SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
PROTECT YOUR DATA AND APPS FROM A
AND OTHER LESS LIKELY DISASTERS
Disasters happen, especially when it comes to technology. Hurricanes, floods and viruses are all
well known, but we took a look at a lesser-known phenomena: the zombie apocalypse and the
impact it could have on your business. Regardless of the type of threat your business is worried
about, the cloud offers newer, more affordable and more flexible recovery options through cloud
service providers than have previously been available. Even if no zombie attacks have ever been
confirmed (yet), the following data offers a compelling look at how you can protect your
business, and where your infrastructure may be vulnerable.

DISASTERS ARE ON THE RISE
NATURAL AND MAN-MADE DISASTERS

are on the rise,
according to the Federal Emergency Management Agency.1

DOMESTIC INTEREST IN ZOMBIE ATTACKS

80

350

70

300

is also on
the rise, according to Wikipedia’s list of zombie films.2

60

AND

50

250
200

40

150

30
20

100

10

50

1950

1960

1970

1980

1990

2000

2010

http://www.fema.gov/disasters/grid.year
2
http://en.wikipedia.org/wiki/List_of_Zombie_films
1

1960

1970

1980

1990

2000

2010

SOME BELIEVE THE CORRELATION COULD BE RELATED TO ZOMBIES

Disasters come in all varieties, and most businesses are under-protected. Disaster
recovery allows you to protect and recover your applications after a disaster.

TYPES OF DISASTERS
HUMAN ERROR

1950

SERVER FAILURE

47%

NATURAL

29%

BROWN OUT

CAUSES OF
IT DISASTERS

HURRICANE

OUTAGE

VIRUS

CORRUPT DATA

HACKING

BAD CODE

3

MAN-MADE
POWER/COMM
FAILURE

NATURAL
DISASTERS

15%

9%
3

TORNADO

UNDEAD
ZOMBIES

http://www.continuitycentral.com/news060321.html

WHY CLOUD FOR DISASTER RECOVERY?

Cloud-based recovery protection makes it much harder for
zombies to wreak havoc on your datacenter and applications.

RECOVERY TIME

2017

Lower application recovery time

FAILOVER FLEXIBILITY

will adopt cloud services
exclusively to support IT
operations recovery
by 2017.2

FREQUENT TESTING

Flexibility for frequent
recovery plan exercising

40%
OF RESPONDENTS

REDUCED COST
REDUCED RISK

OF MIDSIZE ENTERPRISES

2013

Support for selective application
failover and datacenter recovery

ADVANTAGES
OF CLOUD-BASED
1
DISASTER RECOVERY

35%

Potentially reduced
recovery exercising cost

Reduced recovery risk due to oversubscribed
resource limitations following the occurence
of a major disaster event

40%

worldwide reported using
cloud services and listed
reducing cost and improving
agility/flexibility as top
reasons to use cloud.3

Gartner, “Do Your Homework Before Committing
to Cloud-Based Recovery Services” 2013.
3
Gartner, ”Market Trends: Assessment of the Rapidly Growing
Market for Cloud-Based Recovery Services” 2013.
2

1

Gartner, “Market Trends: Assessment of the Rapidly
Growing Market for Cloud-based Recovery Services” 2013.

CONCERNS
WHAT IS YOUR PRIMARY CONCERN?
PROTECTING YOUR APPLICATIONS

PROTECTING YOUR DATA

You need your applications and the supporting
data that power your business and revenue stream
to be back up and running in hours not days.

You need to protect against data loss but your
data can withstand downtime of 24–48 hours.

WHERE ARE YOUR APPLICATIONS LOCATED?
PROTECTING APPS IN YOUR DATACENTER

PROTECTING APPS IN A CLOUD

Free your staff and resources up from having to
manage a second datacenter site and choose to
recover your in-house production applications to
the cloud using To-Cloud Recovery-as-a-Service.

TO-CLOUD RECOVERY-AS-A-SERVICE

Protect your applications that are hosted in a
public cloud environment by having a cloudbased recovery site in a different regional
location using In-Cloud Recovery-as-a-Service.

IN-CLOUD RECOVERY-AS-A-SERVICE

BACKUP-AS-A-SERVICE

RECOVERY SOLUTIONS

21%

RECOVERY-AS-A-SERVICE (RAAS)

2017
$1.2 B

EXPECTED GROWTH

Recovery-as-a-Service recovers not only your files and databases,
but also your applications. This means that after a disaster hits you
are essentially given a working system, as opposed to just the
working parts that still need to be reassembled. Achieve a recovery
point objective (RPO) of 30 minutes or less and recovery time
objective (RTO) of 4 hours.

in Recovery-as-aService spending
over the next
4 years.4
2012
$465.7 M

BACKUP-AS-A-SERVICE (BAAS)

4

Backup-as-a-Service recovers your files and data to a multi-tenant,
cloud-based environment. Rather than backing up data to physical
tapes, manage and schedule backups to the cloud. BaaS customers
can typically expect a 24-hour or less RPO and a 24–48 hour RTO.

Gartner, “Market Trends: Assessment of the
Rapidly Growing Market for Cloud-Based
Recovery Services” 2013.

WHY IS IT IMPORTANT TO TEST?

80%

OFTEN MAKES UP 20%

OF TESTING

or less of the total
number of production
applications.

should be done on
applications that are
the most missioncritical.5
5

Testing is the most important thing to ensure you are prepared to respond
when a disaster occurs.

X

2

2 ANNUAL TESTS

is the suggested
minimum from many
service providers to
ensure your solution
is working properly.

Gartner, “Best Practices for Planning and Managing Disaster Recovery Testing” 2013.

EVALUATING PROVIDERS

Find a provider whose strengths align with your disaster recovery objectives.

6 STEPS TO WORKING EFFECTIVELY WITH
DISASTER RECOVERY SERVICE PROVIDERS
1

List your applications and perform a risk
and impact analysis for each.

2

Determine your DR and backup budgets
and prioritize your applications.

3

Determine each application’s ideal RTO
and RPO. Confirm your provider can
support these.

6 QUESTIONS TO ASK A CLOUD STORAGE PROVIDER

BEFORE PURSUING DISASTER RECOVERY IN THE CLOUD
1 How will my data be secured in the cloud?
Does the provider offer encryption services,
both for data in-transit and data at-rest?

2 Does the cloud provider satisfy regulatory
requirements for the regulations I care about?
How is compliance measured and certified?

3 What are the expected recovery times (RTOs)
for the data I’ll be storing in the cloud? Is the
topic of RTOs covered in the service-level
agreement (SLA)?

4

Determine where you want your DR site
to be located, keeping natural disaster
patterns and network latency in mind.

5

Outline your DR process (run-book) and
test it with your provider.

4 Does the cloud storage provider have a

6

Plan for the unexpected with seasonal
tests and use those to keep your
run-book up-to-date.

5 Can the provider effectively match the

demostrated track record in meeting data
availability and recovery requirements?

virtualization infrastructure I have in-house to
facilitate rapid recovery?

6 Will the provider allow me to test and exercise
6

TechTarget, “Why You Should Incorporate a Cloud
Disaster Recovery Plan” 2013.

DR processes on a regular basis to ensure my
organization is prepared in the event of an outage?

OTHER VENDOR CONSIDERATIONS
CAN THE VENDOR HANDLE HIGHLY SECURE DATA?

CAN THE VENDOR HANDLE REGIONAL DISASTERS?

Secure data can be encrypted when
you’re working with an experienced
provider. RaaS is an ideal solution for
applications that contain HIPAA data,
PCI-DSS compliant data and other
high-security information.

When determining where to replicate
your data to, evaluate the types of disasters you’re most vulnerable to. Choosing
how far away to replicate is a balance of
latency, cost and risk aversion.

GET PROTECTED FROM ZOMBIES AND OTHER DISASTERS
bluelock.com/cloud-services/raas
Sources:
http://www.fema.gov/disasters/grid/year
http://en.wikipedia.org/wiki/List_of_zombie_films
http://www.continuitycentral.com/news06032.html
http://searchcloudstorage.techtarget.com/tip/Why-you-should-incorporate-a-cloud-disaster-recovery-plan
Gartner “Market Trends: Assessment of the Rapidly Growing Market for Cloud-based Recovery Services” 2013.
Gartner “Do Your Homework Before Committing to Cloud-Based Recovery Services” 2013.
Gartner “Best Practices for Planning and Managing Disaster Recovery Testing” 2013.

6

Weitere ähnliche Inhalte

Was ist angesagt?

Is your big data journey stalling? Take the Leap with Capgemini and Cloudera
Is your big data journey stalling? Take the Leap with Capgemini and ClouderaIs your big data journey stalling? Take the Leap with Capgemini and Cloudera
Is your big data journey stalling? Take the Leap with Capgemini and ClouderaCloudera, Inc.
 
2016 AWS Life Sciences Days | Boston, MA – May 17, 2016
2016 AWS Life Sciences Days | Boston, MA – May 17, 20162016 AWS Life Sciences Days | Boston, MA – May 17, 2016
2016 AWS Life Sciences Days | Boston, MA – May 17, 2016Amazon Web Services
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesTechBiz Forense Digital
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareCloudera, Inc.
 
Big data security
Big data securityBig data security
Big data securityCloudBees
 
RapidScale CloudMail
RapidScale CloudMailRapidScale CloudMail
RapidScale CloudMailRapidScale
 
4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druvaDruva
 
Leveraging The Power Of The Cloud For Your Business
Leveraging The Power Of The Cloud For Your BusinessLeveraging The Power Of The Cloud For Your Business
Leveraging The Power Of The Cloud For Your BusinessJoel Katz
 
A4 drive dev_ops_agility_and_operational_efficiency
A4 drive dev_ops_agility_and_operational_efficiencyA4 drive dev_ops_agility_and_operational_efficiency
A4 drive dev_ops_agility_and_operational_efficiencyDr. Wilfred Lin (Ph.D.)
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceRightScale
 
Random Decision Forests at Scale
Random Decision Forests at ScaleRandom Decision Forests at Scale
Random Decision Forests at ScaleCloudera, Inc.
 
Analytics, Everywhere. Keys to Effective Analytics and Data Discovery
Analytics, Everywhere. Keys to Effective Analytics and Data DiscoveryAnalytics, Everywhere. Keys to Effective Analytics and Data Discovery
Analytics, Everywhere. Keys to Effective Analytics and Data DiscoveryDLT Solutions
 
RedZone - Smart Intelligence for natural disaster tracking
RedZone - Smart Intelligence for natural disaster trackingRedZone - Smart Intelligence for natural disaster tracking
RedZone - Smart Intelligence for natural disaster trackingClark Woodward
 
The curious case of data lake redemption
The curious case of data lake redemptionThe curious case of data lake redemption
The curious case of data lake redemptionDataWorks Summit
 
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Booz Allen Hamilton
 
Conférence - Les enjeux et la vision de Veritas sur la protection des donnée...
Conférence  - Les enjeux et la vision de Veritas sur la protection des donnée...Conférence  - Les enjeux et la vision de Veritas sur la protection des donnée...
Conférence - Les enjeux et la vision de Veritas sur la protection des donnée...African Cyber Security Summit
 

Was ist angesagt? (20)

Is your big data journey stalling? Take the Leap with Capgemini and Cloudera
Is your big data journey stalling? Take the Leap with Capgemini and ClouderaIs your big data journey stalling? Take the Leap with Capgemini and Cloudera
Is your big data journey stalling? Take the Leap with Capgemini and Cloudera
 
2016 AWS Life Sciences Days | Boston, MA – May 17, 2016
2016 AWS Life Sciences Days | Boston, MA – May 17, 20162016 AWS Life Sciences Days | Boston, MA – May 17, 2016
2016 AWS Life Sciences Days | Boston, MA – May 17, 2016
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence Services
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
Big data security
Big data securityBig data security
Big data security
 
RapidScale CloudMail
RapidScale CloudMailRapidScale CloudMail
RapidScale CloudMail
 
4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva
 
Leveraging The Power Of The Cloud For Your Business
Leveraging The Power Of The Cloud For Your BusinessLeveraging The Power Of The Cloud For Your Business
Leveraging The Power Of The Cloud For Your Business
 
A4 drive dev_ops_agility_and_operational_efficiency
A4 drive dev_ops_agility_and_operational_efficiencyA4 drive dev_ops_agility_and_operational_efficiency
A4 drive dev_ops_agility_and_operational_efficiency
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and Compliance
 
Chicago AWS meetup
Chicago AWS meetupChicago AWS meetup
Chicago AWS meetup
 
Track technologique multi-cloud adoption
Track technologique multi-cloud adoptionTrack technologique multi-cloud adoption
Track technologique multi-cloud adoption
 
AIMS Overview for the Quest ELR Project
AIMS Overview for the Quest ELR ProjectAIMS Overview for the Quest ELR Project
AIMS Overview for the Quest ELR Project
 
Random Decision Forests at Scale
Random Decision Forests at ScaleRandom Decision Forests at Scale
Random Decision Forests at Scale
 
Analytics, Everywhere. Keys to Effective Analytics and Data Discovery
Analytics, Everywhere. Keys to Effective Analytics and Data DiscoveryAnalytics, Everywhere. Keys to Effective Analytics and Data Discovery
Analytics, Everywhere. Keys to Effective Analytics and Data Discovery
 
Big Data (security Issue)
Big Data (security Issue)Big Data (security Issue)
Big Data (security Issue)
 
RedZone - Smart Intelligence for natural disaster tracking
RedZone - Smart Intelligence for natural disaster trackingRedZone - Smart Intelligence for natural disaster tracking
RedZone - Smart Intelligence for natural disaster tracking
 
The curious case of data lake redemption
The curious case of data lake redemptionThe curious case of data lake redemption
The curious case of data lake redemption
 
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
 
Conférence - Les enjeux et la vision de Veritas sur la protection des donnée...
Conférence  - Les enjeux et la vision de Veritas sur la protection des donnée...Conférence  - Les enjeux et la vision de Veritas sur la protection des donnée...
Conférence - Les enjeux et la vision de Veritas sur la protection des donnée...
 

Andere mochten auch

Logros de informatica 6º y 7
Logros de informatica 6º y 7Logros de informatica 6º y 7
Logros de informatica 6º y 7edosilda
 
Presentación1 aplicaciones
Presentación1 aplicacionesPresentación1 aplicaciones
Presentación1 aplicacionesBryan Ormaza
 
Štandardizované znakové sady pre profesionálny vzhľad máp od SmartGIS
Štandardizované znakové sady pre profesionálny vzhľad máp od SmartGISŠtandardizované znakové sady pre profesionálny vzhľad máp od SmartGIS
Štandardizované znakové sady pre profesionálny vzhľad máp od SmartGISGeokomunita
 
Schreiben sprechen
Schreiben sprechenSchreiben sprechen
Schreiben sprechenBart Fehr
 
Sistema judicial en el peru
Sistema judicial en el peruSistema judicial en el peru
Sistema judicial en el peruCOLEGIOENCINAS
 
Sejarah mesolithikum
Sejarah mesolithikumSejarah mesolithikum
Sejarah mesolithikumBagas Kara
 
An Introduction to Mapping, GIS and Spatial Modelling in R (presentation)
An Introduction to Mapping, GIS and Spatial Modelling in R (presentation)An Introduction to Mapping, GIS and Spatial Modelling in R (presentation)
An Introduction to Mapping, GIS and Spatial Modelling in R (presentation)Rich Harris
 
Innovation in Korea
Innovation in Korea Innovation in Korea
Innovation in Korea Seogwon Hwang
 
OpenERP Manufacturing Processes
OpenERP Manufacturing ProcessesOpenERP Manufacturing Processes
OpenERP Manufacturing Processesopenmrp
 
TripAdvisor - Apresentação Seminario Marketing Digital e o Turismo - 29Out13
TripAdvisor - Apresentação Seminario Marketing Digital e o Turismo - 29Out13TripAdvisor - Apresentação Seminario Marketing Digital e o Turismo - 29Out13
TripAdvisor - Apresentação Seminario Marketing Digital e o Turismo - 29Out13Inesting
 
Primera civilización de china lkdvnfeipurh
Primera civilización de china lkdvnfeipurhPrimera civilización de china lkdvnfeipurh
Primera civilización de china lkdvnfeipurhmabarcas
 

Andere mochten auch (17)

Memoria rom
Memoria romMemoria rom
Memoria rom
 
Logros de informatica 6º y 7
Logros de informatica 6º y 7Logros de informatica 6º y 7
Logros de informatica 6º y 7
 
Presentación1 aplicaciones
Presentación1 aplicacionesPresentación1 aplicaciones
Presentación1 aplicaciones
 
Equipo de gestión de las tic
Equipo de gestión de las ticEquipo de gestión de las tic
Equipo de gestión de las tic
 
Štandardizované znakové sady pre profesionálny vzhľad máp od SmartGIS
Štandardizované znakové sady pre profesionálny vzhľad máp od SmartGISŠtandardizované znakové sady pre profesionálny vzhľad máp od SmartGIS
Štandardizované znakové sady pre profesionálny vzhľad máp od SmartGIS
 
El facebook
El facebookEl facebook
El facebook
 
Schreiben sprechen
Schreiben sprechenSchreiben sprechen
Schreiben sprechen
 
Vivo vive digital
Vivo vive digitalVivo vive digital
Vivo vive digital
 
Your brain on digital
Your brain on digital Your brain on digital
Your brain on digital
 
Sistema judicial en el peru
Sistema judicial en el peruSistema judicial en el peru
Sistema judicial en el peru
 
Sejarah mesolithikum
Sejarah mesolithikumSejarah mesolithikum
Sejarah mesolithikum
 
An Introduction to Mapping, GIS and Spatial Modelling in R (presentation)
An Introduction to Mapping, GIS and Spatial Modelling in R (presentation)An Introduction to Mapping, GIS and Spatial Modelling in R (presentation)
An Introduction to Mapping, GIS and Spatial Modelling in R (presentation)
 
Innovation in Korea
Innovation in Korea Innovation in Korea
Innovation in Korea
 
Fluxograma seção 5
Fluxograma   seção 5Fluxograma   seção 5
Fluxograma seção 5
 
OpenERP Manufacturing Processes
OpenERP Manufacturing ProcessesOpenERP Manufacturing Processes
OpenERP Manufacturing Processes
 
TripAdvisor - Apresentação Seminario Marketing Digital e o Turismo - 29Out13
TripAdvisor - Apresentação Seminario Marketing Digital e o Turismo - 29Out13TripAdvisor - Apresentação Seminario Marketing Digital e o Turismo - 29Out13
TripAdvisor - Apresentação Seminario Marketing Digital e o Turismo - 29Out13
 
Primera civilización de china lkdvnfeipurh
Primera civilización de china lkdvnfeipurhPrimera civilización de china lkdvnfeipurh
Primera civilización de china lkdvnfeipurh
 

Ähnlich wie PROTECT YOUR DATA AND APPS FROM DISASTERS WITH CLOUD RECOVERY

V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recoveryVMware_EMEA
 
7 Habits for High Effective Disaster Recovery Administrators
7 Habits for High Effective Disaster Recovery Administrators7 Habits for High Effective Disaster Recovery Administrators
7 Habits for High Effective Disaster Recovery AdministratorsQuorumLabs
 
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperWill You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperChristian Caracciolo
 
V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...VMware_EMEA
 
A guide to modern it disaster recovery
A guide to modern it disaster recoveryA guide to modern it disaster recovery
A guide to modern it disaster recoveryJohn Brouillard
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankDonna Perlstein
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankCloudEndure
 
Successful_BC_Strategy.pdf
Successful_BC_Strategy.pdfSuccessful_BC_Strategy.pdf
Successful_BC_Strategy.pdfmykovalenko1
 
How to Make an Effective Cloud Disaster Recovery Strategy.pdf
How to Make an Effective Cloud Disaster Recovery Strategy.pdfHow to Make an Effective Cloud Disaster Recovery Strategy.pdf
How to Make an Effective Cloud Disaster Recovery Strategy.pdfSysvoot Antivirus
 
Therefore, if the company has to add a PDU, they now have to p
Therefore, if the company has to add a PDU, they now have to pTherefore, if the company has to add a PDU, they now have to p
Therefore, if the company has to add a PDU, they now have to pGrazynaBroyles24
 
Tata Comm whitepaper
Tata Comm whitepaperTata Comm whitepaper
Tata Comm whitepaperAbhishek Iyer
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensenjaredcarst
 
Enterprise grade disaster recovery without breaking the bank
Enterprise grade disaster recovery without breaking the bankEnterprise grade disaster recovery without breaking the bank
Enterprise grade disaster recovery without breaking the bankactualtechmedia
 
On premise vs cloud software
On premise vs cloud softwareOn premise vs cloud software
On premise vs cloud softwareTCM infosys
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranGSTF
 
ProfitBricks-white-paper-Disaster-Recovery-US
ProfitBricks-white-paper-Disaster-Recovery-USProfitBricks-white-paper-Disaster-Recovery-US
ProfitBricks-white-paper-Disaster-Recovery-USMudia Akpobome
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheBlocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheNovosco
 
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125Gabor Bokor
 
Cisco Powered DRaaS eBook
Cisco Powered DRaaS eBookCisco Powered DRaaS eBook
Cisco Powered DRaaS eBookCisco Powered
 

Ähnlich wie PROTECT YOUR DATA AND APPS FROM DISASTERS WITH CLOUD RECOVERY (20)

V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recovery
 
7 Habits for High Effective Disaster Recovery Administrators
7 Habits for High Effective Disaster Recovery Administrators7 Habits for High Effective Disaster Recovery Administrators
7 Habits for High Effective Disaster Recovery Administrators
 
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperWill You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
 
V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...
 
A guide to modern it disaster recovery
A guide to modern it disaster recoveryA guide to modern it disaster recovery
A guide to modern it disaster recovery
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 
Successful_BC_Strategy.pdf
Successful_BC_Strategy.pdfSuccessful_BC_Strategy.pdf
Successful_BC_Strategy.pdf
 
How to Make an Effective Cloud Disaster Recovery Strategy.pdf
How to Make an Effective Cloud Disaster Recovery Strategy.pdfHow to Make an Effective Cloud Disaster Recovery Strategy.pdf
How to Make an Effective Cloud Disaster Recovery Strategy.pdf
 
Therefore, if the company has to add a PDU, they now have to p
Therefore, if the company has to add a PDU, they now have to pTherefore, if the company has to add a PDU, they now have to p
Therefore, if the company has to add a PDU, they now have to p
 
Tata Comm whitepaper
Tata Comm whitepaperTata Comm whitepaper
Tata Comm whitepaper
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
 
Enterprise grade disaster recovery without breaking the bank
Enterprise grade disaster recovery without breaking the bankEnterprise grade disaster recovery without breaking the bank
Enterprise grade disaster recovery without breaking the bank
 
On premise vs cloud software
On premise vs cloud softwareOn premise vs cloud software
On premise vs cloud software
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
ProfitBricks-white-paper-Disaster-Recovery-US
ProfitBricks-white-paper-Disaster-Recovery-USProfitBricks-white-paper-Disaster-Recovery-US
ProfitBricks-white-paper-Disaster-Recovery-US
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheBlocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
 
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125
 
Cisco Powered DRaaS eBook
Cisco Powered DRaaS eBookCisco Powered DRaaS eBook
Cisco Powered DRaaS eBook
 

Mehr von Bluelock

How to Establish and Maintain a Disaster Recovery Program
How to Establish and Maintain a Disaster Recovery ProgramHow to Establish and Maintain a Disaster Recovery Program
How to Establish and Maintain a Disaster Recovery ProgramBluelock
 
Biggest Security Breach Concerns
Biggest Security Breach ConcernsBiggest Security Breach Concerns
Biggest Security Breach ConcernsBluelock
 
Bluelock's Recovery Suite
Bluelock's Recovery SuiteBluelock's Recovery Suite
Bluelock's Recovery SuiteBluelock
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataBluelock
 
2014 July Webinar Modern DR Workshop
2014 July Webinar Modern DR Workshop2014 July Webinar Modern DR Workshop
2014 July Webinar Modern DR WorkshopBluelock
 
DECA Financial Services Reduces DR Costs by More Than 50%
DECA Financial Services Reduces DR Costs by More Than 50%DECA Financial Services Reduces DR Costs by More Than 50%
DECA Financial Services Reduces DR Costs by More Than 50%Bluelock
 
Recovery as a Service Technical Deep Dive
Recovery as a Service Technical Deep DiveRecovery as a Service Technical Deep Dive
Recovery as a Service Technical Deep DiveBluelock
 
How to Budget for Cloud-Based Disaster Recovery
How to Budget for Cloud-Based Disaster RecoveryHow to Budget for Cloud-Based Disaster Recovery
How to Budget for Cloud-Based Disaster RecoveryBluelock
 
Benefits and Advantages of Cloud Infrastructure as a Service
Benefits and Advantages of Cloud Infrastructure as a ServiceBenefits and Advantages of Cloud Infrastructure as a Service
Benefits and Advantages of Cloud Infrastructure as a ServiceBluelock
 
Top 10 Recovery as-a-Service Questions Answered
Top 10 Recovery as-a-Service Questions AnsweredTop 10 Recovery as-a-Service Questions Answered
Top 10 Recovery as-a-Service Questions AnsweredBluelock
 
Deep Dive into Disaster Recovery in the Cloud
Deep Dive into Disaster Recovery in the CloudDeep Dive into Disaster Recovery in the Cloud
Deep Dive into Disaster Recovery in the CloudBluelock
 
How to Implement Disaster Recovery in the Cloud
How to Implement Disaster Recovery in the CloudHow to Implement Disaster Recovery in the Cloud
How to Implement Disaster Recovery in the CloudBluelock
 
How to Plan and Budget for 2013 with Cloud in Mind
How to Plan and Budget for 2013 with Cloud in MindHow to Plan and Budget for 2013 with Cloud in Mind
How to Plan and Budget for 2013 with Cloud in MindBluelock
 
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid CloudsDoes Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid CloudsBluelock
 

Mehr von Bluelock (14)

How to Establish and Maintain a Disaster Recovery Program
How to Establish and Maintain a Disaster Recovery ProgramHow to Establish and Maintain a Disaster Recovery Program
How to Establish and Maintain a Disaster Recovery Program
 
Biggest Security Breach Concerns
Biggest Security Breach ConcernsBiggest Security Breach Concerns
Biggest Security Breach Concerns
 
Bluelock's Recovery Suite
Bluelock's Recovery SuiteBluelock's Recovery Suite
Bluelock's Recovery Suite
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
 
2014 July Webinar Modern DR Workshop
2014 July Webinar Modern DR Workshop2014 July Webinar Modern DR Workshop
2014 July Webinar Modern DR Workshop
 
DECA Financial Services Reduces DR Costs by More Than 50%
DECA Financial Services Reduces DR Costs by More Than 50%DECA Financial Services Reduces DR Costs by More Than 50%
DECA Financial Services Reduces DR Costs by More Than 50%
 
Recovery as a Service Technical Deep Dive
Recovery as a Service Technical Deep DiveRecovery as a Service Technical Deep Dive
Recovery as a Service Technical Deep Dive
 
How to Budget for Cloud-Based Disaster Recovery
How to Budget for Cloud-Based Disaster RecoveryHow to Budget for Cloud-Based Disaster Recovery
How to Budget for Cloud-Based Disaster Recovery
 
Benefits and Advantages of Cloud Infrastructure as a Service
Benefits and Advantages of Cloud Infrastructure as a ServiceBenefits and Advantages of Cloud Infrastructure as a Service
Benefits and Advantages of Cloud Infrastructure as a Service
 
Top 10 Recovery as-a-Service Questions Answered
Top 10 Recovery as-a-Service Questions AnsweredTop 10 Recovery as-a-Service Questions Answered
Top 10 Recovery as-a-Service Questions Answered
 
Deep Dive into Disaster Recovery in the Cloud
Deep Dive into Disaster Recovery in the CloudDeep Dive into Disaster Recovery in the Cloud
Deep Dive into Disaster Recovery in the Cloud
 
How to Implement Disaster Recovery in the Cloud
How to Implement Disaster Recovery in the CloudHow to Implement Disaster Recovery in the Cloud
How to Implement Disaster Recovery in the Cloud
 
How to Plan and Budget for 2013 with Cloud in Mind
How to Plan and Budget for 2013 with Cloud in MindHow to Plan and Budget for 2013 with Cloud in Mind
How to Plan and Budget for 2013 with Cloud in Mind
 
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid CloudsDoes Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
 

Kürzlich hochgeladen

Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Kürzlich hochgeladen (20)

Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

PROTECT YOUR DATA AND APPS FROM DISASTERS WITH CLOUD RECOVERY

  • 1. PROTECT YOUR DATA AND APPS FROM A AND OTHER LESS LIKELY DISASTERS Disasters happen, especially when it comes to technology. Hurricanes, floods and viruses are all well known, but we took a look at a lesser-known phenomena: the zombie apocalypse and the impact it could have on your business. Regardless of the type of threat your business is worried about, the cloud offers newer, more affordable and more flexible recovery options through cloud service providers than have previously been available. Even if no zombie attacks have ever been confirmed (yet), the following data offers a compelling look at how you can protect your business, and where your infrastructure may be vulnerable. DISASTERS ARE ON THE RISE NATURAL AND MAN-MADE DISASTERS are on the rise, according to the Federal Emergency Management Agency.1 DOMESTIC INTEREST IN ZOMBIE ATTACKS 80 350 70 300 is also on the rise, according to Wikipedia’s list of zombie films.2 60 AND 50 250 200 40 150 30 20 100 10 50 1950 1960 1970 1980 1990 2000 2010 http://www.fema.gov/disasters/grid.year 2 http://en.wikipedia.org/wiki/List_of_Zombie_films 1 1960 1970 1980 1990 2000 2010 SOME BELIEVE THE CORRELATION COULD BE RELATED TO ZOMBIES Disasters come in all varieties, and most businesses are under-protected. Disaster recovery allows you to protect and recover your applications after a disaster. TYPES OF DISASTERS HUMAN ERROR 1950 SERVER FAILURE 47% NATURAL 29% BROWN OUT CAUSES OF IT DISASTERS HURRICANE OUTAGE VIRUS CORRUPT DATA HACKING BAD CODE 3 MAN-MADE POWER/COMM FAILURE NATURAL DISASTERS 15% 9% 3 TORNADO UNDEAD ZOMBIES http://www.continuitycentral.com/news060321.html WHY CLOUD FOR DISASTER RECOVERY? Cloud-based recovery protection makes it much harder for zombies to wreak havoc on your datacenter and applications. RECOVERY TIME 2017 Lower application recovery time FAILOVER FLEXIBILITY will adopt cloud services exclusively to support IT operations recovery by 2017.2 FREQUENT TESTING Flexibility for frequent recovery plan exercising 40% OF RESPONDENTS REDUCED COST REDUCED RISK OF MIDSIZE ENTERPRISES 2013 Support for selective application failover and datacenter recovery ADVANTAGES OF CLOUD-BASED 1 DISASTER RECOVERY 35% Potentially reduced recovery exercising cost Reduced recovery risk due to oversubscribed resource limitations following the occurence of a major disaster event 40% worldwide reported using cloud services and listed reducing cost and improving agility/flexibility as top reasons to use cloud.3 Gartner, “Do Your Homework Before Committing to Cloud-Based Recovery Services” 2013. 3 Gartner, ”Market Trends: Assessment of the Rapidly Growing Market for Cloud-Based Recovery Services” 2013. 2 1 Gartner, “Market Trends: Assessment of the Rapidly Growing Market for Cloud-based Recovery Services” 2013. CONCERNS WHAT IS YOUR PRIMARY CONCERN? PROTECTING YOUR APPLICATIONS PROTECTING YOUR DATA You need your applications and the supporting data that power your business and revenue stream to be back up and running in hours not days. You need to protect against data loss but your data can withstand downtime of 24–48 hours. WHERE ARE YOUR APPLICATIONS LOCATED? PROTECTING APPS IN YOUR DATACENTER PROTECTING APPS IN A CLOUD Free your staff and resources up from having to manage a second datacenter site and choose to recover your in-house production applications to the cloud using To-Cloud Recovery-as-a-Service. TO-CLOUD RECOVERY-AS-A-SERVICE Protect your applications that are hosted in a public cloud environment by having a cloudbased recovery site in a different regional location using In-Cloud Recovery-as-a-Service. IN-CLOUD RECOVERY-AS-A-SERVICE BACKUP-AS-A-SERVICE RECOVERY SOLUTIONS 21% RECOVERY-AS-A-SERVICE (RAAS) 2017 $1.2 B EXPECTED GROWTH Recovery-as-a-Service recovers not only your files and databases, but also your applications. This means that after a disaster hits you are essentially given a working system, as opposed to just the working parts that still need to be reassembled. Achieve a recovery point objective (RPO) of 30 minutes or less and recovery time objective (RTO) of 4 hours. in Recovery-as-aService spending over the next 4 years.4 2012 $465.7 M BACKUP-AS-A-SERVICE (BAAS) 4 Backup-as-a-Service recovers your files and data to a multi-tenant, cloud-based environment. Rather than backing up data to physical tapes, manage and schedule backups to the cloud. BaaS customers can typically expect a 24-hour or less RPO and a 24–48 hour RTO. Gartner, “Market Trends: Assessment of the Rapidly Growing Market for Cloud-Based Recovery Services” 2013. WHY IS IT IMPORTANT TO TEST? 80% OFTEN MAKES UP 20% OF TESTING or less of the total number of production applications. should be done on applications that are the most missioncritical.5 5 Testing is the most important thing to ensure you are prepared to respond when a disaster occurs. X 2 2 ANNUAL TESTS is the suggested minimum from many service providers to ensure your solution is working properly. Gartner, “Best Practices for Planning and Managing Disaster Recovery Testing” 2013. EVALUATING PROVIDERS Find a provider whose strengths align with your disaster recovery objectives. 6 STEPS TO WORKING EFFECTIVELY WITH DISASTER RECOVERY SERVICE PROVIDERS 1 List your applications and perform a risk and impact analysis for each. 2 Determine your DR and backup budgets and prioritize your applications. 3 Determine each application’s ideal RTO and RPO. Confirm your provider can support these. 6 QUESTIONS TO ASK A CLOUD STORAGE PROVIDER BEFORE PURSUING DISASTER RECOVERY IN THE CLOUD 1 How will my data be secured in the cloud? Does the provider offer encryption services, both for data in-transit and data at-rest? 2 Does the cloud provider satisfy regulatory requirements for the regulations I care about? How is compliance measured and certified? 3 What are the expected recovery times (RTOs) for the data I’ll be storing in the cloud? Is the topic of RTOs covered in the service-level agreement (SLA)? 4 Determine where you want your DR site to be located, keeping natural disaster patterns and network latency in mind. 5 Outline your DR process (run-book) and test it with your provider. 4 Does the cloud storage provider have a 6 Plan for the unexpected with seasonal tests and use those to keep your run-book up-to-date. 5 Can the provider effectively match the demostrated track record in meeting data availability and recovery requirements? virtualization infrastructure I have in-house to facilitate rapid recovery? 6 Will the provider allow me to test and exercise 6 TechTarget, “Why You Should Incorporate a Cloud Disaster Recovery Plan” 2013. DR processes on a regular basis to ensure my organization is prepared in the event of an outage? OTHER VENDOR CONSIDERATIONS CAN THE VENDOR HANDLE HIGHLY SECURE DATA? CAN THE VENDOR HANDLE REGIONAL DISASTERS? Secure data can be encrypted when you’re working with an experienced provider. RaaS is an ideal solution for applications that contain HIPAA data, PCI-DSS compliant data and other high-security information. When determining where to replicate your data to, evaluate the types of disasters you’re most vulnerable to. Choosing how far away to replicate is a balance of latency, cost and risk aversion. GET PROTECTED FROM ZOMBIES AND OTHER DISASTERS bluelock.com/cloud-services/raas Sources: http://www.fema.gov/disasters/grid/year http://en.wikipedia.org/wiki/List_of_zombie_films http://www.continuitycentral.com/news06032.html http://searchcloudstorage.techtarget.com/tip/Why-you-should-incorporate-a-cloud-disaster-recovery-plan Gartner “Market Trends: Assessment of the Rapidly Growing Market for Cloud-based Recovery Services” 2013. Gartner “Do Your Homework Before Committing to Cloud-Based Recovery Services” 2013. Gartner “Best Practices for Planning and Managing Disaster Recovery Testing” 2013. 6