What are some of the things you should consider before deploying continuous data protection (CDP)?
CDP is a total game-changer for backup. Even though the technology has been around for quite some time, it is just starting to catch on. One of the big advantages of CDP is that it eliminates the backup window. Rather than performing a monolithic backup each night, CDP backs up data on a nearly continuous basis throughout the day. Not only does this eliminate the backup window, but it also dramatically shortens the recovery point objective. With a traditional backup that runs once each night, any data that accumulates the next day (before the next backup) can potentially be lost if a failure should occur. With CDP, a failure should never result in the loss of more than a few minutes' worth of data.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Although CDP is a good backup solution for many organizations, there are a number of issues to consider before purchasing a CDP solution. For starters, organizations need to consider application and operating system compatibility. Like any backup technology, CDP can only work if it is compatible with the resources that need protection. Another issue to consider is cost. CDP solutions are disk-based. As such, the organization will likely have to make a significant investment in physical disk storage before deploying a CDP solution. Finally, it is important to make sure that your CDP server does not become a single point of failure. You will need a secondary means of protecting the data that you have backed up. For example, you might make an additional copy of your data to tape or the cloud for disaster recovery.
Dig Deeper on Backup for virtual servers
Related Q&A from Brien Posey
Making room on your SSD, checking running processes in Task Manager and using Performance Monitor are all ways you can improve Windows 10 performance.continue reading
Browser malware can make it impossible to access websites you might need for work. Luckily, there's a simple way IT and end users can get rid of ...continue reading
There are four common execution policies IT administrators can choose from to secure PowerShell against malicious attacks. Figure out which one is ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.