The Disaster Mitigation And Recovery Power Of Cloud Computing

The Disaster Mitigation And Recovery Power Of Cloud Computing

In a world where digital connectivity and online presence are a significant part of life and businesses alike, a disaster that disables online services is undoubtedly going to ruin some people’s day, to say the least. Hurricane Katrina and others like it around the world have proven that no data center or server facility is safe from natural disasters and other freak accidents. The effects of such events can at least be mitigated with cloud computing services and technology, making disaster mitigation and recovery easier.

Imagine if a bank losses all its customer’s data including all digital backups because of some calamity, it certainly is a disaster for everyone, the bank most especially. However, not to worry for there are backups in the form of paper, age old reliable paper; well, one can just imagine the banks clerks trudging through tons of paper and slaving in front of computers as they quickly try to get everything into electronic form while their cheeks slowly turn gaunt and their eyes white. It is a highly unlikely event with today’s standards for backing up data, but still a possible worst case scenario.

The nature of cloud computing makes disaster recovery an extremely logical solution, and as a service it can be tremendously lucrative. Because cloud computing can allow one to offload data into “offshore” installations, anywhere and everywhere around the world with multiple backups, the chances that all of them can be wiped out in the same instance are pretty slim. This can be accomplished with the old setup one might say. Yes, it can, but not as well and not as economically as cloud computing can, especially if you consider the public cloud option. Because of virtualization, service providers are able to provide the resources required for disaster mitigation and recovery for a small fraction of the price that it would cost an organization to setup its own. This is because hardware resources are shared by multiple customers and clients through virtualization. This allows providers to accommodate more customers using the same amount of resources as with non-cloud computing technology. This affordability opens up the market to not just the leading companies but also to SMB’s and startups, which brings more competition and hence more options and better service for customers.

The area of disaster mitigation and recovery is not just limited to backup and storage but is also applicable with any other online service. Servers or data centers that become unavailable due to disaster can quickly be replicated in another location in a matter of a few hours. This minimizes downtime for those that are providing services like online games and streaming services, and even those that rely on online transactions like e-stores and financial institutions. When it comes to disaster mitigation and recovery, nothing simply does it better and cheaper than cloud computing.

By Abdul Salam

Sorry, comments are closed for this post.

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…