Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud

Does On-Prem Data Need On-Prem Backup?

Truth in IT
03/09/2024
58
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


On prem applications and data require an on prem backup solution. Myth or reality? What do you think? Well, so where did this one come from? Where do we think this myth came from? And you need to sort of look back at the history of the way we did data protection 20 years ago. And a lot of these sort of myths, I think, come from, um, people's experiences from, you know, ten, 20 years ago. And we had a situation where we had relatively slow networks to what we have today. You know, we may not have had an external connection into the, um, into the internet or externally from our data center like we did in the we do today. And as a result, it was a sort of a requirement to have your backup data as close as possible to the system you're going to restore, because networking was expensive and relatively slow. Now, exclude the fact that if you've got a D.R. site, you'd still have to be putting that data protection system in another location. We'll come back to that in a second. So I think that myth has come from from that scenario. Um, and, and obviously the one thing that people think about all the time is that when we do a restore, they think it's an all or nothing thing, that when we restore, we have to restore our everything. And actually, if you look at the different styles of failure that occur in a data center, you can fat finger data and delete it by accident. Somebody could delete it. Um, because there's a bug and a bit of software, you might have a minor hardware failure, or you might have an entire data center go down. And it could be any or any or all of those sorts of things that that cause you to have a problem. And as a result, you might only be restoring a small amount of data for a certain requirement. So why do you need big pipes to restore, you know, masses of data? The assumption is that you're restoring everything, and that's not necessarily true. Now, even if you are restoring everything, you need to think, well, what scenario am I doing that in my data center might have gone well. There's no point having an on prem copy in the same data center, but you've now lost, so you've still got to put a copy somewhere. You can't keep it on on prem. There's still an issue there. So I think, you know, the idea of needing to have an on premises copy in order to restore is not true, because actually it's more complicated than than it seems. And I, you know, I don't know what your view on that one is, Matt, but, you know, the architecture of the way you designed the backup, you simply just wouldn't want that to be the case anyway. Oh I mean a couple of really great great points there. You know, I think it it does all come from that old ideology that you had smallpipes. And so you had to, to really have kind of that locality in terms of, uh, protection and recovery. You know, I can't move that data very fast, very far. So I'd better have it close, you know, uh, which led to, you know, a lot of the synchronous, asynchronous kind of replication mods at different layers so that you had, you know, I, I've got another copy over there, so I don't have to move it or recover it over there. It's already there, you know, which of course goes to our previous slide about just adding cost, expense and complexity in there. Um, but the more important point, I think, is the nature of the disasters we're trying to build around and architect for recovery for. To your point, you know, it's very rare, uh, that you're seeing like an entire site going down. You know, you may see an application go down, you may see, you know, a subsystem or, you know, important network get affected or, you know, more likely, you know, in the event of kind of a cyber incident, you'll see parts of things all over the place, uh, that are affected. So you can't necessarily just smash everything back in place because then you'd be, uh, overwriting the good data along with the bad.
The belief that on-premises applications and data require on-premises backup is outdated. Historically, due to slow network speeds and limited external connectivity, local backups were essential for quick restores. However, with today's advanced networks and cloud-based solutions like Druva, the necessity for on-prem backups has significantly diminished. Most incidents don't require a full recovery; often only specific data needs restoration. Plus, cloud solutions like Druva offer efficient data protection, reducing complexity and costs while accommodating partial and full recoveries even from massive cyber incidents. Hence, this myth originated in a bygone era of IT infrastructure limitations, which are no longer valid given the modern advancements in cloud technology for data protection and disaster recovery.
Categories:
  • » Cybersecurity » Backup & Recovery
  • » Cybersecurity
Channels:
  • The Druva Channel
  • Don't Worry: Cloud Backups Can Handle IT
News:
Events:
Tags:
  • druva
  • backup
  • security
  • storage
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: Does On-Prem Data Need On-Prem Backup?

            Upcoming Spotlight Events

            • Sep
              11

              An Executive’s Guide to Secure AI Adoption

              09/11/202501:00 PM ET
              More events

              Upcoming 360 View Events

              • Sep
                25

                360View: Email Security & Social Engineering Defense

                09/25/202512:00 PM ET
                • Oct
                  23

                  360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure

                  10/23/202512:00 PM ET
                  • Nov
                    20

                    360View: Budget Optimization: Doing More with Less

                    11/20/202512:00 PM ET
                    More events

                    Upcoming Industry Events

                    • Aug
                      19

                      CMMC 2.0 Insights: Understanding Compliance from an Expert Auditor's Perspective

                      08/19/202512:00 PM ET
                      • Aug
                        21

                        Risk in Real Time: Visibility Into Cloud Based Vulnerabilities

                        08/21/202511:00 AM ET
                        • Aug
                          25

                          Harnessing AI to Transform the Landscape of Data Security

                          08/25/202510:55 AM ET
                          More events

                          Recent Industry Events

                          • Jul
                            23

                            Enhancing API Security Testing: Identifying Vulnerabilities Ahead of Deployment

                            07/23/202501:00 PM ET
                            • Jul
                              10

                              Discover the Latest Features of Netwrix 1Secure for MSPs

                              07/10/202501:00 PM ET
                              • Jul
                                09

                                Building a Strong Data Security Framework with DLP and DSPM Strategies

                                07/09/202510:55 AM ET
                                More events

                                Upcoming Events Calendar

                                • 08/19/2025
                                  12:00 PM
                                  08/19/2025
                                  CMMC 2.0 Insights: Understanding Compliance from an Expert Auditor's Perspective
                                  https://www.truthinit.com/index.php/channel/1401/cmmc-2-0-insights-understanding-compliance-from-an-expert-auditors-perspective/
                                • 08/21/2025
                                  11:00 AM
                                  08/21/2025
                                  Risk in Real Time: Visibility Into Cloud Based Vulnerabilities
                                  https://www.truthinit.com/index.php/channel/1372/understanding-dynamic-risk-management-in-real-time-environments/
                                • 08/25/2025
                                  10:55 AM
                                  08/25/2025
                                  Harnessing AI to Transform the Landscape of Data Security
                                  https://www.truthinit.com/index.php/channel/1381/harnessing-ai-to-transform-the-landscape-of-data-security/
                                • 08/26/2025
                                  10:55 AM
                                  08/26/2025
                                  Confronting AI’s Challenges: Insights into CISOs' Biggest Concerns
                                  https://www.truthinit.com/index.php/channel/1380/confronting-ai-s-challenges-insights-into-cisos-biggest-concerns/
                                • 08/26/2025
                                  01:00 PM
                                  08/26/2025
                                  Renown Health Secures 10K Mailboxes & Stops $1M+ in Email Threats
                                  https://www.truthinit.com/index.php/channel/1404/renown-health-secures-10k-mailboxes-stops-1m-in-email-threats/
                                • 08/27/2025
                                  10:55 AM
                                  08/27/2025
                                  Mastering Secure AI Implementation: A Comprehensive Executive Guide
                                  https://www.truthinit.com/index.php/channel/1379/mastering-secure-ai-implementation-a-comprehensive-executive-guide/
                                • 08/28/2025
                                  10:55 AM
                                  08/28/2025
                                  A Practitioner’s Roadmap for Safeguarding AI Implementation in Organizations
                                  https://www.truthinit.com/index.php/channel/1378/a-practitioner-s-roadmap-for-safeguarding-ai-implementation-in-organizations/
                                • 08/29/2025
                                  10:55 AM
                                  08/29/2025
                                  Ethical Frameworks and Compliance Strategies for Safe AI Implementation
                                  https://www.truthinit.com/index.php/channel/1377/ethical-frameworks-and-compliance-strategies-for-safe-ai-implementation/
                                • 09/11/2025
                                  01:00 PM
                                  09/11/2025
                                  An Executive’s Guide to Secure AI Adoption
                                  https://www.truthinit.com/index.php/channel/1374/an-executives-guide-to-secure-ai-adoption/
                                • 09/16/2025
                                  01:00 PM
                                  09/16/2025
                                  Beyond DMARC: Closing Critical Gaps in Your Email Security Shield
                                  https://www.truthinit.com/index.php/channel/1403/beyond-dmarc-closing-critical-gaps-in-your-email-security-shield/
                                • 09/25/2025
                                  12:00 PM
                                  09/25/2025
                                  360View: Email Security & Social Engineering Defense
                                  https://www.truthinit.com/index.php/channel/930/360view-email-security-social-engineering-defense/
                                • 10/23/2025
                                  12:00 PM
                                  10/23/2025
                                  360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure
                                  https://www.truthinit.com/index.php/channel/931/360view-preventing-data-exfiltration-keeping-enterprise-data-secure/
                                • 11/20/2025
                                  12:00 PM
                                  11/20/2025
                                  360View: Budget Optimization: Doing More with Less
                                  https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
                                • 12/18/2025
                                  12:00 PM
                                  12/18/2025
                                  360View: 2026 IT Predictions & Emerging Trends
                                  https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/
                                Truth in IT
                                • Sponsor
                                • About Us
                                • Terms of Service
                                • Privacy Policy
                                • Contact Us
                                • Preference Management
                                Desktop version
                                Standard version