Backup to drive, magnetic tape or cloud; replication; snapshots; continuous data protection (CDP), offsite storage, colocation—there are so many new and emerging backup strategies today, it can be confusing even to IT professionals. Nevertheless, backup/restore and disaster recovery are among the highest priorities at companies large and small, around the globe. So many events can threaten data integrity: logical corruption, user error, hardware failure or loss, intrusion or malicious code, etc.
The only way to protect your company against catastrophic data loss or downtime is with multiple backup plans. Each plan captures data over a space of time and stores it at a particular site for a set duration before the media is recycled. Tested techniques like synching, VM and drive snapshots, dual backup to hybrid array and archival tape, bare metal restore and so forth, provide overlapping areas of coverage. You can be assured that your essential applications and customer data will be restored with nominal downtime and no loss of revenues. It sounds simple but the problem is knowing which data to put where, how often and for how long, and how to restore it while avoiding accidental overwrites from multiple backups.
You need someone who focuses all of their professional time on understanding and applying the latest reliable technologies to get the most leverage for investment. RoundTower maintains certified systems engineers in all major storage and data protection disciplines. We are data protection strategists.
“It’s all in the assessment. We say that a lot but only because it’s true. Every case requires careful observation and analysis. There are no ‘one size fits all’ solutions in backup,” says Eduardo Figueredo, Data Protection Practice Manager. “It’s easy to make a mistake because there are so many ways data can be compromised. Just replicating or performing a live migration is not a backup schema.”
Don’t wait until you have a crippling loss to take action! Call us now for a no-cost consultation.
Threats to Data Protection
- Logical corruption – Data becomes corrupted through software faults, magnetic impingement, interruption of power on write or degradation of data structure over time.
- User error –End user deletes files or directories, or needs to access an earlier version of a dataset.
- Hardware failure – Failure of hard drives or sectors, flash modules or entire servers and storage arrays corrupts or annihilates data.
- Hardware loss – Catastrophic events such as fire, flood or a tornado renders hardware inoperable and data unrecoverable.