Protect Your Data With A-B-C And 3-2-1

Protecting data can be made simpler by looking at the mechanisms involved. The A-B-C of data management describes the most commonly used processes to protect data. A-B-C refers to Archive, Backup and Cloning, all of which are essential to cover all aspects of data protection and data preservation.

A Is For Archive
All files and projects that have been completed should migrate to the long-term archive, where they are catalogued and preserved. For returning customers, for reference and re-use of any kind, the archive provides the "Single Source of Truth“ because it is the one and only place to look for files. The Archive catalog provides browsing and visual presentation of media files with thumbnails and proxy clips. Finding files is made easy by providing metadata fields and menus for searching and combined searching. The metadata schema can and should be customised to fit the needs of the company and the workflow.

B Is For Backup
For less time-critical, an automated Backup is the way to go. Depending on the requirements, that backup can go to disk, cloud or tape storage. In case a file is deleted or corrupted, it can be found in the Backup index and a restore triggered. Depending on requirements, all users can be granted access to a backup so they may restore whenever need be.

The backup always replicates the present production storage, i.e. files needed for day-to-day work. All files that have been finalized or delivered can and should migrate to the archive in order to keep the main production storage and the files residing on it at a reasonable number.

C Is For Cloning
Time critical production storage needs to be cloned to a secondary volume. This serves as fail-over replacement for the primary production storage in case something goes wrong. Cloning is needed where there is no tolerance for the runtime of a restore. Cloning provides an identical copy or replication of a complete storage on a secondary storage device, which can then be used as fail-over for immediate data availability so production can continue within minutes. A cloning strategy requires a secondary storage that can at least to some degree replace the speed and performance of the primary production storage.

3-2-1 To Protect Your Data
The 3-2-1 rule is the most basic rule of data protection and should be observed in any professional IT environment where (media) files play an essential role. The rule states that at least three copies of each file should exist. They should be stored on two different types of media (LTO tape, HDD, SSD, Cloud). One of the copies must be stored off-site for maximum security.

You might also like...

HDR & WCG For Broadcast: Part 3 - Achieving Simultaneous HDR-SDR Workflows

Welcome to Part 3 of ‘HDR & WCG For Broadcast’ - a major 10 article exploration of the science and practical applications of all aspects of High Dynamic Range and Wide Color Gamut for broadcast production. Part 3 discusses the creative challenges of HDR…

IP Security For Broadcasters: Part 4 - MACsec Explained

IPsec and VPN provide much improved security over untrusted networks such as the internet. However, security may need to improve within a local area network, and to achieve this we have MACsec in our arsenal of security solutions.

Standards: Part 23 - Media Types Vs MIME Types

Media Types describe the container and content format when delivering media over a network. Historically they were described as MIME Types.

Building Software Defined Infrastructure: Part 1 - System Topologies

Welcome to Part 1 of Building Software Defined Infrastructure - a new multi-part content collection from Tony Orme. This series is for broadcast engineering & IT teams seeking to deepen their technical understanding of the microservices based IT technologies that are…

IP Security For Broadcasters: Part 3 - IPsec Explained

One of the great advantages of the internet is that it relies on open standards that promote routing of IP packets between multiple networks. But this provides many challenges when considering security. The good news is that we have solutions…