Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50%...

20
Mark Coletta Sr. Product Manager, NetBackup Veritas Technologies Big Data & Open Source Protection Why & How

Transcript of Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50%...

Page 1: Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50% of organizations leveraging Hadoop/HBase 3 Big Data and Open Source Database adoption.

Mark Coletta

Sr. Product Manager, NetBackup Veritas Technologies

Big Data & Open Source Protection

Why&

How

Page 2: Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50% of organizations leveraging Hadoop/HBase 3 Big Data and Open Source Database adoption.

Why do I need to protect my databases

Page 3: Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50% of organizations leveraging Hadoop/HBase 3 Big Data and Open Source Database adoption.

Drivers for rapid adoption

• Digital Transformation

• Multi-Cloud

• Agility & Cost

NoSQL/Open Source databases are now the norm

• 78% of organizations reporting using NoSQL or Open Source database

• 50% of organizations leveraging Hadoop/HBase

3

Big Data and Open Source Database adoption

Page 4: Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50% of organizations leveraging Hadoop/HBase 3 Big Data and Open Source Database adoption.

Databases In Use

69%

54%

27%

19%

15%

12%

8%

0% 10% 20% 30% 40% 50% 60% 70% 80%

MySQL

MongoDB

PostgreSQL

Cassandra

MariaDB

HBase

SQLite

Source: Gatepoint Reseach, May 2019

Page 5: Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50% of organizations leveraging Hadoop/HBase 3 Big Data and Open Source Database adoption.

Data Protection Challenges

Big data analytics40%

Open source databases28%

Virtualized16%

Public Cloud12%

Hyperconverged4%

Source: Gatepoint Reseach, May 2019

Page 6: Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50% of organizations leveraging Hadoop/HBase 3 Big Data and Open Source Database adoption.

Measures to ensure conformity of policies and

laws

• Identification• Evaluation • Reporting/Auditing

• Corporate Management• Business Strategy• Policy Management

6

Risk

Compliance

Governance

Page 7: Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50% of organizations leveraging Hadoop/HBase 3 Big Data and Open Source Database adoption.

7

Natural Disasters | Regional Impacts

Page 8: Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50% of organizations leveraging Hadoop/HBase 3 Big Data and Open Source Database adoption.

Power Outages; 36

Network; 25

IT Systems; 22

Security Issues; 6

Unknow, 5

Fire; 3

Fire Suppression

Cooling or Mechanical; 1

Causes of 100 Major Public OutagesJan 2016 - Jun 2018

Localized Business Impacts

8

Root causes of unplanned outages:

1. Power outages

2. Network

3. Software error

4. Cyber Security Incident/ Ransomware

5. Unknown

6. Fire

80% were preventable with technology resiliency

Uptime Institute Focus June 2018

*285 data centers across the US from 16 industry verticals

Source: Uptime Institute - June 2018

Page 9: Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50% of organizations leveraging Hadoop/HBase 3 Big Data and Open Source Database adoption.

Ransomware attacks becoming more frequent

Any Company / Sector

WiPro

Russian and Ukrainian Banks

Maersk & Co

In 2017 the FBI’s Internet Crime Complaint Center (IC3) estimated that ransomware attacks cost companies $2.3M

9

Cyber Security and Ransomware

Page 10: Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50% of organizations leveraging Hadoop/HBase 3 Big Data and Open Source Database adoption.

How do I protect myself

Page 11: Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50% of organizations leveraging Hadoop/HBase 3 Big Data and Open Source Database adoption.

11

Data Protection Strategy Considerations

Time

➢ Downtime➢ Time to recover➢ Protection/Recovery

tasks

Cost

➢ Downtime➢ Infrastructure➢ Storage

Complexity

➢ Management➢ Infrastructure

Page 12: Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50% of organizations leveraging Hadoop/HBase 3 Big Data and Open Source Database adoption.

12

Recovery Point Objective / Recovery Time Objective

Time

Last time data

was useable

Incident System fully

operational

RPOHow far back to recover?

RTOHow long to recover?

Page 13: Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50% of organizations leveraging Hadoop/HBase 3 Big Data and Open Source Database adoption.

Manual Backup/Recovery

Snapshot/Replication

Backup Software

13

Types of Protection/Recovery

Page 14: Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50% of organizations leveraging Hadoop/HBase 3 Big Data and Open Source Database adoption.

14

Manual Backup/Recovery

Con

➢ Does not protect against human error or

malicious activity

➢ Data may be unrecoverable/re-creatable➢ Compliance verification

➢ Customer confidence

➢ High RTO➢ Little/No RPO

➢ No Long term retention

➢ Time consuming for personnel

Pro

➢ Less infrastructure resources

➢ Less planning

➢ Less upfront cost

Page 15: Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50% of organizations leveraging Hadoop/HBase 3 Big Data and Open Source Database adoption.

15

Snapshot/Replication

Con

➢ Does not protect against human error or

malicious activity

➢ High hardware and Network costs

➢ High maintenance costs

➢ Higher complexity

➢ Snapshot retention requirements

➢ Susceptible to data corruption

➢ No Long term retention capabilities

➢ Planning and design consideration

Pro

➢ Multiple copies

➢ Minimal or no data loss

➢ Short RTO and RPO

➢ Failover/Failback (automatic or manual)

➢ Fast restore from snapshot

Page 16: Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50% of organizations leveraging Hadoop/HBase 3 Big Data and Open Source Database adoption.

16

Backup Software

Con

➢ Initial investment cost

➢ Planning and design consideration

➢ Media Failure

➢ Cost to manage

Pro

➢ Long Term retention

➢ Resources based on usage

➢ Compliance verification

➢ Confidence in recoverability

➢ RTO/RPO based on needs

➢ Can leverage snapshots

➢ Protects against human error or

malicious activity

Page 17: Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50% of organizations leveraging Hadoop/HBase 3 Big Data and Open Source Database adoption.

17

How much is your data worth?

How much are you willing to risk?

AND

Page 18: Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50% of organizations leveraging Hadoop/HBase 3 Big Data and Open Source Database adoption.

18

The mean cost of an unplanned outage is $8,851 per minute or $530,000 per hour.*

* 2016, Ponemon Institute, “The Cost of Data Center Outages”

Page 19: Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50% of organizations leveraging Hadoop/HBase 3 Big Data and Open Source Database adoption.

Q & A

Click to add text

Page 20: Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50% of organizations leveraging Hadoop/HBase 3 Big Data and Open Source Database adoption.

Thank you!

Copyright © 2018 Veritas Technologies. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Mark Coletta

[email protected]