The 5 Cs of data protection

Data management — not data protection — is the future.

We are already seeing the shift in many organizations where there are fewer dedicated ‘backup administrators’ and more diversified workload/platform owners (DBAs, vAdmins, File/Storage admins, IT operations, etc.) defining backup jobs or invoking restores, coupled with infrastructure that truly has data protection “built in.”

With so much revolution (not just evolution) happening in data protection, it is easy to imagine a future where folks care less about which repositories or data protection methods (backups, snapshots, replicas) are in use – and more about:

  1. How many copies do I need?
  2. How long do I need which versions?
  3. Where do they need to be to satisfy my SLAs?
Topics: Backup Snapshots Replication Data Protection BCDR CDM Copy Data Management

Wrap-up on backup from EMC World 2016 — day two keynote

There are a lot of things to like about EMC World this year, especially if data protection is important to you. Kudos on the day two general session with Jeremy Burton and Guy Churchward.

Topics: EMC Data Protection CDM Copy Data Management EMC World 2016 hyperconverged

How to evolve from "data protection" to "data management"

To evolve from backup to data protection is to embrace complementary mechanisms that enable a much broader range of preservation of data, protection of data, and the assurance of productivity through enhanced availability initiatives, as seen in ESG’s Spectrum of Data Protection.

Topics: Data Protection Data Management CDM Copy Data Management

Enterprises Need Outside-In Continuous Monitoring for Risk Management

Ask any CISO what their job entails and they are likely to respond with a common mantra: Assess IT risk, communicate IT risk to business executives, and then create and execute a mutually agreed upon plan to address risk.

Topics: IBM Cloud Computing Cybersecurity Information and Risk Management Security and Privacy Security risk management DHS Booz Allen Hamilton Lockheed Martin RiskIQ BitSight Target CSC CDM cyber supply chain security Public Cloud Service