kras99 - Fotolia
A number of vendors have copy data management offerings, and each has its own philosophy about how the technology should be used. That said, copy data management is more about storage efficiency than data protection.
Generally speaking, redundancy accounts for a large percentage of an organization's storage cost. According to some estimates, the average enterprise creates eight to 10 copies of every production data source. These redundant copies are used for a wide variety of purposes, including dev/test, support, end-user training and reporting. If these estimates are true, a relatively modest 100 GB database could ultimately account for up to a terabyte of storage consumption. When you factor in the number of production data sources that exist within the average enterprise environment, you can begin to see how quickly redundant data can consume the available storage.
Copy data management allows everyone to work from a common copy of a data source. Rather than a development team making a full-blown copy of a production database, the copy data management software might instead use snapshot technology to provide the development team with an isolated development environment that perfectly mimics the production environment. In other words, the dev team is using the production database, but in a way that protects the integrity of the production data.
Although copy data management could conceivably be used to create data recovery points, the software never creates a true backup copy of the data source. Any redundancy exists only at the storage level. With the proper level of redundancy, copy data management might be able to act as a backup replacement, but it is not a good solution for organizations that require an offline (tape) copy of their data.
Access our handbook on backup and copy data management
Just what is copy data management technology?
Dig Deeper on Backup and recovery software
Related Q&A from Brien Posey
Cloud security is a top concern for IT. As a result, keeping cloud backups secure should be a priority. Here are three straightforward guidelines to ... Continue Reading
Your upgrade method, workload and more affect whether the minimum hardware requirements for Windows 10 are really enough. Continue Reading
Rather than handling risk management and mitigation within your organization, outsourcing these important processes to a third party comes with ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.