How to Shift to a Modern Data Protection Architecture
Data protection in the modern enterprise is seeing fast-paced changes often requiring a new approach and strategy. For one thing data availability is vital. It is fundamental to enabling the business analytics that are fueling more efficient and competitive modern enterprises. As we move towards a more regulated world, it is also necessary to remain compliant with data privacy regulations and eDiscovery requests. Data must also be protected from loss, disasters and cyber-threats.
As a result, guaranteeing data access is more difficult than ever before. The volumes of data that must be protected are growing exponentially. This data lives across private, hybrid and multi-cloud storage architectures that leverage storage media like solid state drives (SSDs) and hard disk drives (HDDs), and access protocols like block, file and object. Data also exists across a myriad of devices – mobile phones, personal computing devices, IoT, sensors etc.
Lastly, cyberattacks, such as ransomware, have not only become more common but also more sophisticated. No organization can allow themselves to not have a strategy in place in case they are a target.
Modern Data Protection Requires a New Approach
Today’s modern enterprise requires a revamped approach to data protection, an approach that includes:
1. Capitalizing on Object Storage
Modernized backup and archive/long-term retention storage infrastructure capitalizes on object storage. Object storage is inherently lower-cost and more scalable than traditional network-attached storage (NAS) implementations. In being metadata-rich, it also enables individual files to be more easily located, version history is tracked and it’s a superior choice for unstructured data such as image and video files, log files, emails, documents and the growing amount of machine and sensor generated data.
Storage professionals should look for data integrity capabilities, such as durability via erasure coding and data integrity checks. They should look for the flexibility to be deployed either on or off-premises, or in the hybrid cloud to address a myriad of cost, backup and recovery performance, and compliance requirements.
2. Unified and Automated Management and Protection of Data
Notably, data should be tiered intelligently and transparently across primary to secondary storage infrastructure resources, according to data access and retention requirements. Data should be able to be tiered across on-premises and off premises storage types alike, including from a higher-cost to a lower-cost cloud storage service.
This can help to streamline daily management duties for IT professionals and to make sure that data is on the most cost-appropriate tier of storage. It can also help the enterprise to be more confident in knowing that data retention requirements – whether for business purposes such as analytics, regulatory requirements, or eDiscovery purposes – are met. Furthermore, it can help data to be more quickly recalled as needed.
3. Minimal Opportunity for Data Loss
Telemetry and analytics-driven insights into how storage systems are functioning are critical. This allows organizations to mitigate potential system failures by identifying and resolving potential problems before they impact production operations. IT teams need comprehensive analytics to maximize the uptime and efficiency of their infrastructure and save time on storage administration through proactive management.
4. Smart Recovery
In addition, when it comes to leveraging the cloud specifically, IT professionals should look for the ability to recover data on or off premises, and to harness cost-effective and scalable compute cycles for capabilities such as index management and search.
Modern Data Protection and the Modern Enterprise
Modern data protection is indeed changing, and enterprises are faced with a number of options that can help to meet data availability requirements. Data needs to be on the right storage tier at the right time, to meet access requests without breaking the bank. I recently talked about how to modernize your data protection with flash and cloud in an on-demand webinar. If you want to learn how modernizing your backup and recovery operations for virtual and physical infrastructure can transform your business, make sure to watch it here.
The post How to Shift to a Modern Data Protection Architecture appeared first on Western Digital Corporate Blog.
Not Just Talk – How Mobile Storage Keeps Pace with Smart Phones
The first mobile phones weighed a few pounds, sported an awkward antenna, and were the size of a small briefcase….
It Starts at the Cell
We owe our connected present in large part to a single device smaller than a grain of sand: the charge…
Like Clay: The Evolution of Form Factor in the Data Center
Despite their modern implications and future forward technologies, the data center is much older than it lets on. The first…
Firmware Runs the World, but Who Will Write It? [pt. 2]
This is a two-part series on the industry gap of embedded firmware engineers. Part one of the series explores the…
Firmware Runs the World, but Who Will Write It? [pt. 1]
Software may have eaten the world, but hardware still runs it. Yet finding those who can build its firmware is…
Five Reasons the 2019 RISC-V Summit is a Can’t-Miss Event
Whether you’re a veteran RISC-V enthusiast or brand new to the world of open-source instruction set architecture (ISA), the RISC-V…
The IoT Evolution – Top 9 IoT Use Cases of 2019
As smart sensors are placed in billions of connected devices around the world, new IoT applications are generating massive streams…
Driving to Data-Centric Architectures and 1B RISC-V Cores
Two years ago we kicked off our commitment to open-source innovation by announcing our goal to transition over one billion…
In 2039, Could Fully Autonomous and Connected Cars Exist?
Recently, I gave the opening remarks and sat in on a panel at A Data-Driven Futurean automotive industry event hosted…
2019 Data Center Year in Review
The era of digital business transformation has been in full thrust in 2019, as emerging applications and data center infrastructure…
Industrial-Grade Storage Enables Drones for Search and Rescue Teams
First things, first: I’m a proud member of the El Dorado County Search and Rescue (EDSAR) organization and have been…