3 Factors For Successful Backups - InformationWeek
IoT
IoT
Cloud // Cloud Storage
Commentary
10/3/2011
12:35 PM
George Crump
George Crump
Commentary
50%
50%
RELATED EVENTS
The Real Impact of a Data Security Breach
Aug 02, 2017
In this webcast, experts discuss the real losses associated with a breach, both in the data center ...Read More>>

3 Factors For Successful Backups

For backup strategies to be successful the process has to execute in three areas; backup, recovery, and time.

In my early days of backup design around 25 years ago, I was sure that by this point data would just automatically protect itself or that hardware and software would never fail or corrupt. Of course, today, nothing could be further from the case. The backup process is more complex than ever, and while the chances of failure have been reduced the ramifications of a failure are more severe.

For backup strategies to be successful the process has to successfully execute in three areas; backup, recovery, and time. Backup, of course, is the task of copying data from the source servers to the backup destination. While it is fashionable for marketing people to say that recovery is the most important, I suggest that backup is equally important. If you don't have a good copy of the data secured on another device and, hopefully, another location, you don't have anything to recover. Backup applications have to be able to successfully copy data across a network, accurately capture data from servers or virtual machines that may have active live data, efficiently store that data on a local repository, and have the ability to move that data off-site.

Another key element is how often can these data captures be done. For many applications, traditional once-a-night backup is no longer enough. There is too much data being added or changed in these applications during the business day and a failure in the late afternoon could mean a significant data loss and significant re-keying. If they are protected, transaction logs can help make sure that data is not lost, but the time it takes to replay those logs will impact productivity.

The second phase is recovery. Can you get the data back at all? Most businesses no longer have the time to perform verification of backup jobs. Confidence in your ability to recover then comes from testing. Testing though is a problem of resources and time. As we discuss in our recent article "Virtualization Powered Recovery," modern day recovery systems are leveraging the virtual server infrastructure to be able to recover virtual machines and even complete application stacks into a virtual test sandbox. This allows for a complete recovery test in minutes without requiring additional hardware or software.

The third phase is time. Time is a factor in both backup and recovery. The amount of time it takes to back up an environment and the time it takes to recover a particular VM are both important parts of the equation and are not mutually exclusive. Again, if you don't complete your backups or can't do frequent backups because of your infrastructure or outdated software, it is going to impact both your ability to backup and how long it takes to get back into production in the case of a failure.

The biggest impact in recovery time is the copy process--the time it takes to move a large data set across the network, back to the original server or virtualization host. This copy time can also be reduced by leveraging a virtualized infrastructure. As we discuss in "Backup is All About Recovery Time," appliances are now becoming available that have their own virtual environment on the appliance. In other words you don't even need to be virtualized yet to take advantage of virtualized recovery.

Having their own virtualized environment allows these appliances to backup both physical and virtual servers, but then be able to host those servers in a standalone environment in the case of a failure of server or storage hardware. By hosting the application on the appliance, this provides a temporary resumption of an application without having to copy data, re-install hardware, and re-prepare storage. Instead of recovery in minutes you now have production in minutes.

Follow Storage Switzerland on Twitter

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Storage Switzerland's disclosure statement.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
pelliman950
50%
50%
pelliman950,
User Rank: Apprentice
10/5/2011 | 11:38:13 PM
re: 3 Factors For Successful Backups
Recommended Response: Great post. IG«÷d also like to point out that simplifying backup also starts with thinking about how you manage the information you need to protect. What is your most important data? Are you treating that data the same as the data you havenG«÷t accessed in 6 months? And if you need to hold on to data for a long period of time, Symantec (where I work) recommends you store it in an archive, rather than a backup, that way you can delete information off the primary storage and improve backup.

Symantec recently conducted a survey that reveals 75 percent of backups are on legal hold or have infinite retention and yet the same customers estimated that 40 percent of information on legal hold is not relevant to litigation. Ouch. In addition to backup, recovery, and time as key components to successful backups, we would also suggest the following additions:

3) Deduplicate Everywhere:

The amount of data you move can be significantly reduced by deduplicating within applications (with archiving) and across your IT infrastructure (with backup software).

4) Choose A Solution for Today and Tomorrow:

Splitting up data protection to multiple products for physical, virtual, etc only creates confusion when it comes time to recover. Match workloads to the right data protection technology for a tiered recovery model from within the same backup application. Hitting RPO's and RTO's is also about making it easy for anybody on the team to help.

5) Decide What You Want To Build and Manage:

Do you want to be an IT system integrator? Ask your solution provider what management and delivery models they can offer for you. Now you can have on-premise backup software delivered as an appliance, for fast recovery, and managed by a partner. Or you could go for a full SaaS model if you donG«÷t want anything on premise. Which ever route you go, donG«÷t forget to test your RTO and RPO assumptions.

Peter Elliman
Symantec, Information Management Group
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll