Sunday, January 21, 2007

Top data protection challenges faced by IT administrators

For the past two years, disk as a backup target has been hailed as data protection's 'big fix'

John Webster    

Comments 

 

 

January 18, 2007 (Computerworld) -- Backup and recovery is the most well-established and common data management application. Yet, it is arguably now the most complex and difficult to administer. The top data protection challenges faced by IT administrators include:

·                                 Continued growth in data volumes, forcing some percentage of data-center-managed data sets out from under the data projection umbrella

·                                 Proliferation of data "on the edge" (remote offices, mobile workers) that falls outside the data protection umbrella and the corporate security blanket

·                                 Fault-tolerant systems and applications availability requirements

·                                 Varying recovery-time objectives, starting with immediate recoverability

·                                 Continued consolidation and virtualization at the server level

·                                 Increasing demand for more granularity as applied to the recovery process

·                                 Varying protection levels that are commensurate with the degree of data set criticality

·                                 The proliferation of data copies

·                                 More backup target choices

·                                 Increasing need to apply security measures to the backup process

·                                 Inability to integrate point-product backup applications and backup management servers, leading to the maintenance and support of multiple backup applications within larger IT environments

·                                 Inability to accurately assess backup success vs. failure rates, and the overall reliability of the backup process

·                                 Escalating cost to manage and support all of the above

For the past two years, disk as a backup target has been hailed as data protection's "big fix." However, when one examines the complexity of today's backup/restore requirements against the limited capabilities that disk can offer in addressing these challenges, it's clear that a far more comprehensive strategy is required.

During 2007, users should look for a vendor's ability to take a holistic approach to addressing the data protection needs of IT administrators. We don't need more surveys to tell us that comprehensive data protection is today's most critical IT operational challenge. And users don't need more proprietary, point-product fixes that are difficult to blend into a production environment. Should storage vendors unite to address the challenges? I, for one, see no other alternative.

 

 

Image Gallery: Don't fall victim to the "Free WiFi" scam

Preston Gralla

 

January 19, 2007 (Computerworld)

Editor's Note: This article is an image gallery meant to accompany our story Don't fall victim to the 'Free Wi-fi' scam. By mistake, this image gallery's URL was sent out in some e-mail newsletters in place of the main story's URL. We apologize for the error. Please click through to the main story for the full text.

Windows XP displays the details of every nearby wireless network, including whether it's an ad hoc network. In this screen, the Free Airport WiFi network is an ad hoc network.

Windows XP displays the details of every nearby wireless network, including whether it's an ad hoc network. In this screen, the Free Airport WiFi network is an ad hoc network.
Return to Don't fall victim to the "Free WiFi" scam

 

 

Remove any unfamiliar networks from the Preferred networks list

Remove any unfamiliar networks from the Preferred networks list
Return to Don't fall victim to the "Free WiFi" scam

 

 

 

 

Make sure to tell your PC not to make any automatic connections to wireless networks

Make sure to tell your PC not to make any automatic connections to wireless networks
Return to Don't fall victim to the "Free WiFi" scam

 

 

 

The only way to distinguish between ad hoc and normal wireless hot spots is to look at the network icon on this screen. An ad hoc network's icon is made up of several PCs; a normal network is made up of one PC.

The only way to distinguish between ad hoc and normal wireless hot spots is to look at the network icon on this screen. An ad hoc network's icon is made up of several PCs; a normal network is made up of one PC.

 

Made4biz Security Translating real-world security knowhow into state of the art security systems.
Made4biz Security

Turn on Sound for Demos:
Bill Gates Demo (Location-based)
Elvis Demo (Location/Context-based)
Clint Eastwood Demo (Temporal-based)

Powered by Blogger

Subscribe to
Posts [Atom]

Technorati Profile

RSS Syndication

Made4Biz Security Inc