Edge UOL

    Discover how we transform IT and strengthen the security of the top companies in the market.

    Who we are Careers News

    Cyber Defenseseta

    Integrated security to detect, prevent, and respond to threats.

      Security Operations Center (SOC) Brand Protection | CTI Incident Response Web Application Protection (WAF) Firewall as a Service (FWaaS) Network Access Security Vulnerability Management Patch Management Endpoint Protection Pentest

    Cyber Resilienceseta

    Continuity and recovery to keep your business always running.

      Disaster Recovery as a Service (DRaaS) Anti-ransomware Data Protection Secure Desktops Access Management Data Loss Prevention (DLP)

    Cyber Governanceseta

    Compliance and security culture to elevate your company’s cyber maturity.

      Governance, Risk and Compliance Consulting Security Awareness & Training CIS Controls Maturity Assessment

    ManageEngineseta

    Take control of your company’s IT with integrated and secure management tools.

      Identity and Management Access Service Management Unified Endpoint and Security Management IT Operations Management Security Event Management Analytics

    Hybrid Cloud & Infrastructureseta

    Hybrid and integrated infrastructure to support the evolution of your business.

      Hybrid Cloud | Private Cloud Hosting | Colocation Network Segmentation & Integration

    Edge VMware Cloudseta

    Use hybrid cloud with the security of having the support of one of the most important players in the market.

      Disaster Recovery as a Service (DRaaS) Secure Desktops Edge Computing Network Segmentation & Integration

    IT Servicesseta

    Specialized services to operate and evolve your IT efficiently.

      Cloud Services Intelligent Monitoring and Observability Database, Operating Systems and Network Management ITSM and IT Governance Integration and DevSecOps SAP Basis Consulting Squads

    Private Networksseta

    Provide your company with Private Network solutions that only an end-to-end integrator can offer.

      Consulting Network Management Private Network Implementation (4G and 5G)

    Hosting and Colocationseta

    Outsource efficiently, maintaining control over everything your company needs.

      Colocation

    Payment Solutionsseta

    Handle payment and invoice issuance with credibility, efficiency, and data security.

      BPag - Payment gateway Notanet - Invoice issuing platform
Partners Cases

    Tech Insights

    Tech Insights seta

    Articles, events, and information to go beyond and dive deep into each technology. Be inspired to transform your company.

    Articles E-books Events Web series

    Tech Universe seta

    Learn about technological innovations and how they can benefit your company.

Contact Us EN
  • EN - Inglês
  • BR - Português (Brazil)
Article/

Snapshot and Backup

December 16th, 2022
Infrastructure Services IT Services Managed Services
By Welington Camara
Snapshot and Backup

What is a snapshot?

A snapshot, as the name implies, is a photograph of a virtual machine’s current moment. This snapshot is saved within the storage space of the physical host that contains the virtual machines. A snapshot consists of a copy of metadata and contains pointers used for a possible recovery in the event of a partial or total loss of the virtual machine.

How is a snapshot made?

A snapshot is nothing more than a signaled copy of a version of the current file that makes up the virtual machine with a flag version. Let’s think of it as follows:

According to the illustration, it is evident that with each snapshot taken, a copy of the same file is made with version control and possible incremental changes within that file, specifically regarding metadata.

What is backup?

The word backup in the technology world means a security copy of data from a storage device (tablet, cell phone, computers, and other storage media). Nowadays, there are several tools with solutions for working with backup from major manufacturers, some of which are listed below:

  1. Rubrik
  2. Unitrends
  3. Veeam Backup & Replication
  4. Bacula Enterprise
  5. Acronis Cyber Backup
  6. Cohesity
  7. MSP360
  8. IBM Spectrum Protect
  9. Dell EMC Data Protection Suite
  10. Backblaze

For a backup solution, we must always consider CDP (Continuous Data Protection), which encompasses two important indicators known as RPO (Recovery Point Objective) and RTO (Recovery Time Objective).

RPO (Recovery Point Objective) is the period between one backup and another — for example, a week, a day, or hours. RTO (Recovery Time Objective) is the recovery time for a backup — for example, when asking: “what is the restore time?” — that is the RTO.

Regarding CDP (Continuous Data Protection), we can explain it as a continuous backup planning to ensure data integrity in a structured and effective way.

Difference between backup and snapshot

Although many people understand the process between a snapshot and a backup to be the same thing, they do not serve the same purpose; that is, they are very different demands.

See the following table for a better way to simplify the differences:

In practice, backup is the resource that offers greater security, integrity, and efficacy for storage and recovery requirements. A snapshot, on the other hand, is a temporary backup strategy to assist in short-term recoveries.

Dictionary

  • Snapshot – registered photo of an environment
  • Flag – pointer flag
  • Backup – data copy
  • Rubrik – backup tool
  • Unitrends – backup tool
  • Veeam Backup & Replication – backup tool
  • Bacula Enterprise – backup tool
  • Acronis Cyber Backup – backup tool
  • Cohesity – backup tool
  • MSP360 – backup tool
  • IBM Spectrum Protect – backup tool
  • Dell EMC Data Protection Suite – backup tool
  • Backblaze – backup tool
  • RTO – Recovery Time Objective
  • RPO – Recovery Point Objective
  • CDP – Continuous Data Protection
References:
  • ArtBackup
  • Tecnoblog
  • Bacula Systems
Tags:
BackupEdge VMware CloudSnapshotTechnology

Related

Business

The importance of active listening in pre-sales

Adrielle Santana
Cybersecurity Secure Desktop

Secure Desktop: the future of IT is flexible, secure, and limitless

Rodrigo Rangel Lobo
Infrastructure Services IT Services Managed Services

AI Operations: The Real Transformation of IT Services for Business

Leonardo Schumacher
Infrastructure Services Managed Services

Cloud Yes, but with Governance

Leonardo Schumacher

Get in touch

Our team of experts is ready to support your company with solutions that enhance performance and security.

Contact usseta
Logo Edge UOL

Edge UOL

Who we are Careers News

Partners

Case Studies

Solutions

Cyber Defense Cyber Resilience Cyber Governance Hybrid Cloud & Infrastructure IT Services Payment Solutions

Tech Universe

Cybersecurity Cloud Computing Payment Gateway ITSM and IT Governance Autonomous Operations Digital Transformation

Tech Insights

Articles E-books Events Web series

Contact Us

Grupo UOL
Privacy Policy
Terms of use
Information security
Quality management policy
Accessibility
facebook Edge UOL linkedin Edge UOL youtube Edge UOL instagram Edge UOL
© Edge UOL - 2021 - 2026 - All rights reserved
Logo LVT