This is a subject that I feel strongly about, enough so that I recently wrote an article on this topic for the online publication Data Center Knowledge called Ask These Five Questions for Data Protection Peace of Mind. In it, I call attention to an uncomfortable fact: Many of the new—and often very useful—technologies that we have incorporated into data centers for greater flexibility, scalability, and ease of use, have made data protection much more challenging. If businesses are counting on legacy data protection strategies to fully recover data from their increasingly complex computing environments, then they are in for a surprise when a data loss event strikes.
What technologies and strategies make today’s data centers more difficult to protect than in the past? They include virtual machines and Docker containers; use of cloud-based apps like Office 365 and Google Docs; and an abundance of endpoint devices like tablets, smartphones and laptops that often contain much of a company’s most recent and valuable data. As I discuss in my article, this proliferation of platforms, data types, infrastructures, and operating systems within a single enterprise environment often results in a fragmented data protection strategy that’s costly, difficult to manage, and filled with gaps.
Nobody predicts that computing environments are going to get less complicated, and we all know that the volume, velocity, variety—and importance—of data for business will only grow. Forward-focused businesses require a more comprehensive approach to data protection, one that converges both backup and replication technologies into a single, easily managed solution. With Asigra, businesses can take advantage of a solution that backs up data from any source—from the data center, the cloud, or a smartphone—and stores this data both locally and remotely to achieve business continuity and peace of mind.
Are you confident that your company’s data protection plan (or the data protection plan that you offer your customers) fully protects all data from all sources, with the ability to meet strict RTOs and RPOs?
If you’re not certain, be sure to read my article to find the five questions you need to ask as you begin your search to find a more comprehensive secure data protection solution. What are the top data protection requirements for your business? Let me know – I’d love to hear from you.