Disaster Recovery And The Cloud

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud

One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for this is that so few small and mid-size businesses have ever contemplated the impact of a major disaster on their IT infrastructure, let alone built a comprehensive disaster recovery plan.

In fact, more than 95 percent of the SME customers that my colleagues have worked with over the last 20 years had never contemplated the impact that a fire, flood, or even the more mundane threat of employee sabotage might have on their businesses. And when confronted with the costs and time impact of implementing a disaster recovery plan — along with the associated processes of dry runs on recovery, staff training, hardware investment, and redundant systems — their willingness to leave it to luck only increased.

Of course, as our colleagues at our sister company Acronis have said, there are only two kinds of people in the world — those who have lost data and those who are about to.

The good news is that with the technologies available to you today and the significantly lower costs associated with implementing those technologies, disaster recovery and disaster planning are much easier. At Acumatica, the systems that host our customers’ data in our software-as-a-service (SaaS) deployment and licensing model are hosted in the cloud and have regular snapshot backups and sit on fault-tolerant servers with redundant power, network infrastructure and storage systems in bomb-proof, earthquake-proof, physically secure, flood-proof, and fire-proof environments. All this protection is provided at a fraction of what it would cost for a customer to provision and deploy those solutions.

But even if you have chosen to deploy critical systems such as your enterprise resource planning (ERP) software and data in such an environment, there are still other components that you need to consider. For example, how do you manage all your document storage, security infrastructure, and access control, such as the systems provided in your on-premise server deployment?

Stop for a second and consider what would happen if you lost access to all your correspondence with customers and suppliers — not just the financial data but all the letters, emails, and general information that gets exchanged in the course of day to day transacting.

Imagine if someone decided to maliciously damage a server, either physically or via some kind of computer-based mechanism. How long would the business be out of action, and what would be the cost in terms of lost business and also reputational damage? That’s one thing that can take years to recover from, and for many small businesses it can be insurmountable.

recovery-cloud

So how do you start to plan for this, and what do you need to consider? The first two areas are your recovery time objective, or RTO, and your recovery point objective, or RPO. These are two new three-letter acronyms for you to learn and impress people with at parties.

The recovery time objective is the amount of time and the service level to which a business process must be restored after a disaster (or disruption) to avoid unacceptable consequences associated with a break in business operations. As an example, if a disaster occurs at 10:00 a.m. and the RTO is 8 hours, the DR process would ensure recovery to the acceptable service level by 6:00 p.m.

The recovery point objective is the acceptable amount of data loss measured in time. For example, if the RPO was two hours, after the system was recovered, it would contain all data up to a point in time that is prior to 8:00 a.m. because the disaster occurred at 10:00 a.m.

You need to decide an acceptable RTO and RPO based on the financial impact to the business when your systems are out of commission and plan accordingly. And not just plan accordingly but budget accordingly on what you are willing to spend to achieve that recovery time objective.

To build a truly fault-tolerant system you need to think about the following:

  • Facilities to house the required infrastructure, including redundant power and cooling
  • Security to ensure the physical protection of assets from fire, theft, flood, or malicious attack
  • Suitable capacity to scale the environment to effectively replicate your systems to an acceptable service level
  • Support for repairing, replacing, and refreshing the infrastructure
  • Agreements with one or more Internet Service Providers (ISPs) to provide redundant Internet connectivity that can sustain bandwidth utilization for the environment under the expected load
  • Network infrastructure such as firewalls, routers, switches, and load balancers
  • Enough server capacity to run the business-critical services, including storage, for the supporting data and servers to run the core applications and network infrastructure services such as user authentication, Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), monitoring, and alerting.

It’s enough to make your head spin. Of course with your data safely housed inside the Acumatica SaaS platforms, you won’t have to give those systems running your ERP software another thought, but it’s well worth thinking about the other mission-critical components of your business infrastructure, including your Internet infrastructure. In a SaaS environment, this can be as simple as ensuring you have a wireless 4G router to provide backup Internet service and a couple of Chromebooks in case you need to relocate your team to run the operations in the event of an emergency.

Our sister company Acronis specializes in providing software that can help you protect your data and have a broad range of solutions for the home and small business right through to the large enterprise. You can learn more about them here.

For more information about Acumatica, please click here.

richard-duffy

By Richard Duffy

Richard is a Cloud ERP Evangelist and VP Partner Strategy and Enablement at Acumatica. He has more than 20 years of experience in the ERP business, including SAP, Microsoft, and Dynamics GP.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Investing In The Future With The Introduction of Sage Cloud

Investing In The Future With The Introduction of Sage Cloud

CHICAGO, IL–(Marketwired – Jul 26, 2016) – Sage, a market leader in cloud accounting software, announced today at Sage Summit 2016 its strong commitment to future technologies, with a focus on new and existing partnerships that power business growth. Revealed during CEO Stephen Kelly’s keynote address, which opened the world’s largest gathering of entrepreneurs and…

2016 Tour de France: Racing With Big Data

2016 Tour de France: Racing With Big Data

2016 Tour de France The 2016 Tour de France has just concluded, with Chris Froome (SKY) taking his third overall win. Not the kind of event we often focus on here at CloudTweaks, but Dimension Data has put its analytics technology to use tracking the journeys of each rider across all 21 stages, and their…

Ransomware: A Digital Pandemic – Is There A Cure?

Ransomware: A Digital Pandemic – Is There A Cure?

The Rise Of Ransomware You can imagine the scene: you’ve just completed that business plan and a set of accounts. Finally, it’s done and saved, ready for a final read through and to be sent out to your contact list. And right when you’re ready to click “Send”, the next thing you see on the…

Martech In A Content Crazed World

Martech In A Content Crazed World

Content Crazed World Everywhere you look there are pop-up ads and offers, at times it can feel like overload. What used to be a few online ads on websites has now grown into a wild world of offers that consume your every device. These advancements in marketing technology can not only be overwhelming to the…

Hubgets – Advanced Collaboration, Enriched Communication

Hubgets – Advanced Collaboration, Enriched Communication

Advanced Collaboration Tool Sponsored series provided in collaboration with Hubgets Collaboration tools have advanced leaps and bounds with the advent of cloud technology, and the services available are only getting better. Promising features such as sophisticated group communication, productive management of tasks and meetings, and the ultimate dream, working remotely from some gorgeous island destination, innovative collaboration…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Cloud And The Military – In The US

Cloud And The Military – In The US

Cloud And The Military Scandalous cost overruns; the newest high tech doesn’t work any better than very old tech; sweetheart monopoly deals with favorite defense contractors; sole sourcing key components from our enemies – the litany just goes on and on. The military’s relationship with technology always seems to be like watching a slow motion…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

4 Industries Being Transformed By The Internet of Things

4 Industries Being Transformed By The Internet of Things

Compelling IoT Industries Every year, more and more media organizations race to predict the trends that will come to shape the online landscape over the next twelve months. Many of these are wild and outlandish and should be consumed with a pinch of salt, yet others stand out for their sober and well-researched judgements. Online…

Utilizing Digital Marketing Techniques Via The Cloud

Utilizing Digital Marketing Techniques Via The Cloud

Digital Marketing Trends In the past, trends in the exceptionally fast-paced digital marketing arena have been quickly adopted or abandoned, keeping marketers and consumers on their toes. 2016 promises a similarly expeditious temperament, with a few new digital marketing offerings taking center stage. According to Gartner’s recent research into Digital Marketing Hubs, brands plan to…

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills Cloud technology has completely changed the infrastructure and internal landscape of both small businesses and large corporations alike. No professionals in any industry understand this better than IT pros. In a cutthroat field like IT, candidates have to be multi-faceted and well-versed in the cloud universe. Employers want to know that…

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data Future Today’s organizations should become more collaborative, virtual, adaptive, and agile in order to be successful in complex business world. They should be able to respond to changes and market needs. Many organizations found that the valuable data they possess and how they use it can make them different than others. In fact,…

Cloud Infographic – Big Data Analytics Trends

Cloud Infographic – Big Data Analytics Trends

Big Data Analytics Trends As data information and cloud computing continues to work together, the need for data analytics continues to grow. Many tech firms predict that big data volume will grow steadily 40% per year and in 2020, will grow up to 50 times that. This growth will also bring a number of cost…

Cloud Infographic – What Is The Internet of Things?

Cloud Infographic – What Is The Internet of Things?

What Is The Internet of Things? “We’re still in the first minutes of the first day of the Internet revolution.”  – Scott Cook The Internet of Things (IOT) and Smart Systems are based on the notions of Sensors, Connectivity, People and Processes. We are creating a new world to view and measure anything around us through…