SlideShare uma empresa Scribd logo
1 de 20
Best Practices & Time-Saving
Techniques for Protecting Exchange




                         ©2011 Quest Software, Inc. All rights reserved.
Agenda
•   Challenges in protecting Exchange
•   Recommended best practices for protecting and
    recovering Exchange
•   Solutions for Exchange available today
•   Quest data protection solutions




                                                                                               1

                                             ©2011 Quest Software, Inc. All rights reserved.
Challenges
• Exponential data growth
• Email is increasingly seen as mission-critical
• Less tolerance for data loss and prolonged downtime
• Increasing number of requests to discover and recover
  data from within Exchange




                                                                                              2

                                            ©2011 Quest Software, Inc. All rights reserved.
Plan for The Unexpected
• Server Failure                    • Single Mail Item Loss
 – OS failure, hardware failure      – A user inadvertently hard-
                                       deletes an important mail item
• Database Failure
 – Database corruption or disk      • Site Disaster
   failure                           – Power outage, network
                                       outage, natural disaster
• Single Mailbox Loss
 – A mailbox is deleted and needs
   to be recovered




                                                                                                     3

                                                   ©2011 Quest Software, Inc. All rights reserved.
Gather Organizational Requirements
• Measure the value your organization places on its
  email data
• What are the acceptable levels of data loss?
• What is the acceptable length of time for service and
  data restoration?
• Where are my Exchange Servers located?




                                                                                             4

                                           ©2011 Quest Software, Inc. All rights reserved.
Exchange Protection Approaches




                                                                                   5

                                 ©2011 Quest Software, Inc. All rights reserved.
Set Recovery Objectives
• Recovery Time Objective (RTO)
 – The amount of time elapsed between a loss or disaster and the
   restoration of business operations. It is the time required to physically
   recover the data or application and have it ready for use


• Recovery Point Objective (RPO)
 – The point in time that recovered data will be recovered to.
 – For example, if you recover a file that was backed up yesterday then
   your recovery point is one day




                                                                                                            6

                                                          ©2011 Quest Software, Inc. All rights reserved.
Create a Service Level Agreement (SLA)
• Obtain agreement on objectives in the form of a SLA
• Include the following categories:
 – Availability
 – Hours of operation
 – Performance measures
 – Recovery parameters
 – Support parameters
 – Environmental dependencies and assumptions




                                                                                                  7

                                                ©2011 Quest Software, Inc. All rights reserved.
Protecting Exchange




     Your protection strategy
   should directly support your
      recovery requirements



                                                                            8

                          ©2011 Quest Software, Inc. All rights reserved.
High Availability
• Database Availability Groups (DAG)
 – New framework introduced in Exchange 2010
 – A group of mailbox servers (up to 16) that replicate to one another,
   providing database-level protection from outages
 – Uses Exchange Continuous Replication (logs shipping) and a subset of
   Windows failover clustering technologies to provide continuous HA and
   site resiliency




                                                                                                          9

                                                        ©2011 Quest Software, Inc. All rights reserved.
Backup
• Traditional Backup
 – Protection for information stores, individual storage groups, or
   individual databases
 – Enterprise protection for heterogeneous environments (centralized
   management and monitoring)
 – Target disk or tape



• Real-time Backup (Continuous Data Protection)
 – Watches all changes occurring during a defined period
 – An initial sync/seed of the data to be protected is created
 – All changes that occur after the initial sync/seed are captured and
   available for restore



                                                                                                           10

                                                         ©2011 Quest Software, Inc. All rights reserved.
Disaster Recovery
• Host-Based Replication
 – Cross-platform replication for applications like Microsoft Exchange, as
   well as Microsoft SQL, MySQL, and PostgreSQL residing in
   Windows, Linux, Solaris and Mac OS X environments
 – Centralized management and monitoring of replication


• Replication of Backup Copies
 – Replicates changes to protected datasets from one (or many) backup
   servers to another backup server




                                                                                                          11

                                                        ©2011 Quest Software, Inc. All rights reserved.
Recovering Exchange




    Clearly document and test
  recovery strategy to minimize
     the chance for mistakes



                                                                           12

                         ©2011 Quest Software, Inc. All rights reserved.
Elements of a Restore Strategy
Include the following in your restore strategy:
• Build a communications plan
 – Identify the personnel involved in disaster recovery efforts, their
   responsibilities and chain of command

• Set restore priorities
 – Prioritize what should be restored

• Provision a ―dial-tone‖ system
 – Allow users to send and receive new email before the historical email
   data has been fully restored

• Restore type
 – Use the recovery storage group to restore the data and merge the
   restored data into the ―dial-tone‖ database

                                                                                                            13

                                                          ©2011 Quest Software, Inc. All rights reserved.
Quest Data Protection Family
 FUNCTIONS                                                                                       PLATFORMS

    Identity           CAPABILITIES AND BENEFITS
  Management
                   •   Best-of-breed solutions that span physical, virtual,
                       and application-level data protection
  Performance
                   •   Heterogeneous platform support
   Monitoring
                   •   Reduce the amount of data required for backups
                       by 90% while gaining scalability
 Data Protection   •   Object and application-level recovery to ensure
                       availability and immediate access

 Development
                       PRODUCTS

   Migration



 Administration


                                PHYSICAL I VIRTUAL I CLOUD


                                                                                                                                14

                                                                              ©2011 Quest Software, Inc. All rights reserved.
Quest: A Leader in Data Protection
& Application Management

         • Linux Backup: NetVault Backup (IDC Japan)
  #1

         • Oracle Backup: NetVault Backup (DCIG Buyer’s Guide)
  #1
         • Purpose-built backup for VMware (in speed, scalability, and number of
  #1       customers)


         • Virtual Server Management Software Vendor: Quest Software (IDC US)
 Top 3

        • Worldwide Storage Management Software Vendor: Quest Software
 Top 10   (Gartner)



                                                                                                            15

                                                          ©2011 Quest Software, Inc. All rights reserved.
NetVault Backup
Cross-platform backup and recovery

• Extensive platform/application support
  – Unix, Windows, Linux. Mac OS
  – VMware ESX/ESXi, Hyper-V, Xen, KVM
  – Protection for 12 popular business applications

• Scalable yet simple
  – 50% faster recovery, 30% faster backup than comparable
    products
  – 45 minute install and setup

• Broad tape and disk support
• Bare Metal Recovery (BMR) agent




                                                                                                               16

                                                             ©2011 Quest Software, Inc. All rights reserved.
NetVault FastRecover
Real-time backup and instant recovery

• Patented FlashRestore™
  - Near instant recovery for Microsoft Exchange, as well as Oracle, SQL
    Server, and Windows file-system data

• Efficient replication for remote offices
  - Bandwidth-friendly replication supports ROBO disaster recovery scenarios

• Integrates with existing backup products
  • Export and back up NVFR datasets via CIFS

• Eliminates backup windows

• Recover data from any point in time—even down to the second!



                                                          NVFR Timeline Indicator
                                                                                                               17

                                                             ©2011 Quest Software, Inc. All rights reserved.
Recovery Manager for Exchange
Discover, Recover Individual Mail Items, Attachments & Conversations

• Find and retrieve message-level data in minutes from
  multiple sources
 • Exact items from a single-pass backup
 • Eliminates the need for both a database backup and a brick-level backup

• Perform federated, intelligent searches
 • Search multiple email data sources simultaneously
 • Search keywords in message body, ID, headers, message
   classes, categories, deleted items, conversation threads and attachment
   type and content

• Support for Backup Software
 • Find and retrieve data across Quest's NetVault Backup
   and NetVault FastRecover, native Microsoft backups
   and most major third-party backup software

                                                                                                             18

                                                           ©2011 Quest Software, Inc. All rights reserved.
http://www.quest.com/data-protection




                                       ©2011 Quest Software, Inc. All rights reserved.

Mais conteúdo relacionado

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Destaque

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
 

Destaque (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

Best Practices: Protecting Microsoft Exchange

  • 1. Best Practices & Time-Saving Techniques for Protecting Exchange ©2011 Quest Software, Inc. All rights reserved.
  • 2. Agenda • Challenges in protecting Exchange • Recommended best practices for protecting and recovering Exchange • Solutions for Exchange available today • Quest data protection solutions 1 ©2011 Quest Software, Inc. All rights reserved.
  • 3. Challenges • Exponential data growth • Email is increasingly seen as mission-critical • Less tolerance for data loss and prolonged downtime • Increasing number of requests to discover and recover data from within Exchange 2 ©2011 Quest Software, Inc. All rights reserved.
  • 4. Plan for The Unexpected • Server Failure • Single Mail Item Loss – OS failure, hardware failure – A user inadvertently hard- deletes an important mail item • Database Failure – Database corruption or disk • Site Disaster failure – Power outage, network outage, natural disaster • Single Mailbox Loss – A mailbox is deleted and needs to be recovered 3 ©2011 Quest Software, Inc. All rights reserved.
  • 5. Gather Organizational Requirements • Measure the value your organization places on its email data • What are the acceptable levels of data loss? • What is the acceptable length of time for service and data restoration? • Where are my Exchange Servers located? 4 ©2011 Quest Software, Inc. All rights reserved.
  • 6. Exchange Protection Approaches 5 ©2011 Quest Software, Inc. All rights reserved.
  • 7. Set Recovery Objectives • Recovery Time Objective (RTO) – The amount of time elapsed between a loss or disaster and the restoration of business operations. It is the time required to physically recover the data or application and have it ready for use • Recovery Point Objective (RPO) – The point in time that recovered data will be recovered to. – For example, if you recover a file that was backed up yesterday then your recovery point is one day 6 ©2011 Quest Software, Inc. All rights reserved.
  • 8. Create a Service Level Agreement (SLA) • Obtain agreement on objectives in the form of a SLA • Include the following categories: – Availability – Hours of operation – Performance measures – Recovery parameters – Support parameters – Environmental dependencies and assumptions 7 ©2011 Quest Software, Inc. All rights reserved.
  • 9. Protecting Exchange Your protection strategy should directly support your recovery requirements 8 ©2011 Quest Software, Inc. All rights reserved.
  • 10. High Availability • Database Availability Groups (DAG) – New framework introduced in Exchange 2010 – A group of mailbox servers (up to 16) that replicate to one another, providing database-level protection from outages – Uses Exchange Continuous Replication (logs shipping) and a subset of Windows failover clustering technologies to provide continuous HA and site resiliency 9 ©2011 Quest Software, Inc. All rights reserved.
  • 11. Backup • Traditional Backup – Protection for information stores, individual storage groups, or individual databases – Enterprise protection for heterogeneous environments (centralized management and monitoring) – Target disk or tape • Real-time Backup (Continuous Data Protection) – Watches all changes occurring during a defined period – An initial sync/seed of the data to be protected is created – All changes that occur after the initial sync/seed are captured and available for restore 10 ©2011 Quest Software, Inc. All rights reserved.
  • 12. Disaster Recovery • Host-Based Replication – Cross-platform replication for applications like Microsoft Exchange, as well as Microsoft SQL, MySQL, and PostgreSQL residing in Windows, Linux, Solaris and Mac OS X environments – Centralized management and monitoring of replication • Replication of Backup Copies – Replicates changes to protected datasets from one (or many) backup servers to another backup server 11 ©2011 Quest Software, Inc. All rights reserved.
  • 13. Recovering Exchange Clearly document and test recovery strategy to minimize the chance for mistakes 12 ©2011 Quest Software, Inc. All rights reserved.
  • 14. Elements of a Restore Strategy Include the following in your restore strategy: • Build a communications plan – Identify the personnel involved in disaster recovery efforts, their responsibilities and chain of command • Set restore priorities – Prioritize what should be restored • Provision a ―dial-tone‖ system – Allow users to send and receive new email before the historical email data has been fully restored • Restore type – Use the recovery storage group to restore the data and merge the restored data into the ―dial-tone‖ database 13 ©2011 Quest Software, Inc. All rights reserved.
  • 15. Quest Data Protection Family FUNCTIONS PLATFORMS Identity CAPABILITIES AND BENEFITS Management • Best-of-breed solutions that span physical, virtual, and application-level data protection Performance • Heterogeneous platform support Monitoring • Reduce the amount of data required for backups by 90% while gaining scalability Data Protection • Object and application-level recovery to ensure availability and immediate access Development PRODUCTS Migration Administration PHYSICAL I VIRTUAL I CLOUD 14 ©2011 Quest Software, Inc. All rights reserved.
  • 16. Quest: A Leader in Data Protection & Application Management • Linux Backup: NetVault Backup (IDC Japan) #1 • Oracle Backup: NetVault Backup (DCIG Buyer’s Guide) #1 • Purpose-built backup for VMware (in speed, scalability, and number of #1 customers) • Virtual Server Management Software Vendor: Quest Software (IDC US) Top 3 • Worldwide Storage Management Software Vendor: Quest Software Top 10 (Gartner) 15 ©2011 Quest Software, Inc. All rights reserved.
  • 17. NetVault Backup Cross-platform backup and recovery • Extensive platform/application support – Unix, Windows, Linux. Mac OS – VMware ESX/ESXi, Hyper-V, Xen, KVM – Protection for 12 popular business applications • Scalable yet simple – 50% faster recovery, 30% faster backup than comparable products – 45 minute install and setup • Broad tape and disk support • Bare Metal Recovery (BMR) agent 16 ©2011 Quest Software, Inc. All rights reserved.
  • 18. NetVault FastRecover Real-time backup and instant recovery • Patented FlashRestore™ - Near instant recovery for Microsoft Exchange, as well as Oracle, SQL Server, and Windows file-system data • Efficient replication for remote offices - Bandwidth-friendly replication supports ROBO disaster recovery scenarios • Integrates with existing backup products • Export and back up NVFR datasets via CIFS • Eliminates backup windows • Recover data from any point in time—even down to the second! NVFR Timeline Indicator 17 ©2011 Quest Software, Inc. All rights reserved.
  • 19. Recovery Manager for Exchange Discover, Recover Individual Mail Items, Attachments & Conversations • Find and retrieve message-level data in minutes from multiple sources • Exact items from a single-pass backup • Eliminates the need for both a database backup and a brick-level backup • Perform federated, intelligent searches • Search multiple email data sources simultaneously • Search keywords in message body, ID, headers, message classes, categories, deleted items, conversation threads and attachment type and content • Support for Backup Software • Find and retrieve data across Quest's NetVault Backup and NetVault FastRecover, native Microsoft backups and most major third-party backup software 18 ©2011 Quest Software, Inc. All rights reserved.
  • 20. http://www.quest.com/data-protection ©2011 Quest Software, Inc. All rights reserved.

Notas do Editor

  1. At Quest, we place the greatest value on RECOVERY!NetVault FastRecover delivers backup and FlashRestore™ MS Exchange, as well as Oracle, SQL Server and Windows file servers, enabling instant recovery after corruption or data loss. Patented technology delivers immediate availability of mission-critical applications with no need to wait for the full recovery before end users can resume activities. Its built-in replication feature can efficiently send backup data from one FastRecover server to another for enhanced DR protection at remote offices. You can also export and back up via CIFS. FastRecover integrates with Quest’s own NetVault Backup—as well as practically any other third-party backup software.