The Cost Advantages Of Hosted Disaster Recovery Solutions

The Cost Advantages Of Hosted Disaster Recovery Solutions

The Cost Advantages of Hosted Disaster Recovery Solutions

There’s a common saying among datacenter professionals that no matter how much it costs to have a disaster recovery program, the cost of not having one is far greater.

This was often used to convince skeptical CEOs of the need to build duplicate datacenter infrastructure despite its high cost and low utility. Lately, however, the cost side of disaster recovery has dropped precipitously as modern hosted solutions allow enterprises to avoid much or all of the up-front expenses while still providing reliability and availability levels equal to, or even better than, in-house facilities.

There are, of course, numerous ways to implement hosted disaster recovery services, all of which can deliver varying levels of utility based on user needs and existing infrastructure. In a broad sense, however, hosted disaster recovery platforms fall into two camps: Disaster Recovery as a Service (DRaaS) and the lesser-known Disaster Recovery on Cloud.

Quite often, these two deployment options are treated as one-and-the-same. But there are some key differences that could have a significant impact on costs, levels of service and other performance factors.

Disaster Recovery on Cloud (DRC)

DRC is best described as the OpEx version of hosted disaster recovery. It calls for a fully virtual enterprise environment ported to the cloud under an Infrastructure as a Service (IaaS) model. Its chief advantage is that it allows the enterprise to avoid the substantial capital costs of building bricks-and-mortar data facilities that are called into service only in the event of a serious emergency.

disaster-recovery

As a leased infrastructure solution, DRC gives the enterprise enormous flexibility when it comes to scaling DR capabilities up or down depending on data and infrastructure needs. With proper management and data visibility tools, enterprises pay only for the resources they actually use, a far more efficient use compared to traditional facilities, which are usually over-provisioned to ensure data and application availability. As well, DRC allows the management of physical-layer assets to be offloaded to the host provider, which not only lowers costs but ensures a robust upgrade path for both critical and non-critical systems. As well, leased infrastructure unburdens the enterprise of many licensing fees, power and cooling expenses, and labor costs.

Because DRC alleviates much of the complexity surrounding disaster recovery, enterprises should see more robust performance compared to traditional infrastructure. Essentially, the DRC environment acts as an extension of existing virtual infrastructure, with restoration of server images enabled through physical-to-virtual and/or virtual-to-virtual technologies. This, in turn, allows for much quicker re-establishment of normal operations than if, say, entire server farms, storage arrays and network configurations had to be rebuilt from scratch.

One popular misconception about DR in general is that it only becomes active during a recovery. But this is only the case for enterprises that view DR as an afterthought. A properly managed DR infrastructure incorporates a wide variety of daily, weekly, monthly and semi-annual procedures involving backup, replication, system maintenance, integration with primary infrastructure and so on. As well recovery drills and mock scenarios should have a place in every DR program. In a DRC environment, many of these tasks can be automated, with little or no impact on the day-to-day operations of the enterprise. When not in use, DRC-based virtual machines can be switched to an off-state, helping to reduce operational costs.

The true test of any DR system, of course, is how well it functions in an emergency. The two key metrics for any disaster recovery platform are the Recovery Point Objective (RPO) − the amount of data loss deemed acceptable before a scheduled backup takes place − and the Recovery Time Objective (RTO) − the acceptable level of downtime following a failure. In both instances, virtual hosted DR on Cloud platforms are matching or exceeding the top traditional DR systems.

DRC works best for enterprises that are already outfitted with a virtual disaster recovery architecture but are straining to maintain the physical infrastructure needed to host it. As well, highly regulated industries like banking, finance and insurance may have difficulty maintaining a third-party system due to stringent discovery and compliance requirements. Media, web-facing companies and manufacturing are probably more suited to DRC solutions. And, of course, enterprises that are already experimenting with cloud architectures will most likely find that DRC makes an excellent addition to storage or even application/service environments.

Disaster Recovery as a Service (DRaaS)

While DRC is an infrastructure solution, Disaster Recovery as a Service provides both the infrastructure and the backup and recovery platform itself. As such, it is a solution geared more toward organizations looking to build a low-cost, flexible recovery platform from scratch.

The best way to view the difference between DRC and DRaaS is that DRC is like a laptop fresh from the factory without any bundled software or even an operating system, while DRaaS is the same laptop with all the software and other resources needed to perform its given tasks.

In short, DRaaS is a tool-based end-to-end DR solution encompassing everything from infrastructure functions like server and network provisioning to database installation, management and monitoring. This tool-driven approach allows features like failover drills, compliance reporting, remote replication and recovery automation to be configured to suit customer needs.

As well, DRaaS provides a wide variety of data protection and recovery options that would be prohibitively expensive using traditional private recovery platforms. In this way, DRaaS provides the exact level of service required for enterprise needs, without having to over-provision either hardware or software in order to maintain the highest possible reliability and availability ratings.

In general, DRaaS is available on three tiers of service. As a hot backup solution, DRaaS offers mirrored servers in stand-by mode that are ready to kick in as soon as an outage occurs. This provides minimal RTO and RPO using synchronous replication, and is usually reserved for the most critical enterprise applications to allow the enterprise to maintain functionality of vital resources while full recovery proceeds for the remainder of the data ecosystem.

In warm backup mode, data is kept up-to-date using either synchronous or asynchronous replication based on the RPO needs of the enterprise. Servers are kept in warm idle mode and can be brought on-line within a few minutes, providing a high level of recoverability for most applications. Most enterprises find the warm mode to be adequate for their needs, but again it depends on the critical nature of the application and the service requirements of users.

Consequently, then, DRaaS can also provide a cold backup site, in which data is replicated periodically and recovery can take hours or even days. Cold service usually requires hardware to be brought online or repurposed from test and development systems, which means it provides the lowest level of business continuity. The advantage, however, is that cold service is available at extremely low cost and is thus reserved for lowest-priority data and applications.

It would be a mistake, however, to view the hot, warm, or cold tiers of DRaaS in terms of superiority or inferiority. Each level provides unique cost and capability benefits for particular data loads. And in fact, many enterprises find that a combination of tiers provides the most robust recovery solution at the lowest cost because they can be used to tailor a recovery platform according to the often changing nature of modern enterprise environments.

DRaaS is also associated with a broad set of services designed to remove much of the burden of building and maintaining reliable recovery infrastructure from the enterprise. These include consulting services to provide risk analysis and evaluate the business impact of various DR configurations, as well as cost-benefit analyses to align available services to enterprise needs. Disaster recovery requires broad synchronization between its various functions to maintain adequate RTO/RPO, not to mention regular testing and drills to maintain system readiness.

As well, DRaaS offers a full set of replication services that assume responsibility for much of the day-to-day backup responsibilities that ensure a speedy and effective recovery when the need arises. The most common approaches involve either host- or storage-based replication, coupled with deduplication, compression and encryption licensed from various third-party providers

One thing is clear: the old way of backing up and recovering data is proving too expensive and too cumbersome for the agile, dynamic data environments to today. The cost of buying, provisioning and maintaining vast infrastructure can no longer be justified in an era when profit margins are tight and the need to do more with less is growing.

And now that hosted services can provide a low-cost infrastructure-only solution for legacy platforms or full disaster recovery for those without a program at all, the time is finally right to investigate a third-party solution.

It’s a safe bet your competitors already are.

mandar-kulkarniBy Mandar Kulkarni,

Mandar is Vice President – Solutions Engineering and Private Cloud Practice at Netmagic IT Services Pvt. Ltd. He is responsible for planning, directing and leading the Netmagic Operations. He heads the team of service and support professionals who deliver quality and timely services to Netmagic’s 1000+ customers in their datacenters and across multiple locations.

(Image Source: Shutterstock)

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even eclipse that of the mobile phone. Connected personal vehicles will be the final link in a fully connected IoT ecosystem. This is an incredibly important moment to capitalize on given how much time people spend…

Embedded Sensors and the Wearable Personal Cloud

Embedded Sensors and the Wearable Personal Cloud

The Wearable Personal Cloud Wearable tech is one avenue of technology that’s encouraging cloud connections and getting us all onto interconnected networks, and with the continued miniaturization and advancement of computing the types of wearable tech are always expanding and providing us with new opportunities. A few years ago, smartwatches were rather clunky devices with…

SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

Automated Application Discovery Introduced By Savision At Microsoft Ignite 2016

Automated Application Discovery Introduced By Savision At Microsoft Ignite 2016

Automated Application Discovery ATLANTA, GEORGIA – September 26, 2016 – Savision, a market leader in service-oriented monitoring solutions that unify IT operations with IT service management, today announced the release of its automated application discovery module for Unity iQ. Savision’s automated application discovery module offers an agentless, trigger-based discovery method that captures infrastructure elements, application dependencies, as well…

What You Need To Know About Choosing A Cloud Service Provider

What You Need To Know About Choosing A Cloud Service Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The cloud is capable of delivering many benefits, enabling greater collaboration, business agility, and speed to market. Cloud adoption in the enterprise has been growing fast. Worldwide spending on public cloud services will grow at a…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…

15 Cloud Data Performance Monitoring Companies

15 Cloud Data Performance Monitoring Companies

Cloud Data Performance Monitoring Companies (Updated: Originally Published Feb 9th, 2015) We have decided to put together a small list of some of our favorite cloud performance monitoring services. In this day and age it is extremely important to stay on top of critical issues as they arise. These services will accompany you in monitoring…

Infographic: IoT Programming Essential Job Skills

Infographic: IoT Programming Essential Job Skills

Learning To Code As many readers may or may not know we cover a fair number of topics surrounding new technologies such as Big data, Cloud computing , IoT and one of the most critical areas at the moment – Information Security. The trends continue to dictate that there is a huge shortage of unfilled…

The Storytelling Machine: Big Content and Big Data

The Storytelling Machine: Big Content and Big Data

Bridging The Gap Between Big Content and Big Data Advances in cloud computing, along with the big data movement, have transformed the business IT landscape. Leveraging the cloud, companies are now afforded on demand capacity and mobile accessibility to their business-critical systems and information. At the same time, the amount of structured and unstructured data…