Sep 20, 2011
Building an appropriate protection architecture means the business value of the applications protected must align with technology that results in a cost-justified level of protection. Not every application deserves the highest level of protection money can buy. To that end, the classification figure on page 3 is an example of how a classification schema can be organized. There are four major parts to a protection architecture. Each area has value differentiation. Protection Tiers 1 and 2 are focused on being able to failover or restart after a hardware failure, data corruption, or data loss and are accomplished using mirrored or point-in-time copies of volumes. This solution brief is focused on protection Tier-3, which concerns itself with considerations for backup and recovery.