1
��
Table�of�Contents�
1. Introduction ............................................................................................................................................. 2
2. Features ...................................................................................................................................................... 3
2.1 Backup .................................................................................................................................................... 3
2.2 Attributes ............................................................................................................................................... 4
2.3 Data Disaster Recovery ..................................................................................................................... 5
2.4 Data Management ............................................................................................................................. 6
2.5 Operation and Maintenance Management ............................................................................... 7
3. Applications ............................................................................................................................................. 8
3.1 Global Operation and Maintenance Management ................................................................. 8
3.2 Heterogeneous Database Protection .......................................................................................... 9
3.3 Virtual Machine Protection ............................................................................................................ 10
3.4 High-availability Database Disaster Recovery ........................................................................ 11
3.5 Security-enhanced backup and recovery ................................................................................. 12
4. Supported�Software�Environment ............................................................................................... 13
5. Enterprise�Introduction ..................................................................................................................... 15
�
2
� �
DBackup is security software for enterprises that integrates data backup, disaster recovery and
high availability. It is designed to protect the operating systems, databases, applications, files and
virtual machines of enterprises. When a data disaster strikes, DBackup can recover the data
completely, accurately and instantly.
Data�backup�– Various backup methods include full
backup, differential backup, incremental backup and
log backup. Users can customize backup strategies
for different types of data according to the usage of
information resources in corporate environment.
Data� recovery –Supports
full recovery as well as
designated recovery for a
single file or mail. Enterprises can perform a recovery for question files
and get back to business quickly.
Data�disaster� recovery – Various approaches include off-site disaster
recovery, CDP (Continuous Data Protection), zero data loss and data
synchronization. It can build a comprehensive data disaster recovery program for enterprises.
Data� high� availability – Integration of shared storage high availability and mirroring high
availability ensures a high-availability protection of data in different operating environments.
DBackup is one of the few products that are certified by 3C
(China Compulsory Certification) which is mandatory
according to relevant laws and regulations.
DBackup is also one of the Chinese backup and disaster recovery
products that have been certified by Oracle BSP (Backup Solution Program). It has met the
requirements of Oracle database concerning its compatibility with Oracle products, ease of
operation, high performance and other aspects.
Introduction
3
��
★ Enterprise-level�heterogeneous�data�protection�
Supports backup, synchronization and recovery on Windows, Linux, AIX, Solaris,
HP-UX, NeoKylin (Loongson and FT), etc.
★ Enterprise-level�heterogeneous�database�protection�
Supports backup and recovery of different databases like Oracle, SQL Server, MySQL,
Sybase, DB2, Informix, MongoDB and PostgreSQL as well as domestic databases like DM,
Kingbase, GBase, ShenTong in Windows, Linux, AIX, Solaris and HP-UX.
★ Protection�for�office�applications�
Supports backup and recovery of popular office applications in different OSs
including Microsoft Exchange Server, Lotus Domino, Microsoft SharePoint and Microsoft
Active Directory.
★ Protection�for�popular�operating�systems�
Quick backup for popular operating systems including Windows and Linux with
simple operations. In case of OS failures, users can recover the system with the latest
backup through various protocols like P2P, P2V and V2V.
★ Complete�solution�for�virtualization�platforms�
Supports backup of virtual machines on virtual platforms like VMware, Hyper-V, Xen,
Xen Server, KVM and FusionSphere and also virtual machines in multi-homed host cluster
environment. Users can instantly recover it to a certain backup checkpoint in case of VM
failures, data loss, corrupted applications and host damages.
★ Security-enhanced�backup�and�recovery� �
Apply multiple authentications like USB-Key and account-password verification to
ensure legitimate access and identify access source servers with machine fingerprint. It
has built a strict role management system controlling the approval process of backup and
recovery. In the meantime, it extracts characteristic information from the backup data to
prevent unauthorized tampering and guarantee a high-level data protection.
Features--Backup
4
�
�
★ Maximally�utilized�storage�pool�
Use “Internet storage cloud” to realize unified management of storage spaces by
incorporating available enterprise storage spaces into DBackup storage pool.
Users can build storage pools of various sizes and types ( eg: local pool,
de-duplication pool and tape pool) according to different storage requirements thus
properly utilizing available spaces with improved efficiency.
★ Instant�backup�for�massive�small�files�
Apply multi-level indexing and multi-thread paralleling processing for data
acquisition to accelerate the backup speed by 10 to 20 times.
★ Hot�backup�for�MySQL�database�
Hot backup of the MySQL database without interfering with its functionalities and can
perform instant data recovery to any checkpoint.
★ Hot�backup�for�Informix�database�
Hot backup of the Informix database without interfering with its functionalities using
ON-Bar and can perform data recovery to any checkpoint.
★ Recovery�of�a�single�Exchange�mail�
Supports designated recovery of a single mail on Exchange Server. It also supports
online recovery without interfering with normal access of other mail data.
★ � D2T�(Disk�to�Tape)�direct�storage�
Backup data transmission via LAN-based or
LAN-Free network to physical or virtual tape
libraries, which could be used for instant data
recovery to target server.
Features--Attributes
5
★ High�availability�based�on�shared�storage�
High-availability cluster based on shared storage designed for popular applications
like Oracle, SQL Server, MySQL and DM. 1 to 1 or 1 to N high availability combinations
could be built between active server and standby server. In case of malfunction of active
server, standby server could be instantly activated thus improving robustness of core
business systems and ensuring 24/7 non-stop operation.�
★ Mirroring�high�availability�
It builds high availability cluster through mirroring if shared storage cannot be built.
DBackup can detect any change of data through real-time monitoring of active server and
activate the standby server in case active server fails. �
★ CDP�(Continuous�Data�Protection)�disaster�recovery�
Continuously monitoring IO changes on application server and synchronize the
changes to backup server. It supports data recovery to any checkpoint by virtual volume
technology to meet higher demands of RTO (Recovery Time Objective) and RPO
(Recovery Point Objective) of enterprises.
★ Zero�data�loss�
Zero data loss protection for Oracle databases. It can be used for backup for data
protection and data synchronization for business takeover to meet any level of enterprise
data protection requirements.
★ Off-site�disaster�recovery�
Stores the backup sets to multiple storage nodes by synchronization and replication
among storage pools. Based on the “Two Places & Three Centers” model, one backup
set is stored on / off site. Off-site backup sets could be used for recovery in case on-site
backup set is damaged.
Features—Data� Disaster� Recovery
6
�
★ Synthetic�backup�
For data of large size, due to the time length and the bandwidth a full backup takes,
the backup strategy is to apply incremental backup after a full backup. Backup sets will be
merged periodically into a new full backup set. And the cycle
repeats itself.
★ High-density�data�compression�
Use high-density data compression for backup data to
reduce bandwidth occupation, improve backup efficiency and
decrease the use of storage space.�
★ Accurate�data�de-duplication�
Data de-duplication on the source system significantly reduces redundancy among
backup sets by up to 97% through accurate data fingerprint comparison and efficiently
utilize enterprise storage space.
★ External�validation�of�file�backup�sets�
Recovered data will be verified according to the MD5 documents provided by the user
to ensure consistency between backup and recovered data.
★ Periodical�disaster�recovery�drill�of�databases�
Every backup set will be periodically recovered to a specific backup server to verify the
availability and meanwhile perform a disaster recovery drill.
★ Custom�speed�control�
Speed control of a specific time period. It also supports speed control of off-site
disaster recovery at a specified time period.
Features—Data� Management
7
�
★ Custom�backup�strategy�
Flexible backup strategy management allows users to have their backup scheduled to
be done immediately or every minute or month. Backup strategy could be customized
according to their enterprise information security requirements and backup will be
carried out at a certain time or periodically.
★ � Multi-user�access�control�
It allows creation of multiple users with specific authorizations such as backup &
recovery, local / supervisory monitoring, reporting reviews, system administration and
log auditing, so that users have the appropriate access or authorization.�
★ Data�transmission�under�poor�network�conditions�
With unique poor network support technology, enterprises can have data protection
under current network conditions. Even with unstable network, efficient off-site backup
and recovery could be achieved by resuming broken download through local caching
without heavy reliability on the proprietary, high-speed, fiber-optic network.�
★ Supports�popular�external�storage�devices�
Popular tape libraries, robot arms and virtual tape libraries like Quantum and
Tandberg.
★ Supports�LAN-Free�backup�
It supports LAN-Free backup of files, operating systems, databases and virtual
machines to significantly improve backup speed and decrease IP network occupation.
★ Various�backup�and�recovery�methods�
Supports various backup methods including full backup, incremental backup,
differential backup and log backup and various recovery methods including mount
recovery, media recovery, checkpoint recovery and automatic disaster recovery.
★ Multiple�storage�modes�and�functions�
Compatible with IP SAN, VTL, NAS, etc.
Features—Operation� and� Maintenance� Management
8
�
Operating�system�protection�
Present�situation�and�demands�
OS backup and recovery on Windows and Linux;
OS backup without interfering with ongoing services;
Quick OS recovery through simple guidance;
A complete solution for system upgrades, migration and large-scale deployment.
Solutions� �
Install DBackup server module on the backup server and the client module on the
server to be backed up;
Periodically automatic OS backup according to your backup strategy without
shutting down the server. Supports full backup and incremental backup which can
largely reduce the time and lessen backup data;
OS recovery using CD or USB drive.
OS Bare-Metal recovery (BMR) through P2P, P2V, V2V protocols and recovery from
physical/virtual machines to physical/virtual machines.
Applications
9
�
Heterogeneous�database�protection�
Present�situation�and�demands�
Information system deployed on various types of operating systems (Windows,
Linux, Solaris, AIX, etc.).
Running various types of databases on existing server (Oracle, SQL Server, MySQL,
etc.).
Use the same software to backup and manage all types of databases。
Solutions� �
Deploy DBackup;
Install DBackup server module on the backup server.
Install DBackup client module on the server to be backed up;
Set up backup strategy on the server, and the system will perform a unified
backup of different databases on different platforms to backup media according
to the backup strategies.
The backup system is easy to deploy and users can manage the backup system
through the web interface on any terminal.
Applications
10
��
Virtual�Platform�Protection�
Present�situation�and�demands�
Provides a complete backup solution for virtual platforms which allows each
virtual machine to set up multiple checkpoints. Users can quickly restore the
virtual machine to a certain checkpoint in case of VM failures, data loss, corrupted
applications and host damages to ensure safe operation of virtual platforms.
Solutions� �
To back up the virtual machine, one only needs to register the virtual platform or
host machine on web interface without installing any piece of software;
Automatic scanning of the host and virtual machines. Backup of a single or
multiple virtual machines could be done without shutting down the virtual
machine.
Only backs up the incremental data after a full backup to increase efficiency,
reduce network traffic and decrease storage space. During the recovery, it
automatically merges the full backup and incremental backups to get a mirror of
the entire virtual machine at a certain checkpoint.
Graphically displays the progress and speed of backup and recovery of virtual
machines, so that users can easily monitor the entire process.
Applications
11
�
High�availability�database�disaster�recovery�
Present�situation�and�demands�
The data within the database is immeasurable. A server downtime caused by no
matter what will result in long-time service gap and huge economic loss, which are
intolerable for users.
Due to factors such as network latency, there tends to be differences between the
data on backup server and the active server, which is usually unacceptable for
users with higher requirements.
Solutions� �
Install DBackup synchronization module on both active database and backup
database, and synchronize all the data on active database to the backup database;
Backup database will be activated when active database fails. It will automatically
obtain data that has not been synchronized and applies it to backup database to
maintain consistency between the active database and the backup database.
Perform recovery from backup database or activate the backup database。
Applications
12
��
Security-enhanced�backup�and�recovery�
Present�situation�and�demands�
For users like secret units, most of the data that needs backup is classified. Backup
and recovery of this kind of data should be operated under strict control, in the
meantime the data on backup server should be protected in case of illegitimate
access and tampering;
Only authorized users can log on to the backup system. The authentication system
is independent from operating system credentials to prevent unauthorized
operations.
Solutions� �
Multiple authentication mechanisms to ensure the legitimacy of the login user;
Introduces “Security administrator” with business approval authorization;
Strict approval process for key business sector;
Verify the legitimacy of access servers and perform characteristic management of
the backup data。
System Administrator Security Administrator
Identity Authentication
User Management
Operation Approval
Operation Exectutive
Security Audit
Operator
Auditor
Applicaton Server Backup ServerBackup Center Level 2
Data Security Transmit
Backup Center Level 1
Data Protection
Backup Server Authentication
Application Server Authentication
Data Security Transmit
Applications
13
�
Supported�browsers�
• IE9 or above� • Firefox3.5 or above�
• Chrome �
�
Supported�backup�server�platforms�
• Windows 2003/2008/2012 series� • Red Flag Asianux 2/3 series
• Ubuntu Server 12.04/14.04 • Red Hat Enterprise Linux 4/5/6 series
• CentOS 4/5/6 series • NeoKylin 6.0 (Loongson)
• NeoKylin 4.0 (FT 1000) • NeoKylin (FT 1500A)
�
Supported�client�platforms�
• Windows 2000/2003/2008/2012 series� • Windows XP SP3/7/8/10 series
• Red Flag Asianux 2/3 series� • Red Flag DC 4.1/5.0 series�
• Red Hat Enterprise Linux 3/4/5/6/7 series� • Oracle Enterprise Linux 4/5/6/7 series�
• CentOS 3/4/5/6/7 series� • AIX 5.1/5.3/6.1/7.1 series�
• Fedora 12/13 series� • Scientific Linux 4/5/6/7 series�
• SUSE Linux Enterprise Server 9/10/11 series� • Neokylin Linux Server 5/6 series�
• NeoKylin 4(FT 1000/1500/1500A)� • NeoKylin 6(Shenwei)�
• NeoKylin 6(Loongson 3A/3B)� • openSUSE 10.3/11.4 series�
• Debian 6/7 series� • HP-UX 11.11/11.23/11.31 series�
• Solaris 9/10/11 series� • Linx Secure Operating system�
• Linx Rocky Secure Operating System • Debian 8.0
• IBM Power Linux • Ubuntu Server 12.04/14.04
�
�
�
Supported� Software� Environment
14
��
Supported�virtual�platforms�
• VMware vSphere 4.1/5.0/5.1/5.5/6.0 � • KVM(qemu 2.1 or above,libvirt 1.2.8 or above
• Xen 4.0 or above,libvirt 1.2.8 or above� • Citrix Xen Server 6.02/6.2/6.5�
• FusionSphere V100R003/V100R005� • AOSTAR Virtualization 3.1.0�
• Hyper-V(Hosted Architecture & Bare-Metal Architecture)�
�
Supported�databases�
• Oracle 8i/9i/10g/11g/12c� • SQL Server 2000/2005/2008/2012/2014�
• MySQL 4/5/6� • Sybase 12.5/15.5/15.7/16.0�
• PostgreSQL 8.1/8.4/9.2/9.3/9.4� • DM 7.1�
• Kingbase 7.1� • GBase 8a/8s/8t�
• ShenTong 7.0� • DB2 9.5/9.7/10.1/10.5
• Informix 11.5/11.7/ 12.10 • MongoDB
�
Supported�applications� �
• Exchange 2000SP3/2003/2007/2010/2013 • Lotus Domino 9�
• MS SharePoint 2010� • �
�
�
�
�
�
�
Supported� Software� Environment
15
��
Scutech�Corporation�(Scutech),�founded in 2009, is a nationally certified high-tech
enterprise with internationally advanced data backup technology. Scutech is devoted to
the R&D and marketing of operation and maintenance level storage and backup
hardware-software products with independent intellectual property rights. Taking
national data security as its own responsibility and aiming at developing into a
world-class backup and disaster recovery enterprise, Scutech provides economical,
efficient, secure and reliable backup and disaster recovery products and services by
independent R&D, technological innovation and customization for enterprises,
government institutions and individual customers. With its strong core technology
research capacity, standardized hardware-software development and management
process as well as a specialized technical support team, Scutech has become the only
manufacturer in China that can produce completely domestic all-in-one backup &
recovery solutions. It provides comprehensive data backup and disaster recovery
solutions for various customers.
�
A�national�brand,�devoted�to�national�data�security�
China Electronics Corporation (CEC) is a state-owned conglomerate formed on the
basis of a research facility directly under the administration of the former MII (Ministry of
Information Industry) and high-tech enterprises. As a strategic investment enterprise of
CEC, Scutech has shouldered the responsibility of guarding national data security.
To get rid of technological suppression from foreign products, Scutech and other
related CEC subsidiaries worked together and successfully developed the first completely
homebred, autonomous and controllable backup and disaster recovery
hardware-software integration platform based on domestic chips and operating systems,
fundamentally solving the future problems of national information security.
�
Enterprise� Introduction
16
�
�
Independent�R&D,�continuous�innovation�
Scutech is developing a series of Chinese-style information security and backup &
disaster recovery software with independent intellectual property rights. Products include
multi-platform distributed backup & disaster recovery management software – Dbackup
and all-in-one backup & disaster recovery solution – InfoKist. DBackup has received a
number of certificates, including the Software Product Registration, the China Information
Security Certification and the Military Information Security Certification. Meanwhile,
InfoKist has received the China Compulsory Product Certification certificate and the
backup and recovery system has received the Classified Information System Product
Testing Certificate issued by the National Secrecy Science and Technology Evaluation
Center. Upholding the notion of “Develop Chinese software, innovate top technology”
and the enterprise spirit of “Focus, Innovation, Cooperation, Perseverance”, Scutech has
been gradually introducing made-in-China backup & disaster recovery
hardware-software solutions to the world, stepping towards its goal as an international
storage backup brand.
Enterprise� Introduction
17
Development Chinese software●innovate top technology
Focus Innovation Cooperation Perseverance Information security and backup & disaster recovery management base of production, education and
research, authorized by the Ministry of Industry and Information Technology
Owns the only completely homebred backup and disaster recovery hardware-software integration
platform based on domestic CPU and operation system
Scutech Corporation
Address: B208, Lingnan Technology Center, No. 492 Daguan Middle Road, Tianhe District, Guangzhou, China
Postcode: 510660 Tel: +86-020-28219262/263 Fax: +86-020-28219284 Website: www.scutech.com Customer Service: 400-0033-191 Copyright©2009-2016 Scutech Corporation All rights reserved
Scutech has completed a detailed proofreading of this article. However, it is not guaranteed that the content does not contain technical errors
or typographical errors or omissions, if any of which appears, Scutech does not undertake any liability.