ABSTRACT

Conversely, choosing a data protection system for our environment is all about the technology. It doesn’t matter how good the people, processes and documentation, training, service level agreements, and testing are if the wrong technology is chosen. Full recovery of a virtual machine would usually take less than a minute to complete, whereas file level recovery would take half an hour or longer to run through. This process would have been OK if most recoveries were full virtual machine recoveries—but in actuality, the majority of recoveries required were file level recovery. It’s always best when planning data protection infrastructure to ensure people have more than a single hammer available to people. When planning new protection infrastructure, it’s equally important to build a checklist of required product functionality and confirm products supply it. This goes beyond confirming support for in-use products within the business—it’s about making sure the product more broadly performs and provides what the business needs.