Not All Copy Data Solutions are Created Equal, Part 2
Welcome to Part 2 of our blog series, “Not All Copy Solutions are Created Equal.” Last time, we discussed the ways in which organizations deal with copy data.
Here, we’ll discuss some of the reasons why copy data management is such a big issue for companies all over the world.
Almost all Data Copies Stay Idle and are Rarely Used
The majority of the copy data created in the name of insurance today sits idle and it is important for a copy data management solution to leverage and reuse that data on a regular basis in order to meet critical business requirements.
Looking Beyond the Data Protection Perspective
The first pitfall with the common strategy of copy creation is that it is too optimized for creating copies – whether they’re needed or not. Today’s backup software makes it so easy to create data copies that everyone does it “just to be safe” and “just because.” It is common to hear typical data protection vendors justify this imbalance by saying “you do backups every day, but you rarely ever perform restores.”
The traditional data protection vendors also suffer from restrained capabilities in copy creation. Most of them recommend only a daily backup, because that’s what the backup system can handle at a large scale. Imagine if the “AutoSave” feature in Microsoft Word worked only once a day! Business units and individuals who cannot tolerate this imposed delay often create their own copies at more regular intervals, which eventually leads to copy data sprawl.
In addition, restores are rarely tracked by data protection vendors because their responsibility ends with the ability to recover the data. Users are forced to track these recoveries on their own, and it often leads to copy data sprawl. Catalogic Software offers a streamlined way to review all recovered data and have the ability to promote it to production, to clone to a separate copy, and to easily clean up when done. This avoids unintentional copy data creep in enterprises and allows organizations to track the various versions of their data for better management.
Recoveries on Autopilot
Copy Data Management vendors don’t believe in the use of copy data as exercising your insurance, but instead in encouraging organizations to hit the “data gym” – exercising your data regularly to be more agile and meet the demanding requirements of your business. Using the same type of storage to bring up your copy data for test/dev, automated DR, analytics, and forensics offers a familiar experience to users and, more importantly, deterministic performance.
The ability to refresh setups on a regular basis, test your disaster recovery solution in a fenced-in network, and offer periodic access to crucial production data are all key requirements of a copy data solution.
The mindset that claims “RPOs are more important than RTOs” translates to organizations still relying on scripting and/or manual recoveries. IT organizations are forced to be similar to some of the car insurance companies that optimize quoting systems and payment systems, but not their claims systems, which continue to be a nightmare when you most need optimization.
Your Copies in a Flash!
Flash array economics of today means “If it is in Flash, it must be something important.” Flash significantly relaxes and often gets rid of the IOPS bottlenecks, which is one of the key reasons why organizations create a copy on a separate system within the same site.
The ability to use “in-place” snapshots and expose them to business units for analytics, forensics, near real-time testing and development also helps organizations and business units justify the cost of Flash storage.
Now that you’re familiar with some of the issues in copy data management and how companies might deal with them, what else should you look for in a copy data management solution?
Find out in the finale to this blog series!
Catalogic Software offers a variety of solutions, each designed to target that data security concern in a different way. These products improve data security by protecting against outside threats, like Ransomware, but also by providing additional data governance/access transparency, data masking for Oracle databases for data reuse, and granular role-based access control for backup and application data.