Archive Data Management - How compliant is your solution? Part 2 of 2
-
Upload
ipexpo-online -
Category
Technology
-
view
514 -
download
0
Transcript of Archive Data Management - How compliant is your solution? Part 2 of 2
© 2010 IBM Corporation
IBM Information ArchiveNext Generation Information Retention Solution
Jim ChadbournePractice Lead – Storage
Mibtree Ltd
© 2010 IBM Corporation2
Information Explosion
30 billionEstimated number of RFID tags produced annually in 2010, embedded in products, buildings, fleets, passports and even animals
1 trillionInternet connected devices will increase from 500M in 2006 to 1 Trillion in 2011
10XA 10-fold increase in digital
data between 2006 and 2011- with over 80% of that in
unstructured formats
1 in 3Business leaders frequently
make critical business decisions with incomplete information or information
they don’t trust
$.70 per $170% on average is spent on maintaining current IT
infrastructures versus adding new capabilities
33% will leave33% of consumers notified of a security breach will terminate
the relationship with the company they perceive as
responsible
70% of IT managers say: “Regulations drive up storage demands, businesses realizing they must classify, manage, delete data,
not just keep adding storage” … Source: Information Week Survey
© 2010 IBM Corporation33
Volume Every day, 15 petabytes of new information are being generated. By 2010, the amount of digital information will grow to 988 exabytes
Volume Every day, 15 petabytes of new information are being generated. By 2010, the amount of digital information will grow to 988 exabytes
Variety 80% of new data growth is unstructured content, generated largely by email, with increasing contribution by documents, images, and video and audio.
Variety 80% of new data growth is unstructured content, generated largely by email, with increasing contribution by documents, images, and video and audio.
VelocityAn average company with 1,000 employees spends $5.3 million a year to find information stored on its servers. 42% of managers say they use the wrong information at least once per week.
VelocityAn average company with 1,000 employees spends $5.3 million a year to find information stored on its servers. 42% of managers say they use the wrong information at least once per week.
Information Explosion
Information Week, “State Of Enterprise Storage Changing Priorities, Changing Practices”, Jan 2009. Delahunty, SteveIDC: Expanding Digital Universe, 2007IDC: "The Hidden Costs of Information Work" March 2005 Accenture: Managers Say the Majority of Information Obtained for Their Work is useless 2007 http://newsroom.accenture.com/article_display.cfm?article_id=4484
© 2010 IBM Corporation4
Archiving is an intelligent process for moving inactive or infrequently accessed data, that still has business value, while providing the
ability to search and retrieve the data.
A Definition of Archiving
© 2010 IBM Corporation5
Backup versus Archive….
Backup
For recovery
Copies information
Improves availability
Short term in nature
Data typically overwritten
Not for regulatory compliance
Not usually archived
Archive
For retrieval
Moves information
Adds operational efficiencies
Long-term in nature
Data typically maintained
Useful for regulatory compliance
Should be backed up!
© 2010 IBM Corporation6
Archiving Provides Operational Benefits
Faster backups and quicker restores– by removing inactive data from primary
storage
Improve application performance and availability
– by removing inactive data from primary storage
Reduce the amount of data archived & defer primary storage expenditures
– by adding data reduction & compression techniques
Reduce Cost– by optimizing current & future storage
resources
Supply Chain/ERP Financial Management
Call Center/CRM Human Resources
Application Performance Efficiencies
© 2010 IBM Corporation7
Regulatory and corporate governance practices are requiring firms to re-evaluate their current compliance and risk management infrastructure
Companies may face multiple regulations which share or drive different requirements
Corporations are mandated to:
Ensure records are unaltered and undeleted
Adhere to internal & external records management policies
Quickly discovery and produce business records for audit purposes
The average cost to defend a corporate lawsuit per case? (Gartner, 2006)
The cost of an average e-discovery request?
Sources: CIO Magazine survey 2007; IBM Tivoli Market needs and profiling study 2005;
© 2010 IBM Corporation88
Introducing IBM Smart Archive Strategy
Collaborative(Quickr, SharePoint)
ERP / CRM(SAP, PeopleSoft …)
Data
Content(Documents, Images …)Reports
PaperEmail
)Notes, Exchange(
On Premise(Custom Config)
Appliance(Pre-Config)
As A Service(SaaS, Multiple Options)
Cloud Ready Archive Storage
Value Added Services• Optimization Services• System Services• Managed Services• Reference Architecture• Information Governance
Optimized and Unified Assessment, Collection and Classification
Flexible and Secure Infrastructure with Unified Retention and Protection
Integrated Compliance, Records Management, Analytics and eDiscovery
© 2010 IBM Corporation9
IBM Smart Archive Strategy Value
A better understanding of what to archive
A low cost, secure infrastructure
A choice of implementations
Flexible retention policy management
Assures compliance while enabling advanced analytics and eDiscovery capabilities
Unites the power and value of IBM Software, Systems and Services.
© 2010 IBM Corporation10
Introducing IBM Information ArchiveNext Generation Information Retention Solution
Universal, scalable, and secure storage repository
- For structured and unstructured information, compliant or non-compliant
Integrated Archive Appliance- Combines the best of IBM Software, Hardware & Services
Protects Data - By enforcing the industry’s most stringent information retention laws
Highly versatile, highly scalable information retention solution- For mid-size and enterprise organizations
© 2010 IBM Corporation11
Accepts Information from Multiple SourcesStructured or unstructured dataCompliant or non-compliant
e-mails Files
ERP
Database
PACS
Paper
www
Interoperability Matrix
© 2010 IBM Corporation12
Advanced Data Protection Features
Clustered nodes & Redundant Array of Independent Disks (RAID) 6 to maintain data integrity even in the event of two disk failures.
Redundancy
Enhanced Disaster
Recovery
Advance Copy Services increase the availability of archived documents and prevents data loss in the event of a disaster
Multiple Protection
Levels
Basic to maximum protection levels address all possible data retention requirements
© 2010 IBM Corporation13
Enhanced Tamper
Protection
Maximum tamper protection with patent-pending feature that eliminates root access
Encryption can provide added security for data storage and remote data transmission
Encryption
Advanced Data Protection Features
Maximizes data protection capabilities with offsite, low-cost Tape or Virtual Tape (VTL) support
Optional Tape & VTL Backup
© 2010 IBM Corporation14
Deduplication&
CompressionShrink the amount of data to store
Data Optimization Features
Hierarchical Storage
Management
Automatically distributes and manages information on disk, tape, or both
© 2010 IBM Corporation15
Supports multiple ingest and input models including custom applications
Multiple Archive Collections, Multiple Protection Levels
ECM ArchiveRepository
Users and Applications
Custom Applications
One Namespace
Collection 1
Disk
NAS
Collection 2
Disk
NAS
Collection 3
Disk
SSAM
Clustered Clustered
IBM Information Archive
LAN
A single Information Archive can be configured with 1 to 3 archive collections
Collections are accessible via Network File System (NFS) or System Storage Archive Manager (SSAM) protocols or a combination of both
Each collection can be customized to support different protection levels Tape
NFS SSAMNFS
© 2010 IBM Corporation16
Information Archive Next Generation Architecture
API Client
API Server
NAS Client
NAS Gateway
Disk Storage
Web-browser
API Server Mgmt UI
Server Mgmt UI
Storage Mgmt UI
Collection 2Collection 1
NAS Client TSM API Client Web-browser
NAS Interface
GPFS Filesystem & IA Middleware
TSM Server
Disk Storage
SSAM ServerIA Mgmt GUI
Disk Storage
Previous Generation Architecture(DR450 & DR550)
Information Archive Architecture
© 2010 IBM Corporation17
Customizable Protection LevelsMost Flexible and Comprehensive Data Protection Levels
Each collection can be customized with its own protection level
Basic Protection - enables the greatest flexibility for managing an organization’s information retention needs
Intermediate Protection - allows IT administrators to increase and decrease retention periods as needed, but information deletion is only allowed after the retention period has expired
Maximum Protection - helps IT administrators manage information with strict business, legal or regulatory retention needs
Maximum
Intermediate
Basic
*SSAM Collections are always Maximum compliance
© 2010 IBM Corporation18
X
Time BasedTime Based
Event Based with Fixed Protection PeriodsEvent Based with Fixed Protection Periods
Fixed Period
MinimumFixed Period
XEvent
Dispose after fixed period from creation date
Dispose after fixed period from event dateDay 0
Day 0
Customizable Policy-based Retention Features Most Flexible and Comprehensive Data Retention Policies
MinimumFixed Period
Event Based with no Fixed Protection PeriodEvent Based with no Fixed Protection Period
XEvent
Dispose after eventDay 0
© 2010 IBM Corporation19
Security and Compliance Characteristics
Role based security- Security, Systems and Archive Administrators
- Archive User, Service Engineer and Auditor Roles
- Audit logs provide compliant audit trail.
Physical security- Locking cabinet
To achieve maximum compliance protection with IBM IA customers enable the Enhanced Tamper Protection feature
- Removes root login capability from the IBM IA Cluster- Neither customer nor IBM has root login authority- Once enabled, cannot be disabled- Expected admin and support operations pre-programmed to remove need for root
access- Best practice to enable during installation- We have a procedure for an unforeseen emergency requiring root access by
delivering a signed and time-bounded patch to the customer.
© 2010 IBM Corporation
Initial configuration is integrated and guided- Start archiving data in 1 day or less
Consolidated and integrated management in a single administrative interface
- Security, administration, monitoring, troubleshooting, serviceability
- Manage multiple collections from a single interface
- Role-based administrative security
Simple, efficient, consistent administrative experience
- Wizards guide user on the creation of objects
- Overviews provide high level situational awareness of system health
- Consolidation of information for efficient administration
Task-oriented, with drill down where needed for deeper configuration and trouble shooting
20
Information Archive Integrated, Web-based Interface
© 2010 IBM Corporation
Ta
pe Lib
rary
21
Stora
ge
Expa
nsio
n Fra
me
Inside IBM Information Archive (R1.2) Hardware
– Dual-quadcore clustered servers– Integrated (closed) appliance– Internal IP and SAN networks– SATA storage
• RAID 6, 608 TB max usable– Petabytes of external tape– HW-based metro and global
mirroring– 3 collections per appliance– Remote Support Module (custom)
Software– System Storage Archive Manager– Tivoli Storage Manager – HSM– IBM Director– DS Storage Manager (custom)– Scale Out File System – GPFS– Management Console
Security– Role-based administration– LDAP or Active Directory for user
management– No root access in compliant mode
Management Node
Management Console
NAS / SSAM / GPFS Linux Server
(1 to 3)
Storage Expansion(Up to 6)
Storage Controller(1)
Ethernet / FCSwitches
Remote Support Mgr
© 2010 IBM Corporation
IBM Information Archive enhancements!Next Generation Information Retention Solution
•Addition of 2 TB disk drives- Doubles disk capacity of IA in the same footprint (608TB)
•Improvement for IA Mirroring and Disaster Recovery- Greatly simplifies installation, failover and failback process- Provides additional functions for monitoring mirrored IA systems from one IA GUI
•Usability Improvements of the IA GUI- Display information about IA-Node status and components running- Allow admin to change the time zone of the IA system- Allow grouping of multiple events in one notification
•Improved operation of File Archive Collections- LDAP server is not mandatory anymore- Allow to export multiple shares per file archive collection and grant access to different users
© 2010 IBM Corporation23
Consider the long-term costs of ownership
SATA disk offers lower cost access to online data vs. FC disk
Tape offers lower cost than disk and consumes less energy, but often not ideal for online access
Blended solution:
Online access to most recent content
Lower cost, energy-efficiency for long-term
Maximize Archiving Efficiency with Optional External Tape
$7
$3.5
$0
Mill
ion
s
SATA Disk
$6,365,950
Tape
$946,405
Blended Disk and Tape
$2,255,346
Hardware
Prod + DR Carts
Maintenance
Power & Cooling
Floor space
Cut TCO 50% with Blended Tape and Disk*10 year TCO example. Assumes 250TB storage, 25% growth/yr
* TCO estimates based on IBM internal studies.
Information Archive offers unique disk and tape archiving options
© 2010 IBM Corporation24
Cohasset Associates performed a compliance assessment of the IBM Information Archive’s capabilities to meet the requirements and practices of SEC Rule 17a-4(f).
Independent Assessment of Information Archive
Cohasset Associates’ assessment of the IBM Information Archive found that the IA functional capabilities prevent any erasure or overwrite of electronic records stored pursuant to SEC-required retention periods.
It is Cohasset Associates’ opinion that the IBM Information Archive meets the SEC’s requirements and good records management practices for storing and managing electronic records – as set forth in SEC Rule 17a-4(f).
© 2010 IBM Corporation25
In Closing - Simplified Cloud-ready Smart Business System Adapts as business needs evolve
Reduce primary storage costs by offloading inactive & historical data
Leverage a single, secure storage repository for all your archival information, under one roof !
Leverage integrated tape strategy for scalability and energy efficiency, and keep your power & cooling costs down
Retain and manage information for however long you need & future-proof your information to next technology
Support your compliance efforts with ease, so you can avoid the legal and financial risks
Keep your capacity & costs minimum by eliminating duplicate content
© 2010 IBM Corporation26
8 IBM Corporation 1994-2008. All rights reserved.References in this document to IBM products or services do not imply that IBM intends to make them available in every country.
Trademarks of International Business Machines Corporation in the United States, other countries, or both can be found on the World Wide Web at http://www.ibm.com/legal/copytrade.shtml.
Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.UNIX is a registered trademark of The Open Group in the United States and other countries.Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.Other company, product, or service names may be trademarks or service marks of others.
Information is provided "AS IS" without warranty of any kind.
The customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer.
Information concerning non-IBM products was obtained from a supplier of these products, published announcement material, or other publicly available sources and does not constitute an endorsement of such products by IBM. Sources for non-IBM list prices and performance numbers are taken from publicly available information, including vendor announcements and vendor worldwide homepages. IBM has not tested these products and cannot confirm the accuracy of performance, capability, or any other claims related to non-IBM products. Questions on the capability of non-IBM products should be addressed to the supplier of those products.
All statements regarding IBM future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.
Some information addresses anticipated future capabilities. Such information is not intended as a definitive statement of a commitment to specific levels of performance, function or delivery schedules with respect to any future products. Such commitments are only made in IBM product announcements. The information is presented here to communicate IBM's current investment and development activities as a good faith effort to help with our customers' future planning.
Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput or performance improvements equivalent to the ratios stated here.
Photographs shown may be engineering prototypes. Changes may be incorporated in production models.
Trademarks and Disclaimers