Tips In Choosing Disaster Recovery Solutions

Tips In Choosing Disaster Recovery Solutions

Remember the story of the legendary passenger ship the Titanic? It was said to be unsinkable and yet on its first voyage in April of 1912, it sank to the bottom of the North Atlantic after an encounter with an iceberg. It may be over a hundred years later, but “infallible” products still cease to exist. This holds especially true with computers – the overall complexity of one of today’s simple laptop computers is arguably as complex as the human body. Unless proper care is maintained of computer systems, a failure can cripple an organization. This is why it is extremely important to ensure that appropriate measures are taken with systems that manage crucial business data.

A wide variety of back-up solutions are available for every size business in any industry. The most important first step to take is to formulate a plan. Even small businesses should have a solid plan for retaining and recovery data. It can start with a few simple questions:

  • How much data has my organization collected up until this point in time?
  • How much is it the data worth and what funds can be allocated to preventive maintenance?
  • What is my current system for storing and backing-up data?

Starting with small businesses, there are a broader range of options that can effectively serve data back-up needs. Some of the most ideal solutions today can be found with NAS – simply backing data up to an external storage system that is easily accessible is a good solution for some. Simple NAS devices parallel methods some larger industries use to retain and back-up information. However, NAS and simple USB external drives can all still fail. If this is the solution chosen, it’s important to maintain a regular back-up schedule, preferably some automated system, and also to check the health of the device as part of routine maintenance. Perhaps the best solution is to use an online back-up service such as Carbonite, SugarSync or Dropbox. These are great solutions that can scale from a small amount of storage offered for free up to many terabytes.

Businesses that have multiple locations as well as those that fall into the midsized business category may be able to use certain online services to retain data but there are hardware solutions that may better serve the company’s needs. If there is already an existing IT infrastructure it could potentially hold files for legacy software which still have value for a business. Preconfigured data storage systems like NorStor NS2000 from Nordisk are designed to integrate with an existing system in order to handle data storage for all types of files.

Large businesses that are not operating from a public cloud have many different solutions like redundant RAID arrays that automate data mirroring and hard drive rebuilding. This is probably the most effective way to ensure business continuity and protect against data loss. Of course, certain disasters can wipe out an entire machine, so extra caution should be taken, perhaps in further backing data to a remote location. Remember to keep an eye out for icebergs – it never hurts to have extra resources for back-up and recovery if it fits the budget.

By Deney Dentel,

Deney Dentel is the CEO at Nordisk Systems, Inc. Nordisk Systems is the only local IBM Premier Business Partner based in the Pacific Northwest, specialized in all IT solutions  including cloud computing services, disaster recovery, servers manged service, storage and virtualization.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…

Utilizing Software Defined Networking (SDN)

Utilizing Software Defined Networking (SDN)

Software Defined Networking Winding down this year, we only have a couple of topics left: SDNs and SDI. Although SDNs are part of a solid SDI, we want to talk directly about it now. Many cloud management tools have the ability to create a virtual network. But creating a true VXLAN would require support of…

OpenStack Interoperability – Dawn Of A New Era?

OpenStack Interoperability – Dawn Of A New Era?

The Interoperability Challenge! OpenStack has always had interoperability as one of its unique selling points. Simply put – you can use OpenStack on-premise and what you develop will also work with other OpenStack environments. Open APIs and open source is the common denominator. However until now, it has been an elusive feature or really dream…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Are You Sure You’re Ready For The Cloud?: Connectivity

Are You Sure You’re Ready For The Cloud?: Connectivity

Cloud Connectivity Many times when we think of “cloud” we think of the elastic compute and storage, but we forget one very important thing, connectivity. Even though connectivity is no part of the cloud itself, it does have a direct bearing on how we access it, use it, and play around with it. If our…

Is Fear Holding Back a Next Generation of Cyber Security Approaches?

Is Fear Holding Back a Next Generation of Cyber Security Approaches?

Next Generation of Cyber Security As I walked through RSA last week, I was struck by the usual fear laden messages “You’re not safe and never will be but I (vendor) have a silver bullet that will protect you.” And, I wondered if this fear-based approach is deterring a badly needed next generation of cyber…

The Success Formula For Private Cloud Deployments

The Success Formula For Private Cloud Deployments

OpenStack For Private Clouds On February 15th Tom Bittman of Gartner published a blog which asserted that 95% of Private Clouds are Failing. When an industry analyst makes a statement that big, in one of the top three priorities for enterprise CIOs today, it’s critical that we as an industry step back and understand how we…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising