Title: Double-Take Software Overview
1Double-Take Software Overview A Platform for
Recoverability
2Agenda
- Introduction to Double-Take Software
- Double-Take Software Products and Technology
- Client testomonial
- Q A
3About Double-Take Software, Inc.
Leading Provider of Software Solutions for
Recoverability Including Continuous Data
Replication, Application Availability and System
State Protection.
- Headquartered in Southborough, MA
- Worldwide Reach - North America, South America,
Europe, Pacific Rim - Focused on the protection of business-critical
applications - 125,000 licenses of Double-Take in over 10,000
customers - 35,000 licenses protecting Exchange
- 35,000 licenses to protecting SQL
- Comprehensive Professional Services Offerings
- Prestigious Microsoft Certifications
4Your Solution Needs
- What challenges are you facing in your DR plan?
- What types of servers do you want to protect?
- About how much data do you have to protect?
- Have you chosen a DR Site?
- What kind of connection will you have?
- Do you have an RTO and RPO defined?
5The Keys to Recoverability
Replication Host-based, real-time, byte-level,
asynchronous replication across any distance with
WAN optimization to minimize bandwidth usage and
requirements
Failover Real-time monitoring for automatic or
manual failover for individual applications, file
shares, and whole servers - locally or remotely
Recovery Recover data or entire servers over any
distance while users remain online, with minimum
downtime
6Data Protection
- System Friendly Asynchronous Replication
- Low CPU Overhead
- Defined Memory and Disk Usage
- Write Order Intact Replication
- Bandwidth Friendly Data Movement
- User-definable Replication Sets
- Compression, Scheduling, Scheduled Bandwidth
Throttling capabilities - Point-in-Time Recovery
- Integration w/Volume Shadow Copy Services
7Double-Take Technology Overview
Source
Target
Applications
Applications
OS
OS
Double
-
Take Filter
Disk
Disk
Systems
Systems
8Double-Take Technology Overview
Source
I/O Operations examined in Kernel Memory
Applications
Protected File? Write or Change?
OS
Yes
No
Disk
Systems
9Double-Take Technology Overview
Always Same I/O order Same Data Same
File Option Different Directory
Target
Applications
OS
Disk
Systems
10Double-Take Queuing and Error Correction
Send Queue
Rcv Queue
Ack Queue
11Failover Solutions
- Application-Level Failover (RTO 30min)
- Applications like Exchange, SQL and File Servers
using the Application Manager capabilities - Works with Cluster-based Deployments
- Full-Server Failover (RTO 30min)
- Custom-developed applications or applications
dependent on system state information - Replicate and Failover OS, Applications and Data
- Works for all stand-alone Windows Servers
- Assists in One-to-One Server Migrations
12How Application Failover Works
Source
Target
Replication
Failover Monitoring
- Application Services Started
- Failover Name, IP and/or DNS Records
- Failover Active Directory Hostname
- IP ICMP or Heartbeat Monitoring
- Detect Failure in Seconds or Minutes
- Users can reconnect within minutes of failure
- Failover can occur across a LAN, WAN and even
NAT - Failover more than one Server Identity to the
Same Target Server - Failover Scripting for Custom Configurations
13How Application Failback Works
Source
Target
Restoration
Replication
Failover Monitoring
- Failback Source Identity
- Bring Source Application Online
- Users Reconnect Within Minutes
- Recover or Replace Source Server
- Restore Data to the Source Server
- Start Replication and Resume Failover Monitoring
for Continued Protection
14How Full-Server Failover Works
Staging Area
OS and Applications
Data Volumes User and Application Data
15Server Recovery Option
- Tier 2/Tier 3 Server Recovery (RTO 4-24 hours)
- Same Recovery Type as FFO
- Local, Remote or Both
- Restore to Physical or Virtual Systems
- Assists with Swing-Server Migrations
16Double-Take Server Recovery Option
Protect Multiple Production Servers With One SRO
Image Server
Recover Back to the Original Server, to New
Hardware, or to a Virtual Machine
17Double-Take Virtual Recovery Assistant
- Protect physical or virtual servers directly into
VMWare .VMDK files with real-time replication - Protect the entire server including the OS,
applications and data - Protect multiple source servers with a single
virtual target server - Failover automatically or manually within minutes
- Lower TCO with virtualization and many-to-one
consolidation.
18Virtual Recovery Assistant
DT-VRA
C
DT-VRA
FS-System
C
System.vmdk
C
System.vmdk
E
FS-Data
FS-System.vmdk
File Server
C
EX-System.vmdk
FS-System.vmdk
E
FS-Data.vmdk
EX-Data.vmdk
FS-Data.vmdk
C
EX-System
File Server
EX-System.vmdk
DB-System.vmdk
E
EX-Data
EX-Data.vmdk
DB-Data.vmdk
Exchange
DB-System.vmdk
C
DB-System
DB-Data.vmdk
E
DB-Data
Database
19How DTVI Works
- Must be running ESX Server 3.0.0 and VMware
VirtualCenter 2.0.0 - Leverages VMware APIs for virtual machine
snapshot functionality - Snapshots include the entire VM (OS, Apps, Data)
and can be used with a non-Windows Guest OS - Snapshots are time-coherent across all virtual
disks configured for a protected virtual machine - Extends staging of virtual machines across
geographical boundaries (WAN replication)
20How DTVI Works
Administrative Client
Replica VM Files
Source VM Files
Committing (remove_snapshot)
21Greg Saraydarian Financial Services Organization
22Customer Solution
- Solution set for data protection and availability
- Used
- Double-Take Replication
- Double-Take Application Manager
- Protecting/has protected several versions of
Exchange Server
23QA
24Thanks!
For More Information http//www.double-take.com Yo
u may close the webinar window at any time.