0% found this document useful (0 votes)
312 views

Enterprise Data Protection For Dummies

Uploaded by

handout
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
312 views

Enterprise Data Protection For Dummies

Uploaded by

handout
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 46

These materials are © 2019 John Wiley & Sons, Inc.

Any dissemination, distribution, or unauthorized use is strictly prohibited.


Unified
Enterprise
Data Protection

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Unified
Enterprise
Data Protection
Veritas Technologies Special Edition

by Bill Sempf

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Unified Enterprise Data Protection For Dummies®,
Veritas Technologies Special Edition

Published by
John Wiley & Sons, Inc.
111 River St.
Hoboken, NJ 07030-5774
www.wiley.com
Copyright © 2019 by John Wiley & Sons, Inc., Hoboken, New Jersey

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by
any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted
under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of
the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department,
John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online
at http://www.wiley.com/go/permissions.

Trademarks: Wiley, For Dummies, the Dummies Man logo, Dummies.com, and related trade dress are
trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States
and other countries, and may not be used without written permission. Veritas, NetBackup, and the
Veritas logo are trademarks or registered trademarks of Veritas Technologies LLC. All other product
names, logos, brands, and trademarks are the property of their respective owners. All company product
and service names used in this content are for identification purposes only. Use of these names, logos,
brands, and trademarks does not imply endorsement. John Wiley & Sons, Inc., is not associated with any
product or vendor mentioned in this book.

LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO


REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF
THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING
WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY
MAY BE CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS.  THE ADVICE
AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS
WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN
RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES.  IF PROFESSIONAL
ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE
SOUGHT. NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING
HEREFROM. THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK
AS A CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN
THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATION
OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE.  FURTHER, READERS
SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR
DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ.

For general information on our other products and services, or how to create a custom For Dummies book
for your business or organization, please contact our Business Development Department in the U.S. at
877-409-4177, contact [email protected], or visit www.wiley.com/go/custompub. For information about
licensing the For Dummies brand for products or services, contact BrandedRights&[email protected].

ISBN 978-1-119-43720-8 (pbk), ISBN 978-1-119-43724-6 (ebk)

Manufactured in the United States of America

10 9 8 7 6 5 4 3 2 1

Publisher’s Acknowledgments

We’re proud of this book and of the people who worked on it. Some of the people who
helped bring this book to market include the following:
Project Editor: Martin V. Minner Business Development Representative:
Editorial Manager: Rev Mengle Karen Hattan
Executive Editor: Steve Hayes Production Editor: Magesh Elangovan

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Contents at a Glance
Introduction........................................................................................................ 1
CHAPTER 1: Understanding the Enterprise Landscape............................................. 3
CHAPTER 2: Comparing Fractured and Unified Data Protection............................. 9
CHAPTER 3: Staying in It for the Long Run................................................................ 17
CHAPTER 4: Protecting Your Data Across Multiple Clouds..................................... 23
CHAPTER 5: Futureproofing Your Data Protection Investment............................. 31
CHAPTER 6: Almost Ten Elements to Paint the Complete Picture......................... 37

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Table of Contents
INTRODUCTION................................................................................................ 1
About this Book..................................................................................... 1
Foolish Assumptions............................................................................. 2
Icons Used in this Book........................................................................ 2

CHAPTER 1: Understanding the Enterprise Landscape............... 3


Defining the Modern Enterprise.......................................................... 3
Being Geographically Diverse.............................................................. 4
Hosting primary sites...................................................................... 4
Preparing secondary sites.............................................................. 4
Providing 24/7 on-demand access................................................. 5
Using the Hybrid Cloud........................................................................ 5
Starting with private clouds............................................................ 5
Using public clouds.......................................................................... 5
Working with elastic cloud computing.......................................... 6
Loading the Workloads......................................................................... 6
Choosing environments.................................................................. 6
Selecting software............................................................................ 7

CHAPTER 2: Comparing Fractured and


Unified Data Protection.......................................................... 9
Being Cautious About Fractured Protection...................................... 9
Watching out for silos.................................................................... 10
Analyzing point solutions.............................................................. 10
Considering interoperability......................................................... 11
Training teams is costly................................................................. 11
Unifying Data Protection.................................................................... 12
Streamlining operations with one team..................................... 12
Using a single management console........................................... 13
Simplifying deployment................................................................ 14
Enjoying high success rates.......................................................... 15

CHAPTER 3: Staying in It for the Long Run........................................... 17


Recognizing the Value of Your Data.................................................. 18
Keeping Your Options Open.............................................................. 19
Integrating Disaster Recovery............................................................ 20

Table of Contents vii

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
CHAPTER 4: Protecting Your Data Across
Multiple Clouds............................................................................ 23
Heading to the Cloud.......................................................................... 23
Backing up with choices................................................................ 24
Optimizing your cloud................................................................... 25
Making on-prem storage cloudy.................................................. 26
Moving to the cloud with one click.............................................. 27
Mastering the Cloud............................................................................ 28
Rounding up the snapshots......................................................... 28
Moving between clouds with ease............................................... 28
Leveraging the cloud for disaster recovery................................ 29

CHAPTER 5: Futureproofing Your Data


Protection Investment........................................................... 31
Safeguarding Your Workloads........................................................... 32
Empowering Workload Owners......................................................... 33
Mirroring Big Data Scalability............................................................ 34
Protecting VMs and Databases.......................................................... 34
Providing Easy Self-service................................................................. 35

CHAPTER 6: Almost Ten Elements to


Paint the Complete Picture................................................ 37
Defining Data Management for the Enterprise............................... 37
The Foundational Element: Data Protection.................................... 38
Data Visibility....................................................................................... 38
Data and Workload Portability.......................................................... 38
Storage Optimization.......................................................................... 39
Digital Compliance.............................................................................. 39
Business Continuity............................................................................ 39
360 Data Management....................................................................... 40

viii Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
D
ata protection is a complicated problem. At first blush, you
need to provide a team that will get your company up and
running after the data center catches fire and burns to the
ground.

That’s no fun at all, but you gotta be ready.

The real issue is there is a lot more to it than that — for example,
business continuity. How do you make sure the business units can
keep running seamlessly when you move a workload from your
data center to AWS overnight? Then there are visibility issues:
Your team needs to see all workloads across an entire enterprise.
There are optimization issues: Backing up 12 copies of a ­database
costs a fortune. There are compliance issues: The General Data
Protection Requirement (GDPR) has changed parts of data man-
agement, and other challenges likely will crop up in the near
future.

You need a toolset that matches your needs. Within this book,
I hope you’ll find some of the information you need to make an
informed decision about that toolset.

About this Book


Unified Enterprise Data Protection For Dummies, Veritas Technolo-
gies Special Edition, is an overview of the issues faced by data
protection teams and how to solve these problems. It just so hap-
pens that Veritas NetBackup and its suite of products fill many of
the holes, but this book’s main goal is to bring you up to speed
on the issues.

Whether you are a chief technology officer, database administra-


tor, or director of operations doesn’t matter. Database protection
is a problem that most of IT is interested in. This book enumer-
ates the issues and lays out some solutions.

Introduction 1

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Foolish Assumptions
The most foolish assumption you or I might make is that this
book is not for a certain reader. Trust me, if you are in technology
at all, the words here are of use to you.

That said, if you are one of the people who gets called at 1 a.m.
when things have gone poorly, you will get the most out of this
book. It’s designed for the folks who are charged with protecting
the precious data and workloads of the enterprise, the soft chewy
center of any organization.

Icons Used in this Book


Throughout the pages of this book, you’ll notice attractive icons
in the margins. They’re there to draw your attention to some
important things.

The words near this icon have special importance for your success
in database protection, so please give them your attention.

This paragraph contains some helpful hints for making enterprise


backup and recovery work in your organization.

Database protection problems can be disastrous and expensive,


so  please pay special attention to the paragraphs marked with
this icon.

2 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Defining the modern enterprise

»» Being geographically diverse

»» Using the hybrid cloud

Chapter  1
Understanding the
Enterprise Landscape

M
any of the boundaries used to describe today’s enterprise
are fading away. No longer is the local area network a
boundary to data movement. No longer is the desktop PC
a boundary to data use. No longer is “9 to 5” a boundary for the
hours when data should be available to use. No longer is the front
desk the boundary between the company and the customer.

These changes drive movement in the way the enterprise con-


siders security, or usability, or perhaps most importantly, data
protection. Getting a grip on those changes needed in data pro-
tection is what this book is about. Before I get rolling with that,
however, you need to get some definitions down.

Defining the Modern Enterprise


What does an enterprise look like when it is unbound by network,
technology, or time? First and foremost, its head is usually in the
cloud.

No, wait, hear me out.

CHAPTER 1 Understanding the Enterprise Landscape 3

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Having a cloud-first mentality is important to being able to
provide the kind of security, usability, and data protection that is
required of today’s companies. The modern enterprise needs to
be everywhere, all of the time, and able to support a tremendous
diversity of technology while getting where it is going.

Being Geographically Diverse


With the network boundary gone, the modern enterprise finds
economic benefit in being able to do business anywhere in the
world. Doing business anywhere in the world, however, means
you need to host workloads anywhere in the world. Different
countries have different regulations, and the Internet isn’t always
capable of schlepping huge amounts of data on customer demand.

Hosting primary sites


Integrating workloads in a hosting center that an enterprise
­controls completely is enough of a challenge. Maintaining six data
centers in six countries  — while making sure that no duplicate
work is done, and that the data is sufficiently protected  — will
test the most astute operations guru.

Primary sites are where the work is done, so they must be solidly
well managed, carefully backed up, and protected from bad ele-
ments. There’s more about protecting primary sites in Chapter 4.

Preparing secondary sites


The fact that a secondary site is a failover location for a primary
site should come as no surprise whatsoever, but have you taken
any time to think about how to accomplish this? How does the
secondary site know where to take up after an outage? Does it
restart a complex job? Can it start in the middle? Skip that job
until later?

All of these are part of data protection, and Chapter 4 talks more
about handling failover. Where this discussion is headed, though,
is toward 24-hour availability.

4 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Providing 24/7 on-demand access
Once that location boundary has been erased, you start to look
at the time boundary and realize that these workloads must be
available all the time. Your first thought might be outages, where
you might need to switch a workload to a secondary site, but what
about patching?

Your team might include the best operational and development


engineers on the planet, but eventually they need to take a machine
down to install an update. Handling that requires deployment
solutions, which you can learn more about in Chapter 3.

Using the Hybrid Cloud


A modern enterprise is cloud-focused, yes, but ya gotta get there
first. How about starting with a cloud-like environment in your
on-premises servers? That seems like a good first step to me.
From there, you can move to the public cloud and then, if it makes
sense, to elastic cloud computing.

Starting with private clouds


Despite the funny meme that’s all over the Internet, the cloud is
more than “someone else’s computer.” It’s a collection of orches-
tration tools spread out over services, then running on someone
else’s computer.

Bringing the services and orchestration to your on-premises


environment is a great way to bring your fragmented data storage
together in preparation for moving to the cloud. More details are
forthcoming in Chapter 2.

Using public clouds


Once everything is up and running in the private cloud, it’s time
to move up to the public. The benefit to putting the private cloud
infrastructure in place at home is that there is less of a heavy
lift to go to the public cloud. There are still details to work out,
however.

CHAPTER 1 Understanding the Enterprise Landscape 5

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Some other entity owns those services now, and there are
service-level agreements and contracts and whatnot to com-
plicate matters. Assurance that the workloads will be flexible
enough to keep rolling at secondary sites  — or even secondary
­providers — is key.

Working with elastic cloud computing


Elastic cloud computing lets your organization move away from
managing the servers with workloads, and just manage work-
loads. It requires no operating system to speak of, no web server
software, and no infrastructure. All you have are your applica-
tions, chugging along on the data they need to be chugging on.

As you might imagine, this approach requires a completely dif-


ferent perspective toward data protection. Chapter 5 covers many
of the salient details, but generally, it is the Zen endpoint of fully
embracing the hybrid cloud.

Loading the Workloads


Speaking of workloads munching away at all of that data, did you
know that by 2022, 50 percent of workloads will be running in a
cloud environment, but 80–90 percent of those same workloads
are running in virtual machines rather than elastic cloud ­computing
environments? To future-proof your cloud investment — and your
data protection plan — you’ll have to do some planning.

Choosing environments
A number of different environments are available for your cloud
deployment, and I’ve been chatting about them loosely, but the
distinction is important distinction. Physical environments  —
especially those that have to work around more than data (such
as manufacturing)  — have different data protection needs than
virtual deployments.

Where the data comes from also plays a role. Mission-critical


sources like relational databases managed by relational database
management systems (RDBMSs) have significantly differing pro-
tection requirements than those of big data systems for analytics
and machine learning. Maintaining connectors to these various
sources is another piece to factor into your plan.

6 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Selecting software
Speaking of relational database management systems, did
you know that open source software carries a bulk of the cloud
workload traffic? It’s true! But open source doesn’t mean free —
there is still a very real maintenance and planning cost for
deployment, as well as the potential difficulties in implementing
data protection.

Even if open source is the path for some workloads, large provid-
ers like Amazon, Google, or Microsoft might be better for others.
Just as with databases, having the right connectors in place is all
a part of the big plan.

CHAPTER 1 Understanding the Enterprise Landscape 7

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Being cautious about fractured
protection

»» Unifying data protection

»» Winning (lots and lots of winning)

Chapter  2
Comparing Fractured
and Unified Data
Protection

S
ome say, “The more protection the better.” In data protec-
tion, this is surprisingly not the case. Although it is tempt-
ing to take a few backups with different products and keep
them in different places, doing that creates dangerous data silos
that will eventually cause problems for your teams.

Instead, you should have a plan that includes enough redundancy


to let you sleep at night while streamlining the process as much
as possible. Do that, and you’ll have improved operations, easier
validation, and one place to watch it all work. That’s the goal:
unified data protection.

Being Cautious About


Fractured Protection
Over time, all technology environments build up residue. ­Software
development languages move on, but you still have products in
the original languages that you need to support. Servers update,

CHAPTER 2 Comparing Fractured and Unified Data Protection 9

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
but you still have products that require certain versions. The
average corporation has four times as many backup and recovery
processes as is necessary.

Data protection has the same problem. Over time, new manage-
ment of an organization makes different decisions about data
protection and, guess what, you need to support it. This story
ends with several different products handling some percentage of
the whole data protection requirement.

Watching out for silos


Silos are collections of data or processes that are isolated from the
rest of the system by some technological barrier. Data silos are
caused by format, vendor lock-in, network topography, or hard-
ware, just to name a few. Operational silos are almost always due
to vendor lock-in: a custom, closed source set of functionality that
is available only if you use a certain product.

Both of these issues cause problems with data protection. Data


silos often require a custom system to create and manage their
backups. For example, consider Microsoft SQL Server. In earlier
versions, the only effective backup solution for SQL Server was to
use the built-in backup tools, which were available only from the
management console provided by Microsoft. As you might guess,
that console runs only on a Windows operating system. This is an
example of vendor lock in.

Operational silos are created, over time, because of application


rot. One system handles communication with this card provider,
and another system handles transactions with the other card pro-
vider. Do the systems talk? Of course not! This is another example
of vendor lock-in.

The problem is that you need to back up the data from these sys-
tems and provide assurance of availability of the operations. If
the systems are in silos and not communicating, doing so in a
manageable way is very, very difficult.

Analyzing point solutions


A point solution solves one problem without considering other,
related issues. Point solutions are common in data protection
because purchasing tends to be reactionary. For example, if a firm
is struck by a ransomware attack, suddenly workstation backup

10 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
becomes important, so someone will be tasked with buying a
workstation backup system. This purchase is often made without
considering what other data protection might be available from
a different solution, or even what in-house solution is already
available.

When this happens once, it is a problem. When this happens


throughout an organization, it is data protection disaster. Lack of
interoperability between solutions leads to data silos, and thus a
difficult management situation.

Using a different data protection product for each vertical in an


organization might have certain benefits because the products are
designed for certain requirements. However, the issue is manage-
ment. Without a common management interface, it is very diffi-
cult to tell that everything is working properly.

Considering interoperability
When a disaster occurs — for example, a flood — being able to
orchestrate recovery requires a central point of command. When
data is siloed and point solutions are in use, the organization has
disparate management interfaces, and rarely does any one person
or even one set of people have the expertise to perform recovery
tasks. The outcome is a difficult-to-manage “all hands on deck”
scenario.

The solution seems to be interoperability. Each product has an


API, right? And you can script together a custom console, right?
Yes, perhaps. But what are you building it with? And how can you
prevent fragility and scope creep on the console? Who is charged
with keeping it up to date? This solution is possible, but not easy.

Training teams is costly


Technology is the focus so far, but you can’t forget your people.
These are the three technology pieces I’ve covered so far:

»» Data silos put pressure on the database administration


teams of each organization, as well as data protection.
»» Point solutions stress the IT organization, as well as the
management infrastructure.
»» Interoperability involves development teams now, as well as
data protection and governance.

CHAPTER 2 Comparing Fractured and Unified Data Protection 11

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The data protection group, for example, needs to know the meth-
odology for each silo, the user interface for each point solution,
and the API for each interoperable system. The situation quickly
becomes untenable.

Fragmentation is not worth the trouble. It’s the easy fix, it works
with the ebb and flow of organizational politics, and it puts out
the fire at hand. However, calmer heads should prevail, and you
should consider an integrated solution. This kind of solution
requires advanced planning and a steadfast output, but the ben-
efits are worth it.

Unifying Data Protection


The goal is to get all of data protection — backup and operational
modes  — under one umbrella. If you take the three core issues
from the section “Being Cautious About Fractured Protection” as
guideposts, this means preventing silos, replacing point solutions
with one solution, and delivering on interoperability.

The Veritas solution suite provides what you need for practically
any environment, but you still have practical considerations to
consider. In this section I address them one at a time.

Streamlining operations with one team


One umbrella, one team. That’s the Number One benefit of eras-
ing the silos of data protection and getting to a comprehensive
solution.

Keep in mind — the goal isn’t “one size fits all.” That approach
doesn’t work. Remember “write once run anywhere”? That
wasn’t a good thing.

The goal is to provide the connectors so that one product can


approach each solution  — backup or operational  — on its own
terms. If you have one product that can do that, you only need one
team to manage that product. Having just one team to manage
that product brings you lots of benefits:

»» You literally make one call when things go wrong.


Coordination planning is much easier when you have only
one thing to coordinate.

12 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» The team members all ask to go to the same conferences,
so you save a few bucks on travel costs.
»» Onboarding new folks is so much simpler when they only
have one tool to learn.

All jokes aside, data protection is all about what happens when
things go wrong. When things go wrong, don’t you want every-
thing to be as simple as possible? Nothing is simpler than one team
heading up all of the protection processes. That’s where it’s at.

Using a single management console


Having just one management console drives all of this coordi-
nation. Modular, straightforward, customizable dashboards were
the dream in the ’90s, and something to strive to in the 2000s, but
they’re a reality today. Veritas brings one screen — with every-
thing you need to keep an eye on  — into the ’20s, as shown in
Figure 2-1.

FIGURE 2-1: The Veritas Information Map.

No longer do you need to train the data protection team on a


number of different interfaces or — even worse — have a ­custom
dashboard written that brings in data from several management
consoles. Veritas brought the connection closer to the data, so
that all of operations now works from one console. That’s a whole
lot easier.

CHAPTER 2 Comparing Fractured and Unified Data Protection 13

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Simplifying deployment
Everyone promises one-click deployment, but I won’t waste your
time on that. You know it isn’t true. There’s always an exception,
data protection is complicated, and even simple solutions that
have multiple endpoints require configuration.

Instead, take a moment to think about containers. The Veritas


Flex Appliance is containerized, which does, honestly, simplify
things. What are containers? If you think about those train cars
that they load on massive ships to cart stuff overseas — like the
one in Figure 2-2 — you get the idea. The Flex Appliance is the
ship, and the protection appliances are the train cars.

Pixabay/Creative Commons

FIGURE 2-2: A shipping ship.

Flex containers are virtual appliances that give you the ability
to move them around and give them different levels of comput-
ing power as needed. Although it’s true that each container must
be configured, the atomic nature of each makes management of
deployment much easier.

14 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Tie that in with a single management console and you just about
have deployment nirvana, at least as much as is possible when
deploying data protection over many nodes on different platforms
through the enterprise.

Enjoying high success rates


What’s the endgame?

Winning.

Not to overstate the case, but when you add a single management
console to a well-trained team, all you get is winning. Complex-
ity is the enemy of . . . well . . . pretty much everything. Simple
solutions that take a complex problem and boil it down to the
essential parts while atomizing the complex parts are the essence
of straightforward management. That is exactly what the Veritas
data management solution is shooting for.

CHAPTER 2 Comparing Fractured and Unified Data Protection 15

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Recognizing the value of your data

»» Keeping your options open

»» Digging into protection needs for today’s


enterprise

Chapter  3
Staying in It for the
Long Run

Y
ou’re probably thinking, “That’s all well and good  — but
we have lots of stuff, and we have to keep it for a long time.”
I hear you! Medical records have to be kept for the lifetime
of the patient (and beyond); subsurface oil and gas exploration
data has to be kept for more than 50 years — and those rules and
regulations get more stringent every day.

It’s a tough problem  — how do you economically keep all that


data, for that long, and still make it accessible when you need
it? Well, Veritas has a little experience with this, and I think they
have a solution.

The key is optimizing the right storage tier for the right job.
NetBackup is powerful and works great for primary backups,
but you need something that complements it; something that’s
cost-optimized for the long run and flexible enough to support
other long-term storage options. That’s where Veritas Access
Appliance comes in  — it’s perfect for retaining those petabytes
of archive and backup data that need to be safely tucked away but
will have value when made easily accessible.

CHAPTER 3 Staying in It for the Long Run 17

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Recognizing the Value of Your Data
All those petabytes used to be written to tape and forgotten about.
Not today  — now they can be mined for important information
that can make your company more competitive. Whether you’re
working with millions of IoT data points or records of interaction
with customers via your customer relationship management soft-
ware, analyzing that data has value.

It’s the same with archives and backups — they’re valuable too, but
for a different reason. If someone needs a file restored, having them
wait a day or two for that file isn’t productive. If you’re hit with
ransomware (heaven forbid) — getting your entire operating envi-
ronment back up and running quickly can save millions of dollars.

So, there’s value in all of that data, but it has to be accessible.


That points to the need for economical long-term data retention
capabilities, capabilities that

»» Minimize costs: The solution needs to be cost-optimized —


in terms of both capital and operational expenses. That
means having a similar (or better) cost-of-ownership
compared to tape or cloud-based solutions.
»» Simplify management: Face it — IT admins can get
expensive! Your long-term retention solution should reduce
admin time — it should play well with the backup solutions
you choose, even to the point of a common administrative
tool set and understanding of each appliance’s data formats.
»» Increase visibility and control: Some data retention
policies require archival data to be on-premises. Plus, more
companies want to leverage their archival data for IT or
business analysis — that data has to be visible.
»» Increase flexibility: I talk more about this in the next
section, “Keeping Your Options Open,” but suffice it to say
that you need to easily mix on-premises storage with
cloud-based solutions — while meeting your need for
simplicity, visibility, control, and cost-effectiveness.

Veritas offers the Access 3340 Appliance to meet the needs of long-
term data retention requirements. It fills the gap between expensive
(but fast) primary storage and inexpensive (but slow) tape and cloud
secondary storage. And — it has the flexibility to support anything
in between, which maximizes your return on storage investment.

18 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Keeping Your Options Open
Every enterprise has the need for inexpensive but accessible
long-term data retention. But it isn’t “one size fits all”  —
­different data have different storage requirements. You have
data you’ll likely never use, and you have data that you might use,
but it’s uncertain — and everything in between. The solution is
flexibility — put the data on a medium that best fits its value and
access requirements without busting the budget.

Keep your options open. If you put all your data on primary stor-
age, you’ll get high performance, but it’ll cost w-a-y-y-y too
much! If you dump it all to tape or cloud, you’ll save money, but
coming up with data when your users or IT admins need it might
be problematic.

The best approach is hybrid: Combine on-premises disk stor-


age, tape libraries, and off-premises public cloud services to align
with users’ desired storage strategies as shown in Figure  3-1.
I talk a great deal more about public clouds in Chapter 4.

FIGURE 3-1: A hybrid approach to long-term data storage.

Veritas’ solution optimizes the workflow, using NetBackup for per-


formance, NetBackup Cloud Catalyst for data deduplication and
cloud tiering, and Access Appliance for long-term data retention.
Each step in the workflow is optimized for what it does. Combine
that with a suite of policies that can automatically decide where the
data should reside based on content and associated metadata, and
you have a hybrid, economical solution to long-term data retention.

CHAPTER 3 Staying in It for the Long Run 19

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Integrating Disaster Recovery
What’s more, Veritas Auto Image Replication (AIR), shown in
Figure 3-2, allows the ability to replicate backups from one Net-
Backup domain to another automatically.

AIR replicates the necessary components from one NetBackup


domain to another in one or more geographical sites for disaster
recovery. When the Access Appliance is used as the long-term reten-
tion solution for NetBackup, AIR can be utilized to replicate the data
to another NetBackup domain at a remote site. With support from
one-to-one, one- to-many, many-to-one, or many-to-many, you
have complete flexibility for replicated storage of data protection.

Integration of a data protection plan requires flexibility. The


one-to-one model allows simple replication to a disaster recov-
ery (DR) site. One-to-many allows storage at a DR site and cold
storage, for example. Many-to-one helps to cover the case where
remote offices need data protection  — for example, developer
virtual machines in various locations (even developers’ homes).
Finally, many-to-many provides a mix of all of these.

NetBackup, the backbone of AIR, and other features discussed in this


book can be integrated a number of ways. The NetBackup Appli-
ance is likely the most straightforward of the integration options. It
provides a single point of contact for the hardware team, just as the
dashboard provides a single point of contact for the operations team.

That isn’t the only choice, though. Although “bring your own
hardware” is usually a no-no in data protection, NetBackup sup-
ports software defined on your hardware, which allows even the
most intricate network scenario to have the benefit of network
protection. Virtual appliances are also an option for heavily virtu-
alized environments.

All of this works with a broad selection of storage and integrated


management, no matter what model is chosen:

»» Disk
»» Tape
»» Dedupe
»» Cloud
»» Scale-out

20 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 3-2: Auto Image Replication explained.

CHAPTER 3 Staying in It for the Long Run 21

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Switching between providers with ease

»» Obtaining visibility into the recovery


process

»» Generating workflows easily

Chapter  4
Protecting Your Data
Across Multiple Clouds

I f you have one backup, do you know how many backups you
have?

Zero backups.

It’s all well and good that your backups are comprehensive, well
managed, easy to get to, and offsite, but it’s important that they
can easily be moved in case things go poorly, and replicated if
necessary. The best solution is cloud backup  — either public or
private.

Heading to the Cloud


If your company is backing up to tape and leaving the tapes in the
intern’s truck, it’s possible that you need to move to the cloud.
That transition isn’t as difficult as it sounds, and there is more to
the cloud than Amazon Web Services (AWS) and Azure.

The cloud is as much about scalability and management as it is


about the fact that it is Internet-driven. It’s 100 percent possible
to have a private cloud that is spread out among on-premises

CHAPTER 4 Protecting Your Data Across Multiple Clouds 23

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
storage, other cloud providers, and the intern’s truck. (Okay,
I might be kidding about the truck.)

Backing up with choices


The largest problem with cloud backup is vendor lock-in. Other
problems, exist, but that is the largest one. When a corporate
decision to use Google Cloud is changed 18 months in because
AWS is more to scale for your organization, the developers just
shrug and change their deployment targets.

Data protection, however, is toast. They have to go from net-


work to network, even server to server, changing targets, test-
ing recovery, maybe even altering storage patterns. The process is
unpleasant, to say the least.

The Veritas solution is simple. One hugely scalable backup appli-


ance is the target for all of the protected infrastructure. More than
50 cloud providers sit on the other side of the appliance, as shown
in Figure 4-1. When you’re ready to change, all you need is a set-
ting in the appliance.

FIGURE 4-1: Just a setting in the appliance.

But who all lives in that cloud? Pretty much everyone, even cloud
providers I have never heard of:

»» AWS S3
»» Microsoft Azure
»» Microsoft Exchange Office 365
»» Google Cloud Platform Storage
»» Oracle Cloud Platform
»» Oracle Database Server
»» Box
»» IBM Bluemix
24 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Hitachi
»» SwiftStack
Even when the winds change, the data protection team has its bases
covered with the cloud connectors in the NetBackup Appliance.

Optimizing your cloud


“But Bill, don’t I have to pay for all of that storage and bandwidth
that I use when I save my backups in the cloud?”

Yup, you bet you do. This is another place where the NetBackup
Appliance stands up tall. The intelligent communication between
the NetBackup Appliance and the NetBackup client running on
protected infrastructure allows for deduped data to be stored and
transferred both in and out of the cloud without having to rehy-
drate before recovery.

Let me tell you a little bit about how that works. A lot of data in a
backup of a large system consists of duplicates. Truly, a lot, maybe as
much as 95 percent, as shown in Figure 4-2. However, you can’t just
throw out copies unless you know who gets those duplicate copies!
So if a large number of machines have the same report or media file,
like a collection of web servers perhaps, something has to tell the
recovery system “Hey, see this file? These five servers all get a copy.”

FIGURE 4-2: Cloud Catalyst at work.

CHAPTER 4 Protecting Your Data Across Multiple Clouds 25

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
NetBackup Cloud Catalyst does exactly this. Between the Net-
Backup client and Cloud Catalyst, there is a roster of which files
go where, and which were dehydrated to save space. This way, the
duplicated files travel over the network once, go to the cloud once,
are stored once, and are recovered once.

Making on-prem storage cloudy


But there is some data you can’t store in the cloud. Some data
must be kept locally for legal, regulatory, or policy reasons. That’s
okay too; no one is perfect.

Because of this, the NetBackup Appliance provides Disk2Disk,


Disk2Cloud, and Disk2Disk2Cloud backup modes. This feature
uses the NetBackup catalog. Veritas Information Map, shown
in Figure  4-3, shows what data is covered by the Health Insur-
ance Portability and Accountability Act (HIPAA), for example, and
needs to stay on-premises, and what data is safe to store in your
cloud backup of choice.

FIGURE 4-3: The Veritas Information Map.

Data gets tagged with certain characteristics as part of the clas-


sification process. (You do have a classification process, right?)
Then with Information Map you can see that your data gets to the
right place. Honestly, it isn’t that hard to manage. It sounds like

26 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
one of those config things that no one will ever do, but it’s really
pretty straightforward.

Moving to the cloud with one click


Moving to the cloud isn’t just about backup, it’s about opera-
tions too. Lock-in is really an issue, unless you are using Veritas
CloudMobility.

CloudMobility is the “If This, Then That” of data protection oper-


ations. You tell it how something needs to be treated given a set of
parameters, and it goes.

More importantly, it remembers what it did, and can reverse


it. No, I am not kidding. It’s a migration solution with an undo
button.

“Whoops, did I move that data processing algorithm to my boss’s


iPhone? My bad!” <Zoop> . . .it’s back the way it was.

CloudMobility handles data backups too, but the operational jobs


are what’s really interesting. Moving workloads around is noto-
riously hard. CloudMobility has built-in translation features for
AWS and Azure especially that will handle most API calls for cure,
even essential, operations.

Of course, if you have custom code that uses some Azure-only


feature, you need an AWS version too, but that’s no different than
needing an Android and iPhone version of a mobile app. The 80
percent case will be handled by CloudMobility. That takes a huge
lift from your data protection team and puts it squarely on Veritas.

To randomly send a business workload into the cloud without


testing is a recipe for disaster, but you can’t stop operations for
a long test run. CloudMobility features automated unit tests that
carve out their own little location in the cloud, and with a copy of
the backup data will be able to fully test before the deployment is
permanent.

When you are finished with a cloud processor  — for example,


when the rush is over and loads are down  — it’s a one-click
endeavor to move back to the on-premises locations for data
and workloads. CloudMobility remembers where everything was,
what changes were made, and reverses them all. Oh, and the tests
still work, too.

CHAPTER 4 Protecting Your Data Across Multiple Clouds 27

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Mastering the Cloud
Once you have moved to the cloud — which is no small feat, mind
you — it is time to optimize, polish, and perfect. The Veritas suite
of tools doesn’t stop with getting you to the cloud; they aim for
perfection once you get there.

CloudPoint allows you to manage data on disk locally no matter


why it is there. It has your cloud data covered too. Two consoles?
Heck no, it’s all covered in one. The Resiliency Platform, which I
discuss a bit in Chapter 3, handles the movement of that data as
needed, no matter what the reason.

Rounding up the snapshots


Throughout Chapter  2 and  3 I mention “single pane of glass”
console access. This is a big deal. Having to train your team on
so many different devices, not being able to move assets between
platforms  — wow, it’s such a problem to not have that myopic
view.

CloudPoint gives the data protection team one place to go to man-


age and orchestrate the protection of workloads across multiple
clouds from that single pane of glass. While folks toss around
phrases like “intuitive design” and “easy-to-use” so quickly, it’s
true of CloudPoint.

Because of the NetBackup Appliance used as a single access point


for the data and workload protection, it’s possible to build a
straightforward dashboard that helps staff monitor and hone the
movement of assets from on-prem to cloud and back as needed.

Moving between clouds with ease


Everyone says, “You can do this with a single click,” but it’s never
true. There are always things to be done before you can do the
things that need to be done. Maybe when we get HAL 9000 han-
dling our data protection (“Sorry, I can’t do that, Bill”), we won’t
have to tell the process the names of the servers, but now we do.

Of course, after the process is configured you can do one-click


deployment. That isn’t a problem, but you know there has to be
some pre-work before you can do that.

28 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Fortunately, Veritas makes it easy to configure data protection
processes  — workflows and all. The Veritas Resiliency Platform
provides a swarm of features to tie together multiple clouds for
your backup and workload:

»» Automation: You have multitier access to the processes that


make migration and recovery possible in many cloud
platforms.
»» Predictability: You gotta see what you are doing to tell what
is gonna happen. Visibility and tracking is where it is at.
»» Compliance: Along with making migration and recovery
work, you need to follow the rules. The platform provides
actionable reporting.
»» Mobility: You’ve heard this before — Disk2Disk, Disk2Cloud,
and Disk2Disk2Cloud.
»» Flexibility: Core to all of this is all of the connector support
that the Resiliency platform takes advantage of.

Leveraging the cloud for


disaster recovery
This whole data protection thing is about protecting the organi-
zation’s crown jewels. The problem is that it is a tedious mess,
especially when a number of brownfield platforms are at play.

CloudPoint and the Veritas Resiliency Platform (VRP) are designed


to do two things:

»» Enable you to simply and easily report on a well-configured


environment, and make changes if asked.
»» Take the tedium out of those changes.
That’s it. There is no magic. You need to get the data and jobs to
the cloud, move them between clouds, report, and maintain them.

CHAPTER 4 Protecting Your Data Across Multiple Clouds 29

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Making sure you are ready for change

»» Supporting the latest foray into cloud-


based workloads

»» Embracing that new branch in Bali

Chapter  5
Futureproofing Your
Data Protection
Investment

L
ooking ahead is tough in the tech world. The business
changes, the databases change, the providers change, and
the needs of the users change. It isn’t possible to stay on top
of everything, all the time.

Data protection has to stay up to date, though. You must be ready


to scale when the latest viral product hits, or your busy time of
the year comes around. When a new branch is added, protection is
added for that branch.

Veritas has pushed the envelope when it comes to making it easy


as possible to embrace change. From parallel streaming support-
ing the newest hottest cloud provider, to the self-service portal
making it easier to add new branches, the support is there.

CHAPTER 5 Futureproofing Your Data Protection Investment 31

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Safeguarding Your Workloads
Current data protection systems just can’t keep up with microser-
vices, Docker containers, Kubernetes, and the pace of software
development and big data these days. The existing client model
depends too much on the traditional server layout from 15 years
ago. The old model simply can’t deal with virtualization without
massive duplication.

You can back up the entire container, of course, and even shift it
to the cloud for disaster recovery to a second location. Your stor-
age costs will be astronomical because of data duplication. The
only way to get the data raw for deduplication is to have some sort
of streaming service available.

Enter Parallel Streaming, a feature of NetBackup 8.1 shown in


Figure 5-1. An agentless client plugin can gather data for backup
when available and deliver it to the backup accessory as needed.

FIGURE 5-1: Veritas NetBackup Parallel Streaming in action.

32 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Just when you think, “Nah, I have too many diverse endpoints,”
I get to tell you that the endpoint API makes it super simple for
Veritas or a third party to whip out new connectors in nothing flat.

The fact that the Automated Discovery wizard will find new data
as needed to back up is not new news  — most data protection
solutions do that. NetBackup also finds what data has already
been backed up in order to reduce duplication!

Empowering Workload Owners


Veritas NetBackup, shown in Figure 5-2, gives workload owners
a serious platform for taking a weight off of their shoulders. Put
yourself in a position to assure your data protection team that you
have their back.

Virtual machine (VM) admins will find the support for VMware
Cloud Foundation helpful. The agentless architecture of Parallel
Streaming takes the issue of maintaining client access to the VMs
off of their task list, and they will love you forever for it.

DBAs moving relational or document databases to open source?


Fifty percent of existing installations are being converted in 2018.
Veritas uniquely integrates leading open source RDBMS database
workloads with NetBackup.

FIGURE 5-2: Veritas NetBackup.

CHAPTER 5 Futureproofing Your Data Protection Investment 33

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Operations teams in charge of hyperconverged infrastructures are
boosting organizations’ efficiency, but data protection is usually a
mess. NetBackup is designed up front for multi-cloud. For exam-
ple, the Nutanix plugin for NetBackup is the new hotness (well,
at least at press time) and it was developed just a short time after
the data connector went into production. Veritas has multi-cloud
covered.

For today’s business, big data is everyday data. Data protection


teams in charge of handling big data have constraints of network
bandwidth, time, space, and money. NetBackup already supports
Hadoop and will shortly handle HBase, MongoDB, and others
with its agentless architecture. Even scaling up to petabyte sizes
is possible with little stress.

Mirroring Big Data Scalability


Although I’ve touched on parallel streaming, it deserves a little
more detail. The problem of organizations spinning up multiple
nodes for scaling is a tough one to solve. Sure, you could pre-
enable an agent on the node instance, but it still would have to be
provisioned, and deprovisioned, and again, and again.

The parallel streaming model is completely agentless, so you


never have to do that provisioning on the clients in the cluster. It
handles backup and recovery simultaneously, owing to preconfig-
ured pipelines. The native APIs are used with custom connectors
to assure deduplication.

Combine this level of control with the NetBackup Appliance, and


scaling up or out is covered. You can control nearly two petabytes
of capacity from one interface. You can’t beat that.

Protecting VMs and Databases


Part of the larger-scale problem is that the workload backup and
data backup function has historically been separate. This clearly
is a non-starter going forward, where the data protection team
has to consider the needs of both parts of the process in one place.

34 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
NetBackup supports workload and database backup under one
“pane of glass” by design, with little client configuration. It’s “set
and forget” too, because parallel streaming reports new targets as
they are discovered. Then you can look at them all in one place.

A recent bit of research by Veritas discovered that 11 percent of


virtual machine recoveries fail because the data was backed up but
the VM wasn’t! NetBackup’s automated discovery handles that for
you.

Providing Easy Self-service


Finally, getting set up when things change couldn’t be easier.
Veritas provides the NetBackup Self Service portal, shown in
Figure  5-3, which gives the data protection team the ability to
configure the location for backup and service-level agreements
that work with individual “tenants.”

FIGURE 5-3: NetBackup Self Service.

Individual groups within the larger organization (for example,


locations) can manage their own protection and provision-
ing without having the work within the larger-scale NetBackup
server. Add a location, add a tenant, and let that provisioning
team work.

CHAPTER 5 Futureproofing Your Data Protection Investment 35

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Fitting data protection into data
management

»» Leveraging NetBackup

»» Handling compliance, continuity, and


visibility

Chapter  6
Almost Ten Elements
to Paint the Complete
Picture

T
here might be ten points that I would like to have you walk
away remembering after reading this book, but I settled on
eight of them to paint the whole picture. I don’t want things
getting too spread out, after all.

Defining Data Management


for the Enterprise
At the highest level, this book is about data management. The
goal is for your organization to precisely define, easily integrate,
and effectively retrieve data from workloads and databases.

The trick is, this includes recovery. When folks include “retrieve”
in that definition, the assumption is that they are talking about
the “R” in a CRUD transaction — Retrieve. However, that isn’t the
only kind of retrieval folks are interested in.

CHAPTER 6 Almost Ten Elements to Paint the Complete Picture 37

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The Foundational Element:
Data Protection
At the lowest level, this book is about data protection. This is
when you go to retrieve your data and it isn’t there. How an orga-
nization deals with things going wrong defines the organization,
and that is the core of data protection.

The bits and bytes aren’t the only things that are important in
data protection. An organization needs to get up and running, not
just get access to the tables and rows. Workloads, and a place to
run them, are as important as the data.

It’s tough to design a data protection methodology that handles


the systems that move data around, but you only have to do that
once. After that you can depend on NetBackup to find new data
sources and fit them into the flow.

Data Visibility
Speaking of the flow, spare a minute to consider the plight of
the poor data protection team trying to keep track of all of this.
For traditional backup schemes, one person is tasked with watch-
ing a few of many different schemes and reporting to a central
facility.

With NetBackup, the data protection team has one pane of glass
to watch and one dashboard to look at for all of the ins and outs
of data management. Location, optimization, legal compliance —
it’s all in one place.

Data and Workload Portability


The key to all of this is the cloud (I know, it’s just someone else’s
computer) and how it plays into the data protection strategy.
When you are in a position to move a workload processing thread
from on-premises to cloud with the click of a button, that gives
disaster recovery a whole new meaning.

38 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Storage Optimization
Backing up virtual machines (VMs) is imprecise. Lots of informa-
tion is duplicated between VMs. If you simply copy the bytes to
the cloud, you’ll create a massive waste of space.

With tools like Cloud Catalyst and others within the NetBackup
suite, backing up smarter rather than harder is the goal. I can’t
even believe that the toolset will tag duplicate items and remem-
ber where they go, so even though they only get backed up once,
they get replicated multiple times based on the replication pat-
tern. That’s some next-level storage optimization.

Digital Compliance
Compliance is becoming more of a consideration as the public
becomes more concerned with privacy and security. First came
the Payment Card Industry Data Security Standard (PCI DSS) and
Health Insurance Portability and Accountability Act (HIPAA), then
the Sarbanes-Oxley Act, and now the General Data Protection
Regulation (GDPR).

Sometimes data protection is explicitly called out in those laws,


and sometimes it’s just a hint. No matter which, it’s going to
be a question when the time comes to audit your organization.
“Single pane of glass” means you have one place to go for
reports, too.

Business Continuity
In some ways, an organization can be measured based on how
it handles disaster recovery. Do you really understand your data
flows? If you aren’t sure, you’ll find out fast when you lose a data
center to a tornado.

When you can get back up and running after something terrible
happens — weather, ransomware, cyberattack, bad elements —
that’s when you have a handle on business continuity. This is the
goal of NetBackup and its tools: to get you back up and running
as fast as possible so you can stay in business as long as possible.

CHAPTER 6 Almost Ten Elements to Paint the Complete Picture 39

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
360 Data Management
When things go poorly, isn’t it great to have one place to go and
find the answers that the board needs, figure out where to move
that processing job, get that data bask from the compromised
database?

That’s what Veritas is shooting for and I think they nailed it.

40 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition

These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
WILEY END USER LICENSE AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.

You might also like