BACKGROUND OF DEMAND
In recent years, data centralization has become a trend in enterprise information construction. With the implementation of data centralization, the technological risks of enterprise data centers are also concentrated. Once a disaster occurs in the data center, it will cause the business of all branches and business outlets of the enterprise to come to a halt, and important data to be lost, with unimaginable consequences. With the development of cloud computing, virtualization, and big data technology, how to achieve future oriented and friendly integration with new technologies and environments for business system disaster recovery solutions is also one of the key issues that needs to be considered.
SOLUTION
To meet the continuous protection of core business continuity, uninterrupted backup of important data, and compatibility issues of IT systems, a disaster recovery full lifecycle management solution is created to provide comprehensive protection for local dual active data centers and remote disaster recovery data.
Business backup
1. Full scenario application level backup: The underlying packaged data is stable, reliable, and highly consistent. Only when the usage scenario and data are backed up and restored together can it be valuable. There is no need to master the details, and the application scenario is backed up as a whole, achieving full coverage of a unit's business system.
2. Microsecond level true CDP protection: Based on hard disk sector level CDP data protection technology, it automatically monitors and continuously captures data changes to protect data in real-time and accurately. It can respond to faults such as accidental deletion, modification, and misoperation, and can be restored to any time point as needed, ensuring that historical data can be rolled back to any time point in history and achieving complete machine rollback and full scene recovery.
Emergency disaster recovery
1. Quick takeover of the host: No need to configure an emergency server, fully web-based operation. Take over the host and isolate backup data to protect the security of backup data. Provide CDP protection for the takeover host. Take over the host and add data that can be backed up, recorded, and restored.
2. HA+CDP hot backup disaster recovery: This solution implements CDPHA for critical business systems, achieving both CDP and HA. In the event of a failure or data damage, it performs a second level emergency switch and can switch to any previous time. Although traditional HA (High Available) can also achieve HA, it cannot effectively counter accidental deletion, attacks like WannaCry, and CDP protection that cannot be achieved simultaneously.
Reconstruction and Restoration
1. Heterogeneous host compatibility recovery: It can achieve seamless P-V-C compatibility with only X86 system. Fully utilize the old and make full use of the same hardware system as the original investment. Restore/migrate/drill is convenient and fast, with disaster recovery and easy access to drill resources without worrying too much about target machine hardware compatibility issues.
2. Minute level disaster recovery and reconstruction: RTO is a key indicator for disaster recovery construction, requiring it to be as short as possible and able to reconstruct business in minutes regardless of data size. Different from traditional data backup, the application system needs to wait until the data recovery is completed before it becomes available.
More comprehensive business continuity management