Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Operations

Data on the Edge: How the Rise of Mobility, Remote Offices, and Telework Brings Interesting Challenges and Opportunities in Data Protection

by GTI Editors
July 26, 2013
in Operations
Reading Time: 2 mins read
A A
Share on FacebookShare on Twitter

With more and more government agencies, like the EPA, Department of Energy, and the VA embracing mobility, branch offices, and teleworking there’s an equal demand to embrace data management and protection strategies to ensure immediate data backup and recover and the continuity and the security of operations.  Not only do agency IT managers need to worry about having more end points to protect and an increasing number of possible sources of threat, but to make things even more complicated, if they’re not able to keep track of data at the edge of the network, then the legal and regulatory consequences sky rocket.

Protecting and recovering data at remote sites and at end-points using legacy technologies can consume scarce resources, require expertise that often isn’t present, and is prone to failure. In addition, these isolated systems can be expensive to deploy and manage. In the case of a site-level disaster—such as natural disasters, human error, viruses, and security breaches—organizations need to have a copy of important data stored safely, far away from the remote office that holds the original copy, but that is still easily and rapidly accessible. Without a centralized strategy, organizations are at risk for lost data, which can result in reduced operational capability and employee productivity as well as a range of other operational consequences.

While there are likely as many solutions as there are threats to data – from hardware, to software, to usage policies, there are some best practices to help federal IT practitioners navigate their data away from the edge, metaphorically speaking, into safer territory.

To learn more click here.

Tags: Backup & RecoveryBCDRBusiness Continuity and Disaster RecoveryCommVaultdata centerData Center VulnerabilitiesData ManagementData Protection StrategyData VulnerabilityDepartment of EnergyDepartment of Veterans AffairsEnd Point SecurityEPAInformation ManagementRemote Site ProtectionROBOsSimpana

RELATED POSTS

Creating Human-Centered Federal Customer Experiences
Customer Experience

Creating Human-Centered Federal Customer Experiences

January 6, 2023
How the Department of Veterans Affairs is Transforming the Customer Experience with Artificial Intelligence
AI & Data

How the Department of Veterans Affairs is Transforming the Customer Experience with Artificial Intelligence

November 3, 2022
quantum internet guide
Civilian

Preparing for the Quantum Future: A Quantum Internet Guide for Federal Agencies Part 1

November 1, 2022
Please login to join discussion

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    10453 shares
    Share 4181 Tweet 2613
  • Do More with Less: Leveraging Automation Technology to Improve Customer Experiences and Service Delivery

    22 shares
    Share 9 Tweet 6
  • The Five Pillars of Zero Trust Architecture

    534 shares
    Share 214 Tweet 134

CONNECT WITH US

Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us