Source: Greg Schulz, Founder and Sr. Advisory Analyst, Server StorageIO® and UnlimitedIO LLC, from the webcast, “How to Become a Data Protection Hero,” organized by Redmond Magazine, February 2016.
© 2016 Dell, Inc. ALL RIGHTS RESERVED. Dell, Dell Software, and the Dell Software logo and products—as identified in this document—are registered trademarks of Dell, Inc. in the U.S.A.and/or other countries. Microsoft and Active Directory are either
registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks and registered trademarks are property of their respective owners. US-FB-29246
Software
Gain insight
and awareness.
Assess risks and approaches
for mitigating them.
Shift focus to
data protection.
Investigate new ways to
support your environment
beyond backup.
Understand
software-defined
data protection.
Protect all your applications —
physical, virtual and in
the cloud.
Pinpoint your
strategy plan.
Classify the factors that drive
your strategy, plan and
implementation.
Determine
your focus.
Determine whether it’s
short-term, long-term,
or hybrid.
Don’t treat
all applications
the same.
Understand the different
RTOs, RPOs, retention
requirement and frequencies
of each application.
How to become a
Data Protection Hero
Identify
threat risks and
challenges.
Categorize what you need
to protect, and when,
where, why, how, for how
long and how often.
Rethink data
protection.
Focus on protecting the
applications that keep your
business running.
It’s time… to move beyond backup and
recovery and into the world of always-on.

Infographic-RedmondWCInfluencer-FB-29246

  • 1.
    Source: Greg Schulz,Founder and Sr. Advisory Analyst, Server StorageIO® and UnlimitedIO LLC, from the webcast, “How to Become a Data Protection Hero,” organized by Redmond Magazine, February 2016. © 2016 Dell, Inc. ALL RIGHTS RESERVED. Dell, Dell Software, and the Dell Software logo and products—as identified in this document—are registered trademarks of Dell, Inc. in the U.S.A.and/or other countries. Microsoft and Active Directory are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks and registered trademarks are property of their respective owners. US-FB-29246 Software Gain insight and awareness. Assess risks and approaches for mitigating them. Shift focus to data protection. Investigate new ways to support your environment beyond backup. Understand software-defined data protection. Protect all your applications — physical, virtual and in the cloud. Pinpoint your strategy plan. Classify the factors that drive your strategy, plan and implementation. Determine your focus. Determine whether it’s short-term, long-term, or hybrid. Don’t treat all applications the same. Understand the different RTOs, RPOs, retention requirement and frequencies of each application. How to become a Data Protection Hero Identify threat risks and challenges. Categorize what you need to protect, and when, where, why, how, for how long and how often. Rethink data protection. Focus on protecting the applications that keep your business running. It’s time… to move beyond backup and recovery and into the world of always-on.