10 Must-Have Features of Network Attached Storage - Slide 9

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next 10 Must-Have Features of Network Attached Storage-9 Next

While training employees to save work-related documents in folders on the NAS for backup is a good strategy, this is starting to become less viable due to the market penetration of laptops and increase in teleworking. In addition, acquiring the necessary VPN hardware and robust Internet connectivity to remotely access the files on the NAS can be costly, too.

An alternative strategy would be to replicate files stored on local machines to the NAS. Since the file copy is saved locally, it does not matter if the Internet connection to the NAS occasionally fails -- the replication can continue once connectivity is reestablished. Not having to cater for high-availability Internet will result in savings in this instance. On this front, there is at least one NAS model that comes bundled with free real-time replication software that can be used for this purpose.

The threat of data loss is a key concern for IT managers. One simple and time-honed method of ensuring the integrity of business-critical data is to make sure it is regularly backed up. Companies not keen on a cloud-based replication service can employ a network attached storage (NAS) device, but how does one correctly identify the best features for their organization? In this slideshow, Paul Mah highlights the features he considers to be the most important.

Read more on this topic in Paul Mah’s posts “Adopting a NAS Strategy for Your SMB” and “Other Features to Watch For in a NAS.”
 

Related Topics : NAS, Switches

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

InfoBuildersIoTData0x Capitalizing on IoT Data: The Golden Rule for Data Success

The key to truly capitalizing on IoT data is a well-established, integrated information management strategy. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.