Download Now Free registration required
Disaster Recovery (DR) plans today are an intricate combination of policies, procedures, operations, and IT systems. The DR plans employed by IT organizations across different regions and types of business are as varied as are the businesses they support. However, there is one fundamental building block upon which all DR plans rest: data accessibility at a second site. To achieve disaster preparedness, IT organizations require a system that ensures that the mission critical data that the business needs to continue operations is safely housed at a remote site, intact, with data integrity.The optimal technology to achieve this has long been remote replication. Indeed, IT organizations recognize the central role that data replication plays in a sound disaster recovery architecture, given replication's ability to get data safely to a remote location more rapidly than alternatives.However, the high cost of replication has inhibited its widespread use, and left a significant portion of the IT environment at risk of slow or failed recovery from a disaster. Most IT departments have been forced to protect only a select few applications with replication, while relying on tape-based disaster recovery for most other applications. Other IT organizations have deployed replication more widely at great costs, and are finding it untenable to keep up with the increasing costs and complexity that result from their data growth rate. This problem has been exacerbated in recent years as the number of mission critical applications continues to rise, and the requirements for faster recovery times continue to accelerate.Fortunately deduplication?which eliminates redundant data that needs to traverse the network?is a key enabler of cost efficient replication for the DR architecture. This paper describes the native replication feature of ProtecTIER?, IBM's enterprise-class deduplication solution, and demonstrates that deduplication-enabled replication provides dramatic improvements to Disaster Recovery operations. This enables ProtecTIER to extend the high level of data protection provided by replication to a wider range of data and applications in the data center.
- Format: PDF
- Size: 0 KB