A Data Protection Reference Architecture - The Final Chapter

The Architecture

This ‘architecture’ diagram, as you can see, is not a typical architecture diagram, but hopefully it can be used to align your business and business objectives with the technologies that are available and can best be applied to solve your issues helping to balance, cost, complexity and compliance.

This diagram can also be used to do a couple of other things. It can help you begin to classify your data and align your… Read more »

A Data Proteciton Reference Architecture - Part 3

The 'Fat Middle'

In the 'fat middle' of the triangle, as I stated last week, there are a number of ways to protection information. I have chosen to break apart the middle into two categories. The reality is, this is meant to be used as a tool for helping you lay out a strategy so your boxes could be based on capacity and could end up in different areas of the triangle depending upon your… Read more »

A Data Protection Reference Architecture – Part 2

Archive

The most fundamental part of developing a good data protection architecture starts at the base of the triangle with Archive. Archive is often an overlooked component of data protection - It’s not just for regulated business anymore. Archive essentially gives users 100% data deduplication efficiency. What I mean by this is that you have the ability to remove ‘stale’ data (and by 'stale' I don't mean unimportant data, I just mean data that is… Read more »

Storage Switzerland

One of the more thoughtful analysts in the industry, in my opinion is George Crump from Storage Switzerland. (I like the name and George is as independent as you can get in

this business.) Yesterday I had the pleasure of briefing George on EMC's Data Protection Vision. I like talking with George for a couple of reasons. First, he gets it. What does that mean. Read his material. He is genuinely trying to educate IT… Read more »

A Data Protection Reference Architecture - Part 1

This blog will have multiple parts. I will introduce my view of a data protection reference architecture and the next few blog posts will talk to components of that architecture.

The other day I had a very interesting conversation with a colleague of mine in Australia. He was looking for a data protection reference architecture that he could use to speak to his customer. As you can imagine having this conversation over the phone could… Read more »