A New Approach To Data Protection And Management
by Alasdair Kilgour - Managing Director, UK, Ireland & S. Africa, CommVault - Monday, 2 October 2006.
In the struggle to ensure data protection, reduce backup windows, and manage costs – both capital and operational – IT managers face increasing challenges. Continual data growth, spurred by an increase in business data from databases, email systems, file shares and other sources, is only one aspect of the problem.

Adding to the burden on IT management is the need to retain data of all sorts for longer periods due to changes in how businesses operate, and evolving regulatory demands.

Many enterprises have turned to tiered storage architectures in an attempt to regain control over the operational costs of managing and protecting differing classes of data. The rise of this type of storage architecture has in turn created an opportunity to change the way enterprises protect and manage backup data.

Recovery management is a relatively new approach to data protection across Europe and it holds the promise of reducing data under protection, improving recoverability and reducing backup windows. Combining tiered storage assets with backup, snapshot and replication technologies, recovery management offers ITmanagers new tools in the quest to resolve data management and backup challenges.

Recovery management

Recovery management solves the problem of lengthy backup windows, difficult restores and growing costs which offer IT personnel the ability to protect, and recover, virtually any amount of data virtually instantaneously. Additional benefits for email applications and databases include preventing business interruption due to data corruption and virus attacks.

Recovery management via ‘recovery tiers’ enables continuous access to the business data and information needed for decision-making and execution, the lifeblood of competitiveness.

The recovery tier

Traditional storage environments consist of primary storage – the ‘protection’ tier – and archives, both active and offsite. With the addition of a recovery tier, comprised of recovery volumes created from snapshots and replicated data, IT departments gain the advantage of faster recovery of business-critical data from near-line recovery tiers without the need to touch production data.

Unlike the data protection or backup tier, which includes backup copies of data stored on primary disk, disk-to-disk or disk-to-disk-to-tape, the recovery tier requires only one ‘touch’ of production data via a storage environment’s native snapshot capability. By snapping a copy of production data on a regular basis – for example hourly – and replicating that data to the near-line recovery tier, applications performance is protected, recovery levels are assured and end-user productivity is unaffected.

Creating on-line replicas

Recovery management centres on the creation and management of online replicas of production data. Online replicas are immediately available without requiring a restore process before data can be used, a marked difference from traditional backup, including backup-to-disk, which requires that backup data be restored before it can be used. In UK, European and global enterprises which rely on Exchange and Oracle, a restore process may take days – blocking end-user access to email and databases and slowing business processes dramatically.

Of course, it has been possible to create online replicas with snapshot and replication technologies for some time – primarily on large enterprise storage arrays. Today, this capability is available on mid-tier and SMB devices from a number of reputable vendors.

Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //