This article first appeared in "Storage" magazine in the September issue. For more articles of this type, please...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
What you will learn from this tip: How to develop a project-oriented approach to laptop backup that will protect your critical data.
The scope of laptop backup can present a daunting challenge. After all, backup policies, operations and management of thousands of distributed systems are difficult, even under the best of circumstances. Rather than simply delve into the latest versions of available backup tools, smart storage managers should take a project-oriented approach to laptop backup by following these five steps:
- Determine the scope and business strategy. The brute force approach to laptop data protection would be to back up all laptops all the time. This would accomplish the goal of protecting critical mobile data, but at a heavy capital and operational cost. A more prudent strategy is to find a solution that meets business, financial and technical goals. How many users should really be covered? What's the actual data that needs protection? Is the data unique or do copies of that data reside on corporate (and protected) assets? Where do the users live? Are they truly remote or do they travel out of the home office? What type of network access do these users have -- broadband or dial-up? Answering these questions will determine the real need and give IT architects a blueprint for the appropriate solution design. Explore your technical options. Some storage managers may immediately default to a familiar Legato or Veritas backup product. This may be the right direction, but these systems were architected for server backup, so it's worthwhile to investigate more PC-centric alternatives such as iFolder from Novell or LiveBackup from Storactive. Because of their PC-friendly architecture, these tools may provide administration, management and reporting benefits for enterprises that want to manage laptop backup independent of back-end systems. Given the cost and administrative effort of backing up numerous distributed systems, it's also worth considering backup services from providers such as Arsenal Digital, Connected and LiveVault. A backup service may look pricey at first glance, but could actually be a bargain on a TCO basis. To do a true comparison, build a model that factors in administrator time, software licensing, maintenance and equipment costs.
- Link data protection with laptop security. Backup is critical, but you also want to protect your assets against theft and minimize damages if a laptop gets stolen. To implement best practices, storage managers should engrave laptops with company names and serial numbers, password-protect laptops at the BIOS and system level and encrypt file systems or critical directories. For the most critical-use laptops, consider physical locks and cables from Kensington or Kryptonite as well as alarms and tracing services from companies such as Caveo, Targus and TrackIT.
- Train administrators and users. If you decide to administer a solution on your own, make sure that administrators and help desk personnel are well trained and can spot and remedy problems as they arise. This not only involves product training, but also means understanding user requirements, business processes and IT methodologies. Users should monitor backup activities, report problems and help storage managers improve their backup processes through regular feedback. On the security side, it's up to laptop owners to be attentive to security and use common sense to protect their systems and the mission-critical data they contain.
- Develop a process for laptop replacement. Inevitably, even the most meticulous data protection can't prevent the occasional laptop theft or damage. What happens when your best salesperson's laptop dies on a key sales call at the end of the quarter? Smart storage managers will anticipate these occurrences by creating a laptop replacement process. Again, the key here is to assess the business need. Keep a few spares on site to overnight to remote users who need immediate replacement and make sure you can rebuild the laptop and files so you can ship a bootable, no-hassle system. For the majority of users who can work on a borrowed laptop for a few days, build a more cost-effective process that's less of a fire drill, but efficiently provides a replacement unit.
Laptops are ubiquitous and important pieces of the overall IT infrastructure, so data protection can be just as important for mobile devices as it is for back-end systems. To adequately protect the potentially massive amounts of data stored on these devices, enterprises must acknowledge the importance -- and risks -- of mobile computing tools and start building processes to protect their data.
Read the rest of article tip in Storage magazine.
For more information:
About the author: John Oltsik is a senior analyst and storage industry veteran at the Enterprise Strategy Group, focused on information security.