizeoperations 6.0
 
Reference design for v mware nsx
Reference design for v mware nsxReference design for v mware nsx
Reference design for v mware nsx
 
Nsx security deep dive
Nsx security deep diveNsx security deep dive
Nsx security deep dive
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Emc recoverpoint technical

  • 1. 1© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. EMC RecoverPoint for Virtual Machines Protects VMs with Continuous Data Protection for Any PiT Recovery Date: August 14, 2014 Presenter: Sharon Yen, RecoverPoint Product Marketing
  • 2. 2© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. Student Guide & Workshop & Internal Training & Confidential Update Daily https://goo.gl/VVmVZ0 recoverpoint_family_for_vnx http://ouo.io/8c90D recoverpoint_continuous_data_protectio n http://ouo.io/T0AvN5 recoverpoint-vm-customer-presentation http://ouo.io/O53Vc recoverpoint-4-1-whats-new http://ouo.io/MM7MP
  • 3. 3© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. RecoverPoint for Virtual Machines VM Protection and Recovery to Any Point With Built-in DR Orchestration • Fully virtualized, hypervisor-based, software only data protection solution • Protect VMs in VMware environments with VM level granularity • Support all storage types: SAN/vSAN/NAS/DAS • Disaster Recovery offering with built-in orchestration and automation accessible via VMware vCenter Key Benefits: • Optimize RPO & RTO to meet Service Level Agreements (SLAs) • Streamline recovery workflows, eliminate complexity and save time • Lower TCO by improving resource utilization and efficiency for Operational Recovery (OR) & Disaster Recovery (DR) • SW only solution that reduces floor space and port consumption
  • 4. 4© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. Data Protection Challenges in Virtualized Environments Pain points that vAdministrators and IT Managers Face • Lack of VM protection granularity • Growing RPO & RTO Gap • Unable to meet stringent data protection SLAs • Lack of visibility and control • Too many disparate management GUIs • Disjointed workflows • Lack of automated recovery processes • Suboptimal utilization of resources • Data protection infrastructure silos • Rising Disaster Recovery TCO Limited IT Budget and Rising TCO Increasing Management Complexity Proliferation of VMs
  • 5. 5© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. RecoverPoint for Virtual Machines • Protect VMware VMs with VM level granularity • Perform automated discovery, provisioning and orchestrated DR test, failover, failback to any PiT • Provide local or remote data replication over any distance sync or async • Ensure app-consistent recovery of inter-dependent apps that span across ESXi clusters • Integrated with VMware vCenter • Storage agnostic, supporting SAN/vSAN/NAS/DAS Data protection for DR & OR
  • 6. 6© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. RecoverPoint for Virtual Machines RecoverPoint EMC Unisphere Management VMware vCenter Plug-in RecoverPoint Virtual Edition Embedded Array Splitter Embedded Hypervisor Splitter VNX Storage Agnostic SAN/vSAN/NAS/DAS Protects Storage Array LUNs Protects VMs RecoverPoint Product Family Continuous Data Protection for Physical & VMware Virtual Environments RecoverPoint Appliance For Storage Admins For VMware vAdmins
  • 7. 8© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. VMware ESXi New York New York London Production Journal VMware vCenter Plug-in RecoverPoint for VMs: How it works New Jersey RDM WAN Journal Replica VMware ESXi VMware vCenter Plug-in RDM
  • 8. 9© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. RecoverPoint for VMs Managed Through vSphere Access vCenter Plug-in
  • 9. 10© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. Wizard Driven Workflows… Select VM Protection Specify Consistency Group Create Target VM Define Replication Policy Specify Target VM’s Datastore
  • 10. 11© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. Set Data Protection Policies Optimizing RPO/RTO To Meet Protection SLAs • Enable Zero or near zero RPO • Can be configured to meet specific protection, performance and cost goals • Eliminate Or minimize data loss • Dynamically switch between sync & async based on available bandwidth
  • 11. 12© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. Streamline Data Protection for VMs Automated Provisioning • Discovering VMs (VMDK & RDM) configurations • Provisioning VMs and Journals • Creating replica VMs Orchestration: Protect, Test and Recover • Single VM or Multiple VMs in a single Consistency Group (CG) • CG or CG group set can span across multiple ESX clusters • Deliver consist recovery of Interdependent Apps Eliminate Complexity and Increase Operational Efficiency
  • 12. 13© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. Empower vAdmins to Manage VM protection Make changes on the fly • Make changes to the underlying ESXi infrastructure • Add & remove VMDKs from protected VMs • Auto-provision VMDKs on the target • Perform Any vMotion for protected VMs or storage vMotion
  • 13. 14© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. Simplify Recovery Process for vAdmins Scenario: One of the VM’s virtual disk was deleted accidentally RecoverPoint for VMs 1. Using vSphere Web Client, vAdmin locates the affected VM and tests the point-in-time copies 2. vAdmin locates the best PiT and recovers that VM enabled by the automated recovery process, including shutting down and reconfiguring VM 3. vAdmin resumes the VM replication Array based replication 1. vAdmin contacts Storage admin in order to correlate VM to storage array LUN 2. vAdmin identifies other VMs running on the affected datastore 3. vAdmin shuts down all VMs: VM with the failure and other VMs in the datastore 4. Storage admin performs replication recovery 5. vAdmin reconfigures the affected VM and starts up all VMs 6. Storage admin resumes the LUN replication
  • 14. 15© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. EMC RecoverPoint for VMs Benefits Meet Stringent Protection SLAs Eliminate VM Recovery Complexity and Lower TCO Leverage RecoverPoint Technology Simple • Protect and replicate VMs with Continuous Data Protection for any PiT recovery • Ensure app-consistent recovery of interdependent apps that span across ESXi clusters • Optimize RPO and RTO Efficient • Empower vAdmins and App owners to specify VM protection at creation • Streamline recovery workflows • Enable non-disruptive data migration • Lower communication costs through WAN efficiency Proven • Built on EMC RecoverPoint engine with 250+ million run hours • Over 20,000 units deployed • Protecting over 1 EB of data Simple, Efficient and Proven Data Protection for VMware
  • 15. 16© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. RecoverPoint for VMs Use Cases Overview Protect, Replicate and Recover Disaster Recovery Protect customers against outages caused by • Natural disasters • Accidents • Utility outages • Technical malfunctions Operational Recovery Protect customers against outages caused by • Human errors • Data corruptions • Virus attacks Tech Refresh Data Migration Replicate data for • Tech refresh, system upgrade • Data center move or expansion
  • 16. 17© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. Data Protection Continuum Availability, Replication, Backup And Archive Applications Have Different Data Protection Requirements You Need Complementary Protection Levels To Meet All Service Levels SnapshotReplicationAvailability Backup Archive

Editor's Notes

  1. Note to speaker: On Aug 26th, EMC will publicly announced RecoverPoint for Virtual Machines 4.2, a hypervisor-based, software only data protection solution that protects VMware Virtual Machines (VMs). Product GA date is Sep 23rd 2014. The release date of CX/DX configurator supporting this product is planned for Oct 13th 2014. RecoverPoint for Virtual Machines, a newest member of RecoverPoint Family, is 100% software only, hypervisor-based data protection solution that protects VMWare Virtual Machines (VMs). It is built on the robust engine of RecoverPoint, which has over 250M run hours in the marketplace. RecoverPoint for Virtual Machines simplifies operational recovery and disaster recovery with built-in orchestration and automation capabilities accessible via VMware vCenter. vAdministrators can manage the lifecycle of VMs directly from the vSphere Web Client GUI and perform test, failover, and failback to any point in time. EMC RecoverPoint for Virtual Machines 4.2 is estimated to be generally available on September 23, 2014. It Protects VMs with VM level granularity It is storage agnostic, supporting all storage types SAN/vSAN/NAS/DAS. Another way to describe this feature is RecoverPoint for VMs Replicate VMs utilizing VMDK and RDM devices accessed by any type of storage connectivity supported by VMware (i.e. FC, FCoE, iSCSI, NAS, DAS, SAS and SVD) referenced in the VMware Hardware Compatibility List. It is a Disaster recovery offering with built-in orchestration and automation capabilities accessible via VMware vCenter The Key benefits are: [short version] – just read the slide Benefits: Organizations (or vAdmins) can now • Optimize RPO & RTO to meet Service Level Agreements (SLAs) • Streamline recovery workflows, eliminate complexity and save time • Lower TCO by improving resource utilization and efficiency for Operational Recovery (OR) & Disaster Recovery (DR) • RP4VM, this SW only solution reduces floor space and port consumption, a benefit in the transition to SDDC. Why did EMC invest in developing this product and what problems are we trying to solve for our customers? [long version] Benefits The benefits of EMC RecoverPoint for Virtual Machines contribute value in three major areas: Help IT managers and vAdministrators to meet stringent data protection Service Level Agreements (SLAs) by Protecting VMs with VM level granularity Replicating over any distance: synchronously or asynchronously Delivering any point-in-time recovery Restoring interdependent mission critical applications with data consistency Streamlining data protection for operational recovery and disaster recovery for virtual environments to achieve RPO and RTO objectives Reduce complexity and save time with automated, reliable and repeatable DR & OR processes by Integrating easily into existing IT data management infrastructure with its VMware vCenter plug-in Simplifying Operational Recovery (OR) and Disaster Recovery (DR) with built-in orchestration and automation capabilities Enabling vAdmins to perform automated discovery, provisioning and orchestrated DR test, fail over and fail back to any PiT Shortening application development cycles by providing a replica for isolated test or development use Enabling data migration without any interruption Improve their operational and management efficiencies to drive down overall costs by Enabling fast deployment in a VMware EXSi environment with no additional hardware dependencies Empowering vAdmins with the visibility and control to set and manage VM data protection policies through a single Graphical User Interface (GUI) Shortening the learning curve for vAdmins with a familiar GUI Supporting all storage array types: SAN/VSAN/NAS/DAS Leveraging the remote site for backup operations with no impact to the production site Utilizing WAN resources efficiently with de-duplication and compression Reducing OPEX costs
  2. We know that one of the trends of the Software Defined Data Center is that virtualization is occurring at an ever faster rate. As a result, IT managers and vAdministrators are challenged with the proliferation of VMs in which mission critical applications are deployed and the increasing complexity of managing a virtualized infrastructure. They need to solve these problems with a limited budget and rising Total Cost of Ownership (TCO). vAdmins do not have adequate tools to protect VMs with recoverability to achieve the required Service level agreement (SLAs), resulting growing RPO & RTO gaps. They lack visibility and control to specify VM granularity protection right from the VM’s creation. Without an integrated and automated recovery process, the recovery of a single VM or group of VMs in a complex virtual infrastructure often requires many disparate management GUIs. Businesses may suffer interruptions due to lengthy, disjointed workflows in the recovery process, resulting in poor utilization of resources. These are symptoms of a silo’ed data protection architecture developed overtime, contributing to the rising of TCO for Disaster Recovery. Let’s focus on the People here, in this case the vAdministrators, just a little more because their role has changed that they have been getting more involved in all aspect of IT management. Why? Because they typically are responsible for the mission critical Apps that run on the virtualized platform. They understand the business values of their application and data but they often rely on the storage administrators to protect the underlying storage infrastructure for them. As the IT infrastructure changes, we also have to change the way we do data protection. This is why EMC invested in developing RecoverPoint for VMs and is bringing the data protection for VMs solution to the marketing. RecoverPoint for VMs is designed with vAdmins in mind to enable them with the proper tool to protect VMs. <additional information for the presenter to think about> How does the Software Defined Data Center (SDDC) evolution that has virtualized most of the IT infrastructure impact the way we do data protection? • First, the growing number of Apps in VMs and the growing size of the virtualized Apps require a robust protection and data recovery solution. The move of mission critical applications to virtual servers introduces the need to have a tier-1 enterprise-class data replication solution, to maintain the same SLA as they experienced with the physical environments. • Second, we need to enable and empower vAdministrators, who are now taking up a more active role in data protection which has traditionally been served by storage administrators. Specifically, we can give them the tools that they need to protect, and recover VMs in which their mission critical applications are deployed. • They need to be able to meet their data protection Service Level Agreements (SLAs) • They need to protect VMs at the hypervisor level with individual VM granularity • And they need better visibility and recoverability in the data protection processes.
  3. The key capabilities of RecoverPoint for VMs are: <read the slide> Protect VMware VMs with VM level granularity Perform automated discovery, provisioning and orchestration DR test, failover, failback to any Point in Time Provide local or remote data replication over any distance Ensure app-consistency recovery of inter-dependent apps that span across ESXi clusters Integrated with VMWare vCenter It is storage agnostic, supporting SAN/vSAN/NAS/DAS The vision of RecoverPoint for VMs is that we bring forth the same quality of data protection that our customers like with our marketing leading RecoverPoint product, to fully enable disaster and operational recovery in and to the Hybrid Cloud. Today we are focusing on protecting VMs with better recoverability and with automated provisioning and orchestration for Disaster Recovery and Operational recovery. We are doing this with the introduction of RecoverPoint for VMs, a newest member of RecoverPoint family. <Optional: Another option for Key Features: Not exactly align with the bullet points> Key Features: RecoverPoint for Virtual Machines key features include: Protect VMs with VM level granularity Replicate VMs utilizing VMDK and RDM devices accessed by any type of storage connectivity supported by VMware (i.e. FC, FCoE, iSCSI, NAS, DAS, SAS and SVD) referenced in the VMware Hardware Compatibility List. Replicate Consistency Groups (CG) that contain VMs for application-consistent recovery Provide local or remote data replication and replicate over any distance, sync or async Integrated with VMware vCenter and deployed in VMware ESXi 5.1 U1 or VMware 5.5 with vCenter vSphere Web Client environments Enable automated discovery, provisioning and orchestration of DR workflows, including test, failover and failback of a single CG or group of CGs WAN compression and de-duplication to optimize bandwidth consumption REST API for developer community
  4. RecoverPoint for VMs is designed with vAdmins in mind that it protects VMware VMs while RecoverPoint and RecoverPoint virtual edition protect storage LUNs, designed for the storage admins. They share a common architecture but are offered as separate products with similar benefits, which are: • Enabling Continuous Data Protection for any point in time recovery to optimize RPO & RTO • Ensuring recovery consistency for interdependent applications through Consistency Group and CG Group set configurations, spanning over multiple arrays or VMware ESXi clusters • Providing local and remote replication over distance: synchronous or asynchronous • Reducing WAN bandwidth consumption and utilizing available bandwidth optimally We bring forth the enterprise class data protection capabilities to a 100% software implementation in RecoverPoint for VMs to empower vAdmins to perform data protection tasks that they cannot easily do toady. Let’s take a look at how RecoverPoint for VM works product works. <skip the hero number slide> < Optional: another way to describe RP4VMs > RecoverPoint for VMs simplifies operational recovery and disaster recovery with built-in orchestration and automation capabilities accessible via VMware vCenter. vAdministrators can manage the lifecycle of VMs directly from the vSphere Web Client GUI and perform test, failover, and failback to any point in time. It is built on the RecoverPoint technology and share architectural similarity but it is a different product.
  5. < this slide is update quarterly, This is a July 2014 update> RecoverPoint is the market leader in data protection and disaster recovery. Here is quick snap shot of the product achievement in the market today with with 85% EMC top 200 customers all use RecoverPoint, Over 20K copy deployed Over 9000 customers Over 250M run hours Over One Exa Byte of protected data. We bring forth the enterprise class data protection capabilities to a 100% software implementation in RecoverPoint for VMs to empower vAdmins to perform data protection tasks that they cannot easily do toady. Let’s take a look at how RecoverPoint for VM works product works.
  6. RecoverPoint for Virtual Machines provides local and remote replication in combination with continuous data protection for per-VM recovery to any point in time. It supports both virtual disk types: VMDKs and RDMs. This diagram shows the architectural components and how RP4VMs works from the perspective of the primary user – the vSphere vAdministrator or vAdmin. The architectural components include: a VMware vCenter plug-in, a RecoverPoint write-splitter embedded in the vSphere hypervisor, and virtual appliances, all fully integrated in a VMware ESXi server environment. The splitter is installed inside of each ESX node that will host VMs that you would like to protect and replicate. The splitters communicate with RecoverPoint virtual appliances which enable either local replication within the same ESX cluster, or to a remote site which hosts a replica ESX environment The virtual appliances don’t need to reside on the same ESX node or cluster as the protected VMs. There is no requirement that a virtual appliance be installed on each ESX node with the protected VMs. This flexibility gives RecoverPoint for VMs a competitive advantage over other products. RecoverPoint for VMs uses a journal-based implementation to store all the changes made to the protected VMs. Local protection provides a DVR-like rollback in time capability to any point, even to the last I/O transaction or just seconds before the data corruption occurred. < go to 3, & 4 from here> <1, and 2 are Optional notes> Unique capabilities of RP4VMs: 1. RP4VMs deploys a more elegant and true virtual appliance – a sealed box, delivered as a VM. It is optimized and tested under fixed pre-configured conditions and runs its own operating system. HA and distributed management is built right into the virtual appliance cluster architecture and the complexities are transparent to the user. Unlike our competition, who just runs a Windows app inside a VM that requires a running Windows OS, relies on the user to configure and properly install an HA cluster and requires a dedicated management server at each site. 2. More flexible deployment options: vRPAs can be deployed regardless of where the replicated VMs reside. There is no requirement to tie vRPA location together with VMs needing to be replicated. They can reside on any ESXi node and even can be deployed together on a dedicated ESXi node for hosting vRPAs. The flexibility in how you are able to deploy the vRPA provides differentiating features which is unmatched in the industry for VM replication solutions. Typically other solutions require that you couple replicating appliances to the workloads and are limited by the performance of their virtual replication VM. <Below is good to mention> <click> 3. Synchronous replication: EMC is the only vendor that offers remote protection over synch distances, from NYC to NJ, for example. RP4VMs addresses the most demanding applications requiring zero RPO which none of our competitors provide today. <click> 4. Superior WAN optimization for asynch replication – the built-in WAN optimization consists of deduplication, compression and advanced bandwidth reduction algorithms that reduce WAN network consumption up to 90%. WAN optimization also ensures replication robustness that sustains poor WAN condition with up to 300 ms of latency and 5% high packet loss rate. It has better utilization of available bandwidth. The vCenter Plug-in is installed on the vCenter Server and accessed via vSphere Web Client. vAdmins will perform and manage data protection for VMs using vSphere Web Client Client.
  7. vAdmins use the vSphere web client which they are already familiar with the GUI to perform all tasks related to data protection in RecoverPoint for VMs. We will walk you though a few critical tasks in the next few slides.
  8. The management workflow is easy to use. Wizard driven workflows, allow for minimal error through guided VM protection configuration. This is an example of how easy and straight forward it is to apply a protection policy to a Virtual Machine. First we specify if the VM should be added to an already existing Protection Consistency Group, or do we want to create a new one with specific replication and protection SLAs Then we will specify if we want a new target VM copy to be created automatically or if we want to select an already existing target virtual machine. Here we also define the replication link policy and determine whether we want to have synchronous or asynchronus replication and what RPO we would like to define. If we want to create a new target VM entry, we simply specify which resource we would like that new target VM to be hosted from. This can be an individual ESX Host, ESX Cluster, or Defined Resource Pool in the environment. Finally we will specify the datastore the target VM should be hosted on. And it is as easy as that.
  9. In setting the protection policy, vAdmin can specify Zero or Near Zero RPO to meet the specific protection, performance and cost goals to eliminate or minimize data loss. The Replication link is an intelligent link that it can dynamically switch between sync and async based on available bandwidth.
  10.   With Automation and Orchestration capabilities RecoverPoint for VMs really simplifies data protection for vAdmins. Why is automation important in data protection? VMs are being created, moved, and removed every day. Discovering and keeping track of which VMs are protected, is a problmatic and can be prone to errors with manual procedures. RecoverPoint for VMs maintains a constant watch over the live configuration of VMs created and where they are hosted, and is able to protect a VM even when that VM and it’s workload are vMotioned to a different compute resource, or its virtual disk is Storage vMotioned to a different datastore. More than that, it automatically adapts to VM configuration changes so that when you add a VMDK to the source, a copy is automatically added to the replica and immediately starts getting replicated. This also means that the associated Journal volume, which is where the historical changes of information is kept is part of the automated provisioning. With RecoverPoint for VMs, the vAdmin is able to conduct automated disaster recovery orchestration tasks from within vSphere Web Client using product capabilities in the vCenter plug-in. Automated DR workflows include: Recovery from logical corruption to any point Failover and failback of specific consistency groups or CG sets to any point Non-disruptive DR testing to any point RecoverPoint for VMs offers the flexibility for protecting applications by grouping VMs into Consistency Groups. Typically a consistency group represents a vApp, or a collection of VMs used by an application. The CG group sets: an additional layer of logical grouping, which provides consistency not only within an application but also across applications to hold the interdependency relationship in recovery. RecoverPoint for VMs allows these Consistency Groups and CG Group sets to span not only multiple ESXi nodes but also multiple ESXi Clusters. For example consider grouping a database server VM set along with a web front end server VM that leverages that database to capture consistent points in time in parallel. The CG Sets feature enables recovery activities to be performed to the same consistent PiT across all data in the set simultaneously. They are indeed the building blocks used for orchestration. vAdmins can Test, failover and failback whole VM collections - from a single VM up to a whole site at once - at a single click of the mouse. RecoverPoint for VMs truly streamlines disaster recovery workflows, eliminates the administrative complexity, and increases operational efficiency.
  11. To continue the conversation of giving vAdmins more visibility and control to perform data protection tasks. RecoverPoint for VMs interoperates with VMware data migration and management services, such as vMotion and Storage vMotion, and is aware of changes to the underlying virtual infrastructure. vAdmins can add or remove VMDKs from the protected VMs and RecoverPoint for VMs will auto-provision VMDKs on the target side. vAdmins can make the following changes on the fly without impacting VM protection or the protection policies. Replicated VMs can be vMotioned Underlying storage can be Storage vMotioned Replicated VMs can be powered on/off or paused
  12. Let’s use this common scenario to illustrate how RecoverPoint for VMs empowers the vAdmin to have control and access to the protected VMs. <Note to presenter: Just read the slide to illustrate the advantage of RP4VM, protecting VMs with VM-level granularity> RecoverPoint for VMs: The ultimate data protection with better recoverability tool.
  13. In Summary: With the deployment and management capabilities integrated in VMware vCenter, RecoverPoint for VMs makes meeting stringent SLAs simple by providing CDP for VMs with recovery to any PiT. It ensures application consistent recovery of interdependent apps that span across ESXi clusters, achieving the required RPO & RTO. RecoverPoint for VMs empowers vAdmins to gain visibility and control of VMs for more granular protection, better recoverability, simpler recovery workflow, non-disruptive data migration and higher operational efficiency. They can deploy VM protection quickly and recover VMs with a reliable, automated process that reduces complexity and saves time, lowering overall costs. RecoverPoint for VMs is built on the robust RecoverPoint engine, the market leader in replication and disaster recovery, with 250 M run hours in IT environments, and over 21 thousand deployments, protecting 1 ExaByte of storage. RecoverPoint for VMs is your simple, efficient, and proven data protection for VMware. RecoverPoint for VMs is your simple, efficient, and proven data protection for VMware.
  14. <read the slide>
  15. RecoverPoint for VMs, part of the DP continuum, it belongs tothe Replication category of data protection.