Access your Pro+ Content below.
Data on the brink
This article is part of the Storage magazine issue of Vol. 8 Num. 1 March 2009
You might think your company's data is secured and safely backed up, but there's probably still a lot of crucial data that's out of the reach of your backup systems. By Rich Castagna Your data center storage systems are buttoned up and battened down, and everything has been deduplicated and replicated. But what about all of those laptop computers, smartphones, PDAs, thumb drives -- and even MP3 players -- out there? They might be out of sight, but they shouldn't be out of mind if you're truly serious about safeguarding your company's data. A lot of companies try to keep all user files on network storage where they can be centrally managed, and properly backed up and archived. But remote workers and offices, which often use portable devices, can be disconnected from the corporate local-area network (LAN) for long periods of time. The data those devices create is usually called "edge" data, data that resides on the far reaches of an enterprise's network. But it's really data on the brink. We're talking about an awful lot of stuff ...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
Dell's midrange arrays soar from last to first in our user service and reliability survey.
With plenty of economical disk-based backup products and cloud-based services available, remote offices can be brought back into the fold.
Everybody knows that the hottest thing in storage in 2008 was data deduplication. Don't expect it to cool off in 2009.
More firms are testing their disaster recovery (DR) plans regularly, and storage managers are more confident that their DR plans can avert a significant business disruption.
Columns in this issue
If IT can put itself back into a position of treating every decision from the perspective of the data itself, our effectiveness could be optimized.
Should you go with a software-based approach that allows for policy-based deduplication or a hardware-based approach because it can be implemented quickly and easily?
You might think your company's data is secured and safely backed up, but there's probably still a lot of crucial data that's out of the reach of your backup systems.