Archive Data Management - How compliant is your solution? Part 2 of 2

27
© 2010 IBM Corporation IBM Information Archive Next Generation Information Retention Solution Jim Chadbourne Practice Lead – Storage Mibtree Ltd

Transcript of Archive Data Management - How compliant is your solution? Part 2 of 2

© 2010 IBM Corporation

IBM Information ArchiveNext Generation Information Retention Solution

Jim ChadbournePractice Lead – Storage

Mibtree Ltd

© 2010 IBM Corporation2

Information Explosion

30 billionEstimated number of RFID tags produced annually in 2010, embedded in products, buildings, fleets, passports and even animals

1 trillionInternet connected devices will increase from 500M in 2006 to 1 Trillion in 2011

10XA 10-fold increase in digital

data between 2006 and 2011- with over 80% of that in

unstructured formats

1 in 3Business leaders frequently

make critical business decisions with incomplete information or information

they don’t trust

$.70 per $170% on average is spent on maintaining current IT

infrastructures versus adding new capabilities

33% will leave33% of consumers notified of a security breach will terminate

the relationship with the company they perceive as

responsible

70% of IT managers say: “Regulations drive up storage demands, businesses realizing they must classify, manage, delete data,

not just keep adding storage” … Source: Information Week Survey

© 2010 IBM Corporation33

Volume Every day, 15 petabytes of new information are being generated. By 2010, the amount of digital information will grow to 988 exabytes

Volume Every day, 15 petabytes of new information are being generated. By 2010, the amount of digital information will grow to 988 exabytes

Variety 80% of new data growth is unstructured content, generated largely by email, with increasing contribution by documents, images, and video and audio.

Variety 80% of new data growth is unstructured content, generated largely by email, with increasing contribution by documents, images, and video and audio.

VelocityAn average company with 1,000 employees spends $5.3 million a year to find information stored on its servers. 42% of managers say they use the wrong information at least once per week.

VelocityAn average company with 1,000 employees spends $5.3 million a year to find information stored on its servers. 42% of managers say they use the wrong information at least once per week.

Information Explosion

Information Week, “State Of Enterprise Storage Changing Priorities, Changing Practices”, Jan 2009. Delahunty, SteveIDC: Expanding Digital Universe, 2007IDC: "The Hidden Costs of Information Work" March 2005 Accenture: Managers Say the Majority of Information Obtained for Their Work is useless 2007 http://newsroom.accenture.com/article_display.cfm?article_id=4484

© 2010 IBM Corporation4

Archiving is an intelligent process for moving inactive or infrequently accessed data, that still has business value, while providing the

ability to search and retrieve the data.

A Definition of Archiving

© 2010 IBM Corporation5

Backup versus Archive….

Backup

For recovery

Copies information

Improves availability

Short term in nature

Data typically overwritten

Not for regulatory compliance

Not usually archived

Archive

For retrieval

Moves information

Adds operational efficiencies

Long-term in nature

Data typically maintained

Useful for regulatory compliance

Should be backed up!

© 2010 IBM Corporation6

Archiving Provides Operational Benefits

Faster backups and quicker restores– by removing inactive data from primary

storage

Improve application performance and availability

– by removing inactive data from primary storage

Reduce the amount of data archived & defer primary storage expenditures

– by adding data reduction & compression techniques

Reduce Cost– by optimizing current & future storage

resources

Supply Chain/ERP Financial Management

Call Center/CRM Human Resources

Application Performance Efficiencies

© 2010 IBM Corporation7

Regulatory and corporate governance practices are requiring firms to re-evaluate their current compliance and risk management infrastructure

Companies may face multiple regulations which share or drive different requirements

Corporations are mandated to:

Ensure records are unaltered and undeleted

Adhere to internal & external records management policies

Quickly discovery and produce business records for audit purposes

The average cost to defend a corporate lawsuit per case? (Gartner, 2006)

The cost of an average e-discovery request?

Sources: CIO Magazine survey 2007; IBM Tivoli Market needs and profiling study 2005;

© 2010 IBM Corporation88

Introducing IBM Smart Archive Strategy

Collaborative(Quickr, SharePoint)

ERP / CRM(SAP, PeopleSoft …)

Data

Content(Documents, Images …)Reports

PaperEmail

)Notes, Exchange(

On Premise(Custom Config)

Appliance(Pre-Config)

As A Service(SaaS, Multiple Options)

Cloud Ready Archive Storage

Value Added Services• Optimization Services• System Services• Managed Services• Reference Architecture• Information Governance

Optimized and Unified Assessment, Collection and Classification

Flexible and Secure Infrastructure with Unified Retention and Protection

Integrated Compliance, Records Management, Analytics and eDiscovery

© 2010 IBM Corporation9

IBM Smart Archive Strategy Value

A better understanding of what to archive

A low cost, secure infrastructure

A choice of implementations

Flexible retention policy management

Assures compliance while enabling advanced analytics and eDiscovery capabilities

Unites the power and value of IBM Software, Systems and Services.

© 2010 IBM Corporation10

Introducing IBM Information ArchiveNext Generation Information Retention Solution

Universal, scalable, and secure storage repository

- For structured and unstructured information, compliant or non-compliant

Integrated Archive Appliance- Combines the best of IBM Software, Hardware & Services

Protects Data - By enforcing the industry’s most stringent information retention laws

Highly versatile, highly scalable information retention solution- For mid-size and enterprise organizations

© 2010 IBM Corporation11

Accepts Information from Multiple SourcesStructured or unstructured dataCompliant or non-compliant

e-mails Files

ERP

Database

PACS

Paper

www

Interoperability Matrix

© 2010 IBM Corporation12

Advanced Data Protection Features

Clustered nodes & Redundant Array of Independent Disks (RAID) 6 to maintain data integrity even in the event of two disk failures.

Redundancy

Enhanced Disaster

Recovery

Advance Copy Services increase the availability of archived documents and prevents data loss in the event of a disaster

Multiple Protection

Levels

Basic to maximum protection levels address all possible data retention requirements

© 2010 IBM Corporation13

Enhanced Tamper

Protection

Maximum tamper protection with patent-pending feature that eliminates root access

Encryption can provide added security for data storage and remote data transmission

Encryption

Advanced Data Protection Features

Maximizes data protection capabilities with offsite, low-cost Tape or Virtual Tape (VTL) support

Optional Tape & VTL Backup

© 2010 IBM Corporation14

Deduplication&

CompressionShrink the amount of data to store

Data Optimization Features

Hierarchical Storage

Management

Automatically distributes and manages information on disk, tape, or both

© 2010 IBM Corporation15

Supports multiple ingest and input models including custom applications

Multiple Archive Collections, Multiple Protection Levels

ECM ArchiveRepository

Users and Applications

Custom Applications

One Namespace

Collection 1

Disk

NAS

Collection 2

Disk

NAS

Collection 3

Disk

SSAM

Clustered Clustered

IBM Information Archive

LAN

A single Information Archive can be configured with 1 to 3 archive collections

Collections are accessible via Network File System (NFS) or System Storage Archive Manager (SSAM) protocols or a combination of both

Each collection can be customized to support different protection levels Tape

NFS SSAMNFS

© 2010 IBM Corporation16

Information Archive Next Generation Architecture

API Client

API Server

NAS Client

NAS Gateway

Disk Storage

Web-browser

API Server Mgmt UI

Server Mgmt UI

Storage Mgmt UI

Collection 2Collection 1

NAS Client TSM API Client Web-browser

NAS Interface

GPFS Filesystem & IA Middleware

TSM Server

Disk Storage

SSAM ServerIA Mgmt GUI

Disk Storage

Previous Generation Architecture(DR450 & DR550)

Information Archive Architecture

© 2010 IBM Corporation17

Customizable Protection LevelsMost Flexible and Comprehensive Data Protection Levels

Each collection can be customized with its own protection level

Basic Protection - enables the greatest flexibility for managing an organization’s information retention needs

Intermediate Protection - allows IT administrators to increase and decrease retention periods as needed, but information deletion is only allowed after the retention period has expired

Maximum Protection - helps IT administrators manage information with strict business, legal or regulatory retention needs

Maximum

Intermediate

Basic

*SSAM Collections are always Maximum compliance

© 2010 IBM Corporation18

X

Time BasedTime Based

Event Based with Fixed Protection PeriodsEvent Based with Fixed Protection Periods

Fixed Period

MinimumFixed Period

XEvent

Dispose after fixed period from creation date

Dispose after fixed period from event dateDay 0

Day 0

Customizable Policy-based Retention Features Most Flexible and Comprehensive Data Retention Policies

MinimumFixed Period

Event Based with no Fixed Protection PeriodEvent Based with no Fixed Protection Period

XEvent

Dispose after eventDay 0

© 2010 IBM Corporation19

Security and Compliance Characteristics

Role based security- Security, Systems and Archive Administrators

- Archive User, Service Engineer and Auditor Roles

- Audit logs provide compliant audit trail.

Physical security- Locking cabinet

To achieve maximum compliance protection with IBM IA customers enable the Enhanced Tamper Protection feature

- Removes root login capability from the IBM IA Cluster- Neither customer nor IBM has root login authority- Once enabled, cannot be disabled- Expected admin and support operations pre-programmed to remove need for root

access- Best practice to enable during installation- We have a procedure for an unforeseen emergency requiring root access by

delivering a signed and time-bounded patch to the customer.

© 2010 IBM Corporation

Initial configuration is integrated and guided- Start archiving data in 1 day or less

Consolidated and integrated management in a single administrative interface

- Security, administration, monitoring, troubleshooting, serviceability

- Manage multiple collections from a single interface

- Role-based administrative security

Simple, efficient, consistent administrative experience

- Wizards guide user on the creation of objects

- Overviews provide high level situational awareness of system health

- Consolidation of information for efficient administration

Task-oriented, with drill down where needed for deeper configuration and trouble shooting

20

Information Archive Integrated, Web-based Interface

© 2010 IBM Corporation

Ta

pe Lib

rary

21

Stora

ge

Expa

nsio

n Fra

me

Inside IBM Information Archive (R1.2) Hardware

– Dual-quadcore clustered servers– Integrated (closed) appliance– Internal IP and SAN networks– SATA storage

• RAID 6, 608 TB max usable– Petabytes of external tape– HW-based metro and global

mirroring– 3 collections per appliance– Remote Support Module (custom)

Software– System Storage Archive Manager– Tivoli Storage Manager – HSM– IBM Director– DS Storage Manager (custom)– Scale Out File System – GPFS– Management Console

Security– Role-based administration– LDAP or Active Directory for user

management– No root access in compliant mode

Management Node

Management Console

NAS / SSAM / GPFS Linux Server

(1 to 3)

Storage Expansion(Up to 6)

Storage Controller(1)

Ethernet / FCSwitches

Remote Support Mgr

© 2010 IBM Corporation

IBM Information Archive enhancements!Next Generation Information Retention Solution

•Addition of 2 TB disk drives- Doubles disk capacity of IA in the same footprint (608TB)

•Improvement for IA Mirroring and Disaster Recovery- Greatly simplifies installation, failover and failback process- Provides additional functions for monitoring mirrored IA systems from one IA GUI

•Usability Improvements of the IA GUI- Display information about IA-Node status and components running- Allow admin to change the time zone of the IA system- Allow grouping of multiple events in one notification

•Improved operation of File Archive Collections- LDAP server is not mandatory anymore- Allow to export multiple shares per file archive collection and grant access to different users

© 2010 IBM Corporation23

Consider the long-term costs of ownership

SATA disk offers lower cost access to online data vs. FC disk

Tape offers lower cost than disk and consumes less energy, but often not ideal for online access

Blended solution:

Online access to most recent content

Lower cost, energy-efficiency for long-term

Maximize Archiving Efficiency with Optional External Tape

$7

$3.5

$0

Mill

ion

s

SATA Disk

$6,365,950

Tape

$946,405

Blended Disk and Tape

$2,255,346

Hardware

Prod + DR Carts

Maintenance

Power & Cooling

Floor space

Cut TCO 50% with Blended Tape and Disk*10 year TCO example. Assumes 250TB storage, 25% growth/yr

* TCO estimates based on IBM internal studies.

Information Archive offers unique disk and tape archiving options

© 2010 IBM Corporation24

Cohasset Associates performed a compliance assessment of the IBM Information Archive’s capabilities to meet the requirements and practices of SEC Rule 17a-4(f).

Independent Assessment of Information Archive

Cohasset Associates’ assessment of the IBM Information Archive found that the IA functional capabilities prevent any erasure or overwrite of electronic records stored pursuant to SEC-required retention periods.

It is Cohasset Associates’ opinion that the IBM Information Archive meets the SEC’s requirements and good records management practices for storing and managing electronic records – as set forth in SEC Rule 17a-4(f).

© 2010 IBM Corporation25

In Closing - Simplified Cloud-ready Smart Business System Adapts as business needs evolve

Reduce primary storage costs by offloading inactive & historical data

Leverage a single, secure storage repository for all your archival information, under one roof !

Leverage integrated tape strategy for scalability and energy efficiency, and keep your power & cooling costs down

Retain and manage information for however long you need & future-proof your information to next technology

Support your compliance efforts with ease, so you can avoid the legal and financial risks

Keep your capacity & costs minimum by eliminating duplicate content

© 2010 IBM Corporation26

8 IBM Corporation 1994-2008. All rights reserved.References in this document to IBM products or services do not imply that IBM intends to make them available in every country.

Trademarks of International Business Machines Corporation in the United States, other countries, or both can be found on the World Wide Web at http://www.ibm.com/legal/copytrade.shtml.

Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.UNIX is a registered trademark of The Open Group in the United States and other countries.Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.Other company, product, or service names may be trademarks or service marks of others.

Information is provided "AS IS" without warranty of any kind.

The customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer.

Information concerning non-IBM products was obtained from a supplier of these products, published announcement material, or other publicly available sources and does not constitute an endorsement of such products by IBM. Sources for non-IBM list prices and performance numbers are taken from publicly available information, including vendor announcements and vendor worldwide homepages. IBM has not tested these products and cannot confirm the accuracy of performance, capability, or any other claims related to non-IBM products. Questions on the capability of non-IBM products should be addressed to the supplier of those products.

All statements regarding IBM future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.

Some information addresses anticipated future capabilities. Such information is not intended as a definitive statement of a commitment to specific levels of performance, function or delivery schedules with respect to any future products. Such commitments are only made in IBM product announcements. The information is presented here to communicate IBM's current investment and development activities as a good faith effort to help with our customers' future planning.

Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput or performance improvements equivalent to the ratios stated here.

Photographs shown may be engineering prototypes. Changes may be incorporated in production models.

Trademarks and Disclaimers

© 2010 IBM Corporation27