What Should Businesses Require of Data Protection Solutions?
by Ross Parker - Regional Director, Northern Europe, FalconStor - Tuesday, 15 August 2006.
The Taneja Group has suggested that this approach may be described as Recovery Lifecycle Management (RLM) - clearly capitalising on the widespread understanding of ILM to generate immediate comprehension of this new approach to data protection. The rapid advances in data protection technologies over the last three years means that the solutions available to build the optimal recovery schema for any given business certainly now exist. The technologies include:
  • the relatively new concept of continuous data protection (CDP), for creating point-in-time recovery images of specific mission critical datasets – typically email and databases.
  • virtual tape libraries (VTL), enabling the creation of a high-speed disk-staging capability for current, but not critical data.
  • replication to a disk platform at a secondary site, ready for remote access by the primary site in the event of catastrophic data loss at the primary site.
  • and vaulting, for old data that needs to be archived and retained, perhaps in case it may one day be needed for reference, or simply for compliance reasons.
CDP is the process whereby data is captured and replicated to a separate storage location to ensure that a set of critical data is always available. The point of CDP is to minimise data loss by providing rapid data recovery, to any point in time, with minimal downtime. However, the relatively high cost of CDP means it is only truly appropriate for optimising the backup and recovery of genuinely critical data – for Exchange email servers, for example. The particular value of CDP is its ability to restore ‘hot’ production data – say, up to seven days old - to any point within a specific time interval.

But customers also require of their data protection solutions suitable levels of protection for ‘warm’ data – say, up to six months old.

Space-efficient delta snapshots enable production data to be restored to a pre-defined moment in time with guaranteed data integrity, at a granularity of perhaps every two hours. These snapshots can be retained for, say, three months.

Finally, businesses require protection for their ‘cold’ data – up to a year old, perhaps. Clearly this can be restored from backup tapes, giving a granularity of perhaps a day, week or month, depending on the policy for taking full or incremental backups. The two main problems organisations faced when physical tape predominated are well-documented: media failure or robotic failure. The introduction of virtual tape libraries (VTL) eliminated these particular errors and also enabled backups and the corresponding restore processes to take place up to four times more quickly.

The following diagram summarises the Recovery Lifecycle Management data protection strategy, and shows how it may be enacted through a suitably-aligned product portfolio: hot data is protected by CDP, delta snapshots provide protection for warm data and VTL storage takes care of cold data. Ultimately, after a process of Redundant Data Elimination (RDE), a ‘single instance store’ may also be created for long term retention.



Although many IT vendors actively promote ‘return on investment’ on storage and data protection purchases, many disk platforms for data protection have been purchased over the last three years in order to guarantee the backup and restore process, with return on investment considered a secondary issue – certainly secondary to ensuring business continuity. However now those platforms are in and operational, IT departments are looking to see a return on investment for these purchases as they would for any other major IT purchase.

As a result, return on investment has become a requirement of installed data protection solutions as much as it has for new purchases. The Taneja Group believes that 2006 and 2007 will be all about businesses trying “to assemble reliable recovery infrastructures that make their disk backup investments worthwhile”, and envisions “recovery tiers [taking up] residence alongside storage tiers in the industry vernacular.” It’s a vision that we at FalconStor share – as might be expected having developed a comprehensive family of products that enable recovery lifecycle management.

Spotlight

How to talk infosec with kids

Posted on 17 September 2014.  |  It's never too early to talk infosec with kids: you simply need the right story. In fact, as cyber professionals it’s our duty to teach ALL the kids in our life about technology. If we are to make an impact, we must remember that children needed to be taught about technology on their terms.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Sep 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //