Download - Effective Strategies for Backup, Recovsdgery and Archiving

Transcript
  • 7/28/2019 Effective Strategies for Backup, Recovsdgery and Archiving

    1/14

  • 7/28/2019 Effective Strategies for Backup, Recovsdgery and Archiving

    2/14

  • 7/28/2019 Effective Strategies for Backup, Recovsdgery and Archiving

    3/14

    Contents

    Executive summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

    Backup and archivingwhat, and why? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

    BackupsITs time machine. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

    Archivesmore than just history. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

    Backup and archiving: new costs, challenges, and risks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

    Storage demands of the IT-centric business . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

    Protection in a world of risk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

    A changing landscape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

    Backup and archiving practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

    Backup technology and management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

    Archivingtechnical and legal challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

    Risks from informal content collections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

    Special requirements of legal discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

    Classification and search. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

    Legal hold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

    Journalinghow much, and when? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

    Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

    Steps toward the future. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

    About Symantec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

    White Paper: Backup and Recovery

    Effective Strategies for Backup, Archiving,

    and Recovery

  • 7/28/2019 Effective Strategies for Backup, Recovsdgery and Archiving

    4/14

    Effective Strategies for Backup, Archiving, and Recovery

    4

    Executive summary

    Backups protect active information for use; archives store information to improve the efficiency

    of messaging applications and storage infrastructure, and to meet legal and policy requirements.

    Too often overlooked, archiving can help organizations cut backup time and storage dramatically;

    eliminate expensive, time-wasting, risky employee email collections; and accelerate search and

    legal discovery.

    Pressures on backup processes have grown with the volume of information that needs

    protection. New storage technologies add management complexity. Centralizing backup storage

    and management across geographies and technologies offers end-to-end visibility across backup

    environments and supports cost-effective, future-ready strategies such as tiered storage.

    Archiving faces growth not only in the volume and variety of unstructured information, but

    also in the urgency of demands to find and produce records quickly for employees, regulators, and

    courts. Choices of what, where, and how to archive have major impact on storage costs.

    As storage volume continues to grow, the move from tape to disk, multimedia email and

    collaboration content, and increased regulation and litigation will demand planned, balanced,

    effective backup and archiving processes.

  • 7/28/2019 Effective Strategies for Backup, Recovsdgery and Archiving

    5/14

    5

    Effective Strategies for Backup, Archiving, and Recovery

    Backup and archivingwhat, and why?

    Backup1 processes are mature and near-universal. Archiving is not as well understood or widely

    practiced. Outsiders often confuse it with backup, and even IT professionals see a lot of overlap:

    Both are data management disciplines that use similar resources and present similar challenges.

    But despite similarities, archiving differs from backup in purpose, context, and applications.

    Important today, these differences will grow dramatically along with the volume and sensitivity

    of information, and with legal requirements to produce it on demand. Organizations that

    complement their backup solutions with archiving help themselves to greater efficiency at lower

    cost, and to more effective management of IT risk.

    This paper outlines backup and archiving for IT and business readers; points out their

    differences; and shows why both are important to balance data protection, compliance risk, and

    efficiency.

    BackupsITs time machine

    Backups exist to protect active information and quickly restore it to use after corruption or loss

    due to an error, mishap, or disaster. As an organization's time machine, backups restore a single

    document, a server, or an entire organization to a point in time before data became corrupted

    or lost. Frequent point-in-time copies minimize irrecoverable losses; continuous data protection(CDP) technologies eliminate them. Multiple copies of backups across geographies protect

    information against disasters that affect an entire site or region.

    Backup metrics focus on weighing recovery quality (recovery point objective, or RPO) and

    speed (recovery time objective, or RTO) against the production time lost to backup processes (the

    backup window), and of course cost. Backup infrastructure is easy to cost-justify, because poor

    processes place an organization at the mercy of errors and events that managers can and should

    anticipate.

  • 7/28/2019 Effective Strategies for Backup, Recovsdgery and Archiving

    6/14

    Effective Strategies for Backup, Archiving, and Recovery

    6

    Archivesmore than just history

    Information expires: An out of office email reply is useful for a few hours; a product brochure for

    a year or two. But the end of its useful life cant always be predictedand laws, regulations, or

    corporate policies may mandate that it be kept long afterwards. Retaining all this information in

    multiple point-in-time backups on high-priority storage with hair-trigger recovery capability would

    be extravagantly wasteful and risky. End-of-life information should be archived.

    Archives document the past, proving compliance with tax, securities, and other government

    regulations and with an organization's own governance policies. But as organizations enforce

    more aggressive sunset rules for unstructured information, archives have assumed an even more

    important role: to improve efficiency of applications and of backup and storage processes.

    The value of archiving stems from its built-in efficiency. Backups make multiple versions

    one for each point in time, and several across geographies. An archive, in contrast, contains

    one instance of each document. Archives keep records available to employees, regulators, and

    courts as required, with expiration policies set to as long as necessarybut no longer. Metrics for

    archiving focus on its strengths: efficiency and cost-effectiveness.

    Yet compared to backup, archiving can be a tough sell internally, because:

    Business managers who know they need backups may be tempted to use them as though they

    were archives

    Unlike backup, archiving offers few compelling bet the company scenarios

    Recovery and discovery requirements are so unpredictable and variable that it is difficult to

    quantify how much archiving reduces compliance risk

    Backup and archiving at a glance

    Backup Archiving

    Purpose Recover useful information 1. Move information to more efficient tier

    2. Enforce retention for governance,

    compliance, eDiscovery, etc.

    Point-in-time copies Many, plus CDP for highly time-

    sensitive information

    Single global instance

    Geographic copies Yes, to recover from site or regional

    disasters

    Yes, to protect the archive

    Metrics RPO and RTO against backup window

    and costs

    Time and cost to maintain

    Expiration policy No Strict enforcement of retention and expiry

    policies

    Risks Loss of business Increased storage costs, legal/regulatory

    exposure, loss of productivity

  • 7/28/2019 Effective Strategies for Backup, Recovsdgery and Archiving

    7/14

    7

    Effective Strategies for Backup, Archiving, and Recovery

    Backup and archiving: new costs, challenges, and risks

    Long-term storage trends and rising risks in IT and business environments are combining to drive

    innovations in technology and processes for both backup and archiving.

    Storage demands of the IT-centric business

    Now more than ever, business runs on IT. In the United States alone, 2006 IT investments totaled

    almost US$1.2 trillion, a full 29 percent of overall private-sector capital investment.2 The storage

    component of IT investments is growing at a disproportionate rate: Disk-based storage capacity

    grew 52 percent in 2006.3 None of these numbers will surprise IT professionals who have seen

    their own organizations expand IT to cover more business applications every year as well as

    vigorous year-over-year growth in storagefirst for email text, then graphics, then audio, and now

    video files that grow steadily in resolution and length.

    Protecting all of this information requires careful planning and management. The wrong

    processes can burden a thousand laptops with huge files attached to an all employees email,

    add a thousand copies to the next backup run, and allow multiple versions to spring up in formal

    and informal archives.

    Protection in a world of riskBackup and archiving affect risk as well as cost. Organizations need to consider not only the IT

    risks these processes mitigate, but also those they may introduce:

    Security riskthat processes will allow unencrypted information to be accessed, manipulated,

    or used by unauthorized parties

    Availability riskthat errors, disasters, backup windows, or restrictive security will keep

    information from those with a legitimate business use

    Performance riskthat poorly designed or overloaded systems, networks, and storage will

    impede the flow of information, and the pace of business

    Compliance riskthat inadequate processes will expose an organization to adverse rulings andjudgments or to excessive costs during legal discovery

  • 7/28/2019 Effective Strategies for Backup, Recovsdgery and Archiving

    8/14

    Effective Strategies for Backup, Archiving, and Recovery

    8

    Financial risk managers would add the costs of IT infrastructure to cope with the rising tide

    of information and the advanced technology, expertise, and processes needed to keep it under

    control.

    A changing landscape

    Changing storage and risk environments are the main drivers of backup and archiving, but not the

    only ones: Here are just a few other trends with direct impact on backup and archiving:

    Email is now many employees primary information repository, and desktop search capabilitiesare reducing their incentive to manage files effectively.

    Regulators are demanding longer retention of more documentsand their demands during

    discovery are also increasing.

    Backup administrators are seeing increased pressure on their backup windows and restore

    targets.

    Storage infrastructure is growing more complex, solving capacity and performance problems

    but raising management challenges.

    Backup and archiving processes must address these issues using the most cost-effective

    technology, without introducing unacceptable risks or compromising business effectiveness. Thenext section outlines a set of practices to help administrators achieve the right balance.

    Backup and archiving practices

    Backup is the more established of the two processes. Most organizations will react first to

    pressures that compromise its effectiveness: shrinking backup windows and more aggressive

    restore schedules for data, applications, and systems. Technology and management solutions can

    help meet these challengesbut administrators should not overlook the dramatic improvements

    in backup performance available by using archiving to offload much of the backup burden.

    Backup technology and management

    Not too long ago, backup technology choices were simpler: Select the fastest storage you can

    afford for your most time-sensitive, mission-critical information, and use tape for everything else.

    But simple choices sometimes mean difficult compromises: Recovery time objectives for most

    information fall in the gap between seconds and weeks. New additions to the storage toolkit fill

  • 7/28/2019 Effective Strategies for Backup, Recovsdgery and Archiving

    9/14

    9

    Effective Strategies for Backup, Archiving, and Recovery

    in between these extremes, with intermediate technologies that are much cheaper than storage

    area networks and that offer much higher performance than tape. These new technologies

    help organizations optimize their backup environments, balancing performance with cost for

    information at every level of urgency.

    New storage technologies can provide instant backup of mission-critical, time-sensitive

    information. At the other end of the spectrum, disk storage that is plug-compatible with tape

    drives offers dramatic performance improvements using established processes.

    Managing all these technologies can be a nightmare, especially when information priorities

    and organizational goals change over time. Backup solutions that offer visibility and control over

    all classes of storage let administrators assign information to backup storage based on its urgency

    and valueand move it easily when priorities change.

    Centralizing storage management across geographically distributed data centers and remote

    offices introduces further efficiencies by consolidating administrative activities that would

    otherwise have to be accomplished by local, often nonspecialist personnel.

    Archivingtechnical and legal challenges

    The technical challenges of archiving are driven by the volume and variety of unstructured

    information that organizations must retain to meet corporate governance standards, industryregulations, and legal obligations:

    Email volume continues to grow, even as unified messaging technologies promise to add

    voicemail, pictures, and video.

    Most employees at medium to large businesses already use instant messaging (IM)

    technologies,4 and more are on the way.5

    Messaging and collaboration tools such as Microsoft SharePoint, the constant churn

    of document formats, and end users attempts to retain control of files and messages all

    complicate the environment.

    The result is large data repositories that are spread out across the organization. These are

    nearly impossible to consolidate and search, and the most common attempts to manage them

    email quotas and aggressive expiration policiestrigger risky informal workarounds.

  • 7/28/2019 Effective Strategies for Backup, Recovsdgery and Archiving

    10/14

    Effective Strategies for Backup, Archiving, and Recovery

    10

    Risks from informal content collections

    Archives replace the sprawling, informal collections of unstructured content that employees

    create to avoid losing their email to an aggressive sunset policy.

    These collections (Microsoft Exchange PST files, for example) clog terabytes of storage on

    desktop hard drives and shared storage, spilling out onto portable media, Web mail services, and

    home PCs. They are difficult to search, notoriously prone to corruption, a burden on backup time

    and storage, and wasteful of employees time. Worse, they are all potential targets for legal or

    regulatory discovery. Legal discovery from unmanaged records such as these risks smoking gun

    revelations that can prove devastating in courtor in the media.

    Informal collections add significant cost and risk, leading many organizations to review their

    backup processes and add managed, disciplined, policy-driven archiving to their data protection

    arsenal.

    Special requirements of legal discovery

    Stringent and escalating legal requirements govern the retention and discovery of archived

    information. At a minimum, an organizations retention policies must be unambiguous,

    documented, and enforced. U.S. Federal Rules for Civil Procedure; the governance and reporting

    requirements of Sarbanes-Oxley, IRS, and the SEC; and other regulations demonstrate whyorganizations need to establish what information they will keep, and for how long.

    The drop everything urgency of legal discovery can disrupt IT operations and pull technical

    specialists away from their primary responsibilities into unfamiliar and uncomfortable roles.

    But the situation is improving: Organizations such as the Electronic Discovery Reference Model

    (EDRM) Project have created frameworks for electronic legal discovery that help balance legal

    requirements with the interests and capabilities of inside and outside counsel, IT, internal staff,

    specialist legal discovery firms, and solution providers.

    Classification and search

    Effective support for electronic discovery requires classification and intelligent archiving

    of unstructured information over a broad range of current and obsolete file types. Search

    capabilities should accommodate end-user searches for preliminary information screening, and be

    capable of integration with established legal discovery tools so that outside discovery specialists

    will not need to rely on IT staff to do their work.

  • 7/28/2019 Effective Strategies for Backup, Recovsdgery and Archiving

    11/14

    11

    Effective Strategies for Backup, Archiving, and Recovery

    Legal hold

    Legal discovery often involves holds to protect specified documents or document classes from

    destruction or tampering. The standard approach is to copy everything to a secure file, but this is

    far from ideal: First, it doubles not only the storage volume required for the archive, but also with

    all associated costs. Second, it opens the door for the new copy to be reconciled with the active

    archive and any information retained on desktops. Discrepancies demand explanations and can

    be embarrassing in the media or in court. A much more attractive alternative is to hold documents

    in place and preserve the integrity of specified files in the archive, eliminating costly copies and a

    risky duplication process.

    Journalinghow much, and when?

    Mailbox-level archiving, consistently enforced, is a legally defensible component of a disciplined,

    reasonable retention policy. Journalingrecording of all email to and from an individual or list of

    individualsmay be necessary for financial services firms operating under SEC Rule 17A-4 and

    NASD 3110-1, and for communications involving certain corporate officers and legal counsel. But

    few organizations will need to journal all employee communications.

    When journaling is requiredeither for the above reasons or as proof of completeness and

    chain of custodyit is important to do it correctly: as an archive process, not an email process.Email journalsstored in a single mailboxquickly grow very large and ripple through point-

    in-time and geographic backups, consuming backup windows and storage space with every new

    copy. Advanced archiving solutions sweep journal contents directly into the archive. This offloads

    the burden from the email application and backup processes, and it provides cost-effective single-

    instance storage, indexed for quick retrieval. The increased value of archives, in comparison to

    backups, for unstructured content is more compelling for email journals than for any other use.

  • 7/28/2019 Effective Strategies for Backup, Recovsdgery and Archiving

    12/14

    Effective Strategies for Backup, Archiving, and Recovery

    12

    Conclusions

    Confusing backup with archiving processes, organizations sometimes use backups to store and

    recover historical records. But making multiple-instance geographic and point-in-time backups

    of non-current information cuts into backup and recovery windowsand wastes vast amounts of

    storage. Worse, it increases costs, disruption, and delay during legal discovery, and it introduces

    unnecessary risks when multiple, incompatible records must be reconciled or explained in court.

    (See the sidebar "Backups are not archives" for details.)

    Archiving is the correct tool for protecting, organizing, and searching unstructured

    information: It provides an organized, searchable store of single-instance records, with

    capabilities to meet the specialized, absolute demands of legal discovery. De-duplication,

    integrated storage management, and self-service search offload work from backup systems and

    messaging and collaboration applications, reduce storage costs, and satisfy end-user expectations

    for accessibility of email messages and files.

    Archives prove their worth with the first legal hold or discovery requirement. But even

    without any such requirement, they pay back quickly by simplifying and reducing the storage and

    management burden on backup processes.

    Backups are not archives

    Backup processes are superficially similar

    to archiving. Because a great deal of time,

    effort, and infrastructure go into backups,

    it is tempting to use the same processes

    and infrastructure for archiving. But it is a

    bad idea.

    This approach misses several key differences

    between backups and archives, and in the

    long run can be extremely costly. Here iswhy:

    EfficiencyAll copies of archived

    information are removed from primary

    and backup storage, improving its

    performance.

    CapacityArchives are compressed and

    de-duplicated, down to a single instance in

    some cases, for dramatic capacity gains.

    ManagementRegulatory compliance and

    corporate compliance demand different

    management processes for archives and

    backups.

    ProtectionNoncompliant extra copies

    of documents raise the costs of legal

    discovery and may also increase legal

    risks.

    Backup is the wrong process for archiving,

    especially when the time comes to locate

    and produce a record for legal discovery.

    Attempts to adapt backup processes for

    archiving are also false economy; a properly

    managed archive can cut costs of backup

    and recovery even as it makes them moreefficient.

  • 7/28/2019 Effective Strategies for Backup, Recovsdgery and Archiving

    13/14

    13

    Effective Strategies for Backup, Archiving, and Recovery

    Symantec products for backup, recovery,

    and archiving

    Symantec Enterprise Vault is an intelligent

    software-based archiving platform that stores,

    manages, and supports discovery of corporate

    data from email, filer server, instant messaging

    content management, and collaboration

    environments. Enterprise Vault uses intelligent

    classification engines to manage data,

    improving a companys ability to retain and

    protect corporate information while reducingstorage costs and simplifying management.

    Veritas NetBackup delivers unified disk-

    based management of data protection,

    archiving, and recovery that scales to protect

    the largest UNIX, Windows, Linux, and

    NetWare environments. With complete

    protection for remote offices and data

    centers, NetBackup offers a single console

    for management of all backup and recovery

    operations. The centralized management

    platform includes integrated data archiving,

    migration, and retention to help meet

    governance and compliance requirements.

    Advanced backup and recovery reporting

    supports service-level management for all

    protected data.

    Symantec Backup Exec is the gold standard

    in Windows data recovery, delivering proven,

    efficient, certified disk-to-disk-to-tape

    backup and recovery for Windows-centric

    environments. Continuous data protection

    for Microsoft Exchange, SQL, file servers,

    and workstations cuts backup windows

    dramatically, and patent-pending granular

    recovery for Exchange, SharePoint Server,

    and Active Directory easily restores individual

    emails, documents and user preferences in

    seconds, from the same backup that protects

    the full database. New integration of Symantec

    Endpoint Protection, Enterprise Vault, Backup

    Exec System Recovery, and Symantec Protection

    Network Centers improves scalability and

    simplifies security, backup, and archiving of

    business-critical data.

    1

    Throughout this paper, backup is used to indicate both backup and associated recovery processes, and archiving includes search and discovery.

    2

    "National Economic Accounts: Private Fixed Investment in Equipment and Software by Type." Washington, DC: Bureau of Economic Analysis,Table 5.5.5U. November 2007.

    3

    Robert Amatruda. "Worldwide Tape Library 20072011 Forecast and Analysis: Avenue of Growth." Framingham, MA:International Data Corporation. August 2007.

    4

    Vangie Beal. The Year in Instant Messaging, Instant Messaging Planet. Darien, CT: Jupitermedia Corporation. December 21, 2006.http://www.instantmessagingplanet.com/enterprise/article.php/3650381

    5

    Paul Korzeniowski. Time to Guard Your Instant Messaging Traffic, bMighty.com. Manhasset, NY: CMP Media LLC. September 6, 2007.http://www.bmighty.com/blog/main/archives/2007/09/time_to_guard_y.html

    Steps toward the future

    Businesses understand the value of backup. Acknowledgingand acting onthe business value

    of archiving is the first and most important step they can make toward better data protection and

    storage management. Implementation of future-ready data-protection and storage-management

    solutions should take account of trends that are already underway:

    Prepare for the move to diskThe improving economics of disk storage make the transition

    just a matter of time. The advantages of disk over tape for rapid consolidation, de-duplication,

    visibility, and management are profound. Dont lock your organization out with a backward-facing solution.

    Prepare for the rise of unstructured contentCompared with highly structured mission-

    critical transaction databases, email archives and files look like a vast heap. But dont

    underestimate that unstructured content: It contains your organizations intellectual property,

    business relationships, plans, and innovations. Advanced archiving solutions can help you

    manage itworking with your end users, not against them.

    Prepare for e-discoveryLitigation and regulation are facts of business life. Reasonable

    retention policies backed up by firm but employee-friendly archiving and expiration processes

    not only cut costs and improve outcomes in discovery; they also offload burdens from backup

    processes and storage infrastructure, for improved IT service levels at lower cost.

  • 7/28/2019 Effective Strategies for Backup, Recovsdgery and Archiving

    14/14

    For specific country offices and

    contact numbers, please visit

    our Web site. For product

    information in the U.S., call

    toll-free 1 (800) 745 6054.

    Symantec Corporation

    World Headquarters

    20330 Stevens Creek Boulevard

    Cupertino, CA 95014 USA

    +1 (408) 517 8000

    1 (800) 721 3934

    www.symantec.com

    Copyright 2008 Symantec Corporation. All rightsreserved. Symantec, the Symantec Logo, Veritas, Backup

    Exec, Endpoint Protection, Enterprise Vault, NetBackup,

    and Symantec Protection Network are trademarks or

    registered trademarks of Symantec Corporation or its

    affiliates in the U.S. and other countries. Microsoft,

    Windows, and SharePoint are either registered trade-

    marks or trademarks of Microsoft, Inc. in the United

    States and/or other countries. Other names may be

    trademarks of their respective owners.

    Printed in the U.S.A.

    04/08 13600558

    About Symantec

    Symantec is a global leader in

    providing security, storage, and systems

    management solutions to help business

    and consumers secure and manage

    their information. Headquartered

    in Cupertino, Calif., Symantec has

    operations in more than 40 countries.

    More information is available at

    www.symantec.com.