Disaster Recovery Forecast: Cloudy with Scattered Virtual Machines
First there was the dedicated, physical server. Then came virtualisation to help organisations mix and match over different servers on their sites. After that came cloud computing with more virtualisation (and multi-tenancy thrown in). However, organisations typically still did their virtualisation between machines in close physical proximity, even if they were using cloud services. Now […]
Virtualisation Needs More Than Just a Physical Security Approach
As you bring virtualisation into your IT infrastructure, you may have noticed a few security-related aspects that weren’t present in a purely physical ‘one-app-one-server’ environment.
Living Dangerously with Virtual Machine Mismanagement
Virtualization is a business continuity answer to the vulnerabilities and foibles of physical servers. By spreading applications virtually and horizontally across vertical stacks of computing power, service can be ensured even if one stack goes down and the same application elsewhere picks up the slack. In principle, that’s fine – as long as IT administrators […]
Disaster Recovery, Horses for Courses and Other Metaphors
Just think how exciting the world of disaster recovery has become. What used to be exclusively tape storage has branched out into all kinds of disk storage, virtual snapshots, deduplication and cloud object storage. That’s great for DR managers, right? Not so fast. One of the central elements of disaster recovery is risk mitigation, which […]
A Quick Guide to IT Disaster Recovery Technology
Money alone can’t buy happiness, and technology by itself can’t buy disaster recovery – but they can both help significantly! IT disaster recovery management needs thought, planning and training of personnel; being aware of what technology has to offer is an important part of this. Check our handy list below to see if you’re making […]
Is Seven the Magic Number for IT Security?
The number seven crops up in many contexts: the Seven Wonders of the World, the seven dwarfs, and now the seven levels of cyber security. Let’s start with the different levels of threats posed by hackers. In order of increasing severity, we have: script kiddies (hacking for fun); the hacking group (often the first level […]