Premium Content

Access "Align data protection with business importance"

Published: 18 Oct 2012

There's a big difference between backup and business continuity. Any-point-in-time technologies can extend data protection so that application use is protected as well. By Jeff Boles Today's businesses carry a thread that stretches back to the beginning of the historical record -- every business still revolves around some valuable resource. For modern businesses, that valuable resource is digital information. But when it comes to protecting that information, the digital era has brought with it exposure to more threats from more directions than ever before. These threats can come from employees, bad software, faulty hardware and numerous other sources. A business risks not only a potential loss of information, but also the loss of "use" of the associated information system, which is an irrecoverable loss of time. Most veteran data storage managers have painful tales of the consequences of loss of use. It may start with something as simple as a transactional messaging system that loses messages into the ether during an outage. And dropped messages can mean ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Unified storage offers savings and efficiency

      Unified, or multiprotocol, arrays put file and block storage in the same box. It's convenient and, according to our survey, an efficient way to manage storage.

    • Hospitals strive for centralized image archives by Beth Pariseau, News Writer

      New regulations mandate the digitization and retention of medical records, leaving hospital IT pros looking to cut costs by centralizing image archives. But there are many technical and political hurdles to overcome.

    • Create a storage service for your company

      Often maligned (but more often misunderstood), the ITIL framework can help transform your storage environment into an efficient storage service organization.

    • Using iSCSI storage with vSphere

      To realize the greatest benefits of a vSphere installation, you need networked storage. iSCSI is a good fit for vSphere; here's how to make it work.

    • Continuous data protection; it's back! by W. Curtis Preston

      When CDP products first appeared a few years ago, the benefits were clear, but implementation and other issues quickly stifled interest. Now CDP is making a comeback, and it might just be the future of data backup.

  • Columns
    • Align data protection with business importance

      There's a big difference between backup and business continuity. Any-point-in-time technologies can extend data protection so that application use is protected as well.

    • The new primary storage

      A technology borrowed from backup may end up the biggest thing to happen to storage in a long time.

    • Cloud storage ecosystems mature by Terri McClure

      Vendors have emerged that provide a bridge to cloud storage services, as well as extended security, availability and portability to cloud storage service provider offerings.

    • IT still an awkward fit at most companies by Tony Asaro

      However you look at it -- top down or bottom up -- most IT operations are treated as expense centers, fiefdoms or afterthoughts, rather than critical parts of the business.

More Premium Content Accessible For Free

  • The state of flash storage technology
    storage_0914.png
    E-Zine

    In a relatively short time, solid-state storage has made an indelible mark on storage systems and data center environments. Today, few arrays ship...

  • Big data storage challenges: Speed, capacity and HDFS integration
    big_data_hadoop.png
    E-Handbook

    Big data infrastructure and analytics are some of the hottest technology topics today, and it can sometimes seem impossible to dissect and digest all...

  • Moving target: Endpoint backup
    storage_0814.jpg
    E-Zine

    Mobile workers are now accessing, creating and modifying data on ultra-portable devices such as smartphones, tablets and phablets. Most companies ...