This article can also be found in the Premium Editorial Download "Storage magazine: Using file virtualization to improve network-attached storage."
Download it now to read this article plus other related content.
Where backup fits in a new data protection world
Not too long ago, the solution for addressing almost all of these issues would involve backup, either entirely or to some degree. But as we all know, recovery from backup takes time and is disruptive, so technologies were introduced to reduce the recovery time or eliminate downtime.
|Typical protection methods|
The table "Typical protection methods" shows the types of protection usually applied in today's IT infrastructures to the kinds of data loss described above.
Consider a scenario in which a critical database is protected with RAID-10, has business continuance volumes (BCVs) created every four hours and retained for a day, and is remotely replicated to a hot site. What failure conditions would backup address in that case? Its primary value would seem to be protecting against latent undetected data loss where a corruption may be discovered days or weeks later when BCVs have long since been modified, serving as a kind of "failsafe."
This was first published in March 2007