By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Having the ability to run virtual machines in the cloud is having a rather dramatic impact on data protection. This is especially true for smaller organizations.
One of the most fundamental and long-lasting concepts of data protection is that the only way to achieve adequate protection is to have a copy of your data stored securely off-site. Even so, the way in which this off-site protection is achieved varies widely, depending on the size of the company.
For instance, large companies often have remote data centers. Line-of-business applications may be protected by stretching failover clusters to include remote nodes. Similarly, virtual machines (VMs) might be configured in a way that allows them to fail over to a remote facility. Conversely, smaller organizations are often limited to shipping tapes off-site or perhaps performing cloud backups. In other words, large organizations tend to use remote facilities as part of their continuity of business solution, while smaller organizations usually lack the budget for such protection.
Virtual machine replication gives companies the ability to run VMs in the cloud. This is beginning to level the playing field, so to speak. Now, an organization might not need to invest in a remote data center. For the first time, smaller organizations can have continuity-of-business solutions that rival those of larger organizations. If something were to happen to an organization's primary data center, virtual machine replication allows the VM replicas to be brought online and used to keep the business running.
New CTO previews VMware hybrid cloud strategy beyond DRaaS
How Hyper-V Recovery Manager works and where it falls short
Related Q&A from Brien Posey
While you may want to jump on the data management and protection train, consider first how combining the two in one product will affect your systems ... Continue Reading
Hackers can gain remote access to users' desktops through RDP hijacking. As a result, IT pros must know what they can do to prevent such an attack. Continue Reading
When IT pros are seeking an alternative to Outlook, they should consider the features their users need the most and select an email client that best ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.