SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
GFI White Paper

  Understanding data backups:
     why SMEs need them
Data is the lifeblood of every organization, yet many either fail to
back up their data or they are not doing so properly. Losing data
can be catastrophic for a business. This white paper explains why
      backups are important and the challenges they face.
Contents
                Introduction                                3
                The state of SME data backup and recovery   3
                Challenges facing SMEs                      3
                Solutions                                   4
                Summary                                     4
                About GFI®                                  5




Understanding data backups                                      2
Introduction
If people are a business’s most valuable resource, then data is the fuel that drives and sustains it.
Data, in all its forms, is the key to a successful business. Data helps establish strategy, assures appropriate
billing, keeps records and myriad other essential tasks. Without data, a business can fail, making the preserving
of data nothing less than a strategic priority. This applies to businesses of all sizes, but especially to small and
medium-sized enterprises (SMEs).
How important is guarding against data loss? Is survival a good enough reason? Of the companies that lose
their data, 90% are out of business within two years and nearly 50% are unable to ever reopen their doors
(London Chamber of Commerce) .
While small and medium-sized enterprises don’t typically generate the same amount of data that larger
enterprises do, they still need the same kind of protection to ensure the timely recovery of essential business data.

The state of SME data backup and recovery
Data has a great disadvantage compared to PC hardware in that it can be lost, and once lost, never easily
replaced. You can get a hard disk replaced under warranty, but the new one will come to you totally empty.
However, data has a great advantage that compensates for this weakness: it can be readily and easily duplicated.
Given the above, and with so much on the line, you would expect that SME owners and managers have the
situation well in hand. Unfortunately, it appears that they don’t.
A recent survey by Rubicon Consulting found that while SMEs are grappling with explosive data growth, the
backup processes they have in place often put that data at risk.
The survey also found that 92% of companies have deployed some form of data backup technology, yet
50% of them have lost data. Of the companies that lost data, approximately one-third lost sales, 20% lost
customers, and one-quarter claimed the data loss caused severe disruptions to the company.
Concerns about potential data loss run high among SMEs. Respondents rated backup as their second-highest
computing priority, after defense against viruses and other malware, and ahead of issues like reducing costs
and deploying new computers. Yet nearly one-third of SMEs surveyed do nothing to back up their data.
In many instances, when they do, these SMEs do not fully back up the data stored on company computers.
About a quarter of SMEs conduct no backup of desktops, and another 13% do only informal backups where
employees decide the frequency and which files are protected without any guidance. The situation is similar
for servers; about 20% of SMEs conduct no server backup.
When backups do occur, most backup files are not stored remotely. More than half of all backup files on
desktops and servers are stored in the same location as the originals, a foolish decision which leaves the
company vulnerable to permanent data loss. According to survey results, causes of data loss are diverse.
Although natural disasters are often cited as a risk, onsite disasters are the primary contributing factors of
data loss. 63% of respondents cited hardware failure as a cause of data loss incidents, 27% from deliberate
sabotage by employees and 27% from theft.

Challenges facing SMEs
A foolish frugality seems to govern the approach many SMEs have to safeguarding data properly. There is
an inherent misconception that with money and staff time at a premium, there’s always something more
pressing to do than manage backups. As shown above, that sort of reasoning, attractive as it might seem to
some, jeopardizes a company’s assets as surely as deciding to leave the company cars in an unlocked parking
lot, with the keys in the ignition, because it’s too expensive and resource intensive to collect the keys. No one
would accept that solution.




Understanding data backups                                                                                          3
Given their smaller budgets and lack of in-house IT expertise vis-à-vis larger enterprises, SMEs require solutions
that are both cost-effective and easy to use, meaning the top challenges SMEs face with regard to data
protection include:
»»   Implementing comprehensive protection with minimal impact on business operations: It is
     estimated that data volumes are increasing by as much as 50% per year. At the same time, the demand for
     higher system availability is shrinking backup windows. Together, these trends are placing greater pressure
     on small to medium-sized enterprises to improve backup efficiencies and deliver prompt recovery. Gone
     are the days when critical systems could be shut down to perform backup operations.
»»   Meeting increasingly stringent backup and recovery requirements: The requirements to recover
     lost or corrupt data to a specific point in time and reduce the overall time to restore data are becoming
     more stringent and are now often measured in hours instead of days. Increasingly, tape-based backup
     infrastructures are unable to meet these requirements.
»»   Dealing with limited backup administration resources: This is a key issue particularly with smaller
     companies that may not have dedicated IT staff or backup administrator. The result is that a large
     percentage of critical data is generated by distributed clients; and an inability to protect this data can
     leave SMEs open to data loss that can have a significant impact on the business.
»»   Deploying disaster recovery strategies cost-effectively: As the Rubicon Consulting survey made clear,
     data protection practices aren’t where they should be for most SMEs. Too often SMEs lack the resources,
     administrative expertise, and off-site storage required to provide true disaster recovery capabilities.
»»   Maintaining a secure backup and recovery strategy by providing adequate security, including encryption
     and virus protection, plus centralized management of an entire data protection infrastructure, ensuring
     backup data is protected and efficiently managed.

Solutions
SMEs may not need the scale provided by enterprise backup and recovery solutions, but they do need the
same functionality. That means policy-based backups, automated operations and centralized management
should be key design tenets to help lightly staffed SMEs effectively manage system and data protection
operations. Integrated disaster recovery capabilities, meanwhile, make it easier to rapidly restore complete
systems. Newer technologies such as disk-based backup, snapshot backups, data de-duplication, continuous
data protection and cloud-based backup options can help SMEs address shrinking backup windows,
increasingly stringent RPOs/RTOs (recovery point objectives/recovery time objectives) and recovery reliability
concerns.
The technologies to implement these solutions do exist, but many SME managers and IT staff can feel
overwhelmed by the technology and often, the cost of the solution, leaving their business vulnerable to an
avoidable disastrous outcome. While there is no one answer that fits all needs all the time, SMEs would benefit
from a backup solution that allows for automation and centralized management of their backup practices.

Summary
Far too many SMEs engage in risky backup strategies and methods that are born out of a combination of
failing to prioritize backup and recovery strategies properly; misplaced optimism that leads them to think “it
can’t happen to us”, and some uncertainty over what methods to pursue. Many, when they have a backup
strategy, fail to implement it fully, leaving them at risk but instilling a false sense of security.
These faulty methods can, when data loss occurs, negatively impact an SME’s bottom line, sales and customer
relationships, which explains why so many data disasters are followed by bankruptcy.
By developing data backup and recovery strategies and deploying appropriation solutions regarding backups
of important data on a timely basis, SMEs can ensure that their data, or most of it at least, will never be truly
lost; at worst, some will be lost and they will experience the inconvenience of restoring it in the event of a
hard disk failure, for example. That is an infinitely better outcome than going out of business.


Understanding data backups                                                                                        4
About GFI
GFI Software provides web and mail security, archiving, backup and fax, networking and security software
and hosted IT solutions for small to medium-sized enterprises (SMEs) via an extensive global partner
community. GFI products are available either as on-premise solutions, in the cloud or as a hybrid of both
delivery models. With award-winning technology, a competitive pricing strategy and a strong focus on the
unique requirements of SMEs, GFI satisfies the IT needs of organizations on a global scale. The company has
offices in the United States (North Carolina, California and Florida), UK (London and Dundee), Austria, Australia,
Malta, Hong Kong, Philippines and Romania, which together support hundreds of thousands of installations
worldwide. GFI is a channel-focused company with thousands of partners throughout the world and is also a
Microsoft Gold Certified Partner.
More information about GFI can be found at http://www.gfi.com.




Understanding data backups                                                                                       5
USA,»CANADA»AND»CENTRAL»AND»SOUTH»AMERICA
15300 Weston Parkway, Suite 104, Cary, NC 27513, USA
Telephone: +1 (888) 243-4329
Fax: +1 (919) 379-3402
ussales@gfi.com



UK»AND»REPUBLIC»OF»IRELAND
Magna House, 18-32 London Road, Staines, Middlesex, TW18 4BP, UK
Telephone: +44 (0) 870 770 5370
Fax: +44 (0) 870 770 5377
sales@gfi.co.uk



EUROPE,»MIDDLE»EAST»AND»AFRICA
GFI House, San Andrea Street, San Gwann, SGN 1612, Malta
Telephone: +356 2205 2000
Fax: +356 2138 2419
sales@gfi.com



AUSTRALIA»AND»NEW»ZEALAND
83 King William Road, Unley 5061, South Australia
Telephone: +61 8 8273 3000
Fax: +61 8 8273 3099
sales@gfiap.com




Disclaimer

© 2011. GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners.

The information and content in this document is provided for informational purposes only and is provided “as is” with no warranty of any kind, either express or implied, including but
not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequential
damages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the
accuracy of the data provided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out-
of-date information, or errors. GFI makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in
this document.

If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.

Contenu connexe

Tendances

Cloud Computing Disaster Readiness Report
Cloud Computing Disaster Readiness ReportCloud Computing Disaster Readiness Report
Cloud Computing Disaster Readiness ReportGandhi Legacy Tour
 
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the TreesTunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the TreesEnterprise Management Associates
 
Microsoft Core Infratructure
Microsoft Core InfratructureMicrosoft Core Infratructure
Microsoft Core Infratructureirvin1969
 
Dynamic Case Management: Taming Untamed Processes with SpringCM and Forrester...
Dynamic Case Management: Taming Untamed Processes with SpringCM and Forrester...Dynamic Case Management: Taming Untamed Processes with SpringCM and Forrester...
Dynamic Case Management: Taming Untamed Processes with SpringCM and Forrester...Roger Bottum
 
7 deadly sins of backup and recovery
7 deadly sins of backup and recovery7 deadly sins of backup and recovery
7 deadly sins of backup and recoverygeekmodeboy
 
Streamline Compliance and Increase ROI White Paper
Streamline Compliance and Increase ROI White PaperStreamline Compliance and Increase ROI White Paper
Streamline Compliance and Increase ROI White PaperNetIQ
 
SIM - Mc leod ch09
SIM - Mc leod ch09SIM - Mc leod ch09
SIM - Mc leod ch09Welly Tjoe
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic SecurityChad Korosec
 
Aiim ibm advanced casemanagement-2013-01
Aiim ibm advanced casemanagement-2013-01Aiim ibm advanced casemanagement-2013-01
Aiim ibm advanced casemanagement-2013-01Katleen Aems
 
Charting Your Path to Enterprise Key Management
Charting Your Path to Enterprise Key ManagementCharting Your Path to Enterprise Key Management
Charting Your Path to Enterprise Key ManagementSafeNet
 
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Citrix Online
 
Information Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelInformation Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelKoen Maris
 
Where Is Your Sensitive Data Wp
Where Is Your Sensitive Data   WpWhere Is Your Sensitive Data   Wp
Where Is Your Sensitive Data Wptbeckwith
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital FutureCognizant
 
Big data security
Big data securityBig data security
Big data securityAnne ndolo
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Erik Ginalick
 
College Presentation
College PresentationCollege Presentation
College Presentationscottfrost
 

Tendances (20)

Security Feature Cover Story
Security Feature Cover StorySecurity Feature Cover Story
Security Feature Cover Story
 
Cloud Computing Disaster Readiness Report
Cloud Computing Disaster Readiness ReportCloud Computing Disaster Readiness Report
Cloud Computing Disaster Readiness Report
 
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the TreesTunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
 
Microsoft Core Infratructure
Microsoft Core InfratructureMicrosoft Core Infratructure
Microsoft Core Infratructure
 
Dynamic Case Management: Taming Untamed Processes with SpringCM and Forrester...
Dynamic Case Management: Taming Untamed Processes with SpringCM and Forrester...Dynamic Case Management: Taming Untamed Processes with SpringCM and Forrester...
Dynamic Case Management: Taming Untamed Processes with SpringCM and Forrester...
 
7 deadly sins of backup and recovery
7 deadly sins of backup and recovery7 deadly sins of backup and recovery
7 deadly sins of backup and recovery
 
Streamline Compliance and Increase ROI White Paper
Streamline Compliance and Increase ROI White PaperStreamline Compliance and Increase ROI White Paper
Streamline Compliance and Increase ROI White Paper
 
SIM - Mc leod ch09
SIM - Mc leod ch09SIM - Mc leod ch09
SIM - Mc leod ch09
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic Security
 
Aiim ibm advanced casemanagement-2013-01
Aiim ibm advanced casemanagement-2013-01Aiim ibm advanced casemanagement-2013-01
Aiim ibm advanced casemanagement-2013-01
 
1 backup
1 backup1 backup
1 backup
 
Charting Your Path to Enterprise Key Management
Charting Your Path to Enterprise Key ManagementCharting Your Path to Enterprise Key Management
Charting Your Path to Enterprise Key Management
 
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
 
Information Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelInformation Security Governance at Board and Executive Level
Information Security Governance at Board and Executive Level
 
Where Is Your Sensitive Data Wp
Where Is Your Sensitive Data   WpWhere Is Your Sensitive Data   Wp
Where Is Your Sensitive Data Wp
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital Future
 
Big data security
Big data securityBig data security
Big data security
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
College Presentation
College PresentationCollege Presentation
College Presentation
 
Effective Communications in Business Continuity Planning
Effective Communications in Business Continuity PlanningEffective Communications in Business Continuity Planning
Effective Communications in Business Continuity Planning
 

En vedette

Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...GFI Software
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareGFI Software
 
Network Environments
Network EnvironmentsNetwork Environments
Network EnvironmentsGFI Software
 

En vedette (6)

Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
 
Patch management
Patch managementPatch management
Patch management
 
Network Environments
Network EnvironmentsNetwork Environments
Network Environments
 

Similaire à Understanding Data Backups

Data security, a growing concern among sme
Data security, a growing concern among smeData security, a growing concern among sme
Data security, a growing concern among smePuneet Yamparala
 
Using IBM data reduction solutions to manage more data with less infrastructure
Using IBM data reduction solutions to manage more data with less infrastructureUsing IBM data reduction solutions to manage more data with less infrastructure
Using IBM data reduction solutions to manage more data with less infrastructureIBM India Smarter Computing
 
Business Continuity for Mission Critical Applications
Business Continuity for Mission Critical ApplicationsBusiness Continuity for Mission Critical Applications
Business Continuity for Mission Critical ApplicationsDataCore Software
 
Insider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection ImperativeInsider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection ImperativeDataCore Software
 
The cost of downtime
The cost of downtimeThe cost of downtime
The cost of downtimeBillyHosking
 
Business Continuity Getting Started
Business Continuity Getting StartedBusiness Continuity Getting Started
Business Continuity Getting Startedmxp5714
 
Getting-Big-Value-out-of-Big-Data
Getting-Big-Value-out-of-Big-DataGetting-Big-Value-out-of-Big-Data
Getting-Big-Value-out-of-Big-DataBillington K
 
Backup and Disaster Recovery for Business Owners and Directors
Backup and Disaster Recovery for Business Owners and DirectorsBackup and Disaster Recovery for Business Owners and Directors
Backup and Disaster Recovery for Business Owners and DirectorsLucy Denver
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix LLC
 
Taking control of the big data explosion
Taking control of the big data explosionTaking control of the big data explosion
Taking control of the big data explosionVodafone Business
 
Business Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your BusinessBusiness Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your Businessat MicroFocus Italy ❖✔
 
Secure Data Storage Strategies: Ensuring Data Continuity
Secure Data Storage Strategies: Ensuring Data ContinuitySecure Data Storage Strategies: Ensuring Data Continuity
Secure Data Storage Strategies: Ensuring Data ContinuityWolfConsulting1
 
Risk neversleeps wps-016
Risk neversleeps wps-016Risk neversleeps wps-016
Risk neversleeps wps-016Jake Lepine
 
IT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsIT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsBrooke Bordelon
 
Backup & Its Relevance
Backup & Its RelevanceBackup & Its Relevance
Backup & Its RelevanceRevolucion
 
Data Minimization in the age of Big Data | Sysfore
Data Minimization in the age of Big Data | SysforeData Minimization in the age of Big Data | Sysfore
Data Minimization in the age of Big Data | SysforeSysfore Technologies
 

Similaire à Understanding Data Backups (20)

Data security, a growing concern among sme
Data security, a growing concern among smeData security, a growing concern among sme
Data security, a growing concern among sme
 
Using IBM data reduction solutions to manage more data with less infrastructure
Using IBM data reduction solutions to manage more data with less infrastructureUsing IBM data reduction solutions to manage more data with less infrastructure
Using IBM data reduction solutions to manage more data with less infrastructure
 
Small Business Owners.pdf
Small Business Owners.pdfSmall Business Owners.pdf
Small Business Owners.pdf
 
Prevent & Protect
Prevent & ProtectPrevent & Protect
Prevent & Protect
 
Business Continuity for Mission Critical Applications
Business Continuity for Mission Critical ApplicationsBusiness Continuity for Mission Critical Applications
Business Continuity for Mission Critical Applications
 
Insider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection ImperativeInsider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection Imperative
 
The cost of downtime
The cost of downtimeThe cost of downtime
The cost of downtime
 
Business Continuity Getting Started
Business Continuity Getting StartedBusiness Continuity Getting Started
Business Continuity Getting Started
 
Getting-Big-Value-out-of-Big-Data
Getting-Big-Value-out-of-Big-DataGetting-Big-Value-out-of-Big-Data
Getting-Big-Value-out-of-Big-Data
 
Backup and Disaster Recovery for Business Owners and Directors
Backup and Disaster Recovery for Business Owners and DirectorsBackup and Disaster Recovery for Business Owners and Directors
Backup and Disaster Recovery for Business Owners and Directors
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 
Security and SMBs
Security and SMBsSecurity and SMBs
Security and SMBs
 
Avg White Paper (4)
Avg White Paper (4)Avg White Paper (4)
Avg White Paper (4)
 
Taking control of the big data explosion
Taking control of the big data explosionTaking control of the big data explosion
Taking control of the big data explosion
 
Business Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your BusinessBusiness Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your Business
 
Secure Data Storage Strategies: Ensuring Data Continuity
Secure Data Storage Strategies: Ensuring Data ContinuitySecure Data Storage Strategies: Ensuring Data Continuity
Secure Data Storage Strategies: Ensuring Data Continuity
 
Risk neversleeps wps-016
Risk neversleeps wps-016Risk neversleeps wps-016
Risk neversleeps wps-016
 
IT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsIT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business Problems
 
Backup & Its Relevance
Backup & Its RelevanceBackup & Its Relevance
Backup & Its Relevance
 
Data Minimization in the age of Big Data | Sysfore
Data Minimization in the age of Big Data | SysforeData Minimization in the age of Big Data | Sysfore
Data Minimization in the age of Big Data | Sysfore
 

Plus de GFI Software

Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013GFI Software
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
Master Class Series
Master Class SeriesMaster Class Series
Master Class SeriesGFI Software
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability ManagementGFI Software
 
Deploying GFI EventsManager™
Deploying GFI EventsManager™Deploying GFI EventsManager™
Deploying GFI EventsManager™GFI Software
 
How to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementHow to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementGFI Software
 
How to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerHow to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerGFI Software
 
Email Security Solutions
Email Security SolutionsEmail Security Solutions
Email Security SolutionsGFI Software
 
Messaging and Web Security
Messaging and Web SecurityMessaging and Web Security
Messaging and Web SecurityGFI Software
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkGFI Software
 
How to Block NDR Spam
How to Block NDR SpamHow to Block NDR Spam
How to Block NDR SpamGFI Software
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productGFI Software
 
Binary translation
Binary translationBinary translation
Binary translationGFI Software
 
GFI MailSecurity's Deployment Strategies
GFI MailSecurity's Deployment StrategiesGFI MailSecurity's Deployment Strategies
GFI MailSecurity's Deployment StrategiesGFI Software
 

Plus de GFI Software (20)

Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Email Continuity
Email ContinuityEmail Continuity
Email Continuity
 
Data Backups
Data BackupsData Backups
Data Backups
 
Master Class Series
Master Class SeriesMaster Class Series
Master Class Series
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Deploying GFI EventsManager™
Deploying GFI EventsManager™Deploying GFI EventsManager™
Deploying GFI EventsManager™
 
How to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementHow to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log Management
 
How to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerHow to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManager
 
Email Security Solutions
Email Security SolutionsEmail Security Solutions
Email Security Solutions
 
Maxmp greylisting
Maxmp greylistingMaxmp greylisting
Maxmp greylisting
 
Messaging and Web Security
Messaging and Web SecurityMessaging and Web Security
Messaging and Web Security
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your Network
 
How to Block NDR Spam
How to Block NDR SpamHow to Block NDR Spam
How to Block NDR Spam
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
Email Continuity
Email ContinuityEmail Continuity
Email Continuity
 
Greylisting
GreylistingGreylisting
Greylisting
 
Binary translation
Binary translationBinary translation
Binary translation
 
Stopping Malware
Stopping MalwareStopping Malware
Stopping Malware
 
GFI MailSecurity's Deployment Strategies
GFI MailSecurity's Deployment StrategiesGFI MailSecurity's Deployment Strategies
GFI MailSecurity's Deployment Strategies
 

Dernier

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Dernier (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Understanding Data Backups

  • 1. GFI White Paper Understanding data backups: why SMEs need them Data is the lifeblood of every organization, yet many either fail to back up their data or they are not doing so properly. Losing data can be catastrophic for a business. This white paper explains why backups are important and the challenges they face.
  • 2. Contents Introduction 3 The state of SME data backup and recovery 3 Challenges facing SMEs 3 Solutions 4 Summary 4 About GFI® 5 Understanding data backups 2
  • 3. Introduction If people are a business’s most valuable resource, then data is the fuel that drives and sustains it. Data, in all its forms, is the key to a successful business. Data helps establish strategy, assures appropriate billing, keeps records and myriad other essential tasks. Without data, a business can fail, making the preserving of data nothing less than a strategic priority. This applies to businesses of all sizes, but especially to small and medium-sized enterprises (SMEs). How important is guarding against data loss? Is survival a good enough reason? Of the companies that lose their data, 90% are out of business within two years and nearly 50% are unable to ever reopen their doors (London Chamber of Commerce) . While small and medium-sized enterprises don’t typically generate the same amount of data that larger enterprises do, they still need the same kind of protection to ensure the timely recovery of essential business data. The state of SME data backup and recovery Data has a great disadvantage compared to PC hardware in that it can be lost, and once lost, never easily replaced. You can get a hard disk replaced under warranty, but the new one will come to you totally empty. However, data has a great advantage that compensates for this weakness: it can be readily and easily duplicated. Given the above, and with so much on the line, you would expect that SME owners and managers have the situation well in hand. Unfortunately, it appears that they don’t. A recent survey by Rubicon Consulting found that while SMEs are grappling with explosive data growth, the backup processes they have in place often put that data at risk. The survey also found that 92% of companies have deployed some form of data backup technology, yet 50% of them have lost data. Of the companies that lost data, approximately one-third lost sales, 20% lost customers, and one-quarter claimed the data loss caused severe disruptions to the company. Concerns about potential data loss run high among SMEs. Respondents rated backup as their second-highest computing priority, after defense against viruses and other malware, and ahead of issues like reducing costs and deploying new computers. Yet nearly one-third of SMEs surveyed do nothing to back up their data. In many instances, when they do, these SMEs do not fully back up the data stored on company computers. About a quarter of SMEs conduct no backup of desktops, and another 13% do only informal backups where employees decide the frequency and which files are protected without any guidance. The situation is similar for servers; about 20% of SMEs conduct no server backup. When backups do occur, most backup files are not stored remotely. More than half of all backup files on desktops and servers are stored in the same location as the originals, a foolish decision which leaves the company vulnerable to permanent data loss. According to survey results, causes of data loss are diverse. Although natural disasters are often cited as a risk, onsite disasters are the primary contributing factors of data loss. 63% of respondents cited hardware failure as a cause of data loss incidents, 27% from deliberate sabotage by employees and 27% from theft. Challenges facing SMEs A foolish frugality seems to govern the approach many SMEs have to safeguarding data properly. There is an inherent misconception that with money and staff time at a premium, there’s always something more pressing to do than manage backups. As shown above, that sort of reasoning, attractive as it might seem to some, jeopardizes a company’s assets as surely as deciding to leave the company cars in an unlocked parking lot, with the keys in the ignition, because it’s too expensive and resource intensive to collect the keys. No one would accept that solution. Understanding data backups 3
  • 4. Given their smaller budgets and lack of in-house IT expertise vis-à-vis larger enterprises, SMEs require solutions that are both cost-effective and easy to use, meaning the top challenges SMEs face with regard to data protection include: »» Implementing comprehensive protection with minimal impact on business operations: It is estimated that data volumes are increasing by as much as 50% per year. At the same time, the demand for higher system availability is shrinking backup windows. Together, these trends are placing greater pressure on small to medium-sized enterprises to improve backup efficiencies and deliver prompt recovery. Gone are the days when critical systems could be shut down to perform backup operations. »» Meeting increasingly stringent backup and recovery requirements: The requirements to recover lost or corrupt data to a specific point in time and reduce the overall time to restore data are becoming more stringent and are now often measured in hours instead of days. Increasingly, tape-based backup infrastructures are unable to meet these requirements. »» Dealing with limited backup administration resources: This is a key issue particularly with smaller companies that may not have dedicated IT staff or backup administrator. The result is that a large percentage of critical data is generated by distributed clients; and an inability to protect this data can leave SMEs open to data loss that can have a significant impact on the business. »» Deploying disaster recovery strategies cost-effectively: As the Rubicon Consulting survey made clear, data protection practices aren’t where they should be for most SMEs. Too often SMEs lack the resources, administrative expertise, and off-site storage required to provide true disaster recovery capabilities. »» Maintaining a secure backup and recovery strategy by providing adequate security, including encryption and virus protection, plus centralized management of an entire data protection infrastructure, ensuring backup data is protected and efficiently managed. Solutions SMEs may not need the scale provided by enterprise backup and recovery solutions, but they do need the same functionality. That means policy-based backups, automated operations and centralized management should be key design tenets to help lightly staffed SMEs effectively manage system and data protection operations. Integrated disaster recovery capabilities, meanwhile, make it easier to rapidly restore complete systems. Newer technologies such as disk-based backup, snapshot backups, data de-duplication, continuous data protection and cloud-based backup options can help SMEs address shrinking backup windows, increasingly stringent RPOs/RTOs (recovery point objectives/recovery time objectives) and recovery reliability concerns. The technologies to implement these solutions do exist, but many SME managers and IT staff can feel overwhelmed by the technology and often, the cost of the solution, leaving their business vulnerable to an avoidable disastrous outcome. While there is no one answer that fits all needs all the time, SMEs would benefit from a backup solution that allows for automation and centralized management of their backup practices. Summary Far too many SMEs engage in risky backup strategies and methods that are born out of a combination of failing to prioritize backup and recovery strategies properly; misplaced optimism that leads them to think “it can’t happen to us”, and some uncertainty over what methods to pursue. Many, when they have a backup strategy, fail to implement it fully, leaving them at risk but instilling a false sense of security. These faulty methods can, when data loss occurs, negatively impact an SME’s bottom line, sales and customer relationships, which explains why so many data disasters are followed by bankruptcy. By developing data backup and recovery strategies and deploying appropriation solutions regarding backups of important data on a timely basis, SMEs can ensure that their data, or most of it at least, will never be truly lost; at worst, some will be lost and they will experience the inconvenience of restoring it in the event of a hard disk failure, for example. That is an infinitely better outcome than going out of business. Understanding data backups 4
  • 5. About GFI GFI Software provides web and mail security, archiving, backup and fax, networking and security software and hosted IT solutions for small to medium-sized enterprises (SMEs) via an extensive global partner community. GFI products are available either as on-premise solutions, in the cloud or as a hybrid of both delivery models. With award-winning technology, a competitive pricing strategy and a strong focus on the unique requirements of SMEs, GFI satisfies the IT needs of organizations on a global scale. The company has offices in the United States (North Carolina, California and Florida), UK (London and Dundee), Austria, Australia, Malta, Hong Kong, Philippines and Romania, which together support hundreds of thousands of installations worldwide. GFI is a channel-focused company with thousands of partners throughout the world and is also a Microsoft Gold Certified Partner. More information about GFI can be found at http://www.gfi.com. Understanding data backups 5
  • 6. USA,»CANADA»AND»CENTRAL»AND»SOUTH»AMERICA 15300 Weston Parkway, Suite 104, Cary, NC 27513, USA Telephone: +1 (888) 243-4329 Fax: +1 (919) 379-3402 ussales@gfi.com UK»AND»REPUBLIC»OF»IRELAND Magna House, 18-32 London Road, Staines, Middlesex, TW18 4BP, UK Telephone: +44 (0) 870 770 5370 Fax: +44 (0) 870 770 5377 sales@gfi.co.uk EUROPE,»MIDDLE»EAST»AND»AFRICA GFI House, San Andrea Street, San Gwann, SGN 1612, Malta Telephone: +356 2205 2000 Fax: +356 2138 2419 sales@gfi.com AUSTRALIA»AND»NEW»ZEALAND 83 King William Road, Unley 5061, South Australia Telephone: +61 8 8273 3000 Fax: +61 8 8273 3099 sales@gfiap.com Disclaimer © 2011. GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners. The information and content in this document is provided for informational purposes only and is provided “as is” with no warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequential damages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the accuracy of the data provided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out- of-date information, or errors. GFI makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in this document. If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.