Story image

Disaster recovery: No longer just a 'nice to have'

29 Feb 2016

As IT budgets become tighter and reputation becomes increasingly important, downtime and data loss can be devastating and a disaster recovery plan is looking more promising.

According to Gartner, the average cost of business systems and network downtime is US$5,600 per minute, which equates to US$336,000 per hour.

Barry Assaf, Nexon Asia Pacific director, says, “The costs related to the downtime of critical business systems is only one part of the picture. It can also be prohibitively expensive to replace the data that may have been lost during systems failures.

“Then there is the damage to the organisation’s brand, with infrastructure failures or data loss leading to reduced customer loyalty and negative brand association among the general public.”

A good disaster recovery technology solution is designed to help minimise the logistical and financial aftermath of a critical infrastructure incident, and costs a fraction of the price of such an event.

Assaf says, “Companies that implement a comprehensive disaster recovery solution can increase the reliability of backups and improve disaster recovery capabilities.

“At the same time, such solutions can significantly reduce strain on the business and IT team by removing testing outages.

“By opting for an externally-managed disaster recovery-as-a-service (DRaaS), organisations don’t even need to fork out a large amount of money as an initial capital expenditure investment, so they can focus on their core business rather than worrying about downtime.”

Comprehensive DRaaS solutions should be able to provide businesses with the assurance to operate effectively and without lengthy interruptions in the event of a disaster.

They should also have the ability to be regularly tested and certified without interrupting day-to-day business, Assaf says.

“Reliable disaster recovery solutions can achieve recovery time reduction through near real-time replication to a disaster recovery site with 15-minute intervals or less.

“They should also ensure corruption-free recovery of the operating system, application, and data from the last replication point, and be able to isolate individual servers and applications for disaster recovery,” he says.

Why businesses should ban email attachments
"When people are working from an outdated version of a document, they can waste time, make errors, and potentially risk the success of the project they’re working on."
IRD issues more than $80 million of refunds in one week
The first two batches of automatic tax assessments have been successfully issued by Inland Revenue.
Transformation of industry verticals through 5G – Frost & Sullivan
5G has the potential to transform industry verticals through indoor connectivity, but certain key verticals will experience stronger growth than others.
AWS announces the general availability of AWS Ground Station
Once customers upload satellite commands and data through AWS Ground Station, they can supposedly download large amounts of data over the high-speed AWS Ground Station network.
Citrix to extend Workspace to Google Cloud
“In expanding our partnership with Citrix, we can better help these customers with their transformations by enabling them to access and run the applications their businesses depend on anywhere—simply, flexibly and securely.”
Hybrid cloud security big concern for business leaders
A new study highlights that IT and security professionals have significant concerns around security for hybrid cloud and multi-cloud environments.
GitHub launches fund to sponsor open source developers
In addition to GitHub Sponsors, GitHub is launching the GitHub Sponsors, GitHub will match all contributions up to $5,000 during a developer’s first year in GitHub Sponsors.
Check Point announces integration with Microsoft Azure
The integration of Check Point’s advanced policy enforcement capabilities with Microsoft AIP’s file classification and protection features enables enterprises to keep their business data and IP secure, irrespective of how it is shared.