Backup and Recovery Challenges with Sharepoint


Click here to download now

Source: HP/Autonomy
Date: May 2010
Type: White Paper
Rating: (2)

Overview: Almost 70% of organizations these days are either planning or already have SharePoint deployed as a platform for collaboration within their IT infrastructure. But with this success we are seeing SharePoint go through the same growing pains many other Microsoft products went through in their initial success stages. With the high-speed adoption of Exchange in the mid-1990s, we saw the volume of information grow to where the backup systems started to buckle under the ever-increasing amounts of data. As end users massively start to embrace SharePoint for their daily activities, the same growth trends are resulting in extreme growing pains for SharePoint. More and more business-critical information resides in SharePoint which means that SharePoint itself is rapidly getting higher on the list of mission-critical applications within the enterprise.

If this is the case in your organization, a proper data protection plan for SharePoint should be part of your daily operations. Since SharePoint itself consists of multiple components that can be highly distributed, simply leveraging the standard backup functionality thatís available is becoming increasingly inadequate as a comprehensive solution to protect the entire farm and its valuable data.

Like with other solutions, with SharePoint the real challenge is not the backup part, but the recovery of information from the backup environment. SharePoint itself has become easier to deploy and to manage, but the protection of the valuable data in a SharePoint farm

Not what you're looking for? Search again
Go Advanced »
More From the Data protection Section

View All Categories

Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management

Development : Architecture & Design, C/C++, Database, Development Tools, Embedded Systems, High Performance Computing, Java, Mobility, Security, Web Development, Windows/.NET, Open Source

Government : Cloud/SaaS, Enterprise Applications, Enterprise Architecture, Federal, Information Management, Leadership, Mobile & Wireless, Policy & Regulation, Security, State & Local

Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers

Healthcare : Policy & Regulation, Leadership, Security & Privacy, Mobile & Wireless, Electronic medical records, Clinical information systems, Administration systems, Interoperability, The Patient

Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services

Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business

Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends

Mobility : 3G Wireless/Broadband, 802.11x, Fixed Mobile Convergence, Mobile Business, Mobile Messaging, Muni Wireless, RFID, Smartphones, Wi-Fi VOIP, Wi-Fi/WiMax, Wireless Security, WLAN

Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds

Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats

Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services

Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services

Storage : Data protection, Disaster Recovery, Removable/Portable Storage, Security, Storage Fabrics, Storage Systems, Virtualization

Telecom : VOIP, Unified Communications, Voice services, PBXs, Call Centers, Presence, Collaboration Systems, Business, Regulation, Internet policy

Windows/Microsoft : Applications, Internet Explorer, Microsoft Company News, Office Suite, Open Source, Operating system, Security


More Storage Resources

Ovum Decision Matrix: Selecting an Application Performance Management Solution, 2014-15
IBM is rated #1 in this Ovum Decision Matrix - Application Performance Management (APM) report. To help IT decision-makers choose the right solution, this Ovum Decision ......

More On Storage