The “Cloud” is a technology that provides incredible convenience and flexibility. In fact, because of the cloud, I’m able to write this from the coffee house I’m at where I sometimes go to work. However, the cloud has significant limits that may outweigh its benefits.
All seemed well with backup operations at my company, until I got a visit from an operations center engineer. The lock already hanging open, he was holding one of the “secure” transports that our off-site tape storage vendor uses to move backup tapes. But this time, the tapes inside were not ours—someone else’s data was in our hands. I couldn’t help but think: how many times have our tapes been sent into our competitors’ hands? Did they send them back immediately as I did—or did they land in less scrupulous places? In this article, I’m going to show you how systemic thinking helps identify security vulnerabilities like this one in your company’s data backup systems, particularly related to issues around backup tapes.
You will learn:
– Factors to consider before you move to a tapeless data backup system
– Encryption challenges and opportunities-related to keeping your off-site data secure
– Approaches for backup tape reduction and legacy storage technology elimination
Backup and documentation are together the most-often neglected facets of IT operational management. Why? Backups usually don’t contribute directly to revenue generation. But this is a fatal mistake: ignoring backup and documentation can cost a corporation millions of dollars, even in typical litigation or disaster recovery scenarios.
Uncover the top 7 causes of organizational data breaches in this infographic. Forward to your staff and get a handle on unintentional data loss.
Want to know how to save yourself a lot of money and grief? Stop write protecting your backup tapes. I recently had a conversation with a friend who’s the data center manager of a large company with a $25 Billion dollar market cap. He shared a story with me to vent his frustration. There was, […]
Check out my latest interview in Processor Magazine: What To Look For When Seeking A New Data Center Building Or Land Site link [PDF]
My most recent article “Are your Backup Systems Secure?” has been published at the InfoSec Institute’s InfoSec Resources site. In this article, I approach data security and the integrity of data backup systems from a whole systems perspective. I show you how you can, in your own systems, look at different vectors of data storage […]
It’s the countdown to the Data 2.0 Conference, Monday, April 4, 2011, at the Mission Bay Conference Center in San Francisco. I’ll be there moderating several panels on data storage management, data2.0 and legal implications as well as augmented business intelligence. I hope that you can join us to discover how the online data revolution […]