What are some of the things you should consider before deploying continuous data protection (CDP)?
CDP is a total game-changer for backup. Even though the technology has been around for quite some time, it is just starting to catch on. One of the big advantages of CDP is that it eliminates the backup window. Rather than performing a monolithic backup each night, CDP backs up data on a nearly continuous basis throughout the day. Not only does this eliminate the backup window, but it also dramatically shortens the recovery point objective. With a traditional backup that runs once each night, any data that accumulates the next day (before the next backup) can potentially be lost if a failure should occur. With CDP, a failure should never result in the loss of more than a few minutes' worth of data.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Although CDP is a good backup solution for many organizations, there are a number of issues to consider before purchasing a CDP solution. For starters, organizations need to consider application and operating system compatibility. Like any backup technology, CDP can only work if it is compatible with the resources that need protection. Another issue to consider is cost. CDP solutions are disk-based. As such, the organization will likely have to make a significant investment in physical disk storage before deploying a CDP solution. Finally, it is important to make sure that your CDP server does not become a single point of failure. You will need a secondary means of protecting the data that you have backed up. For example, you might make an additional copy of your data to tape or the cloud for disaster recovery.
Dig Deeper on Backup for virtual servers
Related Q&A from Brien Posey
While you may want to jump on the data management and protection train, consider first how combining the two in one product will affect your systems ... Continue Reading
Hackers can gain remote access to users' desktops through RDP hijacking. As a result, IT pros must know what they can do to prevent such an attack. Continue Reading
When IT pros are seeking an alternative to Outlook, they should consider the features their users need the most and select an email client that best ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.