Browse Definitions :
Definition

RTA (recovery time actual)

Contributor(s): Michael Herrera, Meredith Courtemanche

RTA (recovery time actual) is the amount of real-world time it takes for an organization to recover its systems and business processes following an unplanned disruption; that amount of time can differ significantly from the recovery time objective (RTO), although ideally it should be the same or better.

RTA is an important metric in disaster recovery testing, used to assess the success or failure of an organization's disaster recovery plan (DRP).

The RTO is the maximum tolerable length of time that a given system or business process can be down after a failure or disruption occurs. An RTO is measured in seconds, minutes, hours or days and is an important consideration in disaster recovery planning. Businesses can refer to the RTO for guidance, for example, on whether or not to implement emergency measures or particular recovery strategies.

Recovery point objective (RPO), is the maximum tolerable data loss acceptable for a system and can be measured in seconds, minutes, hours or days. Following a disruption, systems and their data must be restored to the predefined RPO to minimize loss of data and information.

RTA also stands for real-time application, which refers to a program that functions within a time frame that the user senses as immediate or current. The latency for an RTA must be less than a defined value, usually measured in seconds.

 

This was last updated in November 2015

Continue Reading About RTA (recovery time actual)

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

What is referred to in this article as RTO is by certifiable ISO standards and guidelines still called MAO or MTPD. Organizations rely on ISO and in this context it is my opinion that the article is slightly incorrect.
Cancel

-ADS BY GOOGLE

Extensions de fichiers et formats de fichiers

Motorisé par:

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close