Upload
storage-switzerland
View
578
Download
3
Embed Size (px)
Citation preview
Hitting Your Data Protection Sweet SpotWebinar
Learn How To:
● Establish a Data Protection Plan that will meet your
organization's RPO and RTO requirements while
also meeting data retention requirements
● Identify which applications need the tightest
RPO/RTO and how to craft a solution to meet them
● Identify which data needs to be retained and how
to meet those retention requirements
● How to protect the organizations from natural
disaster and ransomware with a single process
For audio playback and Q&A go to:http://bit.ly/DataSweet
Our Speakers
George Crump is the founder of Storage Switzerland, the leading storage analyst focused on the
subjects of big data, solid state storage, virtualization, cloud computing and data protection. He is
widely recognized for his articles, white papers, and videos on such current approaches as all-flash
arrays, deduplication, SSDs, software-defined storage, backup appliances, and storage networking.
He has over 25 years of experience designing storage solutions for data centers across the US.
Lilac Schoenbeck leads Product Marketing at Carbonite. With over 2 decades of experience in IT
service and software marketing in disaster recovery, cloud and virtualization, she has worked with
customers and partners around the world to communicate the benefits of these solutions. She holds
an undergraduate degree in Computer Science and an MBA from MIT Sloan.
What is the Data Protection Sweet Spot
● On one side there are a few applications that need to be recovered rapidly
with as little downtime and data loss as possible
● On the other side there is most of the data that needs protected for retention
purposes but may not be needed during disaster recovery
○ Exception - Right now Hurricane Harvey and Irma - Long term stays will require
recovery of more data
● Establishing the sweet spot balances the priority demands vs. cost realities
● Problem is many data protection products can’t strike this balance
● But some can: Need to differentiate on more than price (service, ease of use,
etc…)
Meeting the Rapid
Recovery Challenge
● Requirements
○ Rapid and frequent data captures
○ Data replication on-site and off-site (cloud)
○ Easy testing and simulation
● Solutions
○ Incremental Backup - Boot from Backup
○ Replication - “Live” target
Application Identification
● Resist the “everything is critical”
temptation
● Identify the 3-4 most critical
applications in the environment
● Understand the need to tier recovery
○ Mission Critical (within minutes)
○ Business Critical (within hours)
○ Convenience Data (within days)
○ Old Data / Archive (within weeks)
Developing a Backup Strategy
● Everything should be backed up, even
replicated apps
○ Backup is sometimes the recovery of last
resort
● Some business critical and convenience
data will recover from backup
● A backup system that can recover in hours
and days will keep costs down
● Important to know how long it will take to
recover all data classes from backup
● Important to practice recovery from
backups
Developing a
Retention
Strategy ● Backup is only used for recovery on
the initial 2-3 backups
● Then it becomes a retention vehicle
to meet legal or regulatory
requirements
Creating a Holistic Strategy
that Protect from
Ransomware to Floods
● Important that the backup
process is a single process
that can protect from major
disaster to minor disasters
● Incorporate both real-time
data copy and long term cost
effective data storage
carbonite.com | Carbonite confidential 8
26,000customers worldwide
100,000+successful data migrations
95%+customer satisfaction rate
160+petabytes of data under
management
1,000partners, VARs and MSPs
globally
20+years of expertise in data
protection
Carbonite data protection solutionsA foundation of resilience
Data protection options for every system
Cloud systems
Virtual systems
Physical systems
Legacy systems
Carbonite backup & disaster
recovery
• Cost-effective recovery for less
critical workloads
• 1-year backup retention
• Support for AIX, iSeries, HPUX
and Solaris
Carbonite high availability
• Immediate failover for critical
systems
• Support for cloud-based
servers
Hours/days recovery times Seconds/minutes recovery times
Most IT environments have a mix of systems
Critical systems Second-tier systems Third-tier systems
Percent of environment ~20% ~50% ~30%
Target recovery times (RTO)
Seconds/minutes Minutes/hours Hours/days
Target data loss (RPO)
None Minutes/hours Hours
Visibility High Medium Low
Protection strategyHigh availability to ensure uptime
High availability or backup-based DR
Backup-based Disaster Recovery
Long-term retention strategy
Forever-incremental backup
Forever-incremental backup
Forever-incremental backup
Flexible deploymentBranch office, central IT and cloud support
Flexible restoreFiles, whole systems, VMs and bare metal
Robust securityEncrypted in-flight and at-rest (you hold the keys)
Award-winning support24x7 phone support from certified experts
x86 and legacy systemsSupport for AIX, iSeries, HPUX and Solaris
Backup & Disaster Recovery Powered by EvaultForever-incremental, encrypted and compressed backups• 1-year backup retention• Straightforward recovery in hours or days• Cost-effective protection for non-critical
workloads
Cloud Backup
Secondary copy secured in the Carbonite cloud
Hybrid Backup
Local copy on Carbonite appliance – and a copy in the cloud
Carbonite backup and disaster recoveryThree deployment models
Restore files, folders, servers or an entire site
Restore directly from cloud or from local appliance
Recover to any prior backup
Recover in hours (RTO)
Direct to cloud
ROBO
Hybrid backup
On-site appliance
Remote offices with on-site appliance
Central office with larger on-site appliance
Continuous replicationByte-level protection from primary site to secondary target
Near-zero downtimeRecovery times in minutes – with sub-second recovery points
Reliable for IT maintenance Easy to failover, in place of planned outages
Scalable designNegligible performance impact across protected systems
Award-winning support24x7 phone support from certified experts
Availability and migration Powered by DoubleTakeContinuous replication to a secondary site• For high availability and risk-free migration• Of physical, virtual and cloud servers
Carbonite Availability
Continuous replication and flexible failover for key systems
Carbonite Move
Risk-free migration between any two systems
Carbonite Availability: How it works
Thank you!
Storage Switzerland
http://www.storageswiss.com
StorageSwiss on Twitter:
http://twitter.com/storageswiss
StorageSwiss on YouTube:
http://www.youtube.com/user/storageswiss
Carbonite
https://www.carbonite.com
Carbonite on Twitter:
https://twitter.com/Carbonite
Carbonite on Facebook:
https://www.facebook.com/CarboniteOnlineBackup
Carbonite on LinkedIN:
https://www.linkedin.com @Carbonite
Hitting Your Data Protection Sweet Spot
For complete Audio and Q&A please register for the On Demand Version at:
http://bit.ly/DataSweet