Today, TSM recognized in the industry as a leader in data storage. TSM protects millions of systems and applications worldwide. That is why the product is the choice for more than 80% percent of the Fortune Global 100 companies and 96 of the 100 financial institutions. Gartner placed TSM at the top or the “Magic Quadrant” for storage management technologies.
There are a number of reasons why so many companies choose TSM as a tool for hedging and archiving of critical data.
Here we highlight four of the most common:
- ROI (Return of Investment)
- TCO (Total Cost of Ownership)
- ROI A transition to the TSM is a strategic decision. To have one solution that provides substantial economic savings is a good argument. TSM uses a unique technology for safeguarding data makes it possible to back up much larger amounts of data, ride-meligere and significantly faster than other solutions. An ROI of 12 months is far from unusual.
- TCO Trailer something together with ROI. A TSM solution in most cases a very reasonable price. Many options are supplied as standard versus competitor-bearing solutions, while the requirement for necessary hardware and infrastructure is reduced considerably due to TSM-effective method for securing data. With TSM are few and far between when we see a need for upgrading the environment to ensure the backup window.
- Scalability and flexibility are in practice not possible to grow out of TSM. The choice of equipment will of course, fit the size of the environment and will be easily upgraded when needed, ex-sempelvis more disk space, tape drives or powerful backup server. utvidel-se/endringer be done with minimal or no downtime. TSM is set up so you want to secure data and has no restrictions on how the software “allows” / function. This solution can be tailored down to the file level of how and when to backup.
- Security TSM was designed to ensure large environments (mainframe) with 24/7 uptime and several terabytes of data, already 20 years ago. TSM’s architecture is very robust and fault tolerant, as long as it is set up correctly. Encryption, backup through the firewall, recovery logging of TSM database and duplication of backup data is some of what is in a default TSM configuration / functionality.
We have on the following page briefly presented the elements of TSM that we think are most important and which support the 4 above points:
Administration TSM has a Java interface where the administrator monitor and perform necessary tasks. “Operational Reporting” provides full control over the system’s daily incidents from a single screen, and set up to send the report as an e-mail so that it is not necessary to log on to TSM to get daily status. Typical transmitted timed events (such as backup status), the status of TSMs database, the status of hardware components (such as how many tape drives that are online / offline or how many free tapes in tape library). Rule-driven backup TSM uses the rules for backup. These specify, among other things number of generations of data to be stored, time limits for how long data should be available to restore after they are deleted from disk, types of files to include / exclude from the backup. It can be given a common set of rules for all servers, or different sets of rules for different groups of servers. This simplifies the management of the system in that there is a need to define and maintain the jobs for each machine and file system, but only to specify the set of rules that apply to a machine. Progressive backup TSM uses a technology called progressive backups (progressive, progress = development). TSM copy at any time, only data that has changed, and use that copy to update its full backup of the system. This way you always have a full backup of all data, without straining the network, servers, disk – or tape systems with the transfer of data is unchanged.
This is part of the design and architecture of TSM as originally developed by IBM for managing and securing large amounts of data on the mainframe. A robust database in TSM makes this technology possible and do not store logs as flat files. This therefore makes it possible to run progressive backup.
Storage Hierarchy TSM can use various storage technologies, and automatically moves data between them. The most common way to use this feature – which we recommend all customers to use – is to let a day go to the backup disk and then copied to tape. Backup data on all servers located in its entirety on the disk, with the exception of full backups of databases, such as back up directly to tape. This provides the best combination of quick backup / restore and cost-effective long-term storage. Backup to disk has been a standard functionality from the first version of the product in 1992, and is not an option.
Use of the disk means that backups and restores can be performed in parallel to / from many systems, and thereby reduce the time drastically. Moving the data on to tape, sort data so that all data from a single server remains connected to tape. This ensures that the restore goes as quickly as possible, should it be necessary to restore from tape. The storage on the disk also makes possible to largely avoid constantly start / stop the tape during backups. This is important to achieve maximum speed, and reduce wear and tear on both tape drives and tapes.
Intelligent Restore all files backed up, both from the last backup and the previous backup versions of files are stored in both disk and tape system and available for restore. This allows a disk, directory or individual file can be quickly recreated as they were after the last backup, or as they were at an earlier date. A TSM administrator request, make use of the Web-based interface for administration and do not know anything about what constitutes a complete restore, or the volume of a particular file resides. This is handled by TSM where all information about the backup files are located in TSMs database. TSM uses a set of rules defined for backup, archiving and automation. These rules adapted to the needs and requirements as a company that has. For example. will be possible to ensure that business critical data to be stored on disk in the backup system to ensure the fastest possible restore. With TSM must therefore not customize the restore requirements that have to backup solution, but can instead implement the Service Level Agrement (SLA’s) one has with users directly in TSMs policy rules. These rules can be defined as fine as a need, right down to individual file or directory level if desired. Reorganisation of data As new versions of changed data is backed up, it will no longer be a need to take care of the older versions. When old, obsolete versions account for more than a certain percentage of the capacity of the disk / tape, TSM will automatically move data that is still relevant to new tapes, and recycle the old tapes. How do we ensure that losses are always optimally utilized, and that the cost of the tape is kept as low as possible. Archiving TSM has archiving as a special service, regardless of the backup. Archiving is made to a separate set of tape cartridges. This provides optimum exploitation of archive-ring media. Archive copies can be given a user specified “life”, after which the au-tomatically deleted. Security in TSM TSM keeps track of all backup data in a relational database. In using this traditional database techniques, such as commit / rollback and recovery logs. We implemented TSM so that it used 2 copies of this base, which is stored on different disks.
When media errors on disk or tape cassettes, TSM could both recover lost data from disaster set of tapes. TSM also has a function to reconstruct a copy of lost / damaged tape cartridges.
Backup and restore using TSM through firewall ports selected according to their wishes / needs, and conducts back-up/restore through the firewall on a very simple and safe way. This is set up on both the backup server and client that will be incorporated in the solution. The communication can be set up to be initiated from either inside or outside, and secured through ID and password, and encryption to verify the servers.
Backup of open files, default functionality of TSM and ensured that all files and directory be backed up even if they are open and / or modified during backup.
Image backup Standard functionality used to recreate a picture of what a server was at one time. Restore an image is significantly faster than traditional restore. The advantage of TSM is that this is a job that is done internally on the backup server. There is no need to transmit data from server. A backup image can be copied to tape cassette, DVD / CD disc and sent to the location where the server should be recreated. Often used in cases where the available bandwidth is small or where it is not possible to replicate data over lines.
Also a standard encryption functionality. Using both the 56 bit DES and AES 128-bit encrypted-ment. Data is encrypted on the client when the backup is encrypted and sent to the TSM server. Data is also stored encrypted on the backup media.
Backup over SAN (LAN-free backup, backup Serverfri) TSM supports both through its own agent. It turns out that TSM’s me-todikk means it is rarely necessary to use a SAN for backup completed on time. But it is supported on all popular operating systems. Disaster Recovery Manager Integrated disaster recovery planning Includes “Extended Edition” and automatically creates a plan for reconstruction of the TSM server if that would be lost. The plan also contains a list of requirements for hardware, list of tapes to be used, instructions and script files that automate the reconstruction of the TSM server and all other servers. The system administrator can also add additional information to be included in the plan, for example. special instructions for the reconstruction of other servers, list of contacts, in-house emergency procedures, etc. TSM support and maintenance 1 year of maintenance and general support for the TSM software is included from the manufacturer.
Supported operating systems and applications TSM supports over 30 different operating systems and database platforms and have a certified list of more than 500 different storage devices.
Figure 1. Magic Quadrant for Storage Resource Management and SAN Management Software
Source: Gartner (March 2012)