Business Continuity An Overview

An Introduction to Business Continuity

Continuity planning, including disaster recovery, minimizes the impact of an incident within an organization, making sure other processes are in place for key operational functions.
Planning for business continuity seeks to preserve the property as well as the ability of the organization to fulfill its mission to maintain acceptable levels of productivity, customer service and, ultimately, to stay business.

An organization may be too small for the planning of business continuity? Certainly, a business continuity plan is not required if adequate insurance is in place?

Your organization could survive the loss? Disasters occur not only after an incident on a large scale. Installations can be substantially flooded, destroying servers, or an organization can be robbed.
Containment solutions and incident recovery are numerous and varied. If a flood for example, prevented access to their premises, would be the customer service levels continue uninterrupted? There are many factors and aspects of business continuity. Business continuity is on mitigating the impact of this incident, minimizing financial losses and protect the reputation of your organization.

You can survive an incident but not necessarily possible to recover the long-term impact.

Business continuity refers to each organization.
Enterprise systems to be resilient. If continuity planning business fails, so does one of the client organizations. The second reason that business continuity is essential is that organizations expect IT support required. The business continuity plan should address both the hardware and the data in the system. It is essential for the overall planning is in place using highly elastic servers, secondary power supplies, Internet connections, dual redundant storage and uninterruptible power supplies. In addition to this, it is recommended that companies use the technology of thin clients such as Citrix and Microsoft Terminal Services for remote access and virtual servers to provide flexibility and resilience.

The objective of creating an elastic system is to eliminate any single point of failure. Using the RAID system can lose a hard drive and still works without interruption, giving it time to replace the failed drive.

computer systems prefer clean energy sources; lack of energy or even dirty energy can cause serious problems. You can build resilience into their servers to have hot spare power supplies that receive power from different sources. Thus, if a source of failure of the other while the DC power supply is not set. UPS continues clean and smooth out the peaks of power supplied. If you can not afford to take servers down, then you need to consider alternative energy sources, such as backup generators that come in automatically if it detects a power failure.

Using more than one Internet Service Provider (ISP) built the added strength in its communications infrastructure.
 
Virtual servers

Until recently, servers were designed and optimized for the operating system and hardware that were running. Now with the availability of more powerful hardware physical server can host multiple operating systems. Each guest operating system is known as a virtual server. These virtual servers manage their own operating systems independently of the host and other virtual servers. For reasons of business continuity, restoring a server to different hardware is a long and complicated process, but with virtual servers the process is much easier and takes less time because of its hardware independence.

Another benefit of virtual servers is that you can run more than one virtual server on a physical host server, thus benefiting all the power backup processing on the server. Furthermore, in a scenario of continuity, it is possible to have powerful physical servers that host a number of virtual servers at a remote location, a subsidiary or an accommodation center. Virtual servers can be easily replicated or restored the hosts in another location ready to be activated in case of a business continuity scenario.

Usually you have a Citrix server or thin client servers hosting sessions for each of its members. Thin clients offer great advantages in planning for business continuity; For example, Citrix servers were used in both the office and the branch office or a residential and an incident that would be easy to redirect the thin client Citrix sessions to another Citrix server. This would enable the workforce to continue to work affected by the incident.

Replication

To reduce the time required to retrieve data from a server, replication should be considered. There are a number of different ways to replicate data to other servers and storage devices or servers. When using other data storage devices has not yet been recovered. However, if the data is replicated to other backup servers is simply a case of allowing servers, which means you can be up and running again quickly using a recent copy of your data. Ideally, these backup servers with replicated data on them, would be accommodated in a different place, either a branch or a shelter.

And my data?

Both traditional and new emerging technology solutions play a key role in the comprehensive data protection.

To ensure that internal data is protected is desirable to have implemented a number of solutions. In addition to traditional tape backups
many organizations have implemented technologies such as Microsoft® System Center Data Protection Manager (DPM). Due to the large company benefits DPM offers, it is considered an essential part of any business continuity plan in overall activity.

Traditional backup tape

The bands have always been the most used way to back up data in a computer system. During peak hours, the system is saved on tape. This off-site location ensures that data protection in case of incidents such as a fire.

Backup tapes are a great form of low-cost backup, but it is important to be aware of the associated limits. Because of the way the data is copied to tape, the recovery time can be quite long the data must be placed on the web before it can not be restored. Also, if an incident occurs at the end of the working day, the point to the last backup recovery was the day before, which means that you can lose a day's work.

Continuous data protection

Continuous Data Protection is a solution in which, as the name suggests, a system data is continuously backed up. To enable this type of solution, the appropriate disk storage is needed to store the latest data reviews. Microsoft System Center Data Protection Manager (DPM) is a solution based on the protection of data almost continuously.

DPM continuously monitors the secure servers and only copies the changes recorded on the protected server to a DPM server. A major advantage of the modifications performed on the bandwidth required is significantly reduced to protect the server. DPM is also Microsoft® compatible application, which means it is compatible with applications such as Microsoft® Exchange and Microsoft® SQL and can therefore protect them accordingly. It can also provide up to 512 recovery points, creating periodic snapshots. Realistically, if you usually have two weeks to a month the data on the disk, then download it to tape for long-term protection. This process takes much less time than it would be to recover tape data. The traditional tape backups require someone to verify the backup the night before and change the tapes. If for some reason the backup failed and no one noticed, the band would be pointless. DPM can back you to another DPM server to another location via the Internet or a WAN. Although tape backups are always recommended for long term storage, automatic backup reduces the need to rely on them.

In case of serious incident on the main site, the data on the second DPM server can be restored quickly and easily to other servers, which means you can be up and running quickly. Combine that with virtual servers and thin clients, and you have a very cost-effective business continuity plan.
NEXT ARTICLE Next Post
PREVIOUS ARTICLE Previous Post
NEXT ARTICLE Next Post
PREVIOUS ARTICLE Previous Post
 

Delivered by FeedBurner