Eliminating Complexity and Risk From Your Data Protection
There once was a manufacturer that supplied parts for a car company. Their quality control process allowed them to ensure no more than 1 defect for evert 1000 parts shipped. At first, this seems very impressive. But each car consisted of over 10,000 different components. If every supplier maintained the same standard of quality, this would guarantee 10 defects for every vehicle. Not only would this create unhappy customers, but it could also put lives at risk.
A similar principle comes into play when it comes to managing and protecting corporate IT systems.
A group of university researchers recently completed a major 4-year assessment of tech vendors by 36,0000 customers. One of the more interesting findings to come out of the study was that technology professionals overwhelmingly prefer to work with integrated systems, instead of buying and assembling components to create their solutions.
Integrated solutions have long been preferred amongst IT customers in both the business and consumer spaces.
With IBM Power Systems, hardware, hypervisor, OS, database, and applications are all provided by the same vendor. And these are all designed in such a way that they work together immaculately. This provides the lowest possible Total Cost of Ownership. And the systems are secure & resilient by default.
Similarly, Apple has achieved market dominance by offering hardware, operating systems, and other components from the same provider, while also maintaining tight control over which applications and content can be used on their systems. Because Apple has control over every aspect of its platforms, it can provide a truly exceptional and streamlined user experience that has created a loyal — almost cult-like — following. And because these systems are completely integrated, they are also much easier to use, upgrade, maintain, and repair.
When it comes to technology, there is something to be said about simplification. The data protection requirements for most companies today might look something like this:
- Backup for traveling laptops and PCs
- File sharing and collaboration for users
- Database backup
- File server backup
- Full system state backup
- Disaster recovery and high availability for critical systems
- Archiving for information compliance
- Backup for Linux, Windows, Mac, and other operating systems on physical and virtualized hardware
Each of these processes requires investments of time, resources, and capital.
The company will need to spend money on new hardware and software. They’ll need to train internal staff on how to manage these various data protection activities and hire outside consultants for implementation and maintenance. The company will also incur other costs relating to data center space, storage media, shipping costs, off-site storage, and energy consumption.
In this context, several risks arise when companies attempt to manage their own data protection.
First, there is a capital risk.
Every dollar spent on in-house data protection solutions is a sunk cost. If the company’s IT requirements change significantly soon, it will have to re-invest in expensive new solutions.
Then, there is the liability risk.
Human error is one of the leading causes of critical data loss and