Select Page

Rapid recovery of large data sets with flash array backup and DR appliance

Organizations of any size today must be able to provide seamless digital experiences and data availability to their users, customers and partners. User confidence only happens through business continuity and hyper availability of data which is why the recoverability of critical business applications and technology is so important.
Data testing and recoverability is a huge problem that many businesses do not even realize they have. The risks of having data that is backed up but not recoverable can be divided into three types:

  1. Operational risks. If a company cannot recover from a system failure, it is not able to serve its customers, causing a loss of revenue and clients loyalty. The risk increases by not responding in time to the needs of users like business application developers and business users, which leads to a delay of response to key customers’ needs and wants.
  2. Risk to fall out of compliance. If a company’s backups are corrupt, it could potentially be fined or get bad press by falling out of compliance within the industry.
  3. The risk of losing speed and agility to continuously innovate and grow. This can lead to a decrease in a customer’s ability to successfully compete as well as a negative impact on businesses in terms of creating exceptional user experience.

All these risks impact brand integrity and illustrate that organizations must reconsider their approach to data testing and recovery capabilities, aligning and matching them more closely with overall business strategy.

Requirement of a data management solution

Without a data management solution that enables automated backup and disaster recovery, organizations have to take backups and test them manually. This could be time-consuming as IT staff have to travel and pull out tapes and test recoverability of applications for remote offices which is quit costly and incurs high risk of human error.

A purpose built backup and disaster recovery cloud service provider first discovers your hidden recoverability and backup testing needs. This makes it easier to suggest a solution that suits IT administrators’ needs and an easy-to-use product for backup and recovery.

Recoverability performed with data management solution brings significant improvement of RTO and RPO which will save you money, improve your IT staff productivity as you reduce time spent on backup and recovery operations, and lower your risks and improve reliability.

Data management with StoneFly and Veeam

StoneFly and Veeam are delivering innovation to customers in the storage and the backup industries, that is simplifying their operations, increasing their availability and driving net new agility to the organizations. Hundred of customers are protected with the StoneFly Cloud Backup repository for Veeam in Microsoft Azure and Amazon AWS. StoneFly developed the cloud backup repository software specifically for Veeam customers looking to extend their on-premise backup and disaster recovery to the cloud, and supports Microsoft Azure Commercial and Government cloud as well as Amazon AWS cloud. The cloud backup repository software is deployed in the cloud and is used as an offsite storage target by Veeam customers for backup and disaster recovery. The benefits that are available with both of these technologies is accelerated backup windows, rapid restores particularly of large volumes and large data sets, and a new set of agilities that are available.

Flash array backup and DR appliance for large data sets

The purpose built Veeam Enterprise Backup & Replication appliance with flash storage can be used as a flash based data repository for on-premise backup and disaster recovery. The universal API leverages the flash array snapshot capabilities to offload a large portion of the processing time that’s required with the traditional backup of a virtual infrastructure (private cloud). It eliminates the performance penalty that is associated with the traditional backup while reducing the backup windows’ time significantly. The flash storage array has a significant bandwidth capability that you cannot find with traditional storage arrays. Large-scale customers can complete their backup windows much faster, and eliminate the contention for trying to write to the backup media.

The secondary benefit is rapid recovery, as you live with backups every day and restores are where you save your customers bacon. Through Veeam explorer for array-based snapshots, customers can leverage the local recovery points on the production flash array as a means to restore files, disks, entire virtual machines or applications in a very quick time through a very simple and an intuitive GUI. For customers who have larger data sets or maybe have lost a production storage and they want to rely on the flash storage Veeam Enterprise Backup and Replication Appliance as a data repository, the performance of the flash storage allows them to start a large number of virtual machines or large applications simultaneously and bring those services back online immediately. Then they can move that data set from the backup environment to the recovery environment non-disruptively.

Having the flash array as part of the rapid recovery is a focus for customers who are worried about their service level agreements (SLA). In environments where the production storage array is not available and you have to recover from the secondary copy of data, the flash array is for those large-scale use cases.

The third area of benefit is one that maybe isn’t as obvious to IT staff focusing on business continuance and availability. It is the integration with the Veeam datalabs. Veeam datalabs allow customers to make an on-demand private cloud environment that is completely encapsulated and walled off from the production environment and allows customers to accelerate test and dev.

When Veeam datalabs is combined with snapshots on the flash array it:

  • Makes the storage immediately available,
  • Provides all the flash performance that is equal to a production environment,
  • Leverages capabilities like the automatic quality of service that is in the flash array that ensures the production workload won’t be stepped on by the tests and dev environments.

Again, there are lots of synergies with our technologies. It is a combination that brings a lot of mutual benefits to the StoneFly and Veeam customers. Get in touch with us and learn more about our backup and disaster recovery solutions and how they can meet your specific company needs, give us a call at (510) 265 1616 or send us an email at [email protected].

 

Conti Ransomware: In-Depth Technical Breakdown

Conti Ransomware: In-Depth Technical Breakdown

Conti ransomware has earned notoriety, notably for its involvement in the Costa Rican government hack. Operating as a ransomware-as-a-service (RaaS) group, Conti specializes in infiltrating networks, encrypting crucial data, and extorting exorbitant sums of money. In...

Supply Chain Attack: The Achilles’ Heel of Enterprise Security

Supply Chain Attack: The Achilles’ Heel of Enterprise Security

Supply chain attacks have emerged as a formidable threat vector in the landscape of cybercrime, posing significant risks to enterprises of all sizes and industries. Among the various tactics employed by threat actors, ransomware attacks leveraging supply chain...

How to Set Up S3 Object Storage for Veeam Data Platform

How to Set Up S3 Object Storage for Veeam Data Platform

Veeam v12 introduced Direct-to-Object storage, enabling S3 object storage as the primary backup repository. Prior to this, S3 object storage integration relied on Veeam's Scale-Out Backup Repository (SOBR), using a performance tier and a capacity tier, which extended...

Watering Hole Attacks Unveiled: A Comprehensive Cyberthreat Overview

Watering Hole Attacks Unveiled: A Comprehensive Cyberthreat Overview

Watering hole attacks, akin to their namesake in the natural world where predators strategically position themselves near watering holes to intercept prey, have become a significant peril in the digital realm. In the vast landscape of cybersecurity, understanding the...

Man-in-the-Middle Attack: Cyberthreat Amidst Data Streams

Man-in-the-Middle Attack: Cyberthreat Amidst Data Streams

In the fast-paced arena of enterprise-level digital operations, the looming threat of cyber vulnerabilities demands our undivided attention. Among these threats, the Man-in-the-Middle (MitM) attack emerges as a silent, yet formidable, adversary capable of infiltrating...

You May Also Like

Subscribe To Our Newsletter

Join our mailing list to receive the latest news, updates, and promotions from StoneFly.

Please Confirm your subscription from the email