Skip to content
Valery Guilleaume12.12.20191 min read

Data Protection - A user centric backup approach

It’s very common that multiple end-users need to ask the IT OPS to retrieved archived or protected data.

Can they archive it or protect it all by themselves or not?

Here are the risks and policies around those important issues :

  • IT OPS fear to lose control over the data integrity.
  • How to keep control over data management while sharing accesses ?
  • Lack of visibility over who accesses what, when, and for what reason.
  • Poor visualization of the data workflows (and nobody likes a black box).
  • Data integrity can be altered.
  • Data can be modified, duplicated, or even lost.

Different industries have different ways of working, different companies have different ways of working and different users have different ways of working ! And this is perfectly right for any team to keep a total autonomy on how they want to work !

Technology should never force changes in ways of working

To make it possible, you need to solve these 3 different issues.

First issue :

  • Back-ups and Archives are often times performed one time and then forgot about. 
  • Lack of visibility does not allow end-user to access specific content without sifting through an entire backup.

Second issue :

  • IT OPS work 24x7. For a seamless handover of work in process, they need total visibility over all data movement.
  • End users need access to data and find those that may have been generated by others.

Third issue :

  • Data and Metadata needs to be protected.
  • Data protection is more than just a back-up; it involves multiple stakeholders in the process.
  • It should foresee easy recovery and retrieval.
  • Business users should be actively involved in how data should be protected.

Data protection should be a process-driven software solution

IT OPS and the end users should decide what data is protected and how. And any end-user can choose in the Self-Service Catalog the SLA, the Retention and the Resiliency.

Gone are the days when :

  • a back-up file is stored in the basement and no one knows what is on it or where it is.
  • a “full back up” needed to be recovered by IT OPS to access only one or a few files needed by one end-user !