Pro+ Content/Storage magazine

Thank you for joining!
Access your Pro+ Content below.
Vol. 5 No. 4 June 2006

What your DR plan should protect

Many DR plans aren't based on the data's value to the company. Here's how to protect your critical data more effectively while reducing costs. A disaster recovery (DR) plan often provides too little protection for critical data and too much protection for less-important data. Important data must be protected from loss or damage caused by human or system error, hacker attacks, viruses, hardware failure or site outages. Protection strategies generally involve keeping a separate copy of the data or a journal of changes; this allows users and applications to access the backup or recovery copy if the primary copy is lost or damaged. Ideally, every recovery copy would be up-to-date and instantly available. However, this level of protection is difficult and expensive to realize, and it's not needed for all applications and data types. Thus, a practical DR plan will set different recovery objectives for different types of data. When framing the DR plan, maintain a clear distinction between your two objectives: preventing data loss and ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Deduplication extends to archives

  • Lock up data with fixed-content storage

    For most companies, fixed-content storage requirements are simple: Store the data securely, do it cheaply and provide fast access. With more data subject to external and internal audits, content-addressed storage products are becoming the preferred storage medium for long-term protection of fixed content.

  • Storage growth drives buying plans

    The results from our exclusive semi-annual Purchasing Intentions Survey are in. Storage growth is a key concern for storage managers, as additional capacity has a ripple effect that touches many other components in the storage environment.

  • Is encryption enough?

    Encrypting data at rest is definitely a reliable security measure, but it should be considered only one component of an effective storage security plan.

Columns in this issue

  • Time to think outside the box when it comes to data protection

    Storage Bin: The concept of "That's the way we've always done it" isn't going to work anymore, and it sure won't help you build an efficient disaster recovery plan. It's time to think outside the box when it comes to data protection.

  • The rise of the ultra-dense array

    by  Stephen Foskett

    Disk drives are getting smaller and smaller even as their capacities rise. Now storage vendors are packing more disks than ever into smaller spaces, which saves costly data center real estate. But the denser arrays also have a downside--higher power consumption and more heat.

  • A look at data classification products for e-discovery

    New technology products that look inside data can help you classify and manage that data more effectively. But these tools can also be leveraged for e-discovery, allowing specific data to be found and acted upon quickly to satisfy legal requirements.

SearchSolidStateStorage

SearchVirtualStorage

SearchCloudStorage

SearchDisasterRecovery

SearchDataBackup

-ADS BY GOOGLE

Close