{"id":5220,"date":"2017-10-31T11:30:15","date_gmt":"2017-10-31T16:30:15","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=5220"},"modified":"2017-10-09T11:36:42","modified_gmt":"2017-10-09T16:36:42","slug":"backup-strategies-for-data-centers","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/backup-strategies-for-data-centers\/","title":{"rendered":"Backup Strategies For Data Centers"},"content":{"rendered":"<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2017\/10\/data-center-back-disk-backup.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5222 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2017\/10\/data-center-back-disk-backup.jpg\" alt=\"\" width=\"300\" height=\"230\"><\/a>Even for the smallest scale enterprise, the practice of making regular, clean, and tested backups of essential information is fundamental to ensuring business continuity, data integrity, and security.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">When an organization is of a size that warrants the use of a full-blown data center, this ups the game considerably. After all, the information being stored and processed may not only include transactional and operational data for the enterprise, itself. Customer records, supply chain data, and information required for auditing and regulatory compliance may also be involved.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">At a practical level too, the procedures involved in backing up data center information take on a degree of complexity which requires planning, a strategic approach, and the utilization of the appropriate tools and technologies.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">In this article, we\u2019ll be considering some strategies and best practices for performing and managing data center backups.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Speeding Up Data Retrieval<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Having one or more redundant copies of critical business data to call upon in the event of problems is all well and good. But if it takes so much time to restore that essential information from its backup media that business opportunities are lost or operations are negatively impacted, then having a backup becomes redundant, in itself.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">To a large extent, retrieval times will depend on what kind of backups are being implemented. With incremental backup (where the organization\u2019s data archive effectively becomes a volume built of mutually dependent \u201cchapters\u201d representing backups taken at set intervals), more time is needed for a full restoration. Differential backup strategies (where \u201clast saved\u201d versions of files may be backed up on a piecemeal basis) require less.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">For a truly effective backup strategy, it\u2019s necessary to ensure that data retrieval can be achieved in a timely and efficient manner. Finding the correct balance between backup software and storage media is key to this.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Indexing of files for rapid retrieval is possible using backup solutions which have disk or SSD storage in the data path. This form of storage may also act as a buffer for data transfers to slower media, such as magnetic tapes or cloud storage.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The compression and deduplication of data which disk or SSD storage can perform before sending information to the final backup medium can reduce transmission times and cut the cost of backed-up data by a significant margin.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Finally, with the right software implementation, storage in the backup path can act as a cache which improves the quality of service (QoS) of the response to data retrieval requests.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Disk-to-Tape<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Disk-to-tape backup solutions are most suitable for offline processes, with alterations to data requiring manual procedures and offline access. Backup strategies involving tape may be readily secured against physical interference and hacking \u2013 as long as storage sites exercise good inventory control practices.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Disk-to-Cloud<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Disk-to-cloud solutions facilitate the recovery of individual files which may have been corrupted or accidentally erased \u2013 a process that\u2019s unduly time-consuming with simple tape backups. Recovery times with cloud backup may be in the order of seconds, rather than the hours or more it might take to sort through tapes.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Encryption of data at the source helps resolve any nagging issues about the security of what\u2019s essentially a third-party storage medium. However, the risk remains of accidental or deliberate corruption of information which is held online.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Named as a leader in Gartner\u2019s 2016 Magic Quadrant for Data Center Backup &amp; Recovery for <a href=\"http:\/\/www.vohkus.com\/news\/backup-strategies-for-the-modern-data-centres\" rel=\"nofollow\" target=\"_blank\">the upper-end mid-market and larger enterprise environments<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, Veeam Backup &amp; Replication provides in-place recovery for fast recovery times, in what the vendor describes as an offering of \u2018Availability for the Always-On Enterprise\u2019. It\u2019s capable of protecting and recovering an entire virtual machine (VM), as well as individual files.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Backup Of Mobile Devices<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">As enterprise networks expand to embrace remote and distant sites, mobile working, and Bring Your Own Device (BYOD) policies, allowances must be made for the backing up of data from a range of mobile or non-standard hardware devices.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Under these conditions, much of an organization\u2019s data may already be resident in the cloud \u2013 and backups to this environment will need to form part of an ecosystem which also includes more localized deployments of backup hardware and software.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Backup For Recovery<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Finding a balance between the blanket archiving of everything under the enterprise hood, and a selected sub-set of information most critical to the survival of the business is what will tip the scale one way or the other, as regards data recovery.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">As a rule of thumb, the data that\u2019s backed up should at minimum be capable of restarting the enterprise from scratch, should disaster strike. Enough information needs to be included to satisfy ongoing requirements for regulatory compliance and other legal obligations, including the ownership of encryption keys.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Data sets should be segregated wherever possible, to allow the replacement of complete servers in one operation.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">HPE Data Protector is an industry-leading backup solution for more complex environments and VMs. Its integration with business applications extends server backup, automated point-in-time recovery, and granular restores to individual application users, while standardizing protection across physical and virtual environments, various operating systems, and critical business applications. .<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Security Considerations<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Problems of slow data retrieval aside, tape and other offline backup strategies achieve a segregation between archived data and active systems, which is often preferred in enterprise security.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Though backups to the public cloud allow for easier disaster recovery, many organizations still opt for private cloud deployments or disk-based systems such as MAID (massive array of idle disks) which, though faster, may miss out on the <a href=\"http:\/\/www.networkcomputing.com\/data-centers\/data-backup-strategy-7-considerations\/2018824628\" rel=\"nofollow\" target=\"_blank\">\u201cphysical firewall\u201d protection<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> of an offline backup strategy.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Criteria For Backup Software<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Backup software should allow for data encryption at the source, with multiple encryption keys under the stewardship of the backup team.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Transmission time, storage space, and time to reload may all be drastically reduced by compression and deduplication features, which may be deployed in a local storage pool on the server where the backup gateway is installed, or on an allocated networked space.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The number of backup windows may be reduced via a software module which supports multiple parallel backup operations.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">WAN optimization tools can ensure data transmission during low congestion times, or at lower connection tariffs.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">From the leader in market share for backup and recovery software, Veritas NetBackup covers Windows, Linux, Unix, and other platforms, and provides online protection for major databases like Oracle and Microsoft SQL. The software also has comprehensive integration with VMware and Hyper-V.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Criteria For Recovery Tools<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The ease with which files, folders and volumes may be recovered is the litmus test for recovery software. <a href=\"http:\/\/www.novastor.com\/blog\/best-practices-for-your-backup-strategy\/\" rel=\"nofollow\" target=\"_blank\">Key metrics to watch for<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> here include:<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 <b>RTO (Recovery Time Objective): <\/b>How long it should take to get everything back in order<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 <b>RPO (Recovery Point Objective): <\/b>How much data the enterprise can stand to lose, and still remain viable<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">From a user perspective, the software should have controls for allocating and managing access rights and privileges.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">For virtual desktops, mobile workspaces, or web-server farms and other systems requiring heavy replication, facilities for compression and deduplication, together with the capturing of roll-back snapshots representing stable configurations are also a plus.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Cost Considerations<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Competition in the backup solutions market is making more affordable options available to enterprise buyers.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Microsoft Azure Backup is notable here, aiming its pitch not only in terms of cost savings, but also in its assurance of meeting regulatory demands, with the most comprehensive compliance portfolio on the market. Backup-as-a-service (BUaaS) and hybrid storage options are available, with customers able to get more than 99 years of retention for backup data, and their choice of Azure regions for backup and archive location.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">There\u2019s typically a bit of a balancing act required regarding costs, efficiency, and functionality, but the one thing you must include in your budget is an effective backup strategy, with related tools, policies, and practices.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Even for the smallest scale enterprise, the practice of making regular, clean, and tested backups of essential information is fundamental to ensuring business continuity, data integrity, and security. \u00a0 When an organization is of a size that warrants the use of a full-blown data center, this ups the game considerably. After all, the information being [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":5222,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,6],"tags":[],"class_list":["post-5220","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-tech"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=5220"}],"version-history":[{"count":3,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5220\/revisions"}],"predecessor-version":[{"id":5224,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5220\/revisions\/5224"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/5222"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=5220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=5220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=5220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}