| |DECEMBER 201819the program can immediately continue to work with the corresponding data records - for example, with an e-mail that is directly created again in the mailbox of the corresponding employee.The need of high-availability solutions will re-quire continuously synchronized production server data with a second replica server (physical or virtual) deployed locally, remotely, or in the cloud. During the event of a disaster, whether due to a hardware fail-ure, malicious attack, force majeure, power failure, or failed software installation, the end-user should be immediately and automatically defected to maintain business operations. This also applies to the failback when the production server is available again.A timely back-up with real-time replication en-sures that the restored data is up-to-date in a timely manner so that recovery points that are just a few minutes old can be addressed with second precision. For example, the data status can be saved immedi-ately before the start of a ransomware attack. Like an audio medium, IT can rewind to any data state that will say, three minutes and twelve seconds before an encryption attack begins.Storage-independent solutions can back up data no matter what type of backup media is used in the production environments - DAS, NAS, or SAN. For low-bandwidth, high-latency networks, solutions in-clude WAN optimization features with compression, bandwidth throttling, multi-stream replication, peri-odic replication, or offline synchronization options to adapt the performance of the network. But not to forget the permanent automated check of the fuse for its functionality.Back-up and disaster recovery should partly sup-port data security as well. Such assistance is equally important, given the General Data Protection Reg-ulation. The GDPR gives every EU citizen the right to withdraw their consent for collection of personal data. This includes the final deletion of the e-mails and other personal information.Data ProtectionIn many cases, e-mail archiving solutions can offer a way to provide targeted information retrieval for deletion or recovery beyond backup. Filtering capa-bilities are designed to allow customers to respond as a request for data stored about them, as well as their processing, disclosure and deletion, while taking legitimate business interests into account. For ex-ample, those responsible have the option of backing up a customer's data in the back-up process, even if the customer has actually applied for deletion or has implicitly revoked the permission to save by giving notice. This data may be backed up but not restored to production applications. The company must mark them accordingly during the backup.E-mail archiving solutions also provide function-alities to effectively support the compliance of corpo-rate IT with the requirements, for example, the GDPR. These include encrypted data backup and unified console recovery, granular recoverability of records with the ability to exclude specific data or treat it dif-ferently. This allows you to filter emails by location, area or department.Encryption of the e-mails during backup also sup-ports the DSGVO requirement for `privacy by design' if properly implemented. Reporting on all backup and save time activities and retention reports, show-ing how long copies of the backup are kept and when they are destroyed, can help companies comply with DSGVO privacy compliance documentation. However, the necessary consultation of professional legal ad-vice and the appointment of an internal or external data protection officer be omitted. IN THE MANAGEMENT OF HETEROGENEOUS DATA SYSTEMS, THE GREATEST CHALLENGE IS SEEN IN RELIABLY SECURING DATA AND APPLICATION
< Page 9 | Page 11 >