Showing posts with label Protection. Show all posts
Showing posts with label Protection. Show all posts

Wednesday, November 24, 2010

A look inside continuous data protection software

Error in deserializing body of reply message for operation 'Translate'. The maximum string content length quota (8192) has been exceeded while reading XML data. This quota may be increased by changing the MaxStringContentLength property on the XmlDictionaryReaderQuotas object used when creating the XML reader. Line 2, position 8054.
Error in deserializing body of reply message for operation 'Translate'. The maximum string content length quota (8192) has been exceeded while reading XML data. This quota may be increased by changing the MaxStringContentLength property on the XmlDictionaryReaderQuotas object used when creating the XML reader. Line 1, position 8889.
By W. Curtis Preston

The Storage Networking Industry Association (SNIA) defines continuous data protection (CDP) "as a methodology that continuously captures or tracks data modifications and stores changes independent of the primary data, enabling recovery points from any point in the past … data changes are continuously captured … stored in a separate location … [and RPOs] are arbitrary and need not be defined in advance of the actual recovery."

Please note that you don't see the word "snapshot" above. While it's true that much of today's continuous data protection software allows users to create known recovery points in advance, they're not required. To be considered continuous data protection, a system must be able to recover to any point in time, not just to when snapshots are taken.

CDP systems start with a data tap or write splitter. Writes destined for primary storage are "tapped" or "split" into two paths; each write is sent to its original destination and also to the continuous data protection system. The data tap may be an agent in the protected host or it can reside somewhere in the storage network. Running as an agent in a host, the data tap has little to no impact on the host system because all the "heavy lifting" is done elsewhere. Continuous data protection products that insert their data taps in the storage network can use storage systems designed for this purpose, such as Brocade Communications Systems Inc.'s Storage Application Services API, Cisco Systems' MDS line and its SANTap Service feature or EMC Corp. Clarion's built-in splitter functionality. Some CDP systems offer a choice of where their data tap is placed.

Users then need to define a consistency group of volumes and hosts that have to be recovered to the same point in time. Some continuous data protection systems allow the creation of a "group of groups" that contains multiple consistency groups, creating multiple levels of granularity without sacrifice. Users may also choose to perform application-level snapshots on the protected hosts, such as placing Oracle in backup mode or performing Volume Shadow Copy Service (VSS) snapshots on Windows. (Remember, snapshots aren't required.) Some CDP systems simply record these application-level snapshots when they happen, while others provide assistance to perform them. It's very helpful when the continuous data protection system maintains a centralized record of application-level snapshots, as they can be very useful.

Each write is transferred to the first recovery device, which is typically another appliance and storage array somewhere else within the data center. This proximity to the data being protected allows the writes to be either synchronously replicated or asynchronously replicated with a very short lag time. Even if a continuous data protection system supports synchronous replication, most users opt for asynchronous replication to avoid any performance impact on the production system. A CDP system may support an adaptive replication mode where it replicates synchronously when possible, but defaults to asynchronous during periods of high activity.

The data is stored in two places: the recovery volume and the recovery journal. The recovery volume is the replicated copy of the volume being protected and will be used in place of the protected volume during a recovery. The recovery journal stores the log of all writes in the order they were performed on the protected volume; it's used to roll the recovery volume forward or backward in time during a recovery. It may also be used as a high-speed buffer where all writes are stored before they're applied to the recovery volume. This design allows the recovery volume to be on less-expensive storage as long as the recovery journal uses storage that is as fast as or faster than the protected volume.

Once data has been copied to the first recovery device it can then be replicated off-site. Due to the behavior of WAN links, the CDP system needs to deal with variances in the available bandwidth. So it has to be able to "get behind" and "catch up" when these conditions change. With some systems you can define an acceptable lag time (from a few seconds to an hour or more), which translates into the RPO of the replicated system. The CDP system sends all of the writes that happened as one large batch. If an individual block was modified several times during the time period, you can specify that only the last change is sent in a process known as "write folding." This obviously means that the disaster recovery copy won't have the same level of recovery granularity as the on-site recovery system, but it may also mean the difference between a system that works and one that doesn't.

Modern continuous data protection systems also offers a built-in, long-term storage alternative. You can pick a short time range (e.g., from 12:00:00 pm to 12:00:30 pm every day) and tell the CDP system to keep only the blocks it needs to maintain only those recovery points, and to delete the blocks that were changed in between. Users who take application-level snapshots typically coordinate them to coincide with their recovery points for consistency purposes. This deletion of extraneous changes allows the CDP system to retain data for much longer periods of time. For longer retention periods, it's also possible to back up one of these recovery points to tape and then expire it from disk. Many companies use all three approaches: retention of every change for a few days, hourly recovery points for a week or so, then daily recovery points after that, followed by tape copies after 90 days or so.

Continuous data protection and recoveries

The true wonder of continuous data protection is how it handles a recovery. A CDP system can instantaneously present a LUN to whatever application needs to use it for recovery or testing, rolled forward or backward to whatever point in time desired. (As noted, many users choose to roll the recovery volume back to a point in time when they created an application consistent image. Although this means they'll lose any changes between that point in time and the current time, many prefer rolling back to a known consistent image rather than going through the crash recovery process.)

Depending on the product, the recovery LUN may be the actual recovery volume (rolled forward or backward), a virtual volume designed mainly for testing a restore, or something in the middle where the recovery volume is presented to the application as if it has already been rolled forward or backward, when in reality the actual rolling forward or backward is happening in the background. Some systems can simultaneously present multiple points in time from the same recovery volume.

Once the original production system has been repaired, the recovery process is reversed. The recovery volume is used to rebuild the original production volume by replicating the data back to its original location. (If the system was merely down and didn't need to be replaced, it's usually possible just to update it to the current point in time by sending over only the changes that have happened since the outage.) With the original volume brought up to date, the application can be moved back to its original location and the direction of replication reversed.

Compare that description of a typical CDP-based recovery scenario to the recovery process required by a traditional backup system, and you should get a good idea of why continuous data protection is the future of backup and recovery.

EDITOR'S TIP: Click here to read this next part of this guide on near-CDP.

W. Curtis Preston is an executive editor in TechTarget's Storage Media Group and an independent backup expert.

This article was previously published in Storage magazine.


View the original article here

Tuesday, November 9, 2010

Madison Parker Capital invests in the protection of data and virtualization solutions Company Venyu

BOSTON & BATON ROUGE, La 01 November 2010 –(BUSINESS_WIRE) - Madison Parker Capital, an investment firm based in Boston, Massachusetts, today announced its investment in Venyu Solutions Inc. ("Venyu"), one of the leaders of the nation in commercial quality solutions customizable for disaster recovery and availability data protection. Madison Parker Capital in partnership with Gladstone Investment Corporation to sponsor the redemption management Venyu HLOS Inc. shareholders. This investment will enable Venyu to speed up its pursuit of new opportunities and grow its product offerings.

Brent Brown, Managing Partner of Madison Parker Capital, joined the Board of Directors of the Venyu. "Edited by Scott Thompson Venyu has developed a commander and strong leadership position in backup and disaster recovery services market online," said Brown. ""We are pleased to partner with Scott and management together to support the fast-growing team continues to the company."

"Interest and support of Madison Parker Capital validates the strength of our position on the market today and will accelerate our ability to meet the new demands of the industry," said Scott Thompson, CEO of Venyu. "As we continue our protection without fault data of our customers, we also have plans to advance our role as innovators in the industry.»

On Venyu

Venyu is the leading provider of protective services of restoration and availability data adapted to support recovery objectives and levels of service companies need to keep the Venyu progressive concurrentiels.portefeuille includes online data backup solutions of recovery physical and virtual, managed hosting, SaaS and co-location services.Venyu, whose headquarters is in Baton Rouge, Louisiana, with offices in Waltham, Massachusetts is supported by data centers geographically, highly skilled technicians and dressed in railway safety controls.For more information about Venyu, please visit: www.venyu.com.

Madison Parker capital

Madison Parker Capital is exclusively focused on investments in companies of average market inférieures.Madison partnership dedicated Boston-based investment firm Parker works with existing as well as experienced sponsor of minorities and rehabilitations executives management teams of the majority, growth and consolidation in a wide range of industries, including commercial software services, operations health care, industrial manufacturing, media/digital editing and Parker détail.Madison consumer/retail services target business operating income between $ 2 million and $ 10 million with investment sizes ranging from 5 million to 30 million dollars.Madison Parker is located in Boston, Massachusetts, and more information is available at www.madisonparkercapital.com.

Contact
HB |Hart-Boillot
Brandished Gerrish, 781-893-0053
venyu[@]hartboillot.com


View the original article here

Sunday, November 7, 2010

Protection of the environment - example IT security checklist

Bookmark and ShareProtection of the environment is not a task that is defined for the lifetime of the environment but it is an ongoing process of adaptation, (update items) during routine inspections.  Whether you need a senior executive or security officer in a large organization or an IT Manager in a small business you a checklist of security which is dynamic.  While that uses such a checklist you, say to check that all parts of the environment be treated, would the same checklist that certain areas have become obsolete while others need more hardship. Check these reviews with the IT staff responsible would to new areas that may be missing from the list, also rotate. A high-level security checklist as she should deal one security controls implementation details below with, but it can be expanded or linked to other documents. It is a sample checklist that can be used as a starting point!

Physical security:

1. Access to the server room
2. Access procedures and guidelines
3. Redundant and memory hardware - ex: RAID, backup drives, etc..
4. Disable unused network points
5. CCTV control / theft and fire systems
6. Mobile workers guidelines for handhelds/laptops - ex: terms of use
7. Inventory of all hardware
8...

Network security:

1. Network switches configuration - ex: Replace default settings
2. Monitoring of network traffic - ex: performance problems due to malicious scan tool
3. Monitor Internet traffic (company policy!)
4. Allows protocols - ex: SNMP, community strings settings and permissions
5. DMZ Setup - ex: server in the DMZ should save not internal IP addresses
6. Firewall configuration - ex: allowed/blocked ports, secure VPN access, etc.
7. IDS or IPS configuration if implemented
8...

Wireless network:

1. WAP configuration - ex: Replace default settings such as SSID name
2. Shared key management - ex: centralized, process rules, complexity
3. Additional security - ex: disable SSID broadcast, use HTTPS, Mac filtering, etc.
4...

Application server:

1. Mail server configuration - ex: open relay!, antivirus solution, etc..
2. Web server configuration - ex: disable unused services/accounts, etc..
3. Database server configuration - ex: DB admin account, logs, etc..
(4) DNS server configuration - ex: zone transfer, cache settings, etc.
5. File server - ex: ACL, file shares, antivirus, etc.
6. AD configuration - ex: group security policies, ACL, etc.
7. Update mechanism - ex: systems and applications, updates, notifications, etc.
8. Protocols - ex: protocols are enabled, collect and review protocols
9. Remote admin-ex: Secure SSH, RDP, etc.
10. Admin scripts - ex: passwords in plain text!
11. Monitoring mechanism - ex: notified if services down
12...

Client workstations:

1. Software updates distribution – ex: car vs manual updates, central distribution
2. Anti-virus solution - ex: can not be disabled automatic updates, etc.
3. Computer policies - ex: disable idle workstations installation permissions, etc..
4. Hardware usage guidelines - ex: unused ports, media usage, etc. to lock.
5. Software inventory - ex: applications installed with version numbers
6. User access permissions - ex: DIS / allow administrator privileges!
7. Password policy - ex: strong, but not too complicated
8...

Others:

1. Staff training - ex: ethics, security awareness, etc.
2. Staff training - ex: training program
3. Data non - disclosure Agreement-
4. Social media use policy - ex: Facebook, personal blogs, etc.
5. Other policy.

The above checklist is not complete, but should you a Vorsprung.Daher be any additions you important begrüßt.Sie can keep you may submit as comments.


View the original article here

Friday, November 5, 2010

Continuous data protection backup products get new lease on life

By Curtis Preston w.

(CDP) continuous data protection technology is the future of data backup and recovery, even if the first continuous data protection products was not living up to the hype when they appeared a few années.Dans this backup protection guide continuous data, learn how continuous data, protection has changed over the years, discover popular CDP products, take a look to the CDP software and learn more about the differences between real-CDP and close to the CDP.

Many people considered continuous protection of data such as Star Trek industry backup - a good idea before his trek, may not be fully understood when it was first released, temps.Star was cancelled after three seasons. Similarly, many people think of protection continuous data is a solution to a problem, and most stores could meet backup and restore without having to completely change the way in which they have made backups, which was necessary for the protection continuous data.

There are now several products of continuous protection of data which are very well, so what has changed? change the most important is no doubt that most of today's CDP products is offered by traditional providers of backup. In fact, almost every major software company backup now has an offering of CDP. Users do not have to accept a new paradigm, and a new provider backup for CDP functionality.

The reason big next the resurgence of the CDP products have come a long way since appear them on the market. For example, you no longer choose between a copy on-site and off-site. You can do with a single product. "CDP product sampler" table below looks at some popular CDP products.

Systems CDP success today also know many more data than they save you. They offer points of integration with many popular applications such as Microsoft Exchange, Oracle, and SQL Server. Whereas a true CDP product did not need to create snapshots and can recover to any point in time, this integration allows the application or the backup system administrator can create points in time where a known good copy of the data resides.Administrators can choose to not use these good recovery points known as a retrieval operation, but they have peace of mind knowing they are there.

And, like Star Trek, it might be time for CDP: The Next Generation. Some servers have been greatly throughout recent years, and recovery time objectives (RTO) and recovery (RPO) for these large servers point objectives have become more strictes.Envisager TB 300 base is mission critical for a company with potentially millions of people for their 24/7 service.Database backup system must provide instant recovery without loss of records;This is possible with the COP.

Also determine picture is data loss notification laws promulgated by 35 States and the European Union, requiring companies to add encryption systems to enable them to carry safely privacy on backup tapes.However, encryption systems, can cause slow backups and chiffrement.Avec CDP key management, a company can have on-site and off-site copies of their data without ever touching a strip, thus avoiding an encryption completely.

Server Virtualization has taken off in recent years, and the technology could benefit from continuous protection of données.alors perhaps you not the individual servers with stores data in two-digit terabyte range, it is possible the storage used by VMware, Microsoft Hyper-V or Citrix XenServer Systems is indeed this big.Think about what would happen if a 15 TB storage array containing virtual machine (VM) images suddenly disappear – it could take tens or hundreds of machines that with the fact that the backup and recovery of these VMs to traditional methods is one of the most difficult tasks, an architect from backup system must take physical compte.La virtuelles.Couple is your ennemi.20 VMs on a single physical machine perform as a physical during backup machine.

But if physics is your enemy, CDP is your best ami.Un good product COP puts more load on your virtual machine with a typical virus protection package and it is able to find one or all of your virtual machines instantly without any loss in données.Virtualisation servers only could announce the return of continuous data protection.

Editorial Board:Click here to read the next section of this guide about continuous data protection software.

W. Curtis Preston was an editor-in-Chief in TechTarget storage media group and independent backup expertise.

This article was previously published in Storage magazine.


View the original article here

Tuesday, April 27, 2010

Software CDP backup NYI Implements R1Soft high performance for critical customer data protection

rel "http://www.backupreview.info/2010/04/21/nyi-implements-r1soft%e2%80%99s-high-performance-cdp-backup-software-to-protect-clients%e2%80%99-mission-critical-data/"

View the Original article

Sunday, April 18, 2010

Microsoft Data Protection Manager 2007 common message errors and how to resolve


Although 2007 Microsoft Data Protection Manager (DPM 2007) is largely a solid enterprise-class data backup application there are two error messages that can be the bane of existence of each data backup storage data administrator. These errors are not usually catastrophic, they can be very frustrating. In this article, I would like to share some techniques I've found to deal with them.

Replica is inconsistent error

The first error I want to talk about is the famous "replica is not compatible" error, shown in Figure A below (click on image for full size).A replica is inconsistent error occurs when the blocks that have been backed up do not match the current state of the protected resource.

This error message means that, for any reason any replica stored on protected DPM 2007 has decreased with all protégée.Bien that you can still restore restore created previously, the set of data points data synchronization server does will be missed again until you correct the error.

The figure has replicated is inconsistent error



View the Original article