Data backup

An action to prevent data loss caused by system failure
Collection
zero Useful+1
zero
Data backup is Disaster recovery The foundation of Operation error or system failure The process of copying all or part of the data set from the hard disk or array of the application host to other storage media as a result of data loss. Traditional data backup mainly adopts built-in or external Tape drive conduct Cold backup However, this method can only prevent operation errors from being caused by others, and its recovery time is also very long. With the continuous development of technology and the massive increase of data, many enterprises begin to use network backup. Network Backup Generally through professional data storage Management software It is realized by combining corresponding hardware and storage devices. [1]
Chinese name
Data backup
Backup mode
Regular tape
Description
Prevent data loss caused by system failure
Main technologies
LAN Backup

Backup mode

Announce
edit

Regular tape

long-range Tape Library Jukebox Backup. soon data transfer Make a complete backup tape or optical disc at the remote backup center.
Remote critical data+tape backup. Tape backup data is used, and the production machine sends key data to the backup machine in real time.

data base

It is to create a copy of the primary database on the backup machine that is separate from the production machine where the primary database is located.

network data

This method is important for database data and required tracking of the production system Destination file And will update journal It is transmitted to the backup system through the network in real time, and the backup system checks disk Update. [2]

remote mirror

Via high speed Fibre Channel Line and disk The control technology extends the mirror disk far away from the production machine. The mirror disk data is completely consistent with the primary disk data, and the update mode is synchronous or asynchronous.
Data backup must consider data recovery Problems, including the adoption of hot standby Disk mirroring or fault-tolerant Backup tapes stored in different places and key parts redundancy And other disaster prevention measures. These measures can be used for system recovery after system failure. However, these measures can only deal with the single point of computer failure, and they are helpless to deal with regional and devastating disasters disaster recovery Ability.

Main technologies

Announce
edit
LAN backup, LAN Free backup and SAN Server Free backup. LAN backup can be used for all storage types. LAN Free backup and SAN Server Free backup can only be used for storage of SAN architecture.
LAN based backup, traditional backup needs to be installed on each host Tape drive The LAN backup strategy is used to back up the local system. When the amount of data is not large, centralized backup can be used. A central backup server will be installed on the LAN, and then the application server and workstation will be configured as the client of the backup server. The central backup server accepts the request of the backup agent running on the client computer, and transfers the data to the local area it manages and connects with through the LAN Tape drive Resources. This method provides a centralized and easy to manage backup scheme, and shares it in the network Tape drive Resources improve efficiency. [3]
LAN Free Backup Because the data is spread through the LAN, when the amount of data to be backed up is large and the backup time window is tight, the network is prone to congestion. In SAN environment storage Networked LAN Free Backup , the server to be backed up is connected to the Tape drive On the LAN Free backup client software, the data to be backed up is read and backed up to the shared tape drive through the SAN. This independent network can not only transfer LAN traffic, but also requires less CPU resources than LAN mode, because Fibre Channel The connection does not need to go through the TCP/IP stack of the server, and error checking of some layers can be completed by the hardware inside Fibre Channel. Need one in many solutions host To manage shared storage devices and backup databases for finding and restoring data. SAN Server Free Backup LAN Free Backup pair needs backup host If the backup process can be completed within the SAN, and a large number of data streams do not need to flow through the server, the impact of backup operations on the production system can be greatly reduced. SAN Server Free backup is such a technology.

necessity

Announce
edit
Threats to data are usually difficult to prevent. Once these threats become reality, they will not only destroy data, but also destroy the system accessing data. The main reasons for data loss and destruction are as follows.
1、 data processing And access software platform failure.
2. The design vulnerability of the operating system or the "black hole" artificially preset by the designer for hidden purposes.
3. Hardware failure of the system.
4. Human error in operation.
5. Malicious damage of illegal visitors in the network.
6. Network power supply system failure, etc.
The important data, files or historical records in the computer are vital to both enterprise users and individual users. If they are lost carelessly, they will cause immeasurable losses. At least, the hard work accumulated will be wasted. At worst, they will affect the normal operation of enterprises and cause huge losses to scientific research and production.
In order to ensure the normal operation of production, sales and development, enterprise users should take advanced and effective measures to backup data and prevent it before it happens.

gradation

Announce
edit
The determination of disaster recovery level is an important consideration in the construction of information system disaster recovery. The Specification divides disaster recovery capability into 6 levels.
Level 1: Basic support. The data backup system is required to ensure data backup at least once a week, and the backup media can be stored off-site. For standby data processing system And standby network system, no specific requirements.
Level 2: Standby site support. On the basis of meeting the conditions of Grade I, it is required to equip some data processing equipment required for disaster recovery, or deploy the required data processing equipment to the standby site within the scheduled time after the disaster; It is required to equip some communication lines and corresponding network equipment, or deploy the required communication lines and network equipment to the standby site within the scheduled time after the disaster.
Level 3: electronic transmission and equipment support. It is required to back up the full data at least once a day, store the backup media off-site, and regularly and batch transmit the key data to the standby site by using the communication network many times a day. Some data processing equipment, communication lines and corresponding network equipment required for disaster recovery shall be provided.
Level 4: electronic transmission and complete equipment support. On the basis of Level III, it is required to configure all data processing equipment, communication lines and corresponding network equipment required for disaster recovery, and to be ready or running.
Level 5: Real time data transmission and complete equipment support. In addition to full data backup and storage of backup media outside the field at least once a day, it is also required to use remote data replication technology to copy key data to the standby site in real time by using the communication network.
Level 6: Zero data loss and remote cluster support. It is required to realize remote real-time backup and zero data loss; The standby data processing system has the same processing capacity as the production data processing system. The application software is "clustered" and can be switched in real time.
It can be seen that the higher the level of disaster recovery capability, the better the protection effect for information systems, but at the same time, the cost will rise sharply. Therefore, in the construction of disaster recovery, how to determine the reasonable disaster recovery level of the business system is a major problem. It is also pointed out in the Specification that it can be determined according to the principle of cost risk balance (that is, balance between the cost of disaster recovery resources and the possible losses caused by risks). A regular data backup mechanism for important data shall be established, and a complete incremental data backup shall be performed at least once a day, and the backup media shall be stored in a safe area. The key data shall be backed up in real time in the same city and in different places to ensure that business applications can achieve real-time switching. Disaster recovery plan shall be formulated and tested regularly to ensure the correctness of each recovery procedure and the overall effectiveness of the plan.

Hot standby method

Announce
edit
It is another term for server high availability application, which is translated as "high availability". The term "hot standby" is usually based on the free translation, and belongs to the high availability category hot standby Only two servers in high availability are limited. Hot standby software is a software solution used to solve an inevitable problem of planned and unplanned system downtime. Of course, it also has hardware. Is to build high availability Cluster system Of Basic software For any fault that causes system downtime or service interruption, the software process will be triggered for error determination Fault isolation ,, and online recovery to continue the interrupted service. In this process, users only need to experience a certain degree of acceptable delay, and can restore services in the shortest time.
In a narrow sense, hot standby Specifically, it refers to the hot standby (or high availability) of two servers in the high availability system. Because the high availability of two servers is widely used in China, it is called dual hot standby. The dual high availability can be divided into the active standby mode (Active Standby mode) and dual host mode (Active Active mode) according to the switching mode in work, The active standby mode means that one server is in the active state (active state) of a service, and the other server is in the standby state (standby state) of the service. The dual host mode refers to the active standby and standby active state of two different services on two servers. Note: Active Standby status refers to the status of an application or business, not the server status.
There are two main ways to form dual machine hot standby:
1. Based on Shared Storage disk array )How
The shared storage mode is mainly through disk array After providing switching Data integrity And continuity. User data is usually placed in disk array When the host goes down, the standby continues to obtain the original data from the disk array. This method is often called disk by industry insiders because it uses a storage device Single point of failure But generally speaking, the storage security is high. Therefore, if the storage device failure is ignored, this mode is also the most popular hot standby mode in the industry.
2. Data replication based
This mode mainly uses the data synchronization mode to ensure the Data consistency Data synchronization There are many methods for data replication, and their performance and security are also different. The main methods are as follows: A. The simple file mode is not suitable for applications such as databases, because open files cannot be copied. If you want to copy, you must close the database, which is obviously not possible. Copying in file mode is mainly applicable to updating WEB pages, uploading applications via FTP Data integrity , used when continuity requirements are not high. B、 Using the replication function of the database, such as subscription replication of SQLServer2000 or 2005, users should use this method carefully according to their own applications. The main reasons are:
(1) SQL Server subscription replication will add fields to the user table Application software The programming requirements are high. If the user does not explicitly specify the field when writing on the application software side, using this function will cause the application to fail to work properly.
(2) The limitation of data retention is probably the most critical, because the data of SQL Server does not arrive at the active and standby machines in real time during data transmission. Instead, the data is written to the host machine first, and then to the standby machine. In this way, the data of the standby machine is often too late to update. If a switch occurs at this time, the data of the standby machine will be incomplete and discontinuous, If the user finds that the written data cannot be found on the standby machine and writes again, after the host is repaired, serious data conflicts between the active and standby machines will occur, and the database will be disordered.
(3) Never use subscription copy for complex applications hot standby , including data structure in stored procedure Processing, trigger In case of conflict with the sequence, it is very troublesome to modify it.
(4) The server performance is degraded. For larger databases, the subscription replication of SQL Server 2000 or 2005 will cause the server database to run slowly. In short, subscription replication with SQL Server 2000 or 2005 is mainly used for data snapshot Don't use him for service hot standby In Data synchronization C: Hard disk data interception, which is relatively mature at home and abroad Dual computer hot standby software It usually uses the technology of hard disk data interception, usually called image The software is the mirror software. This technology is very mature at present, and the interception methods are also different. a. Partition interception technology, with Pluswell Hot Backup For example, he uses a partition Hard disk sector The interception technology is to write the data to the hard disk for data extraction through the driver level interception method, and write it to the standby server first to ensure that the data of the standby server is up to date, and then write the data back to the host hard disk. This method will absolutely ensure that the data of the active and standby databases are completely consistent. No matter what kind of switch occurs, the integrity and continuity of the database can be guaranteed. Due to the partition interception technology, users can partition a hard disk into partitions of appropriate size as needed Data synchronization Work. b. The hard disk interception technology, taking Symantec Co Standby as an example, is also an effective hard disk interception software. Its interception is mainly based on a whole hard disk, which often consumes a lot of time when initializing the hard disk.
(5) The latest technology is Third party software Dual computer hot standby software By capturing the database modification operation and automatically and synchronously taking over the data in real time, you can automatically take over the function on the standby server when the primary server fails. The normal operation of the time system does not require any manual operation business. At present, among the foreign products (IBM, Symantec, Dell, etc.), the domestic products are (Best Backup, Global Shield, Premium It takes about 50 seconds for foreign products to take over services, and about 4 seconds for domestic global shields. Automatically take over the work of the main server to ensure 7 * 24 hours non-stop operation.

Operation object

Announce
edit
1. Office documents (. doc. xls. ppt and other files)
2. Customer data Accounting data Database files such as
3. Mail documents, such as. pst. dbx and address book. wab in Outlook
4. Important Drawing file , such as. pdf. bmp. tiff. dwg. jpg
5. Manual backup of data on the Linux system
Linux system is equipped with powerful tar command, which can flexibly back up data. Tar was originally designed for tape backup, backing up files and directories to tape, and then extracting or restoring files from tape. Of course, now we can use tar to back up data to any storage medium. Tar is very easy to use, stable and reliable, and it is available on any Linux system. Therefore, it is the most frequently used backup tool. Use the tar command to back up data in the following format:
$tar cvf backup.tar/home/html The above command is to set all the files in the/home/html directory collect files Tar file backup.tar.
Cvf is the command parameter of tar.
C stands for creating an archive file,
V stands for displaying the file name of each backup,
F indicates that the file name created by tar is backup.tar,
/Home/html represents the file or directory name to be backed up by tar.
Use the tar command to recover data in the following format:
$tar xvf backup.tar The above command will Backup files Backup.tar restore to current directory Next.
Generally, tar does not compress files when backing up files, so Backup files The size of is very large.
Use the following command to make tar automatically use the gzip command to Backup files Compress to get a corresponding gz file$ Tar zcvf backup.tar/home/html In this way, we can get two files, backup.tar and backup.tar.gz. Backup.tar.gz is compressed Backup files

tool

Announce
edit

Basic tools

  1. one
    DBFen online data backup provides online data backup for enterprises and individuals.
  2. two
    Windows built-in backup program
3. Backup tools of the application system itself (such as SQL Server/Oracle)
4. Report to the third manufacturer (Beitejia, Global Shield, Eubase, IBM, Symantec Purchase professional backup system
5. Zip/RAR compression

strategy

After selecting storage backup software and storage backup technology (including storage backup hardware and storage backup media), you need to first determine the strategy of data backup. Backup strategy refers to determining the content, time and Backup mode Each unit should formulate different backup strategies according to its own actual situation. At present, there are three backup strategies that are most used.
1、 Full backup (full backup)
Every day Full backup For example, on Monday, use one tape to back up the entire system, and on Tuesday, use another tape to back up the entire system, and so on. The advantage of this backup strategy is that in case of a disaster of data loss, only one tape (that is, the backup tape of the day before the disaster) can be used to recover the lost data. However, it also has shortcomings. First, because the entire system is Full backup , resulting in a large number of duplicate backup data. These duplicate data occupy a large amount of tape space, which means increased costs for users. Secondly, due to the large amount of data to be backed up, the time required for backup is also longer. For those companies with busy business and limited backup time, it is unwise to choose this backup strategy.
2、 Incremental backup (incremental backup)
Once on Sunday Full backup , and then only the new or modified data of that day will be backed up in the next six days. The advantage of this backup strategy is that it saves tape space and shortens backup time. However, its disadvantage is that when a disaster occurs, data recovery is more troublesome. For example, if the system failed on Wednesday morning and lost a lot of data, it is necessary to restore the system to the state it was in on Tuesday evening. At this time system administrator We need to find the Sunday dish first Full backup The tape is used for system recovery, and then Monday's tape is found to recover Monday's data, and then Tuesday's tape is found to recover Tuesday's data. Obviously, this way is tedious. In addition, the reliability of this backup is also poor. In this case Backup mode Next, the relationship between the tapes is like a chain, one by one. If any of the tapes goes wrong, the whole chain will be disconnected. For example, in the above example, if the tape on Tuesday comes out fault , the administrator can only restore the system to the state of Monday night at most.
3、 Differential backup (differential backup)
administrators The system will be conducted on Sunday first Full backup Then in the next few days, the administrator will back up all data (new or modified) that is different from Sunday to tape. Differential backup The strategy avoids the defects of the above two strategies, and at the same time, it has all their advantages. First, it does not need to fully backup the system every day, so the backup time is short and the tape space is saved. Second, its disaster recovery It's also very convenient. system administrator You only need two tapes, the tape on Sunday and the tape on the day before the disaster, to restore the system.
In practical applications, the backup strategy is usually a combination of the above three. For example, once a week from Monday to Saturday Incremental backup or Differential backup , every Sunday Full backup , a full backup is performed at the end of each month, and a full backup is performed at the end of each year.
4. Problems related to daily maintenance
After the successful installation and commissioning of the backup system, the daily maintenance includes two aspects, namely hardware maintenance and software maintenance If the hardware equipment has good reliability, the system does not need regular maintenance after normal operation. In general, Tape Library The vulnerable parts of Tape drive When a backup read/write error occurs, you should first check the working status of the drive. In case of unexpected power failure, after the system restarts, check whether the connection between equipment and software is normal. The automatic cleaning operation of the head can generally be automatically managed by the backup software. A disk of dlt cleaning tape can be used 20 times, and the head is generally cleaned once a month. software system The software and hardware errors and warning messages detected during the work process have obvious prompts and logs, which can be sent to the administrator via email. administrators The remote management function can also be used to comprehensively monitor the operation of the backup system.
The establishment of the network data backup system will ensure the safe operation of the system and timely troubleshooting of various system faults database system The timely recovery plays a key role. Through automation Tape library And centralized operation management to ensure the quality of data backup and strengthen the safety management of data backup. At the same time, near line Tape Library The introduction of technology undoubtedly provides a more convenient means for data recovery and utilization. It is hoped that more units can introduce these technologies more quickly, so that system administrator Do not worry about data.
5. Storage data backup and recovery
With the in-depth application of the local area network and the Internet in various units, the server in the system is responsible for the key application of the enterprise, storing important information and data, providing comprehensive information query services for leaders and decision-making departments, and providing fast and efficient information query data processing And internet. Therefore, establish a reliable network data backup system to protect key applications data security It is an important task of network construction to ensure that data will not be lost in case of man-made or natural disasters.

alternative

Announce
edit
You can choose the scheme that is suitable for you according to your actual situation and proper combination.
A set of clear ideas
Which files must be backed up and which files do not have to be backed up; Which can be backed up locally and which must Offsite backup ; Which should be backed up dynamically and which should static state Backup; What should be live backups and what must be mandatory dead backups... These issues must be well understood.
Backing up most applications often requires multiple files to be synchronized at a specified time. There are many good methods for current synchronization.
1. One way synchronization 2. Two way synchronization 3. Mobile synchronization 4. Mirror synchronization 5. Update synchronization 6. Accumulated synchronization

Backup terminology

Announce
edit

Introduction to terms

Hardware level issues: selecting Backup files Storage device and location used. Software level problems: select backup programs and fully exploit and utilize their functions.
Local backup: in a specific area of the local hard disk Backup files
Offsite backup : Backup files to storage media separate from the computer, such as floppy disk Zip disk , CD, memory card and other media. This is the hardware level problem of backup.
Live backup: Backup to rewritable storage media for updating and modification.
Dead backup: backup to a non erasable storage medium to prevent accidental deletion and intentional tampering. This is also the hardware level problem of backup.
Dynamic backup: use the software function to automatically back up the specified file on a regular basis, or automatically back up at any time after the file content changes.
Static backup: manual backup to keep the original appearance of the file. This is a software level problem with local backup.

4 types

1. Installation systems software Files formed with application software: computers can operate and realize functions by means of them. These files do not have to be backed up because they can be obtained again by reinstalling the software. However, backup selectively systems software Important files (such as Windows Registry file As well as software, hardware configuration information and user information) and personal configuration in application software Information file (such as personal template) can effectively reduce the trouble of reinstallation. This type of file can only be backed up locally, but it must be backed up statically, because the value of this type of file lies in its originality. Dynamic backup may save the changed or even wrong files as the final backup.
2. Files copied from network and other media (such as downloaded software, literature on media, etc.): some of these files can be recovered, and some will disappear after expiration. For you, it will be unique after downloading, so you must backup it, and it is important to Offsite backup , of course, it is a static backup, because the purpose of copying it is generally to use rather than modify it.
3. Personal information automatically generated by computer or added by users (such as input method vocabulary, web page favorites, etc.); Once such files are lost, they can be re established, but it takes a lot of effort to reorganize them, so they must be backed up. However, they are updated and changed at any time, so it is better to perform local dynamic live backup to restore to the latest state at any time; Of course, it is also necessary to make a non local dead backup at a certain stage.
4. Documents accumulated and edited by oneself (such as address book E-mail . Various documents edited by ourselves): This is the fruit of our own labor, and it is unique and cannot be recovered. Dynamic backup should be used to record the latest form at any time; After achieving phased results, do static Offsite backup To recover in case of error; After the file is completed, at least two dead backups should be made to prevent the backup from being lost, tampered with, or unusable due to damaged storage media.
Of course, these are not dogmatic, clear thinking should also be good at responding. For example, the Windows registry will be modified intentionally or unintentionally at any time during system operation, so it is necessary to perform dynamic backup; But if you do not keep an initial good backup, you may find a registry with fatal errors when you need it most. Therefore, comprehensive application of multiple backup methods is reasonable.

Feasible methods

Select a backup tool: First, good backup hardware can make a good backup solution targeted. Secondly, it is necessary to select a backup program with complete functions so that the software level backup method can be realized. For a normally running system, the backup program works in the background to maintain data synchronization (original files and Backup files Keep consistent at any time) is an ideal backup scheme.
Select the backup method: After selecting the backup hardware and dynamic backup program, you should also consider the backup method. File or folder backup, whether to filter, how to filter, whether to use compressed backup, Backup files Is it easy to recover, and do you choose file data synchronization? If you select data synchronization, you should also consider the error factor of the original file. Some illegal operations will cause illegal codes in the original file and prevent it from being opened. If you fully use dynamic backup, the original file and the backup file will be completely synchronized, and the backup file will also be unavailable. Therefore, it is very important to choose a feasible method according to your actual situation.
Select a saving method: Backup files This is to recover files in case of accidents. If the backup files are not stored well, all efforts may be wasted. For example, the CIH virus attacks the computer, often devouring all hard disk data. If only the local dynamic backup, Backup files It is also within the scope of damage. There are still some man-made damages even more than this. To avoid such situations, it is necessary to adopt Offsite backup and Offsite backup The storage medium of may also be tampered with, which requires a dead backup. However, offsite dead backup cannot achieve the purpose of dynamic backup. Therefore, when it is appropriate to do a dynamic backup Offsite backup It is the most worth promoting security scheme.
Choose a file format: The method of restoring files backed up by different programs and methods is also different. Generally speaking, the backup program based on Windows system produces special format Backup files Still want to restore in Windows, especially Compressed format Backup file for. This is not a problem for personal document backup System files The backup of is not appropriate. yes System files Must be saved as a type that can be directly copied in the DOS environment or can be unpacked in DOS Compressed format , because these backups are always used when the system fails to start.

Usable equipment

Backup is inseparable from storage devices and media. At present, there are many devices that can be used for backup, except floppy disk . In addition to the local hard disk, CD-R, CD-RW discs, Zip disks, active hard disks, removable storage devices, and Tape drive It's very convenient to buy them. In addition, the Internet also provides users with Network Backup New approaches, especially some Free space It is worthy of our attention.
floppy disk Is the most common backup media. however, floppy disk The capacity is very small. It is barely possible to back up a small amount of data, but it is powerless to back up a large amount of data. Moreover, floppy disk Poor security, easy to damage, professional backup is not worth considering.
CD is a good backup medium. It has large capacity, is easy to keep and carry, and has high security. It can be used for dead backup.
Zip disk has large capacity and is easy to implement Offsite backup Its cost performance ratio is high. Users with large file exchange volume in different occasions can first consider selecting it as a backup device.
Users who often need mobile jobs can choose medium and large capacity active hard disks as the first choice for backup devices. Although the price is a little expensive, in addition to the backup function, it can also let you take the system and database with you. For those who own digital cameras Digital video camera As for the users, the mobile memory card or memory stick can also temporarily backup data. Tape drive It is an original data carrier, but the performance of the new product has been quite perfect, which is worth choosing for professional users engaged in data production.
If you desalinate Offsite backup The importance of Best Backup Equipment. Create a partition on the hard disk that accounts for about 20% of the total capacity Backup files Backup and restore are very convenient, with the highest efficiency, fastest speed, and highest unit capacity/price ratio. The disadvantage is that this partition cannot be accessed from computer system To be separated from the, Backup files It is still under the control of such destructive viruses as CIH. In this regard, you can use document compression backup, establish multi-level directories Hide File And other methods to mitigate potential hazards. In addition, you can also purchase a small hard disk at a lower price for special backup. Usually, it is hidden as a secondary hard disk in CMOS. When you need to backup and restore files, you can activate it by simply setting CMOS.

Protection scheme

Announce
edit
With the help of Dell backup and recovery solutions, the data of enterprises can be protected. With the growing maturity of enterprises, reliable and secure data backup can help ensure that enterprises can recover from the disaster of data being damaged, deleted, lost or stolen.

beginner

Easy data protection, ensuring good business operations requires the longest possible uptime, and having an appropriate backup and recovery plan can help ensure that the enterprise can withstand the impact of accidents. With the help of Removable disk For a series of solutions to tape backup system, Dell can provide an intuitive and simplified solution of open standard technology, which can be applied to the existing infrastructure without additional IT staff.
Enterprise demand:
With the development of your enterprise, the importance of data is likely to increase proportionally. To protect enterprise data, you need solutions that can help achieve the following benefits:
Reduce the complexity of different systems that are inefficient in backing up all data;
Control costs, because the loss of data may cost enterprises a lot;
Keep employees working efficiently with backup plans that run during off peak hours.
From simple removable tape and disk Backup Solution to Integrated Backup Device, Dell PowerVault Storage solutions bring industry standard technology rather than costly proprietary solutions. Dell's solution is designed to meet the demanding requirements of enterprises. You can choose a reliable backup solution that can meet your enterprise's operation mode.

magnetic tape

Protect your data with tape backup solutions, and on-site damage to your enterprise's technology infrastructure can lead to disaster Data failure With Dell's tape backup solution, a low-cost backup and recovery system can be implemented, which can provide a reliable archive recovery method for medium-sized enterprises for deleted or damaged records.
Enterprise demand:
With tape backup solutions, you can schedule automatic backups during non working hours to help reduce the impact on IT resources during peak operations and create:
1. Reliable backup of large amounts of data for offsite archiving and audit tracking;
2. Night backup of a single server and weekly backup of multiple servers;
3. Timely snapshots of enterprise data to meet regulatory requirements;
Dell Solution:
Dell™ PowerVault Tape data protection solutions are based on industry standard technologies and are designed to meet the day-to-day needs of enterprise activities. From a single direct attached tape backup to a comprehensive enterprise class Tape Library System, from which you can select solutions that can meet your enterprise backup needs.

disk

Protect your data with backup to disk solutions
When you need to quickly back up a large amount of data, Dell's disk backup solution can provide the first line of defense for data protection to quickly restore.
disk The storage backup device can backup a variety of environments from a single server to hundreds of servers, and can help:
Protect the growing volume of data;
Reduce the impact of master data loss on the organization;
Reduce the cost of managing data protection;
Enterprise demand:
As data backup requirements continue to grow with the development of your enterprise, you may find that you need the near real-time data recovery Ability. You can restore a single file or an entire image of an existing server according to the needs of your enterprise.
In addition, you can move older or unused files to low-cost disk Long term archiving solution, freeing up primary storage.
Protect your data with cloud computing backup solutions. As your enterprise continues to grow (set up offices or branches in multiple locations) and your mobile staff continues to expand, cloud computing data protection services can provide you with secure, reliable and easy-to-use backup options. By using the existing network infrastructure or connecting to the Internet, you can automatically back up data to a highly secure off-site data center, which helps save time and money.
economical and practical;
The establishment of offices and branches in many places and the increase of mobile staff need to be able to back up key enterprise data anywhere;
reliable data recovery . Rapid response to multiple types of data loss or disaster, and data recovery anytime, anywhere;
Integrated design: general architecture, function integration, predictable cost and almost unlimited scalability;
automation data management : Create policies for seamless and transparent backup;
Ecosystem of cooperative development: integrating first-class company technology.

Support expansion

Announce
edit

The server

Intel (R) Server processors can provide enhanced energy efficiency performance for data intensive business applications. Intel (R) server processors are available in a range of Multi-core 64 bit server can optimize and expand the computing environment for you, so as to maximize server utilization and provide space for development.
be based on Intel (R) xeon (R) The servers of processor E3 series enable you to control the relevant businesses of the company more intelligently, so that you can increase sales, increase profits and reduce risks. With the continuous growth of your company's business, your demand for technology is becoming increasingly complex - a real server can gain benefits that a desktop computer acting as a server cannot. Using Intel (R) xeon (R); The server of the processor has intelligent characteristics, which can flexibly adapt to your needs. It not only provides you with the performance you need today, but also enables you to calmly meet the new needs brought about by the company's future development. Intel processor based servers have 24x7 reliability and advanced security features, which can help you avoid economic losses and losses caused by business interruption Security vulnerabilities Possible disastrous consequences for the company. Intel processor based servers are a wise investment in the company's future: with them, you can focus on the company's business and respond more timely to customers, business opportunities and development trends.

notebook

Second generation intelligence Intel (R) Cool The processor family lets you see more information with its visual intelligence performance, without network cables. The adaptability of these processors is greatly improved, which can speed up processing when you need it; Its built-in visual function enables you to better enjoy the notebook's visibility experience; In addition, they also provide the adaptive performance required in mobile.

management system

Announce
edit
Terminal backup management system It is a highly integrated professional data backup software suitable for the data center and desktop environment. It has four characteristics: comprehensive protection, security and reliability, powerful functions, and easy to use. It is widely used for core data backup in finance, securities, telecommunications, government, education and other industries.
Terminal backup management system
Product characteristics:
Compatible with 64 bit and 32-bit Windows versions;
The humanized WEB management interface is convenient for administrators to manage and maintain the system;
Encryption algorithm and key can be set for backup files as required, and the whole system operation can be configured uniformly;
Proactive backup, multi media server management, providing centralized management of backup strategies and clustered storage media;
When transmitting data, it can support encrypted and secure transmission of data packet content;
The new disk based backup scheme takes advantage of the characteristics of disk media to reduce the overall cost.