sb-au logo
Story image

It's time to rethink your back-up and recovery strategy

12 Nov 2018

In today's enterprise, where secondary data, applications and workloads are becoming increasingly distributed on-premises, in the cloud and edge, it is becoming apparent that legacy approaches to backup and recovery may no longer be sufficient for most organisations. 

It may be the case that their existing tools are not keeping pace with other advancements in their infrastructure and computing environments, such as scale-out storage systems and hyperconverged systems, which seek to reduce data centre complexity and help manage surging IT costs.

Selecting the right enterprise-grade, modern, web-scale backup and recovery solution involves understanding the problem first, then comparing solutions to those problems. 

Understand your environment

Before undertaking the selection process, it’s important to understand any potential shortcomings in your existing backup and recovery environment. The checklist below outlines common backup and recovery challenges faced by IT and helps companies discover where to kick off their search.

1. Siloed infrastructure: Does the current solution require the use of backup software along with separate media servers and dedicated storage targets?  Right now, the typical enterprise relies on between two to four backup software solutions to protect different workloads.

2. Multiple, fragmented UIs to configure backup workflows: Does the current solution require the use of multiple user interfaces and vendors to create backup workflows? For example, is it necessary to create a backup job for a physical server in one solution’s console; a separate product’s console to configure a different backup job for a virtual server, and yet another product and console to help protect SQL Server?

3. Bolt-on cloud gateways: If the current system provides any kind of support for the public cloud, does it require separate bolt-on cloud gateways that act as intermediaries between the on-premises and public cloud-based backup and recovery environments?

4. Forklift upgrades for scale-up: When the time comes to grow the backup and recovery environment, is it necessary to schedule downtime for the backup and recovery environment to add more nodes?

5. Slow restores, last point in time only: Does the current solution suffer from performance problems at restore time, limiting how many VMs can be restored at once, resulting in the potential for RTO misses? Or does it only allow recovery from the latest backup made?

It should only take one of the above challenges to be applicable to prompt an enterprise to consider reviewing its options before replacing its existing backup and recovery software. 

Options are now available on the market that have reconsidered backup and recovery with a modern, web-scale point of view to address all of these deficiencies in elegant, simple, and affordable ways. Companies are no longer confined to thinking of backup and recovery as a silo, but rather as a full-fledged member of their business-critical application sets; and one that’s self-healing, too. 

There is no need to live in fear of a ransomware attack, as a defence can be put in place. Neither do IT staff need to worry about the day when they max out their installed solutions’ capabilities and are forced to 'rip and replace', as modern solutions scale out, making an expansion, upgrades, and node replacements much easier.

But that is only the start when it comes to the transformative effects of a modern backup and recovery product, as it also provides capabilities that are either impossible or prohibitively expensive with legacy approaches. These include native cloud features, mass instant recovery of VMs, and a comprehensive API to enable advanced workflows.

Article by Theo Hourmouzis, Cohesity A/NZ MD

Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Story image
Kaspersky finds red tape biggest barrier against cybersecurity initiatives
The most common obstacles that inhibit or delay the implementation of industrial cybersecurity projects include the inability to stop production (34%), and bureaucratic steps, such as a lengthy approval process (31%) and having too many decision-makers (23%). More
Story image
5 ways to use data science to predict security issues - Forcepoint
Data science enables people to respond to problems in a better way, and to also understand those problems in a way that would not have been possible 50 years ago.More
Story image
Shlayer malware proves Apple devices aren't as secure as you think
"Apple never talks about malware publicly, and loves to give the impression that its systems are secure. Unfortunately, the opposite has been proven to be the case with great regularity."More
Story image
Zero trust is the way to secure the distributed workforce - Empired
Existing security solutions need to evolve to accommodate the new remote workforce.More
Link image
VR a leading factor in edge computing, says Gartner
Edge architectures and technologies, including VR, will be an essential component of innovative products and services.More