Browse Definitions :

SearchDisasterRecovery

SearchDisasterRecovery.com focuses exclusively on the issues, processes and products that address business continuity, and provides senior IT professionals, storage managers, network managers, and facilities managers a single point of contact for information regarding DR-related products, technologies and best practices. Whether you need to worry about DR planning holistically – or just your piece of the puzzle – this website is your guide.

View the complete archive of Disaster Recovery Management news, research and expert advice.

Go to:  SearchDisasterRecovery

Recently on  SearchDisasterRecovery

Google Cloud disaster recovery helped save data after Maria

In an area vulnerable to hurricanes, restaurant chain Grupo Colón Gerena turned to Scale Computing's HC3 Cloud Unity and Google Cloud DR to stay ahead of the storms.

More Highlights
Definitions
  • network disaster recovery plan

    A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of network services during a natural or manmade catastrophe.

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized workloads.

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a simulated disaster scenario.

Browse Disaster Recovery Topics

Cloud disaster recovery

As cloud-based disaster recovery expands and options grows, you can find the latest information on evaluating and implementing disaster recovery as a service (DRaaS) and other aspects of moving to a DR in the cloud strategy.

Recent Definitions

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide failover in the event of a man-made or natural catastrophe.

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a backup and restore strategy that involves storing and maintaining copies of electronic records in a cloud computing environment as a security measure.

  • cloud outage

    A cloud outage is a period of time during which cloud services are unavailable.  

Highlights

Back to Top

Facilities & Operations

A disaster recovery (DR) plan can only be as effective as the operations and facilities that serve the plan. This topic section provides up-to-date news and how-to information for ensuring that the operational processes and housing of a DR plan are effective in the event of a disaster. Check out this section to learn more about failover and failback protection, server virtualization, power as well as best practices for maintaining recovery site systems and data.

Recent Definitions

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized workloads.

  • natural disaster recovery

    Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.

  • Skype for Business

    Skype for Business, formerly known as Microsoft Lync Server, is a unified communications (UC) platform that integrates common channels of business communication and online meetings, including instant messaging (IM), presence, voice over IP (VoIP), video conferencing, file transfer, web conferencing, voicemail and email.

Highlights

Back to Top

Networking

Communication is obviously vital to your business, so networking is a critical element in disaster recovery planning. This topic section offers up-to-date news and how-to information about voice and data communications, WAN acceleration/optimization, network services and recovery site configuration.

Recent Definitions

  • VPN (virtual private network)

    A virtual private network (VPN) is a technology that creates a safe and encrypted connection over a less secure network, such as the internet.

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event.

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an event.

Highlights

Back to Top

Planning & Management

The planning phase is crucial to the success of any disaster recovery (DR) initiative. This topic section provides administrators with up-to-date news and how-to information about the personnel, staffing, training and documentation needs related to DR. In addition, this section discusses the best practices for mitigating risks, analyzing potential business impacts, personnel issues, documentation, change control and performing RTO and RPO assessments.

Recent Definitions

  • network disaster recovery plan

    A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of network services during a natural or manmade catastrophe.

  • ISO 22330

    ISO 22330 is a set of standard guidelines for managing the personal side of business continuity/disaster recovery (BC/DR) in response to events that could be detrimental to employee safety and productivity.

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a simulated disaster scenario.

Highlights

Back to Top

Services & Outsourcing

Disaster recovery (DR) services can provide an organization with an effective option for addressing their DR needs. This topic section discusses the affordability and effectiveness of various services to help you decide which will best address the needs of your business. Check out this section for up-to-date news and how-to information surrounding electronic vaulting, hosting services, hot sites and mobile sites.

Recent Definitions

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking encrypted data.

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and cloud environments.

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide failover in the event of a man-made or natural catastrophe.

Highlights

Back to Top

Storage

Disaster recovery (DR) and data storage go hand-in-hand and a good DR plan must carefully consider how data is stored and protected. This topic section offers news and how-to information about data storage for disaster recovery. Learn about replication, DR testing tools, virtualization, tape backup, disk backup, global file systems, clustering and archiving.

Recent Definitions

  • magnetic tape storage

    Magnetic tape is one of the oldest technologies for electronic data storage.

  • data protection

    Data protection is the process of safeguarding important information from corruption, compromise or loss.

  • application-aware storage

    Application-aware storage is a storage system with built-in intelligence about relevant applications and their utilization patterns.

Highlights

Back to Top

Small business disaster recovery

Explore pertinent information for small businesses that want to create a successful disaster recovery plan, including tips on using disaster recovery services for small business and a disaster recovery plan template, as well as other testing, policy and tool advice.

Highlights

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close