Story image

Exclusive: Veeam’s best practices for availability in a cloud era

27 Aug 2018

Article by Veeam product strategy VP Danny Allan

The new digital economy has brought about many changes, forcing businesses and their IT infrastructure to react in new ways to meet new demands.

When it comes to the cloud, the changes are just as dynamic.

Research has found that 81% of enterprises are embracing a multi-cloud strategy with a mix of solutions across private, public, and hybrid clouds – across multiple providers.

With this big move to multi-cloud, the next question is How can businesses ensure their apps and data are available across the new multi-cloud models they are adopting? 

Before that question is addressed, here are some stats highlighting the downside of low availability:

  • 66 % of enterprises admit that digital transformation initiatives are being held back by unplanned downtime
  • $21.8M is an average financial cost of availability and protection gaps for the enterprise
  • 60% of U.S. businesses that experience a cyber-attack suffer the consequence of data loss
  • Fortunately, there are some measures businesses can take to ensure optimal availability.

Here are three key multi-cloud availability best practices to consider:

1. Leverage the cloud for backup and disaster recovery of on-premises data

A good start for any availability strategy is to make sure to follow the 3-2-1 Rule, which is to have at least three copies of data, two of which are local but on different mediums, and at least one off-site copy. Businesses with a multi-cloud strategy are in an ideal position to take advantage of the cloud to help execute a 3-2-1 approach and optimise any legacy backup systems with the cloud.

2. Protect data that’s already in the cloud

It’s important to have control and protection over data already deployed in the cloud. Email data, for instance, is something many organisations must retain for extended periods of time for compliance and regulatory needs. Whether an organisation is using a SaaS solution, such as Microsoft Office 365, or hosting their email application on IaaS, it is critical to have protection against accidental deletions, outages, or a malicious attack.

3. Replicate and migrate applications and data within the cloud

In a multi-cloud strategy, a company will most likely have “born in the cloud” applications in their environment. Being able to replicate these applications for data protection and recovery will be critical to making sure these apps stay up and running in the event of unexpected downtime.

For instance, a company may currently run their cloud-based app in the IBM Cloud data centre located in Houston, Texas.

It can replicate and migrate this app to any of the more than 50 IBM Cloud data centres around the world, or to any data centre within its cloud to meet its data protection and migration needs.

With the momentum to multi-cloud adoption in full swing, having an availability strategy and plan is more important than ever. 

Attacks targeting Cisco Webex extension explode in popularity - WatchGuard
WatchGuard's Internet Security Report for Q4 2018 also finds growing use of a new sextortion phishing malware customised to individual victims.
Developing APAC countries most vulnerable to malware - Microsoft
“As cyberattacks continue to increase in frequency and sophistication, understanding prevalent cyberthreats and how to limit their impact has become an imperative.”
Worldwide spending on security to reach $103.1bil in 2019 - IDC
Managed security services will be the largest technology category in 2019.
Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
Myth-busting assumptions about identity governance - SailPoint
The identity governance space has evolved and matured over the past 10 years, changing with the world around it.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.