Three Questions Every CIO Should Ask About Virtual Server Data Protection

Three Questions Every CIO Should Ask About Virtual Server Data Protection

By Special Guest
Allen Mitchell, Senior Technical Account Manager, MENA at CommVault Systems

IT has reached an inflection point in the adoption of virtual server technologies and companies in the Middle East are now rightfully asking “Why not Virtualize?” instead of “Why virtualize?” Beyond the obvious cost savings due to consolidation and reduced operational overheads, businesses are now realizing that they can improve the availability, reliability and even performance of their mission critical applications by running them in a virtual context.

Gartner recently forecast an expectation for x86 server virtualization to double from 40 percent in 2011 to 80 percent by 2016. While the uptake of virtualization is encouraging, data protection and management in the virtual environment continues to be a challenge for most organizations. Most existing tools for backup and data protection of virtual machines are limited either in terms of scale, recovery capabilities, scope and support or application integration.

 

Simply force fitting legacy solutions which are not optimized for the new virtual environments only adds to cost and increases the potential risks to overall business.

What CIOs Should Know About Virtual Server Data Protection

One of the biggest misconceptions in IT is the equation between “Best of Breed” and “Point Solution”. Many vendors now offer data protection solutions which they claim are “purpose built” or “optimized” for the virtual world. Typically point solutions offer data protection for only a subset of the overall data center- in this case the virtual environment- which means these solutions lack support for what are potentially key elements of a comprehensive data protection strategy.

Consequently, multiple solutions are required to ensure adequate data protection for the entire data center. The drive to virtual infrastructure is about reducing cost by consolidating resources, maximizing utilization and centralizing management. It is thus counter-productive to completely contradict this strategy by adding multiple, complex solutions for data protection and management.

CIOs should be aware that many purpose-built solutions run into real trouble when users attempt to scale beyond 50 or 100 virtual machines, significantly impacting performance of production hosts and applications. Choosing a solution that doesn’t understand the scale and performance requirements of the converged virtual infrastructure can result in unnecessarily expensive, over-designed solutions or in critical application and virtual machine data that are left unprotected.

Finally, given that by the end of 2012 an estimated 58 percent of all x86 server workloads were virtualized, it can be deduced that many organizations have already virtualized the basic areas of their infrastructures. Therefore, for most organizations, achieving the goal of a fully or 100 percent virtualized environment means targeting Tier 1 applications. This puts data management squarely in the critical path of the virtualization initiative.

IT leaders should be asking tough questions designed to ensure they have a data management strategy that comprehends the drive to a fully scaled out virtual infrastructure in order to avoid the need for a costly, time-consuming data management redesign. Here are the top three:

Does the solution align to the long term goals of the business?

The virtual platform and initiative is strategic. The supporting cast of infrastructure components and tools- including data protection- needs to align with this strategic direction. If the goal is to become 100 percent virtualized the data protection solution must be ready to handle the scale, application integration, recovery, and access requirements to make this happen.

 

Does the solution help reduce cost?

Let’s face it, the primary objective of virtual platforms is to do more with less and ultimately reduce costs across the board. The data protection solution for the organization should align with that compelling vision. A data protection solution that spans the entire data center - physical as well as virtual environments - should help ease the transition from physical to virtual. Additionally, a data protection solution that is fully integrated from the ground up to deliver all the requirements of the virtual platform and does not require additional bolt-on components, 3rd party add-ons, or costly and complex scripting integration projects will help dramatically reduce the overall costs for protecting and managing data across the organization. CIOs should be looking to choose a solution that not only helps facilitate, but actually accelerates that transition by also delivering scale, scope and recovery in the virtual platform.

Does the solution help reduce business risk?

Beyond reducing costs, we’re now seeing that business can actually improve performance and flexibility and reduce business risk by virtualizing more workloads and centralizing management and operations. The same is true for data protection and data management. A centralized solution that spans the data center and encompasses all data protection and management requirements will eliminate the need for multiple point solutions that must be synchronized with complex scripts and manual intervention- ultimately resulting in more reliable data management processes that ensure information is where you need it, when you need it, and in this way, reduce risk to the business.

A poorly architected data protection solution can stop a virtualization deployment dead in its tracks. IT leadership should be looking to storage and data management teams to ensure they are ahead of the challenges created by the tidal wave of consolidation and infrastructure convergence that is upon them in the form of server virtualization. As organizations look to build out large private and hybrid cloud environments, the data protection and data management strategy must be ready for that level of scale and efficiency in order to avoid the costly re-architecture which many IT leaders are now realizing is needed.




Edited by Brooke Neuman
Get stories like this delivered straight to your inbox. [Free eNews Subscription]


SHARE THIS ARTICLE
Related Articles

Shining a Light on the Dark Web: Searchlight Cyber Debuts Comprehensive Hub

By: Greg Tavarez    3/28/2024

The Dark Web Hub is a one-stop shop for crucial context and continuously updated information on dark web marketplaces, ransomware actors, hacking foru…

Read More

Stellar Cyber and Trellix Bridge the Gap in Security Operations

By: Greg Tavarez    3/28/2024

Stellar Cyber announced the integration with Trellix Endpoint Security HX to allow customers to deploy more robust security solutions and improve thei…

Read More

CyberSaint Raises $21M in Series A Funding to Continue Securing its CyberStrong Customers

By: Alex Passett    3/27/2024

CyberSaint announced that it succeeded in a huge $21 million Series A funding round. This was led by Riverside Acceleration Capital (RAC) with other i…

Read More

US Education Receives Security Upgrade with Free Browser Protection Offered by Conceal, Carahsoft

By: Greg Tavarez    3/27/2024

Conceal and Carahsoft recently unveiled an initiative to fortify the cybersecurity infrastructure of U.S. educational institutions.

Read More

Cato's AI Takes Control of Security and Incident Response

By: Greg Tavarez    3/27/2024

With Cato's recently announced Network Stories for Cato XDR, advanced AI algorithms instantly identify outages in customer networks and conduct root c…

Read More