Вы находитесь на странице: 1из 7
0 1 0 0 1 1 1 0 1 1 1 1 0 1 0
0
1
0
0
1
1 1
0
1 1
1
1 0
1
0
1 0
1
1
1
0
0
0
1
1
1
1
0
1
0
1
1
1
1
1
0
1
1

1

0

1

1

0

1

0

1

0

0

1

0

1

1

1

0

1 1 1 1
1
1
1
1
1 1 1 1 1
1
1
1
1
1
1 0 1 1 1 1 1
1
0
1
1
1
1
1

1

0

0

1 0 1 1 0 0 0 1 1 0 0 1
1
0
1
1
0
0
0
1
1
0
0
1

BusinessShadow ®

High Availability and Disaster Recovery. Two Challenges. One Solution.

0 1 1 0 0 0 1 1 0 0 1 Business Shadow ® High Availability
0 1 1 0 0 0 1 1 0 0 1 Business Shadow ® High Availability
0 1 1 0 0 0 1 1 0 0 1 Business Shadow ® High Availability
0 1 1 0 0 0 1 1 0 0 1 Business Shadow ® High Availability
0 1 1 0 0 0 1 1 0 0 1 Business Shadow ® High Availability
0 1 1 0 0 0 1 1 0 0 1 Business Shadow ® High Availability

0

1

1

0

0

1

0

1

1

0

0

0

1

0

0

1

1

1

1

1

1

1 1 1 1 1 1 0 0 1 0 1 0 1 1 1
1
1
1
1
1
1
0
0
1
0
1
0
1
1
1
0
1
0
1
1
0
0
1

1

1 1 1 0 0 1 0 1 0 1 1 1 0 1 0 1
1 1 1 0 0 1 0 1 0 1 1 1 0 1 0 1

Scenarios from the World of Corporate IT

Scenario 1:

Faulty Software Upgrade The current application software is expected to be upgraded over the weekend. The subsequent tests indicate a malfunc- tion and thus leaves a useless system. The only option to resume operation is a time-intensive process restoring data from tape to disk image, extending the planned maintenance window.

Take a deep breath: It can be so much easier.

Scenario 2:

Physical Destruction or Disaster Incident Lightning strikes the central power supply and/or damages the centralized IT system. Floods, severe weather, earth- quakes or terrorist attacks interrupt the application systems or access to the same. Data and applications need to be restored at an off-site location – a race against time.

Stay calm: You will win the race.

Scenario 3:

Accidental Deletion of Data It happens quickly: critical data is irrevocably deleted. The administrator drops the wrong database. Important files or directories are deleted. Backups must be available and an immediate and flawless manual restore is necessary to keep your business operational.

Lean back and relax: Your data is available.

Other Scenarios:

4. Malicious manipulation by own staff or hackers

5. Hardware problems

6. Server move without downtime

7. Or simply: your business dictates you to comply with current legislation which requires a functioning risk management. A Business Continuity Plan is necessary to comply with SOX and other regulations.

We will make sure that you are ready in any case. BusinessShadow ® is there for you.

02

in any case. Business Shadow ® is there for you. 02 How much Downtime and Loss

How much Downtime and Loss of Data can you afford? How fast can your Business be Up and Running after a Disaster?

One or the other scenarios on the previous page might sound familiar to you.

Furthermore, additional business requirements lead to a large degree of inter-dependency and overall complexity of IT architectures. The avail- ability of application landscapes and their under- lying databases are critical.

Changing global paradigms and legal require- ments add the need of providing full Disaster Recovery protection, including site failure pro- tection. Only very large distances of several hundred miles between production and backup site provide true protection. Traditional mirroring concepts based on storage or blocklevel come with too much complexity, impact productive landscape and generate tremendous costs.

Prepare for the Future! IT systems are constantly threatened by applica- tion downtime and loss of data. The threats are real and come from many directions. Not all of the threats can be avoided. The important question is: are you ready and prepared? How fast can you be back in business? Can you provide a ‘Plan B’ which gets you back in business within a few minutes with no or minimum damage? If you ex- perience a major incident, this becomes a challenging race against time.

Traditional Methods are not enough Today’s replication tools are inadequate to pro- vide full data and application protection. Syn- chronous or near-synchronous data replication tools only protect against local hardware failures (Hardware High Availability), but do not protect against software or user errors. Stretching the data replication tools to mirror over large dis- tances help to cover site failures (Disaster Re- covery), but offer low data integrity and typically a poor Return on Investment (ROI). Manual Backup and Restore procedures provide the data integrity but lack reasonable Recovery Point and Recovery Time Objectives. In addition, the com- plexity of today’s application landscapes requires in-depth know-how of the detailed system archi- tecture to get the systems back to life.

Comprehensive High Availability and Disaster Recovery Protection. Many Challenges. One Solution.

Libelle creates Leeway for Availability and Disaster Prevention We make it easy to handle these challenges. Read on, and learn how you can recover your data quickly, easily and consistently when it comes to the worst case.

BusinessShadow ® protects your data, your applications and entire production sites. The solution reduces potential downtime and retrieves lost data within minutes – easy to use and cost-effective.

03

0

1

1

0

0

1

1

1

0

1

0

1

1

0

1

1

0

1

1

0

0

1

0

1

1

0

0

0

1

0

0

1

1

1

1

1

1

1

1

1

1

0

0

1

0

1

1

0

1

1

0

1

1

1

0

1

1

0

0

1

1

Reasons for Downtime

Application downtimes and data loss are less than ever caused by hardware problems. More than 80% of all downtime incidents are actually caused by software or user errors instead.

These are exactly the areas where traditional

concepts will fail in providing protection.

Redundancy will be of no help in case of corrupt

or deleted data. In this case, resuming business operation will require a manual restore from tape or disk image.

This is not only annoying, but also very time-

consuming.

45 % Software Error

but also very time- consuming. 45 % Software Error 40 % Human Error 15 % Hardware

40 % Human Error

15 % Hardware Error

Graphic Data Source: Gartner Group

The BusinessShadow ® Software lets you stay in business – whatever the incident may be.

04

BusinessShadow ® makes your High Availability and Disaster Recovery Architecture Safe and Sound.

Foresight in assessing potential threats is the basis for your risk avoidance strategy.

BusinessShadow ® is the ideal software solution which enables you to reduce the risk of data loss, minimize application downtime, and provide amazingly fast error recovery. BusinessShadow ® provides protection independent from the cause and independent from the consequence of the incident: hardware failure, corrupt data, software error or human error.

failure, corrupt data, software error or human error. Business Shadow ® supports both homogeneous and
failure, corrupt data, software error or human error. Business Shadow ® supports both homogeneous and

BusinessShadow ® supports both homogeneous and heterogeneous system landscapes with a single standardized interface. Also the distance and network between your production and backup system means no boundary. Data is mirrored with minimum band- width requirements.

Data is mirrored with minimum band- width requirements. Any major incident is a race against time

Any major incident is a race against time where every second counts. We provide a simplified way to han- dle the administration and failover without requiring specific in-depth know-how.

BusinessShadow ® provides uncompromised and true distance independence.

05

The Libelle Principle

Brilliantly Simplified – Simply Brilliant.

The Time-Delayed Data Mirror!

Take an example: your application crashes at

2:00 pm and critical data is irrevocably deleted.

With BusinessShadow ® your application and

data can be back where it was at 1:59:59 pm literally at the push of a button and a short wait

time of typically a couple of minutes.

The time-delayed data mirror provides a manage-

able buffer between the production and its mirror

system called the “time-funnel”. This time-funnel

receives current transactions from the production

database or file system. The time-funnel and all data is physically stored on the mirror system and current transactions are available on the mirror

system in case the production system becomes

unavailable or corrupted.

In the case of a disruption, applications can simply be switched to the mirror system. Instead of working with the same corrupted data which caused the downtime on the production site, only the good transactions are applied to the mirror system. Typically up to the point before the data corruption on production occurred.

And all this happens within a few minutes – without restoring backup media.

Data Protection in another building, another city, another country, another continent. GUI Easy to manage
Data Protection in
another building,
another city,
another country,
another continent.
GUI
Easy to manage without
in-depth Know-how
1.
Production System
Mirror System
2.
4.
Data Transfer via
TCP/IP-Sockets
LAN or WAN
3.
5.
4. Data Transfer via TCP/IP-Sockets LAN or WAN 3. 5. Regardless of the Distance: Business Shadow

Regardless of the Distance:

BusinessShadow ® is based on the Libelle patent to mirror data time-delayed using a time-funnel.

06

07

to mirror data time-delayed using a time-funnel. 06 07 Highest Level of Protection Based on a

Highest Level of Protection Based on a simple Principle

Step 1: Initial Copy During initial setup, all data from the production system is copied to a secondary system (mirror system) in a LAN or WAN setting. This system can be located in another building, another city, another country or on another continent. Proprietary data transmission techniques based on standard net- work protocols optimize the data transfer.

Step 2: Updating Changes All changes in the production system are being identified and transferred directly into the time- funnel of the mirror system. With the optimized data transmission techniques, even limited WAN links will be used to maximum efficiently.

Step 3: Time-Funnel Transactions on the production system reside in the time-funnel on the mirror system for a certain amount of time, which can be set to any value desired. The time-funnel value can be adjusted during production – just as needed. Only after the end of the defined period, the transactions in the time-funnel are applied to the mirror system.

Step 4: Failover to the Mirror System In the case of an error on the production system, time can literally be turned back to any time-stamp prior to the occurrence of the error. Within a few minutes, in which the time-funnel is “emptied” to the desired point-in-time, the last consistent set of data is used for running production on the mirror system. The host name and IP-address are automatically failing over to the mirror system, so that application server and users are able to reconnect to the mirror system without any changes.

Step 5: Failback to the Production System The crashed production system is rebuilt while production is running on the former mirror system (which is now acting as the current production). Normal operation is reestablished by changing roles at the push of a button.

1-2-3

BusinessShadow

BusinessShadow

® ®

– Three in One

1 DBShadow DBShadow

® ®

BusinessShadow ® is the integrated Libelle solution for complete protection of systems (databases, file systems, communication) and combines three unique components in a holistic way.

DBShadow ® for Database Protection

2 FSShadow FSShadow

® ®

The easiest way to create and manage a shadow database is offered by Libelle with DBShadow ® , a product that protects against the consequences of physical and user/software errors.

The creation of the database mirror, the shipping of archive files, and the time-delayed recovery are automated by DBShadow ® . The mirror operation can be monitored either through a Graphical User Interface (GUI) or a Command Line Interface (CLI) with user exits. It is a perfect fit to be integrated with existing High Availa- bility concepts and strategies. Production and mirror system, as well as all processes are monitoring each other constantly. Trouble tickets are issued automatically for system monitoring.

FSShadow ® for File System Protection

3 SwitchSwitchApplicationApplication

Software/User Errors and physical problems are not only a threat to the availability of databases, but also threaten the availability of file systems.

The same way DBShadow ® protects databases; FSShadow ® mirrors transactions time-delayed on a flat file level (create, modi- fy, and delete). All changes are copied instantly to the mirror system, but stay in the time-funnel before they are applied to the actual mirror file system.

SwitchApplication for Automation of Failover

SwitchApplication adds an additional virtual IP-address/hostname to the production system. Part of the failover process is to acti- vate the virtual IP-address/hostname on the mirror system and remove them on the production system. DBShadow ® and FSShadow ® are continuing the mirror operation and manage the failover using the actual IP-addresses/host-names of the produc- tion and of the mirror system. The system can thus always be accessed with the same IP-address.

The failback is done the same way. The automatic restart of ap- plications are implemented through ‘user interfaces’ which offer event-based triggers to automate environment-specific actions.

0

1

1

0

1

1

08

environment-specific actions. 0 1 1 0 1 1 08 The perfect Solution for your Disaster Recovery

The perfect Solution for your Disaster Recovery

and High Availability needs

Best in its Class Protection from the Protect your Business regardless of: Consequences of: •
Best in its Class Protection from the
Protect your Business regardless of:
Consequences of:
• Distance between production and mirror system
• Corrupt or deleted data
• Size of the systems
• Faulty software updates
• Hardware and Applications in use
• Human error
• Hardware problems
• Disasters and sabotage
Your Benefits:
Other Implementation Scenarios:
• Continuous and consistent backup of your
databases and file systems
• Simplistic approach for building backup
data centers
• Automated failover process of applications
and databases
• Transparent monitoring of critical IT processes
• Quick error recovery after failover to the
mirror system
• Automation of system refreshes by creating
test databases/environments
• Planned failover to minimize planned downtime
• Continue to work with the last consistent
set of data after a corruption
• Backup from the mirror system without affecting
production systems
• Automatic allocation of virtual IP-addresses/
hostnames
• Reporting with production data on the mirror
system
• Holistic protection even in heterogeneous
environments
• Server relocation without downtime
• Minimum manual intervention on an
application level
• Very simplistic solution and extremely easy
to operate

In a Nutshell:

Minimum Downtime – Higher Productivity – Reduced Costs.

09

You determine the Level of Protection you need and we provide the Service for it.

You determine the Level of Protection you need and we provide the Service for it.

Implementation The implementation of BusinessShadow ® and User Training is performed by Senior Libelle Consultants or by a Certified Libelle Partner. In the run-up we determine the optimal configu- ration for your particular landscape followed by the actual implementation – typically without any downtime.

Support Expect expert support: We will provide you with dedicated Libelle Consultants to deliver support services for your installation. Your primary con- tacts are typically the Senior Consultants or Solution Architects who implemented the solution with you from the start.

Depending on your requirements, you can benefit from different tiers of software support. Our Soft- ware Support range from basic weekday support up to pro-active 24/7 monitoring for highly critical environments.

pro-active 24/7 monitoring for highly critical environments. Quality you can rely on When it comes to

Quality you can rely on When it comes to High Availability, a high standard of quality is essential. Libelle is certified according to DIN EN ISO 9001:2008.

High Availability must meet the highest requirements BusinessShadow ® exceeds the high standards of integrating into a variety of user applications. Among many certifications, BusinessShadow ® comes with a SAP certified integration.

10

Questions? More Information?

Libelle is there for you! Our mission is to provide more stability to your business processes at any time and under any and every circumstance.

How to contact us:

T +49 (0)711 / 78335-0 or sales@libelle.com

For more information, please visit our website:

www.Libelle.com

Libelle AG Gewerbestr. 42 I 70565 Stuttgart I Germany I

1

1

0

1

1

0

1

1

1

0

1

1

1

1

1

1

0 0 1 0 0 1 1 1 1 1 1 0 0 0 1
0
0
1
0
0
1
1
1
1
1
1
0
0
0
1
0
1
1
1
1
0
1 0 0 1 0 0 0 0 0 1 1 0 0 0
1
0
0
1
0
0
0
0
0
1
1
0
0
0

0

0 1 1 1 1 1 1 0 0 0 1 1
0
1
1
1
1
1
1
0
0
0
1
1

„It doesn´t matter whether or not you can predict the future.

What does matter is that you are prepared for it.”

11

Perikles

BusinessShadow ®

1

1

0

1

1

0

1

1

0

0

0

1

0

1

0

1

1

1

1

1

0

0

1

0

1

0

0

1

1

1

1

1

1

0

0

0

1

0

1

0

1

0

1

0

0

1

1

1

0

1

1

0

1

1

Protect your Business against

Crashes.

Libelle is an established software specialist for Disaster

Recovery and High Availibility solutions since 1994.

Medium and large sized businesses rely on our software

solutions when it comes to backing up and restoring their

data. You will benefit from the best possible service from

a single source. Our support, distribution and software de-

velopment are centralized in our Headquarters in Stuttgart,

Germany. With an extensive distribution network of our

business partners we have been serving customers all

across the world for many years.

Our solutions are complemented with a wide portfolio of

professional services from designing high-end Disaster

Recovery and High Availability concepts to implementation

with a proactive service and support concept 24 hours a

day, 7 days a week.

The proximity to our customers and the high standard of

quality of our solutions are important to us. This is shown by the fact that Libelle is certified with DIN EN ISO 9001:2008.

Years of experience and competence and a decade of hands on experience, know how and a comprehensive portfolio of solutions and services have brought us where we are today.

solutions and services have brought us where we are today. Libelle AG I Gewerbestr. 42 I
solutions and services have brought us where we are today. Libelle AG I Gewerbestr. 42 I
solutions and services have brought us where we are today. Libelle AG I Gewerbestr. 42 I

Libelle AG I Gewerbestr. 42 I 70565 Stuttgart I Germany I T + 49 711 / 78335-0 I F + 49 711 / 78335-148 I www.Libelle.com

49 711 / 78335-0 I F + 49 711 / 78335-148 I www.Libelle.com Libelle, the Libelle

Libelle, the Libelle Logo, BusinessShadow ® , DBShadow ® and FSShadow ® are registered trademarks of Libelle AG. All other brand and product names mentioned are terms and in some cases registered trademarks belonging to the respective companies.

© Libelle AG, December 2009. Subject to change. Design and Production: büro punkt. for visual design, www.buero-punkt.de