Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Does On-Prem Data Need On-Prem Backup?

Truth in IT
03/09/2024
58
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


On prem applications and data require an on prem backup solution. Myth or reality? What do you think? Well, so where did this one come from? Where do we think this myth came from? And you need to sort of look back at the history of the way we did data protection 20 years ago. And a lot of these sort of myths, I think, come from, um, people's experiences from, you know, ten, 20 years ago. And we had a situation where we had relatively slow networks to what we have today. You know, we may not have had an external connection into the, um, into the internet or externally from our data center like we did in the we do today. And as a result, it was a sort of a requirement to have your backup data as close as possible to the system you're going to restore, because networking was expensive and relatively slow. Now, exclude the fact that if you've got a D.R. site, you'd still have to be putting that data protection system in another location. We'll come back to that in a second. So I think that myth has come from from that scenario. Um, and, and obviously the one thing that people think about all the time is that when we do a restore, they think it's an all or nothing thing, that when we restore, we have to restore our everything. And actually, if you look at the different styles of failure that occur in a data center, you can fat finger data and delete it by accident. Somebody could delete it. Um, because there's a bug and a bit of software, you might have a minor hardware failure, or you might have an entire data center go down. And it could be any or any or all of those sorts of things that that cause you to have a problem. And as a result, you might only be restoring a small amount of data for a certain requirement. So why do you need big pipes to restore, you know, masses of data? The assumption is that you're restoring everything, and that's not necessarily true. Now, even if you are restoring everything, you need to think, well, what scenario am I doing that in my data center might have gone well. There's no point having an on prem copy in the same data center, but you've now lost, so you've still got to put a copy somewhere. You can't keep it on on prem. There's still an issue there. So I think, you know, the idea of needing to have an on premises copy in order to restore is not true, because actually it's more complicated than than it seems. And I, you know, I don't know what your view on that one is, Matt, but, you know, the architecture of the way you designed the backup, you simply just wouldn't want that to be the case anyway. Oh I mean a couple of really great great points there. You know, I think it it does all come from that old ideology that you had smallpipes. And so you had to, to really have kind of that locality in terms of, uh, protection and recovery. You know, I can't move that data very fast, very far. So I'd better have it close, you know, uh, which led to, you know, a lot of the synchronous, asynchronous kind of replication mods at different layers so that you had, you know, I, I've got another copy over there, so I don't have to move it or recover it over there. It's already there, you know, which of course goes to our previous slide about just adding cost, expense and complexity in there. Um, but the more important point, I think, is the nature of the disasters we're trying to build around and architect for recovery for. To your point, you know, it's very rare, uh, that you're seeing like an entire site going down. You know, you may see an application go down, you may see, you know, a subsystem or, you know, important network get affected or, you know, more likely, you know, in the event of kind of a cyber incident, you'll see parts of things all over the place, uh, that are affected. So you can't necessarily just smash everything back in place because then you'd be, uh, overwriting the good data along with the bad.
The belief that on-premises applications and data require on-premises backup is outdated. Historically, due to slow network speeds and limited external connectivity, local backups were essential for quick restores. However, with today's advanced networks and cloud-based solutions like Druva, the necessity for on-prem backups has significantly diminished. Most incidents don't require a full recovery; often only specific data needs restoration. Plus, cloud solutions like Druva offer efficient data protection, reducing complexity and costs while accommodating partial and full recoveries even from massive cyber incidents. Hence, this myth originated in a bygone era of IT infrastructure limitations, which are no longer valid given the modern advancements in cloud technology for data protection and disaster recovery.
Categories:
  • » Cybersecurity Webinars » Backup & Recovery
  • » Cybersecurity Webinars
  • » Webinar Library » Druva
Channels:
  • The Druva Channel
  • Don't Worry: Cloud Backups Can Handle IT
News:
Events:
Tags:
  • druva
  • backup
  • security
  • storage
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Does On-Prem Data Need On-Prem Backup?

              Upcoming Webinar Calendar

              • 01/20/2026
                01:00 PM
                01/20/2026
                Beyond The Basics: IT service delivery workflows that close the efficiency gap
                https://www.truthinit.com/index.php/channel/1756/beyond-the-basics-it-service-delivery-workflows-that-close-the-efficiency-gap/
              • 01/22/2026
                01:00 PM
                01/22/2026
                Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA
                https://www.truthinit.com/index.php/channel/1668/netskope-securing-access-go-beyond-vpn-and-nac-to-universal-ztna/
              • 01/27/2026
                01:00 PM
                01/27/2026
                AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era
                https://www.truthinit.com/index.php/channel/1759/ai-quantum-attacks-exposed-your-survival-guide-for-the-next-gen-threat-era/
              • 01/29/2026
                10:00 AM
                01/29/2026
                Preparing Your Cybersecurity Strategy for the Challenges of 2026
                https://www.truthinit.com/index.php/channel/1705/preparing-your-cybersecurity-strategy-for-the-challenges-of-2026/
              • 02/03/2026
                01:00 PM
                02/03/2026
                Evolution of Cloud Adaptability and AI Performance
                https://www.truthinit.com/index.php/channel/1760/evolution-of-cloud-adaptability-and-ai-performance/

              Upcoming Spotlight Events

              • Jan
                22

                Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA

                01/22/202601:00 PM ET
                More events

                Upcoming Industry Events

                • Jan
                  29

                  Preparing Your Cybersecurity Strategy for the Challenges of 2026

                  01/29/202610:00 AM ET
                  More events

                  Recent Spotlight Events

                  • Dec
                    10

                    The Next Generation of Managed Data Security Services

                    12/10/202501:00 PM ET
                    • Dec
                      02

                      The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

                      12/02/202501:00 PM ET
                      • Nov
                        20

                        Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                        11/20/202501:00 PM ET
                        More events

                        Recent Industry Events

                        • Dec
                          18

                          Insight into IconAds, SlopAds, and AI Threats on the 2026 Horizon

                          12/18/202501:00 PM ET
                          • Dec
                            16

                            HUMAN Dialogue: Discover the True Insights Behind Page-Level Performance Intelligence

                            12/16/202501:00 PM ET
                            • Dec
                              11

                              Partner Tech Insights: Bridge Gaps and Enhance Revenue with Druva’s Microsoft Expansion.

                              12/11/202501:00 PM ET
                              More events
                              Truth in IT
                              • Sponsor
                              • About Us
                              • Terms of Service
                              • Privacy Policy
                              • Contact Us
                              • Preference Management
                              Desktop version
                              Standard version