Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud

Vendor Lock-in: Cloud vs. Legacy Backup Applications

Truth in IT
03/09/2024
49
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


With cloud. Your data is locked in myth. Fact. What do you think? Well, isn't it funny? I mentioned sticky just before we get to the last one. Now, what do we mean by sticky? And what do we plan that? Yeah, it almost looked. Like I planned it, didn't it? Yeah. Um, what do we mean by sticky and what do we mean by lock in? I think so when I, when I say sticky, what I'm saying is that, um, potentially you may be keeping your, um, your backups and your, your data protection archives for, you know, some, some environments could keep them for years. Um, depends on the governance, sorry, the compliance requirements of your environment, where you may be required to keep things for an awful long time. And as a result, it's very difficult to get off one backup solution, because there are no tools that will take your data and migrate it to a new backup solution, usually without having to sort of rehydrate that data back into its original form. So people tend not to get off data protection solutions because they have a natural degree of lock in. So does a cloud have a degree of lock in? Well, yeah. All all solutions have lock in one way or another. So I don't think anything in the cloud is any worse than it would be if you were doing it on premises, to be fair. Okay. Yeah. And, um, I think I think the joke is, do you think you're not locked in anywhere else? You know, uh, it, you know, to be frank, it doesn't matter what solutions you're using. There's always some restrictions in terms of moving from one to the other, you know, as a as a backup vendor and having lived in the data protection space for. Well, too long. Uh, you know, that's always been one of the hardest things. It's like, well, I'm changing from this vendor to another vendor. Uh, you know, what do you know? Can I move all my backups with, uh, with me? It's like, well, there's no real good answer. Uh, but at least, you know, when you start looking at cloud, there certainly is a lot more avenue in terms of portability of that data. You know, you're not locked into a particular hardware. You're not locked into a particular platform necessarily. You're not locked into, you know, a particular, uh, storage array vendor or manufacturer or site or, you know, from, you know, physical, uh, restrictions, you know, so, yes, maybe all my data is in AWS, but it ain't that hard to get it back from there or to put it somewhere else where I need where I need it tomorrow or, you know, uh, so I think, uh, you'd be naive to think that there isn't lock in to some degree with anything that you're doing or, I think, a better way of framing it of, you know, there there aren't challenges in kind of transitioning between different platforms, uh, regardless of if it's, you know, a database platform, it's not like you can copy your SQL database into Oracle and it's going to work, uh, you know, so, you know, there's always going to be challenges with replatforming. But I think when you look at, uh, just, you know, the cloud options in general, that road is a lot smoother and gives you a lot more options in terms of where and how do I want that, recover that data to come back and be repatriated? Yeah. Here's here's one other thing to think about as well. So you know, think about um, on premises lock in, buying a solution that you may have to run for 10 or 15 years. Um, as you sort of highlighted indirectly, Matt, you're going to have to keep that hardware, potentially. You're going to have to keep that software. The vendor might not upgrade that software, but you still need to maintain it. So now you've potentially got an exposure every time you start that software up to recover. Alternatively, you ship your media to somebody else who does that for you, and then it becomes an expensive recovery point every time you want to get something back. So yeah, there are pluses and minuses in both sides of this. And it's it's going to be an issue whatever you do. But I do like the way you just described it in the sense that there's no hardware lock in, there's no software lock in, you know, this is a service you've got and it's a lock into a service is very different to a lock in to a software product.
Discussing the concept of vendor lock-in, it's clear that while every solution has some form of lock-in, cloud services like Druva offer greater flexibility compared to traditional on-premises solutions. With Druva, businesses can avoid the rigidity of hardware and software constraints, enabling easier data mobility and management. The cloud's inherent service-based model alleviates many of the common challenges of data transfer and storage, offering a smoother path for data recovery and repatriation. Thus, Druva provides a versatile and secure cloud data protection service that navigates beyond the typical pitfalls of long-term, on-premises data retention, aligning with modern compliance requirements and offering a more adaptable recovery solution.
Categories:
  • » Cybersecurity » Backup & Recovery
  • » Cybersecurity
Channels:
  • The Druva Channel
  • Don't Worry: Cloud Backups Can Handle IT
News:
Events:
Tags:
  • druva
  • backup
  • security
  • storage
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: Vendor Lock-in: Cloud vs. Legacy Backup Applications

            Upcoming Spotlight Events

            • Jun
              24

              Agentic AI Ransomware: What You Need to Know

              06/24/202501:00 PM ET
              • Jul
                29

                QR Codes Exposed: From Convenience to Cybersecurity Nightmare

                07/29/202501:00 PM ET
                More events

                Upcoming 360 View Events

                • Jun
                  18

                  360View: The Data Resilience Imperative – Securing, Scaling & Optimizing Enterprise Data

                  06/18/202512:00 PM ET
                  • Jul
                    24

                    360View: API Security & the Expanding Attack Surface

                    07/24/202512:00 PM ET
                    • Aug
                      21

                      360View: HCI, Cloud, and Virtualization: What’s Next?

                      08/21/202512:00 PM ET
                      More events

                      Upcoming Industry Events

                      • Jun
                        24

                        Ransomware Revealed: Tactics, Entry Points, and Real-World Lessons

                        06/24/202501:00 PM ET
                        • Jun
                          25

                          Anticipating Evolving Threats: Strategies for Detection, Response, and Resilience

                          06/25/202501:00 PM ET
                          • Jun
                            26

                            Mastering Modern Security with Wallarm's Advanced API Solutions

                            06/26/202501:00 PM ET
                            More events

                            Recent Industry Events

                            • May
                              29

                              Dispelling Misconceptions Surrounding API Security

                              05/29/202501:00 PM ET
                              • May
                                08

                                Strengthening API Security through NIST SP 800-228 Guidelines

                                05/08/202501:00 PM ET
                                • Apr
                                  17

                                  Critical Insights on the Discovery, Disclosure, and Impact of an Android Vulnerability

                                  04/17/202502:40 AM ET
                                  More events
                                  Truth in IT
                                  • Advertise
                                  • About Us
                                  • Terms of Service
                                  • Privacy Policy
                                  • Contact Us
                                  • Be Our Guest
                                  • Preference Management
                                  Desktop version
                                  Standard version