Home > Data Protection > Data Protection (general) > Advanced Anomaly Detection with Data Protection Advisor > The stakeholders
Defining all stakeholders and their connection to data protection will vary with each organization. This article will discuss four main stakeholders, each requiring a different type of reporting information and insights based on their role.
The backup administrator is the primary stakeholder and one that will rely heavily on the reporting information from Data Protection Advisor. Beyond the basic backup success/failure reports, the backup administrator needs to ensure at a minimum that:
By leveraging the reporting and analytical capability of Data Protection Advisor, the backup administrator can operate in a proactive manner and address gaps in data protection before issues arise.
Managers of IT operation teams need awareness of the various IT environments under their control and the health of those environments. With Data Protection Advisor, the IT Operations Manager can obtain information about the state of the backup environment and the applications protection levels. Reports can be run ad-hoc by the Operations Manager or review information from predefined scheduled reports. From a data protection viewpoint, the manager can report to senior management on health of the backup environment or exposure due to protection issues, without needing to rely on the backup administrator.
Most organizations prefer that applications and data are protected using the centralized scheduling and retention policies capabilities of a backup application. The application owner is then responsible for ensuring applications and data they own are available to serve the requirements of the organization or their customers.
Application owners must validate that they have valid recover points for their application needs, and the automated reporting capability of Data Protection Advisor can provide that valuable information. Knowing when backups occurred, the duration of the backup and whether a second copy is available at an alternative location is vital. This information allows them to validate that they can recover data within their service level agreements (SLAs) or can take action to address any data protection exposures.
Risk and security teams require insights and visibility over the entire IT infrastructure, of which data protection is one element. With Data Protection Advisor, these teams can obtain information about data protection exceptions which may include clients not protected within a specified service level agreement, delays in creating backup copies, and so on. Important to these teams is also knowing what changes have been made within a backup application and by whom. This information is often required to meet compliance-based standards internally or to external organizations.