Using Cloud Services For Backups

Using Cloud Services For Backups

Cloud Services For Backups

Introduction

With the explosive growth in this as a service, that as a service, and clouding everything in sight, it comes as no surprise that cloud backup services are starting to crop up everywhere. And we’re not just talking about some of the excellent services targeted at consumers like Dropbox, box.net, and iCloud, we’re talking about enterprise grade services.

If you are one of the growing number of administrators who is looking at cloud backup services to augment or replace your tape backup or disk to disk backup, you’re not alone. To help you with your quest, here’s some of the things you should consider when evaluating solutions.

Bandwidth

This is going to prove to be the most important consideration you have when using cloud backup services. You won’t be moving data across the LAN to your tape backup system, or copying data disk to disk over dedicated service buses, you will be backing all your data up to the cloud, and it’s your Internet connection you’ll be using. Carefully evaluate your circuit, traffic patterns, and whether or not you need to increase your bandwidth.

Backup times

How long will it take you to back up your data over the Internet to your cloud backup service provider? Can you complete your backups during the available windows, or will you be in a constant state of backup, replicating deltas or moving from machine to machine?

Restore times

Of course, the reason we back up is so that we can restore. With all your data in the cloud, consider how long it will take to restore your data in the event you need to. Rolling backups may make backups more manageable, but in the event of a disaster, you will want to restore everything at once, which just won’t be possible. Consider your recovery time objectives and make sure they can be met.

Connectivity from the DR site

And in the event of a disaster, make sure you have at least as much bandwidth in your DR site as you do in your production environment. Many companies get smaller circuits, opting to accept reduced performance during disaster to save money, but you need that pipe to perform your restores. A burstable circuit with a high maximum, but a low committed rate, may be a cost effective solution.

Staging appliances

Consider whether you want to run your backups from hosts directly to the cloud services provider, or if you want to use a service that takes advantage of staging appliances. These have advantages that can include better compression, adaptive traffic patterns, and local storage of your most recent data, but will also need to be replicated in your DR site, which could add significant costs, and data that is staged but not yet uploaded could be lost in the event of a complete site disaster.

Conclusion

Using cloud backup services is a great way to move your backup and restore services offsite, to save money, and to provide flexibility, but this is nothing like your tape backup system. Assumptions about RTO, windows, and provisions for DR all must be reexamined, and while you may save money by getting rid of tapes and offsite storage, you may spend that much or more on bandwidth. Carefully consider your options and make certain you test your backups and restores to confirm they meet your time requirements before you scrap those tape drives.

By Casper Manes

Casper Manes blogs for ITChannelinsight.com, a site for MSPs and Channel partners.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…