Probably no single process has had more software, hardware and infrastructure thrown at it then the backup process. Despite this continual investment many of the IT managers that I speak with express doubt in their ability to recover the right data in the right amount of time. What do you do to know that your data recovery will work when you need it to?

George Crump, President, Storage Switzerland

May 10, 2010

3 Min Read

Probably no single process has had more software, hardware and infrastructure thrown at it then the backup process. Despite this continual investment many of the IT managers that I speak with express doubt in their ability to recover the right data in the right amount of time. What do you do to know that your data recovery will work when you need it to?When there is doubt in the ability to recover data it often leads to an overprotection problem that we have seen for years now and as we first reported in our article "Solving the Data Protection Puzzle". Essentially if you don't have confidence in your current data protection tasks you try to protect the data in as many ways as possible. Similar to driving with two seat belts and a helmet. You are hoping that in the event of a failure one of the data protection tasks will bring you back up. As the book says, hope, especially when it comes to data protection, is not a strategy.

To know you can recover requires focus on two areas. First, make sure you have a workflow that keeps your eye on the right ball at the right time and second, trust your workflow but verify it often. The first area, workflow, is really about creating a data protection management system and ironically isn't as much about recovery as it is backup. While this conflicts with the popular phrase from backup software vendors, "it is not about backups its about recoveries" the truth is if you don't get that backup completed successfully, there is nothing to recover. Clearly both are important but in my mind completing a successful backup comes first.

This first step then, the evolution of data protection from a series of unrelated tasks to a smooth workflow, is critical given today's environment. The IT team has too much data to protect given the current staffing levels. They have to be able to have tools that will give them laser beam focus on the data that really matters. Laser focus on only the critical data sets requires a shift from the conventional thinking that every backup must work every night strategy to only the backups that really matter must work when they need to work. This is not advocating that you stop protecting data every night but that when you are faced with a list of failed backup jobs, along with your normal IT tasks, you need to know what to work on first. From a backup perspective this means knowing what failures put the most business critical data at risk and fixing those first. Essentially the data protection process becomes a way to help you prioritize what to do first each morning.

Developing a process involves knowing what data protection resources you have, what policies are in effect and probably most important establishing realistic service level agreements (SLA) with the owners of data. Once those are known then the focus shifts to managing the SLAs instead of tracking every single backup job. If the management system highlights not every failure but the most critical failures they are putting SLA attainment in jeopardy.

The next step is the verify stage. While there are many ways to verify backup jobs there is only one acid test; recovery of the full system. In our next entry we will talk about verification and how to accomplish full verification with requiring 100 additional IT personnel.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

About the Author(s)

George Crump

President, Storage Switzerland

George Crump is president and founder of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. With 25 years of experience designing storage solutions for datacenters across the US, he has seen the birth of such technologies as RAID, NAS, and SAN. Prior to founding Storage Switzerland, he was CTO at one the nation’s largest storage integrators, where he was in charge of technology testing, integration, and product selection. George is responsible for the storage blog on InformationWeek's website and is a regular contributor to publications such as Byte and Switch, SearchStorage, eWeek, SearchServerVirtualizaiton, and SearchDataBackup.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights