What will happen if any of the below occur:
• Physical damage to a storage element (such as a disk) that can result in data loss.
• People make mistakes and unhappy employees or external hackers may breach security and maliciously destroy data.
• Software failures can destroy or lose data and viruses can destroy data, impact data integrity, and halt key operations.
• Physical security breaches can destroy equipment that contains data and applications.
• Natural disasters and other events such as earthquakes, lightning strikes, floods, tornados, hurricanes, accidents, chemical spills, and power grid failures can cause not only the loss of data but also the loss of an entire computer facility.
Offsite data storage is often justified to protect a business from these types of events.
• Government regulations may require certain data to be kept for extended timeframes. Corporations may establish their own extended retention policies for intellectual property to protect them against litigation. The regulations and business requirements that drive data as an archive generally require data to be retained at an offsite location.
With the above and many more of such reasons, having a copy of the data is very important.
That means BACKUP and RECOVERY are the most important parts of an Information Life Cycle (ILM).
It is all about recovery
Just having a copy of the Data is not useful; recovering the data is the objective of backing up the Data.
• Businesses back up their data to enable its recovery in case of potential loss
• Businesses also back up their data to comply with regulatory requirements
Email archiving is a stand-alone IT application that works with an email server to help manage an organization’s email messages. It captures and preserves all email traffic flowing into and out of the email server so it can be accessed quickly at a later date from a centrally managed location. When the need arises to search historical email for internal investigations or for a court-ordered legal discovery, organizations can search thousands of email records in seconds using search tools embedded in the email archiving system. Most Email Archiving applications support archiving of all aspects of a mailbox including public folders, offline PST files, calendars, contacts, notes, and associated metadataand context in addition to the emails. Email archiving can also enable applications for end-user search, data protection, disaster recovery, eDiscovery, and compliance supervision.
Email archiving applications capture email content on magnetic disk storage in one of two methods. One method is to capture email directly from the email application itself. (e.g. Microsoft Exchange, IBM Notes, Novell GroupWise, Sendmail, Imail). The alternative method captures email content during transport via an agent installed at network gateway.
A few reasons why organizations implement email archiving:
• To enable email users who send and receive hundreds of email messages each day to have unlimited mailbox capacity and fingertip access to years’ worth of email
• To offload data from the production email server for increased performance and storage efficiency while preserving access to end users
• To meet litigation, regulatory, and/or business records retention requirements by enabling compliance and legal officers to easily search email stored in the archive
Email archiving solutions improve email server performance and storage efficiency by removing email and attachments from the messaging server based on administrator defined policies. Archived email and attachments remain accessible to end users via the existing email client applications.
In computing , an enterprise storage is the computer storage designed for large-scale, high-technology environments of the modern enterprises. When compared to the consumer storage, it has higher scalability, higher reliability, better fault tolerance, and much higher initial price.
Enterprise storage is a centralized repository for business information that provides common data management and protection, as well as data sharing functions, through connections to numerous (and possibly dissimilar) computer systems. Developed as a solution for the enterprise that deals with heavy workloads of business-critical information, enterprise storage systems are scalable for workloads of up to 300 gigabytes without relying on excessive cabling or the creation of subsystems.
Other important aspects of the enterprise storage system are unlimited connectivity and support for all the different platforms in operation. Enterprise storage involves the use of a storage area network (SAN), rather than a distributed storage system, and includes benefits such as high availability and disaster recovery, data sharing, and efficient, reliable backup and restoration functions, as well as centralized administration and remote support. Through the SAN, multiple paths are created to all data, so that failure of a server never results in a loss of access to critical information.
The four main enterprise storage markets are:
• Online storage – large disk array solutions, minimizing access time to the data, and maximizing reliability;
• Backup – off-line storage for data protection, with a smaller price per byte than online storage, but at a cost of higher average access time; often uses sequential access storage, such as tape libraries ;
• Archiving – technically similar to backup , but its purpose is long-term retention, management, and discovery of fixed-content data to meet regulatory compliance, litigation protection, and storage cost optimization objectives;
• Disaster recovery solutions, used to protect the data from localized disasters , usually being a vital part of broader business continuity plan .
22by7 is the preferred partner for most of the vendors in architecting and implementing Enterprise Storage Solutions.
Replication is a technique for ensuring Business Continuity by making exact copies of data. With replication, data on the replica is identical to the data on the original at the point-in-time that the replica was created.
• Copy a specific file.
• Copy all the data used by a database application.
• Copy all the data in a UNIX Volume Group (including underlying logical volumes, file systems, etc.).
• Copy data on a storage array to a remote storage array.
Replicas can be used to address a number of Business Continuity functions:
• Provide an alternate source for backup to alleviate the impact on production.
• Provide a source for fast recovery to facilitate faster RPO and RTO.
• Decision Support activities such as reporting. For example, a company may have a requirement to generate periodic reports. Running the reports off of the replicas greatly reduces the burden placed on the production volumes. Typically reports would need to be generated once a day or once a week, etc.
• Developing and testing proposed changes to an application or an operating environment.
For example, the application can be run on an alternate server using the replica volumes and any proposed design changes can be tested.
• Data migration
Migration can be as simple as moving applications from one server to the next, or as complicated as migrating entire data centers from one location to another.