Top Ten Data Protection Tips - Page 2


Want the latest storage insights?

Download the authoritative guide: Enterprise Data Storage 2018: Optimizing Your Storage Infrastructure

Share it on Twitter  
Share it on Facebook  
Share it on Google+
Share it on Linked in  

7) Cloud Recovery

The key to better DR is to make your DR recoverable more quickly. Traditional DR solutions, however, rely on cold-site or warm-sites that can take days to bring systems and data online

“The ideal scenario for the fastest recovery is a VM that you can power up, not just a pile of data or files that you have to piece back together,” said O’Day. “By modernizing the approach to DR to include on-demand, cloud resources, businesses are finding themselves back online and running production in the cloud in as little as 15 minutes.”

8) Avoid Standardization

While you would think EMC would be fan of centralizing everything on one vendor’s tools, Emsley has an alternate view. He thinks that the most effective data protection strategy involves a full range of processes such as backup and archive to continuous availability. These different applications have different data protection requirements.

“The days of ‘let’s standardize on one data protection point product’ are long gone,” said Emsley.  “Meeting the SLAs associated with different application and data types requires complementary levels of protection. I’d recommend addressing the full continuum of data protection processes holistically, but by applying best-of-breed tools.” 

9) Preventive approach

IT organizations tend to get into a fire-fighting mode of operations. But it is much smarter to transition to a preventative approach, as that ties in directly to the data protection mindset. It’s probably cheaper, for example, to invest in backup and security that it is to have to pay a ransom to some cybergang who just hijacked the corporate network.

“Look for solutions that can automatically and continually verify the environment against risks and provide IT teams with an up-to-date view of the organization's readiness state,” said Doron Pinhas, CTO of Continuity Software. “With this knowledge in hand, IT will be able to identify areas of risk and focus their attention and resources on fixing these issues before they impair business operations and turn into costly undertakings.”

10) Snapshot frequency  

Snapshots are often used as one element of a data protection strategy. But they can be overdone.

“Set the rate at which you want snapshots taken on different types of data, so the most critical and most active data sets will have shorter recovery points,” said Chris Schin, Vice President of Products at Zetta. “That way you don’t waste resources doing frequent snapshots on less critical data.”

Photo courtesy of Shutterstock.

Submit a Comment


People are discussing this article with 0 comment(s)