SlideShare a Scribd company logo
1 of 11
www.stonefly.com/resources/what-are-air-gapped-backups
What is Air-Gapping?
Air-gapping is an advanced data protection feature used to
isolate and detach target storage volumes from unsecure
networks, production environments, and host platforms.
Depending on the software and vendor, the ability to turn-
on and turn-off air-gap volumes can be manual or
automatic via user-defined policies. Additionally, also
dependent on the vendor, air-gap volumes can be
provisioned on-premises and/or in the cloud.
How Air-Gapped Backups
Work
Air-gapped backups leverage air-gapped target storage
volumes to store backups, snapshots, replicas, and
redundant copies of business-critical volumes. As air-
gapped volumes are turned-off and inaccessible by default,
they keep the stored data safe from any disaster that may
affect the primary production environment.
Air-Gapped Systems: On-
Premises & in the Cloud
How are air-gapped backups set up on-premises
Two common practices are used by storage administrators to set up
on-premises air-gapped systems:
 Offline tape arrays or secondary storage systems that are
manually attached and detached. This is an error-prone process
and not entirely secure, which is why most data security experts
advise against it.
 Leverage software-defined networking to deploy virtual target
storage repositories, on VMware, Hyper-V, KVM, or Citrix
(formerly XenServer), that can be attached or detached
automatically as per user-defined policies.
How are air-gapped backups set up in the
cloud
Air-gapped backups are not the same thing as redundant
data storage. Air-gapped storage provides an additional layer
of security against cyber-threats. To do so, simply creating
and storing a secondary copy is not enough.
Similar to the software-defined on-premises air-gapped
backups, air-gapped repositories in the cloud are set up on
an isolated network and are offline by default. The storage
volumes are only attached to the primary repository to store
critical data and then detached as per user-defined policies.
Advantage of Air-gapped
Backups
With air-gapped target volumes, organizations can
protect their mission-critical structured, unstructured,
and object workloads from threats like ransomware,
virus, failed software-upgrade and human error.
The primary function and advantage of air-gapped
repositories is to provide a storage location that uses
software-defined network to isolate itself from the
production environment. In the event of a disaster,
the data stored in air-gapped volumes remains
available; even if the production environment fails.
3-2-1-1-0 Data Protection
Rule with Air-Gapped
Volumes
The 3-2-1-1-0 rule is an advanced data protection strategy
that leverages backup & DR capabilities to ensure high
availability, recoverability, and delivers near-zero
downtime.
The rule states that you need to have three different
copies of data, stored on two storage media, with one
offsite copy, and one offline copy.
Air-Gapping in StoneFly
Solutions: Air-Gapped Vault &
Air-Gapped Fabric
All StoneFly hyperconverged infrastructure and backup and
disaster recovery (DR) solutions offer air-gapping as a
standard feature.
StoneFly air-gapped features are available as Air-Gapped
Vault and Air-Gapped Fabric.
 Air-Gapped Vault are target storage repositories that can be set up
on-premises or in the cloud of your choice using StoneFly’s patented
storage OS (StoneFusion and SCVM).
 Air-Gapped Fabric provides seamless data management of all air-
gapped repositories deployed on-premises and/or in the cloud.
Air-Gapped Repositories
Air-gapped repositories consist of one
virtual storage controller connected to two
target storage repositories. One target
repository is network-facing, always
accessible and available to user-groups,
applications, etc. The second target
repository is air-gapped, detached, and
isolated.
Air-gapped repositories can be deployed on
popular hypervisors and in the cloud of your
choice. Users can define policies to
automatically turn-on and turn-off air-
gapped repositories.
Air-Gapped Controllers
Air-gapped controllers consist of two
virtual storage controllers connected
to one target repository each.
One pair of virtual storage controller
and target repository are network-
facing, always accessible and
available to user-groups,
applications, etc. The second pair of
virtual storage controller and target
repository are air-gapped, detached,
and isolated.
Contact us
Address:
2865 Grove Way
Castro Valley, CA 94546 USA
Phone no.:
☎ 510-265-1616
Email:
✉
sales@stonefly.com
Website:
www.stonefly.com/veeam-cloud-connect-backup-to-azure

More Related Content

Similar to Air-Gapped Backup

A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 A Survey Paper on Removal of Data Duplication in a Hybrid Cloud  A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud IRJET Journal
 
New Features For Your Software Defined Storage
New Features For Your Software Defined StorageNew Features For Your Software Defined Storage
New Features For Your Software Defined StorageDataCore Software
 
remote local backup
remote local backupremote local backup
remote local backupssuser1eca7d
 
Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperSymantec
 
Cohesity Data Platform One Pager
Cohesity Data Platform One PagerCohesity Data Platform One Pager
Cohesity Data Platform One PagerdcVAST
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
Data guard architecture
Data guard architectureData guard architecture
Data guard architectureVimlendu Kumar
 
twp-oracledatabasebackupservice-2183633
twp-oracledatabasebackupservice-2183633twp-oracledatabasebackupservice-2183633
twp-oracledatabasebackupservice-2183633Arush Jain
 
Getting Most Out of Your Disaster Recovery Infrastructure Using Active Data G...
Getting Most Out of Your Disaster Recovery Infrastructure Using Active Data G...Getting Most Out of Your Disaster Recovery Infrastructure Using Active Data G...
Getting Most Out of Your Disaster Recovery Infrastructure Using Active Data G...Jade Global
 
Disaster Recovery Infrastructure Whitepaper 2012
Disaster Recovery Infrastructure Whitepaper 2012Disaster Recovery Infrastructure Whitepaper 2012
Disaster Recovery Infrastructure Whitepaper 2012Jade Global
 
ArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDGaret Keller
 
Managing data to improve disaster recovery preparedness » data center knowledge
Managing data to improve disaster recovery preparedness » data center knowledgeManaging data to improve disaster recovery preparedness » data center knowledge
Managing data to improve disaster recovery preparedness » data center knowledgegeekmodeboy
 
Sample_Blueprint-Fault_Tolerant_NAS
Sample_Blueprint-Fault_Tolerant_NASSample_Blueprint-Fault_Tolerant_NAS
Sample_Blueprint-Fault_Tolerant_NASMike Alvarado
 
Compare Array vs Host vs Hypervisor vs Network-Based Replication
Compare Array vs Host vs Hypervisor vs Network-Based ReplicationCompare Array vs Host vs Hypervisor vs Network-Based Replication
Compare Array vs Host vs Hypervisor vs Network-Based ReplicationMaryJWilliams2
 
SME Providing an Enterprise File Fabric™ for Scality
SME Providing an Enterprise File Fabric™ for ScalitySME Providing an Enterprise File Fabric™ for Scality
SME Providing an Enterprise File Fabric™ for ScalityHybrid Cloud
 
TECHNICAL WHITE PAPER▶NetBackup 5330 Resiliency/High Availability Attributes
TECHNICAL WHITE PAPER▶NetBackup 5330 Resiliency/High Availability AttributesTECHNICAL WHITE PAPER▶NetBackup 5330 Resiliency/High Availability Attributes
TECHNICAL WHITE PAPER▶NetBackup 5330 Resiliency/High Availability AttributesSymantec
 
cloud Raid
cloud Raidcloud Raid
cloud Raidgsmenon1
 

Similar to Air-Gapped Backup (20)

A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 A Survey Paper on Removal of Data Duplication in a Hybrid Cloud  A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 
New Features For Your Software Defined Storage
New Features For Your Software Defined StorageNew Features For Your Software Defined Storage
New Features For Your Software Defined Storage
 
remote local backup
remote local backupremote local backup
remote local backup
 
Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paper
 
Cohesity Data Platform One Pager
Cohesity Data Platform One PagerCohesity Data Platform One Pager
Cohesity Data Platform One Pager
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
cloud storage.pptx
cloud storage.pptxcloud storage.pptx
cloud storage.pptx
 
Data guard architecture
Data guard architectureData guard architecture
Data guard architecture
 
twp-oracledatabasebackupservice-2183633
twp-oracledatabasebackupservice-2183633twp-oracledatabasebackupservice-2183633
twp-oracledatabasebackupservice-2183633
 
Getting Most Out of Your Disaster Recovery Infrastructure Using Active Data G...
Getting Most Out of Your Disaster Recovery Infrastructure Using Active Data G...Getting Most Out of Your Disaster Recovery Infrastructure Using Active Data G...
Getting Most Out of Your Disaster Recovery Infrastructure Using Active Data G...
 
Disaster Recovery Infrastructure Whitepaper 2012
Disaster Recovery Infrastructure Whitepaper 2012Disaster Recovery Infrastructure Whitepaper 2012
Disaster Recovery Infrastructure Whitepaper 2012
 
ArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUD
 
Managing data to improve disaster recovery preparedness » data center knowledge
Managing data to improve disaster recovery preparedness » data center knowledgeManaging data to improve disaster recovery preparedness » data center knowledge
Managing data to improve disaster recovery preparedness » data center knowledge
 
Sample_Blueprint-Fault_Tolerant_NAS
Sample_Blueprint-Fault_Tolerant_NASSample_Blueprint-Fault_Tolerant_NAS
Sample_Blueprint-Fault_Tolerant_NAS
 
Compare Array vs Host vs Hypervisor vs Network-Based Replication
Compare Array vs Host vs Hypervisor vs Network-Based ReplicationCompare Array vs Host vs Hypervisor vs Network-Based Replication
Compare Array vs Host vs Hypervisor vs Network-Based Replication
 
Ibm spectrum protect
Ibm spectrum protect Ibm spectrum protect
Ibm spectrum protect
 
SME Providing an Enterprise File Fabric™ for Scality
SME Providing an Enterprise File Fabric™ for ScalitySME Providing an Enterprise File Fabric™ for Scality
SME Providing an Enterprise File Fabric™ for Scality
 
TECHNICAL WHITE PAPER▶NetBackup 5330 Resiliency/High Availability Attributes
TECHNICAL WHITE PAPER▶NetBackup 5330 Resiliency/High Availability AttributesTECHNICAL WHITE PAPER▶NetBackup 5330 Resiliency/High Availability Attributes
TECHNICAL WHITE PAPER▶NetBackup 5330 Resiliency/High Availability Attributes
 
cloud Raid
cloud Raidcloud Raid
cloud Raid
 

More from StoneFly

StoneFly DR365 Veeam Immutable Veeam Air Gapped
StoneFly DR365 Veeam Immutable Veeam Air GappedStoneFly DR365 Veeam Immutable Veeam Air Gapped
StoneFly DR365 Veeam Immutable Veeam Air GappedStoneFly
 
Complete Backup & Disaster Recovery Solution- StoneFly
Complete Backup & Disaster Recovery Solution- StoneFlyComplete Backup & Disaster Recovery Solution- StoneFly
Complete Backup & Disaster Recovery Solution- StoneFlyStoneFly
 
Top Reasons Why Retail Sector Move to Cloud Computing
Top Reasons Why Retail Sector Move to Cloud ComputingTop Reasons Why Retail Sector Move to Cloud Computing
Top Reasons Why Retail Sector Move to Cloud ComputingStoneFly
 
StoneFly CDR365- Cloud Backup & Disaster Recovery Solution
StoneFly CDR365- Cloud Backup & Disaster Recovery SolutionStoneFly CDR365- Cloud Backup & Disaster Recovery Solution
StoneFly CDR365- Cloud Backup & Disaster Recovery SolutionStoneFly
 
Major Challenges of Cloud Computing companies Face in 2022
Major Challenges of Cloud Computing companies Face in 2022Major Challenges of Cloud Computing companies Face in 2022
Major Challenges of Cloud Computing companies Face in 2022StoneFly
 
Veeam Cloud Backup for Microsoft Office 365
Veeam Cloud Backup for Microsoft Office 365Veeam Cloud Backup for Microsoft Office 365
Veeam Cloud Backup for Microsoft Office 365StoneFly
 

More from StoneFly (6)

StoneFly DR365 Veeam Immutable Veeam Air Gapped
StoneFly DR365 Veeam Immutable Veeam Air GappedStoneFly DR365 Veeam Immutable Veeam Air Gapped
StoneFly DR365 Veeam Immutable Veeam Air Gapped
 
Complete Backup & Disaster Recovery Solution- StoneFly
Complete Backup & Disaster Recovery Solution- StoneFlyComplete Backup & Disaster Recovery Solution- StoneFly
Complete Backup & Disaster Recovery Solution- StoneFly
 
Top Reasons Why Retail Sector Move to Cloud Computing
Top Reasons Why Retail Sector Move to Cloud ComputingTop Reasons Why Retail Sector Move to Cloud Computing
Top Reasons Why Retail Sector Move to Cloud Computing
 
StoneFly CDR365- Cloud Backup & Disaster Recovery Solution
StoneFly CDR365- Cloud Backup & Disaster Recovery SolutionStoneFly CDR365- Cloud Backup & Disaster Recovery Solution
StoneFly CDR365- Cloud Backup & Disaster Recovery Solution
 
Major Challenges of Cloud Computing companies Face in 2022
Major Challenges of Cloud Computing companies Face in 2022Major Challenges of Cloud Computing companies Face in 2022
Major Challenges of Cloud Computing companies Face in 2022
 
Veeam Cloud Backup for Microsoft Office 365
Veeam Cloud Backup for Microsoft Office 365Veeam Cloud Backup for Microsoft Office 365
Veeam Cloud Backup for Microsoft Office 365
 

Recently uploaded

How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfOverkill Security
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 

Recently uploaded (20)

How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 

Air-Gapped Backup

  • 2. What is Air-Gapping? Air-gapping is an advanced data protection feature used to isolate and detach target storage volumes from unsecure networks, production environments, and host platforms. Depending on the software and vendor, the ability to turn- on and turn-off air-gap volumes can be manual or automatic via user-defined policies. Additionally, also dependent on the vendor, air-gap volumes can be provisioned on-premises and/or in the cloud.
  • 3. How Air-Gapped Backups Work Air-gapped backups leverage air-gapped target storage volumes to store backups, snapshots, replicas, and redundant copies of business-critical volumes. As air- gapped volumes are turned-off and inaccessible by default, they keep the stored data safe from any disaster that may affect the primary production environment.
  • 4. Air-Gapped Systems: On- Premises & in the Cloud How are air-gapped backups set up on-premises Two common practices are used by storage administrators to set up on-premises air-gapped systems:  Offline tape arrays or secondary storage systems that are manually attached and detached. This is an error-prone process and not entirely secure, which is why most data security experts advise against it.  Leverage software-defined networking to deploy virtual target storage repositories, on VMware, Hyper-V, KVM, or Citrix (formerly XenServer), that can be attached or detached automatically as per user-defined policies.
  • 5. How are air-gapped backups set up in the cloud Air-gapped backups are not the same thing as redundant data storage. Air-gapped storage provides an additional layer of security against cyber-threats. To do so, simply creating and storing a secondary copy is not enough. Similar to the software-defined on-premises air-gapped backups, air-gapped repositories in the cloud are set up on an isolated network and are offline by default. The storage volumes are only attached to the primary repository to store critical data and then detached as per user-defined policies.
  • 6. Advantage of Air-gapped Backups With air-gapped target volumes, organizations can protect their mission-critical structured, unstructured, and object workloads from threats like ransomware, virus, failed software-upgrade and human error. The primary function and advantage of air-gapped repositories is to provide a storage location that uses software-defined network to isolate itself from the production environment. In the event of a disaster, the data stored in air-gapped volumes remains available; even if the production environment fails.
  • 7. 3-2-1-1-0 Data Protection Rule with Air-Gapped Volumes The 3-2-1-1-0 rule is an advanced data protection strategy that leverages backup & DR capabilities to ensure high availability, recoverability, and delivers near-zero downtime. The rule states that you need to have three different copies of data, stored on two storage media, with one offsite copy, and one offline copy.
  • 8. Air-Gapping in StoneFly Solutions: Air-Gapped Vault & Air-Gapped Fabric All StoneFly hyperconverged infrastructure and backup and disaster recovery (DR) solutions offer air-gapping as a standard feature. StoneFly air-gapped features are available as Air-Gapped Vault and Air-Gapped Fabric.  Air-Gapped Vault are target storage repositories that can be set up on-premises or in the cloud of your choice using StoneFly’s patented storage OS (StoneFusion and SCVM).  Air-Gapped Fabric provides seamless data management of all air- gapped repositories deployed on-premises and/or in the cloud.
  • 9. Air-Gapped Repositories Air-gapped repositories consist of one virtual storage controller connected to two target storage repositories. One target repository is network-facing, always accessible and available to user-groups, applications, etc. The second target repository is air-gapped, detached, and isolated. Air-gapped repositories can be deployed on popular hypervisors and in the cloud of your choice. Users can define policies to automatically turn-on and turn-off air- gapped repositories.
  • 10. Air-Gapped Controllers Air-gapped controllers consist of two virtual storage controllers connected to one target repository each. One pair of virtual storage controller and target repository are network- facing, always accessible and available to user-groups, applications, etc. The second pair of virtual storage controller and target repository are air-gapped, detached, and isolated.
  • 11. Contact us Address: 2865 Grove Way Castro Valley, CA 94546 USA Phone no.: ☎ 510-265-1616 Email: ✉ sales@stonefly.com Website: www.stonefly.com/veeam-cloud-connect-backup-to-azure