Browse Definitions :

SearchDisasterRecovery

SearchDisasterRecovery.com focuses exclusively on the issues, processes and products that address business continuity, and provides senior IT professionals, storage managers, network managers, and facilities managers a single point of contact for information regarding DR-related products, technologies and best practices. Whether you need to worry about DR planning holistically – or just your piece of the puzzle – this website is your guide.

View the complete archive of Disaster Recovery Management news, research and expert advice.

Go to:  SearchDisasterRecovery

Recently on  SearchDisasterRecovery

Guide to business continuity planning during coronavirus

This guide offers information on the effect of the coronavirus on enterprises and the need for pandemic and business continuity planning to keep businesses safe and in operation.

More Highlights
Definitions
  • pandemic plan

    A pandemic plan is a documented strategy for business continuity in the event of a widespread outbreak of a dangerous infectious disease.

  • What is BCDR? Business continuity and disaster recovery guide

    Business continuity (BC) and disaster recovery (DR) are closely related practices that support an organization's ability to remain operational after an adverse event.

  • business continuity plan audit

    A business continuity plan audit is a formalized method for evaluating how business continuity processes are being managed.

Browse Disaster Recovery Topics

Cloud disaster recovery

As cloud-based disaster recovery expands and options grows, you can find the latest information on evaluating and implementing disaster recovery as a service (DRaaS) and other aspects of moving to a DR in the cloud strategy.

Recent Definitions

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide failover in the event of a man-made or natural catastrophe.

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a backup and restore strategy that involves storing and maintaining copies of electronic records in a cloud computing environment as a security measure.

Highlights

Back to Top

Facilities & Operations

A disaster recovery (DR) plan can only be as effective as the operations and facilities that serve the plan. This topic section provides up-to-date news and how-to information for ensuring that the operational processes and housing of a DR plan are effective in the event of a disaster. Check out this section to learn more about failover and failback protection, server virtualization, power as well as best practices for maintaining recovery site systems and data.

Recent Definitions

  • disaster recovery (DR)

    Disaster recovery (DR) is an area of security planning that aims to protect an organization from the effects of significant negative events.

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an organization’s procedures for business continuity (BC) and recovery.

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes down.

Highlights

Back to Top

Networking

Communication is obviously vital to your business, so networking is a critical element in disaster recovery planning. This topic section offers up-to-date news and how-to information about voice and data communications, WAN acceleration/optimization, network services and recovery site configuration.

Recent Definitions

  • disaster recovery (DR)

    Disaster recovery (DR) is an area of security planning that aims to protect an organization from the effects of significant negative events.

  • VPN (virtual private network)

    A virtual private network (VPN) is programming that creates a safe, encrypted connection over a less secure network, such as the public internet. A VPN uses tunneling protocols to encrypt data at the sending end and decrypt it at the receiving end.

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event.

Highlights

Back to Top

Planning & Management

The planning phase is crucial to the success of any disaster recovery (DR) initiative. This topic section provides administrators with up-to-date news and how-to information about the personnel, staffing, training and documentation needs related to DR. In addition, this section discusses the best practices for mitigating risks, analyzing potential business impacts, personnel issues, documentation, change control and performing RTO and RPO assessments.

Recent Definitions

  • pandemic plan

    A pandemic plan is a documented strategy for business continuity in the event of a widespread outbreak of a dangerous infectious disease.

  • What is BCDR? Business continuity and disaster recovery guide

    Business continuity (BC) and disaster recovery (DR) are closely related practices that support an organization's ability to remain operational after an adverse event.

  • business continuity plan audit

    A business continuity plan audit is a formalized method for evaluating how business continuity processes are being managed.

Highlights

Back to Top

Services & Outsourcing

Disaster recovery (DR) services can provide an organization with an effective option for addressing their DR needs. This topic section discusses the affordability and effectiveness of various services to help you decide which will best address the needs of your business. Check out this section for up-to-date news and how-to information surrounding electronic vaulting, hosting services, hot sites and mobile sites.

Recent Definitions

  • disaster recovery (DR)

    Disaster recovery (DR) is an area of security planning that aims to protect an organization from the effects of significant negative events.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking encrypted data.

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and cloud environments.

Highlights

Back to Top

Storage

Disaster recovery (DR) and data storage go hand-in-hand and a good DR plan must carefully consider how data is stored and protected. This topic section offers news and how-to information about data storage for disaster recovery. Learn about replication, DR testing tools, virtualization, tape backup, disk backup, global file systems, clustering and archiving.

Recent Definitions

  • disaster recovery (DR)

    Disaster recovery (DR) is an area of security planning that aims to protect an organization from the effects of significant negative events.

  • data protection

    Data protection is the process of safeguarding important information from corruption, compromise or loss.

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event.

Highlights

Back to Top

Small business disaster recovery

Explore pertinent information for small businesses that want to create a successful disaster recovery plan, including tips on using disaster recovery services for small business and a disaster recovery plan template, as well as other testing, policy and tool advice.

Highlights

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close