Vulnerabilities / Threats // Insider Threats
4/15/2011
11:01 AM
George Crump
George Crump
Commentary
50%
50%

Can Archive Replace Backup?

Everyone should know the difference between backup and archive yet many data centers still use their backup application as their archive product.

In theory, backup is multiple copies of data that you are going to use to recover a specific set of data in case something goes wrong. You are of course hoping that the latest copy of data will meet that need but sometimes you need to go back three or four versions to get a copy of the data that is not corrupted. Archive is typically considered the last copy of a piece of data that needs to be stored just in case it is needed in the future. Unfortunately, many consider their backup as their archive, and I can see both sides of the debate.

What if we turn the argument around? Can an archive be designed to replace backup? First, this type of archive would need to be easy to access; it would need to look like a file system to the rest of the environment. It would need to be fast enough to receive and restore data, so there will need to be a disk front end. It is also an archive so we may want to use tape on the backend to keep costs down. This is an ideal use for the LTFS tape format as Storage Switzerland discusses in “What is LTFS?”. At this point, I have a system that can accept data, keep it on disk for fast retrievals, and then make multiple copies to tape as I desire. These solutions are available today and members of the Active Archive Alliance can tell you all about them. These solutions sound great for archiving but can they make interesting backup destination too?

Almost every application that I know of has its own built in, easy to access backup capability. Learning how to use these backup functions is one of the first things that any good administrator learns. Most of them though look for a disk to write to. This includes some of the more popular virtualization specific backup programs that backup virtual machines to disk. There are even add-ons for the word processor that I use to periodically save a current copy of a document I am working on to a different disk. (I'm paranoid)

The archive I described above looks to the network as a share. Anything that can write to disk can write to these, including backup utilities in the applications that I mentioned above. On the archive disk there are policies that can be set for how long this data remains on disk, how many copies need to be made to tape and how long those copies should stay on tape. All seamlessly to the administrator and most importantly the users. Finding them is as simple as scanning the archive file system for the file you want even if the data has been moved to tape. There are even indexing capabilities available or coming so that you do full context searches.

Is this perfect? No, but it may be effective for certain environments. At a recent cloud conference I was at, many of the cloud providers stated that their initial wave of adopters were simply using the cloud storage as a place to copy data via file system copy commands. This archive as backup technique can deliver the same functionality without the concern of WAN bandwidth.

Follow Storage Switzerland on Twitter

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Read Storage Switzerland's disclosure statement.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Why else would HR ask me if I have a handicap?"
Current Issue
The Changing Face of Identity Management
Mobility and cloud services are altering the concept of user identity. Here are some ways to keep up.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio

The cybersecurity profession struggles to retain women (figures range from 10 to 20 percent). It's particularly worrisome for an industry with a rapidly growing number of vacant positions.

So why does the shortage of women continue to be worse in security than in other IT sectors? How can men in infosec be better allies for women; and how can women be better allies for one another? What is the industry doing to fix the problem -- what's working, and what isn't?

Is this really a problem at all? Are the low numbers simply an indication that women do not want to be in cybersecurity, and is it possible that more women will never want to be in cybersecurity? How many women would we need to see in the industry to declare success?

Join Dark Reading senior editor Sara Peters and guests Angela Knox of Cloudmark, Barrett Sellers of Arbor Networks, Regina Wallace-Jones of Facebook, Steve Christey Coley of MITRE, and Chris Roosenraad of M3AAWG on Wednesday, July 13 at 1 p.m. Eastern Time to discuss all this and more.