Continuous Data Protection (CDP) and Recovery

An Undo Button For Your Data

Threats to data abound in today’s electronic world, ransom-ware high among them. Whatever the cause of the damage was, the modification to the data was undesirable and needs to be undone. Continuous Data Protection (CDP) delivers one-second granularity on roll-backs and provides the best Recovery Point Objective (RPO) and Recovery Time Objective (RTO) of any data protection solution.

CDP records every write I/O (or change), with a corresponding time-stamp, that occurs against a protected volume. With CDP, a roll-back volume can be created representing any point-in-time just before the undesired event occurred. The roll-back volume is then mapped to the original application server or a different one.

continuous-data-protection

As data is written to the protected production volume, a copy of each write I/O is copied to the designated CDP buffer pool. A roll-back volume can be created based on the data that resides in the CDP buffer pool at a specified time.

For example, consider a virus causing damage to a volume at 2:41:36 PM; a roll-back volume is created for any point in time prior and served back to the original application server. Also, consider a user deleting a file at 3:15 PM; a roll-back volume is created for 3:00 PM and mapped to a different file server for retrieval, all with no interruption to the production volume.

Similar to snapshot requests, one can generate periodic CDP Roll-back Volumes at known-good restore points by scripting a call to a PowerShell cmdlet each time an application has been quiesced and the caches have been flushed to storage.

Feature Highlights Summary

  • Protect against damage from ransomware, malware and other sources of data corruption
  • Roll-back to restore a volume to an arbitrary point-in-time state within a 14-day time frame
  • Generate known-good restore points
  • Logs and timestamps all I/Os to the selected virtual disks
  • Operates independent of operating system or applications
  • No need to quiesce or interrupt applications
  • No host agents required
  • Easy to enable protection and create rollback volumes

Comments are closed