{"id":516146,"date":"2024-06-05T17:13:26","date_gmt":"2024-06-05T21:13:26","guid":{"rendered":"https:\/\/www.commvault.com\/?post_type=cmv_glossary&p=516146"},"modified":"2024-12-13T16:00:35","modified_gmt":"2024-12-13T21:00:35","slug":"file-and-object-backup","status":"publish","type":"cmv_glossary","link":"https:\/\/www.commvault.com\/glossary-library\/file-and-object-backup","title":{"rendered":"File & Object Backup"},"content":{"rendered":"\n
File & object backup solutions offer data protection for two different unstructured data types: object storage and file systems. First, object storage is a computer data storage architecture that manages data as objects, unlike file systems that contain data in a file hierarchy. Object storage can handle a broad set of data types and massive data volumes. Azure Blob Storage is an object storage solution from Microsoft Azure.
The blob in Azure Blob is a binary, large object storage option to store any data in a binary format. Unlike object storage, file systems handle files in a hierarchical manner and store data on a storage medium like a disk drive. File data can also reside on servers in their file systems. Microsoft Windows, Linux, and UNIX-based computer systems can be used to store files or object data. File System data can also be stored in cloud solutions like Azure Files, which are fully managed file shares in the cloud that are accessible through industry standard Server Message Block (SMB) protocol or Network File System (NFS) protocol.<\/p>\n\n\n\n
File & object backup describes the process of creating a copy of file or object storage data that is then sent to a backup target storage location \u2013 in the cloud or on-premises \u2014 so that the backup data copy may be used to restore or recover that data in the event of data loss.<\/p>\n\n\n\n
File & object backup is a solution that protects files stored in file systems, including from Microsoft Windows or Linux servers, or data stored as objects by creating a copy of the data and sending it to a secondary storage target location. Users can then access the copy data should the need arise to recover the data.<\/p>\n\n\n\n
The easiest way to describe object storage is to view it as data with a unique identifier and unlimited amounts of metadata. The identifier called a universally unique identifier (UUID) is assigned to the data in the object storage. Object storage generally accommodates storage or data as objects, such as unstructured data, including files, emails, images, audiovisual recordings, and more. In addition to the UUIDs, object storage also contains metadata or data that provides details about other data. The metadata is information that identifies the added material and could range from elaborate descriptions to the file name, the owner, the creation date of the data, source, or other detail.<\/p>\n\n\n\n
Unlike object storage, file storage uses a simple file structure. The file storage uses a hierarchical approach to organize data in files arranged in folders that are placed into directories and subdirectories. Most users are familiar with the structure of file storage, and IT admins appreciate its user-friendly interface that does not require building custom APIs. In general, file storage is best for enterprises with a user base that requires a hierarchial structure to storing data. For example, if your company uses many well-defined data sets, such as departmental shares, then file storage may be the right solution for you.<\/p>\n\n\n\n
A robust file & object backup solution is a powerful application that supports backing up and protecting a broad range of data stored in on-premises or cloud based file systems and in cloud object storage solutions alike. Combining both types of storage resources extends the backup solution\u2019s reach to several data formats, including unstructured data, images, audio, and video. A file & object backup solution must support different operating systems like Windows, Linux, and UNIX. With file & object backup, customers can typically bring all their data, regardless of its composition, under a straightforward solution. Object storage backup solutions are very well suited for cloud backup as object storage can handle cloud-scale data sizes without requiring prearrangement of data sets, and copies are stored in the cloud for greater efficiency. Large on-premises data sets stored on site can be protected and stored on site for quicker recovery. Regardless of where the data is stored, a solution that can protect the data where it lives is essential to backup efficiency and faster recovery.<\/p>\n\n\n\n
A file & object backup solution needs to offer protection for all data types stored on file systems and object storage.<\/p>\n\n\n\n
The main stages of the process include:<\/p>\n\n\n\n
An air-gapped system or computer is one that is physically isolated from other networks and systems, including the internet. This isolation is achieved by disconnecting the system or computer from any external connections, such as ethernet cables or Wi-Fi, and by disabling any wireless or Bluetooth connectivity. <\/p>\n\n\n\n
The purpose of an air-gapped system or computer is to provide an extra layer of security and prevent unauthorized access or data exfiltration. This makes air-gapped systems particularly useful in situations where sensitive or confidential data is being handled, such as in military operations, financial institutions, and research labs. <\/p>\n\n\n\n
However, air-gapped systems can be difficult to maintain and manage, as they require physical access to transfer data to and from the system. This can make it challenging to keep the system up to date with software patches and updates, and to back up data on a regular basis. <\/p>\n\n\n\n
In addition, while air gapping can provide a high degree of security, it is not foolproof. Cyber attackers have developed creative methods for breaching air-gapped systems, such as using malware on removable storage devices or exploiting vulnerabilities in the firmware of the system. <\/p>\n\n\n\n
As such, it is important to use other security measures in conjunction with air gapping, such as strong access controls, encryption, and continuous monitoring of system activity, to ensure the security of sensitive or confidential data. <\/p>\n\n\n\n