DEFINING THE RIGH DATA PROTECTION STRATEGY



Similar documents
SAFETY FIRST. Emerging Trends in IT Disaster Recovery. By Cindy LaChapelle, Principal Consultant.

How To Protect Data On Network Attached Storage (Nas) From Disaster

How to Manage Critical Data Stored in Microsoft Exchange Server By Hitachi Data Systems

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments

Backup and Archiving Explained. White Paper

SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY

Maintaining Business Continuity with Disk-Based Backup and Recovery Solutions

Restoration Technologies. Mike Fishman / EMC Corp.

<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures

Backup and Recovery 1

A Modern Guide to Optimizing Data Backup and Recovery

BACKUP IS DEAD: Introducing the Data Protection Lifecycle, a new paradigm for data protection and recovery WHITE PAPER

Archiving, Backup, and Recovery for Complete the Promise of Virtualization

Protecting Citrix XenServer Environments with CA ARCserve

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments

Protect Microsoft Exchange databases, achieve long-term data retention

Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve

Enable unified data protection

Accelerating Backup/Restore with the Virtual Tape Library Configuration That Fits Your Environment

How do you test to determine which backup and restore technology best suits your business needs?

Library Recovery Center

Dell Data Protection Point of View: Recover Everything. Every time. On time.

Lunch and Learn: Modernize Your Data Protection Architecture with Multiple Tiers of Storage Session 17174, 12:30pm, Cedar

Meeting the Top Backup Challenges in Small and Medium Business Environments

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices

Why Your Backup/Recovery Solution Probably Isn t Good Enough

Complete Storage and Data Protection Architecture for VMware vsphere

Table of contents

The case for cloud-based disaster recovery

Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation

Backup Software? Article on things to consider when looking for a backup solution. 11/09/2015 Backup Appliance or

Protecting enterprise servers with StoreOnce and CommVault Simpana

Cost Effective Backup with Deduplication. Copyright 2009 EMC Corporation. All rights reserved.

WHITE PAPER. The 5 Critical Steps for an Effective Disaster Recovery Plan

EMC Data Domain Boost for Oracle Recovery Manager (RMAN)

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Backup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland

Solution brief: Modernized data protection with Veeam and HP Storage

Unitrends Backup & Recovery Solutions and Disaster Recovery Best Practices

Introduction. Setup of Exchange in a VM. VMware Infrastructure

Redefining Oracle Database Management

Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation

Traditional Disaster Recovery versus Cloud based DR

Bringing the edge to the data center a data protection strategy for small and midsize companies with remote offices. Business white paper

W H I T E P A P E R R e a l i z i n g t h e B e n e f i t s o f Deduplication in a Backup and Restore System

Daymark DPS Enterprise - Agentless Cloud Backup and Recovery Software

W H I T E P A P E R T h e C r i t i c a l N e e d t o P r o t e c t M a i n f r a m e B u s i n e s s - C r i t i c a l A p p l i c a t i o n s

Module: Business Continuity

The Oracle StorageTek VSM6 Providing Unprecedented Storage Versatility

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation

ESG Report. Data Protection Strategies for SMBs. By Heidi Biggar Storage Analyst, Data Protection Enterprise Strategy Group.

Buyer s Guide Checklist - What to Look For in Online Backup and Recovery Services

Backup, Recovery & Archiving. Choosing a data protection strategy that best suits your IT requirements and business needs.

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation (Author and Presenter)

EMC NETWORKER SNAPSHOT MANAGEMENT

Implementing Disaster Recovery? At What Cost?

The Modern Virtualized Data Center

Using Live Sync to Support Disaster Recovery

SOLUTION BRIEF: CA ARCserve R16. Virtual Server System and Data Protection, Recovery and Availability

Cloud Backup And Disaster Recovery Meets Next-Generation Database Demands Public Cloud Can Lower Cost, Improve SLAs And Deliver On- Demand Scale

Manufacturers Need More Than Just Backup... But they don t need to spend more! axcient.com

IBM Storage Management within the Infrastructure Laura Guio Director, WW Storage Software Sales October 20, 2008

EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE: MEETING NEEDS FOR LONG-TERM RETENTION OF BACKUP DATA ON EMC DATA DOMAIN SYSTEMS

5 Essential Benefits of Hybrid Cloud Backup

Using HP StoreOnce Backup systems for Oracle database backups

Symantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer

Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect

Things You Need to Know About Cloud Backup

Data Protection Report 2008 Best Practices in Data Backup & Recovery

How To Improve Storage Efficiency With Ibm Data Protection And Retention

Backup and Recovery Solutions for Exadata. Ľubomír Vaňo Principal Sales Consultant

The evolution of data archiving

White. Paper. Improving Backup Effectiveness and Cost-Efficiency with Deduplication. October, 2010

Access to easy-to-use tools that reduce management time with Arcserve Backup

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup

VMware vsphere Data Protection

How To Use An Npm On A Network Device

Why Cloud Backup Now? Ashar Baig Senior Director of Product Marketing

Business-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance

Effective Storage Management for Cloud Computing

SOLUTION BRIEF: CA ARCserve R16. Leveraging the Cloud for Business Continuity and Disaster Recovery

Business-centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance

Unitrends Integrated Backup and Recovery of Microsoft SQL Server Environments

Re-Invent Your Recovery

Storage and Disaster Recovery

Transcription:

DEFINING THE RIGH DATA PROTECTION STRATEGY The Nuances of Backup and Recovery Solutions By Cindy LaChapelle, Principal Consultant, ISG www.isg-one.com

INTRODUCTION Most organizations have traditionally believed that having data backed up and stored offsite is sufficient to ensure data recovery and maintenance of business operations. In this environment, well-defined disaster recovery plans and regular testing have not typically been priorities. In recent years, events such as the 9/11 attacks and the tsunami in Japan have caused many organizations to reassess their overall data protection strategies for data backup and recovery, disaster recovery and business continuity as well as long-term retention and security of their data. However, most business downtime is caused not by catastrophic events or major natural disasters, but by hardware failures, data loss, power outages or UPS failures, network outages, security breaches, human error and application failures. These factors can do just as much damage to the organization s long-term performance and reputation. As data volumes and retention requirements grow in response to business demands and regulatory mandates, data protection strategies must ensure that critical business data can be accessed and recovered in a timely fashion. Server and storage virtualization, data center consolidation, explosive data growth and new compliance requirements are major change drivers within the data center, but many IT organizations still employ data protection strategies from 5 or even 10 years ago. In a rapidly changing environment, determining the right data protection solution is no longer a black and white issue, but rather a grey area that involves myriad considerations that impact complexity, effectiveness, and cost. This ISG white paper is designed to help IT organizations navigate the nuances of data backup and recovery and select an appropriate data protection solution that addresses business needs. DATA PROTECTION STRATEGIES CINDY LACHAPELLE 1

GREY IS THE NEW BLACK FOR DATA PROTECTION The right data protection strategy must ensure that the backup and recovery solution goes beyond basic recovery of the occasional lost or mistakenly deleted file. It must also be leveraged to provide the right level of disaster recovery and business continuity capability. At the same time, given the reality of flat or decreasing IT budgets, the data protection solution must effectively balance cost and risk factors. Traditional black and white backup and recovery solutions were typically implemented over a shared IP network with data being backed up to physical tape media in an automated library. Incremental backups occurred daily while full enterprise data backups were conducted every week or two, normally during weekends. Occasionally, backup pools were established with different retention parameters for different data types or file systems but many organizations simply backed up all of their data with a plan to keep it forever. Backup was used to recover lost user files and as a basic strategy to provide some guarantee of business continuity in the event of a major event or disaster. Full recovery of a critical environment from backups was rarely tested. Many organizations maintained older legacy tape media formats without any reliable means to recover the data that resided on them. The attitude was that, if asked, they could legally, and honestly, state that they had the data and then pray that nobody actually demanded it be restored. As compliance regulations grew and e-discovery requests became more common, businesses recognized that the policy of retaining data forever could come back to haunt them. For one thing, attempts to migrate older legacy data were often largely unsuccessful as well as extremely costly. Standard backup strategies lacked processes to migrate relevant data as tape technologies were retired. To further compound the problem, many backup tapes with a forever retention mixed irrelevant data together with data that legally had to be kept for compliance reasons. Additional factors affecting backup and data protection strategies include the following: Shorter or nonexistent available windows during which backups can run Backup complexity associated with virtual server environments and multiple backup technologies Legal time limits to recover data in e-discovery requests Changing compliance requirements for retention The need to delete data once it is no longer required Exponential growth in primary data that translates into unmanageable growth in backup data sets Backup complexity due to requirements for more frequent backups of some key business-critical data sets, different retentions, etc. In this changing environment, organizations require complex business-focused backup and recovery solutions and implementations. Each shade of grey solution requires considerations of cost, complexity, risk implications, recovery time and recovery point objectives, technology options, alignment of retention to changing business and legal needs, etc. Recovery point objectives (RPO) associated with daily backups may not satisfy targets defined in the disaster recovery (DR) plan, particularly for some business-critical applications and data stores. In the latter instance, alternate data protection strategies may be needed in conjunction with backups as part of the overall DR strategy. In a DR plan, the RPO and the RTO (recovery time objectives) need to be defined based on business need and criticality. The plan should also define what systems need to be in place (and where they should be located) to get the key business applications up and running again. Often, critical system and application RTOs are shorter than the typical 24-hour interval associated with daily backups, so other data protection technologies and strategies (such as remote replication or mirroring, snapshots or point-in-time copies, or continuous data protection technologies) may be required. The cost of DR solutions needs to be carefully balanced against the business risk and cost of downtime. To address this challenge, many businesses are reviewing cloud-based backup and storage options for disaster recovery. DATA PROTECTION STRATEGIES CINDY LACHAPELLE 2

OPTIMIZING DATA PROTECTION A business case for an enhanced data protection strategy must address all relevant costs and risks to ensure alignment to business requirements for data backup and recovery. Design the backup and recovery solution to be flexible. As business requirements evolve, modify the data protection strategy to integrate new and emerging technologies which add necessary functionality and/or greater responsiveness to the overall backup and recovery solution. Leverage multiple storage technologies to provide the right level of flexibility and responsiveness while balancing cost and complexity. Virtual tape libraries (VTL) and disk-based backup solutions leverage online disk storage to provide faster backups and faster recovery times for key systems and applications and frequentlyused data. To control costs, while still addressing responsiveness and compliance requirements, migrate disk backups to lower-cost tape storage as they age. Disk and VTL solutions also offer deduplication capability, which can significantly reduce the overall storage required by limiting backup to data changes. An all-disk backup solution that eliminates tape completely can become very expensive and introduce different challenges for data with long-term retention requirements that exceed the lifespan of the disk technology. New advances in tape technologies, such as linear tape file system (LTFS), may provide reasonable alternate approaches to disk-based technologies for both faster access to backup data and for lower performance storage tiers for archive solutions. LTFS is a selfdescribing file system that makes files on tape directly host-readable, enabling tape to be used in the same fashion as a USB drive. To select the right mix of automated tape, virtual tape and disk-based technologies, consider business requirements for backup and recovery performance, data access and retention (both short and long term), reliability, ease of management and cost. However, the right mix of disk and tape today does not necessarily guarantee that future business needs will be met. The backup and recovery solution therefore must be flexible and frequently reviewed and updated to reflect the evolution of the business and supporting technologies. Alternatively, some organizations enhance their existing backup solution with cloud-based backup and storage services. When choosing this option, verify that SLAs are aligned to the business RPOs and RTOs for data recovery for the applications and data sets being backed up to the cloud. In addition, make sure that all internal business requirements for data security are being met and that cloud service capabilities are reviewed on a regular basis, as compliance and regulatory requirements can change with time. With virtual server environments that share the same data store, backups must be fully integrated with the overall backup solution to avoid backing up the same data stores multiple times. Leverage technologies like deduplication to avoid redundant backups. Be sure to back up physical as well as virtual servers. A recent study by Kroll Ontrack ( Data Loss in a Virtual Environment An Emerging Problem, 2011) noted that, if deployed or managed carelessly, virtualization can itself create business disruptions or data disasters. This study reported that human error (vs. machine error) accounted for 26 percent of systems failures in traditional non-virtualized systems, but 65 percent in virtualized environments. When adding new servers (virtual or physical), establish a check list to ensure that backups are mapped to the appropriate backup pools, based on business requirements. Map incremental and full backup schedules and frequency to application and server RPOs Map data retention and deletion schedules to legal and compliance regulations Choose the backup solution storage architecture and software (disk, virtual tape, physical tape, disk migrating to tape, etc.) that meet data and application objectives for available backup windows and restore-time objectives Leverage alternate, or additional, data protection solutions such as continuous data protection (CDP) technologies, snapshots, or local or remote replication or mirroring for servers and applications with high availability requirements Ensure RPOs are met by confirming backup processes are in place to: Redo or restart failed or missed backups Guarantee new servers are configured for backup during the server build SHADES OF GREY DATA PROTECTION STRATEGIES CINDY LACHAPELLE 3

Backup solution bottlenecks change over time depending on where throughput is limited within the data path. Define a regular annual review process for the backup solution to identify bottlenecks, or potential bottlenecks, and redesign the solution to eliminate or minimize the impact on backup windows and backup success. Bottlenecks within an end-to-end backup solution may occur in any of the following points in the data path: Network Bottlenecks (IP or fiber channel) Back-end Bottlenecks (tape libraries and tape drives, disk for backups, etc.) Front-end Bottlenecks (client servers and backup servers) Monitor all of these systems to ensure data throughputs are not being restricted. Monitor and report backup capacity and performance and leverage this information to perform proactive backup capacity and performance planning. Establish a regular program for testing and validating backups by performing random restores of files and data sets. Integrate this testing with DR planning and testing to ensure that data can be recovered from backups within the required time frames. The worst time to discover that backups are failing or are unrecoverable due to media failures or other corruptions is in the middle of a disaster. Whenever possible, store backups at an alternate location or secondary data center, or create copies of key backup data as insurance in the event of a major failure or disaster. If tapes are transported offsite encrypt the data during backup to ensure security. As backup technologies age and refresh, migrate backups to newer backup platforms and media to ensure that legacy backups with long-term retentions are recoverable. Migrate existing backups on legacy formats where possible and, once migrated, retire legacy backup hardware and software. If a lack of compatible legacy hardware or software precludes migration, delete or destroy backup tapes rather than store them if there is no chance for a successful restore. Make sure the backup data retention schedules align to the business lifecycle, recovery access and availability of the data being backed up. SUMMARY Backups are pointless if data recovery fails or is insufficient to meet business requirements and objectives. Don t over- or under-configure the backup solution; rather, right-size the solution and leverage a mix of backup technologies and platforms to ensure a data protection strategy that delivers the right balance between risk and cost. Revisit and redesign the backup and recovery solution as the business evolves and requirements change. Once implemented, backup solutions should not be considered static and expected to run unmodified forever. Factors such as exponential growth of structured and unstructured data, new and changing regulatory and compliance requirements, and a greater need for faster and more effective disaster readiness are driving IT organizations to embrace more complex and adaptable backup solutions to address business needs. Make sure that the backup and recovery solution is flexible and responsive by reviewing and reconfiguring backups as technologies and business needs change. The days of a simple black and white backup and recovery solution are over today s challenge is developing the right shade of grey backup and recovery solution that fits your organization s business needs. SHADES OF GREY DATA PROTECTION STRATEGIES CINDY LACHAPELLE 4

LOOKING FOR A STRATEGIC PARTNER? Your operational excellence is our business. CONTACT US Visit the AccessISG Sourcing Portal for more sourcing information, insight and tools. Click the envelope to contact us or go to http://info.isg-one.com/contactus. Information Services Group (ISG) (NASDAQ: III) is a leading technology insights, market intelligence and advisory services company, serving more than 500 clients around the world to help them achieve operational excellence. ISG supports private and public sector organizations to transform and optimize their operational environments through research, benchmarking, consulting and managed services, with a focus on information technology, business process transformation, program management services and enterprise resource planning. Clients look to ISG for unique insights and innovative solutions for leveraging technology, the deepest data source in the industry, and more than five decades of experience and global leadership in information and advisory services. Based in Stamford, Conn., the company has more than 850 employees and operates in 21 countries. For additional information, visit www.isg-one.com. 082212 Copyright 2012 Information Services Group All Rights Reserved