Story image

It’s crunch time for DR

01 Oct 10

Disaster recovery is a big topic and it’s defi ned differently by many organisations. It encompasses backup, restoration, replication and automated recovery. However, companies need to consider carefully the types of "disasters” that commonly occur before fi nalising a disaster recovery strategy. This opens a signifi cant opportunity for resellers to work with customers on the best outcome for their businesses.

In a disaster recovery situation, the ultimate goal is to maintain the availability of applications. That needs to be balanced by using the right set of tools for the specifi c job. Critical to consider are concepts like data importance or business criticality, budget, time to deploy, operational capability and costs of downtime.

Resellers with expertise in disaster recovery and availability can thrive in this area, if they are in a position to offer specialised strategies and become a trusted advisor for their customers.

While any application availability solution should be based on business requirements, this does not usually attract the attention it deserves. Instead, disaster recovery solutions are often designed and propagated based on inherited requirements that were not originally specifi ed in consultation with the business, have not been adequately reviewed by business-level risk managers, nor be appropriate in the current regulatory, corporate or technical environments.

The unfortunate fact is that disaster recovery, like insurance, is an aspect of risk management and therefore, every dollar spent on backup is a dollar that cannot be spent on IT projects, which have the potential to improve the bottom line. As a result, it is important for IT managers to ensure that resources spent on data protection are not wasted on ineffective and outdated strategies.

In addition to traditional backup, some businesses also save backup data to tape and send them offsite, or replicate mission critical data synchronously to an alternate data centre. The advantage of these data protection regimes is that they are well known and serve as a general ‘catch-all’ solution, so are often signed off by management as ‘standard IT practice’. However, there are numerous examples of their inadequacy – over 25% of enterprise IT organisations report being dissatisfi ed or very dissatisfi ed with tape-based backup infrastructures. Also, synchronous replication is renowned for often replicating corrupted data across two sites.

While outages caused by ‘acts of God’, terrorist attacks and utility failures garner signifi cant press coverage, the more mundane, day-to-day causes of downtime go unreported and generally un-noticed. Furthermore, a quick Google search on the phrase, "causes of data loss” turns up far more results on what could be more accurately described as ‘illegal data access’. This kind of reporting results in signifi cant amounts of resources being dedicated to solve problems that may never occur.

So if your real problems aren’t likely to be stray meteorites, crazed freedom fi ghters, or hackers employed by shadowy organised crime syndicates, then how should an IT organisation determine exactly how and where to spend its disaster recovery dollars, especially when there is good evidence to support that human errors may be the largest cause of data loss in enterprise environments?

Before a disaster recovery plan is implemented, a company should review thoroughly its failure and data loss scenarios and whether the current and proposed methods of mitigation represent the best return on investment for the business. This is where resellers have the opportunity to become a trusted advisor to their customers in an area which is specialised and can be critical to the success of a business. Working with customers to determine their specifi c business needs, and develop a tailored disaster recovery strategy, is an open market for channel businesses wanting to take the step and become qualifi ed to do so.

LogicMonitor launches container monitoring solutions
Kubernetes monitoring and LM Service Insight provide performance analytics and data retention for microservices and containerised applications.
Commvault fully integrates backup with Cisco Hyperflex
Its IntelliSnap technology has been validated to work with Cisco HyperFlex hyper-converged systems without the need for third-party tools.
Experts comment on record 772mil-user data breach
Dubbed “Collection #1”, the data set contains emails and passwords with over a billion unique combinations of email addresses and passwords.
McAfee Gartner Customers’ Choice for Secure Web Gateway
“We take great pride in being recognised by our customers on Gartner Peer Insights, and their willingness to recommend McAfee Web Gateway technology”
Lenovo invests in ePaper company in bid to revive tablets
As the tablet market declines, Lenovo is making an investment in CLEARlink in order to create a low-power, colour, outdoor-ready display.
OutSystems three APAC Partners of the Year
Of the seven companies named in the OutSystems recent partner awards, three have a strong APAC presence.
Hands-on review: Nvidia GeForce RTX 2080 Ti FE
The lack of games taking advantage of the GeForce RTX 2080 Ti makes reviewing the card rather challenging
IDC: NZ IT services market will near $4B in 2023
As cloud adoption grows with every company seeking the competitive advantage it can provide, the opportunities in IT services are expanding in kind.