• 09 APRIL 2020
  • Tricks
  • 45 DAKİKA

Three, Two, One, Cloud :)


The countdown in the form of 3-2-1 evokes that a race or action will start in our daily life, and today a critical digital race has been started with the 3-2-1 rule of informatics in our business life.

The interesting thing is that individual use of technology (with cloud computing) managed to take part in a race in front of the business world for the first time. The growth of digitized data at an unstoppable pace and the need for the data to be securely accessible at any time entailed the organization of this race. Today, we begin to create digital content from the moment of birth, each of us continues to produce data from numerous sources such as applications, emails, presentations, online platforms, etc. in business life.   The question is, while we are accustomed to storing our individually created data on cloud backup platforms (we will never know where it is in the world) that our phones or mailboxes offer us, do we manage to keep it with the same sensitivity (besides worrying) when it comes to the security of our business data that is considered as the fuel (capital) of our corporate world? 

So how did individuals manage to use the technology before the companies for the first time in the history of technology?
Until today, the use of advanced technology started primarily in the corporate world (except for the public sector) and then entered our individual life in the course of time. Let's take the internet and computers as the simplest example; first of all, military and civil projects of the states started to use them, and then, due to its high cost, the priority use of the private sector is seen, and only then it entered into our lives with accessible models to meet our individual needs.

The “pay as you go” model essentially offered by cloud computing and the equal opportunity in technology resulting from this reversed this order. The business world, which started to adapt the blessings of cloud computing with a phase difference, took the first step by moving disaster recovery systems and backup infrastructure to Data Insurance services offered with cloud computing infrastructure.

This is exactly the moment the race in the corporate world that we are talking about has started: What is the 3-2-1 rule of informatics?

On the corporate side, the technology is triggered by the needs. The trigger that brought cloud computing to its present state was the desire of Amazon, after establishing an uninterrupted computing infrastructure to meet the rising online demands in the periods of new year, to open its capacity, which remained idle at other times of the year. Today, the most popular method accepted in the world to protect the data, which is considered among the most valuable assets of the institutions, and to ensure business continuity has been introduced with the name 3-2-1.

•    The data must have at least 3 copies
•    These copies must be stored on 2 different storage types.
•    At least one copy must be kept offsite.

So 3-2-1: Where is the cloud in this?

It is at the very heart of this rule, that is, it provides you with all the infrastructure you need in this process (backup software, access, data storage space, monitoring, management). It also prices them on the basis of the size of the data stored monthly, without any advance payment. You can return to your data backed up by encrypting whenever you want, or if you wish, it can be turned into live systems with disaster management in the area, where they are backed up. In the meantime, you decide the data centre, where your data will be stored within or outside the country.

By reaching the Petabytes level in data size initially stored in its own environment, BulutBroker, our country's pride in this field (Data Bank), is able to provide quality service with service level agreements brought in by working with service providers that are only operating in this field.

What factors should be considered when backing up data?

  • What kind of data backup system needed should be determined by considering the structure, data flow and amount of data of institutions.
  • A hardware and program that ensures logging in accordance with the conditions specified in the law must be used in order to keep the institution safe and to fulfil the requirements of Law No.5651.
  • If possible, your backups should be kept in a physically different place outside the institution (rule number 1 of 3-2-1).
  • Data should be protected under a high security infrastructure. If this location is a data centre outside the institution, it should be ensured that this data centre is at least TIER 3+ considering today's conditions.
  • Maximum security must be ensured by storing multiple copies of the data in different locations.
  • Backups must be taken frequently and at regular intervals. BulutBroker
    • In addition to the need for a backup every day, even one hour of data is no longer tolerated in many areas. For this reason, systems capable of real-time data backup should be preferred.
    • It is also critical to adjust the backup frequency according to the way the companies do business by looking at the backup system, the type, amount of data to be backed up, the rate of change of the backed up data over time, and maximum data loss. A single solution should not be applied for different needs; a specially designed backup plan should be prepared for each corporate need.
    • The backups taken must be stored on another disk other than the server which is actively used.
    • It must be possible to subject multiple servers to backup process simultaneously, the operating systems must be capable of backing up the log files in full and simultaneously, and operating systems must be capable of taking the backups of the applications running on them without shutting down the system.
    • Attention should be paid that the computer/external data storage space, where your backups located, are not connected to the internet.
    • If only data is backed up, big time and money losses in hardware failures (if you don't have spare parts) might be experienced. Therefore, it may be beneficial to have spare equipment. Virtualization should be preferred to avoid damages that may arise from hardware problems.
    • Unfortunately, we witness that the damage to the stored data for any reason causes serious damage to the working processes of the institutions. Failure to restore the stored data after a major disaster may have serious consequences that may cause the institution to discontinue its commercial activities. Therefore, you should both back up your data and also run regular tests to make sure that these backups work in harmony with your business processes. I remain


Yours Faithfully,

Orçun M. Özalp

İletişim Formu

İletişim Formu