Disaster Recovery and the Cloud


Published on

A presentation I did covering disaster recovery, cloud computing, and how the two can play nice together

Published in: Technology, Business
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • In this solution, the management console resides on the SP side. Key Features: Licensing and management console resides on the SP premise Protect Node does all execution locally Uses customer’s infrastructure for the recovery resources Who is it for? Customers interested in WRaaS (subscription model for their workloads) Security conscious – unwilling\\unable to have workloads in an external cloud Have excess capacity within their own datacenter Don’t want to “own” the licenses
  • In this solution, the management console resides on the SP side. Key Features: DR infrastructure resides entirely within the SP datacenter Self-Service front-end allows customers to manage their own DR Who is it for? Customers interested in WRaaS (subscription model for their workloads) SMBs or customer looking for offsite DR Most common use case for WRaaS based on feedback
  • In this solution, the management console resides on the SP side. Key Features: Self-Service front-end allows customers to manage their own DR Recovery resources reside in both customer and SP datacenters Have the ability to protect workloads both onsite and offsite A single point of management for administrators Who is it for? Customers who need recovery with higher performance Instances where not all workloads can be hosted off-site – due to RTO requirements or security concerns When there’s a need to bring together public and private resources seamlessly
  • .
  • Disaster Recovery and the Cloud

    1. 1. Disaster Recovery in the Cloud <ul><li>Jason Dea </li></ul><ul><li>Product Marketing Manager </li></ul>
    2. 2. What You W i ll Learn The Need for Disaster Recovery Public, Private and Hybrid Cloud DR and the Cloud Products from Novell
    3. 3. The Need for Disaster Recovery
    4. 4. Why Downtime Matters *September 2, 2010 , Business Continuity and Disaster Recovery are top IT Priorities for 2010 and 2011 - Forrester Total economic damage from disaster in 2009* Economic impact felt in the US from disasters in 2009* $10.8 Billion $41.3 Billion
    5. 5. Better Understanding of Protection *Jan. 25, 2010 – The State of Enterprise IT: 2009 to 2010 - Forrester of enterprises have indicated that improving disaster recovery capabilities is a high priority* 78% Critical Priority 30% - High Priority 48% <ul><li>Better able to identify and quantify risk </li></ul><ul><li>Better understanding of economic impact </li></ul><ul><li>Less tolerance for downtime and data loss </li></ul>
    6. 6. Define Your Objectives
    7. 7. The Move to the Cloud
    8. 8. From a Big Box to a Big Cloud
    9. 9. Defining Cloud Characterstics
    10. 10. The Cloud Stack
    11. 11. Your cloud, my cloud <ul><li>Public </li></ul><ul><ul><li>Scalable and elastic computing services offered to external customers via the Internet. </li></ul></ul><ul><ul><li>Typically multi-tenant, where multiple customers are able to share a single set of resources. </li></ul></ul><ul><li>Private </li></ul><ul><ul><li>Dynamic and scalable computer services offered to internal customers using equipment the customer owns and delivered over a private network. </li></ul></ul>
    12. 12. DR and the Cloud
    13. 13. What is a Workload? A workload is an integrated stack of application, middleware, and operating system that accomplishes a computing task A workload is portable and platform agnostic– it can run in physical, virtual or cloud computing environments A workload or a collection of workloads makes up a business service, which is what the end user consumes
    14. 14. Update your DR with Virtualization
    15. 15. Consolidated Recovery Leveraging Virtual Infrastructure For Protection of All Your Servers <ul><li>Solution </li></ul><ul><li>Replicate workload into an off-line virtual machine </li></ul><ul><li>One click failover </li></ul><ul><li>One click test restore </li></ul><ul><li>Flexible failback </li></ul><ul><li>Benefits </li></ul><ul><li>Drastically reduce TCO and achieve whole workload protection </li></ul><ul><li>Simplify testing with bootable backups </li></ul><ul><li>Finally a way to complete your DR architecture </li></ul>Virtual production servers Virtual Recovery Hosts Physical production servers Physical production servers
    16. 16. Protect to the Cloud Virtual production servers Hosted Virtual Recovery Hosts Physical production servers Wide Area Network
    17. 17. Products from Novell
    18. 18. Backup to virtual machines Incremental replication Whole-workload protection for all server workloads. Easy to test One-click failover PlateSpin Protect Physical Servers Virtual Hosts Blade Servers Image Archives Workload Decoupled from Hardware
    19. 19. PlateSpin ® Forge Protects up to 25 workloads PlateSpin Forge Includes: • Storage • Replication software • Hypervisor Plug In and Protect Solution for : • Medium enterprises • Branch or field use for large enterprises • Hosted recovery World’s first disaster recovery hardware appliance with embedded virtualization
    20. 20. Build a Protection Cloud
    21. 21. Build a Recovery Cloud Site A Site B Site C PlateSpin Protect Virtual Resources = PlateSpin Protect + Virtual Resources Recovery Cloud
    22. 22. Setup Workload Replications Recovery Cloud Replicate every hour (1h RPO) Scheduled replications: Workload changes are automatically replicated into virtual machines inside the Recovery Cloud
    23. 23. Easy Test Failover Recovery Cloud Test Failover: recover workloads in isolated virtual networks to avoid production disruptions Users connect to running workloads to test their applications Isolated Virtual Network
    24. 24. Recover Workloads In Minutes Recovery Cloud Offline Detection: PlateSpin Protect sends out notification when the protected workload goes offline Failover: Workloads are recovered in minutes inside the Recovery Cloud Users connect to workloads running in the Recovery Cloud
    25. 25. Restore the Production Environment Recovery Cloud Failback: move the workload back into production to the same or a different host Virtual or Physical Host
    26. 26. Solution Flexibility
    27. 27. On-Premise Production Data Center Service Provider Data Center Administrator Recovery Resources WAN Protected Workloads Protect Node Protect Management Console
    28. 28. Virtual Private Cloud Customer Data Center Service Provider Data Center Administrator Recovery Resources WAN Protected Workloads Protect Node Protect Management Console
    29. 29. Hybrid Model Customer Data Center Service Provider Data Center Administrator WAN Protect Node Protect Management Console Protect Node Protected Workloads Protected Workloads Recovery Resources Recovery Resources
    30. 30. What do Customers Have to Say?
    31. 31. Nichols College “ Disaster recovery solutions can be very complex ... PlateSpin Forge is very straightforward. There’s just one piece of hardware to manage. It’s low maintenance, and has low overhead. Without it, we certainly would have spent more money on another disaster recovery solution that would have required more resources to support it.” Customer Results www.novell.com/success/nichols_college.html Reed Smith LLP &quot;With PlateSpin Protect, we can recover multiple sites with the same set of hardware quite easily, in a matter of minutes.&quot; http://www.novell.com/success/reed_smith.html
    32. 32. <ul><li>Next Steps </li></ul><ul><li>Give it a Try! </li></ul><ul><li>Download a 30 day trial copy of </li></ul><ul><li>PlateSpin Protect </li></ul><ul><li>download.novell.com/index.jsp </li></ul><ul><li>Learn More </li></ul><ul><li>Contact Us – 800.529.3400 </li></ul><ul><li>Visit </li></ul><ul><li>www.novell.com/products/forge/ </li></ul><ul><li>www.novell.com/products/protect / </li></ul>Connect
    33. 33. [email_address] www.novell.com/communities/blogs/jasondea
    34. 35. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.