Most Recent Blogs

The 5 Cs of data protection

Posted: June 13, 2016   /   By: Jason Buffington   /   Tags: Backup, Snapshots, Replication, Data Protection, BCDR, CDM, Copy Data Management

data protectionData management — not data protection — is the future.

We are already seeing the shift in many organizations where there are fewer dedicated ‘backup administrators’ and more diversified workload/platform owners (DBAs, vAdmins, File/Storage admins, IT operations, etc.) defining backup jobs or invoking restores, coupled with infrastructure that truly has data protection “built in.”

With so much revolution (not just evolution) happening in data protection, it is easy to imagine a future where folks care less about which repositories or data protection methods (backups, snapshots, replicas) are in use – and more about:

  1. How many copies do I need?
  2. How long do I need which versions?
  3. Where do they need to be to satisfy my SLAs?
Read More

Wrap-up on backup from EMC World 2016 — day two keynote

Posted: May 03, 2016   /   By: Jason Buffington   /   Tags: EMC, Data Protection, CDM, Copy Data Management, EMC World 2016, hyperconverged

There are a lot of things to like about EMC World this year, especially if data protection is important to you. Kudos on the day two general session with Jeremy Burton and Guy Churchward.

Read More

How to evolve from "data protection" to "data management"

Posted: May 02, 2016   /   By: Jason Buffington   /   Tags: Data Protection, Data Management, CDM, Copy Data Management

To evolve from backup to data protection is to embrace complementary mechanisms that enable a much broader range of preservation of data, protection of data, and the assurance of productivity through enhanced availability initiatives, as seen in ESG’s Spectrum of Data Protection.

Read More

Enterprises Need Outside-In Continuous Monitoring for Risk Management

Posted: April 24, 2014   /   By: Jon Oltsik   /   Tags: IBM, Cloud Computing, Cybersecurity, Information and Risk Management, Security and Privacy, Security, risk management, DHS, Booz Allen Hamilton, Lockheed Martin, RiskIQ, BitSight, Target, CSC, CDM, cyber supply chain security, Public Cloud Service

Ask any CISO what their job entails and they are likely to respond with a common mantra: Assess IT risk, communicate IT risk to business executives, and then create and execute a mutually agreed upon plan to address risk.

Read More

Posts by Topic

see all