Disaster recovery: The next generation
- 21 September, 2011 09:58
Traditional disaster recovery has undergone a fundamental shift as simple backup strategies are replaced by technologies that create resilient businesses.
“Traditional disaster recovery, whether it’s a server or a data centre, relies on having a back-up somewhere, and while this works, it doesn’t provide the timeliness modern business demands,” said Christopher Connelly, subject expert at IBM’s A/NZ Risk and Resilience Centre of Excellence.
Connelly spoke yesterday at the Institute of Actuaries Enterprise Risk Management Seminar in Sydney. The key to building a resilient business, said Connelly, is to establish good governance in terms of disaster recovery, measuring, reporting, and in particular, testing.
“Many organisations fall down in terms of governance,” he said. “Many organisations also fail to do proper testing, which has the potential to identify problems before the product is rolled out.”
In order to create a resilient business, said Connelly, an integrated approach is critical. This involves appointing a single person who is responsible for business resilience, as well seeking input from throughout the entire enterprise.
“I am always surprised when we go into an organisation and there’s not a single person responsible for risk,” he commented. Connelly added that business resilience can be leveraged by an enterprise as it seizes business opportunities missed by competitors which lack sound resilience structures.
Joshua Gliddon is a journalist at Filtered Media.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
World Quality Report - The State of Quality 2012
The most comprehensive assessment of the current state of enterprise application quality and testing practices available from around the world. With our 1550 respondents, Capgemini, HP & Sogeti bring you the full report. Download today.
Mobility Apps: What every developer should know
Learn how others have delivered industry-leading, multi-platform management and security solutions. In this whitepaper, we look how app developers can develop, deploy and manage apps that enterprises can rely on today and into the future. Click to download!
Advanced Targeted Attacks
The new threat landscape has changed. Cybercriminals are aggressively pursuing valuable data assets, such as financial transaction information, product design blueprints, user credentials to sensitive systems, and other intellectual property. Simply put, the cyber offense has outpaced the defensive technologies used by most companies today. Find out more on how to protect against the next generation of cyber-attacks.