Access your Pro+ Content below.
Why monitoring your data protection policy is like herding cats
This article is part of the Storage magazine issue of August 2014 Vol. 13 No. 6
As much as the server hypervisor and software-defined data center evangelists would like to argue that high-availability (HA) clustering with failover has replaced traditional data protection and business continuity (BC) techniques, the truth is quite a bit more complex. HA has always been part of a spectrum of techniques available for building data protection policy and application recovery strategies, but not every application requires the "always on" method of recovery or merits the high costs associated with HA. Done properly, data protection requires the assignment of the right set of protection services to the right data. The "right" service in this context is defined as the most appropriate, given the criticality of the application or business process being protected and its associated recovery time requirements. The "right" data refers to data that fits in a particular class. Data has no value except for what it inherits -- like so much DNA -- from the business process it serves, and since not all business processes are ...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
Mobile device data protection is growing in importance, but challenges remain.
Ensuring your data protection policy will actually work when needed may require the use of multiple monitoring tools.
Moving data from array to array has always been a difficult process, but new techs and techniques make your data migration process easier than ever.
The real penetration in cloud-based services is in storing data for applications other than data protection.
Columns in this issue
You may feel like a mouse in a maze if you're shopping for data storage systems these days.
Warmed-over or half-baked technology ideas might produce profits for the vendors that manufacture them, but they won't solve storage puzzles.
Virtual data protection strategies require admins to modernize production and protection at the same time to lessen the impact on performance.
All-flash storage arrays share the common trait of being fast, but once you get past the speed, there's still a lot to consider.