Planning Data Protection Strategy Around the Business Case

When formulating a data protection strategy, companies should build their strategy around the business case and not the latest in hi-tech buzzwords and pseudo-philosophies. The best way to currently achieve this is formulate a data protection strategy using the business needs of the company and paying close attention to the data type and volume necessary for the efficient running of mission critical applications.

In the current business climate, companies are extremely lean as they work to maximize the use of their assets and deliver ROI - in many instances, businesses are working so close to the bone because it is a matter of business survival in the economic recession. This makes them far more susceptible to even small-scale and short-term loss of their network functionality which increases the business risk they are exposed to.

To create a data protection strategy which is effective and reliable, companies should first consider the business processes and identify critical data assets. Once this is done, decisions must be made regarding what data protection tools are available (given budgetary constraints) to protect these processes and data assets. This will maximize the protection that can be delivered and place a constraint on unnecessary spending on software, equipment and support which is not needed to achieve the company objectives.

Analyzing data assets and business processes will uncover which are mission-critical and the degree of risk to which loss of their use the company is exposed to. It should also uncover the level of risk the individual asset and process classes are exposed to and in turn, what their loss means to overall business function. Essentially, you will be prioritizing which data and process classes represent critical need and value to the business.

In addition to the internal business case, there are regulatory requirements to meet in the event of disaster or other loss of critical data and downtime of business processes. Given the increasing activity of financial regulators at home and abroad in the wake of the near-total global banking collapse which was very narrowly averted last year, regulators of all shades are waking up to the fact that current data protection and DR strategies may not be robust enough to handle data loss or a business' ability to continue with short-term loss of critical processes.

In practice, this will require a blending of a range of techniques and technologies - no vendor has all the solutions and one size does not fit all!

Enterprise storage technologies currently on the market vary but server virtualization is touted as being the best thing since sliced bread but, and it is a big "but" - they are not the complete answer. Server virtualization has its place but it is simply one tool in an effective data protection strategy. We should not ignore data replication, off-site storage or building in network redundancy and disaster recovery.

The current lack of storage standards only adds to consumer confusion; vendors such as HP, IBM and EMC have yet to adopt W3C standards which make it imperative that consumers partner with a storage solution provider so they know what they are buying when putting into effect their data protection storage strategy.

Lawerence Reaves works for PLANIT Technology Group, a leading provider of Richmond enterprise storage and Virginia Beach network security. PLANIT can be found online at: PLANITTech.com

Article Source: http://EzineArticles.com/?expert=Lawrence_Reaves

0 comments:

Post a Comment

Best Brands

Anti Virus (5) Antivirus 2011 (1) antivirus terbaru (5) aplikasi gratis (2) Apple (1) Avira Antivir terbaru (1) berita teknologi (28) Bisnis Onlie (3) Bisnis Online (2) Blogvertise (1) Browser (3) Cara cari uang di Internet (1) Custom Blog (1) Dampak Teknologi Informasi (2) Digital Camera (6) Domain (1) download (9) ebook (1) error pada shoutmix (1) Excel (1) Facebook (8) Free Webhosting (1) Game (1) google (1) GPS (1) Handphone (3) Hardware (13) Hosting (1) HTML (1) IMCrew (1) Internet (24) Internet Explorer (1) iPAD (1) iPhone (1) Jaringan Komputer (7) Kebijakan Pemerintah (1) Kolom Tutorial (25) Komputer (5) Komputer terbaru (2) LAN (9) Lapop (3) laptop (1) Laptop 3D (1) laptop blue screen (2) Links Exchange (1) Linux (6) Makalah TIK (2) Materi Pembelajaran TIK (11) Materi TIK SMP Kelas 7 (16) Materi TIK SMP Kelas 8 (6) Materi TIK SMP Kelas 9 (2) mengatasi blue screen (1) Mengatasi komputer hang (1) Microsoft Office (8) monitor (1) Mouse (1) Netbook (1) Nokia (2) Notebook (10) Operasi Dasar Pada Operating System (1) Operating System (13) optimasi blog (3) Paid Review (1) paypal (1) PC (3) Pengantar Ilmu Komputer (4) Pengenalan komputer (2) Pengolah Grafis (1) PerananTeknologi Informasi (2) Perangkat Keras (3) Perangkat Lunak (1) Perkembangan TIK (14) Pernanan Teknologi Informasi (3) Photoshop (1) Ponsel (1) Pornografi Blog (1) PowerPoint (1) Powersuplly (1) PTC (1) Review Program (1) Samsung (1) Search engine (1) Sejarah Komputer (6) Sejarah TIK (2) SEO (2) Sistem Operasi (2) Smadav 8.4 (1) Smadav Januari 2010 (1) SMS (1) Soal TIK (2) Software (30) Software Pengolah Gambar (1) Teknologi Informasi (3) TIK (1) tips and trik (1) Tips and Triks (14) Twitter (1) Ubuntu (2) Video (1) Virus Komputer (2) Windows (5) Wireless (5) Yahoo (1)