Quantcast
Channel: Lewan IT Solutions Technical Blog » dougoakes
Viewing all articles
Browse latest Browse all 13

How good is your backup solution?

$
0
0

Most organizations believe that their data is well protected because they have a backup system in place, or because they use a RAID array to protect their data against disk failure. The truth is very few entities have complete protection.
A complete data protection solution requires protection in several areas. Hardware resiliency protects against component failure. Point in time protection ensures that data can be recovered from some point in the past, whether seconds, minutes, hours or days. Geographic protection prevents loss of data in case of some sort of site wide failure. Many organizations also require some sort of long term retention of critical data for compliance purposes or in case of legal action.

The following list describes some of the strategies used for each type of data protection:

Hardware Resilience – Protects against hardware component failure:

    RAID Controller cards
    Software RAID
    External Storage Arrays

Point-in-time Protection – Protects against data loss or corruption due to hardware or software failure, user error or deliberate actions:

    Enterprise Backup Utilities
    Software or Hardware Based Snapshots
    Continuous Data Protection Tools

Geographic Protection – Protects against site wide failures:

    Off-site Tape Storage
    Disk based backup replication
    Replication Software
    Storage Array Based Replication

Long-Term Protection – Used when business or legal policies require retention of data beyond standard backup retention:

    File System and E-Mail Archiving


Viewing all articles
Browse latest Browse all 13

Trending Articles