Browse Definitions :

Disaster recovery

This WhatIs.com glossary contains terms related to disaster recovery and business continuity.

ASY - WIN

  • asynchronous replication - Asynchronous replication is an approach to data backup in which data is written to primary storage and then replicated to a replication target.
  • backup and recovery testing - A backup and recovery test is the process of assessing the effectiveness of an organization’s software and methods of replicating data for security and its ability to reliably retrieve that data should the need arise.
  • bare metal restore - In disaster recovery, a bare metal restore is the process of reformatting a computer from scratch after a catastrophic failure.
  • bubble network - A bubble network is a series of interconnected virtual machines (VMs) that communicate through a virtual network switch (vSwitch) and remain isolated from the physical network.
  • business continuity and disaster recovery (BCDR) - Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for unforeseen risks to continued operations.
  • business continuity management (BCM) - Business continuity management (BCM) is a framework for identifying an organization's risk of exposure to internal and external threats.
  • business impact analysis (BIA) - Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency.
  • call tree - A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an event.
  • cloud disaster recovery (cloud DR) - Cloud disaster recovery (cloud DR) is a backup and restore strategy that involves storing and maintaining copies of electronic records in a cloud computing environment as a security measure.
  • cloud file sharing - Cloud file sharing is a method of allowing multiple users to access data within a public cloud, private cloud or hybrid cloud.
  • cloud hosting - Cloud hosting is the process of outsourcing an organization's computing and storage resources to a service provider that offers its infrastructure services in a utility model.
  • confidentiality, integrity, and availability (CIA triad) - Confidentiality, integrity, and availability, known as the CIA triad, is a model designed to guide information security practices and policies within an organization.
  • contingency plan - In business continuity and risk management, a contingency plan is a process that prepares an organization to respond coherently to an unplanned event.
  • crisis management plan (CMP) - A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical situation that would negatively affect its profitability, reputation or ability to operate.
  • data protection - Data protection is the process of safeguarding important information from corruption, compromise or loss.
  • data recovery - Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible.
  • data recovery agent (DRA) - A data recovery agent (DRA) is a Microsoft Windows user who has been granted the right to decrypt data that was encrypted by other users.
  • data replication - Data replication copies data from one location to another using a SAN, LAN or local WAN.
  • disaster recovery (DR) - Disaster recovery strategies are critical, as many businesses fail following an unforeseen event.
  • disaster recovery (DR) test - A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's business continuity/disaster recovery (BCDR) planning process.
  • Disaster Recovery as a Service (DRaaS) - Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide failover in the event of a man-made or natural catastrophe.
  • disaster recovery plan (DRP) - A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation work and testing.
  • disaster recovery site (DR site) - An organization uses a disaster recovery (DR) site to recover and restore its technology infrastructure and operations when its primary facility becomes unavailable.
  • disaster recovery team - A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an organization’s procedures for business continuity (BC) and recovery.
  • fast retransmit and recovery (FRR) - In TCP/IP, fast retransmit and recovery (FRR) is a congestion control algorithm that makes it possible to quickly recover lost data packets.
  • Full Backup - A full backup is the process of making at least one additional copy of all data files that an organization wishes to protect in a single backup operation.
  • HIPAA disaster recovery plan - A HIPAA disaster recovery plan is a document that specifies the resources, actions, personnel and data that are required to protect and reinstate healthcare information in the event of a fire, vandalism, natural disaster or system failure.
  • hot site and cold site - A hot site is a commercial disaster recovery service that allows a business to continue computer and network operations in the event of a computer or equipment disaster.
  • hot spare - A hot spare, also called a hot standby, is a backup component that can be placed into service immediately when a primary component fails.
  • incident response - Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident.
  • incident response plan (IRP) - An incident response plan (IRP) is a set of written instructions for adequately detecting, responding to and limiting the effects of an information security incident, an event that may or may not be an attack or threat to computer system or corporate data security.
  • instant recovery (recovery-in-place) - Instant recovery involves running a VM instance directly from the secondary storage location without having to first perform a restore of the primary VM.
  • ISO 22330 - ISO 22330 is a set of standard guidelines for managing the personal side of business continuity/disaster recovery (BC/DR) in response to events that could be detrimental to employee safety and productivity.
  • latent data (ambient data) - Latent data, also known as ambient data, is the information in computer storage that is not referenced in file allocation tables and is generally not viewable through the operating system (OS) or standard applications.
  • maximum tolerable period of disruption (MTPOD) - Maximum tolerable period of disruption (MTPOD) is the time following a disaster after which an organization’s viability will be irreversibly impacted if production isn't resumed.
  • Microsoft Azure Site Recovery - Microsoft Azure Site Recovery is a new service in Microsoft Azure primarily used for disaster recovery purposes.
  • near-continuous data protection (near CDP) - Near-continuous data protection, sometimes called near-continuous protection, is a general term for backup and recovery products that take snapshots at set intervals.
  • NERC CIP (critical infrastructure protection) - The NERC CIP (critical infrastructure protection) plan is a set of requirements designed to secure assets vital to reliably operating North America's bulk electric system.
  • network disaster recovery plan - A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of network services during a natural or manmade catastrophe.
  • pandemic plan - A pandemic plan is a documented strategy for business continuity in the event of a widespread outbreak of a dangerous infectious disease.
  • pandemic planning - Pandemic planning is a strategic approach to business continuity that anticipates and prepares for a widespread, dangerous outbreak of an infectious disease that poses life-threatening risks to employees and their families in different geographical areas at the same time.
  • preventive maintenance - Preventive maintenance is the practice of routinely taking measures in hardware administration that reduces the risk of failures and improves the likelihood of quick recovery in the event that a failure does occur.
  • recovery - In data management, recovery is a process that involves copying backup files from secondary storage (tape, Zip disk or other backup media) to hard disk.
  • recovery point objective (RPO) - The recovery point objective (RPO) is the age of files that must be recovered from backup storage for normal operations to resume if a computer, system, or network goes down as a result of a hardware, program, or communications failure.
  • recovery time objective (RTO) - The recovery time objective (RTO) is the maximum tolerable length of time that a computer, system, network, or application can be down after a failure or disaster occurs.
  • remote replication - Remote replication is the process of copying production data to a device at a remote location for data protection or disaster recovery purposes.
  • ROBO backup (remote data backup) - ROBO backup is the process of copying and archiving data created by remote and branch offices (ROBOs) and storing it securely.
  • RTA (recovery time actual) - RTA (recovery time actual) is the amount of real-world time it takes for an organization to recover its systems and business processes following an unplanned disruption; that amount of time can differ significantly from the recovery time objective (RTO), although ideally it should be the same or better.
  • Security Operations Center (SOC) - A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information security that is responsible for monitoring, analyzing and protecting an organization from cyber attacks.
  • storage replication service - A storage replication service is a managed service in which stored or archived data is duplicated in real time over a storage area network (SAN).
  • synchronous replication - Synchronous replication copies data over a SAN, LAN or WAN so multiple copies are available.
  • Veritas NetBackup (Symantec NetBackup) - Veritas NetBackup -- known as Symantec NetBackup from 2005 to 2016 -- is a backup and recovery software suite designed for enterprise users.
  • virtual machine replication - Virtual machine replication is a process used by information technology (IT) professionals to create backup versions of virtual machines (VMs) The backup can be kept and used to restore the machine in the event that its data is corrupted or lost.
  • VUCA (volatility, uncertainty, complexity and ambiguity) - VUCA is an acronym that stands for volatility, uncertainty, complexity and ambiguity, a combination of qualities that, taken together, characterize the nature of some difficult conditions and situations.
  • warm site - A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes down.
  • Windows Server Backup - Windows Server Backup is a feature that offers backup and recovery options for Windows Server environments.

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close