data recovery
overview
What is continuity of operations?
A disaster recovery plan–sometimes referred to as a business continuity plan or business process contingency plan–describes how an organization will deal with potential disasters.
0+
0
0%
0countries
024/7
A disaster recovery plan–sometimes referred to as a business continuity plan or business process contingency plan–describes how an organization will deal with potential disasters. Just as a disaster is an event that makes the continuation of normal functions impossible, a disaster recovery plan consists of the precautions taken to minimize the effects of a disaster and enable the organization to either maintain or quickly resume mission–critical functions. Typically, disaster recovery planning involves an analysis of the continuity of business processes in the face of a disaster–corruption, degradation, or destruction of data, applications, and infrastructure. It includes a significant focus on disaster prevention.
Assuming you have completed a risk assessment and have identified potential threats to your IT infrastructure, the next step is to determine which infrastructure elements are most important to the performance of your company’s business. Also assuming that all IT systems and networks are performing normally, your firm ought to be fully viable, competitive and financially solid. When an incident–internal or external–negatively affects the IT infrastructure, the business could be compromised.
WAN Backups and Archives
The goal of backup, archiving, and disaster recovery is guarding and preserving data against loss, but local data protection has limited effectiveness. The same fire, flood, or theft that damages your production data can just as easily destroy the copies of that data. The emergence of the Internet as well as other storage-saving technologies have made remote data protection more practical, agile, efficient, and cost-effective with a much faster resumption of normal operations.
Today, a backup, archive, or disaster recovery set (the group of files or data that constitutes a disaster recovery package) can be stored on the other side of the world as easily as next door. With backups and disaster recovery sets, the primary consideration for the wide area network (WAN) is efficiency: making the most of available bandwidth to move the maximum amount of data in the minimum amount of time. This ensures the shortest recovery point objective (RPO).
Because high-bandwidth WAN connections cost too much for many organizations, several techniques have emerged to reduce the sheer amount of data needed to perform a remote backup or disaster recovery set.
A full backup is an essential starting point. But a full backup can take a long time, which can vastly extend the remote RPO. If it takes 36 hours to perform a complete backup across the WAN, the smallest possible RPO would be 36 hours — far longer than most organizations can tolerate.
When backing up remotely, often to a remote virtual tape library (VTL), most organizations will start with a full backup, then revert to incremental or differential backups to save only files that have changed since the full backup. The technique of “delta differencing” saves just the changed blocks or bytes. So the initial backup or disaster recovery set of 20 TB may take many hours, but an average delta difference of 10 GB per day can be transferred in just a few hours, well within an acceptable daily backup window.
Another data reduction method is data compression, which involves searching for repetitive data segments that can be removed from a file. The mathematical algorithm used to compress the file can rebuild it again when the file is read later. Compression typically cuts data volumes in half. But since not all files compress well, the actual compression ratio varies with file type.
Use of the data reduction technique known as data de-duplication continues to grow. Data de-duplication saves only one unique copy of a file, block or byte to remote storage.
The traditional concepts of full backups or disaster recovery sets are changing. Storage administrators realize they don’t need to back up every single PowerPoint presentation or include each MP3 file in a disaster recovery set. More businesses are focusing on protecting mission-critical applications, while ignoring secondary or nonessential file types.
Recoverability from the WAN
Because backups and disaster recovery sets are useless unless they can be recovered from a remote location, storage administrators must also be concerned with recovery time objectives (RTO). RTOs can be different than RPOs. An organization might need an extremely short RPO to minimize potential data loss, but can tolerate 12 to 24 hours for recovery. What’s critical is that remote data can be recovered within the allotted RTO. In some cases, a business may temporarily draw additional bandwidth from a service provider in order to meet tight RTOs. Recovery drills can be used to train personnel and streamline the recovery operation.
Implications of Archiving Data
Unlike backups or disaster recovery sets, which are typically only accessed after a problem occurs, archival data can be accessed at any time (albeit infrequently). An example of archival data is patient records, where a doctor may only access the patient’s history and medical images during an annual physical or follow-up visit. Remote archives add a measure of data protection by placing the data in another location.
With remote archives, WAN bandwidth is not a major concern because the individual files being saved or accessed are small relative to the total archive size. For example, a patient’s x-ray image may only be a few megabytes that can be pulled across a low-bandwidth WAN link. But if the WAN goes down, the archive becomes inaccessible. One way to mitigate the impact of WAN disruptions is to use a local archive platform, then mirror to a remote archive for data protection.
Remote Storage and Security Issues
Because companies are obligated to protect sensitive data, as well as customers’ personal information against theft or loss, any remote operation should factor in data security. Remote data is often beyond your direct physical control, but unlike tapes that are typically vaulted, WAN connectivity carries the added risk of unauthorized electronic access (aka hacking). Consequently, remote storage should include authentication plans along with the use of encryption. Encryption is only needed for sensitive data or personal information, so it’s usually not necessary to encrypt the entire backup or disaster recovery set. Encryption can be implemented in hardware or through software.
Data Center Infrastructure Solutions
Data centers are an integral component of private and hybrid cloud strategies. Better automation can provide greater visibility and simplified operations. CFSI Harness the full capacity of optical fibers.
Solutions
Comprehensive IT services include
Benefits
Our services provide a unique range of benefits
Stop wasting time and money on technology. Let’s get started