Enterprise Data Protection For Dummies
Enterprise Data Protection For Dummies
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Unified
Enterprise
Data Protection
Veritas Technologies Special Edition
by Bill Sempf
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Unified Enterprise Data Protection For Dummies®,
Veritas Technologies Special Edition
Published by
John Wiley & Sons, Inc.
111 River St.
Hoboken, NJ 07030-5774
www.wiley.com
Copyright © 2019 by John Wiley & Sons, Inc., Hoboken, New Jersey
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by
any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted
under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of
the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department,
John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online
at http://www.wiley.com/go/permissions.
Trademarks: Wiley, For Dummies, the Dummies Man logo, Dummies.com, and related trade dress are
trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States
and other countries, and may not be used without written permission. Veritas, NetBackup, and the
Veritas logo are trademarks or registered trademarks of Veritas Technologies LLC. All other product
names, logos, brands, and trademarks are the property of their respective owners. All company product
and service names used in this content are for identification purposes only. Use of these names, logos,
brands, and trademarks does not imply endorsement. John Wiley & Sons, Inc., is not associated with any
product or vendor mentioned in this book.
For general information on our other products and services, or how to create a custom For Dummies book
for your business or organization, please contact our Business Development Department in the U.S. at
877-409-4177, contact [email protected], or visit www.wiley.com/go/custompub. For information about
licensing the For Dummies brand for products or services, contact BrandedRights&[email protected].
10 9 8 7 6 5 4 3 2 1
Publisher’s Acknowledgments
We’re proud of this book and of the people who worked on it. Some of the people who
helped bring this book to market include the following:
Project Editor: Martin V. Minner Business Development Representative:
Editorial Manager: Rev Mengle Karen Hattan
Executive Editor: Steve Hayes Production Editor: Magesh Elangovan
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Contents at a Glance
Introduction........................................................................................................ 1
CHAPTER 1: Understanding the Enterprise Landscape............................................. 3
CHAPTER 2: Comparing Fractured and Unified Data Protection............................. 9
CHAPTER 3: Staying in It for the Long Run................................................................ 17
CHAPTER 4: Protecting Your Data Across Multiple Clouds..................................... 23
CHAPTER 5: Futureproofing Your Data Protection Investment............................. 31
CHAPTER 6: Almost Ten Elements to Paint the Complete Picture......................... 37
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Table of Contents
INTRODUCTION................................................................................................ 1
About this Book..................................................................................... 1
Foolish Assumptions............................................................................. 2
Icons Used in this Book........................................................................ 2
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
CHAPTER 4: Protecting Your Data Across
Multiple Clouds............................................................................ 23
Heading to the Cloud.......................................................................... 23
Backing up with choices................................................................ 24
Optimizing your cloud................................................................... 25
Making on-prem storage cloudy.................................................. 26
Moving to the cloud with one click.............................................. 27
Mastering the Cloud............................................................................ 28
Rounding up the snapshots......................................................... 28
Moving between clouds with ease............................................... 28
Leveraging the cloud for disaster recovery................................ 29
viii Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
D
ata protection is a complicated problem. At first blush, you
need to provide a team that will get your company up and
running after the data center catches fire and burns to the
ground.
The real issue is there is a lot more to it than that — for example,
business continuity. How do you make sure the business units can
keep running seamlessly when you move a workload from your
data center to AWS overnight? Then there are visibility issues:
Your team needs to see all workloads across an entire enterprise.
There are optimization issues: Backing up 12 copies of a database
costs a fortune. There are compliance issues: The General Data
Protection Requirement (GDPR) has changed parts of data man-
agement, and other challenges likely will crop up in the near
future.
You need a toolset that matches your needs. Within this book,
I hope you’ll find some of the information you need to make an
informed decision about that toolset.
Introduction 1
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Foolish Assumptions
The most foolish assumption you or I might make is that this
book is not for a certain reader. Trust me, if you are in technology
at all, the words here are of use to you.
That said, if you are one of the people who gets called at 1 a.m.
when things have gone poorly, you will get the most out of this
book. It’s designed for the folks who are charged with protecting
the precious data and workloads of the enterprise, the soft chewy
center of any organization.
The words near this icon have special importance for your success
in database protection, so please give them your attention.
2 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Defining the modern enterprise
Chapter 1
Understanding the
Enterprise Landscape
M
any of the boundaries used to describe today’s enterprise
are fading away. No longer is the local area network a
boundary to data movement. No longer is the desktop PC
a boundary to data use. No longer is “9 to 5” a boundary for the
hours when data should be available to use. No longer is the front
desk the boundary between the company and the customer.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Having a cloud-first mentality is important to being able to
provide the kind of security, usability, and data protection that is
required of today’s companies. The modern enterprise needs to
be everywhere, all of the time, and able to support a tremendous
diversity of technology while getting where it is going.
Primary sites are where the work is done, so they must be solidly
well managed, carefully backed up, and protected from bad ele-
ments. There’s more about protecting primary sites in Chapter 4.
All of these are part of data protection, and Chapter 4 talks more
about handling failover. Where this discussion is headed, though,
is toward 24-hour availability.
4 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Providing 24/7 on-demand access
Once that location boundary has been erased, you start to look
at the time boundary and realize that these workloads must be
available all the time. Your first thought might be outages, where
you might need to switch a workload to a secondary site, but what
about patching?
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Some other entity owns those services now, and there are
service-level agreements and contracts and whatnot to com-
plicate matters. Assurance that the workloads will be flexible
enough to keep rolling at secondary sites — or even secondary
providers — is key.
Choosing environments
A number of different environments are available for your cloud
deployment, and I’ve been chatting about them loosely, but the
distinction is important distinction. Physical environments —
especially those that have to work around more than data (such
as manufacturing) — have different data protection needs than
virtual deployments.
6 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Selecting software
Speaking of relational database management systems, did
you know that open source software carries a bulk of the cloud
workload traffic? It’s true! But open source doesn’t mean free —
there is still a very real maintenance and planning cost for
deployment, as well as the potential difficulties in implementing
data protection.
Even if open source is the path for some workloads, large provid-
ers like Amazon, Google, or Microsoft might be better for others.
Just as with databases, having the right connectors in place is all
a part of the big plan.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Being cautious about fractured
protection
Chapter 2
Comparing Fractured
and Unified Data
Protection
S
ome say, “The more protection the better.” In data protec-
tion, this is surprisingly not the case. Although it is tempt-
ing to take a few backups with different products and keep
them in different places, doing that creates dangerous data silos
that will eventually cause problems for your teams.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
but you still have products that require certain versions. The
average corporation has four times as many backup and recovery
processes as is necessary.
Data protection has the same problem. Over time, new manage-
ment of an organization makes different decisions about data
protection and, guess what, you need to support it. This story
ends with several different products handling some percentage of
the whole data protection requirement.
The problem is that you need to back up the data from these sys-
tems and provide assurance of availability of the operations. If
the systems are in silos and not communicating, doing so in a
manageable way is very, very difficult.
10 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
becomes important, so someone will be tasked with buying a
workstation backup system. This purchase is often made without
considering what other data protection might be available from
a different solution, or even what in-house solution is already
available.
Considering interoperability
When a disaster occurs — for example, a flood — being able to
orchestrate recovery requires a central point of command. When
data is siloed and point solutions are in use, the organization has
disparate management interfaces, and rarely does any one person
or even one set of people have the expertise to perform recovery
tasks. The outcome is a difficult-to-manage “all hands on deck”
scenario.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The data protection group, for example, needs to know the meth-
odology for each silo, the user interface for each point solution,
and the API for each interoperable system. The situation quickly
becomes untenable.
Fragmentation is not worth the trouble. It’s the easy fix, it works
with the ebb and flow of organizational politics, and it puts out
the fire at hand. However, calmer heads should prevail, and you
should consider an integrated solution. This kind of solution
requires advanced planning and a steadfast output, but the ben-
efits are worth it.
The Veritas solution suite provides what you need for practically
any environment, but you still have practical considerations to
consider. In this section I address them one at a time.
Keep in mind — the goal isn’t “one size fits all.” That approach
doesn’t work. Remember “write once run anywhere”? That
wasn’t a good thing.
12 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» The team members all ask to go to the same conferences,
so you save a few bucks on travel costs.
»» Onboarding new folks is so much simpler when they only
have one tool to learn.
All jokes aside, data protection is all about what happens when
things go wrong. When things go wrong, don’t you want every-
thing to be as simple as possible? Nothing is simpler than one team
heading up all of the protection processes. That’s where it’s at.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Simplifying deployment
Everyone promises one-click deployment, but I won’t waste your
time on that. You know it isn’t true. There’s always an exception,
data protection is complicated, and even simple solutions that
have multiple endpoints require configuration.
Pixabay/Creative Commons
Flex containers are virtual appliances that give you the ability
to move them around and give them different levels of comput-
ing power as needed. Although it’s true that each container must
be configured, the atomic nature of each makes management of
deployment much easier.
14 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Tie that in with a single management console and you just about
have deployment nirvana, at least as much as is possible when
deploying data protection over many nodes on different platforms
through the enterprise.
Winning.
Not to overstate the case, but when you add a single management
console to a well-trained team, all you get is winning. Complex-
ity is the enemy of . . . well . . . pretty much everything. Simple
solutions that take a complex problem and boil it down to the
essential parts while atomizing the complex parts are the essence
of straightforward management. That is exactly what the Veritas
data management solution is shooting for.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Recognizing the value of your data
Chapter 3
Staying in It for the
Long Run
Y
ou’re probably thinking, “That’s all well and good — but
we have lots of stuff, and we have to keep it for a long time.”
I hear you! Medical records have to be kept for the lifetime
of the patient (and beyond); subsurface oil and gas exploration
data has to be kept for more than 50 years — and those rules and
regulations get more stringent every day.
The key is optimizing the right storage tier for the right job.
NetBackup is powerful and works great for primary backups,
but you need something that complements it; something that’s
cost-optimized for the long run and flexible enough to support
other long-term storage options. That’s where Veritas Access
Appliance comes in — it’s perfect for retaining those petabytes
of archive and backup data that need to be safely tucked away but
will have value when made easily accessible.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Recognizing the Value of Your Data
All those petabytes used to be written to tape and forgotten about.
Not today — now they can be mined for important information
that can make your company more competitive. Whether you’re
working with millions of IoT data points or records of interaction
with customers via your customer relationship management soft-
ware, analyzing that data has value.
It’s the same with archives and backups — they’re valuable too, but
for a different reason. If someone needs a file restored, having them
wait a day or two for that file isn’t productive. If you’re hit with
ransomware (heaven forbid) — getting your entire operating envi-
ronment back up and running quickly can save millions of dollars.
Veritas offers the Access 3340 Appliance to meet the needs of long-
term data retention requirements. It fills the gap between expensive
(but fast) primary storage and inexpensive (but slow) tape and cloud
secondary storage. And — it has the flexibility to support anything
in between, which maximizes your return on storage investment.
18 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Keeping Your Options Open
Every enterprise has the need for inexpensive but accessible
long-term data retention. But it isn’t “one size fits all” —
different data have different storage requirements. You have
data you’ll likely never use, and you have data that you might use,
but it’s uncertain — and everything in between. The solution is
flexibility — put the data on a medium that best fits its value and
access requirements without busting the budget.
Keep your options open. If you put all your data on primary stor-
age, you’ll get high performance, but it’ll cost w-a-y-y-y too
much! If you dump it all to tape or cloud, you’ll save money, but
coming up with data when your users or IT admins need it might
be problematic.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Integrating Disaster Recovery
What’s more, Veritas Auto Image Replication (AIR), shown in
Figure 3-2, allows the ability to replicate backups from one Net-
Backup domain to another automatically.
That isn’t the only choice, though. Although “bring your own
hardware” is usually a no-no in data protection, NetBackup sup-
ports software defined on your hardware, which allows even the
most intricate network scenario to have the benefit of network
protection. Virtual appliances are also an option for heavily virtu-
alized environments.
»» Disk
»» Tape
»» Dedupe
»» Cloud
»» Scale-out
20 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 3-2: Auto Image Replication explained.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Switching between providers with ease
Chapter 4
Protecting Your Data
Across Multiple Clouds
I f you have one backup, do you know how many backups you
have?
Zero backups.
It’s all well and good that your backups are comprehensive, well
managed, easy to get to, and offsite, but it’s important that they
can easily be moved in case things go poorly, and replicated if
necessary. The best solution is cloud backup — either public or
private.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
storage, other cloud providers, and the intern’s truck. (Okay,
I might be kidding about the truck.)
But who all lives in that cloud? Pretty much everyone, even cloud
providers I have never heard of:
»» AWS S3
»» Microsoft Azure
»» Microsoft Exchange Office 365
»» Google Cloud Platform Storage
»» Oracle Cloud Platform
»» Oracle Database Server
»» Box
»» IBM Bluemix
24 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Hitachi
»» SwiftStack
Even when the winds change, the data protection team has its bases
covered with the cloud connectors in the NetBackup Appliance.
Yup, you bet you do. This is another place where the NetBackup
Appliance stands up tall. The intelligent communication between
the NetBackup Appliance and the NetBackup client running on
protected infrastructure allows for deduped data to be stored and
transferred both in and out of the cloud without having to rehy-
drate before recovery.
Let me tell you a little bit about how that works. A lot of data in a
backup of a large system consists of duplicates. Truly, a lot, maybe as
much as 95 percent, as shown in Figure 4-2. However, you can’t just
throw out copies unless you know who gets those duplicate copies!
So if a large number of machines have the same report or media file,
like a collection of web servers perhaps, something has to tell the
recovery system “Hey, see this file? These five servers all get a copy.”
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
NetBackup Cloud Catalyst does exactly this. Between the Net-
Backup client and Cloud Catalyst, there is a roster of which files
go where, and which were dehydrated to save space. This way, the
duplicated files travel over the network once, go to the cloud once,
are stored once, and are recovered once.
26 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
one of those config things that no one will ever do, but it’s really
pretty straightforward.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Mastering the Cloud
Once you have moved to the cloud — which is no small feat, mind
you — it is time to optimize, polish, and perfect. The Veritas suite
of tools doesn’t stop with getting you to the cloud; they aim for
perfection once you get there.
28 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Fortunately, Veritas makes it easy to configure data protection
processes — workflows and all. The Veritas Resiliency Platform
provides a swarm of features to tie together multiple clouds for
your backup and workload:
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Making sure you are ready for change
Chapter 5
Futureproofing Your
Data Protection
Investment
L
ooking ahead is tough in the tech world. The business
changes, the databases change, the providers change, and
the needs of the users change. It isn’t possible to stay on top
of everything, all the time.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Safeguarding Your Workloads
Current data protection systems just can’t keep up with microser-
vices, Docker containers, Kubernetes, and the pace of software
development and big data these days. The existing client model
depends too much on the traditional server layout from 15 years
ago. The old model simply can’t deal with virtualization without
massive duplication.
You can back up the entire container, of course, and even shift it
to the cloud for disaster recovery to a second location. Your stor-
age costs will be astronomical because of data duplication. The
only way to get the data raw for deduplication is to have some sort
of streaming service available.
32 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Just when you think, “Nah, I have too many diverse endpoints,”
I get to tell you that the endpoint API makes it super simple for
Veritas or a third party to whip out new connectors in nothing flat.
The fact that the Automated Discovery wizard will find new data
as needed to back up is not new news — most data protection
solutions do that. NetBackup also finds what data has already
been backed up in order to reduce duplication!
Virtual machine (VM) admins will find the support for VMware
Cloud Foundation helpful. The agentless architecture of Parallel
Streaming takes the issue of maintaining client access to the VMs
off of their task list, and they will love you forever for it.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Operations teams in charge of hyperconverged infrastructures are
boosting organizations’ efficiency, but data protection is usually a
mess. NetBackup is designed up front for multi-cloud. For exam-
ple, the Nutanix plugin for NetBackup is the new hotness (well,
at least at press time) and it was developed just a short time after
the data connector went into production. Veritas has multi-cloud
covered.
34 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
NetBackup supports workload and database backup under one
“pane of glass” by design, with little client configuration. It’s “set
and forget” too, because parallel streaming reports new targets as
they are discovered. Then you can look at them all in one place.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Fitting data protection into data
management
»» Leveraging NetBackup
Chapter 6
Almost Ten Elements
to Paint the Complete
Picture
T
here might be ten points that I would like to have you walk
away remembering after reading this book, but I settled on
eight of them to paint the whole picture. I don’t want things
getting too spread out, after all.
The trick is, this includes recovery. When folks include “retrieve”
in that definition, the assumption is that they are talking about
the “R” in a CRUD transaction — Retrieve. However, that isn’t the
only kind of retrieval folks are interested in.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The Foundational Element:
Data Protection
At the lowest level, this book is about data protection. This is
when you go to retrieve your data and it isn’t there. How an orga-
nization deals with things going wrong defines the organization,
and that is the core of data protection.
The bits and bytes aren’t the only things that are important in
data protection. An organization needs to get up and running, not
just get access to the tables and rows. Workloads, and a place to
run them, are as important as the data.
Data Visibility
Speaking of the flow, spare a minute to consider the plight of
the poor data protection team trying to keep track of all of this.
For traditional backup schemes, one person is tasked with watch-
ing a few of many different schemes and reporting to a central
facility.
With NetBackup, the data protection team has one pane of glass
to watch and one dashboard to look at for all of the ins and outs
of data management. Location, optimization, legal compliance —
it’s all in one place.
38 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Storage Optimization
Backing up virtual machines (VMs) is imprecise. Lots of informa-
tion is duplicated between VMs. If you simply copy the bytes to
the cloud, you’ll create a massive waste of space.
With tools like Cloud Catalyst and others within the NetBackup
suite, backing up smarter rather than harder is the goal. I can’t
even believe that the toolset will tag duplicate items and remem-
ber where they go, so even though they only get backed up once,
they get replicated multiple times based on the replication pat-
tern. That’s some next-level storage optimization.
Digital Compliance
Compliance is becoming more of a consideration as the public
becomes more concerned with privacy and security. First came
the Payment Card Industry Data Security Standard (PCI DSS) and
Health Insurance Portability and Accountability Act (HIPAA), then
the Sarbanes-Oxley Act, and now the General Data Protection
Regulation (GDPR).
Business Continuity
In some ways, an organization can be measured based on how
it handles disaster recovery. Do you really understand your data
flows? If you aren’t sure, you’ll find out fast when you lose a data
center to a tornado.
When you can get back up and running after something terrible
happens — weather, ransomware, cyberattack, bad elements —
that’s when you have a handle on business continuity. This is the
goal of NetBackup and its tools: to get you back up and running
as fast as possible so you can stay in business as long as possible.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
360 Data Management
When things go poorly, isn’t it great to have one place to go and
find the answers that the board needs, figure out where to move
that processing job, get that data bask from the compromised
database?
That’s what Veritas is shooting for and I think they nailed it.
40 Unified Enterprise Data Protection For Dummies, Veritas Technologies Special Edition
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
WILEY END USER LICENSE AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.