The Evolution of Continuous Data Protection
Data backup is integral to any organization’s standard IT activities. The importance of storing essential business data for future use can never be ignored and therefore there is always this need to implement suitable data backup and recovery solution to meet your purpose. Continuous data protection technology is seen to be rapidly picking up momentum in terms of its acceptance as a reliable mode of data storage and restoration. Gone are those days when people were apprehensive about the practicality of the revolutionary continuous data protection concept. Today CDP products are increasingly being deployed by companies across industries to execute their critical backup processes.
The reasons continuous data protection failed
Continuous data protection operates by saving copy of files every time some changes are made to them. This enables recovery to any point in time. By lowering recovery point objective or RTO and recovery time objective (RTO), CDP promises to reduce system downtime and ensure business continuity. However in spite of the advantages provided by CDP it experienced slow market adoption. The first reason being that CDP products were mostly being offered by start-ups when they first appeared in the market. Moreover CDP solutions were pitched as alternative to conventional backup. And very few people were convinced about the efficiency of continuous data protection software as compared to traditional backup. Technologically speaking CDP products were deficient in application awareness and were also not capable of providing both on-site and off-site copies of data. All these factors together contributed to the failure of the CDP technology in the initial phase.
But now we see a remarkable increase in CDP use. So much so that its popularity is on par with data deduplication technology that has always received a far more favorable market response. Now CDP product are being offered be major IT vendors and the technology has also been improved upon to be compatible with other application and to tender both offsite and on-site protection.
Why continuous data protection is being largely utilized today
If statistics are to be followed companies with large amount of data to backup are generally found to be resorting to CDP. With advancement of technology companies are faced with the challenge of backing up larger systems and greater volumes of data in much less time. The increasing use of high density virtual servers also adds to the problem. The usage of CDP allows them to address the issues related to limited backup windows while ensuring data protection. A large number of organizations use continuous data protection in combination with snapshots to enable a full-proof disaster recovery process.
Emergence of near-CDP
Some people confuse snapshots with CDP. This has led CDP providers to come up with the new near-CDP technology that combine the features of snapshot based products and replication. The only difference between CDP and near-CDP is that CDP supports an RPO of zero seconds while near-CDP RPO is based on the frequency at which the snapshots are to be taken. However both the technologies provide instantaneous recovery.
Continuous data protection(http://www.intelinetsystems.com/data_protection_manager.aspx) has evolved with time and today it is the choice of maximum number of organization looking for reliable data backup and recovery method.
Jenifer Sahn - About Author:
Jenifer Sahn, Expert in writing articles based on services like Data center Texas, Data Recovery Texas, network backup software, online storage service, remote backup solution, online remote support, continuous data protection software and file recovery utility.
Published by James Blee on August 16th 2012 | Software
Published by Tony Smith on May 17th 2012 | Software
Published by Chris Mills on January 25th 2012 | Computer
Published by James on February 8th 2012 | Software
Published by Anand Kumar on March 20th 2012 | Software
Published by IGennie Kumar on August 17th 2012 | Software
Published by Paxton on January 16th 2012 | Software
Published by Tony Smith on January 2nd 2012 | Software
Published by Avena Sowell on April 13th 2012 | Computer
Published by Tony Smith on March 9th 2012 | Software
Published by William Xavierss on June 25th 2012 | Software
Published by Mary Porter on June 19th 2012 | Computer
Published by Carolmoore on February 28th 2012 | Computer
Published by Heather Protz on March 30th 2012 | Computer
Published by Micel Anderson on December 21st 2011 | Computer
Published by Neha on April 23rd 2012 | Software
Published by Joginder Singh on January 9th 2012 | Software
Published by Paxton on January 2nd 2012 | Computer
Published by Jenifer Sahn on April 24th 2012 | Software
Published by Neha on January 27th 2012 | Software