Story image

What's the top cause for data restoration requests...?

07 Aug 2014

When it comes to data restoration, addressing deleted mailboxes or emails is the most common request of IT administrators, according to new survey data provided by Kroll Ontrack.

When asked how often they receive requests for data restoration, 61 percent of the nearly 200 Ontrack PowerControls customers surveyed across the world report they receive up to five restoration requests a month, with an additional 11 percent claiming up to 10 times a month.

Accidental deletion of mailboxes and specific messages from Microsoft Exchange is not the only data restoration request made of IT administrators.

In the US for example, the second most common data restoration need was collection of electronic data for ediscovery (21 percent), followed by consolidating data from older to new applications to eliminate legacy servers (15 percent).

Requests for data restoration came from all departments across an organisation, with 24 percent stemming from the internal legal department, 22 percent coming from IT security and 15 percent originating from sales and marketing.

Why do these people need their email and documents back? Forty-five percent of IT administrator respondents note that employees request their email and documents back because they were accidentally deleted. Internal investigations (17 percent) ranked as the second most common source of restoration requests.

“The time it takes to search, identify, copy, restore and export data from Microsoft Exchange or Microsoft SharePoint platforms can be significant, especially if IT admins are executing the task by restoring a full database backup,” says Tom McCaffrey, product director of enterprise solutions, Kroll Ontrack.

“With its granular restoration capabilities directly to your production server from any backup system, 41 percent of those surveyed report Ontrack PowerControls helps them address collection, restoration and consolidation requests in approximately half the time as compared to other methods, such as full backup or brick-level backup restores.”

Check Point announces integration with Microsoft Azure
The integration of Check Point’s advanced policy enforcement capabilities with Microsoft AIP’s file classification and protection features enables enterprises to keep their business data and IP secure, irrespective of how it is shared. 
Blockchain: New Zealand needs to get up to speed
"The technology can traverse every business domain and can have far reaching impacts on society as we know it."
Why AI will be procurement’s greatest ally
"AI can help identify emerging suppliers, technologies and products in specific categories."
Five key ways an IT professional can keep their body and mind healthy
Sitting in the same place facing an artificially lit screen for 6-8 hours a day can have a negative impact on your overall health if you don’t offset it with diet and exercise.
Are AI assistants teaching girls to be servants?
Have you ever interacted with a virtual assistant that has a female-based voice or look, and wondered whether there are implicitly harmful gender biases built into its code?
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Commission warns Spark for misleading in-contract customers
The warning follows an investigation into representations Spark made on its website and in emails in August and September 2018.
Optic Security Group celebrates Axis accolade
Auckland-based business security systems provider Fortlock has picked up an award at Axis Communications’ annual Oceania Axis Partner Summit 2019.