Browse Definitions :

SearchDisasterRecovery

SearchDisasterRecovery.com focuses exclusively on the issues, processes and products that address business continuity, and provides senior IT professionals, storage managers, network managers, and facilities managers a single point of contact for information regarding DR-related products, technologies and best practices. Whether you need to worry about DR planning holistically – or just your piece of the puzzle – this website is your guide.

View the complete archive of Disaster Recovery Management news, research and expert advice.

Go to:  SearchDisasterRecovery

Recently on  SearchDisasterRecovery

StorageCraft president talks of modernizing DR

StorageCraft President Douglas Brockett sees a future in which disaster recovery software is used to help customers flexibly migrate data to where it's most cost-efficient.

More Highlights
Definitions
  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity management (BCP/BCM) processes, metrics and compliance more efficient and accurate.

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk management.

Browse Disaster Recovery Topics

Cloud disaster recovery

As cloud-based disaster recovery expands and options grows, you can find the latest information on evaluating and implementing disaster recovery as a service (DRaaS) and other aspects of moving to a DR in the cloud strategy.

Recent Definitions

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide failover in the event of a man-made or natural catastrophe.

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a backup and restore strategy that involves storing and maintaining copies of electronic records in a cloud computing environment as a security measure.

Highlights

Back to Top

Facilities & Operations

A disaster recovery (DR) plan can only be as effective as the operations and facilities that serve the plan. This topic section provides up-to-date news and how-to information for ensuring that the operational processes and housing of a DR plan are effective in the event of a disaster. Check out this section to learn more about failover and failback protection, server virtualization, power as well as best practices for maintaining recovery site systems and data.

Recent Definitions

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes down.

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's business continuity/disaster recovery (BCDR) planning process.

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized workloads.

Highlights

Back to Top

Networking

Communication is obviously vital to your business, so networking is a critical element in disaster recovery planning. This topic section offers up-to-date news and how-to information about voice and data communications, WAN acceleration/optimization, network services and recovery site configuration.

Recent Definitions

  • VPN (virtual private network)

    A virtual private network (VPN) is a technology that creates a safe and encrypted connection over a less secure network, such as the internet.

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event.

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an event.

Highlights

Back to Top

Planning & Management

The planning phase is crucial to the success of any disaster recovery (DR) initiative. This topic section provides administrators with up-to-date news and how-to information about the personnel, staffing, training and documentation needs related to DR. In addition, this section discusses the best practices for mitigating risks, analyzing potential business impacts, personnel issues, documentation, change control and performing RTO and RPO assessments.

Recent Definitions

  • virtual machine replication

    Virtual machine replication is a process used by information technology (IT) professionals to create backup versions of virtual machines (VMs) The backup can be kept and used to restore the machine in the event that its data is corrupted or lost.

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency.

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity management (BCP/BCM) processes, metrics and compliance more efficient and accurate.

Highlights

Back to Top

Services & Outsourcing

Disaster recovery (DR) services can provide an organization with an effective option for addressing their DR needs. This topic section discusses the affordability and effectiveness of various services to help you decide which will best address the needs of your business. Check out this section for up-to-date news and how-to information surrounding electronic vaulting, hosting services, hot sites and mobile sites.

Recent Definitions

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking encrypted data.

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and cloud environments.

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide failover in the event of a man-made or natural catastrophe.

Highlights

Back to Top

Storage

Disaster recovery (DR) and data storage go hand-in-hand and a good DR plan must carefully consider how data is stored and protected. This topic section offers news and how-to information about data storage for disaster recovery. Learn about replication, DR testing tools, virtualization, tape backup, disk backup, global file systems, clustering and archiving.

Recent Definitions

  • magnetic tape storage

    Magnetic tape is one of the oldest technologies for electronic data storage.

  • data protection

    Data protection is the process of safeguarding important information from corruption, compromise or loss.

  • application-aware storage

    Application-aware storage is a storage system with built-in intelligence about relevant applications and their utilization patterns.

Highlights

Back to Top

Small business disaster recovery

Explore pertinent information for small businesses that want to create a successful disaster recovery plan, including tips on using disaster recovery services for small business and a disaster recovery plan template, as well as other testing, policy and tool advice.

Highlights

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • data breach

    A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or ...

  • zero-day (computer)

    A zero-day vulnerability, also known as a computer zero day, is a flaw in software, hardware or firmware that is unknown to the ...

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

  • dedicated cloud

    A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.

Close