In previous articles, we discussed IT transformation in general, IT transformation and security, and the top-down approach to IT transformation. In this article, we discuss migration as a means to IT transformation. Migration as a means to IT transformation hooks into an organization’s disaster recovery procedures, using these existing mechanisms to migrate workloads from on-premises to in-cloud. At that point, the migration can continue to power on workloads to take over for those on-premises, to run side-by-side with what is on-premises, to run cooperatively with those on-premises, or to just be ready in case a disaster requires their use. The fact is that cloud can be a fairly large cost saver over maintaining a hot site within another data center. Instead, you maintain one in the cloud.
Data Protection is much more than verifying that you have a valid backup. While the recovery of your data is important, Data Protection also encompasses data life cycle management, business continuity, disaster recovery, and continuous data protection as they pertain to virtualized and cloud environments. This topic also examines how to secure and monitor the passing of data between disparate environments and how to increase the scale of data to be protected in shorter periods of time. (Read More)
How to manage the security and protection of your environment in order to safeguard your crown jewels has always been important. However, it has never been more so than today, when data-breach announcements are common and everyone from nation-states to teenagers in their bedrooms have access to powerful tools for breaking in.
Aidan Finn commented recently on a Microsoft infographic about How to Kill Your Business in 5 Simple Steps—and they are very good steps to consider. (Thank you to @gilwood_cs for pointing this out to me.) However, regardless of those issues, there is one, just one, simple way to destroy your business these days. Five is a nice number of items to consider, but one item was missing from the list: one item that has already destroyed one business overnight and put countless others at serious risk. That one item can be addressed with one simple question:
It’s that season again! For those who don’t know, I live in Florida, and yes, we do have seasons down here. We have Tourist Season, Lovebug Season, and of course the one we’re best known for: Hurricane Season. With Hurricane Season starting on June first, most companies should have finished their preseason disaster recovery test by now. Oh, how things have changed from the days of flying off to have loads of fun at the remote data center, restoring test objectives from tape to prove we had the capabilities to restore applications and services slated for that specific test.
In Virtual Thoughts episode 2, Rick Vanover (@rickvanover) and I sit down to talk about Veeam Endpoint, the latest free product from Veeam. Endpoint provides a method for backing up your Windows endpoints to and from a backup store. That store can be managed by Veeam Backup & Replication v8 as well. This implies that Endpoint can also run on any modern Windows Server (though that is not the initial intent) or desktop running within the cloud without having a direct Veeam presence within the cloud. Veeam Endpoint runs as an application (read this as agent) within the Windows Server or desktop.
In our ongoing quest to determine how our readers use cloud technologies, our second poll is now available: Which Type of Data Protection Service(s) Do You Use? This poll’s goal is to determine how data protection fits into your organization’s use of the cloud, if it does at all. There are many cloud-based tools for data protection, as well as many integrations between data protection vendors and cloud service providers. We’d like to know if these tools are being used, and if they are, which ones.
How do you measure your data-protection success? This is a question that has plagued many folks. Data-protection success could be measured by cost savings, peace of mind, recovery success, or the number of support tickets opened to achieve true data protection. Most likely it is a combination of all those items.