{"id":49790,"date":"2019-07-31T07:06:35","date_gmt":"2019-07-31T07:06:35","guid":{"rendered":"https:\/\/blog.open-e.com\/?p=49790"},"modified":"2025-04-08T08:39:59","modified_gmt":"2025-04-08T08:39:59","slug":"data-threats-and-countermeasures","status":"publish","type":"post","link":"https:\/\/www.open-e.com\/blog\/data-threats-and-countermeasures\/","title":{"rendered":"Data security risks and Open-E JovianDSS countermeasures"},"content":{"rendered":"<p>\t\t\t\tNowadays, it\u2019s all about the data. Continuous and uninterrupted data availability is a must for all businesses. Unfortunately, there will always be a risk of sudden accidents that can make day company data vulnerable. This, in turn, leads to huge money loss and the danger that critical company data will be exposed to an unauthorized audience. Additionally, theft, natural disasters, system failures, power outages, and many more can have impact on every company as literally, everyone is a target. Companies which don\u2019t have a solid disaster recovery plan, plus tools that prevent data loss or help in retrieving the lost data, can face troubles that will be very difficult to get out of.<\/p>\n<p>Open-E JovianDSS is a storage software that can be a reliable element of your business continuity and disaster recovery plans. Open-E JovianDSS provides you with peace of mind and time to do what you are really good at \u2013 running your business. What types of risks companies deal with and how Open-E JovianDSS can help them?<\/p>\n<p>&nbsp;<\/p>\n<table style=\"text-align: center; font-family: Open Sans;\" width=\"1379\">\n<tbody>\n<tr style=\"background: #9b9b9b;\">\n<td style=\"text-align: center; font-size: 18px; color: #fff;\">Risk<\/td>\n<td style=\"text-align: center; font-size: 18px; color: #fff;\">Open-E JovianDSS Solutions<\/td>\n<\/tr>\n<tr style=\"background: #f7f7f7;\">\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; color: #333;\"><strong>Virus attack<\/strong><\/td>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\"><strong>Snapshots<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\">A virus or ransomware can delete or encrypt your data thus making it unusable.<\/td>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\">With frequently created snapshots, you can precisely pinpoint the most recent copy of data that are not infected and, as a result, minimize the downtime and loss of valuable information.<\/td>\n<\/tr>\n<tr style=\"background: #f7f7f7;\">\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\"><strong>Data corruption<\/strong><\/td>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\"><strong>Self-healing<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\">Even the best, enterprise-grade HDDs and SSDs can develop small errors in data stored on them that \u2013 when untreated \u2013 can lead to major data corruption issues in longer time.<\/td>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\">ZFS built-in data self-healing mechanisms constantly check the integrity of data and correct any mistakes at early stages where there are enough checksums data available to avoid any data loss.<\/td>\n<\/tr>\n<tr style=\"background: #f7f7f7;\">\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\"><strong>Disk failure<\/strong><\/td>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\"><strong>RAID<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\">All disks can fail, even the most robust enterprise-grade drives. Once there is a failure of the whole drive, extracting data from them is a very expensive and time-consuming process usually requiring sending the physical device to specialized data recovery companies. Costs could be as high as $1000 per gigabyte, making recovery of modern large drives economically unjustifiable.<\/td>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\">ZFS has built-in hardware-independent redundancy mechanism similar to RAID that makes possible creating storage entities (disk groups within pools) that allow one or even more drives to suffer complete failure while keeping the data safe and providing uninterrupted access. Failed drives can be replaced without any interruptions to restore the highest possible data security protection.<\/td>\n<\/tr>\n<tr style=\"background: #f7f7f7;\">\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\"><strong>Rebuild failure<\/strong><\/td>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\"><strong>Additional RAID<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\">While replacing a failed drive, the errors which can stop the process can occur causing the whole process to be reinitiated.<\/td>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\">RAID-like disk groups: 3- or more way mirrors, RAIDZ-2 and RAIDZ-3 allow more than one drives to fail at any single point in time.<\/td>\n<\/tr>\n<tr style=\"background: #f7f7f7;\">\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\"><strong>System failure<\/strong><\/td>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\"><strong>Backup server<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\">Sometimes the whole system might fail and not be operating at all, e.g. motherboard or CPU failure.<\/td>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\">Backup server keeps copies of all data from the main production server and when necessary, it can use them to recreate the original production data.<\/td>\n<\/tr>\n<tr style=\"background: #f7f7f7;\">\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\"><strong>Downtime<\/strong><\/td>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\"><strong>High Availability<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\">During typical lifecycle of data storage servers there might be several occasions when the system will have to be shut down for a brief period of time: software and hardware upgrades, changing or rearranging physical locations of the servers etc.<\/td>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\">High Availability cluster connects two servers and allow them to \u2013 under typical circumstances \u2013 combine their both computational power to provide better day-to-day performance and when one of the machines is down, to make the other take all of its duties.<\/td>\n<\/tr>\n<tr style=\"background: #f7f7f7;\">\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\"><strong>Natural Disaster<\/strong><\/td>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\"><strong>Remote server<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\">Natural disasters like fires, floods, earthquakes, hurricanes etc. are hard (if possible at all) to predict and can make local servers down for days, weeks or even longer.<\/td>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\">Remote backup server that runs full version of data storageOS can take over the duties of main production server for prolonged periods of time and, therefore, maintain continuity of operations for the whole time of rebuilding the primary location from the disaster. Once hardware at the primary location is operational again, this server is also used to send the data back.<\/td>\n<\/tr>\n<tr style=\"background: #f7f7f7;\">\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\"><strong>Theft<\/strong><\/td>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\"><strong>Remote server<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\">Advanced data storage servers are expensive equipment that can be either sold as a whole or (more often) in parts on the black market. This make them an attractive target for thefts and robberies.<\/td>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\">Similarly as with the case of natural disaster, a fully-featured remote backup server can take over the duties while the original server is either being recovered or replaced by a new unit.<\/td>\n<\/tr>\n<tr style=\"background: #f7f7f7;\">\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\"><strong>Human error<\/strong><\/td>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\"><strong>Remote server<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\">Last but not least \u2013 poorly trained, lousy or ill-intentioned administrator can do a lot of damage to your data, including deleting them completely.<\/td>\n<td style=\"text-align: center; line-height: 15px; padding: 15px 15px; font-family: Open Sans; color: #333;\">Remote backup server is able to temporarily take over the duties of the main production server.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><\/h3>\n<h3><\/h3>\n<h3>Closing Notes<\/h3>\n<p>The final conclusion that should be drawn is to be careful and stay always a step ahead when it comes to data protection strategy. Keeping the company safe and able to recover its assets in case of problems, is the best way to prevent the emergency. Open-E JovianDSS can help to defend your business from natural disasters and system failures, and we all know \u2013 accidents happen to everyone. Don\u2019t let them to hit your business by surprise.<\/p>\n<p>Read more about Open-E JovianDSS on the<a href=\"https:\/\/www.open-e.com\/\"> Open-E Website &gt;&gt;<\/a>\t\t<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nowadays, it\u2019s all about the data. Continuous and uninterrupted data availability is a must for all businesses. Unfortunately, there will always be a risk of sudden accidents that can make&nbsp;&#8230;<\/p>\n","protected":false},"author":2,"featured_media":50404,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[14,29,18,777,27,28,785],"tags":[86,171,195,469,523,570,577,590,608,752],"class_list":["post-49790","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-backup-storage-technology","category-data-protection","category-hardware","category-iscsi","category-open-e-joviandss","category-raid","category-san","tag-backup","tag-countermeasure","tag-data-replication","tag-open-e-joviandss","tag-raid","tag-risk","tag-san","tag-security","tag-snapshot","tag-zfs"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/posts\/49790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/comments?post=49790"}],"version-history":[{"count":1,"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/posts\/49790\/revisions"}],"predecessor-version":[{"id":55098,"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/posts\/49790\/revisions\/55098"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/media\/50404"}],"wp:attachment":[{"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/media?parent=49790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/categories?post=49790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/tags?post=49790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}