Transcript
Brochure
Protect your virtualized data Simple and affordable data protection for small and medium sized businesses
Brochure
Page 2
Protecting your business, not just the data As the amount and types of data that your business owns continue to grow, and as more of your IT deployments include virtualized workloads on flash storage, there is an immediate and critical need to protect this data reliably. A full 62 percent of small to medium size businesses report experiencing data and security breaches leading to system downtime, reduced productivity, and permanent data loss.1 Protecting uptime is no less critical: the average cost of downtime is $75,000 USD per hour, which can cripple a business of any size.2 When it comes to best-practice data protection, no single technology can provide the complete solution. The starting point for any data protection policy decision should always be a business risk assessment as opposed to a technology discussion. Once you understand the cause and effect of application downtime and data loss, you can then properly assess the pros and cons of the data protection technologies that are available. The threat and risk of data loss is growing in both variety and volume. Network and power outages, component failure, human error, willful malevolence, data corruption, software bugs, site failures and even natural disasters are just a few of the sources of application downtime and data loss. But perhaps no source of data loss has hit the headlines more than ransomware threats. According to the Institute for Critical Infrastructure Technology (ICIT), 2017 is expected to be a year in which ransomware wreaks havoc on businesses. The cost of the ransom, the loss of valuable IT time, and the potential downtime to mission-critical applications can permanently damage businesses of all sizes. The question for any business is no longer “Will I be a victim of ransomware”, but rather “Will I be prepared when ransomware attacks”? Data protection is therefore a continuum that must cover a wide range of scenarios. Snapshots, replication and backups are technologies with different yet complementary roles for mitigating the business impact of data loss incidents.
1
2016 Top 10 SMB Trends, AMI-Partners, Q1 2016
2
usiness Risk: Effective Technology Protecting Your Business B (sponsored by Hewlett Packard Enterprise, Raymond Boggs, and Jed Scaramella), IDC white paper, August 2014
That’s why you still need backups in addition to snapshots and replication as a second line of defense in order to deliver the comprehensive data protection that your business requires. You will be protected against not only storage platform outages, but also file loss and application corruption beyond your oldest snapshot. And, you can keep many copies of data economically over time thanks to efficient deduplication technologies.
Brochure
Page 3
Database, applications, files and data
VM
VM
HPE StoreOnce Catalyst HPE StoreOnce
1
2
HPE StoreEver
1
2
VM
3 Hypervisor Veeam leveraging HPE storage snapshots
1
8 am
9 am
10 am
11 am
12 pm
1 pm
2 pm
3 pm
4 pm
5 pm
HPE primary storage snapshots Data protection best practice:
1
Have three copies of your data
2
Store on two different media types
3
Keep one copy off-site
Figure 1. 3-2-1 data protection best-practice with HPE/Veeam Integration
The 3-2-1 rule for best-practice data protection The goal of the “3-2-1” rule for best-practice data protection is to provide a data protection solution that maximizes application uptime and data protection. With the proper execution of this best practice, IT managers can protect their data by following these simple “3-2-1” guidelines: • Maintain three (3) copies of your data—the primary data and two copies—to avoid losing data to a faulty backup. • Store backup copies on two (2) different media types—such as tape, disk, secondary storage, or the cloud. • Keep one (1) copy off-site—either on tape or in the cloud—in the event of local hazards or ransomware infections within the network.
The ideal data protection solution for resource-constrained businesses Research shows that many businesses today do not have data protection or even storage specialists on staff. This means that a reliable, automated data backup system that is manageable by existing staff without specialized expertise is critical to keeping the business running, meeting ever-evolving user expectations, and remaining competitive.
Brochure
Page 4
Typically, resource-constrained businesses face a three-fold data protection challenge: Complicating factors in data protection Regulatory compliance—Adhering to regulations such as the EU General Data Protection Regulation (GDPR) that takes effect May 25, 2018, is not an option—it is a requirement. GDPR presents two choices to any business that collects personally identifiable information of EU citizens: Ensure sensitive customer data is kept secure and protected or face severe financial penalties and damaging reputational consequences. The deadline for GDPR compliance is around the corner and yet according to Gartner, “By the end of 2018, over 50% of companies affected by the GDPR will not be in full compliance with its requirements.” Time is running out—invest now in a data protection infrastructure that ensures compliance. Flash adoption—Faster adoption of flash technologies introduces critical implications for data protection by challenging IT organizations to question whether existing schemes withstand Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs), Service Level Agreements (SLAs) and application performance demands of a flash storage deployment. In other words, how can you ensure that data protection doesn’t become a costly bottleneck for your flash workloads?
1. Can I find a data protection solution that fits my budget while enabling me to adhere to regulations such as General Data Protection Regulation (GDPR)? 2. How easy will it be for my IT staff to run backups and restores? 3. How reliable will my data protection solution be in the face of downtime and ransomware attacks? A leader in entry storage solutions for all size businesses, Hewlett Packard Enterprise offers data protection solutions for you that are specifically designed to deliver reliable, affordable data protection that is simple enough for any IT person to manage.
Application-centric data protection with HPE StoreOnce HPE StoreOnce Systems is a family of backup appliances that includes several models ideal for businesses of all sizes as well as HPE StoreOnce Virtual Storage Appliance (VSA) software.3 This software-defined approach is designed to run on existing server or storage hardware, is compatible with both Hyper-V and VMware® environments and has the features and functionality that is found on the dedicated appliances. HPE StoreOnce Systems are specifically designed for automated, hands-free, industry‑leading fast backup that consolidates protection of multiple servers or storage appliances to a single backup appliance. Both the hardware appliances and the software-defined solution feature HPE StoreOnce deduplication technology, which enables more data to be backed up in a smaller footprint—leading to a 10X, 20X, or even 30X increase in backup capacity. This increase depends on the data being protected, the frequency of backups, and length of backup retention. HPE StoreOnce Catalyst software integrates with applications and backup software and allows data to be deduplicated on an application or backup server before it is transferred to a StoreOnce virtual or physical backup appliance—reducing backup costs, lowering business risk, and simplifying your backup environment. In addition, StoreOnce supports cost-effective replication of data to or from remote locations as well as between physical and virtual StoreOnce instances for an additional level of protection.
Modernized data protection in virtualized environments with HPE and Veeam Thanks to integration between Veeam’s software and HPE’s storage solutions, you can create application-consistent backups from snapshots on HPE 3PAR StoreServ Storage or HPE StoreVirtual Storage, enabling fast and efficient data protection. For long-term external storage, you can then use HPE StoreOnce technology to provide deduplication for efficient storage utilization and fault isolation for data. With HPE StoreOnce, you can even copy backups to HPE StoreEver Tape storage or to the cloud for long-term, off-site data archival. This strategy enables you to meet the “3-2-1 rule” of data protection where there are three copies of the data on two different media types and one copy is kept off-site. Best of all, Veeam software products are now available from HPE via the HPE Complete program, so you can source all components of the 3-2-1 best practice data protection ecosystem from a single vendor.
3
nlock your free 1 TB HPE StoreOnce VSA, available U for download at: hpe.com/storage/freebackup
Brochure
Page 5
The convergence of Veeam software with HPE storage platforms delivers the following benefits: • Veeam Explorer recovers individual application items, guest files or entire VMs quickly and efficiently from storage snapshots on HPE storage platforms and their replicated copies on secondary storage systems—whether they were created by a Veeam job or a native snapshot scheduler. • Veeam Instant VM Recovery® (IVMR) enables a virtual machines (VM) to be immediately restored back into the production environment by running directly from the backup file to maintain low recover time objectives (RTOs) and minimize system downtime of production VMs. HPE StoreOnce Systems are the only Veeam-integrated in-line deduplication appliances to support Veeam IVMR and other vPower NFS features. • Veeam Availability Suites for ransomware protection combat malicious attacks with HPE storage solutions. While HPE storage snapshots override encrypted ransomware databases, applications, files and operating systems, HPE StoreOnce Systems make backup images invisible to ransomware, thereby making restores possible. Veeam On-Demand Sandbox and Veeam SureBackup allow testing and removal of ransomware items quickly before restoring VMs to production. • Veeam Availability Solution for HPE StoreOnce leverages HPE ProLiant servers and StoreOnce VSA software to restore critical applications such as Microsoft® Exchange, Microsoft SharePoint, Microsoft SQL Server, and Oracle databases rapidly; protect data from unauthorized access through data encryption; avoid data loss by creating secondary backup copies; and increase storage efficiency by reducing network bandwidth requirements with Catalyst-integrated deduplication.
Long-term data retention and off-site disaster recovery with HPE StoreOnce CloudBank4 HPE StoreOnce CloudBank enables you to leverage low-cost object storage for your backup data by sending infrequently accessed data directly from the HPE StoreOnce System to object storage in the cloud without requiring a separate gateway or virtual appliance. Easy and simple to manage, HPE StoreOnce CloudBank only sends unique or changed data to the cloud to significantly reduce costs, shrink backup windows, and expedite restores. In addition, HPE StoreOnce CloudBank is ideal when you want to avoid managing a remote location for disaster recovery. Instead, CloudBank is deployed as the secondary site for disaster recovery copies. 4
loudBank is available via Early Access program. Please sign C up here to register for the CloudBank Early Access Program
Brochure
Page 6
Access more data—longer and for less—with HPE StoreEver Archive Solutions Ninety days after creation, 80 percent of your data is either rarely or never accessed again. However, it still has business value and it still has to be retained and may even need to be kept readily available over long periods of time. So imagine the efficiencies and risk reduction you could achieve by moving static but still valuable unstructured data from your Tier 1 production environment to an intelligent archive enhanced for easy access, low cost and reliable, long-term retention. Primary storage budgets go further, performance improves, retention requirements are addressed, and new analytical doors are opened. Market-leading HPE StoreEver Archive solutions—encompassing easy-to-use archive management software and low-cost, reliable tape media, tape drives and tape libraries—enable you to remove inactive data from your more expensive primary storage and backup cycles and place it onto an accessible, cost‑effective and self-protecting storage tier. As a result, you benefit from an effective archive workflow that adheres to the “3-2-1” rule for best-practice data protection, and not only enables business growth by making data more accessible for a longer term, but also reduces storage costs.
Respond to security and compliance demands As you get ready for governance and compliance demands such as those driven by the GDPR, a first-class security and data protection process is the bedrock. HPE StoreOnce and HPE StoreEver infrastructure has state-of-the-art encryption designed in, reducing the risk of data security breaches. The HPE StoreOnce Security Pack provides for Data at Rest and Data in Flight encryption which prevents unauthorized access to data on disk that has been lost, stolen, or discarded, as well as, data being transmitted between devices. It also offers secure erase functionality. HPE StoreEver tape encryption and key management solutions can secure sensitive and private information stored on tape media and thus significantly reduce the risks of audit failures, financial losses, and damage to your organization’s reputation.
Brochure
Page 7
Protect yourself against data loss and business disruption—affordably Rapid data growth, ransomware attacks and regulatory compliance are key challenges for businesses today, increasing risk when data is not properly protected. With more business‑critical workloads being deployed on virtual servers and flash storage, new challenges including virtual machine (VM) sprawl emerge. Unfortunately, these factors together can lead to a staggering increase for backup storage space required to protect critical data, which ultimately drives up storage costs. VM sprawl and increased storage capacity can also lead to management complexity. The Hewlett Packard Enterprise approach is to reduce business risk by adhering to the 3-2-1 data protection best practice and simplifying data protection via multiple strategies: 1. Employing data deduplication that reduces the amount of data that must be backed up, stored, replicated, and recovered 2. Streamlining of the backup environment, including integration with backup software and applications so that backup and recovery can be managed inside those familiar applications 3. Giving you the flexibility to deploy both virtual and physical backup appliances tailored to your specific needs 4. Seeking backup and recovery automation that is simple enough for an IT generalist to manage As you consolidate your data onto entry and midrange flash storage platforms such as HPE StoreVirtual Storage, and HPE MSA Storage, you need to protect against data loss. The HPE StoreOnce and HPE StoreEver product families provide an extremely cost-effective, reliable, and simple solution for data protection and business risk reduction. Combined with Veeam, the data protection solutions from Hewlett Packard Enterprise simplify data protection, improve storage efficiency and protect against ransomware attacks. The solutions help to protect data and keep your business running.
Learn more at
hpe.com/storage/StoreOnce hpe.com/storage/StoreEver
Brochure
Make the right purchase decision. Chat with our presales specialists.
Sign up for updates © Copyright 2016–2017 Hewlett Packard Enterprise Development LP. The information contained herein is subject to change without notice. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. Microsoft is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries. Oracle is a registered trademark of Oracle and/or its affiliates. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other third-party trademark(s) is/are the property of their respective owner(s). 4AA6-6716ENW, May 2017, Rev. 1