Effective data protection for businesses with multiple locations


Published on

Consistent and co-ordinated data protection procedures can be difficult to implement for businesses with multiple locations or remote/mobile workers. Business Continuity and Disaster Recovery issues are difficult to address, not to mention the security and data integrity concerns.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Effective data protection for businesses with multiple locations

  1. 1. Effective Data Protection For Businesses With Multiple Locations Stefan Haase, Product Director Data Services Mark Hall, Product Director Network Services
  2. 2. In Background
  3. 3. Background Multi-site environments are difficult to manage Business consider cloud based services Concerns about data management Offsite data protection Data compliance and security Network access and security
  4. 4. In Challenges
  5. 5. Data Challenges <ul><li>Offsite data management </li></ul><ul><li>How is data stored? </li></ul><ul><li>How is data protected? </li></ul><ul><li>Data encryption </li></ul><ul><li>Is data encrypted? </li></ul><ul><li>How is the encryption key managed? </li></ul><ul><li>Data compliance </li></ul><ul><li>Is data stored in a compliant fashion? </li></ul><ul><li>Is there an audit trail? </li></ul>
  6. 6. Network Challenges <ul><li>Delivery of multiple business critical applications with different needs on a cost- effective, single converged network - i.e. Voice, Data Backup, Internet, and VPNs to all your sites, large or small </li></ul><ul><li>Ability to centralise your IT services without compromising availability and performance </li></ul><ul><li>Need for fast & flexible provision of network bandwidth across multi-site WAN </li></ul><ul><li>Need for best practice network security </li></ul><ul><li>Lack of internal expert resource </li></ul>
  7. 7. In Requirements
  8. 8. Requirements <ul><li>IT needs to be able to set policies for primary, archive and backup data </li></ul><ul><li>Management from a central site needs to be enabled </li></ul><ul><li>No additional hardware onsite </li></ul><ul><li>Data needs to be offsited automatically </li></ul><ul><li>Offsite data needs to be directly accessible </li></ul><ul><li>Data needs to be transferred and accessed securely from each site </li></ul><ul><li>All data needs to be stored securely </li></ul><ul><li>Data compliance requirements need to be adhered to </li></ul><ul><li>Carbon footprint needs to be reduced </li></ul>
  9. 9. In Security
  10. 10. Data Security <ul><li>How and where is data stored? </li></ul><ul><li>How has got access to data when it’s stored offsite? </li></ul><ul><li>What encryption is available? </li></ul><ul><li>What software solution is used? </li></ul><ul><li>How can data be accessed & recovered securely? </li></ul><ul><li>What happens in the event of a disaster, and what are the recovery procedures </li></ul><ul><li>Can a copy of the data be hosted in a geographically separated data centre? </li></ul><ul><li>Security needs to be a core part of the offering - it can’t be anything other than industrial strength </li></ul>
  11. 11. Network Security <ul><li>How will the different ‘services’ on the converged WAN be kept separate? </li></ul><ul><li>How will access to network devices be restricted and any access audited? </li></ul><ul><li>How will traffic be controlled between networks with different levels of trust? </li></ul><ul><li>How can remote users be connected to the corporate network without compromising its integrity? </li></ul><ul><li>How can data that has to be transported over ‘insecure’ networks be protected? </li></ul><ul><li>How can WAN suppliers help customers develop and continuously improve their security policy? </li></ul>
  12. 12. In Best Practices
  13. 13. Best Practices <ul><li>Choose best of breed supplier </li></ul><ul><li>Choose the right level of service for the type of data you want to manage and protect </li></ul><ul><li>Automate data management </li></ul><ul><li>Agree departmental storage, archive and backup policies </li></ul><ul><li>Set central policies </li></ul><ul><li>Encrypt data where appropriate </li></ul><ul><li>Ensure secure data storage location </li></ul><ul><li>Ensure business processes are aligned </li></ul><ul><li>Review policies and procedures on a regular basis </li></ul>
  14. 14. In Supplier Selection
  15. 15. Choosing the right supplier <ul><li>Access to best of breed technology </li></ul><ul><li>Review service provider’s track record </li></ul><ul><li>Review customer case studies </li></ul><ul><li>Ensure data is stored in the UK </li></ul><ul><li>Visit the service provider premises </li></ul><ul><li>Review security provision </li></ul><ul><li>Access to 24x7 support </li></ul><ul><li>Ensure carbon foot print reduction </li></ul>
  16. 16. Questions to ask your service provider <ul><li>How financially stable are they? Your business is at risk if they suddenly run out of funding and have to switch the lights off. </li></ul><ul><li>How much experience do they have? A big advantage of a cloud computing provider is that you should be tapping into their previous experience, not being their first experiment. </li></ul><ul><li>Are their quality processes the same level as yours? It’s well worth a visit to their HQ to see and understand the processes behind the cloud; as an IT professional you know what you’re looking for. </li></ul>
  17. 17. Summary <ul><li>Moving data to the cloud can offer a secure </li></ul><ul><li>way for multi –site businesses to manage </li></ul><ul><li>their data securely provided that: </li></ul><ul><li>The service provider has got a decent track record </li></ul><ul><li>Network are secured and managed </li></ul><ul><li>Data is managed according to its value </li></ul><ul><li>Data management is automated </li></ul><ul><li>Data encryption is used where appropriate </li></ul><ul><li>Data compliance is ensured </li></ul>