See why this is a game changer for the data security space.
Tip Sheet
Overview
Many IT leaders aim to balance innovation, security, and risk. If this sounds like you, now’s the time to think about modernizing how you secure and manage your data. But knowing where to begin can be daunting. For starters, you’ll need to consider what types of data, and how many copies of that data, you need to secure and manage. And your chosen path will need to support your existing data center strategy.
Every organization has their “crown jewels” they need to protect: customer information, employee details, and other data. You’ll need to think about this data differently than other data that you need to retain simply for compliance purposes. Be thoughtful about your entire data estate, particularly how many copies of data you need to retain, and for how long.
When it comes to designing your modern data protection platform, you’ll likely store your data in one of three ways: as backups, replicas, or archives.
For example, a compliance team might need to pull a three year old contract to respond to a request from an industry regulator.
If, for example, you’ve got aggressive RTO and RPO targets and a long-term retention requirement, you’ll want to consider a deployment across multiple data centers with multiple copies of data—as well as an archive as described above
Organizations have data in more places than ever: on-premises, in the public cloud, and at the edge. Moreover, this footprint is evolving along with business requirements and CapEx / OpEx targets. In our experience working with over 4,000 customers, we’ve seen three popular architectures emerge:
Active-Standby. Here, workloads operate out of a single data center. Often, there will be a standby disaster recovery site that takes over in the event of an outage.
Active-Active. In this setup, primary workloads are split across two data centers. In the event of a data center failure, the remaining data center can take over the entire load.
Hub and Spoke. This option is popular in certain verticals like retail. Workloads are characterized by a large set of remote/branch offices that are then connected to a single data center.
An MVC is the collection of applications, infrastructure, and processes that must be restored for the business to function at a minimally viable level. These systems must be brought back online first; all other systems are a secondary priority. IT leaders must employ MVC when planning their incident response and recovery strategies—and their data topology.
It’s time to take the next step.
Address cyberattacks head-on with a modern approach to data security and management. Read the full white paper to learn from your peers which best practices, design considerations, and data resilience approaches have been most effective.
9100080-001-EN
You are now leaving the German section of www.cohesity.com/de/ and come to an English section of the site. Please click if you want to continue.
Don't show this warning again
You are now leaving the German section of www.cohesity.com/de/ and come to an English section of the site. Please click if you want to continue.
Don't show this warning again