Transcript Slide 1

Double-Take Software Overview
A Platform for Recoverability
www.doubletake.com
Agenda
• Introduction to Double-Take Software
• Double-Take Software Products and Technology
• Client testomonial
• Q&A
www.doubletake.com
About Double-Take Software, Inc.
Leading Provider of Software Solutions for Recoverability Including Continuous Data
Replication, Application Availability and System State Protection.
• Headquartered in Southborough, MA
• Worldwide Reach - North America, South America,
Europe, Pacific Rim
• Focused on the protection of business-critical applications
– 125,000 licenses of Double-Take in over 10,000 customers
– 35,000+ licenses protecting Exchange
– 35,000+ licenses to protecting SQL
• Comprehensive Professional Services Offerings
• Prestigious Microsoft Certifications
www.doubletake.com
Your Solution Needs
• What challenges are you facing in your DR plan?
• What types of servers do you want to protect?
• About how much data do you have to protect?
• Have you chosen a DR Site?
• What kind of connection will you have?
• Do you have an RTO and RPO defined?
www.doubletake.com
The Keys to Recoverability
Replication
Host-based, real-time, byte-level, asynchronous replication across any
distance with WAN optimization to minimize bandwidth usage and
requirements
Failover
Real-time monitoring for automatic or manual failover for individual
applications, file shares, and whole servers - locally or remotely
Recovery
Recover data or entire servers over any distance while users remain
online, with minimum downtime
www.doubletake.com
Data Protection
• System Friendly Asynchronous Replication
– Low CPU Overhead
– Defined Memory and Disk Usage
– Write Order Intact Replication
• Bandwidth Friendly Data Movement
– User-definable Replication Sets
– Compression, Scheduling, Scheduled Bandwidth
Throttling capabilities
• Point-in-Time Recovery
– Integration w/Volume Shadow Copy Services
www.doubletake.com
Double-Take – Technology Overview
Source
Target
Applications
Applications
OS
OS
Double -Take Filter
Disk
Systems
Disk
Systems
www.doubletake.com
Double-Take – Technology Overview
Source
I/O Operations examined
in Kernel Memory
Applications
Protected
File?
OS
Write or
Change?
Yes
No
Disk
Systems
www.doubletake.com
Double-Take – Technology Overview
Always:
Target
Same I/O order
Same Data
Applications
Same File
Option:
OS
Different Directory
Disk
Systems
www.doubletake.com
Double-Take – Queuing and Error Correction
Send
Queue
Source
Applications
OS
Target
Applications
OS
Rcv
Queue
Double-Take Filter
Ack
Queue
Disk
Systems
Disk
Systems
www.doubletake.com
Failover Solutions
• Application-Level Failover (RTO = ~30min)
– Applications like Exchange, SQL and File Servers using
the Application Manager capabilities
– Works with Cluster-based Deployments
• Full-Server Failover (RTO = ~30min)
– Custom-developed applications or applications
dependent on system state information
– Replicate and Failover OS, Applications and Data
– Works for all stand-alone Windows Servers
– Assists in One-to-One Server Migrations
www.doubletake.com
How Application Failover Works
Source
Target
Replication
Failover Monitoring
• IP ICMP or Heartbeat Monitoring
• Application Services Started
• Detect Failure in Seconds or Minutes
• Failover Name, IP and/or DNS Records
• Failover Active Directory Hostname
• Users can reconnect within minutes of failure
• Failover can occur across a LAN, WAN and even NAT
• Failover more than one Server Identity to the Same Target Server
• Failover Scripting for Custom Configurations
www.doubletake.com
How Application Failback Works
Source
Target
Restoration
Replication
Failover Monitoring
• Recover or Replace Source Server
• Failback Source Identity
• Restore Data to the Source Server
• Bring Source Application Online
• Users Reconnect Within Minutes
• Start Replication and Resume Failover Monitoring for Continued Protection
www.doubletake.com
How Full-Server Failover Works
Staging Area
OS and Applications
Data Volumes
User and Application Data
www.doubletake.com
Server Recovery Option
•
•
•
•
•
Tier 2/Tier 3 Server Recovery (RTO = 4-24 hours)
Same Recovery Type as FFO
Local, Remote or Both
Restore to Physical or Virtual Systems
Assists with “Swing-Server” Migrations
www.doubletake.com
Double-Take Server Recovery Option
Protect Multiple Production
Servers With One SRO
Image Server
Recover Back to the Original
Server, to New Hardware, or to a
Virtual Machine
www.doubletake.com
Double-Take Virtual Recovery Assistant
• Protect physical or virtual servers directly into
VMWare .VMDK files with real-time replication
• Protect the entire server including the OS,
applications and data
• Protect multiple source servers with a single
virtual target server
• Failover automatically or manually within
minutes
• Lower TCO with virtualization and many-to-one
consolidation.
www.doubletake.com
Virtual Recovery Assistant
C:
FS-System
E:
FS-Data
DT-VRA
DT-VRA
C:
C:
System.vmdk
System.vmdk
FS-System.vmdk
EX-System.vmdk
C: FS-System.vmdk
File Server
C:
E:
EX-System
EX-Data
FS-Data.vmdk
E: FS-Data.vmdk
EX-Data.vmdk
File Server
EX-System.vmdk
DB-System.vmdk
EX-Data.vmdk
DB-Data.vmdk
Exchange
DB-System.vmdk
C:
DB-System
E:
DB-Data
DB-Data.vmdk
Database
www.doubletake.com
How DTVI Works
• Must be running ESX Server 3.0.0 and VMware
VirtualCenter 2.0.0
• Leverages VMware APIs for virtual machine
snapshot functionality
• Snapshots include the entire VM (OS, Apps, Data)
and can be used with a non-Windows Guest OS
• Snapshots are time-coherent across all virtual
disks configured for a protected virtual machine
• Extends staging of virtual machines across
geographical boundaries (WAN replication)
www.doubletake.com
How DTVI Works
Administrative
Client
Web
Services
SSH
SSH
Monitoring (Time/Size)
Source ESX
Server
Replica VM Files
Source VM Files
*.vmdk
*-flat.vmdk
*.vmx
Target ESX
Server
Synchronizing (SCP)
Committing (remove_snapshot)
*-delta.vmdk
*.vmsd
Datastore (Source)
Replicating (SCP)
*-delta.vmdk
*.vmsd
Datastore (Target)
www.doubletake.com
Greg Saraydarian
Financial Services Organization
www.doubletake.com
Customer Solution
• Solution set for data protection and availability
• Used:
– Double-Take Replication
– Double-Take Application Manager
• Protecting/has protected several versions of
Exchange Server
www.doubletake.com
Q&A
www.doubletake.com
Thanks!
For More Information
http://www.double-take.com
You may close the webinar window at
any time.
www.doubletake.com