Protect Your Data With A-B-C And 3-2-1

Protecting data can be made simpler by looking at the mechanisms involved. The A-B-C of data management describes the most commonly used processes to protect data. A-B-C refers to Archive, Backup and Cloning, all of which are essential to cover all aspects of data protection and data preservation.

A Is For Archive
All files and projects that have been completed should migrate to the long-term archive, where they are catalogued and preserved. For returning customers, for reference and re-use of any kind, the archive provides the "Single Source of Truth“ because it is the one and only place to look for files. The Archive catalog provides browsing and visual presentation of media files with thumbnails and proxy clips. Finding files is made easy by providing metadata fields and menus for searching and combined searching. The metadata schema can and should be customised to fit the needs of the company and the workflow.

B Is For Backup
For less time-critical, an automated Backup is the way to go. Depending on the requirements, that backup can go to disk, cloud or tape storage. In case a file is deleted or corrupted, it can be found in the Backup index and a restore triggered. Depending on requirements, all users can be granted access to a backup so they may restore whenever need be.

The backup always replicates the present production storage, i.e. files needed for day-to-day work. All files that have been finalized or delivered can and should migrate to the archive in order to keep the main production storage and the files residing on it at a reasonable number.

C Is For Cloning
Time critical production storage needs to be cloned to a secondary volume. This serves as fail-over replacement for the primary production storage in case something goes wrong. Cloning is needed where there is no tolerance for the runtime of a restore. Cloning provides an identical copy or replication of a complete storage on a secondary storage device, which can then be used as fail-over for immediate data availability so production can continue within minutes. A cloning strategy requires a secondary storage that can at least to some degree replace the speed and performance of the primary production storage.

3-2-1 To Protect Your Data
The 3-2-1 rule is the most basic rule of data protection and should be observed in any professional IT environment where (media) files play an essential role. The rule states that at least three copies of each file should exist. They should be stored on two different types of media (LTO tape, HDD, SSD, Cloud). One of the copies must be stored off-site for maximum security.

Let us know what you think…

Log-in or Register for free to post comments…

You might also like...

Data Recording: The Optical Drive - Part 11

The optical disk has some useful characteristics that have allowed it to survive alongside magnetic media. John Watkinson takes a look.

Essential Guide: Immersive Audio Pt 3 - Immersive Audio Objects

Immersive audio transforms the listening environment to deliver a mesmerizing and captivating experience for a wide range of audiences and expansive group of genres.

Taming The Virtualized Beast

Without doubt, virtualization is a key technological evolution focus and it will empower many broadcast and media organizations to work differently, more efficiently and more profitably.

Data Recording and Transmission - Part 10: The Hard Disk Drive – Increasing Density

The hard disk drive rapidly converged on the concept of one head per surface with all of the heads moving together on a common positioner.

AI – ML – DL – The Differences

Artificial Intelligence is more than just one element. In this article, we look at and describe the many parts AI encompasses.