Speaking of threat risks, what is most likely to have an impact on both your primary business and IT location as
well as the location of where your alternate data is stored? If your data is very important, do you need to have a tertiary site with either on-line or off-line copies of your data? In addition to making sure that your data is protected at an alternate location or locations, as part of a BIA, determine what your processing needs will be and where those need to be located to actually use (e.g. restore and recover) off-site tapes or disk-based backups. Think of it this way: What good is having your data protected somewhere else if you are not able to actually use it other than knowing the data is safe?
There are many other items and factors to consider and the above is far from a comprehensive list. However, it should help with some considerations with regards to protecting your data in the face of various threat risks.
Dig deeper on Content management software for compliance
Related Q&A from Greg Schulz
Independent storage expert Greg Schulz discusses how to perform replication when using cloud storage as a target.continue reading
Independent storage expert Greg Schulz offers insight on how replication is used for remote site backup in this Expert Response.continue reading
Independent storage expert Greg Schulz discusses how CDP, snapshot and remote data replication are used for disaster recovery.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.