7 Deadly Sins of Data Protection Rick Glynn Data Protection Sales Agenda • 7 Seven Deadly Sins of Data Protection • Tips for Avoiding the 7 Sins • Backup & Recovery Methods You Can Use • How Dell Can Help Data Protection “Whatever can go wrong, will go wrong.” Data Protection Deadly Sin #1: Focus on backup, not recovery Data Protection Instead, shift the focus onto recovery Recovery is all that matters. 1 in 5 recovery jobs fail to meet their recovery SLAs1 Know for sure that your backup file is completely recoverable. Use automated recovery verification technology. Data Protection Source: ESG “The Modernization of Data Protection” 2012 Deadly Sin #2: Treat all data equally. Data Protection Instead, classify data and applications Not all data has the same criticality and frequency of change Static Does not change over time Business Vital Mission Critical Is vital to the daily operations of the business If lost or unavailable or unavailable—for even short periods of time— damage will occur Data Protection Deadly Sin #3: Fail to understand your organization’s tolerance for data loss and downtime. Data Protection Instead, solicit feedback from cross-functional groups outside of IT Align recovery objectives to your organization’s business goals • Recovery Time Objective (RTO) – The tolerable amount of time elapsed between a loss or disaster and the restoration of business operations. – It is the time required to physically recover the data or application and have it ready for use • Recovery Point Objective (RPO) – The point in time since the last backup – For example, if you recover a file that was backed up yesterday then your recovery point is one day Data Protection Deadly Sin #4: Believe one approach fits all. Data Protection Instead, think tiered recovery Apply the right approaches to meet your requirements Classifying Your Data/Applications Data Protection Requirements Data Protection Approaches Business Vital Static Mission Critical • • RTO < 72 Hours RPO < 1 Day • • RTO 6-24 Hours RPO 2-12 Hours • • RTO < 5 Minutes RPO < 5 Minutes • Strict regulations • Some regulations • Limited regulations • • Back up to tape Archive data • • • • Fast recovery Disk-based backup Backup to tape Bare metal recovery • • • Fastest recovery Disk-based backup Bare metal recovery Data Protection Deadly Sin #5: Only store one copy of your backup data— onsite. Data Protection Instead, establish an offsite DR strategy Will you be able to meet your recovery SLAs in the event of a site disaster? • How will you get your data offsite? – Tape – Replication – Clustering • Where should you send your data? – Cold DR Site – Warm DR Site – Hot DR Site Data Protection Deadly Sin #6: Store too much backup data, for far too long. Data Protection Instead, optimize data retention Reduce costs and boost performance Employ deduplication to reduce backup storage footprint. Save on costs by employing D2D2T, archiving older data to less expensive storage Data Protection Deadly Sin #7: Think you’re done after you test your plan. Data Protection Instead, continually test and update your plan. Test… Test Again… And Test Yet Again Data Protection Recap: Bare Metal Avoid Recovery the 7 deadly (BMR)sins 1. Focus on recovery 2. Classify your data and applications 3. Solicit feedback from cross-functional groups outside of IT 4. Think tiered recovery 5. Establish an offsite DR strategy 6. Optimize data retention 7. Continually test and update your data protection plan Data Protection Backup and recovery methods available Data Protection Traditional backup and recovery The “Tried & True” • Backs up data stored on application, database, and file server data • Schedule backups and create policies – Run full, incremental, and differential backups • Back up to tape or disk • Typically uses server/client architecture Data Protection Continuous data protection (CDP) Ideal for “mission-critical” application data • Continuously captures all changes on the protected server • Eliminates backup windows • Super granular recovery points—restore to practically any point in time • Fast recovery of data • Excellent if you: – Can’t afford prolonged downtime – Can’t afford to lose mission-critical data Data Protection Replication Bare Metal Recovery (BMR) Minimize network traffic using WAN-optimization techniques • Gain redundancy by sending a copy of data from one source to a target • Used for improved reliability, fault-tolerance and/or ensured accessibility • Replication over the WAN ensures disaster recovery • Different from “backup” because replicas are frequently updated and quickly lose any historical state Data Protection Data Bare Metal deduplication Recovery (BMR) Reduce your backup storage footprint by 90-95% • The process of examining a data set or byte stream at the sub-file level and storing and/or sending only unique data. • Duplicate data segments are replaced with a pointer to the first occurrence of the data First Full Backup Daily Backup Daily Backup Second Full Backup Data Protection How Dell Can Help Data Protection Dell Backup & Recovery Reduce data loss Generate recovery points every 5 mins Improve recovery times Recover from system failure in 15 min Protect large environments Scale or less to protect data on 100s and 1000s servers DR4100 Protect large volumes of data across a wide range of platforms and applications. Protect continuously, move anywhere, recover everything. Back up and restore VMs at same time – without limits. Optimize storage and replication Data Protection Protected by Dell Increasingly customers turn to Dell for help with their data protection needs 82,000 Customers globally from small business to Fortune 500 Trusted by 30 of the worlds top 40 banks 3,000 new customers added each quarter 60% of NetVault customers spend 2hr or less monitoring backup per week #6 in market share after just 18 months protected 400PB Data by one of the Top 3 internet search providers Data Protection The Dell Data Protection Portfolio Everything. Every time. On time. DL4000 & DL1000 Backup appliance powered by AppAssure Backup and DR Suite NetVault Complex Protect large volumes of data across a wide range of platforms and applications. Virtual AppAssure Protect continuously. Move anywhere. Restore in little as seconds. vRanger Backup & restore. VMs at same time – without limits. @ ! Mission Critical DR4100, DR6000 & DR2000v appliance Deduplication & Compression Data Protection