Tag: disaster recovery

What can threaten my data?

December 20, 2013 | By | Reply More

Reading time: 2 – 3 minutes

Data is one of the most crucial things you can own. As an individual, it has plenty of important information about yourself but, as a business, it has the details of customers, staff and other important people and aspects of the company. As a result, it becomes all the more crucial and must be protected.

Yet, before you can protect something, you should understand the threats being faced. When it comes to data, you must consider both digital intrusions and physical problems. Disaster recovery taking both into account is available at www.ironmountain.co.uk/services/data-protection/disaster-recovery, but it still helps to learn about the risks to understand just how important this service is.

Digital disasters

As convenient as computers are, they do bring their own share of risks into play. Once you start storing information digitally, you need digital protection to stop intruders stealing information.

These threats are incessant too, no matter what platform you use. For instance, a recent botnet – a virus that steals contact details and spreads itself, typically through scripted conversations – on Android called MisoSMS has been spreading around quickly, sending plenty of previously secure data to attackers in China.

Add in the fact that Android devices are common in the workplace, typically under ‘bring your own device’ work schemes, and the exposure faced by your network and server become ever more apparent.

Yet, even without direct attacks, people can cause servers to crash, files can become corrupt and so much more. As a result, a disaster recovery plan is still needed simply to offer that final back-up should you ever need it, not to mention peace of mind.

Physical problems

There are plenty of problems that can occur in the ‘real’ world, too. A server, after all, is still a piece of hardware. Hardware can break, be damaged, get stolen or a power cut can render it useless at an important point. In all these cases, the result is the same as a digital problem – your data is either inaccessible or already gone.

This is why disaster recovery is so important, as it covers all these physical threats too. You could have all the best firewalls money can buy, but it would mean nothing if a simple office accident resulted in damaged hardware. Even when you have remote access servers, such as The Cloud, for backup, they still have the same issues on their end – whatever you do, it’s a risk that isn’t going to go away, so alternative disaster protection is a must.

iSCSI SAN Software and Storage Virtualization: An Overview

September 24, 2009 | By | 2 Replies More

Reading time: 2 – 3 minutes

It’s going to be a little bit tough this time discussing something as obscure as this topic but I’ll certainly do my best to make it lighter and understandable as I can.

Web hosting as we all know operate on virtualized servers. Considering the concept of Storage virtualization involves the abstraction of logical storage from physical storage which means virtualization of storage takes place by making data independent of its location.

Having a little concept about web hosting, normally an IP is provided. An iSCSI (pronounced eye-skuzzy) also known as Internet Small Computer System Interface that is IP-based serves as the storage networking standard for linking data storage facilities. Whenever SCSI commands are carried over within the network, iSCSI facilitates the data transfers over intranets and manages location-independent data storage and retrieval over long distances using its existing network infrastructure. It also makes possible the transmission of data over local area networks (LANs), wide area networks (WANs), and the Internet.

As a popular storage area network (SAN) protocol, it provides organizations the ability to consolidate storage into data center storage arrays while at the same time providing hosts (such as database and web servers) with the illusion of locally-attached disks making it a lot better than the traditional Fibre Channel, which requires special-purpose cabling.

Having iSCSI storage software makes possible the conversion of any standard 64-bit or 32-bit Windows Server into a scalable SAN that can work over an existing Ethernet network. A great example of this is that of StarWind Enterprise Server that helps organizations build rock-solid, high-performance IP SAN on IT-friendly budget.

Part of iSCSI SANs disaster recovery mechanism is its ability to allow entire disk arrays migration across a WAN with minimal configuration changes, thus, making storage “routable” in the same manner as network traffic which can also be applied in extreme cases whenever there are prolonged outages. In simple terms, it can function as a back up.

I have only discussed the salient points of the topic and tried not to be too technical as much as possible. If you have any questions or insights that you would like to share, feel free to do so at the comments section. This post was brought to you by our friends from www.starwindsoftware.com.