Service-based • The assurance, guarantee, or validation that what was backed up is recoverable whenever it is required is critical. Data stored in the service provider's cloud must undergo regular integrity validation to ensure its recoverability. • Cloud BUR (BackUp & Restore) services need to provide a variety of granularity when it comes to RTO's (
Recovery Time Objective). One size does not fit all either for the customers or the applications within a customer's environment. • The customer should never have to manage the back end storage repositories in order to back up and recover data. • The interface used by the customer needs to enable the selection of data to protect or recover, the establishment of retention times, destruction dates as well as scheduling. • Cloud backup needs to be an active process where data is collected from systems that store the original copy. This means that cloud backup will not require data to be copied into a specific appliance from where data is collected before being transmitted to and stored in the service provider's data centre.
Ubiquitous access • Cloud BUR utilizes standard networking protocols (which today are primarily but not exclusively IP based) to transfer data between the customer and the service provider. • Vaults or repositories need to be always available to restore data to any location connected to the Service Provider's Cloud via private or public networks.
Scalable and elastic • Cloud BUR enables flexible allocation of storage capacity to customers without limit. Storage is allocated on demand and also de-allocated as customers delete backup sets as they age. • Cloud BUR enables a Service Provider to allocate storage capacity to a customer. If that customer later deletes their data or no longer needs that capacity, the Service Provider can then release and reallocate that same capacity to a different customer in an automated fashion.
Metered by use • Cloud Backup allows customers to align the value of data with the cost of protecting it. It is procured on a per-gigabyte per month basis. Prices tend to vary based on the age of data, type of data (email, databases, files etc.), volume, number of backup copies and RTOs. Cloud Backup is a modern and efficient data backup solution that operates on a native cloud multitenant platform. This advanced platform is specifically designed to share resources among users, which makes data mobility possible for customers. With this solution, customers are not restricted to a single provider and can effortlessly move their data to another provider or back to a dedicated Private or Hybrid Cloud. The security of customer data is of utmost importance, and service providers take all necessary measures to ensure that customer data is always kept private and secure. Such security measures include making sure that customer data is never accessible to other customers. Service providers should also only access customer data with explicit permission. By adhering to these strict security measures, Cloud Backup providers can offer peace of mind to their customers and build trust in their services, making it a reliable and trustworthy data backup solution for businesses of all sizes.
Enterprise-class cloud backup An enterprise-class cloud backup solution must include an on-premises cache, to mitigate any issues due to inconsistent Internet connectivity. Hybrid cloud backup works by storing data to local disk so that the backup can be captured at high speed, and then either the backup software or a
D2D2C (Disk to Disk to Cloud) appliance encrypts and transmits data to a service provider. This adds protection against local disasters. Recent backups are retained locally, to speed data recovery operations. There are a number of cloud storage appliances on the market that can be used as a backup target, including appliances from
CTERA Networks,
StorSimple and TwinStrata. Hybrid cloud backup is also beneficial for enterprise users who have security concerns. When storing data locally before sending it to the cloud, backup users can perform the necessary encryption operations, incl. technologies like: • Data encryption cipher (AES 128, AES192, AES256 or blowfish) • Windows Encrypting File System (EFS) • Verification of files previously catalogued, permitting a Tripwire-like capability • CRAM-MD5 password authentication between each component (storage, client and cloud) • Configurable TLS (SSL) communications encryption between each component (storage, client and cloud) • Computation of MD5 or SHA1 signatures of the file data, if configured Data encryption should additionally be applied when you choose a public cloud service provider. The same is important for the compression of backup data. The local backup cache is used to compress the data before sending it to the cloud in order to lower the network bandwidth load and improve backup speed. This becomes critical for enterprises which backup huge databases like
Oracle or
MS SQL or huge files like
virtual machine images or mail server databases (EDB files of
Exchange). Recent improvements in CPU availability allow increased use of software agents instead of hardware appliances for enterprise cloud backup. The software-only approach can offer advantages including decreased complexity, simple scalability, significant cost savings and improved data recovery times. == Typical features ==