Skip to main content

Disaster Recovery concepts



It’s very important when starting working on IT project to define the right scope for your mission.

I was working these days on DR (Disaster Recovery) project and I have been talked to many colleagues from different departments: Business unit, quality assurance, Audit department and of course IT department.

What I have remarked when explaining the need for a Business continuity plan is that every concerned person see only his related scope and  did not have the attitude of general or global vision to the scenario.

In fact, when dealing with such kind of project, it’s important to forget your current job and see the problematic from a general perspective.

It’s sure for all of the organization that any business process is based usually on business  Application and that each application need resources and infrastructure to run and turn up.

Defining  the relationship between your business applications and your IT infrastructure is an important  step when starting a business continuity project or more specifically a Disaster recovery project.



Important organizations, especially telecommunication ones, usually we talk about three important units:

  • People
  • Processes
  • Technology
It’s important to know that the customer expectation stays the same even after a disaster was occurred.

From a concept side, it’s important to understand the difference between 3 points:


  • High availability
  • Disaster recovery
  • Business continuity


High availability 
      High‐availability techniques are about preventing the everyday failures that cause
Downtime (network card failure, disk crash…)

Disaster Recovery
     A quick search on the Internet will reveal a number of definitions for disaster recovery. One that I like is that it is the processes used to return a business to a normal operating state
after the occurrence of a catastrophic event.

Disaster recovery, as a term, is normally applied to the recovery of an IT system, or infrastructure, after a disastrous event has struck.

However, you need to think about the difference between disaster recovery and business continuity.
 
Business Continuity
        Business continuity and disaster recovery are confused for each other even more than
disaster recovery and high availability. In simple terms, the Business Continuity Plan (BCP) is the processes and procedures that will be followed to enable the business to function in a reduced, or preferably normal, capacity.
 It is involved with a large number of areas including:


  • Office space and furniture
  • Supplies
  • Communications
  • Business process systems
  • Transport
  • Procurement of replacement equipment
  • Possibly even the hiring of new staff






Comments

Popular posts from this blog

What You Must Know Before Establishing a Recovery Plan ?

In today's rapidly evolving digital landscape, organizations are increasingly adopting the zero trust model, primarily due to the expanding attack surface that leaves critical systems and data exposed. This shift is also fueled by the heightened sophistication of cyber-attacks, which have become more complex and harder to detect, surpassing traditional security measures. Additionally, the existing operating models within organizations are often inconsistent, typically characterized by distributed and siloed environments.    This fragmentation creates vulnerabilities and makes it challenging to implement uniform security protocols. The zero trust model addresses these challenges by assuming that threats exist both inside and outside the network, necessitating continuous verification of all users and devices. Its adoption represents a proactive stance in the ongoing battle against cyber threats, ensuring a more robust and resilient organizational security posture. The Evolution ...

A comprehensive guide to ransomware distribution in VMware environments

In a virtualized on-premises environment based on VMware, ransomware distribution scenarios can be somewhat unique due to the nature of virtualization technology. However, many of the traditional attack vectors still apply. Here are some ransomware distribution scenarios specific to a VMware-based virtualized environment: Phishing Attacks Targeting Administrators: Administrators with access to the VMware environment might receive phishing emails. If they fall for these and their credentials are compromised, attackers can gain access to the virtualized environment. Exploiting Vulnerabilities in VMware Software: If VMware software or the underlying operating system is not kept up-to-date with security patches, vulnerabilities can be exploited by attackers to deliver ransomware into the virtualized environment. Compromised Remote Management Tools: Tools used for remote management of the virtualized environment, such as vSphere, can be a target. If these tools are compromised, attackers ca...

Edge Computing Demystified Book

After a while I'm back and pleased  to share in this post my first book around Edge computing Technologies. Edge computing has been a very hot and interesting topic nowadays for communication service provider and Enterprise so far. Augmented Reality / Virtual Reality, Smart cities, Healthcare, industrial IoT and many others use cases require a change in the way we operate and host application in the cloud.  IA, Big Data and analytics are often used today to understand the behavior of the customer and even the health of services. Real-time and high throughput demand are the characteristic of the new business services. Edge computing technology promises to resolve different challenges and brings compute, storage and bandwidth close to the data source. I tried in ‘the Edge Computing Demystified’ book to explain Edge computing technology referring to different use cases from communication service provider and enterprise industry. I h...