Data Protection

Data Protection is much more than verifying that you have a valid backup. While the recovery of your data is important, Data Protection also encompasses data life cycle management, business continuity, disaster recovery, and continuous data protection as they pertain to virtualized and cloud environments. This topic also examines how to secure and monitor the passing of data between disparate environments and how to increase the scale of data to be protected in shorter periods of time. (Read More)

How to manage the security and protection of your environment in order to safeguard your crown jewels has always been important. However, it has never been more so than today, when data-breach announcements are common and everyone from nation-states to teenagers in their bedrooms have access to powerful tools for breaking in.

VirtualizationBackup

Priorities of Uninterrupted Data Access

VirtualizationBackup

Those of you who know me know that disaster recovery is a topic that is near and dear to my heart. For those of you whom I have not had the pleasure of meeting, I have spent most of my professional career working in Florida; I hope that offers a little insight into my special interest in disaster recovery.

Read More

VirtualizationBackup

Copy Data vs. Data Protection

VirtualizationBackup

Copy data software is becoming much more prevalent and could be a replacement for many data protection products. But is it? Do copy data solutions provide data protection or just movement of data around the cloud? That is really the crux of the discussion. Is having multiple copies of data out in the cloud sufficient for data protection, or do we need more?

Read More

VirtualizationBackup

Software-Defined… Backup?

VirtualizationBackup

There are three pillars to the software-defined data centre (SDDC): software-defined compute, software-defined storage, and software-defined networking. Without any one of these three, the whole edifice of the data centre falls down. We build all three to be resilient, “designed for failure,” and robust. Each can be built and rebuilt from scripts that are stored in distributed version control systems. But at the bottom of every application stack in our SDDC, there is a database or file store that cannot—by definitionbe re-created from scripts. This is the core data that we mine and make profit from. What happens if (or when) the edifice collapses? How is that core data protected, and is traditional backup up to the task?

Read More

VirtualizationBackup

Part II: Do Containers Change Enterprise IT?

VirtualizationBackup

In Part I of this series on Do Containers Change Enterprise IT, we discussed the impact of containers on security. This time, we will discuss the impact on data protection, which encompasses backup, disaster recovery, and business continuity. Since the applications are changing with the use of containers to be highly distributed and deployed through infrastructure as code, what to protect now becomes a major question. How we protect is well known, but what changes once containers are in use.

Read More