Friday, September 11, 2020

How to protect virtualizations? - Red Hat, oVirt, KVM , Xen, Oracle, Nutanix, Proxmox

Direct links to the above discussion about protection of virtualizations like Red Hat, oVirt, KVM , Xen, Oracle, Nutanix, Proxmox:

Here are the links to particular topics from the conversation:

What is vProtect?

vProtect architecture
1 phase backup with Data Domain with source de-dup
Server and node

Installation of vProtect

vProtect demo

Backup of images
Snapshots kept on the virtualizations
We can restore just the state of VM
Self backup infrastructure

Recovery plan
One button recovery
Scheduled recoveries

Backup cinsistency

Data Domain integration
Source de-duplication

Huge speed customer example

vProtect and source de-dup in the same license bundle

Summary of functionalities
Full backups
Incremental backups with CBT
Restoring single file
Mounting disks from backups to virtualixzation paltform
Disk exclusions
Self backup environment
Pre and post commands
File level restore - question

backup on demand
Starting bckups
Creating automated policy
Creating recovery plan

Great CLI interface


How vprotect is licensed?

Protect everything!

Thursday, August 27, 2020

Data Domain 7.2 - What is new?

Performance & Security - these are flagship Data Domain features.
They are further improved in new Data Domain 7.2.
Let me invite you for short discussion about new DD 7.2 features.

Direct link to the above discussion about new DD7.2 features:

What is new in Data Domain 7.2?
Compliance - absolute lock for protected data

Data Domain allows you to absolutely block backups for a specified period of time. Thanks to this, neither ransomware nor hacker can hurt our data - we can always restore from Data Domain:

Data Domain blocks data removal / change for defined period of time (month / quarter / …) Hacker cannot change to bypass the lock - neither directly nor through the NTP server:

Version 7.2 further extends the flexibility of compliance. We can define the maximum time change applied to Data Domain and the maximum number of changes:

The compliance function is available in Data Domain hardware appliances:

Further extension of Compliance (no removable lock) is Cyber Bunker:
described in the article:

How much more space do we gain with new Data Domain models?

New Data Domain models compress new blocks more effectively thanks to dedicated compression card:

And we also gain more performance:

How much do we additionally gain thanks to compression card? The video shows the real numbers from production, worldwide Data Domain:

Let's assume that the old Data Domain would need 100TB for data storage.
New models (DD6900 / 9400/9900) will need
  • only 77TB for storing backups for securing your file system
  • only 85TB for storing backups for securing databases
Detailed explanation of the mechanism that makes new Data Domains to use less space for backups:

BoostFS = huge fast backup speed thanks to source de-duplication
For everyone!

BoostFS Live:

Data Domain 7.2 provides even faster BoostFS backups:

DD 7.2 increases the already super performance of BoostFS - - Real data from SQL backups:

Recovery performance

Each recovery stream is split into multiple threads to speed up recovery!
As a result, even if we have Data Domain with a small number of disks, we achieve a big speed:

Further optimization of Garbage Collection algorithms.

Data Domain provides huge performance – regardless if it performs internal processes or not. 
Thanks to this, it has over 50% market share:

How to set Data Domain cleanup parameters - live:

Data Domain - algorithmic device:
focused on performance:
Possibility to extend compliance for ever

Data Domain allows for fast, frequent backups

No visibility of source de-dup for production:

The video is recording for customers/partners discussion.
Thank you very much all that took place in this event live!
Thank you for time, discussion and... fun!!!

Performance and Security!

#datadomain #dd #7.2 #dd7.2 #backup #backupperformance #recovery #recoveryperformance #dataprotection #security #datasecurity #news #backupmedia #media #boostfs #boost #deduplication #de-dup

Wednesday, January 8, 2020

Ransomware attack - how can we recover?

Whatever we do in our life, it is always good to have Plan B.

What if my data are encrypted by ransomware?
Do I have Plan B?
How can I access my data?

What if I have backups that have no chance to be ransomwared/ removed?
What if I have a cyber bunker?
What if I have Cyber Recovery plan?
And... can it be with very attractive cost?

What backup/recovery solution can offer me in case of ransomware/hacker attack?
Why Plan B is important?

How can I lock against ransmoware/hacker?
How can I be sure that none can remove /change my backups.
Can I restore in case of ransomware/hacker attack.

Bunker in IT? - Why, When, How?
Can we do everything automatically?
Can we control our IT over ransomware?
Can we recover immediately?

All methods to protect against ransomware/hacker

Hardening - let's remember about this simple approach

Data Domain Snapshots 
No cost, no additional space, no performance degradation method to have protection of our backups

Why source de-duplication increases my security?

We can protect ourselves against ransomware/hacker
We can have plan B
We can make it easy and automated...

Let's consider it...

Presentation about Cyber Recovery (the one used in video):

Only successful recoveries!