Protecting Virtual Environments with System Center Data Protection Manager 2010

Deploying DPM 2010 can give an organization confidence that:
  • Virtual machines can be quickly and reliably backed up from production Hyper-V servers at frequent intervals throughout the day without a negative impact on performance.
  • DPM replicas and recovery points allow organizations to restore virtual machines not only in their most recently backed up configuration, but in any configuration that has existed throughout the defined protection period.
  • Flexible recovery options allow virtual machines to be restored not just to the original Hyper-V host, but to other Hyper-V hosts and arbitrary file locations. Features such as Item Level Recovery allow items hosted on virtual machines to be restored separately without requiring the whole virtual machine be restored.
  • Microsoft System Center Data Protection Manager 2010 (DPM) provides continuous data protection for virtual machines hosted on servers running Microsoft’s Hyper-V. This protection includes online backup of supported guest virtual machines hosted on clustered or standalone systems; protection of virtual machines during the live migration process; and, item level recovery from host-level backup. DPM 2010 offers disk-to-disk, disk-to-tape, and disk-to-disk-to-tape technologies; all of which maintain the business value of a virtualized infrastructure by ensuring that it is better protected and always available.

    View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Enterprise cloud adoption has evolved rapidly from fringe curiosity to the mainstream. As enterprises increasingly move mission-critical workloads to the cloud, it's important to track best practices to ensure a seamless migration process. While CIOs are becoming increasingly mature and pragmatic in their approach to cloud, surprises and challenges still need to be addressed. Read this eBook to learn the key best practices for cloud deployment success, the importance of SLAs in choosing a cloud provider, and …

  • Testing full recoveries of IT environments requires a proven methodology. Establishing and meeting recovery time objectives (RTOs), configuring a cloud recovery system, and tracking your changing environment are all critical components of a successful cloud recovery operation. It's also important to establish and follow a set of cloud disaster recovery (CDR) best practices. Read this technical guide to learn about these best practices, along with how disaster recovery as a service (DRaaS) can help you complete …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date