The Taneja Group has suggested that this approach may be described as Recovery Lifecycle Management (RLM) - clearly capitalising on the widespread understanding of ILM to generate immediate comprehension of this new approach to data protection. The rapid advances in data protection technologies over the last three years means that the solutions available to build the optimal recovery schema for any given business certainly now exist. The technologies include:
- the relatively new concept of continuous data protection (CDP), for creating point-in-time recovery images of specific mission critical datasets – typically email and databases.
- virtual tape libraries (VTL), enabling the creation of a high-speed disk-staging capability for current, but not critical data.
- replication to a disk platform at a secondary site, ready for remote access by the primary site in the event of catastrophic data loss at the primary site.
- and vaulting, for old data that needs to be archived and retained, perhaps in case it may one day be needed for reference, or simply for compliance reasons.
But customers also require of their data protection solutions suitable levels of protection for ‘warm’ data – say, up to six months old.
Space-efficient delta snapshots enable production data to be restored to a pre-defined moment in time with guaranteed data integrity, at a granularity of perhaps every two hours. These snapshots can be retained for, say, three months.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.