Risk
4/21/2011
02:35 PM
George Crump
George Crump
Commentary
50%
50%

Forget Tape Vs. Disk, Use Them Together

Tape is ideal for third tier backup data and the cost per GB, performance, and reliability make it an ideal compliment to disk backup.

"Tape is Dead" may be a common statement, but it just does not hold true to the reality. Most tape and tape library companies are reporting strong sales growth over the past couple years. User studies indicate that well under 20% of data centers have become disk backup only. In most environments this should no longer be a tape vs. disk conversation, both technologies should continue to be leveraged together.

Most data centers now consider backup disk as the first source of recovery when something has failed. In reality backup disk should be your second point of recovery not your first. As Storage Switzerland discussed in a recent article "Protecting Applications From Storage System Failures" most data centers should not be counting on the backup process at all for mission critical recoveries.

There should be some other form of recovery technology in place that provides direct access to data and a smaller window of time between data protection captures. Disk backup should be the second step in a recovery process when something goes wrong with a high availability (HA) solution or an older point in time of the data set is needed. The disk backup can also be used for primary recovery of less critical systems but we think the number of applications and services that can sustain multi-hour recovery times is decreasing.

Tape should be looked at as the third tier of recovery, when a much older point in time of data is needed or when something goes wrong with the previous two recovery steps. Despite this, there is also a situation where tape should be considered as the primary backup and recovery point. Consider tape first when a very large data set needs to, and can be, transferred across a very high-speed connection.

Tape, if it can be sustained at full streaming performance is incredibly fast, faster than many disk based backup systems. An example of this might be a database environment with a large 200GB+ data set where tape can either be attached directly or via a fibre channel connection. A transfer directly from the database server to tape is often faster than to a backup class disk system. A case can be made that tape is all you need here since many database applications have some other form of availability in place for quick recovery. The purpose of the backup then is to create an archive of the database and to get that data off-site. Something that tape is well suited for.

Tape is ideal for this third tier of backup data thanks to the continued progress of the technology. The cost per GB, performance and now the reliability and shelf life of tape make it an ideal compliment to disk backup. It provides an alternate, offline storage method in case something goes wrong with disk media. In most environments, HA solutions should be the point of first restore, disk backup should be the point of second restore and tape backup should be the safety net. The challenge is that the integration between these three layers is lacking and is something we will discuss in our next entry.

Follow Storage Switzerland on Twitter

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Storage Switzerland's disclosure statement.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8893
Published: 2015-01-28
Multiple cross-site scripting (XSS) vulnerabilities in (1) mainpage.jsp and (2) GetImageServlet.img in IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-8894
Published: 2015-01-28
Open redirect vulnerability in IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via the out parameter.

CVE-2014-8895
Published: 2015-01-28
IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allows remote attackers to bypass intended access restrictions and read the image files of arbitrary users via a crafted URL.

CVE-2014-8917
Published: 2015-01-28
Multiple cross-site scripting (XSS) vulnerabilities in (1) dojox/form/resources/uploader.swf (aka upload.swf), (2) dojox/form/resources/fileuploader.swf (aka fileupload.swf), (3) dojox/av/resources/audio.swf, and (4) dojox/av/resources/video.swf in the IBM Dojo Toolkit, as used in IBM Social Media A...

CVE-2014-8920
Published: 2015-01-28
Buffer overflow in the Data Transfer Program in IBM i Access 5770-XE1 5R4, 6.1, and 7.1 on Windows allows local users to gain privileges via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If youíre a security professional, youíve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.