The Profound Effects Of Virtualization Software And DRaaS

The Profound Effects Of Virtualization Software And DRaaS

Disaster Recover As A Service (DRaaS)

As a technologist, I am constantly thinking about leveraging the latest software or hardware to provide solutions to problems. My latest thoughts revolve around disaster recovery and Disaster Recovery as a Service (DRaaS), and how it can be made more accessible to the masses.

What is DRaaS? 

Before diving into the topic let’s first discuss what has enabled it for enterprises of all sizes – in a word, virtualization, a technology which has revolutionized today’s data center and been one of the biggest disrupting technologies of the last decade or so. Server virtualization products like VMware’s ESXi, Citrix’s Xenserver, Microsoft’s HyperV and various other hypervisor platforms have been the driving forces behind server virtualization. The concept of virtualization has bled over into other data center technologies such as storage and even networking. Though not as common as server virtualization, these technologies display the promise of providing cost savings while enabling agility and scalability.

Virtualization 

Server virtualization has enabled enterprises to consolidate physical hardware and more effectively utilize server hardware, while providing a platform for cloud offerings such as Infrastructure-as-a-Service (IaaS), Software-as-a-Service (SaaS) and Platform-as-a-Service (PaaS) to create a multi-billion dollar market for Amazon, Microsoft, Google and IBM.

virtualization-server

Another benefit derived from server virtualization is a market propelled by a plethora of start-up companies offering Disaster-Recovery-as-a-Service (DRaaS). These companies are able to offer cost effective disaster recovery solutions to enterprises of all sizes. Dedicated hardware is no longer required at a disaster recovery site, as virtual servers can now easily be replicated to the disaster recovery site’s virtual environment. Software vendors also noted this opportunity and have begun to focus on developing disaster recovery software with greater capabilities and intelligence. Features include replication of virtual machines, agnostic of storage types and server hardware, which allow near instantaneous recovery point objectives for only the cost of bandwidth needed to keep up with the data flow. The automation in these newer software packages has also reduced possible recovery time from days down to hours.

cloudtweaks.com-comic

Today, a cloud based disaster recovery service should offer the following capabilities if it is to earn your valued business.

  • The ability to seamlessly integrate into your virtual environment, meaning no required software upgrade to your virtual environment to be compatible with the provider’s solutions.
  • The solution should be storage agnostic, meaning your storage or SAN solution does not have to be the same as the provider’s storage solution.
  • A Recovery Point Objective (RPO) of seconds should be available and Recovery Time Objective of minutes should be possible depending on quantity of servers being recovered.
  • The solution should be completely managed by the provider taking the burden off you and your team. This includes supplying software, providing installation and performing ongoing management to assure replication is happening error-free, as well as performing and managing the fail-over process when a disaster is declared.
  • Allow the customer visibility into their environment to validate that RPO’s are in compliance with contract service level agreements and the service is operating error free as expected.
  • The ability to define protection group for a set of servers that need to be restored to the exact same point in time. Important for systems that exchange data with my one another.
  • Provide continuous replication of servers and allow point in time recovery.
  • Guarantee that when a disaster is declared the contracted resources will be available.

Now we have defined the bare requirements for DRaaS. In Part 2 we’ll put together a list of features that a service provider could offer that would make our lives easier, add value to our businesses and change the DRaaS market.

By Marc Malizia

About Marc Malizia

Marc Malizia is co-founder and CTO of RKON Technologies, responsible for the company’s overall technical vision and strategy. Since he helped start the company in 1998, Malizia has played a key role in creating many of RKON Technologies’ products and professional service offerings, as well as building the company’s internal computing platform, which serves as the basis of the brand’s cloud and managed services portfolio.

Prior to RKON Technologies, Malizia was director of engineering at LAN Systems.

Malizia holds a bachelor’s degree in computer science and mathematics from University of Illinois and a master’s degree in telecommunications from DePaul University.

View Website
View All Articles

Sorry, comments are closed for this post.

Comics
Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…