Security Market Segment LS
Friday, 27 August 2010 15:44

The first rule of data protection


Disaster recovery starts with moving your data off the premises, according to a senior technical specialist.

"Get the data out of the building" is the first rule of disaster recovery according to Jason Buffington, Microsoft's senior technical product manager for System Center Data Protection Manager.

Once the data is being transferred to a second location, you can start working on a strategic plan for disaster recovery. What you really need to avoid is the possibility of a disaster occuring while you're still in the planning stage and your data is still in the building that's been destroyed by a fire or other calamity, he explained.

Buffington suggests there are two distinct sides to data protection. The immediate availability aspect (getting up and running very quickly after a system failure) is built into products such as Exchange, SQL Server and - through Distributed File System Replication and Distributed File System Namespaces - Windows. "The platforms themselves are natively resilient," he said.

Data preservation, on the other hand, is addressed by Data Protection Manager (DPM). Even a very small business can put DPM to good use in a relatively affordable configuration that puts a second server in another location (typically the business owner's home) to provide offsite backup of the primary server and the PCs connected to it.

This sort of arrangement also provides opportunities for hosting providers and channel partners to provide the second server. Companies such as Iron Mountain and JASCO can also be called upon.


Good disaster recovery planning is important to SMEs because they typically provide 'commodity' services that are available elsewhere. So if a business can't get up and running quickly following a disaster, customers will go elsewhere and may not return. Furthermore, SMEs rarely have deep cash reserves so they can't afford to do without a couple of weeks' revenue or to pay for specialist assistance to get their systems running again.

Even if your IT environment is complex enough to require more than one server, the secondary site may only need to house one or two servers running virtualised copies of the primary servers and therefore needn't be expensive.

Buffington observed that 43% of US SMEs never reopen after a disaster, and another 29% go out of business within two years. This shows the importance of having a system for getting data out of the building and back again as required, he said.

"No one has as much interest in your data and your recoverability as you do," said Buffington, so consider carefully what you will do for yourself and what you will let others do for you in the context of data protection.

If you are using an outside provider as the secondary site, think about the types of disaster you are trying to protect your business against. A building two blocks from yours will probably be adequate if your office burns down, but a cyclone or flood calls for a backup site in another city. But in the case of a disaster on that scale, you probably won't be worrying about being open for business the next day.

Read 4203 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here


The past year has seen a meteoric rise in ransomware incidents worldwide.

Over the past 12 months, SonicWall Capture Labs threat researchers have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:

Encrypted threats
IoT malware
Zero-day attacks and more

These exclusive findings are now available via the 2022 SonicWall Cyber Threat Report, which ensures SMBs, government agencies, enterprises and other organizations have the actionable threat intelligence needed to combat the rising tide of cybercrime.

Click the button below to get the report.



It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site and prominent Newsletter promotion and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


Stephen Withers

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News