Backup and Recovery Technologies

Backup and Recovery Technologies

Backup and Recovery Technologies are complete solutions designed to reduce any server down time with the use of a specialized back up and virtual server appliance. They allow near real-time backups-as frequent as every 15 minutes. In addition, they offer offsite storage at an affordable cost. They also provide a low cost, speedy disaster recovery process. Data is encrypted. So it is not accessible to anyone, either on the backup device or at the remote storage facility without a required passkey. Finally, it eliminates the need to assign a data custodian to change tapes as well as the cost and hassle of managing an on-site tape backup solution. Your IT department or resource monitors and manages the entire process.

Executive Summary

A recent study discovered that, of companies experiencing a major loss of data, 43 percent never reopened, 51 percent closed within two years of the loss, and a mere 6 percent survived over the long-term.1 For small and medium-sized businesses, these statistics suggest the necessity of implementing a robust data backup and recovery technologies solution. Loss of data could mean lost emails, accounting data loss, patient or client data loss, loss of legal records, lost orders, and so on. This document will discuss how a data backup and disaster recovery solution overcomes challenges that are commonly faced by small and medium businesses.

Traditional Solutions vs. Emerging Technology

dMagnetic tape and disks are the two leading media for data backup storage. While magnetic tape is currently dominant, analyst Dave Russell of Gartner believes that “Recovery will move to online disk-based storage in the future. This will cause a major shift in the backup market during the next four to five years.”2

Disk

Smaller companies in particular will benefit from the shift, as recent advances in design and manufacturing lower the total cost of disk-based storage in terms of storage per bit. Falling prices, combined with the various performance advantages that storage industry analysts cite, render disk increasingly attractive. Gartner Group highlights the suitability of disk for these organizations by explaining that, “The need for high-performance online recovery of data, combined with the availability of low-cost disk arrays, has influenced enterprises and small and midsize businesses to adopt a disk-based approach for backup and recovery.”3

Tape

Tape, in contrast to disk, is physically delicate. It is also easily compromised by environmental factors such as heat, humidity, and magnetic interference. Moreover, tape cartridges must be replaced frequently (every 6-12 months). Tape’s innate sensitivity contributes to high failure rates; analysts estimate that anywhere from 42 to 71 percent of tape restores fail. Even when magnetic tape backups are successful, tapes themselves are subject to loss or theft. They may be in the possession of an employee or vendor unable to reach a recovery site. Thus, even when physical backup and restoration processes succeed, tape may not prove to be as timely and appropriate a medium for data storage as disk. Time is a crucial consideration… Because each hour of server, application, and network downtime endured until data restoration comes at a high cost, especially to smaller businesses.

Disk vs. Tape

Analyst Jon Oltsik of Enterprise Strategy Group also points out that tape is seldom encrypted, compounding the destructive impact of tape theft. He says that, “Very few people encrypt backup tapes, which means that they rely on the security of the backup and off-site rotation process.”4 Magnetic tape encryption, unlike disk encryption, has historically been too costly for all but large enterprises: “Encryption of any data that is leaving the security of the data center, in transit, has always been an option, unfortunately, a very expensive option,” explains Clipper Group.5

Disk offers not only lower cost encryption but also other advantages. In contrast to tape, “disks are more durable, last longer, withstand more overwriting and you don’t need to clean any heads,” according to Rinku Tyagi of PCQuest. Additionally, “When it comes to backing up using disks, they are easier to manage. Disk backup systems include management tools, often browser-based, for you to easily configure settings and check status from anywhere.”6

HP enumerates other advantages of disk storage, noting that “Data is backed up to disk much faster than tape, which translates to less impact on production server availability. Disk is also a more reliable media than tape and less prone to error, which translates to less failed recoveries.”7 Clipper Group believes that the superior speed of disk storage is an enduring advantage: “High performance disk will always be the choice for online applications that require fast access.”8

Conclusion

While disk offers advantages over tape, it is not a panacea. After installing disk technology, companies will still be responsible for monitoring and managing backup processes, encrypting and safeguarding backed up onsite and offsite data, restoring data to new hardware, and other functions. Without implementing a layer of governance over disk-based data backup, these companies court the danger of failed backups and delayed restoration of data, thereby jeopardizing their chances of successful recovery from major data loss.

Smaller companies unable or unwilling to invest in the human expertise and infrastructure support systems necessary for management of their backup system can leverage a data backup and recovery solution to remove staffing burdens.

Total Backups Solutions Now Available to the SMB

Near Real Time Backups

“Incremental Forever” methodology captures all changes to the initial image in increments of as often as 15 minutes. The Incremental Forever technology not only backs up recent datasets but also allows end users to reconstruct the state of their data as it stood at the end of various restoration points over the last two days, various days over the last two weeks, various weeks over the last month, or various months since the implementation of the latest in backup technology. This level of forensic and auditable data recovery may satisfy various regulatory requirements (such as HIPAA and GLBA) for data retention and data record reconstruction, and also serves stakeholders such as supply chain planners, warehouse analysts, auditors, and legal counsel.

A Complete Image

This technology generates an image of all hard drive partitions via an agent, which is warehoused on the backup device physically located at your location. The data is stored AES-256 bit encrypted and compressed, reaching efficiencies as high as 2:1. A block-level, not file-level, backup is recommended, which means that data is captured at the level of 1s and 0s. Block level data is raw data which does not have a file structure imposed on it. Database applications such as Microsoft SQL Server and Microsoft Exchange Server transfer data in blocks. Block transfer is the most efficient way to write to disk and is much less prone to errors such as those that result from file-level backups. Additionally, block level backups are not affected by open files or open databases. The block-level image is an exact digital duplicate of the on-site server.

Intuitive and Flexible Restoration

A good backup system should allow for quick and flexible restores. Today’s solutions allow for recovery of files, folders, partitions, mailboxes/messages, databases/tables using a quick and intuitive process. In case of a complete server failure, this new technology allows for a bare metal restore to new hardware which has a different configuration, hardware and drivers as compared to the failed server. Doing incremental based backup allows restores from several points in time. Thus, you can restore multiple versions of files, folders, messages/mailboxes, database/tables.

Secure Remote Storage

After imaging the servers to which it is attached, the backup device then creates an independent 256-bit encrypted tunnel. It then transmits the imaged data to two secure offsite locations where it resides in an encrypted, compressed format creating a total of three copies of the data in three geographically distinct regions. Since you have encrypted the data, no one has access at any of the remote storage facilities.

Transmitting data to remote sites guarantees that, in case of physical damage to the client’s network or backup device, or even regional disaster, the data is safe in uncompromised locations. Encryption is an important step in the process of transmitting data between the backup device and the remote sites. It greatly reduces the risk of data loss incidents that plague magnetic tape. In addition, it prevents man-in-the-middle attacks during transmission. Nothing or no one has ever broken the 256-bit Advanced Encryption Standard (AES) algorithm. It is also currently considered the gold standard of encryption techniques. And they render transmitted data immune to theft.

On-Site Virtual Server

If any of your servers fail, then the server virtualization technology embedded in the backup device restores and reboots servers and applications within a couple of hours. You may sometimes endure a wait of several days in order to receive replacement servers from vendors. But your backup device can have your business up and running while waiting on a replacement server. The backup device multitasks. Even while functioning as a virtual server, it can continue to back up data from other devices plugged into the device. The technology thus allows you to remain in business without any significant loss of data backup, server functionality, or application downtime.

Bandwidth Throttling Transfer

Transmission itself occurs over your Internet connection. You can easily configure it to minimize bandwidth consumption. Today’s device leverages Adaptive Bandwidth Throttling, which only utilizes unused bandwidth or allows us to set an outbound limit. The UDP based smart transfer technology utilizes a host of innovative algorithms to speed up data transport and resume from failure. The device can therefore exercise file control over the data imaging and transmission processes.

24/7 Managed Solution

Monitor the device by the Network Operations Center 24x7x365. Failed processes generate immediate alerts to engineers, who often remotely correct errors after receiving notification. In case of more serious backup issues, conduct repairs at your site. If any backup units are irreparably damaged or destroyed, then they will ship you replacements pre-loaded with all stored data.

Affordable

These devices today are extremely affordable, and are available with offsite storage for as little as $1.50 per GB.

Don’t let your computers be an area of weakness in your company. Check out our free Internal Analysis whitepaper to assist your leadership decisions as your enhance your strengths and resolve your weaknesses.

backup and recovery technologies
Strategic CFO Lab Member Extra
Access your Exit Strategy Checklist Execution Plan in SCFO Lab. The step-by-step plan to put together your exit strategy and maximize the amount of value you get.

Click here to access your Execution Plan. Not a Lab Member?

Click here to learn more about SCFO Labs

backup and recovery technologies

 

Resources

1 Cummings, Maeve; Haag, Stephen; and McCubbrey, Donald. 2003. Management information systems for the information age

2 Russell, Dave. 2007. Gartner Group. Recovery will move to disk-based, manager of managers approach by 2011

3 Russell, Dave. 2007. Gartner Group. Recovery will move to disk-based, manager of managers approach by 2011

4 Jon Oltsik, quoted in Shread, Paul. 2005. Internetnews.com. Bank’s tape loss puts spotlight on backup practices

5 Reine, David. 2007. Clipper Group. Security for small data centers—right-sizing tape encryption

6 Tyagi, Rinku. 2006. PCQuest. What’s for your backup: Disk or tape?

7 HP 2007. HP proLiant dl100 g2 data protection storage server—questions & answers

8 Reine, David. 2007. Clipper Group. Security for small data centers—right-sizing tape encryption

See Also:
How to Evaluate IT Systems
How to Choose a Software Dealer
Technology Strategy for Small to Medium Sized Companies
How to Ensure Redundant Data Communications Links
How do You Know When it is Time to Buy New Software

, , , , ,

No comments yet.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.