10 Must-Have Features of Network Attached Storage - Slide 9

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next 10 Must-Have Features of Network Attached Storage-9 Next

While training employees to save work-related documents in folders on the NAS for backup is a good strategy, this is starting to become less viable due to the market penetration of laptops and increase in teleworking. In addition, acquiring the necessary VPN hardware and robust Internet connectivity to remotely access the files on the NAS can be costly, too.

An alternative strategy would be to replicate files stored on local machines to the NAS. Since the file copy is saved locally, it does not matter if the Internet connection to the NAS occasionally fails -- the replication can continue once connectivity is reestablished. Not having to cater for high-availability Internet will result in savings in this instance. On this front, there is at least one NAS model that comes bundled with free real-time replication software that can be used for this purpose.

The threat of data loss is a key concern for IT managers. One simple and time-honed method of ensuring the integrity of business-critical data is to make sure it is regularly backed up. Companies not keen on a cloud-based replication service can employ a network attached storage (NAS) device, but how does one correctly identify the best features for their organization? In this slideshow, Paul Mah highlights the features he considers to be the most important.

Read more on this topic in Paul Mah’s posts “Adopting a NAS Strategy for Your SMB” and “Other Features to Watch For in a NAS.”
 

Related Topics : NAS, Switches

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.