Best Practices in protecting today's big data and open source workloads

Mark Coletta
Mark Coletta has over 20 years in the IT industry with more than a decade focused on Data Protection. He is currently a Sr. Product Manager at Veritas Technologies responsible for NetBackup’s Application and Database workload portfolio. He is passionate about new and emerging technologies and how best to protect those.


1.Big Data & Why Open Source & Protection How Mark Coletta Sr. Product Manager, NetBackup Veritas Technologies

2.Why do I need to protect my databases

3. Big Data and Open Source Database adoption Drivers for rapid adoption • Digital Transformation • Multi-Cloud • Agility & Cost NoSQL/Open Source databases are now the norm • 78% of organizations reporting using NoSQL or Open Source database • 50% of organizations leveraging Hadoop/HBase 3

4.Databases In Use MySQL 69% MongoDB 54% PostgreSQL 27% Cassandra 19% MariaDB 15% HBase 12% SQLite 8% 0% 10% 20% 30% 40% 50% 60% 70% 80% Source: Gatepoint Reseach, May 2019

5.Data Protection Challenges Big data analytics 40% Hyperconverged 4% Open source databases 28% Public Cloud 12% Virtualized 16% Source: Gatepoint Reseach, May 2019

6.• Corporate Management • Identification • Business Strategy • Evaluation • Policy Management • Reporting/Auditing Governance Risk Compliance Measures to ensure conformity of policies and 6 laws

7. Natural Disasters | Regional Impacts 7

8. Localized Business Impacts Causes of 100 Major Public Outages Jan 2016 - Jun 2018 Root causes of unplanned outages: Fire Cooling or Suppression Mechanical; 1 1. Power outages Fire; 3 Unknow, 5 2. Network Security Issues; 6 3. Software error 4. Cyber Security Incident/ Ransomware 5. Unknown Power Outages; 36 6. Fire IT Systems; 22 80% were preventable with technology resiliency Uptime Institute Focus June 2018 *285 data centers across the US from 16 industry verticals Network; 25 Source: Uptime Institute - June 2018 8

9. Cyber Security and Ransomware Ransomware attacks becoming more frequent Any Company / Sector WiPro Russian and Ukrainian Banks Maersk & Co In 2017 the FBI’s Internet Crime Complaint Center (IC3) estimated that ransomware attacks cost companies $2.3M 9

10.How do I protect myself

11. Data Protection Strategy Considerations Time Cost Complexity ➢ Downtime ➢ Downtime ➢ Time to recover ➢ Infrastructure ➢ Management ➢ Protection/Recovery ➢ Storage ➢ Infrastructure tasks 11

12. Recovery Point Objective / Recovery Time Objective Last time data Incident System fully was useable operational Time RPO RTO How far back to recover? How long to recover? 12

13. Types of Protection/Recovery Snapshot/Replication Manual Backup Software Backup/Recovery 13

14. Manual Backup/Recovery Pro Con ➢ Less infrastructure resources ➢ Does not protect against human error or ➢ Less planning malicious activity ➢ Less upfront cost ➢ Data may be unrecoverable/re-creatable ➢ Compliance verification ➢ Customer confidence ➢ High RTO ➢ Little/No RPO ➢ No Long term retention ➢ Time consuming for personnel 14

15. Snapshot/Replication Pro Con ➢ Multiple copies ➢ Does not protect against human error or ➢ Minimal or no data loss malicious activity ➢ Short RTO and RPO ➢ High hardware and Network costs ➢ Failover/Failback (automatic or manual) ➢ High maintenance costs ➢ Fast restore from snapshot ➢ Higher complexity ➢ Snapshot retention requirements ➢ Susceptible to data corruption ➢ No Long term retention capabilities ➢ Planning and design consideration 15

16. Backup Software Pro Con ➢ Long Term retention ➢ Initial investment cost ➢ Resources based on usage ➢ Planning and design consideration ➢ Compliance verification ➢ Media Failure ➢ Confidence in recoverability ➢ Cost to manage ➢ RTO/RPO based on needs ➢ Can leverage snapshots ➢ Protects against human error or malicious activity 16

17. How much is your data worth? AND How much are you willing to risk? 17

18. The mean cost of an unplanned outage is $8,851 per minute or $530,000 per hour.* * 2016, Ponemon Institute, “The Cost of Data Center Outages” 18

19.Q&A Click to add text

20. Thank you! Mark Coletta Copyright © 2018 Veritas Technologies. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.