sb-nz logo
Story image

The three vital nodes in every evolving disaster recovery system

20 Jun 2016

Disaster recovery expertise and management are but two of the core competencies any organisation should handle well, particularly as technologies evolve and adapt, according to CenturyLink.

“The growth in disaster recovery is driven by the reliance on ever-larger volumes of data, coupled with the mounting risk of losing the ability to maintain the full range of business operations if that data is no longer accessible. For this reason, it is important for businesses to understand the technology supporting effective disaster recovery and know how to use it well," says Stuart Mills, regional director, ANZ, CenturyLink.

Virtualisation and cloud technologies are what underpin the 'new generation' of disaster recovery, which the company says is built on three core foundations. 1. Disaster recovery-as-a-service (DRaaS)

Cloud computing and storage resources power DRaaS, which allows organisations to back up data, run applications, manage service migration, and test and simulate disaster events. This, according to CenturyLink, provides economic advantages over dedicated disaster recovery platforms. 2. Networking 

DRaaS network connectivity can be used in conjunction with a virtualised IT environment. CenturyLink gives an example of a network link that is needed for data transfer between cloud servers where the disaster recovery is hosted. This network link can be a public internet connection or a dedicated DRaaS link, must also be used for testing, migrating virtual machines and for failbacks after the resolution of disaster events. 3. Managed hosting

To use DRaaS well, CenturyLink believes managed hosting provides reliability and dependability when it comes to outsourcing management tasks for its IT systems. The company says that when DRaaS and managed hosting work together, information such as resources, applications and data can be in the same facility, allowing for a low-cost and fast local area network (LAN) connection.  

Story image
Three security essentials for financial services
Financial services organisations must provide the best possible customer experience in terms of mobile and online application availability, performance and security, writes Gigamon country manager for A/NZ George Tsoukas.More
Story image
Creating a strong culture of security within organisations
CISOs worldwide are inherently aware of how significant investment in cybersecurity strategies and technologies can bolster an organisation’s protection against cyberattacks. However, many overlook the importance of culture when it comes to cybersecurity.More
Story image
Connected car technology vulnerable to cyber attacks - Trend Mirco
there are ample opportunities for attackers looking to abuse connected car technology."More
Story image
NZTech calls for Govt to fund cybersecurity education as risk ramps up
NZTech says it's time for the Government to put funding into educating Kiwis about how to avoid being a victim of cyber crime, just as it does for road safety.More
Story image
Quantum extends Veeam partnership in a bid to protect against ransomware
“Quantum continues to expand its partnership with us and we are pleased to add ActiveScale object storage to a select group of S3 targets that can provide robust ransomware protection for our joint customers."More
Story image
Millions of email attacks missed by organisations’ cyber security protection
"While organisations have invested in protection against email threats, many of these attacks slip through gateways, landing in users inboxes."More