You are on page 1of 19

Agenda

• What is Business Continuity and Disaster Recovery?


• The case of the Client
• How the Client can implement BCDR
• Discussion
What is BCDR?
• A collection of processes a company uses to help recovery from
disaster and continue with normal operations
• A BCDR plan typically involves both business and IT operations
Components of BCDR
• Business Continuity
• Reduce gaps in an organization’s operations to resume business operations as
soon as possible
• Proactive part of a BCDR plan – focus is preparing for a disaster
• Disaster Recovery
• Recovering and continuing IT systems:
• Data, applications, support systems
• Servers, storage, networking
• Reactive part of a BCDR plan – minimize downtime and data loss
The Client Case
• How can they implement BCDR?
Some background
• Local backup – Veeam B&R
• Offsite Replication – VMware SRM to DR
• Incident occurrences – possibly unauthorized access attempt or
ransomware attack ?
Deployment Options
• Scenario 1 – the ideal solution:
• Best practice design
• Validated solution blocks – a la carte or design to build
• Dedicated secondary site with identical hardware and
software or cloud
• Both software and hardware participate in protection
• Sandboxing, analytics, retention lock, data verification
and recoverability, immutability
• Policy-based management fully implemented in the org
• Data protection and High Availability both available
• Orchestration and Automation
• Scenario 2 – middle of the road:
• Embracing best practice
• Validated solution blocks
• Either software OR hardware handle data
protection
• Secondary site may exist but is not up to same
spec as primary – enough capacity for mission-
critical workloads only
• Little to no policy-based management
• Data Availability vs Data Protection
• Little to no orchestration and automation
• Scenario 3 – basic:
• Solution blocks not necessarily validated for intended
purpose
• Only the software acts to protect data
• No policy-based management
• Data protection only
• No orchestration or automation
Recommendations
• Advisory Services
• Conduct a business impact analysis – implications of outages, data loss on
their operations
• Planning and design
• Use of validated solution blocks – e.g., dedicated backup appliances
• Which tool will deliver max benefit at least TCO

• Implementation
• Which named blocks can the client use?
• How can the client take more advantage of the protection assets in place
(SRM, Veeam B&R)
ExaGrid Technical Benefits with Veeam
• Deduplication of data provides costs effective long-term retention storage
• Iterative backup copies are deduplicated against each other
• ExaGrid also uses global deduplication across appliances in a site further enhancing the storage footprint required

• Immutable Repository which protects customers against deletion of backup data


• ExaGrid repository is non-network facing and immutable by design
• ExaGrid repository provides delete protection through retention time-lock detailed further on in the presentation

• Less infrastructure to manage – ExaGrid does the heavy lifting


• Veeam proxies would only be used for backup and recovery purposes
• Data Mover uses ExaGrid resources for other operations e.g., Synthetic Full
• ExaGrid replicates all backups to secondary site using no Veeam resources

• Security and isolation of backup repository


• ExaGrid repository is only accessible through Veeam Data Mover with secure credentials used to access the
repository on-demand and only when backup or restore operations are in process
High level design – site to site
Veeam Backup Veeam Backup
and Replication and Replication
Server running as Backup and restore Server running as Backup and restore
virtual server virtual server
operations from Veeam operations from Veeam
proxy to ExaGrid Repository proxy to ExaGrid Repository

ExaGrid replication using IPsec for


encryption over wire
ExaGrid repository only
SEC Devices include server for off-site replication
hardware data-at-rest and restore when needed
encryption with no impact to
performance.
High level design – Intrasite
Data Domain Technical Benefits
• End-to-End Verification
• Generate checksum – File Systems, Global Compression, Local Compression,
RAID
• Verify – Re-checksum and compare
• Fault Avoidance and Containment
• Data verified to be correct stays correct – containerized data writes
• Continuous Fault Detection and Healing
• Predictive hardware failure, on-the fly self-healing
• File System Recoverability
• Reconstruct lost or corrupted file system metadata to awaken downed system
Data Domain High Level Design - Intrasite
Target High Level topology
Q&A

You might also like