1 / 16

DotHill Systems Data Management Services

DotHill Systems Data Management Services. Why protect your data? Causes of data loss Hardware data protection DMS data protection Data protection metrics Reducing Data Loss & Improving Recovery Times Data Protection Strategies Tape Backup vs. Snapshots Reducing Data Loss

imani-short
Télécharger la présentation

DotHill Systems Data Management Services

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DotHill SystemsData Management Services

  2. Why protect your data? Causes of data loss Hardware data protection DMS data protection Data protection metrics Reducing Data Loss & Improving Recovery Times Data Protection Strategies Tape Backup vs. Snapshots Reducing Data Loss Improving Recovery Times Improved Application Availability Reducing Backup Windows Customer Needs Reducing Backup Windows Data Management support Customer Needs Business Analytics Application Test & Development Snapshot Benefits Summary Close and Q&A Agenda

  3. Why Protect Your Data? No longer an option! • Protect against accidental corruption or loss of data • Human or program errors • System failures (hardware, software, network) • Protect against malicious corruption or loss of data • Viruses, Sabotage • Protect against local and wide area disasters • Disaster Recovery/Business Continuance • Because you have to! • HIPAA, Sarbanes-Oxley, SEC 17 A, EU DPA, etc. Source: Horison Information Strategies

  4. Interesting Points to Consider The value and vulnerability of data, and the cost of not protecting • On average, companies value 100 megabytes of data at more than $1 million (Source: Ontrack Data International) • Estimates show that 1 out of 500 data centers will have a severe disaster each year • 93% of companies that lost their data center for 10 days or more due to a disaster filed for bankruptcy within one year of the disaster. 50% of businesses that found themselves without data management for this same time period filed for bankruptcy immediately. (Source: National Archives & Records Administration in Washington.)

  5. Data Protection Problems human error 32% software program malfunction computer virus 7% 14% 3% site disaster 44% hardware or system malfunction Causes of data loss source: Ontrack, a data availability service provider

  6. Hardware protection is ½ the solution human error 32% software program malfunction computer virus 14% 7% 14% 3% 3% site disaster RAID: 0,1,3,5,6,10,50 44% • RAID, clustering, and local/remote mirroring protect against hardware failure or malfunction hardware or system malfunction Causes of data loss source: Ontrack, a data availability service provider

  7. DMS Software completes the solution AssuredSnap AssuredCopy • Logical, point-in-time copy of a data volume • Maintains Business Continuity • Reduces Backup Windows • Improves Data Recovery • Minimizes Data Loss human error • Complete independent volume copy • Additional data protection against RAID set or volume failure • Non-disruptive use of live volume 32% software program malfunction computer virus 14% 7% 14% 3% 3% site disaster RAID: 0,1,3,5,6,10,50 44% RemoteSync • RAID, clustering, and local/remote mirroring protect against hardware failure or malfunction • Future offering • Independent volume copy to a remote location hardware or system malfunction Causes of data loss source: Ontrack, a data availability service provider

  8. Key Considerations RTO vs. RPO vs. Budget $ trade-offs as one size does not fit all… • Recovery Point Objective (RPO) • How much data can you afford to lose? • Recovery Time Objective (RTO) • How long can you afford to be without your data? • What are downtime costs? • What are downtime implications? • Data Classification • How critical is your data to the operational and financial viability of the company? • All data is not created equal • Budget • How much money can you afford to spend? Source: Enterprise Storage Group “The Evolution of Data Protection”

  9. Data Protection Technology Positioning

  10. Traditional Tape Backup Nightly backup to tape Full backup on weekends Incremental or differential on weekdays RPO = up to 24 hours Snapshots Snapshot taken every 2 hours RPO = up to 2 hours Data Protection Strategies Risk Mitigation

  11. Traditional Tape Backup File share taken offline at 12:00 am Backed up to tape File share brought back online at 12:30 am Corruption occurs at 4:30 pm Previous night’s tape located File share restored from previous night’s backup tape File share back online at 6:00 pm 16 hours of work is lost! Snapshots Snapshot of File Share taken every 2 hours 12 am, 2 am, 4 am, 6 am, 8 am, 10 am, 12 pm, 2 pm, 4 pm, 6 pm, etc. Corruption occurs at 4:30 pm File share restored from 4:00 pm snapshot File share back online at 4:45 pm 30 minutes of work is lost! Reducing Data Loss (RPO) Risk Mitigation: Lost Revenue and Customer Confidence

  12. Traditional Tape Backup File share taken offline at 12:00 am Backed up to tape File share brought back online at 12:30 am Corruption occurs at 4:30 pm Previous night’s tape located File share restored from previous night’s backup tape File share back online at 6:00 pm Data unavailable for 1 ½ hours! Snapshots Snapshot of File Share taken every 2 hours 12 am, 2 am, 4 am, 6 am, 8 am, 10 am, 12 pm, 2 pm, 4 pm, 6 pm, etc. Corruption occurs at 4:30 pm File share restored from 4:00 pm snapshot File share back online at 4:45 pm Data unavailable for 15 minutes! Improving Recovery Time (RTO) Risk Mitigation: Lost Business and Customer Confidence

  13. AssuredSnap Benefits

  14. AssuredSnap Benefits Significant Business Impact; Operational and Financial • Minimizes Data Loss • Reduces the data protection interval period (i.e., Improved RPO) • Reduces data loss and re-work • Improves Data Recovery and Business Continuity • Rapid restore to any point-in-time snapshot • Improves application and data availability (i.e., Improved RTO) • Drastically Reduces Backup Windows • From hours to minutes • Improves application & data availability • Supports Business Analytics & Rapid Application Development • Use production data without effecting production data or impacting the production application • Improves quality and timeliness of business decisions • Improves application time-to-deployment • Satisfies Regulatory Compliance • Data is protected and recoverable

  15. AssuredSnap Benefits Significant Business Impact; Risk Mitigation • Risk Mitigation • Data Loss • Application & Data Availability • Employee Productivity • Lost Business • Lost Revenue • Lost Customer Confidence • Lost Market Good Will • Customer Satisfaction, Loyalty and Retention • Financial Viability

  16. AssuredSnapQuestions

More Related