Protect Your Data With A-B-C And 3-2-1

Protecting data can be made simpler by looking at the mechanisms involved. The A-B-C of data management describes the most commonly used processes to protect data. A-B-C refers to Archive, Backup and Cloning, all of which are essential to cover all aspects of data protection and data preservation.

A Is For Archive
All files and projects that have been completed should migrate to the long-term archive, where they are catalogued and preserved. For returning customers, for reference and re-use of any kind, the archive provides the "Single Source of Truth“ because it is the one and only place to look for files. The Archive catalog provides browsing and visual presentation of media files with thumbnails and proxy clips. Finding files is made easy by providing metadata fields and menus for searching and combined searching. The metadata schema can and should be customised to fit the needs of the company and the workflow.

B Is For Backup
For less time-critical, an automated Backup is the way to go. Depending on the requirements, that backup can go to disk, cloud or tape storage. In case a file is deleted or corrupted, it can be found in the Backup index and a restore triggered. Depending on requirements, all users can be granted access to a backup so they may restore whenever need be.

The backup always replicates the present production storage, i.e. files needed for day-to-day work. All files that have been finalized or delivered can and should migrate to the archive in order to keep the main production storage and the files residing on it at a reasonable number.

C Is For Cloning
Time critical production storage needs to be cloned to a secondary volume. This serves as fail-over replacement for the primary production storage in case something goes wrong. Cloning is needed where there is no tolerance for the runtime of a restore. Cloning provides an identical copy or replication of a complete storage on a secondary storage device, which can then be used as fail-over for immediate data availability so production can continue within minutes. A cloning strategy requires a secondary storage that can at least to some degree replace the speed and performance of the primary production storage.

3-2-1 To Protect Your Data
The 3-2-1 rule is the most basic rule of data protection and should be observed in any professional IT environment where (media) files play an essential role. The rule states that at least three copies of each file should exist. They should be stored on two different types of media (LTO tape, HDD, SSD, Cloud). One of the copies must be stored off-site for maximum security.

Let us know what you think…

Log-in or Register for free to post comments…

You might also like...

Nine Pitfalls Of Relying On FTP To Move Large Media Files

Broadcasters are continuing to adopt and take advantage of IT working practices as they transition to file-based workflows. However, some seemingly effective solutions are outdated, have not kept pace with advances in computing power, and are unable to efficiently transfer…

Essential Guide: Secure IP Infrastructures For Broadcasters

Security is becoming increasingly important for broadcasters looking to transition to IP infrastructures. But creating improved software, firewalls and secure networks is only half the story as cybercriminals look to find new and imaginative methods of compromising data.

Secure IP Infrastructures For Broadcasters - Part 1 - Secure Servers

In this series of three articles, we investigate the underlying aspects of computer server design for high value security and 24-hour operation. In the first article we look at advanced server security, in the second article we understand how servers…

Taming The Virtualized Beast

Without doubt, virtualization is a key technological evolution focus and it will empower many broadcast and media organizations to work differently, more efficiently and more profitably.

AI – ML – DL – The Differences

Artificial Intelligence is more than just one element. In this article, we look at and describe the many parts AI encompasses.