Seagate_Lyve-Cloud_Modernize data protection, backup and re…

Backup and Restore Is Evolving Data is everywhere—at the core, in the cloud, and at the edge. It’s in centralized data centers, in colocation sites, and in local business units. But many of the data resources are trapped inside data silos, making enterprise-wide backup recovery more challenging. Customers want to become more efficient at storing, securing, and restoring their data, using best-in-class backup/restore technology. That’s why backup and restore systems must evolve, simply to keep pace with the sheer amount of data being generated. The traditional methods for backup/restore include local on-premises backup devices—such as purpose-built backup appliances (PBBAs) and network-attached storage (NAS)—along with tape drives and tape libraries for archiving. (See Data Device Types section for definitions.) Over the years, each of these storage technologies have proven they can restore data so businesses can continue their operations—supporting their service-level agreements (SLAs) and recovery time objectives (RTOs) and meeting their business-continuity goals from back when the data was first created. Now, in a hybrid-cloud and multicloud world, backup/restore itself must evolve to keep pace with new applications, storage technologies, and threats. It must become faster, more secure, more efficient, and more versatile. There is increasing demand for cloud storage that is simple, trusted, and secure. The challenge is to leverage cloud storage resources without running up high costs associated with data transfers into—and out of—cloud services. Customers’ challenges with onsite data storage include: • Scaling capacity as needed, up and down • Managing and maintaining backup data resources, including PBBAs, NAS, and tape • Reducing costs for backup/restore cycles • Supporting technology upgrades and data migration • Preventing interruptions to business continuity • Risking data loss caused by human error, equipment failure, malware, ransomware, or natural disasters • Ensuring regulatory compliance data privacy for personally identifiable information • Preventing data loss from cybersecurity and ransomware threats.


| 3 |

Powered by