New approaches to data protection and management--recovery management
Source: Internet
Author: User
KeywordsData protection IT administrators recovery management
IT administrators have done a lot of work on data protection, including data backup and management. In order to save money in both human and material resources, they face increasing challenges. This problem arises partly because of the growing number of business data, including database data, e-mail data, file sharing data, and so on. It is also because these data need to be kept for a long time to meet evolving business development needs. To reduce the human and material costs of protecting different kinds of data, many companies adopt a multi-level approach to data storage. At the same time, this kind of tiered storage method has brought new ideas and methods for many enterprises to protect and manage the backup data. In the UK, and even across Europe, recovery management is a new way of protecting data. It is said to reduce the amount of data that needs to be protected and to improve data resilience and reduce backup to files. The recovery management technology combines a combination of tiers of storage technology, image and replication technology to make IT administrators more comfortable with the challenges of data backup and management. Recovery Management (Recovery Management): Recovery management addresses the problem of overly lengthy backup processes and the need for rapid recovery of data in exceptional circumstances, while also addressing the high cost of employing people to protect and recover data. In addition, it can protect the email application system and the database system to ensure that the business activities will not be broken by the virus attack and other reasons. Recovery management ensures that business data is accessed at all times through the ' recovery level '. These key data are the important basis for decision-making and implementation, and are essential to survive in the competition. Recovery level (recovery tier): Traditional storage mode consists of main memory (disk) and file files, including both active memory and off-line memory. By adding recovery-level content on this basis, including the recovery of snapshot data and replicated data, IT departments can quickly get commercially sensitive data from near-line storage devices without having to consult related product data. Data protection or data backup-level operations require a copy of the data to be stored in the primary storage, often as a copy of disk or disk to tape. In contrast, the recovery level requires only a visit to the product data based on the local snapshot capacity of the storage environment. The application's behavior is protected by regular access to copies of product data, such as access once per hour, and by replicating the data accessed to a recovery-level near-line device. Create online replication (line replicas): The primary function of recovery management is to manage the online replication data. Online replication data can be easily accessed at all times, unlike traditional methods of accessing data on disk, the access method for online replication data does not require disk-reading operations. Exchange and Oracle are widely used in many countries and multinational companies, and a data recovery operation can take days, this not only hinders the user to the mail processing, but also greatly slows down the business transaction processing speed. Of course, it will take a while to create complete online replication that includes snapshots and replication technologies, especially for large-scale data processing, which is specific to the larger enterprise. Currently, many vendors have introduced SMB storage devices that are intermediate and include some level of recovery functionality. Setting up a recovery-level near-line storage can target physical devices, such as stand-alone storage devices, or virtual logic devices, such as online relocation data. No matter what type of device you use, it makes it easier to replicate data online. Online replication can be much faster than traditional copy replication because online replication keeps the data in its original format using snapshots, mirroring, and data replication. In this way, there is no need to transform the data format when the data is recovered, so it is simpler and quicker than the traditional processing method. In addition to providing online recovery, the recovery level extends existing backup protection and archive levels. Multi-level data management provides a higher level of service and provides a comprehensive approach to data management, while also supporting the organization's customization of the specific ways in which data are stored and accessed. Enhanced recovery at all levels for RTO and RPO also offers additional benefits: It improves RPO for data recovery and service levels for service recovery RTO. When a company encounters a virus attack or a database system that hosts critical data faces other security threats, the recovery level uses an online archive for instantaneous recovery, and it can take days to copy a backup file if it is done in a traditional way. RPO and RTO levels are also improved when using online recovery volumes to make backups. Because there is no need to backup from production data, recovery management implements data compression across the enterprise. Recovery level: Efficient, low-cost data management recovery Management provides an efficient and practical method of data management. Consolidation of snapshot management and backup replication ensures continuity and consistency of data, and this can be done through a single strategy in a unified data protection environment. The product data needs to be entered only once, and can then be managed efficiently and with high price by a snapshot. If the backup is created through product information, then the data recovery operation is the same as the traditional approach, but the process of data recovery can still be done efficiently. IT administrators simply select the users who need data recovery or choose the data that needs to be recovered, and the rest of the work is done by a CommVault class of data management software. The responsible editor Zhao Zhaoyi@51cto.com TEL: (010) 68476636-8001 give force (0 votes) to be tempted (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title party (0 Votes) passing (0 Votes) The original text: New approaches to data protection and management--recovery management return to network securityHome
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.