SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
IBM Systems and Technology            IBM System Storage




Efficient, fast and reliable backup
and recovery solutions featuring
IBM ProtecTIER deduplication
Protect More. Store Less.®
2   Efficient, fast and reliable backup and recovery solutions featuring IBM ProtecTIER deduplication




IBM® ProtecTIER® offers revolutionary and patented inline
deduplication technology that enables you to easily harness the
power of deduplication to more efficiently and reliably protect
and retain data longer and helps save money by reducing energy,
f loor space and maintenance requirements.

Design factors to consider when
evaluating deduplication solutions
When evaluating deduplication solutions, there are five impor-
tant design factors to consider. Understanding these factors can
help ensure that the deduplication solution you select today will
meet your needs well into the future.

Performance                                                                                             (11.5 TB/hr) or more sustained recovery performance.
With data growing at an exponential rate and backup windows                                             IBM performance numbers are based on real customers running
shrinking, the deduplication solution you choose needs to be                                            ProtecTIER in production environments, not theoretical
able to backup and, more importantly, recover data as fast as                                           numbers achievable only in a vendor’s lab.
possible.
                                                                                                        Capacity
Some deduplication vendors use post-processing because their                                            Business requirements are driving the need to retain large and
technology is too slow to deduplicate inline. Some tout impres-                                         ever-growing amounts of data onsite, and to be able to restore that
sive performance results that are only theoretically achievable                                         data quickly when needed.
in lab environments with optimized data sets that contain
100 percent redundant data, not the true performance you                                                ProtecTIER is designed to easily scale and handle growing data
would see in a production environment. Others optimize their                                            requirements for organizations of all sizes. ProtecTIER offers a
products to deliver impressive backup performance but hide the                                          revolutionary deduplication technology that helps enable the
fact that restoring data from those systems will be painfully slow.                                     disk repository of a single ProtecTIER server to scale up to 1 PB
                                                                                                        without negatively affecting performance. And unlike hash-based
ProtecTIER solutions provide inline deduplication that helps                                            deduplication products whose hash table grows linearly with the
eliminate redundant data in real time as it is being received from                                      amount of data stored, the patented ProtecTIER technology is
backup servers. A single ProtecTIER solution is designed to                                             designed to manage a petabyte repository with only a 4 GB
provide up to 2500 MBps (9 TB an hour) or more sustained                                                index file.
backup throughput and even faster restores at up to 3200 MBps
IBM Systems and Technology   3




Data integrity
Information is your company’s lifeblood, and data integrity is essential.
The deduplication solution you choose must ensure that your data is
secure.

Most deduplication products on the market today use a hashing
algorithm to determine if data is a duplicate. With these prod-
ucts, there is the possibility that unique data will be discarded,
resulting in data corruption. ProtecTIER has a unique dedupli-
cation technology that takes a non hash-based approach that
performs a bit-for-bit comparison of data before deduplication.
With this approach, there is a reduced risk of unique data being
discarded due to a hash collision.
                                                                            been tested and proven in production environments with perfor-
                                                                            mance and capacity requirements similar to your own. Verify
Non-disruption                                                              that the solution you choose is backed by quality and timely ven-
With increasing pressure to improve service levels, the deduplication
                                                                            dor support that will protect your investment for the long term.
solution you choose must perform without disrupting daily production
operations.                                                                 Building a Backup and Recovery Solution
                                                                            Storage management software works in concert with storage
With post-processing products, backup administrators already                hardware to help reduce the risks associated with data loss while
struggling to stay within backup windows also have to deal with             helping to manage costs, reduce complexity, and address compli-
an additional “deduplication window” that is designed to take               ance with regulatory data retention requirements. IBM Tivoli®
four times as long to complete, bringing production operations              Storage Manager (TSM) offers centralized protection based on
to a halt. ProtecTIER’s high-performance inline deduplication               smart-move and smart-store technology providing faster backups
approach helps ensure that backup windows are met and that                  and restores that require lesser network and storage resources.
data is available for restore operations immediately.
                                                                            Combining the data protection capabilities of TSM with
Production proven                                                           IBM ProtecTIER solutions helps reduce the time and cost
Although deduplication is not a new technology, many vendors failed to      associated with managing backup and recovery processes and
recognize its importance and are late to provide proven offerings.          helps eliminate cumbersome tape media management and main-
                                                                            tenance activities like tape head cleaning and tape re-tensioning.
Since ProtecTIER was introduced in 2005, more than 182 PB
of physical capacity have been deployed behind ProtecTIER                   IBM ProtecTIER solutions also support other leading backup
servers into production environments in various industries                  and recovery applications.
around the world—more than any other vendor in the market
today. Make sure that the deduplication solution you choose has
4     Efficient, fast and reliable backup and recovery solutions featuring IBM ProtecTIER deduplication




    IBM System Storage TS7600 ProtecTIER family at a glance
                                                            5.4 - 11 TB Appliance             7 - 36 TB Appliance   36 TB Appliance   Gateway
                                                            Express                                                 Cluster
    Solution capabilities
    Deduplication method                                    Inline                            Inline                Inline            Inline
    Deduplication technology                                HyperFactor®                      HyperFactor           HyperFactor       HyperFactor
    Backup performance (per node)                           Up to 100 MBps                    Up to 500 MBps        Up to 500 MBps    Up to 1600 MBps (5.7 TB/hr)
    Backup performance (two node cluster)                                                                           Up to 500 MBps    Up to 2500 MBps (9 TB/hr)
    Restore performance (per node)                          Up to 100 MBps                    Up to 500 MBps        Up to 500 MBps    Up to 2000 MBps (7.2 TB/hr)
    Restore performance (two node cluster)                                                                          Up to 500 MBps    Up to 3200 MBps (11.5 TB/hr)
    Useable physical capacity                               5.4 or 11 TB                      7, 18 or 36 TB        36 TB             Up to 1 PB
    Nominal capacity      1                                 Up to 275 TB                      Up to 900 TB          Up to 900 TB      Up to 25 PB
    Virtual libraries per repository                        4                                 12                    12                16
    Virtual drives (per node)                               64                                256                   256               256
    Virtual drives (two node cluster)                                                                               512               512
    Virtual cartridges                                      8192                              128 K                 128 K             512 K
    File systems per repository (CIFS)                      Up to 4                           Up to 128             Up to 128         Up to 128
    Files per file system (CIFS)                            Up to 1M                          Up to 1M              Up to 1M          Up to 1M
    Files per repository (CIFS)                             Up to 4M                          Up to 16M             Up to 16M         Up to 16M
Notes
For more information
To learn more about how IBM ProtecTIER deduplication
solutions can help you protect data more efficiently and reliably,
contact your IBM representative or IBM Business Partner, or
visit: ibm.com/systems/storage/tape/protectier
                                                                     	 © Copyright IBM Corporation 2012

                                                                     	 IBM Systems and Technology Group
                                                                       Route 100
                                                                       Somers, NY 10589

                                                                     	 Produced in the United States of America
                                                                       May 2012

                                                                     	 IBM, the IBM logo, ibm.com, Protect More. Store Less, ProtecTIER,
                                                                       Tivoli, HyperFactor, and System Storage are trademarks or registered
                                                                       trademarks of International Business Machines Corp. registered in many
                                                                       jurisdictions worldwide. Other product and service names might be
                                                                       trademarks of IBM or other companies. A current list of IBM trademarks
                                                                       is available on the web at “Copyright and trademark information” at
                                                                          ibm.com/legal/copytrade.shtml

                                                                     	 This document is current as of the initial date of publication and may be
                                                                       changed by IBM at any time. Not all offerings are available in every country
                                                                       in which IBM operates.

                                                                     	 The performance data discussed herein is presented as derived under specific
                                                                       operating conditions. Actual results may vary. It is the user’s responsibility to
                                                                       evaluate and verify the operation of any other products or programs with
                                                                       IBM products and programs.

                                                                     	 Actual available storage capacity may be reported for both uncompressed and
                                                                       compressed data and will vary and may be less than stated.

                                                                      1
                                                                          Assuming a 25:1 deduplication ratio


                                                                                   Please Recycle




                                                                                                                                 TSB03014-USEN-04

Contenu connexe

Plus de IBM India Smarter Computing

A Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization PerformanceA Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization PerformanceIBM India Smarter Computing
 
IBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architectureIBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architectureIBM India Smarter Computing
 
Infrastructure Matters 2014 IBM systems and servers
Infrastructure Matters 2014 IBM systems and serversInfrastructure Matters 2014 IBM systems and servers
Infrastructure Matters 2014 IBM systems and serversIBM India Smarter Computing
 
Implementing IBM SmartCloud Entry on IBM PureFlex System
Implementing IBM SmartCloud Entry on IBM PureFlex SystemImplementing IBM SmartCloud Entry on IBM PureFlex System
Implementing IBM SmartCloud Entry on IBM PureFlex SystemIBM India Smarter Computing
 
IBM PureFlex Solution for SAP Business Suite (POWER / AIX)
IBM PureFlex Solution for SAP Business Suite (POWER / AIX)IBM PureFlex Solution for SAP Business Suite (POWER / AIX)
IBM PureFlex Solution for SAP Business Suite (POWER / AIX)IBM India Smarter Computing
 
IBM SmartCloud Virtual Desktop Infrastructure for Microsoft Windows Server 20...
IBM SmartCloud Virtual Desktop Infrastructure for Microsoft Windows Server 20...IBM SmartCloud Virtual Desktop Infrastructure for Microsoft Windows Server 20...
IBM SmartCloud Virtual Desktop Infrastructure for Microsoft Windows Server 20...IBM India Smarter Computing
 
IBM Flex System Reference Architecture for Microsoft SQL Server 2012 High Ava...
IBM Flex System Reference Architecture for Microsoft SQL Server 2012 High Ava...IBM Flex System Reference Architecture for Microsoft SQL Server 2012 High Ava...
IBM Flex System Reference Architecture for Microsoft SQL Server 2012 High Ava...IBM India Smarter Computing
 

Plus de IBM India Smarter Computing (20)

IBM System x3300 M4
IBM System x3300 M4IBM System x3300 M4
IBM System x3300 M4
 
IBM System x iDataPlex dx360 M4
IBM System x iDataPlex dx360 M4IBM System x iDataPlex dx360 M4
IBM System x iDataPlex dx360 M4
 
IBM System x3500 M4
IBM System x3500 M4IBM System x3500 M4
IBM System x3500 M4
 
IBM System x3550 M4
IBM System x3550 M4IBM System x3550 M4
IBM System x3550 M4
 
IBM System x3650 M4
IBM System x3650 M4IBM System x3650 M4
IBM System x3650 M4
 
IBM System x3500 M3
IBM System x3500 M3IBM System x3500 M3
IBM System x3500 M3
 
IBM System x3400 M3
IBM System x3400 M3IBM System x3400 M3
IBM System x3400 M3
 
IBM System x3250 M3
IBM System x3250 M3IBM System x3250 M3
IBM System x3250 M3
 
IBM System x3200 M3
IBM System x3200 M3IBM System x3200 M3
IBM System x3200 M3
 
IBM PowerVC Introduction and Configuration
IBM PowerVC Introduction and ConfigurationIBM PowerVC Introduction and Configuration
IBM PowerVC Introduction and Configuration
 
A Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization PerformanceA Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization Performance
 
IBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architectureIBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architecture
 
X6: The sixth generation of EXA Technology
X6: The sixth generation of EXA TechnologyX6: The sixth generation of EXA Technology
X6: The sixth generation of EXA Technology
 
Stephen Leonard IBM Big Data and cloud
Stephen Leonard IBM Big Data and cloudStephen Leonard IBM Big Data and cloud
Stephen Leonard IBM Big Data and cloud
 
Infrastructure Matters 2014 IBM systems and servers
Infrastructure Matters 2014 IBM systems and serversInfrastructure Matters 2014 IBM systems and servers
Infrastructure Matters 2014 IBM systems and servers
 
Implementing IBM SmartCloud Entry on IBM PureFlex System
Implementing IBM SmartCloud Entry on IBM PureFlex SystemImplementing IBM SmartCloud Entry on IBM PureFlex System
Implementing IBM SmartCloud Entry on IBM PureFlex System
 
IBM PureFlex Solution for SAP Business Suite (POWER / AIX)
IBM PureFlex Solution for SAP Business Suite (POWER / AIX)IBM PureFlex Solution for SAP Business Suite (POWER / AIX)
IBM PureFlex Solution for SAP Business Suite (POWER / AIX)
 
IBM SmartCloud Virtual Desktop Infrastructure for Microsoft Windows Server 20...
IBM SmartCloud Virtual Desktop Infrastructure for Microsoft Windows Server 20...IBM SmartCloud Virtual Desktop Infrastructure for Microsoft Windows Server 20...
IBM SmartCloud Virtual Desktop Infrastructure for Microsoft Windows Server 20...
 
IBM SmartCloud Desktop Infrastructure
IBM SmartCloud Desktop Infrastructure IBM SmartCloud Desktop Infrastructure
IBM SmartCloud Desktop Infrastructure
 
IBM Flex System Reference Architecture for Microsoft SQL Server 2012 High Ava...
IBM Flex System Reference Architecture for Microsoft SQL Server 2012 High Ava...IBM Flex System Reference Architecture for Microsoft SQL Server 2012 High Ava...
IBM Flex System Reference Architecture for Microsoft SQL Server 2012 High Ava...
 

Dernier

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Dernier (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Efficient, fast and reliable backup and recovery solutions featuring IBM ProtecTIER deduplication

  • 1. IBM Systems and Technology IBM System Storage Efficient, fast and reliable backup and recovery solutions featuring IBM ProtecTIER deduplication Protect More. Store Less.®
  • 2. 2 Efficient, fast and reliable backup and recovery solutions featuring IBM ProtecTIER deduplication IBM® ProtecTIER® offers revolutionary and patented inline deduplication technology that enables you to easily harness the power of deduplication to more efficiently and reliably protect and retain data longer and helps save money by reducing energy, f loor space and maintenance requirements. Design factors to consider when evaluating deduplication solutions When evaluating deduplication solutions, there are five impor- tant design factors to consider. Understanding these factors can help ensure that the deduplication solution you select today will meet your needs well into the future. Performance (11.5 TB/hr) or more sustained recovery performance. With data growing at an exponential rate and backup windows IBM performance numbers are based on real customers running shrinking, the deduplication solution you choose needs to be ProtecTIER in production environments, not theoretical able to backup and, more importantly, recover data as fast as numbers achievable only in a vendor’s lab. possible. Capacity Some deduplication vendors use post-processing because their Business requirements are driving the need to retain large and technology is too slow to deduplicate inline. Some tout impres- ever-growing amounts of data onsite, and to be able to restore that sive performance results that are only theoretically achievable data quickly when needed. in lab environments with optimized data sets that contain 100 percent redundant data, not the true performance you ProtecTIER is designed to easily scale and handle growing data would see in a production environment. Others optimize their requirements for organizations of all sizes. ProtecTIER offers a products to deliver impressive backup performance but hide the revolutionary deduplication technology that helps enable the fact that restoring data from those systems will be painfully slow. disk repository of a single ProtecTIER server to scale up to 1 PB without negatively affecting performance. And unlike hash-based ProtecTIER solutions provide inline deduplication that helps deduplication products whose hash table grows linearly with the eliminate redundant data in real time as it is being received from amount of data stored, the patented ProtecTIER technology is backup servers. A single ProtecTIER solution is designed to designed to manage a petabyte repository with only a 4 GB provide up to 2500 MBps (9 TB an hour) or more sustained index file. backup throughput and even faster restores at up to 3200 MBps
  • 3. IBM Systems and Technology 3 Data integrity Information is your company’s lifeblood, and data integrity is essential. The deduplication solution you choose must ensure that your data is secure. Most deduplication products on the market today use a hashing algorithm to determine if data is a duplicate. With these prod- ucts, there is the possibility that unique data will be discarded, resulting in data corruption. ProtecTIER has a unique dedupli- cation technology that takes a non hash-based approach that performs a bit-for-bit comparison of data before deduplication. With this approach, there is a reduced risk of unique data being discarded due to a hash collision. been tested and proven in production environments with perfor- mance and capacity requirements similar to your own. Verify Non-disruption that the solution you choose is backed by quality and timely ven- With increasing pressure to improve service levels, the deduplication dor support that will protect your investment for the long term. solution you choose must perform without disrupting daily production operations. Building a Backup and Recovery Solution Storage management software works in concert with storage With post-processing products, backup administrators already hardware to help reduce the risks associated with data loss while struggling to stay within backup windows also have to deal with helping to manage costs, reduce complexity, and address compli- an additional “deduplication window” that is designed to take ance with regulatory data retention requirements. IBM Tivoli® four times as long to complete, bringing production operations Storage Manager (TSM) offers centralized protection based on to a halt. ProtecTIER’s high-performance inline deduplication smart-move and smart-store technology providing faster backups approach helps ensure that backup windows are met and that and restores that require lesser network and storage resources. data is available for restore operations immediately. Combining the data protection capabilities of TSM with Production proven IBM ProtecTIER solutions helps reduce the time and cost Although deduplication is not a new technology, many vendors failed to associated with managing backup and recovery processes and recognize its importance and are late to provide proven offerings. helps eliminate cumbersome tape media management and main- tenance activities like tape head cleaning and tape re-tensioning. Since ProtecTIER was introduced in 2005, more than 182 PB of physical capacity have been deployed behind ProtecTIER IBM ProtecTIER solutions also support other leading backup servers into production environments in various industries and recovery applications. around the world—more than any other vendor in the market today. Make sure that the deduplication solution you choose has
  • 4. 4 Efficient, fast and reliable backup and recovery solutions featuring IBM ProtecTIER deduplication IBM System Storage TS7600 ProtecTIER family at a glance 5.4 - 11 TB Appliance 7 - 36 TB Appliance 36 TB Appliance Gateway Express Cluster Solution capabilities Deduplication method Inline Inline Inline Inline Deduplication technology HyperFactor® HyperFactor HyperFactor HyperFactor Backup performance (per node) Up to 100 MBps Up to 500 MBps Up to 500 MBps Up to 1600 MBps (5.7 TB/hr) Backup performance (two node cluster) Up to 500 MBps Up to 2500 MBps (9 TB/hr) Restore performance (per node) Up to 100 MBps Up to 500 MBps Up to 500 MBps Up to 2000 MBps (7.2 TB/hr) Restore performance (two node cluster) Up to 500 MBps Up to 3200 MBps (11.5 TB/hr) Useable physical capacity 5.4 or 11 TB 7, 18 or 36 TB 36 TB Up to 1 PB Nominal capacity 1 Up to 275 TB Up to 900 TB Up to 900 TB Up to 25 PB Virtual libraries per repository 4 12 12 16 Virtual drives (per node) 64 256 256 256 Virtual drives (two node cluster) 512 512 Virtual cartridges 8192 128 K 128 K 512 K File systems per repository (CIFS) Up to 4 Up to 128 Up to 128 Up to 128 Files per file system (CIFS) Up to 1M Up to 1M Up to 1M Up to 1M Files per repository (CIFS) Up to 4M Up to 16M Up to 16M Up to 16M
  • 6. For more information To learn more about how IBM ProtecTIER deduplication solutions can help you protect data more efficiently and reliably, contact your IBM representative or IBM Business Partner, or visit: ibm.com/systems/storage/tape/protectier © Copyright IBM Corporation 2012 IBM Systems and Technology Group Route 100 Somers, NY 10589 Produced in the United States of America May 2012 IBM, the IBM logo, ibm.com, Protect More. Store Less, ProtecTIER, Tivoli, HyperFactor, and System Storage are trademarks or registered trademarks of International Business Machines Corp. registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. The performance data discussed herein is presented as derived under specific operating conditions. Actual results may vary. It is the user’s responsibility to evaluate and verify the operation of any other products or programs with IBM products and programs. Actual available storage capacity may be reported for both uncompressed and compressed data and will vary and may be less than stated. 1 Assuming a 25:1 deduplication ratio Please Recycle TSB03014-USEN-04