How to integrate data protection in the data center

How to integrate data protection in the data center

Data protection systems can sometimes seem like they were put together by an installer using mismatched components. The problem in most organizations is that data protection software and even data protection hardware has been around for a while. As new technologies like virtualization and cloud join the IT toolkit, how do you integrate them into existing data protection systems? Some vendors are taking a new approach, throwing out the old approach and redesigning a data protection system from scratch for today's data center.

[[207152]]

Integrated Data Protection Considerations

The first challenge that IT professionals face when considering an integrated data protection solution is how to choose from the various types of integrated data protection products. The first approach, using a backup appliance, integrates the backup software with the physical server, which means that the software is pre-installed and may be integrated with some specific hardware.

Another type of integration is when a data protection hardware vendor -- what we know as a hard drive-based backup appliance -- optimizes the hardware for another vendor's software. For example, if the software has a boot-from-backup feature, the backup hardware vendor places the latest version of the backup data on the highest-performance tier of storage media, even flash, so that when a volume is booted from the backup, performance is acceptable.

The third type of integration, a newer approach, comes from hardware vendors who are designing more economical and scalable secondary storage. They are not used as an interface to data protection products, but work with the environment in which these products exist. Backing up hypervisors like VMware and Hyper-V, or applications like Microsoft SQL Server and Oracle. In some cases, they work with primary storage hardware vendors to copy snapshot data directly to their secondary storage systems.

The fourth type of integration is to the cloud, which in some cases is more like a connector, in which case the cloud becomes another storage target for the backup software or hardware vendor. Older backup sets are archived to the cloud.

A different form of cloud integration is where the backup software places the primary backup or even all copies of the data in the cloud, but the backup software caches the latest backup locally, which allows for limited storage space in the data center. And most of these vendors can start virtual machines in the cloud, providing excellent disaster recovery capabilities.

Sacrifice of flexibility

All of these integration solutions come with a trade-off in flexibility. For data centers, one constant is change, and the data in today's data center has little in common with the data in tomorrow's data center. So no matter how modern the data center becomes, the data protection process will always exist. The protected data set may be used again in a few years or even a dozen years, even if the application that created it is retired.

Integrated systems tend to be use case specific, protecting a specific environment or offering a compelling feature, such as recovery in the cloud. Different integration approaches have varying degrees of inflexibility. The first approach to integrating appliances is probably the most restrictive. In this case, both the hardware and software serve a single purpose. Adding new hardware is difficult, and replacing the software is nearly impossible.

The other two approaches, which use software running on computers at the user's or the organization's premises, offer more flexibility. The organization is trying to standardize the software so that it can support a wide variety of data protection hardware or enable data protection hardware to receive data from a wide variety of data protection software.

Cloud data protection also has limited flexibility to varying degrees. Some cloud providers offer a complete one-stop service. They provide backup software, use the software to back up data to their local cache, and then replicate the data to their cloud. Customers will be 100% dependent on the one-stop cloud protection service provider.

Other approaches offer greater flexibility, most commonly software that allows data to be backed up to a public cloud of the customer's choice, including their own private cloud.

Is it worth it?

An integrated data protection solution ensures ease of use. Ease of use can be divided into two aspects: initial deployment and implementation and subsequent operation. Integrated products - either an all-in-one appliance or a one-stop cloud - make deployment a breeze, which would be more troublesome to deploy in other ways. But they can provide greater flexibility as the organization grows and the data center evolves.

A key factor is change. If the data center is relatively static, with no new applications or initiatives other than growth in capacity requirements, then the data center is stable and a one-stop solution may be ideal. However, if the data center is changing rapidly to adapt to the needs of the organization, then incorporating more flexibility is a reasonable requirement.

<<:  Machine Learning in Blockchain Technology

>>:  Shi Kai: ThoughtWorks creates a competitive advantage for you

Recommend

Domestic IPv6 system deployment speeds up and IPv6 application boom is coming

The current Internet Protocol address IPv4 addres...

HTTP History - From HTTP/1 to HTTP/3

Birth When talking about http, we must first unde...

There are five main differences between RS232 and RS485

Many communication protocols are often used in em...

Space Data-as-a-Service Ready to Take Off

【51CTO.com Quick Translation】The upcoming commerc...

Simple test of BandwagonHost special price annual VPS (DC6)

Last time when BandwagonHost launched a special o...

What is 5G? How fast is 5G? Learn about 5G in one article

Recently, the world's first 5G railway statio...

Detailed explanation of the differences between IPv6 and IPv4!

IPv6 is the abbreviation of Internet Protocol Ver...

IT Viewpoint: Five major network challenges for 2019

Frank Scalzo, network director at data center ope...

My boss told me not to use strings to store IP addresses, no!

[[432371]] How to store IP address data in the da...