Autonomic Healing and Validation Restore

Backing up data is one thing. Knowing that you can quickly and reliably recover and restore data when it’s needed is something else altogether. What if backup files are corrupted?

Your backup and recovery software solution should include automated features that regularly confirm the integrity of data files and test for recoverability.

Prevent Silent Corruption of Backup Data

Most data protection products provide only cyclic redundancy checking (CRC) or Hash 5 algorithms to assess if the data that’s been backed up to disk matches the data the backup client collected. Unfortunately, these methods fail to recognize silent data corruption of split, torn, or lost writes that are not caught by the hard disk controller.

The problem is that most backup storage systems have caching activated. Caching typically neuters CRC and hashing validation algorithms because the validation compares data in the DRAM, NVRAM, or Flash SSD cache. The only time the actual backup data is checked is when it’s first written to disk.

Silent data corruption occurs on 1 out of every 9 SATA drives, the most prevalent type of drive for backup data. As a result, there is a good chance that your backup data could experience some form of silent corruption.

How Asigra Delivers Recovery and Restore Assurance

At Asigra, recovery is everything and corrupted backup data is unacceptable. Why leave the integrity of important business data to chance?

Asigra Cloud Backup™ uniquely protects the recoverability of data with two processes:

  • Autonomic healing — verifies the logical and physical integrity of the data written to the storage systems by constantly monitoring whether the backup data it captures is the same as backup data stored on the disk (not the cache). Asigra Cloud Backup checks for both data corruptions and logical inconsistencies caused by third party technologies, such as faulty RAID controllers, file systems, Operating Systems, disk subsystems, network packet loss, etc. These checks are performed on both current backups being written to disk as well as all previous backup data sets already on disk. If the autonomic healing module identifies any corrupt or problematic data, it automatically goes out to the source machine and captures it again
  • Restore validation — simulates real recoveries without actually writing the restored data, allowing any backup set to be tested for recoverability and exercising disaster recovery plans with no impact to the business

The Asigra software efficiently delivers recovery and restore assurance (R2A) by first attempting to retrieve corrupted files from the replicated Asigra DS-Systems before attempting to get the file from the Asigra DS-Client (the data collector) over the WAN.

Constant and seamless monitoring of data integrity identifies potential problems before they become serious issues and ensures backup data is always in a valid state for restoration.

Explore Asigra Cloud Backup

It’s paramount that businesses trust their backup and restoration processes so that they operate with well-placed confidence to ensure their data can be quickly and reliably recovered when it matters most.

Asigra Cloud Backup is an enterprise-class backup and recovery software solution purpose-built for public, private and hybrid cloud architectures, providing the same backup and recovery protection for data in cloud-based applications and platforms as it does in on-premise data centers.

Read more about the complete range of features that ensure the maximum in reliability, security, manageability and affordability, including:

Learn about how the software components of Asigra Cloud Backup work.

Get more information

The following resources provide further details about this topic:

Product Brochure

Agentless Cloud Backup and Recovery Software for the Enterprise

Data sheet

Recovery and Restore Assurance (R2A)

Print this page
Email this page