SlideShare a Scribd company logo
1 of 3
Download to read offline
B U S I N E S S T R E N D S B R I E F
B U S I N E S S T R E N D S B R I E F / 1
Crash Insurance: Protect Your Business
with Virtualization
No business is immune to the disruption that natural disasters can cause. Take one
recent case: Hurricane Sandy. The insured losses on businesses are estimated at more
than $20 billion, and the total economic damage at more than $50 billion.1
The deadly
2011 Tsunami in Japan was even more devastating, impacting 312,000 employees in
715 industries.2
Similarly, after Hurricane Katrina hit New Orleans, only 35 percent of
businesses remained open. Five years later, 71 percent of businesses said sales had
yet to reach pre-Katrina levels.3
In Europe, the Mideast, and Africa, one in four
organizations experienced a significant data loss in 2011, with three quarters of them
admitting they were not confident that they could fully recover their systems/data.4
Other Types of Disasters Abound
Distributed Denial of service (DDOS) attacks increased almost 20 percent in 2012 over
2011.6
Manmade errors, such as construction projects that inadvertently knock out
power or network lines, have also increased over that same time period. Overall, the
average hourly cost of IT downtime has increased almost 65 percent between 2010
and 2012, peaking at $161,000 per hour in 2012.7
COMMON CAUSES OF
SYSTEM OUTAGES
•		Natural disaster – This might include
events like earthquakes, floods,
storms, hurricanes or tornados.
•	Manmade – Construction projects are
known to knock out power or
network connections as a result of
careless digging.
•	Operator error – This can include
operator error such as
misconfiguration or result from a
poorly planned update or upgrade to
software or infrastructure.
•	Service demand – Spikes in demand
for a service can be predicted as in
the case of seasonal or event based
activity. The magnitude, however,
can be much larger than originally
predicted.
•	Attack – Activities such as DDoS
events and hacking may not only
impact service availability but could
have longer term effects when they
impact compliance or loss of
company intellectual property.
51%
74%
Only 51 percent of small businesses
have an IT business continuity plan in
place, ensuring IT systems are up and
running within 24 hour5
74 percent of large businesses have
such a plan in place
$0
$50,000
$100,000
$150,000
$200,000
$250,000
AverageCostPerHourofDowntime
Best-in-Class Average Laggard All Respondents
$60,000
$118,600
$110,000
$98,000
$212,100
$115,700
$97,850
$161,000
Jun-10
Feb-12
n=100
Source: Aberdeen Group, February 2012
Technology Adopters and the Cost of Downtime
51%
74%
B U S I N E S S T R E N D S B R I E F / 2
Businesses with limited resources have a lot to lose. Today, on average, the typical
business possesses more than 100 servers, desktops, and laptops, and produces 40
terabytes of data every year.8
Those systems and that data represent some of the
most valuable business assets you possess: Transaction records. Human resource
records. Historical financial data. Manufacturing and inventory information. Additionally,
you risk losing customers to competitors as they go to another site when yours is
down. Your reputation can take a hit for being unreliable. Employee productivity can
plummet if the applications they need to do their jobs are unavailable. The list of
damages due to systems outages goes on and on.
You need a way to protect everything from your applications, infrastructure and the
data that resides within them, and ensure you can get your business up and running
quickly after a disaster. Virtualization is one way—some industry experts say the best
way—to achieve this.
Businesses are accelerating their push toward virtualization
The good news is that more businesses are better prepared today than in the recent
past. Thirty-eight percent of businesses—the highest percentage yet—have already
adopted server virtualization, with 34 percent of executives saying that disaster
preparedness had a moderate to large effect on their decision to do so.10
Of course,
that means that 66 percent of businesses have yet to make a connection between
the importance of virtualization and business continuity—so there is still more
educating to do. But the most interesting result of a 2012 Symantec report on
disaster preparedness is that of the companies that have virtualized, 71 say they
have improved disaster plans as a result.11
The future looks even more encouraging for better business continuity and disaster
recovery preparedness. In another study by Catalys, results showed that 38 percent
of small and midsize businesses will be more than 80 percent virtualized by 2014,
compared to just 20 percent who have achieved that level of virtualization
penetration today. Within two years, 75 percent of businesses of all sizes are
expected to expand virtualization programs to include business-critical applications.
This is all true for server virtualization. But desktop virtualization is also a key tool for
protecting data—specifically, the data that is now stored on individual desktop PCs
and mobile devices. With desktop virtualization, all data and applications are moved
off individual machines and into a centralized desktop in the datacenter, where it can
be managed and protected more effectively. This helps companies better manage
their end users’ behavior with PCs, laptops, and mobile devices. Rather than having to
depend on individual users to back up their files, all of it resides in a central location
where it can be backed up as part of corporate backup and recovery procedures. This
solves the No. 1 challenge named in a recent Spiceworks study with regard to
managing end users: maintaining security and compliance.12
How virtualization protects your business
Virtualization changes all that by allowing multiple operating systems and
applications to run on a single physical machine. Each of these “virtual machines”
operates like a standalone physical machine would, using only as much of the physical
host’s computing power as needed. This allows you to run multiple operating systems
and applications on the same physical host, and machine utilization goes way up. You
can quickly and easily make copies of these virtual machines, and store them in a safe
place. Then you can restore the data and applications in the event of an outage.
OTHER CHALLENGES TO
EFFECTIVE BUSINESS CONTINUITY
AND DISASTER RECOVERY
According to the annual Acronis
Global Disaster Recovery Index 20129
,
even more challenges can arise other
than the disasters themselves:
•	Almost half (47 percent) of respondents
feel that business executives are not
supportive of their backup and disaster
recovery operations—either financially
or politically.
•	IT confidence that backup procedures
and policies were well documented
dropped by 44 percent between 2011
and 2012.
•	Businesses are 16 percent less
confident about having enough
disaster recovery controls and
procedures in place compared to last
year’s survey.
•	Two out of every five cited lack of
budget and IT resources as the main
barriers to successful disaster recovery.
Crash Insurance: Protect Your Business with Virtualization
VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com
Copyright © 2013 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed
at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be
trademarks of their respective companies. Item No: Crash-Insurance-Trends-brief_A4
Crash Insurance: Protect Your Business with Virtualization
How does that help with business continuity and disaster recovery? Think about
implementing business continuity and disaster recovery strategies as crash
insurance—you hope you’ll never have to use them. But if disaster does strike, such
preparations can make the difference between bankruptcy and survival.
Currently, many businesses still use traditional tape systems to back up their
applications and data. The problem with this is the speed at which you can recover: a
typical recovery using tape-based systems can take one or two days. When your
machines are virtualized, you can create virtual copies of systems and data on virtual
machines dedicated to disaster recovery. Then, if a system goes down, you can
completely restore applications and data in a matter of hours. You don’t have to rebuild
servers, applications, or even operating systems because they already exist on other
virtual machines—the servers you have earmarked for disaster recovery—elsewhere.
Of course, when you’re building this environment, you should make sure that the
virtual machines you have dedicated to disaster recovery are fully maintained and
managed in the same way as your production environment. In a virtual environment,
you can restore your data and applications much faster than if you were moving tapes
or recovering entire servers.
Conclusion
Don’t be one of those businesses that will have to close its doors due to disaster-
caused system outages. By ensuring you have a virtualization or cloud computing
solution in place with priority given to development of solid recovery plan, you will be
able to get back online within hours instead of days, helping and perhaps even saving
your business from shutting its doors.
SIX STEPS FOR CRASH-
PROOFING YOUR BUSINESS
•	Step 1: Assess Your Risk. Define
how much downtime is acceptable, or
how fast you need to be able to
recover applications and data.
•	Step 2: Develop a disaster recovery
plan. Lay out precisely what needs to
happen if any or all of your systems
were impacted by a disaster. For
example, do you want your systems
to automatically failover to systems
located in a remote site? How will
your users access those systems?
What will you do if no one can access
your main data center due to flooding
or other dangerous conditions?
Consider the various scenarios, and
put plans into place that will address
those scenarios.
•	Step 3: Evaluate technology options.
How can virtualization help you
implement your disaster-recovery
plan? Which vendor is right for you?
•	Step 4: Put the right processes and
policies in place. Technology is
useless if not deployed properly.
Make sure you have created
processes that streamline disaster
recovery and business continuity
operations, and document them.
•	Step 5: Get senior management on
board. Translate the technical
language into business terms. For
example, create a chart showing
how much revenue will be lost per
hour of downtime for each business-
critical application.
•	Step 6: Regularly test your disaster
preparedness plan. This should be
completed at least once a quarter.
1
2
3
4
5
6
7
8
9
10
11
12
“Hurricane Sandy Slams Small Business: ‘Losing My Business Means Losing My House,” by Chelsea Emery. Reuters. November 1, 2012.
“2011 Impact Report of Japan Earthquake and Tsunami: Preliminary Business Impact Analysts for High Impact Areas of
Japan.” Dun and Bradstreet 2012.
“Louisiana Small Businesses Five Years Post-Katrina.” March 2011. http://perc.net/files/LDRF_stat_report.pdf
“Disaster and Recovery Landscape: EMEA 2011.” EMC.
Regus Business Confidence Index. Issue 4 – April 2011
Prolexic Global DDOS Attack Report, Q4 2012. http://www.prolexic.com/kcresources/attack-report/prolexic-quarterly-global-
ddos-attack-report-q412-011713/Prolexic_Quarterly_Global_DDoS_Attack_Report_Q412_011413.pdf.
“Disaster Avoidance and Disaster Recovery: Making your Datacenter Disaster Resilient.” The Aberdeen Group. 2012.
Acronis Global Disaster Recovery Index 2012.
Acronis Global Disaster Recovery Index 2012.
Symantec Report on Disaster Preparedness 2012
Ibid.
“Trends Around Desktop Virtualization for Small and Mid-sized Organizations.” Spiceworks. April 2012.

More Related Content

What's hot

Business Continuation The Basics
Business Continuation   The BasicsBusiness Continuation   The Basics
Business Continuation The Basicsguest13df88e8
 
eBook - Top Ten Reasons Cloud Computing is Inevitable in Dentistry
eBook - Top Ten Reasons Cloud Computing is Inevitable in DentistryeBook - Top Ten Reasons Cloud Computing is Inevitable in Dentistry
eBook - Top Ten Reasons Cloud Computing is Inevitable in DentistryNextGen Healthcare
 
Mtw03008 usen
Mtw03008 usenMtw03008 usen
Mtw03008 usenrjstevens
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...GFI Software
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...Symantec
 
Brighttalk converged infrastructure and it operations management - final
Brighttalk   converged infrastructure and it operations management - finalBrighttalk   converged infrastructure and it operations management - final
Brighttalk converged infrastructure and it operations management - finalAndrew White
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
 
Brighttalk high scale low touch and other bedtime stories - final
Brighttalk   high scale low touch and other bedtime stories - finalBrighttalk   high scale low touch and other bedtime stories - final
Brighttalk high scale low touch and other bedtime stories - finalAndrew White
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?Gabe Akisanmi
 
Business Continuity for Mission Critical Applications
Business Continuity for Mission Critical ApplicationsBusiness Continuity for Mission Critical Applications
Business Continuity for Mission Critical ApplicationsDataCore Software
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationCitrix
 
Executive Brief- 4 Critical Risks for Healthcare IT
Executive Brief- 4 Critical Risks for Healthcare IT Executive Brief- 4 Critical Risks for Healthcare IT
Executive Brief- 4 Critical Risks for Healthcare IT Sungard Availability Services
 
How to Close the SecOps Gap
How to Close the SecOps GapHow to Close the SecOps Gap
How to Close the SecOps GapBMC Software
 
IT Asset Retirement Plan White Paper
IT Asset Retirement Plan White PaperIT Asset Retirement Plan White Paper
IT Asset Retirement Plan White PaperSarahSanders60
 
Best Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business ContinuityBest Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business ContinuityReadWrite
 
Responding to Insurance Market Oversight
Responding to Insurance Market OversightResponding to Insurance Market Oversight
Responding to Insurance Market OversightNuxeo
 

What's hot (20)

Business Continuation The Basics
Business Continuation   The BasicsBusiness Continuation   The Basics
Business Continuation The Basics
 
eBook - Top Ten Reasons Cloud Computing is Inevitable in Dentistry
eBook - Top Ten Reasons Cloud Computing is Inevitable in DentistryeBook - Top Ten Reasons Cloud Computing is Inevitable in Dentistry
eBook - Top Ten Reasons Cloud Computing is Inevitable in Dentistry
 
Mtw03008 usen
Mtw03008 usenMtw03008 usen
Mtw03008 usen
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
 
Brighttalk converged infrastructure and it operations management - final
Brighttalk   converged infrastructure and it operations management - finalBrighttalk   converged infrastructure and it operations management - final
Brighttalk converged infrastructure and it operations management - final
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
Brighttalk high scale low touch and other bedtime stories - final
Brighttalk   high scale low touch and other bedtime stories - finalBrighttalk   high scale low touch and other bedtime stories - final
Brighttalk high scale low touch and other bedtime stories - final
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?
 
Business Continuity for Mission Critical Applications
Business Continuity for Mission Critical ApplicationsBusiness Continuity for Mission Critical Applications
Business Continuity for Mission Critical Applications
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application Virtualization
 
Patch management
Patch managementPatch management
Patch management
 
Executive Brief- 4 Critical Risks for Healthcare IT
Executive Brief- 4 Critical Risks for Healthcare IT Executive Brief- 4 Critical Risks for Healthcare IT
Executive Brief- 4 Critical Risks for Healthcare IT
 
How to Close the SecOps Gap
How to Close the SecOps GapHow to Close the SecOps Gap
How to Close the SecOps Gap
 
IT Asset Retirement Plan White Paper
IT Asset Retirement Plan White PaperIT Asset Retirement Plan White Paper
IT Asset Retirement Plan White Paper
 
Data Protection Governance IT
Data Protection Governance ITData Protection Governance IT
Data Protection Governance IT
 
Best Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business ContinuityBest Practices for Proactive Disaster Recovery and Business Continuity
Best Practices for Proactive Disaster Recovery and Business Continuity
 
Responding to Insurance Market Oversight
Responding to Insurance Market OversightResponding to Insurance Market Oversight
Responding to Insurance Market Oversight
 
Fm computer roomcleaningguide
Fm computer roomcleaningguideFm computer roomcleaningguide
Fm computer roomcleaningguide
 

Viewers also liked

Webing – social marketing campaign ideas. Idee per campagne social marketing.
Webing – social marketing campaign ideas. Idee per campagne social marketing.Webing – social marketing campaign ideas. Idee per campagne social marketing.
Webing – social marketing campaign ideas. Idee per campagne social marketing.Andrea D'Ottavio
 
G322 Piracy
G322 PiracyG322 Piracy
G322 Piracychenwood
 
NCET Tech Bite | Allegra Demerjian, Social Media Ads | Aug 2016
NCET Tech Bite | Allegra Demerjian, Social Media Ads | Aug 2016NCET Tech Bite | Allegra Demerjian, Social Media Ads | Aug 2016
NCET Tech Bite | Allegra Demerjian, Social Media Ads | Aug 2016Dave Archer
 
What a wonderful Japanese food is! Japan gourmetpedia
What a wonderful Japanese food is! Japan gourmetpediaWhat a wonderful Japanese food is! Japan gourmetpedia
What a wonderful Japanese food is! Japan gourmetpediaNoriaki Takamizawa
 
Le Retargeting, promesses et réalité
Le Retargeting, promesses et réalitéLe Retargeting, promesses et réalité
Le Retargeting, promesses et réalitéJerome Sutter
 
13ème Observatoire de l’e-pub SRI
13ème Observatoire de l’e-pub SRI13ème Observatoire de l’e-pub SRI
13ème Observatoire de l’e-pub SRIyann le gigan
 
Social media marketing ppt
Social media marketing pptSocial media marketing ppt
Social media marketing pptSean Joan
 
Social Media Marketing PowerPoint Presentation
Social Media Marketing PowerPoint PresentationSocial Media Marketing PowerPoint Presentation
Social Media Marketing PowerPoint PresentationAndrew Schwartz
 
A Complete Guide To The Best Times To Post On Social Media (And More!)
A Complete Guide To The Best Times To Post On Social Media (And More!)A Complete Guide To The Best Times To Post On Social Media (And More!)
A Complete Guide To The Best Times To Post On Social Media (And More!)TrackMaven
 
50 Expert Tips for Getting Started on Social Media
50 Expert Tips for Getting Started on Social Media50 Expert Tips for Getting Started on Social Media
50 Expert Tips for Getting Started on Social MediaConstant Contact
 
Social Proof Tips to Boost Landing Page Conversions
Social Proof Tips to Boost Landing Page ConversionsSocial Proof Tips to Boost Landing Page Conversions
Social Proof Tips to Boost Landing Page ConversionsAngie Schottmuller
 
Email Marketing 101: The Welcome Email
Email Marketing 101: The Welcome EmailEmail Marketing 101: The Welcome Email
Email Marketing 101: The Welcome EmailSendGrid
 
How To Assemble a High Converting eBook
How To Assemble a High Converting eBookHow To Assemble a High Converting eBook
How To Assemble a High Converting eBookUberflip
 
Quick & Dirty Tips for : Better PowerPoint Presentations Faster
Quick & Dirty Tips for : Better PowerPoint Presentations FasterQuick & Dirty Tips for : Better PowerPoint Presentations Faster
Quick & Dirty Tips for : Better PowerPoint Presentations FasterEugene Cheng
 
The Science of Email Marketing
The Science of Email MarketingThe Science of Email Marketing
The Science of Email MarketingHubSpot
 
6 Questions to Lead You to a Social Media Strategy
6 Questions to Lead You to a Social Media Strategy6 Questions to Lead You to a Social Media Strategy
6 Questions to Lead You to a Social Media StrategyMark Schaefer
 
Go Viral on the Social Web: The Definitive How-To guide!
Go Viral on the Social Web: The Definitive How-To guide!Go Viral on the Social Web: The Definitive How-To guide!
Go Viral on the Social Web: The Definitive How-To guide!XPLAIN
 

Viewers also liked (20)

Webing – social marketing campaign ideas. Idee per campagne social marketing.
Webing – social marketing campaign ideas. Idee per campagne social marketing.Webing – social marketing campaign ideas. Idee per campagne social marketing.
Webing – social marketing campaign ideas. Idee per campagne social marketing.
 
G322 Piracy
G322 PiracyG322 Piracy
G322 Piracy
 
NCET Tech Bite | Allegra Demerjian, Social Media Ads | Aug 2016
NCET Tech Bite | Allegra Demerjian, Social Media Ads | Aug 2016NCET Tech Bite | Allegra Demerjian, Social Media Ads | Aug 2016
NCET Tech Bite | Allegra Demerjian, Social Media Ads | Aug 2016
 
What a wonderful Japanese food is! Japan gourmetpedia
What a wonderful Japanese food is! Japan gourmetpediaWhat a wonderful Japanese food is! Japan gourmetpedia
What a wonderful Japanese food is! Japan gourmetpedia
 
Le Retargeting, promesses et réalité
Le Retargeting, promesses et réalitéLe Retargeting, promesses et réalité
Le Retargeting, promesses et réalité
 
13ème Observatoire de l’e-pub SRI
13ème Observatoire de l’e-pub SRI13ème Observatoire de l’e-pub SRI
13ème Observatoire de l’e-pub SRI
 
Social media marketing ppt
Social media marketing pptSocial media marketing ppt
Social media marketing ppt
 
Social Media Marketing PowerPoint Presentation
Social Media Marketing PowerPoint PresentationSocial Media Marketing PowerPoint Presentation
Social Media Marketing PowerPoint Presentation
 
A Complete Guide To The Best Times To Post On Social Media (And More!)
A Complete Guide To The Best Times To Post On Social Media (And More!)A Complete Guide To The Best Times To Post On Social Media (And More!)
A Complete Guide To The Best Times To Post On Social Media (And More!)
 
50 Expert Tips for Getting Started on Social Media
50 Expert Tips for Getting Started on Social Media50 Expert Tips for Getting Started on Social Media
50 Expert Tips for Getting Started on Social Media
 
Social Proof Tips to Boost Landing Page Conversions
Social Proof Tips to Boost Landing Page ConversionsSocial Proof Tips to Boost Landing Page Conversions
Social Proof Tips to Boost Landing Page Conversions
 
The Ultimate Freebies Guide for Presentations by @damonify
The Ultimate Freebies Guide for Presentations by @damonifyThe Ultimate Freebies Guide for Presentations by @damonify
The Ultimate Freebies Guide for Presentations by @damonify
 
Email Marketing 101: The Welcome Email
Email Marketing 101: The Welcome EmailEmail Marketing 101: The Welcome Email
Email Marketing 101: The Welcome Email
 
How To Assemble a High Converting eBook
How To Assemble a High Converting eBookHow To Assemble a High Converting eBook
How To Assemble a High Converting eBook
 
Quick & Dirty Tips for : Better PowerPoint Presentations Faster
Quick & Dirty Tips for : Better PowerPoint Presentations FasterQuick & Dirty Tips for : Better PowerPoint Presentations Faster
Quick & Dirty Tips for : Better PowerPoint Presentations Faster
 
The Science of Email Marketing
The Science of Email MarketingThe Science of Email Marketing
The Science of Email Marketing
 
6 Questions to Lead You to a Social Media Strategy
6 Questions to Lead You to a Social Media Strategy6 Questions to Lead You to a Social Media Strategy
6 Questions to Lead You to a Social Media Strategy
 
Brand New World
Brand New WorldBrand New World
Brand New World
 
Go Viral on the Social Web: The Definitive How-To guide!
Go Viral on the Social Web: The Definitive How-To guide!Go Viral on the Social Web: The Definitive How-To guide!
Go Viral on the Social Web: The Definitive How-To guide!
 
52 Types of Marketing Strategies
52 Types of Marketing Strategies52 Types of Marketing Strategies
52 Types of Marketing Strategies
 

Similar to V mware business trend brief - crash insurance - protect your business with virtualization

V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recoveryVMware_EMEA
 
Business Continuity Getting Started
Business Continuity Getting StartedBusiness Continuity Getting Started
Business Continuity Getting Startedmxp5714
 
A guide to modern it disaster recovery
A guide to modern it disaster recoveryA guide to modern it disaster recovery
A guide to modern it disaster recoveryJohn Brouillard
 
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...EMC
 
Mastering disaster a data center checklist
Mastering disaster a data center checklistMastering disaster a data center checklist
Mastering disaster a data center checklistChris Wick
 
Mastering disaster e book Telehouse
Mastering disaster e book TelehouseMastering disaster e book Telehouse
Mastering disaster e book TelehouseTelehouse
 
Why Cloud-Based Asset Management Is Vital for Business Safety and Efficiency
Why Cloud-Based Asset Management Is Vital for Business Safety and EfficiencyWhy Cloud-Based Asset Management Is Vital for Business Safety and Efficiency
Why Cloud-Based Asset Management Is Vital for Business Safety and EfficiencyAsset Panda
 
Insider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection ImperativeInsider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection ImperativeDataCore Software
 
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseNovember 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseRapidScale
 
Business Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your BusinessBusiness Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your Businessat MicroFocus Italy ❖✔
 
The Challenges Of Multi-cloud Management.pdf
The Challenges Of Multi-cloud Management.pdfThe Challenges Of Multi-cloud Management.pdf
The Challenges Of Multi-cloud Management.pdfaNumak & Company
 
NEC Backup as a Service reduces administrative tasks, helping it departments...
 NEC Backup as a Service reduces administrative tasks, helping it departments... NEC Backup as a Service reduces administrative tasks, helping it departments...
NEC Backup as a Service reduces administrative tasks, helping it departments...InteractiveNEC
 
Disaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an EmergencyDisaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an Emergencysco813f8ko
 
Disaster Recovery Deep Dive
Disaster Recovery Deep DiveDisaster Recovery Deep Dive
Disaster Recovery Deep DiveLiberteks
 
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...VAST
 
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...Cognizant
 
Veeam 2023 EXECUTIVE SUMMARY:RANSOMWARE TRENDS NORTH AMERICA EDITION
Veeam 2023 EXECUTIVE SUMMARY:RANSOMWARE TRENDS NORTH AMERICA EDITIONVeeam 2023 EXECUTIVE SUMMARY:RANSOMWARE TRENDS NORTH AMERICA EDITION
Veeam 2023 EXECUTIVE SUMMARY:RANSOMWARE TRENDS NORTH AMERICA EDITION株式会社クライム
 
Disaster recovery white_paper
Disaster recovery white_paperDisaster recovery white_paper
Disaster recovery white_paperCMR WORLD TECH
 
Protect Your Data and Apps from Zombies and Other Disasters
Protect Your Data and Apps from Zombies and Other DisastersProtect Your Data and Apps from Zombies and Other Disasters
Protect Your Data and Apps from Zombies and Other DisastersBluelock
 

Similar to V mware business trend brief - crash insurance - protect your business with virtualization (20)

V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recovery
 
Business Continuity Getting Started
Business Continuity Getting StartedBusiness Continuity Getting Started
Business Continuity Getting Started
 
A guide to modern it disaster recovery
A guide to modern it disaster recoveryA guide to modern it disaster recovery
A guide to modern it disaster recovery
 
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
 
Mastering disaster a data center checklist
Mastering disaster a data center checklistMastering disaster a data center checklist
Mastering disaster a data center checklist
 
Mastering disaster e book Telehouse
Mastering disaster e book TelehouseMastering disaster e book Telehouse
Mastering disaster e book Telehouse
 
Why Cloud-Based Asset Management Is Vital for Business Safety and Efficiency
Why Cloud-Based Asset Management Is Vital for Business Safety and EfficiencyWhy Cloud-Based Asset Management Is Vital for Business Safety and Efficiency
Why Cloud-Based Asset Management Is Vital for Business Safety and Efficiency
 
Insider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection ImperativeInsider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection Imperative
 
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseNovember 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
 
Business Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your BusinessBusiness Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your Business
 
The Challenges Of Multi-cloud Management.pdf
The Challenges Of Multi-cloud Management.pdfThe Challenges Of Multi-cloud Management.pdf
The Challenges Of Multi-cloud Management.pdf
 
NEC Backup as a Service reduces administrative tasks, helping it departments...
 NEC Backup as a Service reduces administrative tasks, helping it departments... NEC Backup as a Service reduces administrative tasks, helping it departments...
NEC Backup as a Service reduces administrative tasks, helping it departments...
 
Disaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an EmergencyDisaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an Emergency
 
Disaster Recovery Deep Dive
Disaster Recovery Deep DiveDisaster Recovery Deep Dive
Disaster Recovery Deep Dive
 
Host your Cloud – Netmagic Solutions
Host your Cloud – Netmagic SolutionsHost your Cloud – Netmagic Solutions
Host your Cloud – Netmagic Solutions
 
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...
 
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...
 
Veeam 2023 EXECUTIVE SUMMARY:RANSOMWARE TRENDS NORTH AMERICA EDITION
Veeam 2023 EXECUTIVE SUMMARY:RANSOMWARE TRENDS NORTH AMERICA EDITIONVeeam 2023 EXECUTIVE SUMMARY:RANSOMWARE TRENDS NORTH AMERICA EDITION
Veeam 2023 EXECUTIVE SUMMARY:RANSOMWARE TRENDS NORTH AMERICA EDITION
 
Disaster recovery white_paper
Disaster recovery white_paperDisaster recovery white_paper
Disaster recovery white_paper
 
Protect Your Data and Apps from Zombies and Other Disasters
Protect Your Data and Apps from Zombies and Other DisastersProtect Your Data and Apps from Zombies and Other Disasters
Protect Your Data and Apps from Zombies and Other Disasters
 

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Recently uploaded (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

V mware business trend brief - crash insurance - protect your business with virtualization

  • 1. B U S I N E S S T R E N D S B R I E F B U S I N E S S T R E N D S B R I E F / 1 Crash Insurance: Protect Your Business with Virtualization No business is immune to the disruption that natural disasters can cause. Take one recent case: Hurricane Sandy. The insured losses on businesses are estimated at more than $20 billion, and the total economic damage at more than $50 billion.1 The deadly 2011 Tsunami in Japan was even more devastating, impacting 312,000 employees in 715 industries.2 Similarly, after Hurricane Katrina hit New Orleans, only 35 percent of businesses remained open. Five years later, 71 percent of businesses said sales had yet to reach pre-Katrina levels.3 In Europe, the Mideast, and Africa, one in four organizations experienced a significant data loss in 2011, with three quarters of them admitting they were not confident that they could fully recover their systems/data.4 Other Types of Disasters Abound Distributed Denial of service (DDOS) attacks increased almost 20 percent in 2012 over 2011.6 Manmade errors, such as construction projects that inadvertently knock out power or network lines, have also increased over that same time period. Overall, the average hourly cost of IT downtime has increased almost 65 percent between 2010 and 2012, peaking at $161,000 per hour in 2012.7 COMMON CAUSES OF SYSTEM OUTAGES • Natural disaster – This might include events like earthquakes, floods, storms, hurricanes or tornados. • Manmade – Construction projects are known to knock out power or network connections as a result of careless digging. • Operator error – This can include operator error such as misconfiguration or result from a poorly planned update or upgrade to software or infrastructure. • Service demand – Spikes in demand for a service can be predicted as in the case of seasonal or event based activity. The magnitude, however, can be much larger than originally predicted. • Attack – Activities such as DDoS events and hacking may not only impact service availability but could have longer term effects when they impact compliance or loss of company intellectual property. 51% 74% Only 51 percent of small businesses have an IT business continuity plan in place, ensuring IT systems are up and running within 24 hour5 74 percent of large businesses have such a plan in place $0 $50,000 $100,000 $150,000 $200,000 $250,000 AverageCostPerHourofDowntime Best-in-Class Average Laggard All Respondents $60,000 $118,600 $110,000 $98,000 $212,100 $115,700 $97,850 $161,000 Jun-10 Feb-12 n=100 Source: Aberdeen Group, February 2012 Technology Adopters and the Cost of Downtime 51% 74%
  • 2. B U S I N E S S T R E N D S B R I E F / 2 Businesses with limited resources have a lot to lose. Today, on average, the typical business possesses more than 100 servers, desktops, and laptops, and produces 40 terabytes of data every year.8 Those systems and that data represent some of the most valuable business assets you possess: Transaction records. Human resource records. Historical financial data. Manufacturing and inventory information. Additionally, you risk losing customers to competitors as they go to another site when yours is down. Your reputation can take a hit for being unreliable. Employee productivity can plummet if the applications they need to do their jobs are unavailable. The list of damages due to systems outages goes on and on. You need a way to protect everything from your applications, infrastructure and the data that resides within them, and ensure you can get your business up and running quickly after a disaster. Virtualization is one way—some industry experts say the best way—to achieve this. Businesses are accelerating their push toward virtualization The good news is that more businesses are better prepared today than in the recent past. Thirty-eight percent of businesses—the highest percentage yet—have already adopted server virtualization, with 34 percent of executives saying that disaster preparedness had a moderate to large effect on their decision to do so.10 Of course, that means that 66 percent of businesses have yet to make a connection between the importance of virtualization and business continuity—so there is still more educating to do. But the most interesting result of a 2012 Symantec report on disaster preparedness is that of the companies that have virtualized, 71 say they have improved disaster plans as a result.11 The future looks even more encouraging for better business continuity and disaster recovery preparedness. In another study by Catalys, results showed that 38 percent of small and midsize businesses will be more than 80 percent virtualized by 2014, compared to just 20 percent who have achieved that level of virtualization penetration today. Within two years, 75 percent of businesses of all sizes are expected to expand virtualization programs to include business-critical applications. This is all true for server virtualization. But desktop virtualization is also a key tool for protecting data—specifically, the data that is now stored on individual desktop PCs and mobile devices. With desktop virtualization, all data and applications are moved off individual machines and into a centralized desktop in the datacenter, where it can be managed and protected more effectively. This helps companies better manage their end users’ behavior with PCs, laptops, and mobile devices. Rather than having to depend on individual users to back up their files, all of it resides in a central location where it can be backed up as part of corporate backup and recovery procedures. This solves the No. 1 challenge named in a recent Spiceworks study with regard to managing end users: maintaining security and compliance.12 How virtualization protects your business Virtualization changes all that by allowing multiple operating systems and applications to run on a single physical machine. Each of these “virtual machines” operates like a standalone physical machine would, using only as much of the physical host’s computing power as needed. This allows you to run multiple operating systems and applications on the same physical host, and machine utilization goes way up. You can quickly and easily make copies of these virtual machines, and store them in a safe place. Then you can restore the data and applications in the event of an outage. OTHER CHALLENGES TO EFFECTIVE BUSINESS CONTINUITY AND DISASTER RECOVERY According to the annual Acronis Global Disaster Recovery Index 20129 , even more challenges can arise other than the disasters themselves: • Almost half (47 percent) of respondents feel that business executives are not supportive of their backup and disaster recovery operations—either financially or politically. • IT confidence that backup procedures and policies were well documented dropped by 44 percent between 2011 and 2012. • Businesses are 16 percent less confident about having enough disaster recovery controls and procedures in place compared to last year’s survey. • Two out of every five cited lack of budget and IT resources as the main barriers to successful disaster recovery. Crash Insurance: Protect Your Business with Virtualization
  • 3. VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com Copyright © 2013 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Item No: Crash-Insurance-Trends-brief_A4 Crash Insurance: Protect Your Business with Virtualization How does that help with business continuity and disaster recovery? Think about implementing business continuity and disaster recovery strategies as crash insurance—you hope you’ll never have to use them. But if disaster does strike, such preparations can make the difference between bankruptcy and survival. Currently, many businesses still use traditional tape systems to back up their applications and data. The problem with this is the speed at which you can recover: a typical recovery using tape-based systems can take one or two days. When your machines are virtualized, you can create virtual copies of systems and data on virtual machines dedicated to disaster recovery. Then, if a system goes down, you can completely restore applications and data in a matter of hours. You don’t have to rebuild servers, applications, or even operating systems because they already exist on other virtual machines—the servers you have earmarked for disaster recovery—elsewhere. Of course, when you’re building this environment, you should make sure that the virtual machines you have dedicated to disaster recovery are fully maintained and managed in the same way as your production environment. In a virtual environment, you can restore your data and applications much faster than if you were moving tapes or recovering entire servers. Conclusion Don’t be one of those businesses that will have to close its doors due to disaster- caused system outages. By ensuring you have a virtualization or cloud computing solution in place with priority given to development of solid recovery plan, you will be able to get back online within hours instead of days, helping and perhaps even saving your business from shutting its doors. SIX STEPS FOR CRASH- PROOFING YOUR BUSINESS • Step 1: Assess Your Risk. Define how much downtime is acceptable, or how fast you need to be able to recover applications and data. • Step 2: Develop a disaster recovery plan. Lay out precisely what needs to happen if any or all of your systems were impacted by a disaster. For example, do you want your systems to automatically failover to systems located in a remote site? How will your users access those systems? What will you do if no one can access your main data center due to flooding or other dangerous conditions? Consider the various scenarios, and put plans into place that will address those scenarios. • Step 3: Evaluate technology options. How can virtualization help you implement your disaster-recovery plan? Which vendor is right for you? • Step 4: Put the right processes and policies in place. Technology is useless if not deployed properly. Make sure you have created processes that streamline disaster recovery and business continuity operations, and document them. • Step 5: Get senior management on board. Translate the technical language into business terms. For example, create a chart showing how much revenue will be lost per hour of downtime for each business- critical application. • Step 6: Regularly test your disaster preparedness plan. This should be completed at least once a quarter. 1 2 3 4 5 6 7 8 9 10 11 12 “Hurricane Sandy Slams Small Business: ‘Losing My Business Means Losing My House,” by Chelsea Emery. Reuters. November 1, 2012. “2011 Impact Report of Japan Earthquake and Tsunami: Preliminary Business Impact Analysts for High Impact Areas of Japan.” Dun and Bradstreet 2012. “Louisiana Small Businesses Five Years Post-Katrina.” March 2011. http://perc.net/files/LDRF_stat_report.pdf “Disaster and Recovery Landscape: EMEA 2011.” EMC. Regus Business Confidence Index. Issue 4 – April 2011 Prolexic Global DDOS Attack Report, Q4 2012. http://www.prolexic.com/kcresources/attack-report/prolexic-quarterly-global- ddos-attack-report-q412-011713/Prolexic_Quarterly_Global_DDoS_Attack_Report_Q412_011413.pdf. “Disaster Avoidance and Disaster Recovery: Making your Datacenter Disaster Resilient.” The Aberdeen Group. 2012. Acronis Global Disaster Recovery Index 2012. Acronis Global Disaster Recovery Index 2012. Symantec Report on Disaster Preparedness 2012 Ibid. “Trends Around Desktop Virtualization for Small and Mid-sized Organizations.” Spiceworks. April 2012.