Our second year of Data Protection Workshops, in conjunction with TechTarget/Storage Decisions, are underway and coming to a city near you. The theme of this year’s sessions will be breaking the rules of data protection to meet the stricter and stricter recovery expectations being placed on IT from users and application owners. We will deep dive through specific data protection designs and you will leave the seminar with an actionable strategy for 2015. To sign up please register here.
Service Levels the Foundation of Data Protection Success
The first session will be a bit of a review. We will review the service level objective (SLO) strategy that we introduced in 2014. In addition to a refresh there will be plenty of new data points and implementation techniques that we have fine tuned in the last year. If you’re new to the workshop, you’ll learn how SLOs are essential to a successful data protection strategy. If you attended last years session, these new techniques will help you complete your SLO implementation.
Design Deep Dive – Self Protecting Primary vs. Backup as Primary
The second session is where we focus on detailed designs to help you meet, and even exceed, the expectations of your service levels. We will discuss two somewhat competing designs that can be implemented using a variety of vendors. The first is what we call “self-protecting primary storage”. Primary storage has plenty of data protection capabilities that often go unused. This design puts those capabilities in play and we work around the weaknesses of counting on primary storage for data protection.
The other design elevates the backup process, giving it the capability to replace primary storage by leveraging features like recovery in place and change block tracked backups. But this requires a change in hardware and software that are used. We will cover how these changes can fulfill the promise of a backup that replaces primary storage.
More Than Data Protection
Also in session two, we will show how both of these designs allow you to leverage the data protection process for more than just data protection. Imagine using your data protection process to meet the needs of test/dev, compliance, and business analytics. We will wrap up session two by comparing these designs and providing some suggestions about which one makes sense in each of your data centers.
The Cloud and the Future of Data Protection
In session three we will go deep into detail on the cloud and the future of data protection. Almost every IT professional we speak with is wondering how exactly they should use the cloud to solve real problems. In this session we go beyond the hype and talk about how to best implement hybrid cloud backup, hybrid cloud compute and file sync and share.
Keep All Data Forever
We will wrap up session three with the most important design of the day, a “forever design”. Data retention expectations are getting out of control and the answer is quickly becoming keep all data forever. In this session we will talk about why an organization would actually want to do that and how exactly to build a cost effective forever retention design.
That’s a packed set of three sessions that I hope you can attend. You will have fun, you will learn a lot and you will walk away with designs that you can start deploying right now.