Storage formats such as tape have enjoyed year upon year of being in pole position as the format of choice for secondary backup, though in recent years hard disk technologies have caught up with the aging medium. Hard disk technologies, however, deliver a more realistic approach to data security by removing many of the usage restraints of tape technology, while allowing the following advantages:
- Faster backup and recovery
- Instant failover to maintain constant availability of your data
- Improved reliability
- Less maintenance: no more need to clean your tape drives
- Random access for single files
- Lower costs
Disk technology has been attempting to achieve off-site security and archiving in three main ways:
Remote site replication
Remote site replication is an attractive option as it can be deployed in a way that removes the need to take data cartridges off-site each night for remote security. However, this method is not only reliant on your business having more than one office location, but also on an abundance of budget that many SMBís canít justify.
3 stage solutions Ė disk-to-disk-to-tape (D2D2T)
The D2D2T solution meets the demands of both high performance backup and the ability to take data off-site, which is one of the more complex choices for companies that have a single location but require both high performance backup and a third layer of hardware to provide off-site security and archiving ability.
Removable disk technology, disk to removable disk (D2RD)
If the one and only benefit of choosing disk technology over tape is to improve performance and reliability and conversely the reason for choosing tape technology over disk is simply because of removability then why not provide a disk technology thatís removable?
The challenge for this type of media is to keep the capacities growing, in order to remain within the key capacity points of small and medium businesses.
Your data heath check - security you should have for your network data
1. Protect against the outside world
Should hackers manage to navigate their way through your layers of protection and cause data loss, you need a physical copy of your data from which you can restore from. If the attack happened days earlier itís likely you will need to revert to earlier backups therefore having a backup rotation scheme in place can provide you with multiple data sets from which to restore from.
2. Protect against hardware and software failure
Data failure continues to be a challenge, particularly with primary storage. The very fact that data needs to regularly accessed, changed or moved exposes it to high usage risks of both hardware and software failure which could potentially lead to data loss. Secondary storage was introduced to provide an extra later of security should your primary data set fail. Storing a backup copy isnít the only consideration though when a data loss occurs the likelihood is that youíll need that data back fast. Removable technology, for example, enables you to retrieve your data quickly and effortlessly by using the highest performing storage technology available today Ė disk.