Building Practical Data Protection Strategies

Embed Size (px)

Citation preview

  • 8/3/2019 Building Practical Data Protection Strategies

    1/17

    Building PracticalData Protection Strategies

    Fred Moore, Horison Inormation Strategies

    August 2006

    w w w . d a t a d o m a i n . c o m - 2 0 0 6

    WHITE PAPER

  • 8/3/2019 Building Practical Data Protection Strategies

    2/17

    2D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5

    D A T A D O M A I N I C o n t e n t s

    The Origin O backup and recOvery 3

    TradiTiOnal daTa prOTecTiOn OpTiOns 4

    nexT generaTiOn daTa prOTecTiOn 8

    BACKUP/RECOVERY STRATEGY COMPARISON 10

    daTa reducTiOn becOMing The key 11

    deduplicaTiOn redeines The Wan MarkeT 12

    DEDUPLICATION CHECKLIST 11

    daTa dOMain: enTerprise sTOrage prOTecTiOn 14

    cOnclusiOn 15

    abOuT The auThOr 16

    abOuT daTa dOMain 16

    Building Practical Data Protection Strategies - August 2006

  • 8/3/2019 Building Practical Data Protection Strategies

    3/17

    D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5

    tto T to/tto o o

    to t t o mot ot to t ot o o

    t o o T o o o t o-

    tto to ott omto tt ot

    o t toot t m

    dt o t otto t

    t, o t otto ot mo

    to mmt sotw o, m o, t

    t, t m o ow ,

    m, tt to

    wom, -w t totto to om t mmt o

    imo t otto t

    o o

    t om

    ott

    mo

    t MTb o

    w

    to

    mmt

    t o o

    mot

    tt to

    t

    mo

    o

    owtm

    The Origin o Backup and

    Recovery

    i 1952, t wo t t w

    , t ibM 726 wt 12,500 t o -

    t i 1956 t wo t w

    , t rm 350 wt 5 mt o -

    t To o o w t t t tm, two

    t t to t jt o; 1)

    t t to w t wt o

    of t to 2) t t tommt to w o, m

    o b o w to om

    t m to mmt to o

    t t 50 ott t m

    mott W t tto t

    otto to t m o t-

    t t ow qmt o

    tto o o t 21t t?

    T w to t qto wt t t -

    to o oto tt ow

    t momtm

    dt otto

    q -

    om t mot

    t

    o iT tt

    to T

    o -

    mt t

    t o

    t t:

    1) t to

    2) t

    3) t

    4) t to/

    D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e

    Will these traditional data protection

    applications survive the demands for

    ultra-high availability and the growing

    requirements for nearly instantaneous

    recovery in the 21st century?

    TERMS USED TO CLASSIFY THE IMPACT OF DIFFERENT LEVELS OF DATA PROTECTION

    RPO (Recovery Point Objective) This is the desired amount of time between dataprotection events.

    RTO (Recovery Time Objective) This is the time required to recover from a data lossevent and return to service. In other words, this requires classifying data or an

    application by its criticality or value to the business and determining how long thebusiness can survive without having this data available. There is immense pressureto greatly reduce the amount of time it takes to recover a le or an application.

    DPW (Data Protection or Backup Window) This is the maximum amount of timeavailable for an application to be interrupted or out of service while data is copiedto another physical location for backup purposes. This time out component isseeing many new developments to reduce the amount of time needed for thetraditional backup window.

    Building Practical Data Protection Strategies - August 2006

  • 8/3/2019 Building Practical Data Protection Strategies

    4/17

    4D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5

    Traditional Data Protection

    OptionsT mt t otto oto tt

    tto o t tm o rpO rTO tm

    m T to t oow

    to: b, d Mo, sot o,

    cdp, vTl

    Backups om o t

    wow a t tmt

    o o t t 20 to tt

    to, t t,

    tt o t wow o tt

    o o t t m Wtot t

    t ot otw o tmt

    t t o t o o o o, m

    omom t o t

    tt t o tto t

    w tt t t to

    O t , o o o to

    t tm tt to of T

    ot to o tto, ow

    Building Practical Data Protection Strategies - August 2006

    D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e

    Sotware (bugs and corruption)*

    Hardware*

    Disk

    Tape

    Server

    Network*

    Natural disasters, power, ood, fre

    Thet

    Intrusion/security

    Other

    The Causes o Downtime and Data Loss

    18%

    38%

    23%

    7%

    2%

    8%

    4%

    Snapshots, transaction logs

    RAID 1-6, backups

    Backups

    Clusters, ailover architecture

    Redundancy

    O-site acilities

    Encryption

    Firewalls, authentication, anti-virus,

    iltering

    Type o Disruption % o Failures Solutions

    * Includes operational failures** Unplanned downtime (unpredictable)

    Source: Estimates by Horison Information Strategies

  • 8/3/2019 Building Practical Data Protection Strategies

    5/17

    5D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5

    D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e

    tt o t to otoo

    tom omt t wt w o b t mtt

    o, mmz omt o t

    oto, o o to

    o w o om

    o t m o w tom o

    ot w t otto too

    Full backup/restore to t t t

    mot ommo t otto mto T

    o o 100% o t t, omt

    o om, om m to t t o

    o The backed-up copy is not

    executable and must be

    restored to become accessible

    by an application. i mot ,

    tto to

    om o t

    to to mt o

    to o t to o t o T t ojt o to, t o

    t to t tom mt wt o m-

    o t o t to,

    mot o tm t wt o o o-

    oto to omt om ot

    o om to t

    mot tm om o t t otto

    tq m t to y

    o ow tt m o t t

    t m t tt w

    o b mot

    o t t t mot o

    t o t t ow

    to ot to

    t o o o t

    otto tt

    b o t tm-om t o t

    o o, tto /o mo to t tq

    Tradeoffs existw oo om t oto to

    t tt t o

    w

    o incremental backups, o t t tt

    t t o mot t

    mt s o

    t, o o o

    t mmtto, , t mto

    mmz t mot o t

    t mot o tm

    o t

    wow how

    to t o

    mt w

    om to to

    q to t

    to t t ow tt T om om tm-om o

    Ot w om w

    w mt om

    imt mmz t mot o

    tm t m o mo t

    o differential backup, t m t

    tt w o t o t

    w o

    o t t t Tt w

    t t ow z

    tw T m tt

    om to

    t o, t t to o m

    ot om to o mt

    a to o q t t

    t t t o to

    Backing up large amounts of unchanged

    data creates a signicant amount of

    unnecessarily duplicated or redundant

    data.

    Building Practical Data Protection Strategies - August 2006

  • 8/3/2019 Building Practical Data Protection Strategies

    6/17

    6D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5

    D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e

    Building Practical Data Protection Strategies - August 2006

    omt dt t o t

    mt t t o tm t

    imt mmz t tm

    t mmz t to

    tm t to m o o

    o t ot T to ot o

    tm om o to mtto

    Mot wt to t

    mot o and t o

    tm, ot jt o o t ot bot mt

    t to

    otw Mt to

    m q mmtto

    omt

    Disk mirroring to t t

    mmt o-o-o o ,

    o t, o om t

    o o mot o

    o O t mot mt t

    o t o t

    mt, qt

    wt oto to

    two (o mo)

    t t o

    t o i t t

    o o o o t

    o, mo o tt

    to t o o ow t to to

    ot wtot owtm Mo ot t

    o t mot o to q

    t qto oo oto

    sto mtto o mt oo

    to mmt t oo o oo

    mo tradeoffs existfor each case

    soo mo qt

    mm ot t omt t t t o t to i

    oo mo, ot t o t

    tt mt ow t wt

    omt o t t wt o T

    to om t t

    mo mt oz t (t) mo

    m o ot

    o oo mo, t o tt

    o ot to oz t wt

    t ow t o qt wt

    to o t To, oo

    mo t t oo mo

    t t o o t ot-o-

    wt t m o aoo mo

    omtm t w- mt to

    t t to oto o m w

    T om ot

    t mot o t m -

    wt

    i t, t o

    t mt

    mo t o mt

    o ot-o-

    wt t m o T

    om t

    o o t mo t o wt-t

    to

    Mo o m mo t

    to t t tt w to t

    om tm w o t

    o oto o w o o

    tomt wt to mo o Note

    that mirroring does not help ott t t

    For best practices, mirroring should always

    be accompanied by other data protection

    schemes that can permit a recovery or

    restore to occur from clean data that existed

    before the corruption occurred. Disk

    mirroring is dened and commonly referred

    to as RAID 1.

  • 8/3/2019 Building Practical Data Protection Strategies

    7/17

    D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5

    D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e

    Building Practical Data Protection Strategies - August 2006

    oto om , wom, ,

    to, m o otw o t ttwo o mo o o ot t o t

    t, mo o w om

    ot t otto m tt mt

    o o to to

    o om t tt

    t o t oto

    o d mo

    ommo

    to raid 1

    g t m to

    mtto t tto t otto

    mto, ot tq

    momtm to om o t tto

    to

    Snapshot copy t ott ot--tm

    w o t sot too

    om t o t to o t o mmtto, t ot ot

    t q W ot o

    wt oto o, t (wt)

    t o tto o o

    to o ot tt

    h t o o t t o o

    t w o() ot o

    to mt zz t m tt o

    o-t sto mtto mt

    m t m o ot

    sot o t otto om to

    t oto t ot om tt

    ot t o o o t a, tradeoffs

    exist T o ot o tt t ot

    to t t ot o jt o t

    oto t omt t

    m o ot ow Mt to

    otw t mmtto omt t

    o ot

    CDP (Continuous Data Protection) t

    o w wt t oto

    oto wtt

    to tt m

    o m ot t m

    t m i

    sot co o

    t m, t cdp

    mo u mo

    ow, t o

    o qt to o wt t wt

    tmtm a wt oto q to t

    o o t jo Jo

    t t oto to o 2-4

    o t o o mmm oo o t

    o to to o Jo oo

    o ott om to t oto

    to to o tm to ot

    o t oto o s jo

    to jo wt o o t mo t

    t Tradeoffs exist.cdp t m

    ot o o ot tto

    o o otto t t o t

    t o cdp t to om q

    o o t oto o om

    tt m mot o t Mt

    to otw t mmtto

    omt t o cdp m to oot ot cdp

    VTL (Virtual Tape Library) oto ot

    o 25 om t o t

    o t t mmtto o t /

    o mt vt t ot o mm

    omt w o oz 1997

    Given the many tradeoffs and limitations in

    these traditional data protection methods,

    several other techniques are gaining

    momentum to reduce some of the traditional

    tradeoffs.

  • 8/3/2019 Building Practical Data Protection Strategies

    8/17

    D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5

    D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e

    Building Practical Data Protection Strategies - August 2006

    ibM stoT t t tzto o

    t t w to ow T qt

    t o t t

    mmtto w

    omt vTl

    ow om o

    o-mm omt

    tm m

    t

    a virtual tape libraryot o tt

    t tt to t t ot t t

    Two o vTl :

    tt to a integrated virtual

    tape libraryom ot- to

    tomt t w to o

    ot t oto t t T

    to o o mo t

    t o t -t ow-ot t

    T m t to t ot

    tm mt t t t

    , to tz t

    m t oo omt ot t t

    vt t tm to mt t t

    om o t t,

    ommo t tzto

    to 80 t o mo T om

    mott t t t p-t o

    z, t tz, q-o-

    tt tm w t t mo t

    to om t t tomt

    i t , t hsM (h sto

    Mmt)- o tot

    oto o t ot o to , t

    oto -to t momt tw

    t to t t t

    t tw ot t 2

    t 3 to

    T mjo t o

    t t

    om ( t

    qt om t ),

    t t-t tzto,

    m o mmt mo

    t t t i/O tt, t om t

    to t m o t

    m a, tradeoffs exist T mo

    mmtto oo t otm vTl o

    o tm om

    Next Generation Data ProtectionSolutions Arrive as

    Deduplication Takes Ob oto mt ot to

    o t M momt

    m ot w otw

    to mo om how, t oto

    t wt t ow

    mot o t tt to

    ott

    a w tq deduplication q

    tt t ow -to-

    mt o t momt

    o tto t otto mto

    dto t t oom

    o to, mt ot

    o tm m W a

    oto t dto o m

    VTLs are now becoming available for non-

    mainframe computer systems primarily being

    used as a fast disk cache.

  • 8/3/2019 Building Practical Data Protection Strategies

    9/17

    D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5

    D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e

    t m o omo,

    ommot to, t otmzto,

    t to t tt dto

    o - t t o

    t t omt

    nt to t otto oto -

    t om t o t

    to t

    i- to t mot o

    to t q t o to q

    o o t com to wtt omo m t t

    mo om rt t om

    o t omt t t

    to o t i m ,

    mt to t 1% o t o

    z o t To t t t

    o t t t to

    to t t mot o tm

    t t o o Tradeoffs exist. dt

    to omtto t

    om om to

    o t z o t to oo To o t ,

    om om mmt to

    tt - Mt

    m q t z o t to

    oo not, t

    o to mooo m to

    t t o t to

    t mo rTO o

    t otw t to mot

    o omo o tto t to

    t otto oto, t b/ro

    stt como t o t t

    Deduplication can signicantly change theeconomics of storage, dramatically reducing

    both backup recovery times and making Wide

    Area backup a operational reality.

    Building Practical Data Protection Strategies - August 2006

  • 8/3/2019 Building Practical Data Protection Strategies

    10/17

    0D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5

    D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e

    Full backup

    Incrementalbackup

    Dierentialbackup

    Mirror

    Snapshot

    Continuous(CDP)

    VTL (Virtual TapeLibrary)

    Deduplication

    Backup/Recovery Strategy Comparison

    Straightorward process,maximum storageconsumption, can be usedon all applications

    Reduces backup window,all incremental copiesused in recovery makingrecovery longer thandierential

    Reduces recovery time,only last dierential copy

    used in recovery makingbackup time longer thanincremental

    Doubles disk costs,protects rom disk ailures,does not protect againstintrusion or corruption

    Very ast, does not protectagainst disk ailures,does not protect againstintrusion or corruption,can take time to determine

    the recovery point

    Is oten applicationspecifc, can take time todetermine the recoverypoint, ast recovery,protects against intrusionand corruptionMature or mainrames,gaining momentum inopen systems

    Very ast backup andrecovery, greatly reducesdisk storage requirementsand expense over allother methods, computeintensive requiringappliance

    All datasupported

    Applicationspecifc, notsupported byall applications

    Applicationspecifc, not

    supported byall applications

    All data typessupported

    Applicationspecifc, notsupported byall applications

    Applicationspecifc, notsupported byall applications

    All data typessupported

    Applicationand backupsotwareneutral, avoidonly non-repeating datatypes

    Yes

    Yes

    Yes

    No, one-or-onecopy

    No

    No

    Limited to tapecompressioncapabilities,signifcantly

    reducesperormance

    Yes, providesurther datareduction viaeliminating

    redundant data

    Tape

    Disk, tape

    Disk, tape

    Disk only

    Disk only

    Disk only

    Low-cost diskwith optional

    automated tapelibrary

    Disk only

    Restore

    Restore

    Restore

    Failover

    Restore

    Restore

    Restore

    Rapid Restore

    Backup Scheme TradeosData Types

    Supported

    Data Compressed

    on Backup

    Standard

    Storage Device

    Failover or Restore

    Architecture

    Building Practical Data Protection Strategies - August 2006

  • 8/3/2019 Building Practical Data Protection Strategies

    11/17

    D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5

    D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e

    Data Reduction is Becoming the Key

    r t o o t t

    to qmt T ow to

    ot w

    ,

    ow, oo

    foo , ot

    /o

    tm

    Wan- t

    o

    t

    t to t

    dto wo

    t w t

    o

    t t to

    Mot t o ot t

    to t om

    to

    i- to

    mt t om

    t tm, q

    t t t

    mt, t

    om tm to

    mt o

    to i om

    t mt

    t o wt

    to,

    t mt ot

    to t

    ot t o

    t i t mt m to q, t t

    t om wt oto otm

    o 2:1 z to, to to

    t o to to

    T o to to om to

    o t t o rt

    t om

    o t

    omt ow t

    oow tm o

    t to t

    O tm o

    o o

    mt w

    , 20 to o

    mo o

    to

    ot -

    too t to

    mt t (t) o to

    tm b o t o t

    o , t

    o m, 20

    t o om

    wt

    t t

    tm

    w, t

    mot o

    t t to

    T ot tm

    o to w

    ot tto ot ot o tm

    o o i

    t o t

    t t o

    to tm?

    dto otm to t

    o dto otm

    z t t t ot o o t

    Traditional Storage Capacity Optimized

    Data

    Stored

    1 5 10 15 20

    0

    Weeks In Use

    Data Volume

    Reduction

    Source: Data Domain, Aug 2006

    Data Reduction Rates

    3-4xFirst full backup

    6-7xFile-level incrementals

    50-60xSubsequent full backups

    20x

    Aggregate weekly fulls,daily incrementals

    Compression Effect

    Building Practical Data Protection Strategies - August 2006

    B JA B C D A E F G A B H A E I C D E F G H

    A B C D E F G H I J

    1ST FULL BACKUP

    Deduplication: Under the Hood

    Redundancies pooled, compressed

    2ND FULL BACKUPINCR 1 INCR 2

    Source: Data Domain, Aug 2006

    DATASTREAM

    Unique variable segments (4KB-12KB) Redundant Data Segments Compressed Un ique Segments

  • 8/3/2019 Building Practical Data Protection Strategies

    12/17

  • 8/3/2019 Building Practical Data Protection Strategies

    13/17

    D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5

    Compatibility with your existingbackup applications

    Appliance or sotware based solution

    Sizing perormance requirements

    Scalability or perormance andcapacity

    Pointer security management

    Supports remote replication or disasterrecovery

    Pricing ft to budget

    Vendor readiness and positioning

    Environmental savings

    Deduplication Checklist

    What changes, i any, are required to your existing backupprocesses? Assess diiculty o the implementation. Areyou prepared? Certiy the backup vendor works with thededuplication solution.

    Sotware-only solutions allow enterprises to re-use existingor older disk systems, appliances normally include diskstorage and simpliy installation.

    Signiicant reductions in storage may require severaliterations. Determine time needed to achieve the maximumdeduplication eect. What is the net expected storagesavings compared to ull, incremental or dierentialbackups?

    Assess instrumentation is provided to measure perormanceand capacity thresholds. Insure additional capacity andprocessing power be added to keep up with data growthor to improve backup and restore speeds. Veriy upgradesnon-disruptive.

    Insure the pointers to the unique data segments areprotected rom hardware, sotware and intrusion threats.Losing these pointers means that the backups can no longerbe retrieved.

    Data reduction not only reduces the amount o storagerequired locally but also reduces the amount o networktraic during replication, which can result in signiicantbandwidth savings or remote backup and recovery.

    Do you pay or storage capacity, by number o installedsolutions, or another scheme? What are the warrantyperiod and maintenance pricing considerations? Remembernot to conuse the initial acquisition costs (Capex) and the

    ongoing operational expenses (Opex) when evaluating adeduplication solution.

    Check out vendor reerence installations. Veriy thevendors roadmap will address your uture data protectionrequirements.

    Determine power, ootprint and acilities savings or use incost-justiication process

    D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e

    p o to m t mmtto o T t ow

    t om oto to m t t

    Building Practical Data Protection Strategies - August 2006

  • 8/3/2019 Building Practical Data Protection Strategies

    14/17

    4D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5

    D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e

    Building Practical Data Protection Strategies - August 2006

    Data Domain:

    Enterprise Storage Protectiondt dom o q o-t

    o to to roz t

    ow mt o ot t o W

    a o om, dt dom

    om t tt ow o o t

    to t otto oto dt dom

    mmt to -

    t t to

    o - T to m -

    to oom o

    o

    T qmt to t to t

    o oto om

    mo t t m t q o

    t t dto t

    t too tt to

    oom t t o Wan om t mot t t o

    T t o om o o o o

    t o o to tq :

    T t t to t mott

    t mt o dt dom to

    tt

    sm tto to t t

    tt t o w t

    otto oto ozto tt

    to mt wt t t otto tt

    a dt dom et potto sto

    tm mt t qmt wo wtot

    to t otw oto

    o b wo wt t

    otw dt dom o

    to oot mt ot to o

    /o tt

    o mm o dt dom ot t

    tom t, t, Data Domain Highlights

    o 15

    Full Backup

    Incremental/dierential

    Mirroring

    Snapshot, CDP

    Deduplication

    Typical Data Reduction Rates

    100%, all data backed up each time

    5% or fles, 100% or databases

    5%, changes absorbed into each mirror

    5%, only changes stored

    < 1%, eliminates redundant data and

    compresses original occurrence

  • 8/3/2019 Building Practical Data Protection Strategies

    15/17

    5D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5

    Reduces storage and bandwidthcosts with Data Domain 20x GlobalCompression technique

    Full support or all backup sotwarepackages

    Ease o operations

    Continuous data verifcation

    Reduces the amount o diskneeded or backup data, providesconcurrency

    Eliminates redundant data neededor backup and recovery

    Data Domain Highlights

    Makes WAN network vaulting aordable. GlobalCompression reduces data sent to remote locationwhile protecting data over any bandwidth anddistance.

    Data Domain requires no changes to existingbackup sotware providing ease o installation andongoing operations. Using a transparent approachconsolidates existing backup sotware processes.

    Administrators can spend time on other importanttasks.

    Ensures data can always be recovered. I anerror occurs during transer, Replication sotwarerecovers automatically and restarts data transer.

    Storage expenses are reduced. Both the originatorand replicated data remain ully accessible whiletransers are in progress without impact toavailability.

    Improves recovery times or local and remoteoperations.

    Product Features Customer Benefts

    D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e

    Building Practical Data Protection Strategies - August 2006

    Conclusion

    W to t t to o

    o oto T tm

    om o o o t

    t om oot t mot o tm

    t t tto wow t

    dt otto om t mot

    t iT to

    o t mt o to om t t

    how t mt o, t

    to t, o o oom o o

    t o t t t w om to

    t t to oto

    To iT omt m mo

    om tt o t otto, t

    -t t o

    o mo o t o dt o

    oto mt wt to

    qmt o to t t t

    nw t otto oto dt dom

    to tt q

    mt momtm mo t to

    t w t ot o

    to mot t o ot T

    t mot o

    o wtot t iT to e

    tt t iT tt t to m

    , to, t t, m

    mt, t t t m w m

    mmt t t o t otto

    oto w wot t

  • 8/3/2019 Building Practical Data Protection Strategies

    16/17

    6D a t a D o m a i n D D 4 0 0 E n t e r p r i s e S e r i e s - 2 0 0 5

    D A T A D O M A I N I E n t e r p r i s e P r o t e c t i o n S t o r a g e

    Building Practical Data Protection Strategies - August 2006

    About the Author

    i 1998, Moo o hoo iomto stt, omto tt ot m bo,

    cooo, tt z mt tt, t omt o t iT t

    21- t stoT t t tm o oot t o

    stt p Mt sto eto o Wt Wo poto wtt m

    o oo, t ot o t to t h 1989 t o t dt am aw

    2004 t o t at s so-i-r aw t t ut o Mo w

    o mtmt mt omt to o

    a ot-t iT , motto wt wow, omt t b et pom 1997

    h t o w t o t to two t

    Moo 100 ao a, st 14

    pt bo, cooo 80302

    hoo iomto stt 3034179455 o

    3039399159

    moo@ooom

    wwwooom

    About Data Domain

    dt dom t o o et potto sto tm o two- t o O 450 om wow dt dom w-w oto to ot

    m t t o dt dom go como, t t to too-

    o to omo t tt w t t otto O dt

    dom t om, t t to t t otto o t o

    z a dt dom otto to tm tt m to tom t tt

    omt wt t otw

    cot 2006 dt dom, i a rt r

    dt dom, i omto t to t o t to t T to o t

    o to o T omto jt to wtot ot c o to t omto

    ; t w oot w to o t to dt dom, i m m momt /o

    t ot() /o t om() t to t tm roto o t to wtot o wtt mo

    o

    T omto t to o dt dom, i m o tto o wt o , wt t to t

    omto t to, m m wt o mtt o t o t o

    dt dom go como tm o dt dom, i a ot , ot, m, tm, o t

    m to t t ot o o t t ow

  • 8/3/2019 Building Practical Data Protection Strategies

    17/17

    Building Practical Data Protection Strategies

    2300 ct ew

    st c, ca 95050866-We-ddupe

    @tomom