Disaster Recovery And The Cloud

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud

One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for this is that so few small and mid-size businesses have ever contemplated the impact of a major disaster on their IT infrastructure, let alone built a comprehensive disaster recovery plan.

In fact, more than 95 percent of the SME customers that my colleagues have worked with over the last 20 years had never contemplated the impact that a fire, flood, or even the more mundane threat of employee sabotage might have on their businesses. And when confronted with the costs and time impact of implementing a disaster recovery plan — along with the associated processes of dry runs on recovery, staff training, hardware investment, and redundant systems — their willingness to leave it to luck only increased.

Of course, as our colleagues at our sister company Acronis have said, there are only two kinds of people in the world — those who have lost data and those who are about to.

The good news is that with the technologies available to you today and the significantly lower costs associated with implementing those technologies, disaster recovery and disaster planning are much easier. At Acumatica, the systems that host our customers’ data in our software-as-a-service (SaaS) deployment and licensing model are hosted in the cloud and have regular snapshot backups and sit on fault-tolerant servers with redundant power, network infrastructure and storage systems in bomb-proof, earthquake-proof, physically secure, flood-proof, and fire-proof environments. All this protection is provided at a fraction of what it would cost for a customer to provision and deploy those solutions.

But even if you have chosen to deploy critical systems such as your enterprise resource planning (ERP) software and data in such an environment, there are still other components that you need to consider. For example, how do you manage all your document storage, security infrastructure, and access control, such as the systems provided in your on-premise server deployment?

Stop for a second and consider what would happen if you lost access to all your correspondence with customers and suppliers — not just the financial data but all the letters, emails, and general information that gets exchanged in the course of day to day transacting.

Imagine if someone decided to maliciously damage a server, either physically or via some kind of computer-based mechanism. How long would the business be out of action, and what would be the cost in terms of lost business and also reputational damage? That’s one thing that can take years to recover from, and for many small businesses it can be insurmountable.

recovery-cloud

So how do you start to plan for this, and what do you need to consider? The first two areas are your recovery time objective, or RTO, and your recovery point objective, or RPO. These are two new three-letter acronyms for you to learn and impress people with at parties.

The recovery time objective is the amount of time and the service level to which a business process must be restored after a disaster (or disruption) to avoid unacceptable consequences associated with a break in business operations. As an example, if a disaster occurs at 10:00 a.m. and the RTO is 8 hours, the DR process would ensure recovery to the acceptable service level by 6:00 p.m.

The recovery point objective is the acceptable amount of data loss measured in time. For example, if the RPO was two hours, after the system was recovered, it would contain all data up to a point in time that is prior to 8:00 a.m. because the disaster occurred at 10:00 a.m.

You need to decide an acceptable RTO and RPO based on the financial impact to the business when your systems are out of commission and plan accordingly. And not just plan accordingly but budget accordingly on what you are willing to spend to achieve that recovery time objective.

To build a truly fault-tolerant system you need to think about the following:

  • Facilities to house the required infrastructure, including redundant power and cooling
  • Security to ensure the physical protection of assets from fire, theft, flood, or malicious attack
  • Suitable capacity to scale the environment to effectively replicate your systems to an acceptable service level
  • Support for repairing, replacing, and refreshing the infrastructure
  • Agreements with one or more Internet Service Providers (ISPs) to provide redundant Internet connectivity that can sustain bandwidth utilization for the environment under the expected load
  • Network infrastructure such as firewalls, routers, switches, and load balancers
  • Enough server capacity to run the business-critical services, including storage, for the supporting data and servers to run the core applications and network infrastructure services such as user authentication, Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), monitoring, and alerting.

It’s enough to make your head spin. Of course with your data safely housed inside the Acumatica SaaS platforms, you won’t have to give those systems running your ERP software another thought, but it’s well worth thinking about the other mission-critical components of your business infrastructure, including your Internet infrastructure. In a SaaS environment, this can be as simple as ensuring you have a wireless 4G router to provide backup Internet service and a couple of Chromebooks in case you need to relocate your team to run the operations in the event of an emergency.

Our sister company Acronis specializes in providing software that can help you protect your data and have a broad range of solutions for the home and small business right through to the large enterprise. You can learn more about them here.

For more information about Acumatica, please click here.

richard-duffy

By Richard Duffy

Richard is a Cloud ERP Evangelist and VP Partner Strategy and Enablement at Acumatica. He has more than 20 years of experience in the ERP business, including SAP, Microsoft, and Dynamics GP.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Five-part series details companies to watch across five essential technology sectors SAN FRANCISCO, Sept. 27, 2016 /PRNewswire/ — InformationWeek released its list of “125 Vendors to Watch” in 2017. Selected by InformationWeek’s expert editorial team, the companies listed fall into one of five key themes: infrastructure, security, cloud, data management and…

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even eclipse that of the mobile phone. Connected personal vehicles will be the final link in a fully connected IoT ecosystem. This is an incredibly important moment to capitalize on given how much time people spend…

Embedded Sensors and the Wearable Personal Cloud

Embedded Sensors and the Wearable Personal Cloud

The Wearable Personal Cloud Wearable tech is one avenue of technology that’s encouraging cloud connections and getting us all onto interconnected networks, and with the continued miniaturization and advancement of computing the types of wearable tech are always expanding and providing us with new opportunities. A few years ago, smartwatches were rather clunky devices with…

SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Get Ready For Virtual Reality and the Cloud

Get Ready For Virtual Reality and the Cloud

Virtual Reality Cloud We’re lucky to live in an era where virtual reality is no longer relegated to the confines of a sci-fi movie universe. Thanks to technology introduced by products like Oculus Rift, consumers now have access to virtual environments with fully immersive graphic capabilities. As a result, companies have only just begun to…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

5 Reasons Why Your Startup Will Grow Faster In The Cloud

5 Reasons Why Your Startup Will Grow Faster In The Cloud

Cloud Startup Fast-tracking Start-ups face many challenges, the biggest of which is usually managing growth. A start-up that does not grow is at constant risk of failure, whereas a new business that grows faster than expected may be hindered by operational constraints, such as a lack of staff, workspace and networks. It is an unfortunate…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

Is The Fintech Industry The Next Tech Bubble?

Is The Fintech Industry The Next Tech Bubble?

The Fintech Industry Banks offered a wide variety of services such as payments, money transfers, wealth management, selling insurance, etc. over the years. While banks have expanded the number of services they offer, their core still remains credit and interest. Many experts believe that since banks offered such a wide multitude of services, they have…

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

Ambitious Startups An oft-quoted statistic, 50% of new businesses fail within five years. And the culling of startups is even more dramatic, with an estimated nine out of ten folding. But to quote Steve Jobs, “I’m convinced that about half of what separates the successful entrepreneurs from the non-successful ones is pure perseverance.” So while…

The Future of M2M Technology & Opportunities

The Future of M2M Technology & Opportunities

The Future Of The Emerging M2M Here at CloudTweaks, most of our coverage is centered around the growing number of exciting and interconnected emerging markets. Wearable, IoT, M2M, Mobile and Cloud computing to name a few. Over the past couple of weeks we’ve talked about Machine to Machine (M2M) such as the differences between IoT and…