Glossary
Continuous Data Protection (CDP)
What is Continuous Data Protection?
Continuous data protection (CDP) is a backup method that saves all changes to data automatically enabling data recovery to any point in time.
How does Continuous Data Protection work?
As the name suggests, continuous data protection continuously backs up data after every block/file/object modification. This way of backing up data ensures business continuity by allowing users to restore a very recent version of their data. It works by monitoring and recording any changes to data while traditional backups only capture changes at set intervals.
CDP vs. Snapshot Backup
CDP continuously backs up data after every modification, while snapshot backup only captures data at set periods. Major changes can occur between snapshot backups, but with CDP your data is being saved after every single modification.
Benefits of Continuous Data Protection
Minimize data loss: With continuous data protection, your data is being saved in real-time, minimizing the possibility of data loss with accidental deletions, hardware malfunction, or ransomware attacks.
Enhances cyber resilience: With minimal data loss, CDP also reduces downtime. Data can be recovered much quicker when you’re regularly backing up. This eliminates the need for longer, scheduled backups.
Wasabi's Backup Solutions
Whether you’re seeking protection from ransomware or simple user error, backing up to Wasabi is a great way to prevent both data loss and spiraling cloud costs.
We don’t charge for egress or API calls, so you’ll never be penalized for testing or restoring your backups. Your costs are always predictable. And, our single tier of hot cloud storage is faster than our competitors’ most expensive tiers, yet priced closer to what you’d expect to pay for much slower archive storage.
Wasabi is compatible and verified with all of the major backup applications supporting cloud object storage. Wasabi also support file versioning, object lock, and multi-user authorization to provide multiple layers of security to mitigate the threat of targeted or accidental data loss.
Related Links: