The Virtualization Practice

Tag Archive for Replication Receiver Cloud

Data Protection for the Hybrid Cloud

In many cases, when we mention Data Protection for the Hybrid Cloud, we are usually talking about backing up to the cloud. The cloud becomes a repository of our backup images and in some cases those backup images can be launched within clouds that use the same technology. Being able to send data to the cloud is becoming table stakes for infrastructure as a service (IaaS) data protection. However, once we move outside the realm of IaaS to Platform or Software as a Service (PaaS or SaaS), data protection is hit or miss.

VirtualizationBackup

There is an ever increasing number of data protection providers creating replication receiver clouds as they team up with cloud service providers. This could herald the end of on premise tape use for some enterprises, leaving tape to be used primarily by cloud providers. There are major benefits for Quantum, Zerto, Veeam, and others to form replication receiver clouds, but these clouds are not just or storage anymore. They could be purely for storage, but this is not a big win for the cloud service providers. So why would cloud service providers be interested in being a storage endpoint for data protection? Why are they concerned with backup and offering it as a service?

CloudComputing

There has been quite a lot of twitter traffic about the FrankenCloud recently: A cloud with more than one type of hypervisor underneath it. One example, is to build a cloud using Hyper-V three and vSphere, both managed through Microsoft System Center. Another example, is to build a cloud using Hyper-V, KVM, and vSphere all managed through HotLink. But is this a desired cloud topology?

CloudComputing

While at InfoSec World 2012′s summit on Cloud and Virtualization Security, the first talk was on Securing your data. The second was on penetration testing to ensure that data was secure. In essence it has always been about the data but there is a huge difference between what a tenant can do and what the cloud or virtual environment provider can do with respect to data protection and security. This gap is apparently becoming wider instead of smaller as we try to understand tenant vs cloud provider security scopes. There is a lack of transparency with respect to security, but at the same time there are movements to gain that transparency. But secret sauces, scopes, legislation, and lack of knowledge seem to be getting in the way.