Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

6/1/2009
11:59 AM
George Crump
George Crump
Commentary
50%
50%

Can Backups Be Made Obsolete?

Backups have long been a source of pain and frustration for enterprises of all sizes; they are constantly causing problems because the growth and value of data is increasing faster than the network's ability to deal with that data. The problem keeps many IT professionals awake at night and most surveys indicate a low confidence in the ability to recovery from a disaster, but how can backups be made obsolete?

Backups have long been a source of pain and frustration for enterprises of all sizes; they are constantly causing problems because the growth and value of data is increasing faster than the network's ability to deal with that data. The problem keeps many IT professionals awake at night and most surveys indicate a low confidence in the ability to recovery from a disaster, but how can backups be made obsolete?A key step as we have chronicled in our article on "Deduplication Weaknesses" is to make sure you are focusing on only the active data set. One way to do this is through an aggressive archiving scheme that disk based archiving enables. With disk based archive, old data can be returned to users fast enough that they won't even know its not on primary storage, making a rule of migration of data from primary storage after 30 days of inactivity feasible.

The next step is to change the way backups are done. Most backups require moving all the data from each server across the network every time a full backup is run, and a significant subset of that data every time an incremental or differential is run. This puts tremendous load on the environment, but what if that could change? What if data could be written to backup storage as it changes on primary storage?

That is exactly what Continuous Data Protection (CDP) attempts to accomplish. Companies like InMage, FalconStor and Syncsort all have CDP or near CDP capabilities that as data changes it is written to a secondary storage device. Sometimes this is done via a write splitter that actually writes data to two locations simultaneously and often it is a scheduled scan that collects all the writes since the last scan and updates the target.

CDP is different than replication or mirroring because typically the application also has its own ability to create a snapshot of the secondary storage target prior to being updated from the primary data set. A snapshot is important because it provides a point in time rollback capability to the user. It is also different from a storage system snapshot because it is a copy of data that is on a different storage device than the primary copy which means it survives if primary storage fails.

Also different with CDP vs. Backup is that the secondary disk target is a useable copy of data, it is not in a proprietary format. This copy can be snapshot again and mounted to an alternate server for testing or even to a backup server to be backed up locally as opposed to across the network.

Most importantly some of the CDP applications allow you to directly mount this data from the original server, a recovery in place capability, even if the server was CDP protected via the IP network instead of the SAN, the server can still mount via a quick iSCSI connection. By directly mounting the data, the restore process is eliminated or at least done in the background. This is critical because even if restores from traditional backups work, many times the time to restore a server's data back across the network from that backup and write that data to a RAID 5 disk is rarely calculated correctly. Direct mounting of the data eliminates that equation.

All of this can be done in full compliment to the backup process and still leverage support of VTL and deduplication appliances. CDP has been available for years but maybe we are just now to the point that we really need to have it and when it is fully implemented backups can be made obsolete. 
 Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24259
PUBLISHED: 2021-05-05
The “Elementor Addon Elements� WordPress Plugin before 1.11.2 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
CVE-2021-24260
PUBLISHED: 2021-05-05
The “Livemesh Addons for Elementor� WordPress Plugin before 6.8 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
CVE-2021-24261
PUBLISHED: 2021-05-05
The “HT Mega – Absolute Addons for Elementor Page Builder� WordPress Plugin before 1.5.7 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by ...
CVE-2021-24262
PUBLISHED: 2021-05-05
The “WooLentor – WooCommerce Elementor Addons + Builder� WordPress Plugin before 1.8.6 has a widget that is vulnerable to stored Cross-Site Scripting (XSS) by lower-priv...
CVE-2021-24263
PUBLISHED: 2021-05-05
The “Elementor Addons – PowerPack Addons for Elementor� WordPress Plugin before 2.3.2 for WordPress has several widgets that are vulnerable to stored Cross-Site Scriptin...