carbonite logo

Commonly searched topics:

backupcloud backupaccount sign in

Article · Mar 29, 2021

What Makes a “Real” Backup and Data Security Strategy?

There’s a lot of confusion surrounding terms in backup and recovery. In this podcast, we cut through some of the misconceptions and discuss the elements that make up a real backup and security strategy.

There are a lot of terms thrown around in the data backup market. It can be difficult to separate essential products from marketing spin. In this episode of the Lockdown Lessons podcast, a collaboration with fellow OpenText™ company Webroot™, we try to do just that.

Host Joe Panettieri, editor of ChannelE2E and MSSP Alert, talks with Matt Seeley and Steven Wood. Both now with OpenText but longtime veterans of the tech industry, Matt is a senior solutions architect Steven serves as the director of sales engineering.

Whether you’re just wading into data backup and recovery or need to know how to protect a data center during hurricane season, there’s something for you in this episode.

For instance, when defining your business's data backup plan, do you need just backup or high-availability backup? It comes down to how much data you can afford to lose and for how long. Backups may occur once a day, multiple times per day or as much as a dozen times per day. With high-availability backup, you're replicating every byte of change from one server to another in real-time.

So the question of how much data you can lose and for how long is answered by evaluating how critical the data is. Mission-critical applications like an SQL database should have a recovery point objective (RPO) as near to zero as possible. In this episode, Joe, Matt, and Steven discuss details like these that are critical to building a smart data security strategy.

The group also discusses and defines terms including high-availability, disaster recovery as a service, business continuity, RPO vs. RTO – all through the lens of designing a data backup and recovery strategy that’s there when you need it.

Happy listening!

 

If you enjoy the discussion, check out the Cybersecurity Sound Studio for more on data security and other issues from around the industry. Also, explore Hacker Files, our series on the motivations and misdeeds behind the cybersecurity breaches making headlines.

Author

Kyle Fiehler

Kyle Fiehler is a writer and brand journalist for Carbonite. For over 5 years he's written and published custom content for the tech, industrial, and service sectors. He now focuses on articulating the Carbonite brand story through collaboration with customers, partners, and internal subject matter experts.

Related content