SlideShare a Scribd company logo
Why Replication Is Not Enough 
to Keep Your Business Running
While you may be 
familiar with multiple 
replication products 
and vendors, don’t 
confuse the 
technology of data or 
server replication with 
Disaster Recovery.
Replication is not a disaster 
recovery solution nor does it 
provide business continuity. So 
what exactly is replication?
Replication is the process of 
copying data from one location 
to another over a SAN, LAN, 
or local WAN. 
Source: TechTarget
This provides you with multiple 
up-to-date copies of your data.
Look at replication as 
an aspect of disaster 
recovery and 
business continuity.
Although it is a key technology 
in order to implement a 
complete DR/BC plan, it needs 
to be combined with data 
deduplication, virtual servers, 
or even the cloud.
But let’s take a step back to really 
understand business continuity.
According to ESG Sr. 
Analyst Jason 
Buffington, “business 
continuity is ensuring 
that your IT and 
business processes 
continue, involving 
availability technologies 
as well as mitigation 
methods, etc.”
Ultimately, your entire IT 
infrastructure needs to be up 
and running in order to assure 
that your employees can 
continue working during any 
disaster or IT outage.
While you need to 
protect your data, 
just as importantly, 
you need to protect 
and keep your 
applications up.
Having survivable data does not 
equate to disaster recovery.
“Business continuity and 
disaster recovery is 
more about people and 
processes than it is 
about the data,” 
according to Buffington.
By combining appropriate 
planning, IT orchestration and 
instrumentation with a surviving 
copy of your data, you then 
have a real BC/DR plan.
For example: it’s typical for a 
vendor to be able to backup 
and replicate his or her virtual 
machines to another data 
center.
Many of these vendors are even 
willing to turn the servers back 
on in case something goes 
wrong.
However, unless all of the 
servers are all powered 
back up and in an exact 
order… 
Photo by Tim Cummins
It is still considered downtime. 
Photo by Jenn Vargas
Not only does the 
order in which 
servers are spun up 
important… 
Photo by GYLo
But making sure all 
the interconnected 
elements of your 
network (e.g. Active 
Directories, etc.) are 
also up and working 
is vital. 
Photo 
by 
CJ 
Isherwood
What you need to look for is not 
just the ability to bring up 
individual or multiple servers, but 
rather be able to virtualize your 
entire LAN.
The other aspect that is 
important to consider 
that may be forgotten 
around certain 
technology is that a 
proper Business 
Continuity program 
requires people and 
processes as well.
All these elements combined will 
form the basis for your company 
resiliency plan. 
Photo by Lauren Manning
So ask yourself, how 
resilient is your 
company? Do you 
have the right 
technology, the proper 
documentation, and 
executive 
sponsorship?
Watch the ESG video on hybrid 
cloud for data protection to learn 
more.
Find what your company’s resiliency 
score is with our 
“Disaster Recovery Maturity Framework” 
whitepaper.
The Axcient Solution 
Axcient’s Recovery-as-a-Service cloud 
eliminates data loss, keeps applications 
up and running, and makes sure that IT 
infrastructures never go down. Axcient 
replaces legacy backup, business 
continuity, disaster recovery and 
archiving products, with a single 
integrated platform that mirrors an 
entire business in the cloud, making it 
simple to restore data, failover 
applications, and virtualize servers or 
an entire office with a click. Thousands 
of businesses trust Axcient to keep their 
applications running and employees 
productive. 
Learn more at axcient.com. 
r

More Related Content

What's hot

Mastering disaster a data center checklist
Mastering disaster a data center checklistMastering disaster a data center checklist
Mastering disaster a data center checklist
Chris Wick
 
Mastering disaster e book Telehouse
Mastering disaster e book TelehouseMastering disaster e book Telehouse
Mastering disaster e book Telehouse
Telehouse
 
Business Continuity for Mission Critical Applications
Business Continuity for Mission Critical ApplicationsBusiness Continuity for Mission Critical Applications
Business Continuity for Mission Critical Applications
DataCore Software
 
Data Center Consolidation
Data Center ConsolidationData Center Consolidation
Data Center Consolidation
Barry Weber
 
Disaster recovery plan sample 2
Disaster recovery plan sample 2Disaster recovery plan sample 2
Disaster recovery plan sample 2
AbenetAsmellash
 
Small Business Backup & Disaster Recovery
Small Business Backup & Disaster RecoverySmall Business Backup & Disaster Recovery
Small Business Backup & Disaster Recovery
Exigent Technologies LLC
 
A guide to modern it disaster recovery
A guide to modern it disaster recoveryA guide to modern it disaster recovery
A guide to modern it disaster recoveryJohn Brouillard
 
Disaster Recovery & Business Continuity Overview
Disaster Recovery & Business Continuity Overview Disaster Recovery & Business Continuity Overview
Disaster Recovery & Business Continuity Overview
Aventis Systems, Inc.
 
Disaster recovery solution
Disaster recovery solutionDisaster recovery solution
Disaster recovery solution
Anton An
 
The buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionThe buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protection
Kingfin Enterprises Limited
 
10 Key Considerations for a Successful DCIM Project
10 Key Considerations for a Successful DCIM Project10 Key Considerations for a Successful DCIM Project
10 Key Considerations for a Successful DCIM Project
Sunbird DCIM
 
Business Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery
Business Continuity & Disaster Recovery
EC-Council
 
How to Manage Hybrid Data Center Environments
How to Manage Hybrid Data Center EnvironmentsHow to Manage Hybrid Data Center Environments
How to Manage Hybrid Data Center Environments
Sunbird DCIM
 
DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...
DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...
DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...
Sunbird DCIM
 
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data CenterIDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
Sunbird DCIM
 
Disaster Recovery Planning: Best Practices, Templates, and Tools
Disaster Recovery Planning: Best Practices, Templates, and ToolsDisaster Recovery Planning: Best Practices, Templates, and Tools
Disaster Recovery Planning: Best Practices, Templates, and ToolsZetta Inc
 
Disaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an EmergencyDisaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an Emergency
sco813f8ko
 
vRescue Presentation
vRescue PresentationvRescue Presentation
vRescue PresentationvRescue
 
7 Habits for High Effective Disaster Recovery Administrators
7 Habits for High Effective Disaster Recovery Administrators7 Habits for High Effective Disaster Recovery Administrators
7 Habits for High Effective Disaster Recovery Administrators
QuorumLabs
 

What's hot (19)

Mastering disaster a data center checklist
Mastering disaster a data center checklistMastering disaster a data center checklist
Mastering disaster a data center checklist
 
Mastering disaster e book Telehouse
Mastering disaster e book TelehouseMastering disaster e book Telehouse
Mastering disaster e book Telehouse
 
Business Continuity for Mission Critical Applications
Business Continuity for Mission Critical ApplicationsBusiness Continuity for Mission Critical Applications
Business Continuity for Mission Critical Applications
 
Data Center Consolidation
Data Center ConsolidationData Center Consolidation
Data Center Consolidation
 
Disaster recovery plan sample 2
Disaster recovery plan sample 2Disaster recovery plan sample 2
Disaster recovery plan sample 2
 
Small Business Backup & Disaster Recovery
Small Business Backup & Disaster RecoverySmall Business Backup & Disaster Recovery
Small Business Backup & Disaster Recovery
 
A guide to modern it disaster recovery
A guide to modern it disaster recoveryA guide to modern it disaster recovery
A guide to modern it disaster recovery
 
Disaster Recovery & Business Continuity Overview
Disaster Recovery & Business Continuity Overview Disaster Recovery & Business Continuity Overview
Disaster Recovery & Business Continuity Overview
 
Disaster recovery solution
Disaster recovery solutionDisaster recovery solution
Disaster recovery solution
 
The buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionThe buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protection
 
10 Key Considerations for a Successful DCIM Project
10 Key Considerations for a Successful DCIM Project10 Key Considerations for a Successful DCIM Project
10 Key Considerations for a Successful DCIM Project
 
Business Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery
Business Continuity & Disaster Recovery
 
How to Manage Hybrid Data Center Environments
How to Manage Hybrid Data Center EnvironmentsHow to Manage Hybrid Data Center Environments
How to Manage Hybrid Data Center Environments
 
DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...
DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...
DCIM Software Five Years Later: What I Wish I Had Known When I Started (Case ...
 
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data CenterIDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
 
Disaster Recovery Planning: Best Practices, Templates, and Tools
Disaster Recovery Planning: Best Practices, Templates, and ToolsDisaster Recovery Planning: Best Practices, Templates, and Tools
Disaster Recovery Planning: Best Practices, Templates, and Tools
 
Disaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an EmergencyDisaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an Emergency
 
vRescue Presentation
vRescue PresentationvRescue Presentation
vRescue Presentation
 
7 Habits for High Effective Disaster Recovery Administrators
7 Habits for High Effective Disaster Recovery Administrators7 Habits for High Effective Disaster Recovery Administrators
7 Habits for High Effective Disaster Recovery Administrators
 

Similar to Why Replication is Not Enough to Keep Your Business Running

Data center-terminology photostory-
Data center-terminology photostory-Data center-terminology photostory-
Data center-terminology photostory-
VenkatRamana242
 
Data center terminology photostory
Data center terminology photostoryData center terminology photostory
Data center terminology photostory
Willy Marroquin (WillyDevNET)
 
Five reasons why manufacturing businesses should adopt cloud computing-23-05-...
Five reasons why manufacturing businesses should adopt cloud computing-23-05-...Five reasons why manufacturing businesses should adopt cloud computing-23-05-...
Five reasons why manufacturing businesses should adopt cloud computing-23-05-...
Teleglobal International Pvt. Ltd.
 
Disaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the differenceDisaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the difference
jeetendra mandal
 
Map r whitepaper_zeta_architecture
Map r whitepaper_zeta_architectureMap r whitepaper_zeta_architecture
Map r whitepaper_zeta_architecture
Narender Kumar
 
Up in the Clouds
Up in the CloudsUp in the Clouds
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technology
rosswilks1
 
Disaster Recovery Deep Dive
Disaster Recovery Deep DiveDisaster Recovery Deep Dive
Disaster Recovery Deep DiveLiberteks
 
NEC Backup as a Service reduces administrative tasks, helping it departments...
 NEC Backup as a Service reduces administrative tasks, helping it departments... NEC Backup as a Service reduces administrative tasks, helping it departments...
NEC Backup as a Service reduces administrative tasks, helping it departments...
InteractiveNEC
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
tcarrucan
 
Disaster Recovery - Deep Dive
Disaster Recovery - Deep DiveDisaster Recovery - Deep Dive
Disaster Recovery - Deep Dive
Envision Technology Advisors
 
V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...VMware_EMEA
 
The cost of downtime
The cost of downtimeThe cost of downtime
The cost of downtime
BillyHosking
 
Disaster Recovery in Business Continuity Management
Disaster Recovery in Business Continuity ManagementDisaster Recovery in Business Continuity Management
Disaster Recovery in Business Continuity Management
ijtsrd
 
A Guide to Evaluating Your IT Network
A Guide to Evaluating Your IT Network A Guide to Evaluating Your IT Network
A Guide to Evaluating Your IT Network
JENLOR Integrations, Inc
 
Converged Infrastructure Approach Paves Way for Improved Data Center Producti...
Converged Infrastructure Approach Paves Way for Improved Data Center Producti...Converged Infrastructure Approach Paves Way for Improved Data Center Producti...
Converged Infrastructure Approach Paves Way for Improved Data Center Producti...
Dana Gardner
 
Gain the Cloud Advantage
Gain the Cloud AdvantageGain the Cloud Advantage
Gain the Cloud Advantage
BurCom Consulting Ltd.
 
eBook - Top Ten Reasons Cloud Computing is Inevitable in Dentistry
eBook - Top Ten Reasons Cloud Computing is Inevitable in DentistryeBook - Top Ten Reasons Cloud Computing is Inevitable in Dentistry
eBook - Top Ten Reasons Cloud Computing is Inevitable in Dentistry
NextGen Healthcare
 
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
IRJET Journal
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
Redington Value Distribution
 

Similar to Why Replication is Not Enough to Keep Your Business Running (20)

Data center-terminology photostory-
Data center-terminology photostory-Data center-terminology photostory-
Data center-terminology photostory-
 
Data center terminology photostory
Data center terminology photostoryData center terminology photostory
Data center terminology photostory
 
Five reasons why manufacturing businesses should adopt cloud computing-23-05-...
Five reasons why manufacturing businesses should adopt cloud computing-23-05-...Five reasons why manufacturing businesses should adopt cloud computing-23-05-...
Five reasons why manufacturing businesses should adopt cloud computing-23-05-...
 
Disaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the differenceDisaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the difference
 
Map r whitepaper_zeta_architecture
Map r whitepaper_zeta_architectureMap r whitepaper_zeta_architecture
Map r whitepaper_zeta_architecture
 
Up in the Clouds
Up in the CloudsUp in the Clouds
Up in the Clouds
 
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technology
 
Disaster Recovery Deep Dive
Disaster Recovery Deep DiveDisaster Recovery Deep Dive
Disaster Recovery Deep Dive
 
NEC Backup as a Service reduces administrative tasks, helping it departments...
 NEC Backup as a Service reduces administrative tasks, helping it departments... NEC Backup as a Service reduces administrative tasks, helping it departments...
NEC Backup as a Service reduces administrative tasks, helping it departments...
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Disaster Recovery - Deep Dive
Disaster Recovery - Deep DiveDisaster Recovery - Deep Dive
Disaster Recovery - Deep Dive
 
V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...
 
The cost of downtime
The cost of downtimeThe cost of downtime
The cost of downtime
 
Disaster Recovery in Business Continuity Management
Disaster Recovery in Business Continuity ManagementDisaster Recovery in Business Continuity Management
Disaster Recovery in Business Continuity Management
 
A Guide to Evaluating Your IT Network
A Guide to Evaluating Your IT Network A Guide to Evaluating Your IT Network
A Guide to Evaluating Your IT Network
 
Converged Infrastructure Approach Paves Way for Improved Data Center Producti...
Converged Infrastructure Approach Paves Way for Improved Data Center Producti...Converged Infrastructure Approach Paves Way for Improved Data Center Producti...
Converged Infrastructure Approach Paves Way for Improved Data Center Producti...
 
Gain the Cloud Advantage
Gain the Cloud AdvantageGain the Cloud Advantage
Gain the Cloud Advantage
 
eBook - Top Ten Reasons Cloud Computing is Inevitable in Dentistry
eBook - Top Ten Reasons Cloud Computing is Inevitable in DentistryeBook - Top Ten Reasons Cloud Computing is Inevitable in Dentistry
eBook - Top Ten Reasons Cloud Computing is Inevitable in Dentistry
 
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

Why Replication is Not Enough to Keep Your Business Running

  • 1. Why Replication Is Not Enough to Keep Your Business Running
  • 2. While you may be familiar with multiple replication products and vendors, don’t confuse the technology of data or server replication with Disaster Recovery.
  • 3. Replication is not a disaster recovery solution nor does it provide business continuity. So what exactly is replication?
  • 4. Replication is the process of copying data from one location to another over a SAN, LAN, or local WAN. Source: TechTarget
  • 5. This provides you with multiple up-to-date copies of your data.
  • 6. Look at replication as an aspect of disaster recovery and business continuity.
  • 7. Although it is a key technology in order to implement a complete DR/BC plan, it needs to be combined with data deduplication, virtual servers, or even the cloud.
  • 8. But let’s take a step back to really understand business continuity.
  • 9. According to ESG Sr. Analyst Jason Buffington, “business continuity is ensuring that your IT and business processes continue, involving availability technologies as well as mitigation methods, etc.”
  • 10. Ultimately, your entire IT infrastructure needs to be up and running in order to assure that your employees can continue working during any disaster or IT outage.
  • 11. While you need to protect your data, just as importantly, you need to protect and keep your applications up.
  • 12. Having survivable data does not equate to disaster recovery.
  • 13. “Business continuity and disaster recovery is more about people and processes than it is about the data,” according to Buffington.
  • 14. By combining appropriate planning, IT orchestration and instrumentation with a surviving copy of your data, you then have a real BC/DR plan.
  • 15. For example: it’s typical for a vendor to be able to backup and replicate his or her virtual machines to another data center.
  • 16. Many of these vendors are even willing to turn the servers back on in case something goes wrong.
  • 17. However, unless all of the servers are all powered back up and in an exact order… Photo by Tim Cummins
  • 18. It is still considered downtime. Photo by Jenn Vargas
  • 19. Not only does the order in which servers are spun up important… Photo by GYLo
  • 20. But making sure all the interconnected elements of your network (e.g. Active Directories, etc.) are also up and working is vital. Photo by CJ Isherwood
  • 21. What you need to look for is not just the ability to bring up individual or multiple servers, but rather be able to virtualize your entire LAN.
  • 22. The other aspect that is important to consider that may be forgotten around certain technology is that a proper Business Continuity program requires people and processes as well.
  • 23. All these elements combined will form the basis for your company resiliency plan. Photo by Lauren Manning
  • 24. So ask yourself, how resilient is your company? Do you have the right technology, the proper documentation, and executive sponsorship?
  • 25. Watch the ESG video on hybrid cloud for data protection to learn more.
  • 26. Find what your company’s resiliency score is with our “Disaster Recovery Maturity Framework” whitepaper.
  • 27. The Axcient Solution Axcient’s Recovery-as-a-Service cloud eliminates data loss, keeps applications up and running, and makes sure that IT infrastructures never go down. Axcient replaces legacy backup, business continuity, disaster recovery and archiving products, with a single integrated platform that mirrors an entire business in the cloud, making it simple to restore data, failover applications, and virtualize servers or an entire office with a click. Thousands of businesses trust Axcient to keep their applications running and employees productive. Learn more at axcient.com. r