Disaster recovery: The next generation
- 21 September, 2011 09:58
Traditional disaster recovery has undergone a fundamental shift as simple backup strategies are replaced by technologies that create resilient businesses.
“Traditional disaster recovery, whether it’s a server or a data centre, relies on having a back-up somewhere, and while this works, it doesn’t provide the timeliness modern business demands,” said Christopher Connelly, subject expert at IBM’s A/NZ Risk and Resilience Centre of Excellence.
Connelly spoke yesterday at the Institute of Actuaries Enterprise Risk Management Seminar in Sydney. The key to building a resilient business, said Connelly, is to establish good governance in terms of disaster recovery, measuring, reporting, and in particular, testing.
“Many organisations fall down in terms of governance,” he said. “Many organisations also fail to do proper testing, which has the potential to identify problems before the product is rolled out.”
In order to create a resilient business, said Connelly, an integrated approach is critical. This involves appointing a single person who is responsible for business resilience, as well seeking input from throughout the entire enterprise.
“I am always surprised when we go into an organisation and there’s not a single person responsible for risk,” he commented. Connelly added that business resilience can be leveraged by an enterprise as it seizes business opportunities missed by competitors which lack sound resilience structures.
Joshua Gliddon is a journalist at Filtered Media.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- The TCO and Security of Enterprise Grade Mobility
- FAQs: How to break the old trade-off between effectiveness against malware and speed
- A Technical Overview of the Oracle Exadata Database Machine and Exadata Storage Server
- Can Your Business Intelligence Environment Handle Data Growth?
- Migrate From Solaris with Confidence
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Endpoint Protection Overview
With the exponential growth and sophistication of malware today, the security industry can no longer afford to ‘bury its head in the sand’. The bottom line is that traditional endpoint security protection is now ineffective due to the sheer volume, quality, and complexity of malware. This paper looks at this problem and how Webroot, by going back to the drawing board on countering malware threats, is revolutionising endpoint protection and solving the issues that hinder existing endpoint security solutions. Download now.
Saving Time and Money with Savvy Use of Flash in Automated Storage Tiering
In a sluggish economy, getting the best ROI on every IT dollar spent is the top priority for almost every business. Storage budgets in most IT environments continue to remain flat or are capped as a percentage of the overall IT spend, while data storage requirements continue to grow at an unsustainable pace. Download now to learn about the benefits of using flash in automated storage tiering.
Bring Your Own Device FAQs
This report covers the frequently asked questions associated with the implications of BYOD devices in the workplace. Any solution in this space needs to be built on simplicity, scalability and security. Click to find out how to address the IT security challenges.