Enterprise Backup: What You Need to Know

Frank Ohlhorst
Backup started out as simple concept in the early days of networking. Creating successful backups was just a matter of copying data files from the server over to tape or another storage medium. Today, the rules have changed; the backup process now has to contend with open files, active databases, running applications and many other elements that make performing a backup anything but simple. The emergence of new technologies such as storage and server virtualization, as well as the ever-changing legislative requirements for protecting and archiving data add to the challenge.

Quite often, changes in an organization's IT Infrastructure forces management to consider new backup technologies. Those changes might be as simple as an increase in storage space or as complex as a SAN deployment. With hundreds of backup products on the market, it can be a daunting task to determine which product best fits a particular environment and which features will deliver added value and strategic capabilities.

Defining the environment:
The first step in selecting a backup product is to define the environment in which the product is expected to work. An inventory of software and hardware should be completed and business requirements should be established to create guidelines for selecting a product.
Those guidelines should include questions such as:

  • Are the IT systems required 24/7?
  • Are the IT systems distributed over multiple locations?
  • Is connectivity and access backed by business-continuity methodology or a disaster-recovery environment?
  • Is any type of virtualization technology in use?
  • Will workstations and local PC data be backed up?
  • What types of open files will be encountered during backup?
  • What types of databases are in use?
  • Are mobile users and frequently disconnected endpoints supported by the IT systems?
  • Are there any compliance-driven requirements?
  • Does data need to be archived on a regular basis?
  • How long does data need to be preserved?

The above questions prove to be a good starting point for determining the level of backup technology needed. Most enterprises have complex needs, yet once the task of backing up data is broken down into manageable pieces, it becomes much easier to create effective backups.

Critical features:

As part of the selection process, it is important to identify product features that can improve the backup experience, while still meeting the requirements. Some features worth considering include:

Data deduplication:
A technology that eliminates duplicate files during the backup process. Deduplication can reduce backup size by as much as 90 percent and can be of great benefit to enterprises that use virtualization for servers and desktops. Those systems often contain many duplicate images and virtual hard drives that are duplicated throughout the enterprise.

Bare metal recovery: With bare metal recovery, backups can be restored to dissimilar hardware. That enables administrators to replace failed systems with different hardware and also can be used as part of an upgrade process, where older systems are replaced with new systems.

Image-based backups: Many backup products now apply the concept of imaging to backup systems. The technology works by taking a 'snapshot' of the system's hard drive and then saving a compressed image of its occupied data sectors. Imaging tends to be much faster than file-by-file backup technologies.

Selective backup: Most enterprises do not need to back up every file on every storage device every time. With selective backups, administrators can choose which files or directories to back up.

Quasi file-by-file backups: For purposes of archiving and retrieval of data for discovery purposes, a file-by-file backup storage methodology offers a way to retrieve individual data files. Most imaging products today support the ability to mount an imaged hard drive and then selectively mark files for retrieval.

Open file handling: The product should be able to close or hold open files to guarantee that data is not corrupted during a backup procedure.

Automated script capabilities: Administrators may need to create event-based macros or scripts to set a database or other service into a state that may be required for backup.

Integrated reporting and logs: For businesses that need to fulfill compliance requirements, logs and reports are usually necessary to document backups and the procedures used for backups.

Compression: By compressing backup files, storage requirements can be reduced by as much as 80 percent.

Encryption: To protect backups from unauthorized access. Strong encryption is often a compliance requirement and it also protects businesses from data theft.

Management console: To allow execution, scheduling and monitoring of backup tasks.

Multiple agents: Agents are used to run backup jobs on various endpoints. The product selected should offer agents for all devices to be backed up.

Agnostic device support: The product should be able to work with any storage device used in the enterprise, including tape, virtual tape, optical media, hard drives, and removable media.

Scheduling: The product should support multiple schedules and should be able to run independent backups concurrently to reduce the time needed to backup and automate the backup procedure as much as possible.

While the above features are critical for most environments, some capabilities may not be needed in every environment. For example, a business that does not require 24/7 access may not need open file support or advanced scripting - while, other businesses may require a specialized feature that is not included in the above list, such as virtual machine synchronization or remote management agents.

The key to success is to match the features to the business requirements and also plan for future needs. By mapping out the existing infrastructure and applications, most IT administrators should be able to quickly develop a required features list and narrow down the product-selection process.

Add Comment      Leave a comment on this blog post
Oct 24, 2010 6:10 AM Hard Drive Recovery Hard Drive Recovery  says:
This is a really good read for me. Must agree that you are one of the coolest blogger I ever saw. Thanks for posting this useful information. This was just what I was on looking for. I'll come back to this blog for sure! I bookmarked this blog a while ago because of the useful content and I am never being disappointed. Keep up the good work .Thanks Reply
Oct 24, 2010 6:10 AM Anonymous Anonymous  says:
It's a great pleasure reading that you posted here.It has a full of information, which I am looking for and I love to post a comment that "The content of your post is awesome". Great work Hard Drive Recovery Reply
Dec 9, 2010 8:12 AM Ping K15 Irons Ping K15 Irons  says:
What are your thoughts about this news about 2010 winners? Reply
Mar 4, 2011 7:03 PM man and van hendon man and van hendon  says:
It's a great pleasure reading that you posted here. I really like it. Thank you Reply
Mar 4, 2011 7:03 PM royal wedding royal wedding  says:
I love read your posts. Thank you. Well done Reply
Jul 8, 2011 10:07 AM Building Building  says:
Hello, it's a great pleasure reading that you posted here. I really like it. Thank you. Chris Reply
Aug 13, 2011 11:08 PM awesome tattoos awesome tattoos  says:
I like this post becasue you have express in positive way.This was just what I was on looking for. I'll come back to this blog for sure! I bookmarked this blog a while ago because of the useful content and I am never being disappointed. Keep up the good work .Thanks Reply
Aug 14, 2011 4:08 AM orkut scraps orkut scraps  says:
Great post. It has a full of information which i am looking for. I really like it. Thank you Reply
Oct 29, 2011 5:10 PM bellasecret bellasecret  says:
I love read your posts. Thank you. Well done Reply
Oct 31, 2011 3:10 PM  router router  says:
I am really enjoyed for this broadside. Its a respectable message. It assist me really often to settle whatever problems. Its opportunity are so marvelous and employed communication so fast. I cerebrate it may be forbear all of you. Thanks. Reply
Feb 14, 2012 12:02 PM dongtai dongtai  says:
Nice article but let you know about the recovery software's in the market which provide the facility to recover any type of data either in case of physical or logical damage,so we can say that data loss is now point of no worry,but backup of data is the need of all time and we can not say that data recovery software's reduce. deleted file recovery software Reply
Mar 7, 2012 7:03 AM Rebecca Rebecca  says:
Excellent blog post! I am agree with the writer's point of view. The failure of details often takes an individual to some feeling of discontent. So that you can solve this issue, the specialists have launched many info restoration remedies. If a removal of data issue is occurred, person has to know which software or software program to use in order to manage this scenario of computer data loss. best file recovery Reply
Apr 7, 2012 4:04 AM Desert Ridge Phoenix Homes Desert Ridge Phoenix Homes  says:
A data repository model can be used to provide structure to the storage. In the modern era of computing there are many different types of data storage devices that are useful for making backups. There are also many different ways in which these devices can be arranged to provide geographic redundancy, data security, and portability. Thanks. Reply

Post a comment





(Maximum characters: 1200). You have 1200 characters left.




Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.