- 23 January 2013 10:40
Tape No Longer a Reliable Option for IT Managers Seeking to Eliminate Single Point of Failure
According to a recent US survey from Acronis, conducted by Redmond Magazine, 60 percent of organisations recognise the dangers of maintaining just one form of backup, and are looking to the cloud to eliminate a single point of failure. In fact, nearly a quarter already back up to the cloud as a secure off-site solution.
It’s no surprise that organisations are seeking more secure data protection option, as 75 percent of survey respondents experienced tape failure in the last year, and 22 percent see phasing out of legacy backups as a future challenge. IT departments see the cloud as a highly beneficial off-site storage solution to resolve such issues, with 43 percent of survey respondents citing the extra layer of data protection as the primary benefit of cloud, while 24 percent were most attracted to the underlying cost savings.
Scott Crenshaw, Acronis senior vice president of strategy and CMO, commented, “It’s astounding that any organisation would be relying on a single point of failure when staging to cloud can provide the simple added layer of protection that organisations need. Old tape options are still used by many organisations despite the high failure rates, and it is fast losing its reputation as an effective technology, with tolerance for downtime reaching near-zero and the velocity of critical data is only increasing. Forward looking IT organisations should be thinking ‘cloud first’ when assessing effective recovery strategies.”
In order to avoid a single point of failure and ensure data protection, Acronis recommends organisations adopt a 3-2-1 backup strategy:
• Keep three copies of data: one primary and two backups • Store backups on two types of media • Keep one copy of data off-site
The cloud clearly plays an essential role in the 3-2-1 strategy as a highly secure and cost-effective off-site storage solution, and cloud backup adoption is quickly gaining ground. Now, organisations must focus on integrating personal devices into their backup strategy to ensure availability, accessibility and protection of data, regardless of where it resides.
But, in order to develop a truly comprehensive data protection strategy, companies must also incorporate personal device backup and protection. Bring-your-own-device (BYOD) remains an obstacle for IT departments, and a quarter see personal device integration as their biggest backup and data recovery challenge. While the cloud is becoming an increasingly viable form of off-site backup, 65 percent of organisations admit to not backing up personal devices to the cloud.
“Protecting personal devices cannot be a grey area in a data protection strategy that is only tested and maintained for data on desktop or corporate laptops. Legacy backup and recovery policies simply won’t stretch to meet today’s always-on demands. CEOs are some of the biggest users of the personal iPad for business use – they need to be sure their data is safe.”
Acronis is leading the next wave of data availability, accessibility and protection solutions to simplify today’s complex IT environments. Acronis technology enables organisations of all sizes to manage the always-on anywhere data access demands of users, reducing risk against the loss of valuable corporate data, and controlling management and storage costs. With proven technology for data migration and disaster recovery for physical, virtual and cloud environments, and secure enterprise file-sharing and synchronisation regardless of type or platform, Acronis is enabling organisations to embrace new IT strategies and options such as BYOD and Mac in the enterprise. For additional information, please visit www.acronis.com. Follow Acronis on Twitter: http://twitter.com/acronis.
For further information please contact:
Shuna Boyd BoydPR 02 9418 8100 Acronis® is a registered trademark of Acronis International GmbH. in the United States and/or other countries.
Sign up now »
Get identity and password proliferation under control, reduce helpdesk costs and extend secure, single sign-on access to any enterprise application with a single solution.
- FTTest Analyst (MS Environment) .netNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTQuality ManagerSA
- FTFlash / ActionScript Developer - ContractNSW
- FTTest Analyst (MS Environment) .netNSW
- FTTest EngineerVIC
- FTLead Software EngineerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTSenior Python DeveloperNSW
- FTOS Web Applications DeveloperNSW
- FTR&D EngineerSA
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.