RepliStor and OnCourse are software solutions from EMC that provide data replication and file transfer capabilities. RepliStor continuously replicates data between servers to ensure recoverability and minimize data loss. It supports Exchange database replication and ensures recoverability even if the replica is not available. OnCourse is a policy-based file transfer solution that automates consolidation and distribution of files across heterogeneous systems through a centralized management interface. It supports various usage models including data consolidation, file synchronization, and content distribution.
Note to Presenter: Present to customers and prospects to provide them with an overview of EMC RepliStor.
This presentation covers the importance and relevance of how RepliStor provides greater levels of data protection, while also providing recoverability in the event of an outage.
RepliStor ensures remote-office data-backup consolidation and business continuity by ensuring host-based replication for Microsoft Windows environments.
EMC View of ILM Infrastructures for Enterprise Customers (Example only)
The next generation Model will utilise Virtualisation technologies.
Allows discussion on VMWare in the production environment and Storage Virtualisation solutions.
Note to Presenter: Present to customers and prospects to provide them with an overview of EMC RepliStor.
This presentation covers the importance and relevance of how RepliStor provides greater levels of data protection, while also providing recoverability in the event of an outage.
RepliStor ensures remote-office data-backup consolidation and business continuity by ensuring host-based replication for Microsoft Windows environments.
Note to Presenter: View in Slide Show mode for animation.
Let’s start with use cases showing how RepliStor can provide tremendous value to your environment. For each use case into which we delve, we will start with its challenges, and how RepliStor resolves those challenges.
The four different use cases we will discuss today are:
Exchange recoverability
Data recoverability
Branch-office data protection
Data distribution
Each of these use cases concerns various people within the environment. The requirement for data recoverability for Exchange disaster recovery, for example, affects the E-mail Administrator. The ability to recover data from a hard crash is critical to executives who use e-mail as a document folder, as it is to all the other employees in the environment who rely on e-mail for communicating with customers and users.
Data recoverability for Exchange disaster recovery—RepliStor integrates replication and application-consistent snapshots to ensure the recoverability of your Exchange database in the event of a site disaster. RepliStor is the only solution that provides this recoverability assurance without degrading production Exchange performance or exerting additional network load.
Data disaster-recovery protection and data recoverability—Replication over any distance enables a secondary copy of production data to be created at any location. When one server becomes unavailable, RepliStor automatically switches file-system services and restarts application services on the second server, preserving end-user access to data and applications.
Branch-office data consolidation—Remote offices can replicate their data to a central location for simplifying and consolidating backup operations. This can reduce costs by significantly reducing IT requirements at remote locations, while leveraging administration and hardware at the data center. With a current copy of data on a second system, backups can be run from the second set of data at any time without affecting production users.
Data distribution—When maintaining multiple systems that require identical datasets for sharing information in Web farms, multiple file servers, or content-publication applications; or in any deployment in which data changes dynamically, RepliStor ensures these changes are propagated to the other servers quickly, efficiently, and with no need for manual steps in the process.
Let’s first take a look at Exchange recoverability in more detail.
Here is a summary of the solution benefits of RepliStor’s Exchange recoverability:
It is vital to the protection of your Exchange data that you choose a replication technology that can integrate with VSS.
RepliStor also ensures minimal impact on the Exchange production system, and no impact on the network, when it is replicating data from one server to one or more servers.
To provide the greatest level of flexibility, you can configure your environment to have one-to-one, many-to-one, or, finally, MSCS-to-MSCS.
RepliStor is easy to use and can work with any storage array.
Scales from small to large deployments of Exchange
Note to Presenter: Remember, this functionality is available with V6.1.1.
Tape backup is necessary. But if your last tape backup was at midnight and your business experienced an outage at 11:00 a.m., you need to ask yourself, “Can I afford to lose 11 hours of data?”
Additionally, recovering your data from tape is long and error-prone. To recover just catalogs can take 20 minutes per tape—if you have 100 catalogs, that could take up to 33 hours.
Replication can further protect your data by replicating it in real time to another location. As RepliStor provides asynchronous replication, you may have a few seconds of data loss in the event of an outage. The advantage of asynchronous replication is that you don’t have to wait for the writes to commit to the secondary site before another write can take place at the primary. In that scenario, known as synchronous replication, performance would be unacceptable if your sites were far apart and connectivity between them were poor.
RepliStor can provide the best of both worlds. It can replicate data over any distance using TCP/IP. Performance doesn’t take a hit because the replication is taking place in real time, but the writes do not need to be committed at the secondary site.
It is essential to determine the ideal balance between your recovery-point objective (RPO)—that is, how much data loss you can endure—and your recovery-time objective (RTO)—that is, how long it takes you to recover. Logical threats, which include site maintenance and server and application upgrades, account for about 80% of downtime. In reality, you are protecting your environment from planned outages, but also against disasters.
RepliStor can protect data, regardless of distance. It continuously replicates your changed files and registry and directory data to the secondary site, whether the files are open or closed. But RepliStor goes beyond just data replication and protection.
Note to Presenter: Click now in Slide Show mode for animation.
When a server fault occurs, RepliStor restarts the applications and reconnects data and users to the secondary location without the users knowing what took place. To protect yourself against data loss as well as server faults, RepliStor is an ideal choice.
And with RepliStor’s integration with Microsoft’s Volume Shadow Copy Service, you can ensure application-consistent shadow copies are recoverable for SQL Server 2005 data.
As RepliStor is not application-aware, it can integrate with other clustering solutions that have more sophisticated application monitoring to understand whether it is the application, the network, or the hardware that is faulting.
Before investigating this in more detail, let’s jump to a screenshot of RepliStor and see its synchronization options…
EMC AutoStart provides application-aware clustering technology to ensure that the health of your applications, networks, and hardware is properly monitored. In the event of an outage or fault, AutoStart seamlessly transfers control of the application and storage resources to another location, regardless of distance.
Not only does AutoStart provide automation to shut down the applications and then restart them on another server, it also ensures they restart using the right storage resources. For the ultimate protection and flexibility in disaster-recovery testing, AutoStart provides failback capabilities, so that you can test migration of services from one site to another without worrying. EMC is all about recovery, and AutoStart’s unique failback capabilities are an important piece of the story.
Just as AutoStart integrates with SRDF/A and SRDF/S, it also integrates with RepliStor. As RepliStor monitors server outages only, you may also need AutoStart technology to monitor your applications, too.
Note to Presenter: Click now in Slide Show mode for animation.
In the event of a disaster, AutoStart relocates the application resources from one site to another, ensures read-write access to the remote replica, and restarts the application resources on the secondary site.
Note to Presenter: Be sure to note that today, EMC supports only two nodes with AutoStart and RepliStor. Emphasize again that this is a Windows-only environment. Customers with UNIX must use AutoStart with SRDF/A or SRDF/S.
Note to Presenter: View in Slide Show mode for animation.
Here is an example of branch-office consolidation.
RepliStor first ensures data replication from the primary site to a secondary site, or to more than one secondary site. This is done continuously in real time to ensure that all satellite-office data is protected and centrally backed up, which reduces the risk to your business of not meeting compliance regulations. The cost savings of not needing media and backup servers at each site is extremely high.
Note to Presenter: View in Slide Show mode for animation.
RepliStor’s replication process is also extremely flexible, offering several unique options that allow you to determine when and how replication will occur.
The Pause Updates option allows users to temporarily stop updating on the target system. When this option is enabled, the source system will still capture file updates and forward them to the target system, but instead of applying these updates to the corresponding files on the target system, RepliStor writes them to a log file in the RepliStor Data Directory on that system. Once Pause Updates is disabled, the updates that were written to the log file are then applied to the appropriate files. This option is most often used in conjunction with a backup utility on the target system, or to perform system maintenance on the target system.
The Throttling option allows users to determine the rate at which RepliStor data moves across the network, in kilobytes per second. This option can also be scheduled to happen at a particular time, or at regular intervals of time.
The Scheduling option allows users to schedule either a full syncrhronization (complete file copy) or an incremental synchronization (copy of file changes). The standard incremental synchronization is a binary-compare checksum operation that compares files between the source and target systems, and copies only the bytes in the file that have changed.
The Attribute Only option skips the checksum and instead compares timestamps and file sizes. If they do not match for a file between the two systems, RepliStor recopies the entire file from the source to the target system. This option can speed up the incremental synch in situations where there are few updates. The synchronization can be scheduled to happen at a particular time or on a recurring basis.
All of these options can be configured via the RepliStor GUI, as shown on this slide, or via the command-line interface (CLI).
Note to Presenter: View in Slide Show mode for animation.
RepliStor offers three levels of security for protecting users’ data during the replication process:
Connection
Digital Signature
Encryption
Security levels can be configured and viewed at any time via the RepliStor GUI.
Connection is the minimum, as well as the default, security level. Connection security means that all server-to-server and client-to-server connections are authenticated, using a “challenge/response” type of algorithm that never passes the account, password, or domain information unencrypted between the servers. It also prevents third parties from recording the exchange and replaying it at a later time.
The Digital Signature security level creates an additional element of security by “signing” all messages—in other words, adding a small signature (about 16 bytes in size) to each message. While a signature does not add privacy, it does guard against tampering and “man-in-the-middle” types of security attacks. It will detect:
Message alteration
Out-of-sequence messages
Replayed messages
Encryption is the highest security level. It performs all the functions of the “Connection” and “Digital” Signature” security levels, but also adds privacy—in addition to getting a digital signature, all messages are fully encrypted. This is appropriate when sensitive data needs to travel over a public network, such as the Internet.
Note to Presenter: View in Slide Show mode for animation.
RepliStor provides a secure and reliable solution for distributing data across a variety of Windows-server platforms. Rather than putting data on a disk or tape, then shipping it to remote facilities where security can be at risk, you can encrypt the data and send it directly to the satellite offices for use.
Here is a summary of what RepliStor provides to your business:
Increases high availability for data
Decreases cost, complexity, total cost of ownership, and risk
Improves time to recovery
Provides data compression
With data recoverability, disaster-recovery protection, branch-office data consolidation, and data distribution, RepliStor can provide tremendous value-add to your Windows environment.
Note to Presenter: You can go through each line item as a recap to the benefits of RepliStor.
Note to Presenter: Presenter to customers and prospects to provide them with an overview of OnCourse, which provides the ultimate in data mobility—secure, automated host-based file transfer across heterogeneous systems.
The key value of OnCourse is to help protect your data at remote sites and perform secure and reliable data transfers. OnCourse will allow you to achieve easier compliance with data regulatory issues. OnCourse will speed the flow of information and allow greater efficiency of business workflow.
One example of this is a customer who moved large data files to end users. Upon completion of transfer, OnCourse sent back a digital immutable receipt, which instantly activated a billing application that sent an invoice. This automation customization greatly sped time to revenue for the entire operation.
OnCourse is comprised of a central Data Transfer Manager. The Data Transfer Manager links with lightweight agents at the edge to perform core-to-edge, edge-to-core, and edge-to-edge file transfers. These agents can sit at edge sites that will never be NAS- or SAN-attached, allowing the total storage solution and management to be extended out to edge sites that were previously not addressed.
Note to Presenter: The target market for OnCourse is central headquarter sites with distributed branch offices.
The most common use cases for OnCourse are:
Data consolidation—moving data from edge to core for centralized backups—reduces the need for separate backup procedures in branch office while bringing data from the edge to be included in data center backup procedures.
File synchronization—OnCourse can move data at pre-determined intervals or scheduled periods to assure that information and data stays up to date and accurate.
Content distribution, push or pull data from edge to core, core to edge, or edge to edge to publish and aggregate business information.
The OnCourse GUI allows authorized users to access the Data Transfer Manager and control the movement of data and execution of business rules. This GUI can be accessed from anywhere using a web browser, though access can be restricted easily by login.
The GUI allows users to easily model the movement of files between two or more servers, and to specify programs, commands, or scripts to be executed as part of the data movement process.
Scheduling of movement is flexible, allowing transfer of files to occur regularly. Success and failure notification can be sent by e-mail.
The GUI allows users to see the status of each transfer job while in process, and to report on the results of each job when completed. Reports show how long a job took to complete, how much network resource was used, and other useful statistics.
Business rules that govern the data flow are stored in the Business Rules database.
Business Rules are expressed as linked automation packages…
Each automation package is a discrete task in a data transfer process.
Automation packages can be grouped to run in sequence or in parallel.
Execution of packages can be triggered based on the results of other packages.
Note to Presenter: Using the GUI icon-based setup method can allow fast modeling of complex file movements.
This is a segmentation of use cases for OnCourse:
55% are using OnCourse for backup consolidation (many to one).
22% are using OnCourse for one-to-many, many-to-many data distribution.
17% are using OnCourse for directory and software synchronization. This can be used for applications like outsourced development, collaborative work groups, or software development synchronization.
In this example, OnCourse was able to replace the manually intensive and costly old way of distributing data via CD, greatly reducing costs and speeding up information transfer. They significantly reduced costs and added integrity to the distribution process.
Here is another common situation in which OnCourse can greatly reduce administration burden and cost.
Many companies have to frequently update numerous distributed systems with either information or software updates, and these updates are applied individually by administrative personnel.
Problem:
Labor and travel costs are high.
Since there are too many to perform simultaneously, systems are out of synch.
It’s difficult to track version levels and know which systems have which updates.
Solution:
Use OnCourse to execute commands on each remote server that determine version levels and send that data back to the central node.
Send the correct version levels required.
Execute the software update on schedule.
Update the central database.
Benefits:
Significantly reduced labor costs—many times you can essentially eliminate it, leading to as much as 75% or greater savings or people time.
Greater manageability since updates are no longer huge efforts
Predictability and consistency, since all systems are on the same revision or update level
Strong security is an integral component of OnCourse. Security functions are natively built into the OnCourse code, unlike other software packages that require “bolt-on” or third-party security software. This integration makes administration and integrity much simpler and more effective.
The OnCourse security architecture makes sure that data is directed to the correct hosts, with the correct permissions. OnCourse ensures data integrity through digital signatures and offers data confidentiality choices of four levels of in-stream encryption. Not only is the delivery of the file data guaranteed with OnCourse, but OnCourse can prove that files have been delivered to a particular server at a particular time with certified delivery.
This strong security capability saves money for companies by allowing them to use inexpensive Internet network connections to transmit sensitive data instead of expensive private networks, both internally and to partners and customers.
Here are highlights of some of the unique functionality found in OnCourse.