Story image

What's the top cause for data restoration requests...?

07 Aug 14

When it comes to data restoration, addressing deleted mailboxes or emails is the most common request of IT administrators, according to new survey data provided by Kroll Ontrack.

When asked how often they receive requests for data restoration, 61 percent of the nearly 200 Ontrack PowerControls customers surveyed across the world report they receive up to five restoration requests a month, with an additional 11 percent claiming up to 10 times a month.

Accidental deletion of mailboxes and specific messages from Microsoft Exchange is not the only data restoration request made of IT administrators.

In the US for example, the second most common data restoration need was collection of electronic data for ediscovery (21 percent), followed by consolidating data from older to new applications to eliminate legacy servers (15 percent).

Requests for data restoration came from all departments across an organisation, with 24 percent stemming from the internal legal department, 22 percent coming from IT security and 15 percent originating from sales and marketing.

Why do these people need their email and documents back? Forty-five percent of IT administrator respondents note that employees request their email and documents back because they were accidentally deleted. Internal investigations (17 percent) ranked as the second most common source of restoration requests.

“The time it takes to search, identify, copy, restore and export data from Microsoft Exchange or Microsoft SharePoint platforms can be significant, especially if IT admins are executing the task by restoring a full database backup,” says Tom McCaffrey, product director of enterprise solutions, Kroll Ontrack.

“With its granular restoration capabilities directly to your production server from any backup system, 41 percent of those surveyed report Ontrack PowerControls helps them address collection, restoration and consolidation requests in approximately half the time as compared to other methods, such as full backup or brick-level backup restores.”

Gartner names LogRhythm leader in SIEM solutions
Security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring.
Cylance makes APIs available in endpoint detection offering
Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.
How Schneider Electric aims to simplify IT management
With IT Expert, Schneider Electric aims to ensure secure, vendor agnostic, wherever-you-go monitoring and visibility of all IoT-enabled physical infrastructure assets.
SolarWinds adds SDN monitoring support to network management portfolio
SolarWinds announced a broad refresh to its network management portfolio, as well as key enhancements to the Orion Platform. 
Preparing for the future of work – growing big ideas from small spaces
We’ve all seen it: our offices are changing from the traditional four walls - to no walls. A need to reduce real estate costs is a key driver, as is enabling a more diverse and agile workforce.
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
How AI can fundamentally change the business landscape
“This is an extremely interesting if not pivotal time to discuss how AI is being deployed and leveraged, both in business and at home.”