Data Protection and Recovery in the Small and Mid-Sized Business (SMB) 2012
Total Page:16
File Type:pdf, Size:1020Kb
Data Protection and Recovery in the Small and Mid-sized Business (SMB) 2012 An Outlook Report from Storage Strategies NOW By Deni Connor, Patrick H. Corrigan and James E. Bagley Client Relations: Phylis Bockelman April 9, 2012 Storage Strategies NOW 8815 Mountain Path Circle Austin, Texas 78759 Note: The information and recommendations made by Storage Strategies NOW, Inc. are based upon public information and sources and may also include personal opinions both of Storage Strategies NOW and others, all of which we believe are accurate and reliable. As market conditions change however and not within our control, the information and recommendations are made without warranty of any kind. All product names used and mentioned herein are the trademarks of their respective owners. Storage Strategies NOW, Inc. assumes no responsibility or liability for any damages whatsoever (including incidental, consequential or otherwise), caused by your use of, or reliance upon, the information and recommendations presented herein, nor for any inadvertent errors which may appear in this document. This report is purchased by VaultLogix, who understands and agrees that the report is furnished solely for distribution to its prospects and customers. Copyright 2012. All rights reserved. Storage Strategies NOW, Inc. Sponsors 2 Table of Contents Sponsors ....................................................................................................................................................................... 2 Introduction ................................................................................................................................................................. 5 The Small and Medium Business Market .................................................................................................................... 5 Importance of Data Protection and Business Continuity Software ......................................................................... 5 SMB Unique Requirements ..................................................................................................................................... 5 Growing Data Retention Demands .......................................................................................................................... 6 Technology Availability ............................................................................................................................................ 6 Data Protection Technologies ...................................................................................................................................... 7 Backup Technologies ................................................................................................................................................ 7 Backup to Tape ..................................................................................................................................................... 7 Virtual Tape Library (VTL) ................................................................................................................................... 8 Disk-to-Disk-to-Tape (D2D2T) ............................................................................................................................ 9 Backup to Fixed Disk or Array ............................................................................................................................. 9 Backup to Removable Disk ................................................................................................................................... 9 Online or Cloud-based Backup ............................................................................................................................. 9 Online Backup Issues ......................................................................................................................................... 10 Methods for Backing up Data ................................................................................................................................. 11 File Synchronization and distribution ....................................................................................................................12 Remote Data Replication ........................................................................................................................................12 Images, Clones and Snapshots ................................................................................................................................ 13 Physical-to-Virtual (P2V) and Virtual-to-Physical (V2P) Conversions .................................................................. 13 Continuous Data Protection and Near Continuous Data Protection ......................................................................14 Redundant Servers and Failover .............................................................................................................................14 Agent vs. Agentless Backup .....................................................................................................................................14 Windows Volume Shadow Copy Service (VSS) .......................................................................................................14 Encryption and Password Protection of Backup Media ......................................................................................... 15 Advanced Encryption Standard (AES) ................................................................................................................ 15 Tape Drive-based Encryption .............................................................................................................................. 15 Encryption Issues ................................................................................................................................................ 15 Backup Data Compression ..................................................................................................................................16 Data Deduplication .................................................................................................................................................16 File Mode and Block Mode .................................................................................................................................. 17 In-Line or Post-Processing Deduplication .......................................................................................................... 17 Source or Target Deduplication........................................................................................................................... 17 3 The Downsides of Data Deduplication ................................................................................................................ 17 Benefits of Deduplication and Compression ...................................................................................................... 18 Application-Specific Backup .................................................................................................................................. 18 Virtual Machine (VM) Backup ................................................................................................................................19 Backing Up Virtual Machines .................................................................................................................................19 Hypervisor-specific Backup Methods .................................................................................................................... 20 Data Archiving ....................................................................................................................................................... 20 Media for Archiving ............................................................................................................................................ 20 Archive Best Practices .........................................................................................................................................21 Other Data Protection Methods ..............................................................................................................................21 RAID, Disk Redundancy and Drive Arrays .........................................................................................................21 Disaster Recovery and Continuity of Operations ................................................................................................... 22 Tips and Best Practices for Effective Backups ........................................................................................................... 23 IT Professionals Data Protection and Disaster Recovery Survey ...................... Error! Bookmark not defined. Vendor Name: VaultLogix ......................................................................................................................................... 28 Cost: Pricing is based on the amount of data being protected. .............................................................................. 28 Table 1.1 Vendor/Product Name................................................................................................................................ 29 Table 1.2 Virtualization Support ................................................................................................................................ 29 Table 1.3 Server operating systems supported .........................................................................................................