10 Must-Have Features of Network Attached Storage - Slide 9

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next 10 Must-Have Features of Network Attached Storage-9 Next

While training employees to save work-related documents in folders on the NAS for backup is a good strategy, this is starting to become less viable due to the market penetration of laptops and increase in teleworking. In addition, acquiring the necessary VPN hardware and robust Internet connectivity to remotely access the files on the NAS can be costly, too.

An alternative strategy would be to replicate files stored on local machines to the NAS. Since the file copy is saved locally, it does not matter if the Internet connection to the NAS occasionally fails -- the replication can continue once connectivity is reestablished. Not having to cater for high-availability Internet will result in savings in this instance. On this front, there is at least one NAS model that comes bundled with free real-time replication software that can be used for this purpose.

The threat of data loss is a key concern for IT managers. One simple and time-honed method of ensuring the integrity of business-critical data is to make sure it is regularly backed up. Companies not keen on a cloud-based replication service can employ a network attached storage (NAS) device, but how does one correctly identify the best features for their organization? In this slideshow, Paul Mah highlights the features he considers to be the most important.

Read more on this topic in Paul Mah’s posts “Adopting a NAS Strategy for Your SMB” and “Other Features to Watch For in a NAS.”

Related Topics : NAS, Switches

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Holiday20-190x128 5 Ways to Protect Your Data Center from a 'Zombie' Server Attack

It's easy to forget about the ghosts of servers past that are hiding in the background, continuing to consume electricity and potentially exposing organizations to malicious attacks. ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.