Get Instant Access
to This Blueprint

Infrastructure Operations icon

Establish an Effective Data Protection Plan

Give data the attention it deserves by building a strategy that goes beyond backup.

  • Business requirements can be vague. Not knowing the business needs often results in overexpenditure and overexposure to liability through data hoarding.
  • Backup options are abundant. Disk, tape, or cloud? Each has drawbacks, efficiencies, and cost factors that should be considered.
  • Backup infrastructure is never greenfield. Any organization with a history has been doing backup. Existing software was likely determined by past choices and architecture.

Our Advice

Critical Insight

  • Don’t let failure be your metric.
    The past is not an indication of future performance! Quantify the cost of your data being unavailable to demonstrate value to the business.
  • Stop offloading backup to your most junior staff.
    Data protection should not exist in isolation. Get key leadership involved to ensure you can meet organizational requirements.
  • A lot of data is useless. Neglecting to properly tag and classify data will lead to a costly data protection solution that protects redundant, useless, or outdated data

Impact and Result

  • Determine the current state of your data protection strategy by identifying the pains and gains of the solution and create a business-facing diagram to present to relevant stakeholders.
  • Quantify the value of data to the business to properly understand the requirements for data protection through a business impact analysis.
  • Identify the attributes and necessary requirements for your data tiers to procure a fit-for-purpose solution.

Establish an Effective Data Protection Plan

Start here – read the Executive Brief

Read this Executive Brief to understand why the business should be involved in your data protection plan, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

1. Define the current state of your data protection plan

Define the current state of your data protection practices by documenting the backup process and identifying problems and opportunities for the desired state.

3. Propose the future state of your data protection plan

Determine the desired state.

4. Establish proper governance for your data protection plan

Explore the component of governance required.


Member Testimonials

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve. See our top member experiences for this blueprint and what our clients have to say.

9.0/10


Overall Impact

$700


Average $ Saved

2


Average Days Saved

Client

Experience

Impact

$ Saved

Days Saved

Corporation Of The City Of Orillia

Guided Implementation

9/10

N/A

2

City Of Chesapeake

Guided Implementation

10/10

$60,319

60

H.W. Kaufman

Guided Implementation

7/10

N/A

N/A

Scott County Iowa

Guided Implementation

9/10

$31,833

8


About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

Member Rating

9.0/10
Overall Impact

$700
Average $ Saved

2
Average Days Saved

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.

Read what our members are saying

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Need Extra Help?
Try Our Guided Implementations

Get the help you need in this 4-phase advisory process. You'll receive 9 touchpoints with our researchers, all included in your membership.

Guided Implementation #1 - Define the Current State
  • Call #1 - Establish project rationale.
  • Call #2 - Create a diagram of the current state.
  • Call #3 - Identify problems and opportunities.

Guided Implementation #2 - Conduct a Business Impact Analysis
  • Call #1 - Identify systems and scoring criteria.
  • Call #2 - Conduct the impact analysis.

Guided Implementation #3 - Propose the Future State
  • Call #1 - Determine attributes for data protection solution.
  • Call #2 - Create a diagram of the future state.
  • Call #3 - Find knockout criteria.

Guided Implementation #4 - Establish Governance
  • Call #1 - Review IT operations, auditing, and compliance best practices for the data protection plan.

Contributors

  • David Kerrivan, Group Commissioner, 1st Greenwood VC Scouting
  • Thomas Kolbe, Systems Architect, University of San Diego
  • Adam Little, System Engineer I, Rivers Casino Holdings Acquisitions Co.
  • Mark Coney, Systems Engineer, Healthcare/Academic
  • Michael Somerville, NISS Manager, University of San Diego
  • Phillip Warren, Olivet Nazarene University
  • Jackie Ramsey, System Administrator, Liberty Medical Group
  • Nick Furnell, Senior Systems Engineer, Transform Medical Group
  • Brandon Lovelace, Santa Barbara City College
  • Tim Campbell, President, Ascendum IMS LLC

Search Code: 75663
Published: August 7, 2014
Last Revised: August 14, 2020

Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019