Disaster Recovery Plans In The Clouds

Disaster recovery plans in the clouds

Both large and medium/small-sized companies have significantly increased their organizational data in recent years. Analyzing large data sets will become a key basis of competition, underpinning new waves of productivity growth and innovation, according to a research by MGI and McKinsey’s Business Technology Office. The ability to store, compound date, and then synthesize results in an extensive analysis has more than ever become accessible through digital storage and cloud computing technologies.

But what about “What if” capabilities? Is cloud computing reliable for disaster recovery plans? Did you know that companies lose almost $90,000 every hour of downtime, according to market researches? It is quite clear to me that digital data must be thoroughly protected and that executives must think strategically about how to prepare their organizations for unpredictable man-made or natural disasters, since the stakes are very high. Unfortunately, a Gartner research also states that only 35 percent of SMBs have a comprehensive disaster recovery plan in place.

Technically, because it is dependent on a single location and has operational back-up, cloud computing is viewed as a proper recovery solution to store critical information. However, there are still challenging aspects in using cloud computing for disaster recovery. Policies related to privacy, security, intellectual property, and liability are in the mist of uncertainty for some backing up data to the cloud.

In 2011, a survey of 247 Fortune 1000 corporations by 451 Group found that 87% of enterprise-class corporations had no plans to use cloud storage as an archive or lower tier. It is obvious that companies are reluctant to build disaster recovery plans based exclusively on cloud computing.

 But who said that it was going to be easy? I strongly believe that in the next five years cloud computing will change disaster recovery fundamentals. Companies will have solid cloud disaster recovery plans customized on applications and businesses and based on recovery time objectives. Testing it periodically and having trained employees and IT specialists to implement it appropriately will provide more trust in cloud-based storage offerings.

Considering cost savings and other benefits, I think SMBs could set the adoption trend in this area. Cloud computing facilitates for them disaster methods that were previously possible only in larger organizations.

By Rick Blaisdell

Sorry, comments are closed for this post.

Comics
Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to cloud and mobile adoption, forcing more and more data beyond the corporate firewall. Over 100 IT executives weighed in on their plans for 2017 in our latest survey; buried among…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to…