Friday, September 11, 2020

How to protect virtualizations? - Red Hat, oVirt, KVM , Xen, Oracle, Nutanix, Proxmox



Direct links to the above discussion about protection of virtualizations like Red Hat, oVirt, KVM , Xen, Oracle, Nutanix, Proxmox: https://youtu.be/Ym7_GNcB0qI

-----------
Here are the links to particular topics from the conversation:

1:04
What is vProtect?

1:40
vProtect architecture
2:55
1 phase backup with Data Domain with source de-dup
4:11
Server and node
5:15
Scalability

5:57
Installation of vProtect

7:51
vProtect demo

8:15
Functionalities
8:20
Backup of images
9:00
Snapshots kept on the virtualizations
11:00
We can restore just the state of VM
11:40
Self backup infrastructure

14:05
Recovery plan
One button recovery
Scheduled recoveries

16:15
Backup cinsistency

17:10
Data Domain integration
Source de-duplication

17:46
Huge speed customer example

19:25
vProtect and source de-dup in the same license bundle

19:59
Summary of functionalities
Full backups
Incremental backups with CBT
Restoring single file
Mounting disks from backups to virtualixzation paltform
Disk exclusions
Self backup environment
Pre and post commands
File level restore - question

22:58
GUI
backup on demand
Starting bckups
Creating automated policy
Creating recovery plan

26:20
Great CLI interface

27:20
Trial

27:34
How vprotect is licensed?

Protect everything!
BackupRecoveryMan


Thursday, August 27, 2020

Data Domain 7.2 - What is new?

Performance & Security - these are flagship Data Domain features.
They are further improved in new Data Domain 7.2.
Let me invite you for short discussion about new DD 7.2 features.



Direct link to the above discussion about new DD7.2 features: https://youtu.be/m1XNy6IXzOo

What is new in Data Domain 7.2?
1.
Compliance - absolute lock for protected data

Data Domain allows you to absolutely block backups for a specified period of time. Thanks to this, neither ransomware nor hacker can hurt our data - we can always restore from Data Domain:

Data Domain blocks data removal / change for defined period of time (month / quarter / …) Hacker cannot change to bypass the lock - neither directly nor through the NTP server:

Version 7.2 further extends the flexibility of compliance. We can define the maximum time change applied to Data Domain and the maximum number of changes:

The compliance function is available in Data Domain hardware appliances:

------------
Further extension of Compliance (no removable lock) is Cyber Bunker:
https://youtu.be/jtgm2WHpFPk
described in the article:


2.
How much more space do we gain with new Data Domain models?

New Data Domain models compress new blocks more effectively thanks to dedicated compression card:

And we also gain more performance:

How much do we additionally gain thanks to compression card? The video shows the real numbers from production, worldwide Data Domain:

Let's assume that the old Data Domain would need 100TB for data storage.
New models (DD6900 / 9400/9900) will need
  • only 77TB for storing backups for securing your file system
  • only 85TB for storing backups for securing databases
Detailed explanation of the mechanism that makes new Data Domains to use less space for backups: https://youtu.be/xx-xZC9JtoM?t=191

3.
BoostFS = huge fast backup speed thanks to source de-duplication
For everyone!

BoostFS Live:

Data Domain 7.2 provides even faster BoostFS backups:

DD 7.2 increases the already super performance of BoostFS - - Real data from SQL backups:

4.
Recovery performance

Each recovery stream is split into multiple threads to speed up recovery!
As a result, even if we have Data Domain with a small number of disks, we achieve a big speed:

5.
Further optimization of Garbage Collection algorithms.

Data Domain provides huge performance – regardless if it performs internal processes or not. 
Thanks to this, it has over 50% market share:

How to set Data Domain cleanup parameters - live:

6.
Data Domain - algorithmic device:
https://youtu.be/m1XNy6IXzOo?t=924
focused on performance:
7.
Possibility to extend compliance for ever

8.
Data Domain allows for fast, frequent backups

9.
No visibility of source de-dup for production:


=====================
The video is recording for customers/partners discussion.
Thank you very much all that took place in this event live!
Thank you for time, discussion and... fun!!!

Performance and Security!
BackupRecoveryGuy


#datadomain #dd #7.2 #dd7.2 #backup #backupperformance #recovery #recoveryperformance #dataprotection #security #datasecurity #news #backupmedia #media #boostfs #boost #deduplication #de-dup


Wednesday, January 8, 2020

Ransomware attack - how can we recover?

Whatever we do in our life, it is always good to have Plan B.

What if my data are encrypted by ransomware?
Do I have Plan B?
How can I access my data?

What if I have backups that have no chance to be ransomwared/ removed?
What if I have a cyber bunker?
What if I have Cyber Recovery plan?
And... can it be with very attractive cost?


What backup/recovery solution can offer me in case of ransomware/hacker attack?
Why Plan B is important?
https://youtu.be/jtgm2WHpFPk?t=53

How can I lock against ransmoware/hacker?
How can I be sure that none can remove /change my backups.
Can I restore in case of ransomware/hacker attack.
https://youtu.be/jtgm2WHpFPk?t=885

Bunker in IT? - Why, When, How?
Can we do everything automatically?
Can we control our IT over ransomware?
Can we recover immediately?
https://youtu.be/jtgm2WHpFPk?t=1779

All methods to protect against ransomware/hacker
https://youtu.be/jtgm2WHpFPk?t=319

Hardening - let's remember about this simple approach
https://youtu.be/jtgm2WHpFPk?t=385

Data Domain Snapshots 
No cost, no additional space, no performance degradation method to have protection of our backups
https://youtu.be/jtgm2WHpFPk?t=461

Why source de-duplication increases my security?
https://youtu.be/jtgm2WHpFPk?t=612

--------------
We can protect ourselves against ransomware/hacker
We can have plan B
We can make it easy and automated...

Let's consider it...

--------------
Presentation about Cyber Recovery (the one used in video):
http://gurago.pl/s1/CyberRecovery.pdf


Only successful recoveries!
BackupRecoveryGuy