Concept: Protection Policies
Date: January 28, 2015
In this video we discuss the top things you do to protect your data – but you probably aren’t.
Eric Bednash refers to three of these points as the Three Rs, revision, retention and replication. When thinking about backups the best thing that you can do to protect your data is to figure out how many copies you need of the data, how long you need to keep them, and where to put those copies so they will be protected in case there is an issue.
How does BrickStor and myRacktop solve those three Rs?
Within the operating system we have implemented what we call “protection policies.” Typically additional software accomplishes this goal (for example, backup software which requires additional set-up and configuration which can be complicated especially when you lack resources to do it the right way). We have completely simplified the process to the answering the core component, “what is your data protection policy.” You then apply the protection policy to where you store the data – in a nutshell, you answer a couple of questions and the BrickStor OS takes care of those three Rs for you with our simplified snapshot technology, the built-in replication, and free storage of data elsewhere, in the cloud for instance, gives customers replicated copies of that data. We have created an environment where it’s easy to recover that data when you need it.
Jonathan Halstuch sees delegated or restricted access as a weak protection point. It opens up the possibility that someone could maliciously modify, delete, corrupt data or change settings. However, more often you see well-intended people cause unintended problems by inadvertently deleting directories or making configuration changes that lead to serious problems. Not everyone should have root privileges – this is a critical thing you can do to protect your data.
It takes a lot of strategy to protect your data – but diligence and responsibility will go a long way.[/us_testimonial]