Virtualization + Cloud Equals Perfect Storm For Disaster Recovery Services

Virtualization + Cloud Equals Perfect Storm For Disaster Recovery Services

Not very long ago disaster recovery was a luxury afforded by only the very large companies due to the prohibitive cost and effort required. Frequently even these large companies were unable to justify the investment and went without a disaster recovery plan. Today, virtualization and cloud enables companies of all sizes to implement a scalable, highly efficient disaster recovery plan without a huge investment.

COSTLY AND RESOURCE-INTENSIVE DISASTER RECOVERY OF YESTERDAY

At one time, investment in disaster recovery came in one of two forms: build a replica or subset of the production- computing environment at a secondary site or contract with a disaster recovery provider. These disaster recovery providers maintained data centers equipped with compatible computing platforms upon which a company could restore their environments when a disaster was declared. The latter was often the more feasible solution since the service provider was able to leverage their hardware investment over a pool of customers thereby lowering their per unit cost and passing some of the savings along to their customers. Though, I have heard many companies complain over their $50,000-$400,000 monthly costs to maintain their contract for a secondary site disaster recovery location. These exorbitant fees did not even cover the customer’s annual testing costs to simulate a disaster and test their recovery process that often included IT staff members rolling through airports with cases of backup tapes.

Beyond the expense, disaster recovery services were also very resource intensive with long recovery point and recovery time objectives. Recovery Point Objective (RPO) is the maximum tolerable period in which data might be lost from an IT service. Often the nightly backup tapes were used for disaster recovery purposes so the RPO could be as long as 24 hours. The Recovery Time Objective (RTO) is the duration of time and a service level within which a business process must be restored after a disaster (or disruption) in order to avoid unacceptable consequences associated with a break in business continuity. Time could easily exceed 48-72 hours with travel to the recovery site required, following what may be out-of-date documentation and shuffling tapes recovery. Due to the cost and effort, these tests were normally performed on an annual basis and were not frequent enough to keep the plans up-to-date.

MORE AFFORDABLE AND EFFICIENT DISASTER RECOVERY OF TODAY

Virtualization, now a prevalent technology in the data center, has led to a major consolidation of server hardware. It is not uncommon to see 10 or more virtual servers running one a single physical server acting as a host. This disruptive technology has not only changed the way our data centers are designed but has also laid the ground work for a more effective, efficient disaster recovery solution. No longer does a secondary data recovery center require a one-to-one physical inventory that mirrors the production site. A data center with 100 physical servers may now be running 100 virtual servers across 10 physical servers. As you can imagine, equipping a secondary data center with 10 physical servers versus 100 physical servers is a huge cost savings. Not to mention the additional cost savings derived from the reduced footprint for rack space and decreased consumption of power and cooling.

ROBUST, FLEXIBLE DISASTER RECOVERY WITH VIRTUALIZATION

The ecosystem built around virtualization, specifically backup and replication software, has assisted in creating a more affordable and efficient disaster recovery plan. There are many new back up and replications solutions to choose from, but some of the most interesting are the ones that operate at the hypervisor level.

Hypervisor-based replication offers the following benefits:

  • Hardware-agnostic—Hypervisor-based replication supports all storage arrays so organizations can replicate from anything to anything. In today’s increasingly heterogeneous IT environment, this allows users to mix

VIRTUALIZATION + CLOUD EQUALS PERFECT STORM FOR DISASTER RECOVERY SERVICES

Storage technologies such as Storage Area Network (SAN) and Network-Attached Storage (NAS), and virtual disk types such as Raw Device Mapping (RDM) and VMware File System (VMFS).

  • Faster and More Efficient—Hypervisor-based replication solution achieves RPO in seconds and RTO in minutes.
  • Centralized Management—With no guest-host requirements or additional hardware footprint, a hypervisor- based solution is easy to manage. It simply resides in the hypervisor, enabling centralized management.

By combining virtualization and hypervisor-based replication a very robust, flexible and cost effective disaster recovery solution was waiting to be born. The missing component was a platform to deploy on which equaled in flexibility, cost effectiveness. And then there was the Cloud.

SCALABLE, ON-DEMAND DISASTER RECOVERY AS A SERVICE

Cloud Computing as defined by the National Institute of Standards and Technology is “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”

Cloud Computing or more accurately the delivery model of Infrastructure as a Service has enabled companies to cost effectively set up a secondary data center to which they can replicate their mission critical systems in a scalable, flexible and on demand manner.

By leveraging Cloud services, customers remove many of the remaining high costs associated with disaster recovery services. Namely, there is no longer a large capital expense to purchase physical servers, storage and network hardware required to build a secondary data center or pay a disaster recovery providers to do so. Companies can now fulfill this hardware need with a Cloud provider or DRaaS. These providers deliver virtual servers, storage, replication software, management services and provide a comprehensive disaster recovery solution which is scalable, up or down, on demand for a monthly cost.

By Marc Malizia,

Marc is the Chief Technology Office and a founding partner for RKON Inc.  As the CTO, he has responsibilities for designing and enhancing both RKON’s Professional and Cloud Service offerings.  During his 15 years growing RKON, Marc served as a pre-sales subject matter expert on technologies ranging from application delivery and security to Cloud and managed services.  Marc earned a B.S. in Computer Science from the University of Illinois in 1987 and a M.S. in Telecommunication from DePaul University in 1992.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Curing Cancer With Big Data

Curing Cancer With Big Data

Cancer & Big Data The fight against cancer has been going on for centuries. Many leaders have tried and failed to bring about change to cancer treatment. Richard Nixon famously declared a War on Cancer with the National Cancer Act of 1971, and while the Nixon administration certainly increased research funding, they ultimately fell short…

IoT & Predictive Analytics In Healthcare

IoT & Predictive Analytics In Healthcare

IoT & Predictive Analytics In a report by Grand View Research Inc., it’s predicted that the global Internet of Things (IoT) healthcare market will reach nearly $410 billion by 2022, with mobile penetration, software automation, and innovation medical devices promising rapid testing, greater accuracy, portability, and user-friendliness. Chronic diseases such as obesity, diabetes, heart failure,…

What Do You Do With A Drunken Sailor? Look To The Cloud

What Do You Do With A Drunken Sailor? Look To The Cloud

Saferide App Petty officer Michael Daigle of the US Navy has rolled out an app to curb drunken driving in the Navy ranks. His Saferide ride-sharing service runs on Voxox’s Cloud Phone service which costs just $15 a month and is popular among US Service members abroad, where mobile phones are not permitted for use…

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Storage Latest Red Hat Gluster Storage release enables greater agility and efficiency for OpenShift developers deploying application containers in production SAN FRANCISCO – RED HAT SUMMIT – June 28, 2016 – Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced new storage innovations designed to enable developers to…

Controversial Chinese Cybersecurity Law Under Review Again

Controversial Chinese Cybersecurity Law Under Review Again

Cybersecurity Law BEIJING. The National People’s Congress, the equivalence of the Chinese Parliament, moved forward in drafting a second version of a controversial cybersecurity law first introduced almost a year ago. This means the law is thought to be closer to passing and will bring greater censorship for both foreign and domestic citizens and businesses.…

Cloud Computing Myths That SMBs Should Know

Cloud Computing Myths That SMBs Should Know

Cloud Computing and SMBs Cloud Computing is the hottest issue among IT intellects of Small and Medium Businesses (SMBs). Like any other computer-orientated technology, Cloud Computing has some misconceptions and myths that often kick-start arguments among the two opposing groups: Cloud Supporters and Cloud Opponents. Both of these groups have their own ideology and reasons…

5 Predictions For Education Technology

5 Predictions For Education Technology

Education Technology Although technology has fast influenced most sectors of our world, education is an area that’s lagged behind. Many classrooms still employ the one-to-many lecturing model wherein the average student is catered for while a few are left behind, and others bored. Recently, there’s been a drive to uncover how to use technology successfully…

Cloud Infographic – Monetizing Internet Of Things

Cloud Infographic – Monetizing Internet Of Things

Monetizing Internet Of Things There are many interesting ways in which companies are looking to connect devices to the cloud. From the vehicles to kitchen appliances the internet of things is already a $1.9 trillion dollar market based on research estimates from IDC. Included is a fascinating infographic provided by AriaSystems which shows us some of the exciting…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

5 Reasons Why Your Startup Will Grow Faster In The Cloud

5 Reasons Why Your Startup Will Grow Faster In The Cloud

Cloud Startup Fast-tracking Start-ups face many challenges, the biggest of which is usually managing growth. A start-up that does not grow is at constant risk of failure, whereas a new business that grows faster than expected may be hindered by operational constraints, such as a lack of staff, workspace and networks. It is an unfortunate…