Significance of In-cloud data protection architecture

Significance of In-cloud data protection architecture

Print Friendly, PDF & Email

By: Mr. Amit Mehta, Director

Modern Data Centre, Dell Technologies.

The meaning of data protection has not changed much over the last two years. Data protection simply means bac““`kup, restore, and archive. Up until a few years ago, enterprises had no idea of the potential and challenges of data.Data is your most valuable asset. Many organizations are looking to protect data and address compliance. Traditional encryption software solutions are difficult to deploy and manage, lack the capability to scale across platforms and can have negative performance impacts for users.

The percentage of cloud infrastructure service users running production applications in cloud platforms is growing at a good pace. It isfascinating to note that the most common cloud infrastructure use case just a couple of years ago was for applications running on on-premises infrastructure.Backup is still an established use case today. However, running production applications as a cloud infrastructure service is now, the most-cited use case for cloud infrastructure services, followed closely by running business intelligent queries and running test and development environments.While organizations continue to embrace digital transformation for both their business and IT groups, the use of public cloud infrastructure has become a key driver for that transformation. Organizations are using cloud infrastructure services to moderate the capital and operational expenses associated with traditional IT hardware deployments. Clearly, the cloud infrastructure services paradigm is evolving.

As more organizations move production applications to the cloud, they often find that they still need to run the same data protection workflows to support the same business operations that they did when their applications were on-premises. These workflows commonly include application-aware backups with application-consistent restores that support other requirements such as disaster recovery, business continuance, test, and development. Organizations may not be able to achieve these types of recoveries or meet the SLAs of the business using the native data protection services provided by cloud providers. These services typically rely on volume-based snapshot technologies, which often cannot meet the consistency and granularity of data recovery required by key business applications.

According to our Global Data Protection Index, nearly all organizations using public cloud are also leveraging it as part of their data protection infrastructure. When considering data protection solutions in a public cloud environment, the growing data universe plays an especially critical role. Scalability option is key here.

The top use cases for data protection within public cloud include:

• Backup/snapshot services to protect workloads developed in public cloud using new application architectures
• Backup of on-premises workloads/data
• Protecting specific SaaS apps
• Cloud-enabled versions of on-premises data protection software to protect public cloud workloads
• Backup/snapshot services to protect workloads developed in public cloud using legacy application architectures

A major component of any in-cloud, hybrid, or on-premises data protection solution is the backup repository. This is where the backup images of protected data are stored. If not managed efficiently, the backup repository can grow large very quickly as more backup jobs complete over time, systems are added to the protection schema, and the amount of production data grows naturally over time.

So, why does in-cloud data protection architecture matter? Because organizations are moving more business-critical applications to the cloud and they still need to provide enterprise-class data protection for these applications at a reasonable cost. Inefficient use of any one of the cloud resources can have a major impact on the cost of data protection. With small cloud deployments, it’s hard to find a cost advantage between the audited solutions. However, just as with on-premises data protection, choosing the wrong solution for the initial deployment can have a major impact on cost efficiency as the solution scales.

Previous articleIET’s IoT India Congress Concludes its 4th Edition
Next articleTenda : AC10 Smart Dual-Band Gigabit Wi-Fi Router
NCN Bureau: If you have an interesting article/experience/case study related to the ICT industry to share, please send us at