02:35 PM
George Crump
George Crump

Forget Tape Vs. Disk, Use Them Together

Tape is ideal for third tier backup data and the cost per GB, performance, and reliability make it an ideal compliment to disk backup.

"Tape is Dead" may be a common statement, but it just does not hold true to the reality. Most tape and tape library companies are reporting strong sales growth over the past couple years. User studies indicate that well under 20% of data centers have become disk backup only. In most environments this should no longer be a tape vs. disk conversation, both technologies should continue to be leveraged together.

Most data centers now consider backup disk as the first source of recovery when something has failed. In reality backup disk should be your second point of recovery not your first. As Storage Switzerland discussed in a recent article "Protecting Applications From Storage System Failures" most data centers should not be counting on the backup process at all for mission critical recoveries.

There should be some other form of recovery technology in place that provides direct access to data and a smaller window of time between data protection captures. Disk backup should be the second step in a recovery process when something goes wrong with a high availability (HA) solution or an older point in time of the data set is needed. The disk backup can also be used for primary recovery of less critical systems but we think the number of applications and services that can sustain multi-hour recovery times is decreasing.

Tape should be looked at as the third tier of recovery, when a much older point in time of data is needed or when something goes wrong with the previous two recovery steps. Despite this, there is also a situation where tape should be considered as the primary backup and recovery point. Consider tape first when a very large data set needs to, and can be, transferred across a very high-speed connection.

Tape, if it can be sustained at full streaming performance is incredibly fast, faster than many disk based backup systems. An example of this might be a database environment with a large 200GB+ data set where tape can either be attached directly or via a fibre channel connection. A transfer directly from the database server to tape is often faster than to a backup class disk system. A case can be made that tape is all you need here since many database applications have some other form of availability in place for quick recovery. The purpose of the backup then is to create an archive of the database and to get that data off-site. Something that tape is well suited for.

Tape is ideal for this third tier of backup data thanks to the continued progress of the technology. The cost per GB, performance and now the reliability and shelf life of tape make it an ideal compliment to disk backup. It provides an alternate, offline storage method in case something goes wrong with disk media. In most environments, HA solutions should be the point of first restore, disk backup should be the point of second restore and tape backup should be the safety net. The challenge is that the integration between these three layers is lacking and is something we will discuss in our next entry.

Follow Storage Switzerland on Twitter

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Storage Switzerland's disclosure statement.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio