Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50%...
Transcript of Big Data & Why Open Source Protection · Big Data & Open Source Protection Why & How. ... • 50%...
Mark Coletta
Sr. Product Manager, NetBackup Veritas Technologies
Big Data & Open Source Protection
Why&
How
Why do I need to protect my databases
Drivers for rapid adoption
• Digital Transformation
• Multi-Cloud
• Agility & Cost
NoSQL/Open Source databases are now the norm
• 78% of organizations reporting using NoSQL or Open Source database
• 50% of organizations leveraging Hadoop/HBase
3
Big Data and Open Source Database adoption
Databases In Use
69%
54%
27%
19%
15%
12%
8%
0% 10% 20% 30% 40% 50% 60% 70% 80%
MySQL
MongoDB
PostgreSQL
Cassandra
MariaDB
HBase
SQLite
Source: Gatepoint Reseach, May 2019
Data Protection Challenges
Big data analytics40%
Open source databases28%
Virtualized16%
Public Cloud12%
Hyperconverged4%
Source: Gatepoint Reseach, May 2019
Measures to ensure conformity of policies and
laws
• Identification• Evaluation • Reporting/Auditing
• Corporate Management• Business Strategy• Policy Management
6
Risk
Compliance
Governance
7
Natural Disasters | Regional Impacts
Power Outages; 36
Network; 25
IT Systems; 22
Security Issues; 6
Unknow, 5
Fire; 3
Fire Suppression
Cooling or Mechanical; 1
Causes of 100 Major Public OutagesJan 2016 - Jun 2018
Localized Business Impacts
8
Root causes of unplanned outages:
1. Power outages
2. Network
3. Software error
4. Cyber Security Incident/ Ransomware
5. Unknown
6. Fire
80% were preventable with technology resiliency
Uptime Institute Focus June 2018
*285 data centers across the US from 16 industry verticals
Source: Uptime Institute - June 2018
Ransomware attacks becoming more frequent
Any Company / Sector
WiPro
Russian and Ukrainian Banks
Maersk & Co
In 2017 the FBI’s Internet Crime Complaint Center (IC3) estimated that ransomware attacks cost companies $2.3M
9
Cyber Security and Ransomware
How do I protect myself
11
Data Protection Strategy Considerations
Time
➢ Downtime➢ Time to recover➢ Protection/Recovery
tasks
Cost
➢ Downtime➢ Infrastructure➢ Storage
Complexity
➢ Management➢ Infrastructure
12
Recovery Point Objective / Recovery Time Objective
Time
Last time data
was useable
Incident System fully
operational
RPOHow far back to recover?
RTOHow long to recover?
Manual Backup/Recovery
Snapshot/Replication
Backup Software
13
Types of Protection/Recovery
14
Manual Backup/Recovery
Con
➢ Does not protect against human error or
malicious activity
➢ Data may be unrecoverable/re-creatable➢ Compliance verification
➢ Customer confidence
➢ High RTO➢ Little/No RPO
➢ No Long term retention
➢ Time consuming for personnel
Pro
➢ Less infrastructure resources
➢ Less planning
➢ Less upfront cost
15
Snapshot/Replication
Con
➢ Does not protect against human error or
malicious activity
➢ High hardware and Network costs
➢ High maintenance costs
➢ Higher complexity
➢ Snapshot retention requirements
➢ Susceptible to data corruption
➢ No Long term retention capabilities
➢ Planning and design consideration
Pro
➢ Multiple copies
➢ Minimal or no data loss
➢ Short RTO and RPO
➢ Failover/Failback (automatic or manual)
➢ Fast restore from snapshot
16
Backup Software
Con
➢ Initial investment cost
➢ Planning and design consideration
➢ Media Failure
➢ Cost to manage
Pro
➢ Long Term retention
➢ Resources based on usage
➢ Compliance verification
➢ Confidence in recoverability
➢ RTO/RPO based on needs
➢ Can leverage snapshots
➢ Protects against human error or
malicious activity
17
How much is your data worth?
How much are you willing to risk?
AND
18
The mean cost of an unplanned outage is $8,851 per minute or $530,000 per hour.*
* 2016, Ponemon Institute, “The Cost of Data Center Outages”
Q & A
Click to add text
Thank you!
Copyright © 2018 Veritas Technologies. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Mark Coletta