10 Must-Have Features of Network Attached Storage - Slide 9

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next 10 Must-Have Features of Network Attached Storage-9 Next

While training employees to save work-related documents in folders on the NAS for backup is a good strategy, this is starting to become less viable due to the market penetration of laptops and increase in teleworking. In addition, acquiring the necessary VPN hardware and robust Internet connectivity to remotely access the files on the NAS can be costly, too.

An alternative strategy would be to replicate files stored on local machines to the NAS. Since the file copy is saved locally, it does not matter if the Internet connection to the NAS occasionally fails -- the replication can continue once connectivity is reestablished. Not having to cater for high-availability Internet will result in savings in this instance. On this front, there is at least one NAS model that comes bundled with free real-time replication software that can be used for this purpose.

The threat of data loss is a key concern for IT managers. One simple and time-honed method of ensuring the integrity of business-critical data is to make sure it is regularly backed up. Companies not keen on a cloud-based replication service can employ a network attached storage (NAS) device, but how does one correctly identify the best features for their organization? In this slideshow, Paul Mah highlights the features he considers to be the most important.

Read more on this topic in Paul Mah’s posts “Adopting a NAS Strategy for Your SMB” and “Other Features to Watch For in a NAS.”
 

Related Topics : NAS, Switches

 
More Slideshows

hurricanes How Communications, Preparation and Willingness to Help Were Keys in Hurricane Crises

Entrepreneurial thinking, innovation and selflessness can make things better during crises. Here is a look at how organizations reacted and telecommunications products helped during recent hurricane crises. ...  More >>

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.