Containers Are Temporary, But Container Data Is Not

Containers are maturing and becoming an essential technology for organisations as they implement an application-modernisation strategy.

With all their code consolidated into a single package, containers can be spun up quickly and seamlessly moved from one computing environment to another. They can also be spun down when their work is complete, so they don't consume resources while sitting idle.

That's a massive bonus for developers. With containers, it is now feasible to move an application from a testing environment to a live production environment - or migrate from a physical machine to a virtual machine in the cloud.

Containers also enable developers to reuse code as they focus on building high-value software. That is one reason why it is projected that as much as 80% of workloads will shift to containers by 2023.

Despite all their upsides, one big challenge comes with containers: data storage and protection. Containers are temporary by nature. But storage, by its nature, is permanent. As they quickly spin up and take down containers, organisations find that containers' lifespan is often shorter than the data they create.

Data storage can't live by the same rules as containers: continuous creation and destruction. Instead, container data must be backed up and stored to protect against such risks as system outages and the data loss that can happen during the migration and deployment of new applications.

As companies look to ramp up their container strategy, most fail to understand that a robust and reliable data backup and recovery plan is a necessary part of that strategy. After all, if a company loses any mission-critical data during any stage of the container's development, it could potentially put its investments at risk.

Containers and containerised applications need a place to store and secure their historical data. Why? Because that data holds essential value to the organisation. For compliance or other reasons, container data needs to be stored and protected long after the container has been spun down.

Data Protection Is On You

One misunderstanding is that if containers are stored in a cloud service, data is automatically protected, and a complete recovery plan is in place. It is simply not the case. Cloud providers offer a baseline service for running containers and orchestrating their operations. But it's still your data, so you need internal policies to protect that data and recover it with minimal loss in the event of an incident.

It's important to remember that data consumed by containers is not a time-based process, with scheduled backups every few minutes or hours. Instead, it is event-driven. For instance, if you modify a container but don't get the results you anticipated, you'll probably want to revert that container to the previous state. But to do that, you need a proper backup of that previous state. These scenarios now make data storage a front-burner issue for IT developer teams.

So how can you ensure that your data is securely stored and backed up when using containers?

  • First and foremost, don't assume containers are immune to disasters or threats. All container applications and data should be part of your overall data resilience and protection strategy. The onus is on you to adequately secure every container in your environment.
  • You must also ensure that you protect the place where the data is stored, including the systems, the storage devices, and databases housing copies of your data. And as you expand your containerisation efforts, you must ensure your overall disaster recovery strategy can evolve to accommodate new data generated by emerging technologies and next-generation applications.

The Time To Tackle Backup Is Now

The bottom line is that properly backing up your data is still critically important and will only grow in importance in the days, months, and years ahead. As more organisations continue to embrace containers, they will create more data that needs to be backed up, stored, and protected.

Yes, containerisation brings a lot of new benefits to application development. But it also brings new challenges to data backup and recovery.

For this reason, organisations must pay serious attention to storing and securing their data processed by containers. If they do it now and do it right, they can enjoy the many advantages containers offer and move forward with confidence that their data is safe.

Florian Malecki is Executive Vice President of Marketing at Arcserve

You Might Also Read: 

Think Carefully Before You Pay For Cloud Downtime Insurance:

 

« Three Simple Steps To Effective Cybersecurity
How to Manage Cybersecurity Staff Shortages »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Riverbed Technology

Riverbed Technology

The Riverbed Network and Application Performance Platform enables organizations to visualize, optimize, accelerate and remediate the performance of any network for any application.

Lakeside Software

Lakeside Software

Lakeside Software is how organizations with large, complex IT environments can finally get visibility across their entire digital estates and see how to do more with less.

Procilon Group

Procilon Group

Procilon Group specialize in the development of cryptographic software as well as strategic advice on information security and data protection.

LEADS

LEADS

LEADS is considered as a leading ICT Solution Provider and an IT partner of choice in Bangladesh.

eCosCentric

eCosCentric

eCosCentric provides software development solutions for the IoT, M2M & embedded systems market.

Stamus Networks

Stamus Networks

Stamus Networks offers Scirius Security Platform solutions that marry real-time network traffic data with enhanced Suricata intrusion detection (IDS) and an advanced analytics engine.

BrandShield

BrandShield

BrandShield is an anti-counterfeiting, anti-phishing and online brand protection solution.

Elpha Secure

Elpha Secure

Elpha Secure provides a comprehensive cybersecurity solution, combining technology and insurance to protect against cyber threats.

ARCON

ARCON

ARCON offers a proprietary unified governance framework, which addresses risk across various technology platforms.

Open Data Security (ODS)

Open Data Security (ODS)

Open Data Security is a market leader in the information security sector, offering services to companies, governments and individuals, helping them shield from hackers and cyber attacks.

Cloud Seguro

Cloud Seguro

Cloud Seguro are leaders in the development of cloud solutions, Ethical Hacking, Privacy and Information Security.

Sequentur

Sequentur

Sequentur is an award-winning Managed IT Services company. We are SOC 2 certified and provide Managed IT Services and Cybersecurity services to businesses nationwide.

Bulletproof Solutions

Bulletproof Solutions

Bulletproof provides IT expert support, services, and guidance to businesses small and large as they grow and adapt to today’s complex IT, cybersecurity, and compliance needs.

Scalarr

Scalarr

Scalarr is an innovative, next-generation cyber security firm focused on automation and AI to detect and prevent threats in mobile and Edge/IoT infrastructures.

Hexagate

Hexagate

Hexagate is at the forefront of blockchain threat prevention and automated risk management, proactively detecting and mitigating threats to smart contracts and onchain assets.

TDi Technologies

TDi Technologies

TDI Technologies' flagship solution ConsoleWorks, is an IT/OT cybersecurity and operations platform for Privileged Access Users.