Building a Pandemic-Centric Business Continuity Plan

January 12, 2021

By Nikhil Korgaonkar, Regional Director, Arcserve India.

India is not new to natural disasters. Every year, the country faces disruption in the day-to-day life due to floods, earthquakes, landslides, forest fires, and from many other natural mishaps. According to the Global Climate Risk Index report 2019, India is the 14th most vulnerable country in the world. In such a vulnerable landscape, the question arises how should an organization prepare to protect its assets from disasters and ensure business continuity?

In the advent of a disaster, enterprises risk damaging not only their physical assets, but their digital assets as well, which might be stored in data centers stationed in high-risk zones. Various economic factors such as introduction of the GST (goods and services tax) and technology-driven programs such as Digital India, the Smart Cities Mission have pushed organizations to increase their level of digitization. This has led to the level of cyber threat going up by several notches.

Enterprises also had to prepare for ensuring business continuity for a completely different kind of disruption enforced by COVID-19. A sudden transition to remote work caused enterprises to provide its employees with data access and connectivity to the corporate network within a very short span of time. In this hustle, organizations found themselves left with loose-ends in both their physical and digital data protection strategies.

In the last six to seven months, there has been a surge in ransomware attacks targeting remote workers. As most employees don’t have the same level of security infrastructure preparedness in the home environment as they had in the office, they are at a greater risk of being targeted with ransomware. Weak passwords, unpatched systems and use of unsecured devices are a few of the key reasons for home devices to be targeted by cyber criminals.

The most vital aspect of data protection, therefore, is for companies to have an effective Business Continuity and Disaster Recovery (BCDR) plan.

Important Aspects of a BCDR Plan

There are many aspects of a business continuity and disaster recovery plan and each is as important as the other. While designing an effective BCDR plan, here are a few things to take note of:

  1. Business Impact Analysis: Create a detailed business impact analysis plan that highlights the key components for your business to survive. This will help enterprises in identifying the most critical applications and the associated infrastructure required to run the business. This activity must involve all the key stakeholders and top management.
  2. Deployment Strategies: The BCDR plan must clearly specify the steps, processes and people who will be involved in the case of a disaster. This must also specify recovery objectives. For example, in the case of a stock exchange, any downtime, even if it occurs for a few seconds, can cause losses in millions. The BCDR plan must hence specify the maximum time frame required to deliver access to critical IT applications.
  3. RTO & RPO: In the case of a BCDR, Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are extremely important. RPO refers to the maximum acceptable data loss in terms of time, whereas RTO denotes the amount of time between an outage and the restoration of operations. Depending on the business requirements, enterprises can decide to choose the required RPO and RTO. A BCDR plan must also include a clear communication process, wherein each stakeholder – employees, customers, suppliers – is apprised of the impact of the disaster and key initiatives taken.
  4. Location-centric BCDR Plan: The consulting firm McKinsey suggests that companies need to classify disaster recovery roles into either fully remote, hybrid remote, hybrid remote by exception or onsite. This will allow firms to gauge how they can operate business in an environment where most resources are working from scattered remote locations. This will also help them plan and build for remote capabilities, such as for Tier II or Tier III locations in India, where reliable bandwidth can be an issue.
  5. DR Drills: For different scenarios and locations, organize data recovery (DR) drills at regular intervals. This will help enterprises in preparing a more realistic assessment of actual situations on the ground and close gaps progressively.
  6. Cloud-based BCDR: Today, the cloud is a pivotal point for any BCDR plan. A cloud-based BCDR will help the enterprise assured access to critical IT assets from anywhere. Cloud-based backup systems are also a must, as they can back up larger amounts of data in a far lesser timeframe than traditional backup systems. As cloud-based backups can be accessed from anywhere, they ensure access to backups in the event of a disaster.
  7. Integrated BCDR plan: Enterprises must choose vendors that have an integrated approach to data security and business continuity. This is specifically important as recent trends have shown that hackers are targeting backup systems to increase their chances of getting payment from installing ransomware. This is also important as working from home increases the number of remote endpoints.
  8. Employee Awareness: To ensure robust security, organizations must improve awareness and make employees aware of the dangers of phishing or using unofficial apps or websites for storing or transmitting data. As part of the security policy, employees must also be regularly encouraged to keep changing their passwords, as weak passwords are responsible for a majority of unauthorized access.
  9. Other security measures: Regular patching of systems must also be enforced. Secure access of information can be provided using VPNs. Similarly, virtual desktops can be provided to employees for ensuring secure access to data and applications. Another layer of security can be added by using two-factor or multi-factor authentication.

A BCDR plan can only work if right tools and applications are available and accessible to the people who run your business. By considering remote workforce as a vital part of your process, and using a cloud-based BCDR plan, enterprises can ensure business continuity in any disaster or pandemic situation.

Nailing Cloud Back-up and Disaster Recovery Implementation

December 15, 2020

By Nikhil Korgaonkar, Regional Director, India and SAARC, Arcserve

175 Zettabytes, 175 trillion gigabytes or at least five times all the data in the world; that is the quantum of new data estimated to be generated by 2025 according to IDC. With data being generated at this furious pace, protecting it and the systems that hold it is no mean task for organizations. Replicating all this after a security incident occurs is quite another.

An effective cloud backup and disaster recovery (DR) strategy can ensure a business is up and running soon, even after a massive cyber security disaster strikes. But nailing the implementation is key. It is important to appreciate the difference between cloud back-up and disaster recovery and see these as two important components of an overall strategy, and not as mere synonyms.

Cloud back-up protects your data but ensuring business continuity demands your systems can be replicated as well, in order to process recovered data and bring the business back on track.

Cloud Back-up Best Practices

Following these guidelines can smoothen the cloud back-up process for any organization.

  • Do a cost-benefit analysis: To get the best value out of cloud back-ups does a rigorous cost-benefit analysis. Public cloud storage may seem cheap upfront but as data and its copies grow, cost can spiral out of control. Beware of hidden costs. For example, factor in the cost of failover testing which is critical to an effective cloud back-up planning. However, many cloud back-up service providers do not provide failover as a standard service. Instead, they offer it as an expensive premium option. Choosing the right provider offering customized, periodic testing at low or no cost is the key.
  • Customize SLAs: Speaking of customization does not take a shortcut on SLAs. Customize them to your requirements. Negotiate application priorities, reporting metrics and consequences of unmet SLAs upfront to avoid heartburn later.
  • Assess security: Assessing physical and digital security appliances of the provider’s datacenter is an important parameter. Look for datacenter certifications, security audit reports and encryption policies for in-flight and at-rest data. These are key indices you can employ to measure your cloud-backup provider’s security preparedness. Look for additional security layers even on cloud back-up, to maintain the highest levels of data protection and privacy.
  • Assess compliance: When it comes to compliance, you are the decision-maker as the owner of data. Ensure your cloud provider is vigilant in adhering to national and international regulations such as the General Data Protection Regulation (GDPR) applicable in the European Union and European Economic Areas.
  • Avoid the single cloud trap: Large public cloud providers tend to encourage customers to sign up for more services, while making it expensive to transfer data off the cloud. This behavior can lead to vendor lock-in. It would be good to assess services of multiple cloud providers and choose a combination that works best for your organization. Subscribing to several clouds can optimize individual workloads and avoid the expense of data transfer between clouds.

Disaster Recovery Best Practices

Having a disaster recovery plan is imperative for a comprehensive business continuity strategy. As with cloud back-up, there are several best practices that an organization can adopt to implement an effective DR plan.

  1. List everything you will need to recover: When creating a DR plan, you must know what resources may need to be recovered. You will need to do a full inventory of every piece of hardware, software, and peripheral devices that touches your networks or is used by your employees, contractors, and vendors. Now, listing out every on-premise, cloud-based, and mobile/BYOD tool and technology your organization uses can be a daunting task but it needs to be done, so that when it gets down to brass tacks, things work as expected.
  2. Define your RTO & RPO: Have you defined your Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) yet? These are metrics to determine your tolerance threshold for downtime and data loss respectively. Simply put, RTO is how much time an application can be down without causing significant damage to the business and RPO is the amount of data that can be lost before significant harm to the business occurs.
  3. Three-tier your recovery strategy: A three-tiered recovery strategy is recommended to ensure priorities are mapped out clearly and everyone is on the same page. It’s good practice to distribute recovery objectives across three categories as mission critical, essential, and non-essential.
    • Mission-critical: Applications are indispensable to the successful operation of a business. They need zero downtime so replication and high availability solutions should be prioritized for them. Examples include systems that enable manufacturing or logistics, web mail servers, database servers, or point-of-sale
    • Essential: Essential applications are less critical than mission-critical applications and will have less negative impact on business operations if downtime extends beyond a specified limit, e.g., authentication and file & folder servers.
    • Non-essential: These applications are assigned lowest priority because business can run without them for a few days, such as internal SharePoint sites and HR applications.
  4. Form a DR Team: During crisis time, a trained DR team is invaluable. When every team member is assigned specific tasks, it streamlines the recovery effort and makes it more effective.The DR team can also play multiple roles. It can be the point-of-contact for crisis communications to the stakeholders. It can also train the staff and make them aware of emergency response policies and procedures.
  5. Alternative Workspaces: The Covid19 pandemic has been a great eye opener on why organizations need alternative workplaces. Businesses with clearly defined remote-work policies are reaping benefits by functioning as close to business-as-usual as possible. Ensure all employees have or can quickly get access to laptops and an internet connection. And stay accessible by preparing fallback email and phone system solutions that provide essential lines of communication for employees, customers, and vendors.
  6. Secure Remote Access: Accessing company data and applications remotely can be a security risk no matter how advanced the encryption or technology used. Organizations experienced this when COVID-19 forced millions of employees to work from home overnight. Don’t wait for a crisis to find out if your infrastructure can’t handle remote access securely. Update your security technology now to ensure your data can be safely accessed from outside the firewall.
  7. Secure Backups: Backups must be kept separate and inaccessible from the main company network. Some ransomware can pass through the network and encrypt backup data, rendering it useless. A 3-2-1 backup strategy is highly effective in preventing such as scenario. Create three copies of your data, store them on two different media, and store one of those copies off-site or in the cloud.
  8. Test, Test, Test: The best time to test your DR plan is when it is not needed.
    • Test your backups to make sure your data is protected and recoverable
    • Test your DR processes to make sure they work
    • Test your people to make sure they know what to do in a real emergency


To conclude, nailing cloud back-up and disaster recovery implementation need not be your nemesis, if you keep the above best practices in mind. All you need is to plan ahead in good times and well before any unforeseeable crisis overtakes your organization.

Arcserve Introduces Multi-Petabyte Appliances for the Market’s Only Means to Secure Big Data from Cyberattacks, IT Disasters and Large-Volume Data Loss

December 9, 2020

New X Series Appliances combine advanced backup, cybersecurity and disaster recovery (DR) capabilities with over 3PBs of effective capacity to solve for unstoppable data growth, unabated cyber threats and IT disasters.

NEW DELHI, India/MINNEAPOLIS, Minnesota – December 9, 2020 – Arcserve, LLC, the world’s most experienced data and ransomware protection provider, today unveiled Arcserve X Series Appliances Secured by Sophos, the first self-contained solutions with integrated cyber and data protection for enterprise data volumes. The new appliances uniquely combine deep learning endpoint protection and on- and off-site disaster recovery with over 3PBs of effective capacity in one unit, and linear expansion to increase capacity as needed.

According to the recently released Sophos 2021 Threat Report, organizations are hard-pressed to predict the evolution of cyber threats because ransomware gangs are constantly devising new tactics to hold critical data hostage and solicit ransom payments. For that reason, enterprises must take a proactive approach through an integrated first and last line of defense that offers ransomware prevention, detection and removal, and if needed, automated restore to on-site and cloud targets.

Most practitioners in the IT community understand the extreme wreckage ransomware often leaves in its wake,” said Phil Goodwin, Research Director at IDC. “Integrating cybersecurity and data protection as a coordinated deployment is critical, of which Arcserve has staked its position at the forefront of this market. The new X Series Appliances expand these integrated technologies and are designed to create a robust system scalable for enterprise data centers.

Data protection and security at scale

Arcserve X Series Appliances uncomplicate enterprise infrastructures and offer a higher ROI by eliminating discrete data protection and security strategies:

  • Powered by Arcserve UDP software, organizations protect complex workloads with heterogeneous technologies that can be unboxed and deployed in under 15 minutes;
  • Integrate Sophos Intercept X Advanced cybersecurity to prevent ransomware and hacker attacks, including credential harvesting, lateral movement and privilege escalation;
  • Protect entire enterprise data centers with over 3PBs of effective capacity per unit; and,
  • Increase capacity as needed with linear expansion.

Performance-driven architecture

To stay ahead of new and existing challenges, IT organizations require solutions with extreme performance and agility:

  • Architected with cloud-native technologies, the X Series enables cloud economies of scale by combining on- and off-site backup and rapid restore to public and private clouds, including Arcserve® Cloud, Amazon® AWS, Microsoft Azure®, Nutanix® Objects, Eucalyptus®, Rackspace®, and more;
  • Instant VM and BMR, local and remote virtual standby, application-consistent backup and granular restore, optional high availability, and more;
  • 56 CPU cores and 1TB RAM (expandable to 2TBs) to spin up dozens of VMs on-appliance; and,
  • Hyper-efficient global deduplication with enterprise-grade SAS HDDs and NVMe SSDs for up to 20:1 ratios.

As the threat landscape evolves and data becomes more distributed in our work-from-home reality, it’s become more critical than ever to invest in the highest-performing tools and services to keep priceless data safe,” said Ivan Pittaluga, CTO of Arcserve. “And, as more data is being produced it’s equally important that organizations have a solution that can grow with them. Our new appliances are changing the game –giving organizations with enterprise-level data volumes the opportunity to use one solution for backup, cybersecurity, on-appliance and cloud disaster recovery with options for high availability. No other appliance can do that, which is why we’re so pleased to offer differentiated value that not only offers significantly higher ROI, but peace of mind.”

Learn more about Arcserve X Series Appliances Secured by Sophos.

Follow Arcserve

# # #

About Arcserve

Arcserve provides exceptional solutions to protect the priceless digital assets of organizations in need of full scale, comprehensive data protection. Established in 1983, Arcserve is the world’s most experienced provider of business continuity solutions that safeguard multi-generational IT infrastructures with applications and systems in any location, on premises and in the cloud. Organizations in over 150 countries around the world rely on Arcserve’s highly efficient, integrated technologies and expertise to eliminate the risk of data loss and extended downtime while reducing the cost and complexity of backing up and restoring data by up to 50 percent. Arcserve is headquartered in Minneapolis, Minnesota with locations around the world. Explore more at and follow @Arcserve on Twitter.

Recover your Data from a Back-up, not with a Ransom

August 14, 2020

By Nikhil Koragonkar, Regional Director, India & SAARC at Arcserve

An effective Data Back-up and Recovery plan takes the teeth out of a ransomware attack and could save millions in potential ransoms.

Ransomware attacks against Indian companies have registered a six-fold increase since the impact of Covid19, according to a news report by Increasing unemployment and burgeoning demand for competitor data are fueling the rise of this highly organized cybercrime, which is leaving Indian companies poorer by millions if not billions.

The State of Ransomware 2020, a report by cybersecurity firm Sophos, estimates the average ransom paid by Indian companies to ransomware attackers at a whopping Rs 8 crore currently. The report also points to a significant rise in the number of ransomware attacks against Indian companies over the last 12 months.

And if that is not alarming enough, globally the cost associated with ransomware attacks is expected to rise to $20bn by 2021, as per research think-tank Cybersecurity Ventures.

Public establishments are especially vulnerable to cyber and ransomware attacks due to the importance of the services they provide. Across the world there have been instances of entire cities being plunged into darkness due to ransomware attacks on power utility companies. Last month, the National Highways Authority of India suffered a ransomware attack, in what is being suspected as an attempt at cyberwarfare.

The reason for this growing all-pervasiveness of ransomware is the simple modus operandi compared to other modes of cybersecurity attacks.

Ransomware infects a system in multiple ways, including email attachments, malicious links, drive-by downloads, RDP attacks and other third-party software. Once infected, data files are encrypted and can only be decrypted or retrieved after the specified ransom is paid. These attacks are getting more ubiquitous as the sophistication required is low, while returns in the form of ransom extracted are high.

According to research, paying ransom doubles the cost of dealing with a ransomware attack. This cost must factor-in multiple things including downtime, people time, device cost, network cost, lost opportunity, and the ransom itself. The average cost to rectify the impact of the most recent ransomware attack after considering all these is US$732,520 for organizations that don’t pay the ransom, rising to US$1,448,458 for organizations that do pay.

Securing against ransomware must consequently be top of the agenda for not only IT leaders but also the c-suite executives in an organization. Endpoint security and end user education are important elements of a multi-pronged strategy to protect against ransomware, but data back-up is perhaps the key here.

Given the persistence of cybercriminals, ransomware attacks are being perpetrated over a longer period and have taken the form of cyberattack campaigns. The chances of them succeeding have also grown manifold.

A fragmented approach to data security adds to the risk. For instance, data protection and cybersecurity are two important elements that are intermeshed, but typically handled by two different teams. Lack of coordination between the two creates a disjointed view of the data security big picture in an organization. An integrated cybersecurity and data protection strategy is key to closing the security gap and ensuring various pieces of the data security puzzle fit together.

But what if the unthinkable happens and a ransomware attack succeeds in penetrating these security layers? A Business Continuity and Disaster Recovery (BCDR) plan alongside effective cybersecurity is key in case of an inevitable attack. How fast you can recover your critical data after a ransomware attack is what truly determines your preparedness for it. Having a clear and well-defined BCDR plan can help organizations protect themselves against the worst-case scenarios.

Arcserve recommends the following best practices for your BCDR plan:

  • Define your RPO & RTO: Defining your RPO and RTO should be the cornerstones of your back-up and recovery plan. RPO or Recovery Point Objective refers to the volume of data you’re prepared to lose when expressed in time. RTO or Recovery Time Objectives is the amount of time you can afford to lose before your systems and data are restored. It is important to define both these upfront in your DR plan.
  • Adopt the 3-2-1 rule: When it comes to securing business critical data, the 3-2-1 rule can never be overemphasized. Make at least three copies of your data and store them on at least two different storage media, with 1 version being offsite. This is important because many ransomware variants can spread laterally to other systems on the network and could encrypt the organization’s drive that holds the local version of the backup. Augment your 3-2-1 strategy with an airgap copy, basically a copy of your data that resides offline. The idea here is simple; if data cannot be accessed, it cannot be infected.

Prefer Cloud backups and not Cloud storage

Cloud storage services do not offer file versioning, leaving backups vulnerable to ransomware. They also lack the ability to retain the file system structure, so if you ever need to recover your systems, you’ll have to organize all your data manually.

Cloud backup services offer all the features critical to successful disaster recovery and business continuity. They include useful features such as file versioning, status reports, scheduling options and better encryption methods for transferring data. Cloud Back-up therefore is the preferable option when it comes to protecting your data against ransomware and ensuring business continuity.

  • Verify your recovery plan: Having a system and not testing it is preparing to fail at crunch time. Automated, application-level testing and fail-over is key to ensuring that your DR plan works. Testing should be done across all your local, remote and cloud locations so that there are no weak links in your DR plan.
  • Don’t forget the human element and communications: Finally, the human element is the most important aspect of a Disaster Recovery and Back-up plan. Every stakeholder, including c-level executives, IT leaders and service providers should understand their roles in the plan and frequently practice them. Communications are also a critical element and alternative means of communication need to be defined and documented upfront. This will ensure that in case of a ransomware attack when the systems are down, all the key stakeholders are able to communicate with each other and decision-making does not suffer.

In conclusion, a ransomware attack does not have to be the ultimate apocalypse in your business journey. Provided, you are prepared to take a few important steps to back yourself and your data up.

Best Practices for Data Backup and Quick Disaster Recovery

July 20, 2020

By Nikhil Korgaonkar, Regional Director – India & SAARC at Arcserve

Business continuity is a serious concern for organizations, especially when there is a rising numbers of cyber threats each day, and due to the imbalance caused by the recent pandemic.

Be it human-initiated disasters or natural ones, the need to have a Business Continuity and Disaster Recovery (BCDR) solutions is critical for any organization. It is a preventive approach to assume that disasters, and pandemics, causing cyber damage may be actually inevitable. Ransomware attack, a prominent cyberattack tool which most organizations are apprehensive about is actually increasing in numbers. What can be prevented is the stretch of the downtime, which the businesses may suffer as a consequence to any disaster.

Downtime is highly damaging for an organization. When data loss occurs, expenses go beyond basic recovery costs.

According to Gartner, the average cost of IT downtime is $5,600 per minute. As there are many different businesses operating, downtime at the low end, can be as much as $140,000 per hour, $300,000 per hour on average, and as much as $540,000 per hour at the higher end. 98% of organizations say a single hour of downtime costs over $100,000. 81% of respondents indicated that 60 minutes of downtime costs their business over $300,000. 33% of those enterprises reported that one hour of downtime costs their firms $1-5 million.

Hence, downtime can be safely called an organizations’ nightmare. Here are some of the major pain-areas that results due to the downtime:

  1. Halts businesses processes that can lead to customer dissatisfaction, data loss and monetary loss, if in case of ransomware;
  2. Disaster for organization’s reputation; and,
  3. Failing to adhere to data protection regulations, like GDPR, there will be far more penalties that can completely cripple the business.

Invariably, the company experiences a loss in productivity and revenue as well. This kind of risk is important enough to get executive-level attention, and it has spurred IT leaders to go beyond traditional backup and recovery to seek out new methods that can, perhaps, enable them to avoid a “logical” disaster altogether.

Thus, it is vital for organizations to have clarity about BCDR and cybersecurity plans, which are two different concepts but intertwined together.

While talking data backup, it is about making a duplicate copy (or copies) of the data. This is something most of us have already experienced on our cell phones. Anyone using a smartphone today also uses different Instant Messenger (IM) applications. These IM apps usually have a data backup setting, where the app takes a backup of all the files and conversations, to an email account drive. This backup is usually taken, during the time when we are not using the app, like while we are asleep. Backup is taken in case we accidentally delete or uninstall the app, the device gets corrupt or damaged, and we can always restore the backup data in the future. This is a simple use-case scenario of disaster recovery.

Again, certain data is more critical than the rest. For example, in a phone, the contact numbers are usually the most critical data than most other data files. Hence, this data must be protected and stored in the cloud, in case the device gets damaged or lost. This is an individual case. In case of enterprises, there must be specific plans on a course of action for losing critical-data due to a man-made disaster, or an act of God. Organizations must prioritize or grade their data according to its criticality during any emergency. Key pieces of information that are commonly stored by businesses be that employee records, customer details, loyalty schemes, transactions, or data collection, needs to be protected.

Disaster recovery is a set of plans and strategies that are in place for swift re-establishing the access to applications, data, and IT resources post a mishap or an outage. Disaster recovery sites are the exact replica of data servers. In case a disaster of any nature strikes and the connection between the networks is lost, disaster recovery plan can switch over to a secondary set of servers and storage systems until the primary data center is functioning back.

Factors to be acknowledged:

While choosing for the best solutions for both data backup and disaster recovery, organizations can have the below factor considered:

  1. On-premises or Cloud: It is important to evaluate the best back-up and recovery deployment plan. This is about either choosing between a cloud-based or a non-premise approach. This of course depends upon the nature of the business, the critical level and the investment and expenditure plan. Here, one must also consider the data access speed, while considering the deployment. Post-backup, the recovery of the data must be seamless between physical, virtual and cloud and, especially if it is a multi-cloud architecture, so it does not disrupt the work speed.
  2. Technologies: There are several different technologies or solutions that can be applied in taking effective backups.
    • Tapes: Tapes are making a comeback, as it is being proven as the best air-gap backup strategy in case of ransomware attacks, which are highly rampant these days. However this is again not a safe approach for other disaster recovery, as recovering data from tapes is highly time consuming. Tapes are inexpensive in regards to operations, ownership cost, capacity and speed. Magnetic tape storage has been a feature of the data center since the very earliest days of computing. Reel-to-reel tapes have evolved into high-capacity tape cartridges, and provide exceptional durability that continues to earn them a place in over half of today’s hybrid data centers.
    • Snapshot-based backup: Snapshots capture the current state of an application or disk of any time. This writes only the changed data since the last snapshot, which not only helps protect data but also conserve storage space. Of course, your data is only as complete as your most recent snapshot. If the snapshots are taken in every hour, there will be a loss of an hour’s worth of data.
    • Continuous replications: Organizations with 24×7 operations cannot afford downtime, for even minutes as it can cause irreparable damage to revenue and productivity. In addition to backing up, they’re continuously replicating – moving beyond application recovery times to application and system availability. Here, the solution is continuously replicating data at the file system level of files or folders and applications, and full physical or virtual systems, with heartbeat-powered automatic failover to ensure they remain operational.
  3. Disaster recovery as a service (DRaaS): In the event of human led malicious attacks, negligence, unforeseen circumstances or natural disasters, a holistic unified DraaS helps enterprise customers and partners to continue accessing business-critical applications with minimal disruption. You can recover applications and databases with near-zero data loss and your servers are up and running in the cloud transparently. DraaSs usually serves as an insurance for companies that cannot afford to invest in a secondary site for disaster recovery, taking care from end-to-end, from deployment to failback.

It is understandable how critical both data backup and disaster recovery is for any organization today. Retrieving lost data should not be a time-consuming affair, as this would mean loss of business hours, and delay in delivering services. Similarly, disaster recovery should help the organizations to get back fast to work, or otherwise this may lead to loss of customers and always impact business value. Alone a data backup plan cannot help when it comes to disaster recovery, thus both are equally important.

%d bloggers like this: