Data Protection: If All You Have Is a Hammer, Everything Looks Like a Nail

By:  |  Category: Blog, Security Tuesday, July 25th, 2017  |  No Comments

If all you have is a hammer, everything looks like a nail!”

This proverb was first introduced to the English lexicon by Abraham Maslow, an American psychologist who is best known for creating Maslow’s hierarchy of needs psychology theory.  The meaning of the saying is that with limited tools, single-minded people apply them inappropriately or indiscriminately.

If your backup is too slow, ditching the whole concept and moving to array based snapshots and replication might seem faster in the short run but what are the business risks of file loss or application corruption beyond the oldest snapshot? What about proper retention policy and the risk of ransomware or malware?

The reason why the “If all you have is a hammer, everything looks like a nail” dictum is relevant to your business is because no single data protection technology can provide the complete solution. The starting point for any data protection policy decision should always be a business risk assessment as opposed to a technology discussion. Once you understand the cause and effect of application downtime and data loss, you can then properly assess the pros and cons of the data protection technologies that are available.

Assessing the cause and effect of data loss

There must be 50 ways to leave your lover.

This was the lament of American singer-songwriter Paul Simon in his number one hit from the mid-1970s. Sadly there are probably more than 50 ways to leave/lose your data!  Application downtime and data loss can come from a variety of sources. Network or power outages, component failure, human error, human malevolence, data corruption, software bugs, site failures or natural disasters are just a few examples.  In addition we are seeing a dramatic growth in ransomware attacks on users across the globe and the results have been very concerning. The FBI reported that victims paid $209M to ransomware criminals in Q1 2016.  According to the Institute for Critical Infrastructure Technology (ICIT), 2017 is expected to be a year in which ransomware wreaks havoc on companies.

For any business, the question is no longer: “Will I be a victim of ransomware?” But instead: “Will I be prepared when ransomware attacks?”RMC Data Protection Risk Analysis 2J.jpg

Application downtime and data loss can and does have a severe impact, directly equating to lost employee productivity, lost customer/partner confidence and loyalty, lost revenue, lost business opportunities and increased risk exposure.

Any business risk analysis of data loss scenarios threatening your business will therefore typically end up with the same conclusion.  Data availability and protection is a continuum that must cover a wide range of scenarios.  Snapshots, replication and backups have different but complementary roles to play when it comes to mitigating the business impact of data loss incidents. 

How snapshots and replicas complement backup

Array-based snapshots offer fast, non-disruptive point-in-time copies of data and enable fast recovery to a recent copy in the event of file loss and corruption.  But snapshots alone cannot deliver comprehensive backup.   They have retention limitations and a dependence on the underlying storage system. Make no mistake, your snapshots are at risk if the storage system fails.

Array-based replication provides the redundancy that enables rapid recovery from hardware platform outage or site outage. However, replication will not provide comprehensive protection against file loss or file corruption as errors, deletions and corruptions affecting the primary copy can be replicated to a second site.

Retention policies are critical to keep in mind in relation to silent or undetected data loss or corruption. It is not always immediately apparent when data is deleted or corrupted so resolving corruption or recovering files often requires older copies of data than the snapshots and replicas kept on primary storage. The beauty of backup is that it enables the long term retention of multiple previous point in time copies of your data. In this respect it allows you to “back up time”, providing you with the historical information that enables you to recover to a specific time in the past.

To deliver the comprehensive data protection that mission-critical applications require, you still therefore need backups (in addition to snapshots and replication) as a second line of defense. Backups are self-contained, fully independent copies of your data that protect applications running on primary storage against storage platform outage as well as file loss or application corruption beyond the oldest snapshot. Disk backup enables fast recovery and enables many copies of data/previous points in time to be kept economically over time with deduplication.RMC data protection 1J.jpg

RMC 4.0: Combining the best of snapshots, replication and backups

The good news is that our recently announced HPE Recovery Manager Central (RMC) 4.0 software gives you the best of snapshots, replication and backups – tightly integrated and delivered as standard with every HPE 3PAR array.

RMC 4.0 federates HPE 3PAR all-flash arrays and HPE StoreOnce Systems to provide a converged availability and protection service optimized for flash environments. It augments traditional backup approaches, combining the performance of snapshots and replication with the protection of backups. As a result RMC offers 23x faster backup with no backup impact on the application server, enables self-service automated application managed protection for VMware, Microsoft SQL, Oracle and SAP HANA environments, lowers cost and complexity by reducing the need for a backup application, and reduces risk by protecting applications running on 3PAR against storage platform outage, file loss or application corruption beyond the oldest snapshot.

Deploying the right tools, for the right task at the right time

Satisfying the varied recovery requirements of your business should not be a question of “either-or” but more a case of “where” and “how” to best use snapshots, replication and backup.

And coming full circle, that’s how “Maslow’s Hammer” meets data protection. Ensuring availability and protection for business critical applications and data demands more than a single tool in the toolbox.

Find out more

Call EnhancedTECH at 714-970-9330 or email us at [email protected] for more information and a free consultation on data protection.



Source Image: https://www.pexels.com/photo/black-claw-hammer-on-brown-wooden-plank-209235/

Leave a Comment
Read previous post:
Cyber attacks
Cyber Attacks Now More Costly than Natural Disasters

We all know earthquakes and hurricanes are a threat. But when did a cyber attack become as catastrophically damaging to...