We are seeing some backup software providers offer the ability to run a virtual machine directly from the backup copy without restoring it first. How common is this functionality today? It seems like it has a lot of potential from a disaster recovery standpoint.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Having the ability to mount and run a virtual server directly from the backup without first restoring it is still a relatively new capability. As such, this ability is far from being a standard feature that exists in all backup products.
Having the ability to instantly mount and use a backup copy of a virtual machine could drastically improve disaster recovery times. In order to truly be effective, however, backup replicas need to exist. Otherwise, a backup copy that has been mounted in an emergency situation could become a single point of failure.
Does virtual server backup make backup reporting and backup verification more critical?
In some ways yes, virtualization can complicate backup reporting. This is due primarily to the fact that virtual machines are often temporary in nature and that they can be easily moved from one host to another. As such, the backup set can change from one day to the next, which could potentially make the backup reports a little bit difficult to follow at times. However, if guest-level backups are being performed then backup reporting should work the same way that it does in a physical server environment.
Dig Deeper on Backup for virtual servers
Related Q&A from Brien Posey
There are many factors -- beyond the obvious ones of cost and performance -- that determine whether you should choose a flash storage backup option.continue reading
Booting to Safe Mode isn't the same process in Windows 10 as it was in older versions of the operating system.continue reading
Wi-Fi Sense is a feature in Windows 10 that lets users share network passwords with their contacts. Disable the feature to stop unauthorized users ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.