Today, IT specialists have a wide range of options available to make the data security policy more composite and comprehensive. There are many tools and instruments presented for any level of demand on the IT market. Some of them are intended to be simple and convenient, others have to fit well into the larger enterprise infrastructures. In this article, two important aspects of all-encompassing data security and management plan are described in more detail. First, I would like to discuss a hardware independent system recovery (HIR) and migration to virtual environments options. Even if you decide HIR is not your…