3 Factors For Successful Backups - InformationWeek
IoT
IoT
Comments
3 Factors For Successful Backups
Newest First  |  Oldest First  |  Threaded View
pelliman950
50%
50%
pelliman950,
User Rank: Apprentice
10/5/2011 | 11:38:13 PM
re: 3 Factors For Successful Backups
Recommended Response: Great post. IG«÷d also like to point out that simplifying backup also starts with thinking about how you manage the information you need to protect. What is your most important data? Are you treating that data the same as the data you havenG«÷t accessed in 6 months? And if you need to hold on to data for a long period of time, Symantec (where I work) recommends you store it in an archive, rather than a backup, that way you can delete information off the primary storage and improve backup.

Symantec recently conducted a survey that reveals 75 percent of backups are on legal hold or have infinite retention and yet the same customers estimated that 40 percent of information on legal hold is not relevant to litigation. Ouch. In addition to backup, recovery, and time as key components to successful backups, we would also suggest the following additions:

3) Deduplicate Everywhere:

The amount of data you move can be significantly reduced by deduplicating within applications (with archiving) and across your IT infrastructure (with backup software).

4) Choose A Solution for Today and Tomorrow:

Splitting up data protection to multiple products for physical, virtual, etc only creates confusion when it comes time to recover. Match workloads to the right data protection technology for a tiered recovery model from within the same backup application. Hitting RPO's and RTO's is also about making it easy for anybody on the team to help.

5) Decide What You Want To Build and Manage:

Do you want to be an IT system integrator? Ask your solution provider what management and delivery models they can offer for you. Now you can have on-premise backup software delivered as an appliance, for fast recovery, and managed by a partner. Or you could go for a full SaaS model if you donG«÷t want anything on premise. Which ever route you go, donG«÷t forget to test your RTO and RPO assumptions.

Peter Elliman
Symantec, Information Management Group


How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll