The rapid development of virtualization, cloud computing and large data technology has changed the traditional IT application model, when users deploy cloud computing, cloud computing and storage are on the cloud platform, cloud data will be more important to remove data privacy and network attacks, complex system structure, multi-user thin terminal application environment, The virtualization application model, the huge storage device, the massive data backup also brings the new challenge to the cloud data protection.
Walk (English), is China's information storage and security, cloud computing and large data application solutions and service providers, with more than 15 years of local IT market experience and more than 3,000 end users. In the face of cloud computing, large data era, data security has become the focus of it architecture, Walk provides intelligent data protection solutions from the hardware, functionality, application three different levels, providing data to the business to carry out a full range of data security, to ensure the absolute safety of customer data.
The source of frequent data loss accidents in cloud computing era
As the cloud landed, more users focused on cloud applications, cloud computing, cloud storage and other places, and gradually ignored the cloud environment data protection, and even some people say that since the distributed system using multiple copies to save, what to do with data backup? The same thing is mirroring the early years of several disk arrays, If you rely on multiple copies to save and Amblyopia data backup method is established, then the backup market should have been eliminated.
According to IDC, a market analyst, the total revenue for backup-only equipment manufacturers was 679 million U.S. dollars in the first quarter of 2013, up 16.5% year-on-year. IDC said the market grew significantly faster than external disk storage systems and data protection and recovery markets. So far, the market continues to flourish, indicating that it still has an irreplaceable position in data security, "Local backup, offsite backup, data recovery drill" These three old wagons also apply to the era of cloud computing.
October 2009 Microsoft Sidekick Mobile Service failure, so that users can not access the contact list, calendar and other personal information. The data is stored on Microsoft's responsible server. And a week later, with no backup of the data, Microsoft said it could lose the user's data completely, prompting the industry to rethink the security of cloud computing data.
March 2011, Google's Gmail mailbox failure, and then Google confirmed that this failure estimates caused 150,000 of users ' messages, labels and contact information lost.
August 7, 2012 because of a computer room a physical server disk damage, resulting in the Royal Cloud host customer data is lost. Sheng advises users, "in order to avoid your accidental loss, please do a backup of the data outside the Sheng host." ”
Cloud Platform data loss in an endless number of incidents, and a lesson told us that data security can not be ignored, especially in the application of cloud applications today, enterprises cloud disk, network disk, data center hosting, and other business services model overwhelming arrival. Data centers are not just hundreds of GB of NAS movies, but more of the user's core data, which damage and loss will give cloud service providers a huge reputation loss. Perhaps later more users in the choice of cloud disk, data hosting and other services will ask more "Your Data center security?" Is there a backup?
Cloud services to accelerate the development of the premise depends on the data, if the data is not secure, then cloud computing is really a misty cloud. In recent years, due to cloud computing, the rapid development of Internet of things, huge amount of data to traditional backup challenges, the data security in the cloud era is facing unprecedented challenges.
The close relationship between cloud computing and data protection
Massive data growth--traditional business data due to the increasing of unstructured data, business data is constantly increasing, and based on the cloud platform of Digital TV, 3G Internet access, GPS positioning, unified monitoring and so on a variety of business, each user a simple operation may generate a few KB size of data. In the past, these data can be used as garbage collection, but the development of large data today often need to analyze to get the potential business value, which in the era of cloud computing, the need to protect the data is not only day-to-day business data, more of the vast number of unstructured speech data. Because of the huge business value of large data mining, more and more human behavior habits have been captured and transformed into data. In the face of explosive growth of large data, traditional data protection technology is difficult to meet new requirements.
Data security for virtualized environments-layer three and architecture of the cloud platform IaaS, PAAs and SaaS have become common, and the PAAs infrastructure layer relies on comprehensive virtualization technologies, including computing resource pools, network resource pools, storage pool, and so on, where virtualization technology logically pools physical hardware. And with the development of cloud computing virtual machine will be widely used in the computer room, the administrator needs cumbersome way to locate and track the virtual machine location to ensure that the virtual machine data is effectively protected. Many administrators need to spend a lot of time tracking the location of virtual machines, and through manual backup recovery strategy, if the number of virtual machines continue to grow, this tedious human behavior not only affects productivity, but also become a security risk in the data center. How to simplify the backup recovery strategy, how to accurately locate and reduce the manual operation, let the administrator freed from the virtual machine maintenance, is also a cloud of data protection requirements.
Granularity of data recovery-traditional data protection, in the query data need to restore first, and the recovery time is determined by the backup policy definition of the folder or volume size, recovery after the user can recover from the data content of the required file, complex recovery steps difficult to meet the timeliness of the requirements. What users need for data protection is instant Lookup, locate the required files and quickly recover the granularity from the original volume folder to a single file or even the attachment of a message, how to quickly locate and extract the required content to become a data recovery can not be ignored.
Data recovery timeliness--the most important problem of traditional data protection means the recovery time is long, relatively large number of data recovery a few days, and on the cloud platform, more and more frequent online interaction business has not allowed the problem after a few days to normal operation. In addition, the traditional data protection used more for the night idle time to do data backup, once there is a problem, then the recovery will be the previous day's data, the date of business generated data may face all lost, which for online interactive business is intolerable. Users are increasingly demanding RPO and RTO, and it is minutes or even seconds to restore timeliness to some online businesses, while recovery times need to be maintained for a few seconds or minutes before a failure, as is a new challenge for traditional backups.
Walk provides comprehensive data backup and disaster recovery solutions
Walk to meet the cloud computing, large data era of enterprise customer demand as the goal, adhere to independent innovation, not only for modern IT applications to provide high-speed, safe, reliable, flexible data and computing infrastructure, while providing customers with industry-oriented cloud application services, as well as the implementation of the industry application cloud mode of professional services.
The Suresave VTL6000 Virtual Tape Library is designed for high-end enterprise-level users, based on a multiple-controller parallel architecture, with a distributed file system in the backend for storage. Through the parallel technology, the dynamic lateral expansion of the controller is realized, and the performance of the system increases exponentially with the increase of the controller. The back-end distributed storage provides a dynamic horizontal scaling of capacity, and increases the internal I/O rate significantly at the same time as capacity expansion, thus making the VTL's overall performance a quality At present, the distribution of this hotspot technology into the virtual tape library, walk is the first, and the rate from the original MB/s level to the GB/sec level, effectively solve the massive unstructured data backup and recovery problems.
For small and medium cloud computing centers, Walk provides suresave IDP-BSR data protection system, which can be used in conjunction with the former, not only simple deployment, can support the physical machine system, application and data full backup, but also support a variety of virtualized environment agents and agentless backup, Supports system one-click Recovery and restores entire Windows, Linux, or virtual machines without cumbersome recovery steps.
In order to cope with the high demand of RTO, such as trades, the Suresave IDP Intelligent Data Protection system can realize the minute-level fast recovery, and the users need not wait for the long recovery time like traditional backup software. Once the storage hardware failure, storage data failure, and so on, can be quickly taken over by IDP, to ensure the stable operation of the customer business system, and to respond to the mistake of human error removal of the logical fault, can be directly quickly restored to a few minutes before the state, for trades to provide a high level of data
Suresave Datamaster Enterprise Backup and recovery software not only provides backup support for enterprise-class heterogeneous physical environments, but also optimizes data protection for virtualized platforms, enables guest backup and backup from host, and enables real-time tracking of virtual machine locations. Ensure the accuracy and simplicity of virtual machine backups, support centralized deployment of virtual machine backups, and provide data protection for virtualized environments in large cloud computing centers.
As an innovator and leader in China's data storage and computing industry, walk is an innovative, stable and efficient independent innovation technology and high-performance information storage and data security products, services in the cloud computing, large data-related application platform building, to enhance the users at all levels in data storage and security, cloud computing infrastructure, Large data applications and other areas of the overall stability and security, accelerated the pace of user information construction.