SlideShare una empresa de Scribd logo
1 de 24
Descargar para leer sin conexión
Marius Vasile – STG System Storage Manager
27 ianuarie 2010
Hotel Intercontinental, Sala Ronda




How can maximize your storage capabilities by
using IBM backup & restore solutions




                                             © 2010 IBM Corporation
IBM System Storage


    The world is changing, enabling organizations to make faster,
    better-informed decisions as their systems can be made
    instrumented, interconnected and intelligent.


                                                      Instrumented



                                                      Interconnected



                                                      Intelligent


             This is an opportunity for the world to get smarter.

2                                                                   © 2010 IBM Corporation
IBM System Storage


Is your critical application data adequately protected?



    Traditional once-a-night backup leaves
    up to 24 hours of your most recent data    Recovery Point Objective:
                                               How much data can you afford to lose?
    at risk
       – How much data will you lose if your
         database server crashes at 5 PM?
       – How much will it cost you to re-
         create those transactions?
    It can take many hours or days to
    perform a full restore from traditional
                                               Recovery Time Objective:
                                                How much downtime can you afford?
    backup systems
       – How much application downtime
         can your business tolerate?




3                                                                          © 2010 IBM Corporation
IBM System Storage


    With this change comes an                 … Yet organizations are
    explosion in information …                operating with blind spots

                                               Lack of Insight
                                               1 in 3 managers frequently make
                                               critical decisions without the
                                               information they need
                     Volume of Digital Data



                                               Inefficient Access
                                               1 in 2 don’t have access to the
                                               information across their organization
                                               needed to do their jobs
                     Variety of Information



                                               Inability to Predict
                                               3 in 4 business leaders say more
                                               predictive information would drive
                                               better decisions
               Velocity of Decision Making
                                                                Source: IBM Institute for Business Value


4                                                                                    © 2010 IBM Corporation
IBM System Storage


Building the infrastructure for a Smarter Planet



Compliance
Reduce reputation risks
and audit deficiencies




    Availability
    Deliver continuous and
    reliable access to information




Retention
Support your
information
retention policies




Security
Protect and enable
secure sharing of
information
5                                                  © 2010 IBM Corporation
IBM System Storage




                     Themes for Information Infrastructure 3Q09




                          Positive         Negative         Neutral



6
6                                                                     © 2010 IBM Corporation
IBM System Storage


Business continuity depends on data recovery


    Business-critical data exists throughout the enterprise:       What can go wrong?
                                                                    Deleted files
     – Application servers in the data center
                                                                    Corrupted database
     – Remote and branch offices                                    Virus/hacker attack
     – Employee workstations                                        Disk crash
     – Disaster recovery sites                                      Server crash
    Businesses of all types are facing unprecedented                Local disaster
    challenges to keep more information available, all the time     Regional disaster
     – They can’t afford to lose any data, and they can’t afford   Can you quickly
       to be without it for very long                              recovery from each?
     – Losing access to data causes downtime
    The costs of downtime and lost data are escalating:
     – Lost revenue streams and customer confidence
     – Embarrassment in the marketplace
     – Contract penalties, regulatory fines, legal action

7                                                                           © 2010 IBM Corporation
IBM System Storage


    IBM System Storage – Offering Matrix

                     Tape Systems                                              Disk Systems
                        Tape Virtualization                                         IBM XIV – Grid Storage
                        Tape Libraries                                              DS8000 - Enterprise Class
                        LTO Tape Drives                                             DS5000 - MidRange
                        Enterprise Tape Drives                                      DS3000 - Entry




Deduplication                                                                     Network Attached
     ProtecTIER Deduplication Appliances                                          Storage (NAS)
     ProtecTIER Deduplication Gateway                                                       N series




     Storage Software                                                   Storage Solutions
          SAN Volume Controller                                                DR550 archive and compliance storage
                                                                               Grid Access Manager, GMAS
          Tivoli Storage Productivity Center
          IBM Tivoli Storage Manager                                           Smart Business Storage Cloud (SBSC)
          IBM Tivoli Storage ManagerFastback                                   Storage Encryption Solutions (TKLM)
                                                                               Comprehensive Data Protection Solution (CDPS)
          IBM Tivoli Storage FlashCopy Manager

                                           Networking
                                                 Fibre Channel
                                                 Ethernet
                                                 Fibre Channel over Ethernet

8                                                                                                          © 2010 IBM Corporation
IBM System Storage


Introducing Tivoli Storage Manager FastBack v6.1

    Block-level, incremental-forever, continuous or scheduled backup for
    Windows and Linux New servers
    Near-instant restore of any type / amount of Windows application data
     – Near-instant access to Linux data via FastBack Mount New
    Integrated target-side data
                                     New   Remote Office(s)                                    HQ / Data Center
    deduplication                                                                  Exchange   SQL/DB2   Oracle/SAP File/Print

    Built-in ‘selective replication’
                                                              Central Control
    Comprehensive reporting,                                     Station


    leverages Tivoli Common
    Reporting                                                                                               Tivoli Storage Manager


    Tight integration with
    Tivoli Storage Manager New                                         IBM Tivoli Storage
                                                                       Manager FastBack
    TSM FastBack for
    Workstations: optional                                                                     Disaster Recovery Site


    protection for laptops &      New


    desktops

9                                                                                                           © 2010 IBM Corporation
IBM System Storage


TSM FastBack is part of IBM’s Unified Recovery Management
solution suite
                        Remote Office(s)                          Data Center                             D/R Site
                      FastBack                         FastBack       TSM B/A
                       Clients                          Clients        Clients
                                 Application Servers                                Application Servers
                                    File Servers                                       File Servers
                                  VMware Servers                                     VMware Servers


 FastBack for
 Workstations   New




                                          WAN

                      FastBack                         FastBack    Tivoli Storage          Tiers of
                       Server                           Server    Manager Server           Storage




     Tivoli Storage Manager: enterprise-class data management includes backup, archive,
     HSM, support for hundreds of devices and a broad range of operating systems
     Tivoli Storage Manager FastBack: next-generation backup and near-instant restore for
     critical servers; backup consolidation & disaster recovery for remote offices; and more …
     Tivoli Storage Manager FastBack for Workstations: continuous data protection (CDP) for
     desktop and laptop systems with centralized management

10                                                                                                        © 2010 IBM Corporation
IBM System Storage


 IBM TS7650 ProtecTIER® Deduplication Family

                                                                                                          TS7650G Gateways
                                                                                                                        Highest Performance
                                                                                                                          largest Capacity
                                                                                                                          High Availability
                              TS7650 Appliance                        Highest Performance
                                                                        Largest Capacity
                                                                        Larg                       High Performance
                                                                        High Availability            High Capacity
                                               Highest Performance
                                                                                                    Flexible Storage
                                                 Largest Capacity
                       Better Performance
                         Larger Capacity
                            Scalable

Good Performance
 Highly Scalable
      Low cost
                                                                                                                         Active-Active Cluster
                                                                                                                         Active-
                                                                                   ance
                                                                            Perform                                       Up to 1000 MB/sec
                                                                     and                               Single Node

                                                            Capacity                                 Up to 500 MB/sec
                                                                                                                            1 PB useable
                                                      ble
                                                 Scala                     Active-Active Cluster
                                                                           Active-                     1 PB useable
                                                                             Up to 500 MB/sec
                                                    Up to 500 MB/sec
                                                                              36 TB useable
                                                      36 TB useable
                              Up to 250 MB/sec

      Up to 100 MB/sec         18 TB useable

        7 TB useable


 11                                                                                                                         © 2010 IBM Corporation
IBM System Storage



                     IBM TS7650 ProtecTIER® Deduplication Appliance

                                Pre-configured for rapid deployment into
                                existing backup environments
                                Extremely powerful solutions, featuring:
                                   IBM ProtecTIER software with patented
                                   HyperFactor™ deduplication technology
                                   IBM System x Server – multi-core server for
                                   enterprise-level performance
                                   IBM Storage Controller with Fibre Channel
                                   drives - Proven reliability and performance
                                Complete solution that includes rack, cables,
                                switches, and everything that is needed



12                                                                     © 2010 IBM Corporation
IBM System Storage


TS7650G ProtecTIER Deduplication Gateway

                             Powerful and Flexible solution, featuring:
                                IBM ProtecTIER software with patented
                                HyperFactor™ deduplication technology
                                IBM System x Server – multi-core server for
                                enterprise-level performance
                             Supports both IBM & Non-IBM disk
                                 IBM DS4000, DS5000, DS8000 and XIV
      TS7650G ProtecTIER
     Deduplication Gateway       HDS, EMC and others
                             And delivers:
                                Up to 500 MB/sec
                                Up to 25 times or more data reduction
                                Scalable to 1PB physical capacity
                                Enterprise-class data integrity

13                                                                  © 2010 IBM Corporation
IBM System Storage


 TS7650G ProtecTIER Deduplication Cluster
                             Our most Powerful and Flexible solution:
                                IBM ProtecTIER software with patented
                                HyperFactor™ deduplication technology
                                2 IBM System x Servers – multi-core servers
                                for maximum performance & availability
                             Supports both IBM & Non-IBM disk
                                 IBM DS4000, DS5000, DS8000 and XIV
                                 HDS, EMC and others
                             And delivers:
                                Up to 1000 MB/sec
     TS7650G ProtecTIER         Active-active cluster technology
     Deduplication Cluster
                                Two nodes working together as one repository
                                Easily manageable yet highly scalable

14                                                                 © 2010 IBM Corporation
IBM System Storage

     How ProtecTIER works
     New Data Stream                                     Repository
                                       HyperFactor™



                               Memory
                            Resident Index




                                       ProtecTIER™
                                          Server



                       Only 4GB needed to map
                             Inline deduplication
                       1PB of physical disk! server or
                        Up to 500MB/sec per
Backup Servers         1000MB/sec with 2 node cluster!
                                  “Filtered” data



15                                                          © 2010 IBM Corporation
IBM System Storage


New Reality with ProtecTIER Native Replication Solution
                       Backup                             Represented capacity
     Primary Site      Server


                                ProtecTIER
                                 Gateway


                                               Physical
                                               capacity                          Deduplication
                                                                                 enables a large
                       Backup                                                    amounts of data to
                       Server
                                                                                 be replicated with
                                                                                 significantly less
                                    IP-based
                                                                                 bandwidth
                                    WAN link


      Secondary Site
                                                                                             Virtual
                                                                                         cartridges can
                                                                                          be cloned to
                                                                                         tape at DR site
                                ProtecTIER     Physical
                       Backup    Gateway       capacity
                       Server
                                                                                      Tape
                                                                                     library



16                                                                                   © 2010 IBM Corporation
IBM System Storage


IBM ProtecTIER Native Replication Features

         One-to-one replication from primary to a DR-site
         Flexible policy driven replication
           –    Choose which cartridges to replicate – one, some or all
           –    Assign priorities and schedule when replication should occur
         Define cartridge “visibility”
           –    Determine “where” virtual cartridges “exist” from ProtecTIER and/or backup
                application standpoint
           –    ProtecTIER native replication will emulate moving tapes in & out of VTL’s
                import/export slots
           –    Allows users to use the VTL export/import slots via backup app to “move”
                cartridges from one library/site to another
         Manage and monitor operations during disaster
           –    Fail-over (when Disaster occurs) & Fail-back (to normal operation)




17                                                                                   © 2010 IBM Corporation
IBM System Storage


 Native Replication Functionality (Example)

       Create your policy (perthat in this config the DR-site B/U server scanning the
                        Note library)        Choose the time frame is should be
                                                   DR-site NBU server
                        stand alone and only become partto take Primary domain may decide to clone cartridges
       Choose which tapes (7, 8, 9)          for replication of the place         User
                                                   library & updating its catalogue
                                                Primary site comes
                        when IT becomes the Primary server (during a “disaster”)       to physical tape
       should be replicated to DR site                          OR
                                             And the priority among policies
                                                      back on line
                                                   The catalogue could be replicated
                                                  The DR a can
                                                     case site are
                                                Inas well, thus allow immediate use of
                                                (newlibrary if/when needed
                                                   the cartridges
                                                 become Primary-                            DR-site       Tape clones
        Primary-site                            disaster hit theto
                                                being replicated                                          receive new
          Backup                                 site (can backup                           Backup
          Servers                               Primary site…
                                                primary repository)
                                                new data) until….                           Server      barcode through
                                                                                                            B/U app


       Primary site                            IP connection
       TS7650
       ProtecTIER                                              DR-site
                                                               TS7650
              Primary site                                     ProtecTIER                                              Tape
                                                                                                                      library
              backup disk                                          DR-site
                                                                   backup disk



Data is de-                                       Per policy:Tapes
Duped &                4
                       1     7           1        7, 8, 9 are                                    1     Any cartridge(s)
                                                                                       7                    can be
backed-up                                         replicated into DR                                   replicated back
                       5
                       2     8           2                                             8         2      when needed
into                                              repository – only
repository             6
                       3     9           3        unique data is                       9         3
                                                  transferred

  18                                                                                                   © 2010 IBM Corporation
IBM System Storage

Challenges Associated with Today’s Reality

              Data Growth Straining Backup & Disaster Recovery Environments
              Reliability and Manual Intervention:
                 – Current methods require too much manual intervention
                 – Human intervention increases opportunities for failure
              Security Risks:
                 – Transporting data on tape poses a significant risk to data security
                 – Handling tapes creates additional “failure” opportunities
                        • Human error is culprit 24 percent of the time*
              Disaster Recovery Planning & Testing Challenges:
                 – Difficult to test DR plans using physical tape media
                 – Restoring data from tape too slow to enable adequate testing
              Costs:
                 – Seven of 10 IT administrators struggling with increased costs of off-site data
                   storage
                 – Complexity and growth greatly increasing cost of operations
* According to recent survey by Symantec Corporation


  19                                                                                     © 2010 IBM Corporation
IBM System Storage




                     Themes for Information Infrastructure 3Q09




                          Positive         Negative         Neutral



20
20                                                                    © 2010 IBM Corporation
IBM System Storage




21                   © 2010 IBM Corporation
IBM System Storage


Thank You!




Marius Vasile – STG Storage Sales Manager
marius.vasile@ro.ibm.com

Lucian Vlaicu – Field Technical Sales Support - Storage
lucian.vlaicu@ro.ibm.com


IBM Website: www.ibm.com/ro

IBM Innovation Center – Bucharest Business Park


22                                                        © 2010 IBM Corporation
IBM System Storage


Disclaimers
     Copyright © 2009 by International Business Machines Corporation.
     This publication is provided “AS IS.” IBM product information is subject to change without notice.
     No part of this document may be reproduced or transmitted in any form without written permission from IBM Corporation. Product data has been
     reviewed for accuracy as of the date of initial publication. Product data is subject to change without notice.
     This document could include technical inaccuracies or typographical errors. IBM may make changes, improvements or alterations to the products,
     programs and services described in this document, including termination of such products, programs and services, at any time and without notice. Any
     statements regarding IBM’s future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. The
     information contained in this document is current as of the initial date of publication only and is subject to change without notice. IBM shall have no
     responsibility to update such information.
     Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available
     sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any
     other claims related to non-IBM products.
     IBM makes no representations or warranties, expressed or implied, regarding non-IBM products and services, including those designated as
     ServerProven.
     IBM is not responsible for the performance or interoperability of any non-IBM products discussed herein. Performance data for IBM and non-IBM
     products and services contained in this document was derived under specific operating and environmental conditions. The actual results obtained by
     any party implementing such products or services will depend on a large number of factors specific to such party’s operating environment and may vary
     significantly. IBM makes no representation that these results can be expected or obtained in any implementation of any such products or services.
     MB, GB and TB equal 1,000,000, 1,000,000,000 and 1,000,000,000,000 bytes, respectively, where referring to storage capacity. Actual storage capacity will
     vary based upon many factors and may be less than stated. Some numbers given for storage capacities give capacity in native mode followed by
     capacity using data compression technology.
     THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS-IS” WITHOUT ANY WARRANTY, EITHER EXPRESSED OR IMPLIED. IBM EXPRESSLY
     DISCLAIMS ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT. IBM products are warranted
     according to the terms and conditions of the agreements (e.g., IBM Customer Agreement, Statement of Limited Warranty, International Program License
     Agreement, etc.) under which they are provided.
     References in this document to IBM products, programs or services does not imply that IBM intends to make such products, programs or services
     available in all countries in which IBM operates or does business. Consult your local IBM business contact for information on the product or services
     available in your area. Any reference to an IBM program or product in this document is not intended to state or imply that only that program may be
     used. Any functionally equivalent program or product that does not infringe IBM’s intellectual property rights may be used instead. It is the user’s
     responsibility to evaluate and verify the operation of any non-IBM product, program or service.
     IBM's customer is responsible for ensuring its own compliance with legal requirements. It is the customer's sole responsibility to obtain advice of
     competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer's
     business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its
     services or products will ensure that the customer is in compliance with any law.
     The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents or copyrights.
     Inquiries regarding patent or copyright licenses should be made, in writing, to:
     IBM Director of Licensing
     IBM Corporation
     North Castle Drive
     Armonk, NY 10504-1785
     U.S.A.



23                                                                                                                                         © 2010 IBM Corporation
IBM System Storage


Trademarks
     IBM, the IBM logo and ibm.com are trademarks or registered trademarks of International Business Machines Corporation in the United
     States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a
     trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information
     was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is
     available on the Web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml

     Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
     Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or
     both.
     Intel, Intel Inside (logos), MMX and Pentium are trademarks of Intel Corporation in the United States, other countries, or both.
     UNIX is a registered trademark of The Open Group in the United States and other countries.
     Linux is a trademark of Linus Torvalds in the United States, other countries, or both.
     Linear Tape Open, LTO and Ultrium are trademarks of Hewlett Packard, IBM and Certance in the United States, other countries or both."
     Cisco and IOS are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.
     Other company, product, or service names may be trademarks or service marks of others.




24                                                                                                                             © 2010 IBM Corporation

Más contenido relacionado

La actualidad más candente

Mergers & Acquisitions
Mergers & AcquisitionsMergers & Acquisitions
Mergers & Acquisitionsdmurph4
 
Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Avirot Mitamura
 
Microsoft+ +bc-dr+-+28apr2010
Microsoft+ +bc-dr+-+28apr2010Microsoft+ +bc-dr+-+28apr2010
Microsoft+ +bc-dr+-+28apr2010Agora Group
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the CloudNeil Readshaw
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust
 
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End PointVirtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End PointHyTrust
 
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosAntivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosNextel S.A.
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15finalMahmoud Moustafa
 
Presidio Data Center Practice Overview
Presidio Data Center Practice OverviewPresidio Data Center Practice Overview
Presidio Data Center Practice Overviewjdinneen
 
Skadoit Brochure
Skadoit BrochureSkadoit Brochure
Skadoit Brochuretomrufe
 
Mobile Management
Mobile ManagementMobile Management
Mobile ManagementCarahsoft
 
Tom McCann - Sopra
Tom McCann - SopraTom McCann - Sopra
Tom McCann - SopraSocitm
 
2011 special edition - converged infrastructure
2011   special edition - converged infrastructure2011   special edition - converged infrastructure
2011 special edition - converged infrastructureclansmandresin
 
The Rise of Big Data and On-Demand IT
The Rise of Big Data and On-Demand ITThe Rise of Big Data and On-Demand IT
The Rise of Big Data and On-Demand ITInnoTech
 
Executive Breakfast SysValue-NetApp-VMWare - 16 de Março de 2012 - Apresentaç...
Executive Breakfast SysValue-NetApp-VMWare - 16 de Março de 2012 - Apresentaç...Executive Breakfast SysValue-NetApp-VMWare - 16 de Março de 2012 - Apresentaç...
Executive Breakfast SysValue-NetApp-VMWare - 16 de Março de 2012 - Apresentaç...Joao Barreto Fernandes
 

La actualidad más candente (19)

Mergers & Acquisitions
Mergers & AcquisitionsMergers & Acquisitions
Mergers & Acquisitions
 
Succor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackupSuccor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackup
 
Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10
 
Microsoft+ +bc-dr+-+28apr2010
Microsoft+ +bc-dr+-+28apr2010Microsoft+ +bc-dr+-+28apr2010
Microsoft+ +bc-dr+-+28apr2010
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the Cloud
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
 
IBM General Storage
IBM General StorageIBM General Storage
IBM General Storage
 
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End PointVirtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
 
EMC & Techno Vision
EMC & Techno VisionEMC & Techno Vision
EMC & Techno Vision
 
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosAntivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizados
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
Presidio Data Center Practice Overview
Presidio Data Center Practice OverviewPresidio Data Center Practice Overview
Presidio Data Center Practice Overview
 
Skadoit Brochure
Skadoit BrochureSkadoit Brochure
Skadoit Brochure
 
Mobile Management
Mobile ManagementMobile Management
Mobile Management
 
Tom McCann - Sopra
Tom McCann - SopraTom McCann - Sopra
Tom McCann - Sopra
 
2011 special edition - converged infrastructure
2011   special edition - converged infrastructure2011   special edition - converged infrastructure
2011 special edition - converged infrastructure
 
XEN App
XEN AppXEN App
XEN App
 
The Rise of Big Data and On-Demand IT
The Rise of Big Data and On-Demand ITThe Rise of Big Data and On-Demand IT
The Rise of Big Data and On-Demand IT
 
Executive Breakfast SysValue-NetApp-VMWare - 16 de Março de 2012 - Apresentaç...
Executive Breakfast SysValue-NetApp-VMWare - 16 de Março de 2012 - Apresentaç...Executive Breakfast SysValue-NetApp-VMWare - 16 de Março de 2012 - Apresentaç...
Executive Breakfast SysValue-NetApp-VMWare - 16 de Março de 2012 - Apresentaç...
 

Similar a How can maximize your storage capabilities by using IBM backup & restore solutions-27ian2010

IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Securityebuc
 
EV9 & NBU5000
EV9 & NBU5000EV9 & NBU5000
EV9 & NBU5000Symantec
 
Protect your critical business information with information security solution...
Protect your critical business information with information security solution...Protect your critical business information with information security solution...
Protect your critical business information with information security solution...IBM India Smarter Computing
 
Protect your critical business information with information security solution...
Protect your critical business information with information security solution...Protect your critical business information with information security solution...
Protect your critical business information with information security solution...IBM India Smarter Computing
 
S sy0883 smarter-storage-strategy-edge2015-v4
S sy0883 smarter-storage-strategy-edge2015-v4S sy0883 smarter-storage-strategy-edge2015-v4
S sy0883 smarter-storage-strategy-edge2015-v4Tony Pearson
 
IBM Storage at the Incisive Media, IT Leaders Forum with Computing.co.uk
IBM Storage at the Incisive Media, IT Leaders Forum with Computing.co.ukIBM Storage at the Incisive Media, IT Leaders Forum with Computing.co.uk
IBM Storage at the Incisive Media, IT Leaders Forum with Computing.co.ukMatt Fordham
 
Smau Bari 2012 Roberto Cherubini
Smau Bari 2012   Roberto CherubiniSmau Bari 2012   Roberto Cherubini
Smau Bari 2012 Roberto CherubiniSMAU
 
Storing Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance ChallengesStoring Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance ChallengesTony Pearson
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Oracle BH
 
IBM Storage Strategy in the Era of Smarter Computing
IBM Storage Strategy in the Era of Smarter ComputingIBM Storage Strategy in the Era of Smarter Computing
IBM Storage Strategy in the Era of Smarter ComputingTony Pearson
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudChris Pepin
 
Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary StorageJessica Tanner
 
Zenith Infotech Mirror Cloud Presentation. 112211
Zenith Infotech    Mirror Cloud Presentation. 112211Zenith Infotech    Mirror Cloud Presentation. 112211
Zenith Infotech Mirror Cloud Presentation. 112211hdmchughgmailcom
 
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...solarisyougood
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
INCONTRI AL CINEMA - HUS VM: la nuova piattaforma unificata di Hitachi Data...
 INCONTRI AL CINEMA - HUS VM: la nuova piattaforma unificata di Hitachi Data... INCONTRI AL CINEMA - HUS VM: la nuova piattaforma unificata di Hitachi Data...
INCONTRI AL CINEMA - HUS VM: la nuova piattaforma unificata di Hitachi Data...Mauden SpA
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"IBM Security
 
Taneja Group on ProtecTIER's IP Native Replication
Taneja Group on ProtecTIER's IP Native ReplicationTaneja Group on ProtecTIER's IP Native Replication
Taneja Group on ProtecTIER's IP Native ReplicationIBM India Smarter Computing
 

Similar a How can maximize your storage capabilities by using IBM backup & restore solutions-27ian2010 (20)

IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
EV9 & NBU5000
EV9 & NBU5000EV9 & NBU5000
EV9 & NBU5000
 
Protect your critical business information with information security solution...
Protect your critical business information with information security solution...Protect your critical business information with information security solution...
Protect your critical business information with information security solution...
 
Protect your critical business information with information security solution...
Protect your critical business information with information security solution...Protect your critical business information with information security solution...
Protect your critical business information with information security solution...
 
S sy0883 smarter-storage-strategy-edge2015-v4
S sy0883 smarter-storage-strategy-edge2015-v4S sy0883 smarter-storage-strategy-edge2015-v4
S sy0883 smarter-storage-strategy-edge2015-v4
 
IBM Storage at the Incisive Media, IT Leaders Forum with Computing.co.uk
IBM Storage at the Incisive Media, IT Leaders Forum with Computing.co.ukIBM Storage at the Incisive Media, IT Leaders Forum with Computing.co.uk
IBM Storage at the Incisive Media, IT Leaders Forum with Computing.co.uk
 
Smau Bari 2012 Roberto Cherubini
Smau Bari 2012   Roberto CherubiniSmau Bari 2012   Roberto Cherubini
Smau Bari 2012 Roberto Cherubini
 
Storing Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance ChallengesStoring Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance Challenges
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
 
IBM Storage Strategy in the Era of Smarter Computing
IBM Storage Strategy in the Era of Smarter ComputingIBM Storage Strategy in the Era of Smarter Computing
IBM Storage Strategy in the Era of Smarter Computing
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM Cloud
 
Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary Storage
 
Zenith Infotech Mirror Cloud Presentation. 112211
Zenith Infotech    Mirror Cloud Presentation. 112211Zenith Infotech    Mirror Cloud Presentation. 112211
Zenith Infotech Mirror Cloud Presentation. 112211
 
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
 
Accelerate Return on Data
Accelerate Return on DataAccelerate Return on Data
Accelerate Return on Data
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
INCONTRI AL CINEMA - HUS VM: la nuova piattaforma unificata di Hitachi Data...
 INCONTRI AL CINEMA - HUS VM: la nuova piattaforma unificata di Hitachi Data... INCONTRI AL CINEMA - HUS VM: la nuova piattaforma unificata di Hitachi Data...
INCONTRI AL CINEMA - HUS VM: la nuova piattaforma unificata di Hitachi Data...
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
 
IBM ProtecTIER Adds Native Replication
IBM ProtecTIER Adds Native ReplicationIBM ProtecTIER Adds Native Replication
IBM ProtecTIER Adds Native Replication
 
Taneja Group on ProtecTIER's IP Native Replication
Taneja Group on ProtecTIER's IP Native ReplicationTaneja Group on ProtecTIER's IP Native Replication
Taneja Group on ProtecTIER's IP Native Replication
 

Más de Agora Group

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...Agora Group
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseAgora Group
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftAgora Group
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Agora Group
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital ForensicsAgora Group
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMAgora Group
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the EnterpriseAgora Group
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateAgora Group
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessAgora Group
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu DopAgora Group
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru paciențiAgora Group
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...Agora Group
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Agora Group
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateAgora Group
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wireAgora Group
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileAgora Group
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Group
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LANAgora Group
 

Más de Agora Group (20)

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe procese
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms Shift
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004
 
Curs OSINT
Curs OSINTCurs OSINT
Curs OSINT
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital Forensics
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPM
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the Enterprise
 
ABPMP Romania
ABPMP RomaniaABPMP Romania
ABPMP Romania
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de Sănătate
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent Business
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu Dop
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru pacienți
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatate
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wire
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobile
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorni
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LAN
 

How can maximize your storage capabilities by using IBM backup & restore solutions-27ian2010

  • 1. Marius Vasile – STG System Storage Manager 27 ianuarie 2010 Hotel Intercontinental, Sala Ronda How can maximize your storage capabilities by using IBM backup & restore solutions © 2010 IBM Corporation
  • 2. IBM System Storage The world is changing, enabling organizations to make faster, better-informed decisions as their systems can be made instrumented, interconnected and intelligent. Instrumented Interconnected Intelligent This is an opportunity for the world to get smarter. 2 © 2010 IBM Corporation
  • 3. IBM System Storage Is your critical application data adequately protected? Traditional once-a-night backup leaves up to 24 hours of your most recent data Recovery Point Objective: How much data can you afford to lose? at risk – How much data will you lose if your database server crashes at 5 PM? – How much will it cost you to re- create those transactions? It can take many hours or days to perform a full restore from traditional Recovery Time Objective: How much downtime can you afford? backup systems – How much application downtime can your business tolerate? 3 © 2010 IBM Corporation
  • 4. IBM System Storage With this change comes an … Yet organizations are explosion in information … operating with blind spots Lack of Insight 1 in 3 managers frequently make critical decisions without the information they need Volume of Digital Data Inefficient Access 1 in 2 don’t have access to the information across their organization needed to do their jobs Variety of Information Inability to Predict 3 in 4 business leaders say more predictive information would drive better decisions Velocity of Decision Making Source: IBM Institute for Business Value 4 © 2010 IBM Corporation
  • 5. IBM System Storage Building the infrastructure for a Smarter Planet Compliance Reduce reputation risks and audit deficiencies Availability Deliver continuous and reliable access to information Retention Support your information retention policies Security Protect and enable secure sharing of information 5 © 2010 IBM Corporation
  • 6. IBM System Storage Themes for Information Infrastructure 3Q09 Positive Negative Neutral 6 6 © 2010 IBM Corporation
  • 7. IBM System Storage Business continuity depends on data recovery Business-critical data exists throughout the enterprise: What can go wrong? Deleted files – Application servers in the data center Corrupted database – Remote and branch offices Virus/hacker attack – Employee workstations Disk crash – Disaster recovery sites Server crash Businesses of all types are facing unprecedented Local disaster challenges to keep more information available, all the time Regional disaster – They can’t afford to lose any data, and they can’t afford Can you quickly to be without it for very long recovery from each? – Losing access to data causes downtime The costs of downtime and lost data are escalating: – Lost revenue streams and customer confidence – Embarrassment in the marketplace – Contract penalties, regulatory fines, legal action 7 © 2010 IBM Corporation
  • 8. IBM System Storage IBM System Storage – Offering Matrix Tape Systems Disk Systems Tape Virtualization IBM XIV – Grid Storage Tape Libraries DS8000 - Enterprise Class LTO Tape Drives DS5000 - MidRange Enterprise Tape Drives DS3000 - Entry Deduplication Network Attached ProtecTIER Deduplication Appliances Storage (NAS) ProtecTIER Deduplication Gateway N series Storage Software Storage Solutions SAN Volume Controller DR550 archive and compliance storage Grid Access Manager, GMAS Tivoli Storage Productivity Center IBM Tivoli Storage Manager Smart Business Storage Cloud (SBSC) IBM Tivoli Storage ManagerFastback Storage Encryption Solutions (TKLM) Comprehensive Data Protection Solution (CDPS) IBM Tivoli Storage FlashCopy Manager Networking Fibre Channel Ethernet Fibre Channel over Ethernet 8 © 2010 IBM Corporation
  • 9. IBM System Storage Introducing Tivoli Storage Manager FastBack v6.1 Block-level, incremental-forever, continuous or scheduled backup for Windows and Linux New servers Near-instant restore of any type / amount of Windows application data – Near-instant access to Linux data via FastBack Mount New Integrated target-side data New Remote Office(s) HQ / Data Center deduplication Exchange SQL/DB2 Oracle/SAP File/Print Built-in ‘selective replication’ Central Control Comprehensive reporting, Station leverages Tivoli Common Reporting Tivoli Storage Manager Tight integration with Tivoli Storage Manager New IBM Tivoli Storage Manager FastBack TSM FastBack for Workstations: optional Disaster Recovery Site protection for laptops & New desktops 9 © 2010 IBM Corporation
  • 10. IBM System Storage TSM FastBack is part of IBM’s Unified Recovery Management solution suite Remote Office(s) Data Center D/R Site FastBack FastBack TSM B/A Clients Clients Clients Application Servers Application Servers File Servers File Servers VMware Servers VMware Servers FastBack for Workstations New WAN FastBack FastBack Tivoli Storage Tiers of Server Server Manager Server Storage Tivoli Storage Manager: enterprise-class data management includes backup, archive, HSM, support for hundreds of devices and a broad range of operating systems Tivoli Storage Manager FastBack: next-generation backup and near-instant restore for critical servers; backup consolidation & disaster recovery for remote offices; and more … Tivoli Storage Manager FastBack for Workstations: continuous data protection (CDP) for desktop and laptop systems with centralized management 10 © 2010 IBM Corporation
  • 11. IBM System Storage IBM TS7650 ProtecTIER® Deduplication Family TS7650G Gateways Highest Performance largest Capacity High Availability TS7650 Appliance Highest Performance Largest Capacity Larg High Performance High Availability High Capacity Highest Performance Flexible Storage Largest Capacity Better Performance Larger Capacity Scalable Good Performance Highly Scalable Low cost Active-Active Cluster Active- ance Perform Up to 1000 MB/sec and Single Node Capacity Up to 500 MB/sec 1 PB useable ble Scala Active-Active Cluster Active- 1 PB useable Up to 500 MB/sec Up to 500 MB/sec 36 TB useable 36 TB useable Up to 250 MB/sec Up to 100 MB/sec 18 TB useable 7 TB useable 11 © 2010 IBM Corporation
  • 12. IBM System Storage IBM TS7650 ProtecTIER® Deduplication Appliance Pre-configured for rapid deployment into existing backup environments Extremely powerful solutions, featuring: IBM ProtecTIER software with patented HyperFactor™ deduplication technology IBM System x Server – multi-core server for enterprise-level performance IBM Storage Controller with Fibre Channel drives - Proven reliability and performance Complete solution that includes rack, cables, switches, and everything that is needed 12 © 2010 IBM Corporation
  • 13. IBM System Storage TS7650G ProtecTIER Deduplication Gateway Powerful and Flexible solution, featuring: IBM ProtecTIER software with patented HyperFactor™ deduplication technology IBM System x Server – multi-core server for enterprise-level performance Supports both IBM & Non-IBM disk IBM DS4000, DS5000, DS8000 and XIV TS7650G ProtecTIER Deduplication Gateway HDS, EMC and others And delivers: Up to 500 MB/sec Up to 25 times or more data reduction Scalable to 1PB physical capacity Enterprise-class data integrity 13 © 2010 IBM Corporation
  • 14. IBM System Storage TS7650G ProtecTIER Deduplication Cluster Our most Powerful and Flexible solution: IBM ProtecTIER software with patented HyperFactor™ deduplication technology 2 IBM System x Servers – multi-core servers for maximum performance & availability Supports both IBM & Non-IBM disk IBM DS4000, DS5000, DS8000 and XIV HDS, EMC and others And delivers: Up to 1000 MB/sec TS7650G ProtecTIER Active-active cluster technology Deduplication Cluster Two nodes working together as one repository Easily manageable yet highly scalable 14 © 2010 IBM Corporation
  • 15. IBM System Storage How ProtecTIER works New Data Stream Repository HyperFactor™ Memory Resident Index ProtecTIER™ Server Only 4GB needed to map Inline deduplication 1PB of physical disk! server or Up to 500MB/sec per Backup Servers 1000MB/sec with 2 node cluster! “Filtered” data 15 © 2010 IBM Corporation
  • 16. IBM System Storage New Reality with ProtecTIER Native Replication Solution Backup Represented capacity Primary Site Server ProtecTIER Gateway Physical capacity Deduplication enables a large Backup amounts of data to Server be replicated with significantly less IP-based bandwidth WAN link Secondary Site Virtual cartridges can be cloned to tape at DR site ProtecTIER Physical Backup Gateway capacity Server Tape library 16 © 2010 IBM Corporation
  • 17. IBM System Storage IBM ProtecTIER Native Replication Features One-to-one replication from primary to a DR-site Flexible policy driven replication – Choose which cartridges to replicate – one, some or all – Assign priorities and schedule when replication should occur Define cartridge “visibility” – Determine “where” virtual cartridges “exist” from ProtecTIER and/or backup application standpoint – ProtecTIER native replication will emulate moving tapes in & out of VTL’s import/export slots – Allows users to use the VTL export/import slots via backup app to “move” cartridges from one library/site to another Manage and monitor operations during disaster – Fail-over (when Disaster occurs) & Fail-back (to normal operation) 17 © 2010 IBM Corporation
  • 18. IBM System Storage Native Replication Functionality (Example) Create your policy (perthat in this config the DR-site B/U server scanning the Note library) Choose the time frame is should be DR-site NBU server stand alone and only become partto take Primary domain may decide to clone cartridges Choose which tapes (7, 8, 9) for replication of the place User library & updating its catalogue Primary site comes when IT becomes the Primary server (during a “disaster”) to physical tape should be replicated to DR site OR And the priority among policies back on line The catalogue could be replicated The DR a can case site are Inas well, thus allow immediate use of (newlibrary if/when needed the cartridges become Primary- DR-site Tape clones Primary-site disaster hit theto being replicated receive new Backup site (can backup Backup Servers Primary site… primary repository) new data) until…. Server barcode through B/U app Primary site IP connection TS7650 ProtecTIER DR-site TS7650 Primary site ProtecTIER Tape library backup disk DR-site backup disk Data is de- Per policy:Tapes Duped & 4 1 7 1 7, 8, 9 are 1 Any cartridge(s) 7 can be backed-up replicated into DR replicated back 5 2 8 2 8 2 when needed into repository – only repository 6 3 9 3 unique data is 9 3 transferred 18 © 2010 IBM Corporation
  • 19. IBM System Storage Challenges Associated with Today’s Reality Data Growth Straining Backup & Disaster Recovery Environments Reliability and Manual Intervention: – Current methods require too much manual intervention – Human intervention increases opportunities for failure Security Risks: – Transporting data on tape poses a significant risk to data security – Handling tapes creates additional “failure” opportunities • Human error is culprit 24 percent of the time* Disaster Recovery Planning & Testing Challenges: – Difficult to test DR plans using physical tape media – Restoring data from tape too slow to enable adequate testing Costs: – Seven of 10 IT administrators struggling with increased costs of off-site data storage – Complexity and growth greatly increasing cost of operations * According to recent survey by Symantec Corporation 19 © 2010 IBM Corporation
  • 20. IBM System Storage Themes for Information Infrastructure 3Q09 Positive Negative Neutral 20 20 © 2010 IBM Corporation
  • 21. IBM System Storage 21 © 2010 IBM Corporation
  • 22. IBM System Storage Thank You! Marius Vasile – STG Storage Sales Manager marius.vasile@ro.ibm.com Lucian Vlaicu – Field Technical Sales Support - Storage lucian.vlaicu@ro.ibm.com IBM Website: www.ibm.com/ro IBM Innovation Center – Bucharest Business Park 22 © 2010 IBM Corporation
  • 23. IBM System Storage Disclaimers Copyright © 2009 by International Business Machines Corporation. This publication is provided “AS IS.” IBM product information is subject to change without notice. No part of this document may be reproduced or transmitted in any form without written permission from IBM Corporation. Product data has been reviewed for accuracy as of the date of initial publication. Product data is subject to change without notice. This document could include technical inaccuracies or typographical errors. IBM may make changes, improvements or alterations to the products, programs and services described in this document, including termination of such products, programs and services, at any time and without notice. Any statements regarding IBM’s future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. The information contained in this document is current as of the initial date of publication only and is subject to change without notice. IBM shall have no responsibility to update such information. Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. IBM makes no representations or warranties, expressed or implied, regarding non-IBM products and services, including those designated as ServerProven. IBM is not responsible for the performance or interoperability of any non-IBM products discussed herein. Performance data for IBM and non-IBM products and services contained in this document was derived under specific operating and environmental conditions. The actual results obtained by any party implementing such products or services will depend on a large number of factors specific to such party’s operating environment and may vary significantly. IBM makes no representation that these results can be expected or obtained in any implementation of any such products or services. MB, GB and TB equal 1,000,000, 1,000,000,000 and 1,000,000,000,000 bytes, respectively, where referring to storage capacity. Actual storage capacity will vary based upon many factors and may be less than stated. Some numbers given for storage capacities give capacity in native mode followed by capacity using data compression technology. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS-IS” WITHOUT ANY WARRANTY, EITHER EXPRESSED OR IMPLIED. IBM EXPRESSLY DISCLAIMS ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements (e.g., IBM Customer Agreement, Statement of Limited Warranty, International Program License Agreement, etc.) under which they are provided. References in this document to IBM products, programs or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Consult your local IBM business contact for information on the product or services available in your area. Any reference to an IBM program or product in this document is not intended to state or imply that only that program may be used. Any functionally equivalent program or product that does not infringe IBM’s intellectual property rights may be used instead. It is the user’s responsibility to evaluate and verify the operation of any non-IBM product, program or service. IBM's customer is responsible for ensuring its own compliance with legal requirements. It is the customer's sole responsibility to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer's business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents or copyrights. Inquiries regarding patent or copyright licenses should be made, in writing, to: IBM Director of Licensing IBM Corporation North Castle Drive Armonk, NY 10504-1785 U.S.A. 23 © 2010 IBM Corporation
  • 24. IBM System Storage Trademarks IBM, the IBM logo and ibm.com are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. Intel, Intel Inside (logos), MMX and Pentium are trademarks of Intel Corporation in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. Linux is a trademark of Linus Torvalds in the United States, other countries, or both. Linear Tape Open, LTO and Ultrium are trademarks of Hewlett Packard, IBM and Certance in the United States, other countries or both." Cisco and IOS are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Other company, product, or service names may be trademarks or service marks of others. 24 © 2010 IBM Corporation