Disaster Recovery And Business Continuity – Flirting With Disaster

Disaster Recovery And Business Continuity – Flirting With Disaster

Disaster Recovery and Business Continuity

Nobody likes to think about the bad things that can happen in life, but all too often, history has shown that procrastinating on safeguards means a bigger and more expensive cleanup to follow. This is why, in business, the principles of Disaster Recovery and Business Continuity are so important; and with all things business, the cloud is turning out to be an excellent place for companies to turn to for solutions.

Disaster Recovery (DR) is not the same thing as making backups,” says Keao Caindec, Chief Marketing Officer, Cloud Business Unit at Dimension Data (http://www.dimensiondata.com). “A backup is much like a snapshot or duplication of all your data – from accounting to application files to email, stored offsite in a secure location. It may be safe, but the files are very, very large, and quite difficult to re-integrate quickly. Disaster Recovery, by contrast, is a plan for actively re-injecting critical information back into a company’s core business operations, in the case of a major outage or failure. It has to be much more dynamic and fast.”DimensionData Graphic

Caindec suggests that clients can realize clear benefits by moving their DR plan to the cloud, with cost savings of 70% up to 90% from traditional tape-based backup and restore systems. He states these savings come from a dynamic system of load sharing that Dimension Data specializes in. “Typical DR,” he says, “is about replicating data in real time. If the first site goes down, you repoint the DNS to a second fully-stocked site. But DR sites can be expensive. You must keep the system running as an insurance policy. The way we do it in the cloud, you can set up the data and hold it in disk, but you do not have to have unused servers running. All the client pays for is storage cost, a nominal rate of USD 0.0003 per GB/hour. If disaster happens, we then fire up the servers and start delivering data back downwards in a matter of hours.

Another major cost source comes from the depth of the recovery; in other words, how far back in time do you wish to restore from? Caindec points out that most companies set both a Restore Time Objective (RTO) and a Restore Point Objective (RPO), which jointly answer the question of how far back in time and data does a client need to go to get back up to speed? For example, to meet the needs of a financial client, RTO can be about 4 hours, which can be expensive. With a cloud-based RPO it can be a fraction of the cost, since it is easier to map usage to the actual profile of a client’s business requirement.

Caindec’s statements come at a time when companies of all sizes – even those with well-established backup and DR systems in place, are migrating out of the age in which only non-critical projects are cloud-based. They are recognizing the value and reliability of moving mission-critical data there too.

He cites a Dimension Data case study, in which their client, ClearBenefits, an employee benefits and health plan administration service, was able to improve their Service Level Agreement (SLA) from 95% to 99.9%, which enabled them to better fulfil their compliance with Heath Insurance Portability and Accountability Act (HIPAA) regulations through the development of a “hybrid cloud solution, using its cloud offering for the public-facing front end, and a private database back-end. The business continuity site is hosted separately from their primary site.”

Ultimately, the issue comes down to how effectively a company can: 1.) get back to operations after an onsite event such as a network outage or physical force majeure event, 2.) get back to operations when employees have to set up shop elsewhere, and 3.) maintain the system in a state of readiness that is both reliable and cost-effective.disaster-recovery-cartoon

Support for the Dimension Data approach, and testimony to their success as a provider of cloud solutions, can be seen in a recent white paper published by the IT research company Saugatuck Technology – not commissioned by Dimension Data – which compared the total cost of ownership of in-house/private cloud solutions against several public cloud infrastructure offerings, including Dimension Data Public Compute-as-a-Service (CaaS), IBM SmartCloud and Rackspace Cloud. Among the broader findings, the report found:

  • When running a small workload, Dimension Data’s cloud solutions were significantly less in cost vs. the other public cloud offerings for all scenarios listed.
  • Dimension Data’s public cloud solutions were less expensive than in-house/private cloud solutions in two of the three variably optimized environments when running a small workload.

This report, Caindec says, is yet another proofpoint of the economic benefits of Dimension Data’s CaaS offerings, and follows on the heels of a report by the Tolly Group, which found that between Amazon, Rackspace, IBM and Dimension Data, the network-centric approach used by Dimension Data’s enterprise-class cloud helped lower cost and risk, and accelerate migration of mission-critical apps to the cloud.

Ultimately, he says, a company has to review its Business Continuity strategy regularly, not only for audit purposes but for actual insurance against critical failure of operations. The use of the dynamic characteristics of the cloud makes it easier and cheaper than ever, without compromising integrity.

For a copy of the Dimension Data white paper on DR, click here

To read the Saugatuck Report, click here

By Steve Prentice

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

Find out more
View All Articles

Sorry, comments are closed for this post.

Comic
In The Fast Lane: Connected Car Hacking A Big Risk

In The Fast Lane: Connected Car Hacking A Big Risk

Connected Car Hacking Researchers and cybersecurity experts working hard to keep hackers out of the driver’s seat. Modern transportation has come a million miles, and most all of today’s vehicles are controlled entirely by digital technology. Millions of drivers are not aware that of the many devices in their digital arsenal, the most complex of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Building a Data Security Strategy – More Important Than Ever

Building a Data Security Strategy – More Important Than Ever

Data Security Strategy Article sponsored by SAS Software and Big Data Forum Security and privacy have been an integral concern of the IT industry since its very inception, but as it expands through web-based, mobile, and cloud-based applications, access to data is magnified as are the threats of illicit penetration. As enterprises manage vast quantities…

Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Top-Ranked Cloud Billing Company Enables Greater Speed and Frictionless Billing for Unparalleled Customer Experience San Francisco, CA – August 23, 2016 – Aria Systems, which helps enterprises grow subscription and usage-based revenue, today announced that Pitney Bowes has selected Aria’s cloud-based monetization platform as the key billing and monetization component of their new Commerce Cloud…

The Golden Age of Wearable Technology

The Golden Age of Wearable Technology

The Golden Age One of the biggest fads in the technology sector right now is wearable tech. From Smartwatches that let you check your emails, chat with friends and search the web, to fitness accessories that monitor your heart rate and your sleep patterns, this is truly the Golden Age of wearable technology. But some…

Moving To The Cloud: A Smart Move Or Proceed With Caution?

Moving To The Cloud: A Smart Move Or Proceed With Caution?

Moving To The Cloud You hear it over and over again: The future of computing is in the cloud. Businesses should be moving to the cloud. If you’re not in the cloud, you’re behind the times. But trusting your essential data to a cloud may sound like a dubious proposition. Below are some of the…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation Digital transformation is the acceleration of business activities, processes, and operational models to fully embrace the changes and opportunities of digital technologies. The concept is not new; we’ve been talking about it in one way or another for decades: paperless office, BYOD, user experience, consumerization of IT – all of these were stepping…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

Three Factors for Choosing Your Long-term Cloud Strategy

Three Factors for Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Five Cloud Questions Every CIO Needs To Know How To Answer

Five Cloud Questions Every CIO Needs To Know How To Answer

The Hot Seat Five cloud questions every CIO needs to know how to answer The cloud is a powerful thing, but here in the CloudTweaks community, we already know that. The challenge we have is validating the value it brings to today’s enterprise. Below, let’s review five questions we need to be ready to address…

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups Traditionally actors headed for Hollywood while techies made a beeline for Silicon Valley. But times are changing, and with technological job opportunities expanding (Infographic), new hotspots are emerging that offer fantastic opportunities for tech jobs and startup companies in the industry. ZipRecruiter, an online recruitment and job…

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

Ambitious Startups An oft-quoted statistic, 50% of new businesses fail within five years. And the culling of startups is even more dramatic, with an estimated nine out of ten folding. But to quote Steve Jobs, “I’m convinced that about half of what separates the successful entrepreneurs from the non-successful ones is pure perseverance.” So while…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…