sb-nz logo
Story image

The three vital nodes in every evolving disaster recovery system

20 Jun 2016

Disaster recovery expertise and management are but two of the core competencies any organisation should handle well, particularly as technologies evolve and adapt, according to CenturyLink.

“The growth in disaster recovery is driven by the reliance on ever-larger volumes of data, coupled with the mounting risk of losing the ability to maintain the full range of business operations if that data is no longer accessible. For this reason, it is important for businesses to understand the technology supporting effective disaster recovery and know how to use it well," says Stuart Mills, regional director, ANZ, CenturyLink.

Virtualisation and cloud technologies are what underpin the 'new generation' of disaster recovery, which the company says is built on three core foundations. 1. Disaster recovery-as-a-service (DRaaS)

Cloud computing and storage resources power DRaaS, which allows organisations to back up data, run applications, manage service migration, and test and simulate disaster events. This, according to CenturyLink, provides economic advantages over dedicated disaster recovery platforms. 2. Networking 

DRaaS network connectivity can be used in conjunction with a virtualised IT environment. CenturyLink gives an example of a network link that is needed for data transfer between cloud servers where the disaster recovery is hosted. This network link can be a public internet connection or a dedicated DRaaS link, must also be used for testing, migrating virtual machines and for failbacks after the resolution of disaster events. 3. Managed hosting

To use DRaaS well, CenturyLink believes managed hosting provides reliability and dependability when it comes to outsourcing management tasks for its IT systems. The company says that when DRaaS and managed hosting work together, information such as resources, applications and data can be in the same facility, allowing for a low-cost and fast local area network (LAN) connection.  

Story image
Experiencing ransomware significantly impacts cybersecurity approach
"The survey findings illustrate clearly the impact of these near-impossible demands. Among other things, those hit by ransomware were found to have severely undermined confidence in their own cyber threat awareness."More
Story image
Video: 10 Minute IT Jams - protecting data with user behaviour analytics
In this video, Forcepoint senior sales engineer and solutions architect Matthew Bant discusses the company's DLP solution, the importance of integrating compliance into security solutions, and why cybersecurity strategies should take a more people-based approach.More
Story image
Why best-practice threat data management provides confident automation
Understanding an organisation’s threat landscape requires having both the right threat data sources and the proper prioritisation to derive actionable threat intelligence for your organisation. More
Story image
Secureworks: Remote working exposes new security vulnerabilities
New vulnerabilities have been exposed as IT teams across the world respond to the ongoing COVID-19 pandemic.More
Story image
BlueVoyant acquires Managed Sentinel, builds out Microsoft MSS offerings
“Combining Managed Sentinel’s Azure Sentinel deployment expertise with BlueVoyant’s MDR capabilities will help customers operationalise and maximise Microsoft security technologies."More
Story image
BayCom partners with NICE inContact to offer cloud contact centre platform in NZ
“With our extensive experience in the industry, BayCom has the ability to design, implement and support CXone nationwide, providing organisations with an industry-leading Contact Centre as a Service (CCaaS) solution to deliver on their customer experience strategies.”  More