The expert guide to enterprise backup software
A comprehensive collection of articles, videos and more, hand-picked by our editors
Flat backup has recently begun to gain popularity, although the concept has existed for quite some time. Here are three major misconceptions regarding how a flat backup works.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
1. A flat backup can be used with all types of snapshots. Flat backups are based around the use of storage snapshots. Although hypervisor snapshots function in a manner similar to storage snapshots, they won't work for flat backups. Flat backups are intended specifically for use with storage snapshots.
2. A flat backup can protect all of an organization's resources. As previously mentioned, a flat backup is based around the use of storage snapshots. Consequently, flat backups can only protect those resources for which storage snapshots are created. Furthermore, flat backups are vendor proprietary, so not every storage vendor supports their use. Those vendors that support the technology only allow them for specific storage products. So a flat backup will not typically be an option for organizations that use heterogeneous storage hardware.
3. A flat backup provides continuous data protection. In reality, a flat backup is subject to the rate at which snapshots can be created and replicated. While most continuous data protection offerings do not truly provide continuous protection -- they actually perform very frequent, scheduled backups -- they tend to allow for more frequent data protection than a flat backup. The primary advantage to a flat backup offering isn't the frequency of its protection, but its low cost and simplicity.
Learn how snapshots can improve data protection
Various ways to create a data snapshot
Integration of snapshots and backup benefits organizations
Related Q&A from Brien Posey
Health IT expert Brien Posey offers some examples of multifactor authentication as a way for hospitals to further safeguard access to protected ...continue reading
IT can take a few steps to make the move to Windows 10 easier on users, including considering an in-place upgrade and holding off on any other major ...continue reading
When trying to get to the bottom of virtual desktop problems, IT should turn to root cause analysis tools from vendors such as ControlUp and Lakeside...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.