Author Archive

Data Protection Everywhere: Data Domain Virtual Edition

Alyanna Ilyadis

Product Marketing Manager, Dell EMC
Alyanna is a Product Marketing Manager at Dell EMC working in data protection. She graduated from Bryant University in 2015 and has been working at Dell EMC since then. Outside of work, she enjoys illustrating and putting too much time into video games.

We all know data protection is essential, not optional. Whether it’s in the cloud, on your physical storage or even in virtualized storage, your data needs to be protected. Fortunately, Dell EMC offers a data protection portfolio that’s equipped to deliver complete protection for enterprises of all sizes no matter where data lives or what happens in your data center. First in this blog series was a great overview of the Data Protection Suite Family, followed by a piece outlining the many benefits of Dell EMC Data Domain. Now, let’s move on to discuss software-defined data protection storage with Data Domain Virtual Edition which was introduced last year.

Data Domain Virtual Edition (DD VE) provides all the benefits of the #1 protection storage, Data Domain, in a software-defined solution. DD VE is simple, flexible and efficient, and best of all, easy to deploy and configure. So easy, in fact, that it can be up and running in just minutes. In its latest release, DD VE 3.0 expands on its core of remote and branch offices by adding even more flexibility that address additional pain points. The latest release of DD VE offers increased scalability and cloud support to address customers in the cloud and who have a converged infrastructure.

At its core, DD VE addresses businesses with Remote and Branch Offices. To address this, multiple DD VE instances can be deployed across remote offices for backup, and then replicate to a larger Data Domain system at a central data center for disaster recovery. With DD Replicator, which is included with DD VE, only unique data is transferred over WAN from DD VE to the Data Domain system at the disaster recovery site, which eliminates up to 99% of the bandwidth required to standard replication methods. Plus, bandwidth throttling allows you to schedule when data is sent over the WAN and limit the amount of bandwidth that can be used for replication, which improves resource utilization. Additionally, DD VE can efficiently protect small capacity workloads. This could be a small business or single department of a larger business that needs its own protection storage solution.

DD VE 3.0 supports Data Domain Cloud Tier, which enables customers to natively tier data to object storage in the public, private or hybrid cloud for long-term retention. Just like with Data Domain, only unique data is sent directly from DD VE to Dell EMC Elastic Cloud Storage (ECS), Virtustream Storage Cloud or 3rd party cloud providers. The long-term retention data now in the cloud is already deduplicated, which significantly reduces your storage footprint and network bandwidth for lower TCO. For further cloud-enablement, DD VE also supports secure multi-tenancy. This enables DD VE to be delivered as a service with the ability to logically isolate data between multiple tenants accessing a single DD VE instance.

Data Domain Virtual Edition (more…)

‘Tis The Season – And Backup Admins Have Made Their Holiday Wish List!

Alyanna Ilyadis

Product Marketing Manager, Dell EMC
Alyanna is a Product Marketing Manager at Dell EMC working in data protection. She graduated from Bryant University in 2015 and has been working at Dell EMC since then. Outside of work, she enjoys illustrating and putting too much time into video games.

As the holiday season rolls around, there are plenty of things people are wishing for like new gadgets, updated wardrobe, or even a cozy pet bed for your best friend. And while those things are all well and good, not everyone is hoping for just stocking stuffers this year. The IT industry is now having to deal with an explosion of new data that needs to be protected, and a lack of visibility and control of that data. Faster backup and better protection options are becoming a must. So when a backup admin is asked to make their own holiday wish list, you can bet a new fridge for the office wasn’t at the top.  So what is on the backup admin wishlist?|

“I want to always meet my backup windows”:
When you ask an application or backup owner if they need faster backup and recovery to meet their stringent SLAs – they’re going to tell you yes. Meeting backup windows is becoming harder than ever, and the amount of data that needs to be moved from one place to another is increasing, so speeding that process up is key. When you start talking about mission critical applications, backup and app admins are putting a nice big star next to the first item on their wish list.

Though Santa might not be able to pop down the chimney with this, fortunately for application owners and backup admins, Dell EMC can. Faster backup can sometimes seem out of reach, but by removing the application and backup server from the process, admins can get up to 20x faster backup to better meet their backup windows. Need faster recovery too? Not a problem. With differential restore, which means only recovering the difference between the production and protection lun, app admins can see up to 10x faster recovery . If your application being paused for the length of the backup is also a problem, the removal of the application server from the backup process can reduce or completely eliminate any impact. (more…)

Not Using a Full Backup for Your Big Data? You Should Be

Alyanna Ilyadis

Product Marketing Manager, Dell EMC
Alyanna is a Product Marketing Manager at Dell EMC working in data protection. She graduated from Bryant University in 2015 and has been working at Dell EMC since then. Outside of work, she enjoys illustrating and putting too much time into video games.

Your business relies on making sure all its important information is kept safe and easily recoverable if something goes wrong. When we start talking about mission critical applications, most people can’t imagine themselves not keeping that data safe. As Big Data starts to become (and has become) mission critical, there begins a growing need to protect it.

big-data-dp-blog-1

Businesses used to understand data as being structured or neatly organized in databases found within the enterprise.  But then, an emergence of new data started to spread, data is now being gathered from many diverse sources. Web logs, ecommerce transactions and demographic information left behind by customer interactions with a company became a useful source of data for corporations. This rapid growth of new data sources that is characterized by high volumes of growth, generated at high velocities, and include both these structured and unstructured data sources could be analyzed and used to better the business. For instance, Chrysler uses data gathered from their manufacturing floor, which is then used to help boost operational efficiency. All fortune 100 companies are using Big Data analytics, and with rapid technology adoption, projects are maturing faster than ever. This Big Data holds great value to businesses by allowing them to better understand their customers and gain a competitive edge, but it is becoming increasingly difficult to manage and protect. (more…)

Just What The Application Owner Ordered!

Alyanna Ilyadis

Product Marketing Manager, Dell EMC
Alyanna is a Product Marketing Manager at Dell EMC working in data protection. She graduated from Bryant University in 2015 and has been working at Dell EMC since then. Outside of work, she enjoys illustrating and putting too much time into video games.

Doctor with futuristic touchscreen interface

Ok, so application owners aren’t doctors, but they do know what they need when fixing a problem! There is a lot of change occurring in the data protection landscape today. For application owners, such as DBAs, difficulty meeting backup windows is becoming a problem. Due to an explosion of data that needs to be protected and lack of control and visibility into backups, many DBAs are becoming dissatisfied with their current backup solution.  Missing stringent SLAs is never an option when dealing with mission critical workloads – and having your application impacted can also be detrimental to meeting those backup windows.

When application owners don’t get the control and visibility they want over their backups, they go off on their own – using their own native utility to backup to whatever disk is available – often primary storage (Which as we all know, is less than ideal). So how do you enable this self-service data protection model without creating these unnecessary silos of storage?

The wave of traditional server-centric backup designed around centralized control with backup servers, and agents sending data to protection storage, just isn‘t keeping up. Especially with increasingly strict SLAs and need for control over backups. But, fortunately, data protection is evolving.

The new wave of modern data management is designed for self service! It‘s made to empower application owners andstorage admins to backup directly from the data source to protection storage.  This model is becoming increasingly popular because it puts control directly in the hands of the data owners – rather than relying on a centralized backup team.

To tie it all together, you need both intelligent analytics and search. That way, you can cross both the traditional and modern approaches ensuring that you optimize operations across all data centers globally.

The application owner needs to have the control they desire, by eliminating the complexity of traditional backups and providing unparalleled efficiency. (more…)

All Flash Arrays, Don’t Forget Your Helmet!

Alyanna Ilyadis

Product Marketing Manager, Dell EMC
Alyanna is a Product Marketing Manager at Dell EMC working in data protection. She graduated from Bryant University in 2015 and has been working at Dell EMC since then. Outside of work, she enjoys illustrating and putting too much time into video games.

Super flash-blogIf you have a flash environment (Or know flash at all) you’re aware of its high performance. However, that high performance also demands the same level of speed in all aspects of its use. Meaning, you need to consider what you’re using to protect that all flash array, and know that you can’t skimp out on it. Not having the right data protection for your flash array would be like driving a racecar without a helmet – and everyone knows that’s a bad idea. Yet, the wrong protection solution can become a bottleneck to your mission critical workloads on flash, with your backup slowing down or even stopping your application.

When protecting a flash environment, there are some requirements to keep in mind. First, and foremost, is performance. Service Level Agreements are becoming stricter and your array needs the performance to meet these SLAs – which include backup windows, RPO and recovery time. Second is efficiency – flash storage, and the applications stored on them, can’t be impacted by protection. Having your flash array’s performance compromised is never an option. Last, but hardly the least, is agility. Since flash storage is usually a component of an ever evolving data center, it’s important that the data protection solution you implement evolve alongside your business.

There are three main pieces that are critical to consider when protecting an all flash array: Continuous availability, Replication for disaster recovery, and Backup and recovery.

Let’s start our discussion off with continuous availability, and how important it is to flash. All flash arrays give the best performance for the most demanding mission critical applications. These applications most often also need the highest level of availability. As the name suggests continuous availability is about keeping your mission critical applications always on.  Your availability solution should offer zero RTO and zero RPO even in the face of natural disasters and catastrophic hardware failures. In addition that same solution should offer a powerful data mobility engine that can eliminate planned downtime for time consuming storage tech refresh and workload balancing across arrays. (more…)

SUBSCRIBE BELOW

Categories

Archives

Connect with us on Twitter

Click here for the Cloud Chats blog