A Data Protection Reference Architecture - The Final Chapter

The Architecture

This ‘architecture’ diagram, as you can see, is not a typical architecture diagram, but hopefully it can be used to align your business and business objectives with the technologies that are available and can best be applied to solve your issues helping to balance, cost, complexity and compliance.

This diagram can also be used to do a couple of other things. It can help you begin to classify your data and align your… Read more »

A Data Proteciton Reference Architecture - Part 3

The 'Fat Middle'

In the 'fat middle' of the triangle, as I stated last week, there are a number of ways to protection information. I have chosen to break apart the middle into two categories. The reality is, this is meant to be used as a tool for helping you lay out a strategy so your boxes could be based on capacity and could end up in different areas of the triangle depending upon your… Read more »

A Data Protection Reference Architecture – Part 2

Archive

The most fundamental part of developing a good data protection architecture starts at the base of the triangle with Archive. Archive is often an overlooked component of data protection - It’s not just for regulated business anymore. Archive essentially gives users 100% data deduplication efficiency. What I mean by this is that you have the ability to remove ‘stale’ data (and by 'stale' I don't mean unimportant data, I just mean data that is… Read more »

Process vs. Technology

The hardest thing to change inside IT is not technology, it is process! I say this because all too often there are technologies available that provide a far superior solution to a complex IT problem, however, this new technology may not fit into your existing business process. Need proof? Let's take data protection as an example. Did you know that VTLs (virtual tape libraries) and data deduplication technologies came out at the exact same point… Read more »