With Monroelab's data-centered solutions, your painful (and wasteful) wanderings though the maze of computer industry offerings is over.
To achieve security, you need to protect your data. Data is the heart of your business. At Monroelab, we help you bring order to chaos. We do so using tools you already have or tools that are easily available and easy on the wallet.
For a long time, the focus of the IT industry has been hardware and software performance and feature ‘richness.’ This was true at all levels of the industry, whether it was at giants like Dell and Microsoft or the small PC repair shop. As a result, scientists and engineers specializing in computer hardware have achieved astounding gains in raw performance. Software engineers have created more attractive and feature rich interfaces.
Yet, in spite of these advances, the basic, computer-related needs of a business — to securely store and rapidly locate critical information — have been mostly ignored. Ignored not only by the vendors, but by small– and medium–sized businesses as well. The tendency is to treat the machines (which can be quite expensive) as irreplaceable and the data as unimportant.
If your business is like most, important information is scattered among the various workstations used by your staff. “Alice” may have a proposal for a new client on a laptop hard drive, “Bob” keeps several spreadsheets containing mission-critical company information on his desktop machine. It's information that's crucial to your business — and to your success.
If either of these people call in sick, quits, or is laid off, you can be deprived of business-essential information. It may not be apparent at first but, sooner or later, the scramble will be on to find that missing document or spreadsheet.
The examples of “Alice” and “Bob” are all too typical of today's business. Owners and managers are often so focused on developing and expanding the company, they don't always take time to ensure they have command and control of business-essential data. Consequently, data insecurity has control of that business.
Whether you know it or not, your business exists in large part as electronic objects: documents, spreadsheets, database files, even e-mail exchanges with clients and potential clients. If you cannot pull these documents up on a moment's notice, you don't have adequate control of your business.
Solving this problem requires a change in your focus, not necessarily new hardware or software. There's no need to reinvent the wheel. Rather, the strategy is to make better use of the tools you already have. At Monroelab, we call this the Data-Centered approach.
The emphasis is on machine independence — that is, on your independence from individual machines. The emphasis is also on easy access to your data, no matter where you are in your office. An extension of this idea, web-hosted data, allows data access no matter where you are in the world. Computers may come and go, but your business data is priceless.
Adopting the Data-Centered approach to your business network means knowing where important data is at all times, and safeguarding it against loss. At Monroelab, we can help you implement this approach as we detail in our case study of a small marketing firm.
Small marketing firm with 15 workstations.
The Alarus Group employs 15 people and has 15 computer workstations. There are 5 sales people, 6 creative staffers, 2 customer service representatives, and 2 accounting and billing personnel. Every person, including the CEO/founder, uses a proprietary application for handling project and time management for the advertising industry. Additionally, each employee uses Microsoft Office to create objects related to whatever project they're on. Everyone also uses email applications and a variety of miscellaneous applications for individual needs.
The CEO assumed that the centralization of project data (stored in the proprietary database of the industry-specific application) was all that was needed to have control of what his business was doing. During a crisis, he discovered that the database was incomplete. His staff had accumulated critical data in a variety of applications and objects which were scattered throughout the enterprise. Only then did the importance of rapid access to all business data became clear.
The result was two-fold: users continued to enjoy the freedom to create whatever spreadsheets, documents or other objects they needed to accomplish their work and, simultaneously, critical business data was easily retrievable, regardless of type.
No new technology was required, only a new way of organizing the technology already in use. This is the key to understanding data-centered systems. It is not a bold leap forward or a new paradigm, it is simply an optimization of the computing resources already available to you. Using the data-centered approach means your data is available when you need it.
This is one example of achieving greater data security and although it worked for this client, it is by no means the best that can be done.
Our first recommendation to customers is to choose network attached storage (NAS). This technology, which creates server appliances tailored to the requirement for centralized storage, is the ideal solution for most customer needs. Another option is the use of advanced ATA drive arrays such as those offered by Nexsan. These allow you to expand the capacity of your existing computer investment.
Major hardware vendors offer data storage hardware, such as Dell's POWERVAULT unit. Smaller but tech savvy players like Advansor, Network Storage Solutions, Cutting Edge, and Excel Meridian Data are also creating state-of-the-art, affordable, and reliable data-centered hardware for businesses of all sizes.
Using one or more NAS devices provides business with a ‘plug and play’ hardware module that requires minimal effort since they can be painlessly introduced into an existing infrastructure.
But, simply plugging a storage box into your network is not enough. To make the most of the technological fix, it's crucial to put in place several policies for data retention , access standards, and best practices.
IT Challenges Faced by Small Businesses »