GDPR Compliance

System Vulnerabilities Are an Issue for Everyone in the Cloud Environment

System Vulnerabilities Are an Issue for Everyone Over the past decade, we have seen a drastic increase in the number of companies relying on cloud services. Given the nature of the cloud as a shared-resource environment, threats that infiltrate the system of a single provider
The Tech Titans are Crushing Our Freedoms! Our Democracy! Our Very Humanity!!! Oh…Get Over It.

The Tech Titans are Crushing Our Freedoms! Our Democracy! Our Very Humanity!!! Oh…Get Over It.

Well the Zuckmeister has done his dance in front of Congress. Guess what? Nothing is going to happen, nothing ever does. Stop sweating it. History shows you’ll be fine. Zuck confirmed that most of our representatives don’t have a clue about how the internet or
Hosted Recovery Solutions

The Profound Effects Of Virtualization Software And DRaaS

Disaster Recover As A Service (DRaaS)

As a technologist, I am constantly thinking about leveraging the latest software or hardware to provide solutions to problems. My latest thoughts revolve around disaster recovery and Disaster Recovery as a Service (DRaaS), and how it can be made more accessible to the masses.

What is DRaaS? 

Before diving into the topic let’s first discuss what has enabled it for enterprises of all sizes – in a word, virtualization, a technology which has revolutionized today’s data center and been one of the biggest disrupting technologies of the last decade or so. Server virtualization products like VMware’s ESXi, Citrix’s Xenserver, Microsoft’s HyperV and various other hypervisor platforms have been the driving forces behind server virtualization. The concept of virtualization has bled over into other data center technologies such as storage and even networking. Though not as common as server virtualization, these technologies display the promise of providing cost savings while enabling agility and scalability.

Virtualization 

Server virtualization has enabled enterprises to consolidate physical hardware and more effectively utilize server hardware, while providing a platform for cloud offerings such as Infrastructure-as-a-Service (IaaS), Software-as-a-Service (SaaS) and Platform-as-a-Service (PaaS) to create a multi-billion dollar market for Amazon, Microsoft, Google and IBM.

virtualization-server

Another benefit derived from server virtualization is a market propelled by a plethora of start-up companies offering Disaster-Recovery-as-a-Service (DRaaS). These companies are able to offer cost effective disaster recovery solutions to enterprises of all sizes. Dedicated hardware is no longer required at a disaster recovery site, as virtual servers can now easily be replicated to the disaster recovery site’s virtual environment. Software vendors also noted this opportunity and have begun to focus on developing disaster recovery software with greater capabilities and intelligence. Features include replication of virtual machines, agnostic of storage types and server hardware, which allow near instantaneous recovery point objectives for only the cost of bandwidth needed to keep up with the data flow. The automation in these newer software packages has also reduced possible recovery time from days down to hours.

cloudtweaks.com-comic

Today, a cloud based disaster recovery service should offer the following capabilities if it is to earn your valued business.

  • The ability to seamlessly integrate into your virtual environment, meaning no required software upgrade to your virtual environment to be compatible with the provider’s solutions.
  • The solution should be storage agnostic, meaning your storage or SAN solution does not have to be the same as the provider’s storage solution.
  • A Recovery Point Objective (RPO) of seconds should be available and Recovery Time Objective of minutes should be possible depending on quantity of servers being recovered.
  • The solution should be completely managed by the provider taking the burden off you and your team. This includes supplying software, providing installation and performing ongoing management to assure replication is happening error-free, as well as performing and managing the fail-over process when a disaster is declared.
  • Allow the customer visibility into their environment to validate that RPO’s are in compliance with contract service level agreements and the service is operating error free as expected.
  • The ability to define protection group for a set of servers that need to be restored to the exact same point in time. Important for systems that exchange data with my one another.
  • Provide continuous replication of servers and allow point in time recovery.
  • Guarantee that when a disaster is declared the contracted resources will be available.

Now we have defined the bare requirements for DRaaS. In Part 2 we’ll put together a list of features that a service provider could offer that would make our lives easier, add value to our businesses and change the DRaaS market.

By Marc Malizia

Marc Malizia

Marc Malizia is co-founder and CTO of RKON Technologies, responsible for the company’s overall technical vision and strategy. Since he helped start the company in 1998, Malizia has played a key role in creating many of RKON Technologies’ products and professional service offerings, as well as building the company’s internal computing platform, which serves as the basis of the brand’s cloud and managed services portfolio.

Prior to RKON Technologies, Malizia was director of engineering at LAN Systems.

Malizia holds a bachelor’s degree in computer science and mathematics from University of Illinois and a master’s degree in telecommunications from DePaul University.

View Website

TOP ARCHIVES

2019 Big Data and Data Science Predictions Through the Lens of Comedy Movies

2019 Big Data and Data Science Predictions Through the Lens of Comedy Movies

2019 Big Data and Data Science Predictions It’s that time of year again when I look into the Crystal Skull…er, ...
Real-time Communications - Voice, Messaging, Video or Collaboration

Real-time Communications – Voice, Messaging, Video or Collaboration

The Communications Cloud As more and more real-time communications – whether voice, messaging, video or collaboration – move to distributed software ...
Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and ...
Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect ...
David

The Coming Era of Simple, Fast, Incredibly Cheap Cloud Storage

Cheap Cloud Storage Is On Its Way Data storage, like other commodities such as bandwidth, electricity, or simple computer power, ...

PARNTER LEARNING

$1,499.00Enroll Now

Cyber Security Expert Master's Program

Cyber Security Expert Master’s Program

The course will teach you: Advanced hacking concepts that can help you manage information security better. Architectures of frame cloud data storage and security strategies. You will learn how to use them to find and analyze risks. How to install, ...

$2,899.00Enroll Now

CEH (v10) – Certified Ethical Hacker Training Course

CEH (v10) – Certified Ethical Hacker Training Course

The course will help you: To understand the tactics and methodologies that hackers use to attack and penetrate any network. Understand honeypots, wireless hacking, firewall, and IDS. Become an expert in the hacking concepts, including smartphone hacking, writing virus codes, ...