ABSTRACT

This is the fundamental truth about data protection: backup is dead.

Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it’s been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization.

So what is data protection?

This book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive planning, technology and activities that allow for data continuity. It shows how truly effective data protection comes from a holistic approach considering the entire data lifecycle and all required SLAs. Data protection is neither RAID nor is it continuous availability, replication, snapshots or backups—it is all of them, combined in a considered and measured approach to suit the criticality of the data and meet all the requirements of the business.

The book also discusses how businesses seeking to creatively leverage their IT investments and to drive through cost optimization are increasingly looking at data protection as a mechanism to achieve those goals. In addition to being a type of insurance policy, data protection is becoming an enabler for new processes around data movement and data processing.

This book arms readers with information critical for making decisions on how data can be protected against loss in the cloud, on-premises, or in a mix of the two. It explains the changing face of recovery in a highly virtualized data center and techniques for dealing with big data. Moreover, it presents a model for where data recovery processes can be integrated with IT governance and management in order to achieve the right focus on recoverability across the business.

chapter 1|16 pages

Introduction

chapter 2|10 pages

Contextualizing Data Protection

chapter 3|12 pages

Data Life Cycle

chapter 4|22 pages

Elements of a Protection System

chapter 5|10 pages

IT Governance and Data Protection

chapter 6|16 pages

Monitoring and Reporting

chapter 7|8 pages

Business Continuity

chapter 8|6 pages

Data Discovery

chapter 9|16 pages

Continuous Availability and Replication

chapter 10|16 pages

Snapshots

chapter 11|62 pages

Backup and Recovery

chapter 12|30 pages

The Cloud

chapter 13|20 pages

Deduplication

chapter 14|16 pages

Protecting Virtual Infrastructure

chapter 15|14 pages

Big Data

chapter 16|16 pages

Data Storage Protection

chapter 17|16 pages

Tape

chapter 18|6 pages

Converged Infrastructure

chapter 19|14 pages

Data Protection Service Catalogs

chapter 20|18 pages

Holistic Data Protection Strategies

chapter 21|26 pages

Data Recovery

chapter 22|10 pages

Choosing Protection Infrastructure

chapter 23|4 pages

The Impact of Flash on Data Protection

chapter 24|2 pages

In Closing