Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Moving from Backup to Business Continuity

 

What kind of backup do you have today?  Do you have simple cloud backup, or do you have Business Continuity? What’s the difference and what are the benefits to you and your company?

 History of protecting your business from data loss

Back in the old days you did backups on your server to either a removable hard drive or to tape.  It was incumbent on a person in the office to rotate the drives or tapes on a daily or weekly basis.  The amount of protection from a site loss (fire, flood, etc.) was dependent on how recent your last drive swap was taken offsite.

Enter Cloud Backup…

The next evolution was backing up your data (files) offsite to a data center (aka The Cloud).  Here we could automate the backing up of your files so that, in the case of a disaster, your data was offsite and could be restored.  Just like all technologies, this started off expensive at $$ per GB, per month and over time became a few cents per GB, per month.

The only thing was, in the event of a data loss, you must have your files restored from the cloud, while also possibly rebuilding servers and infrastructure.  Data loss is minimal, but down-time to the office can be significant.

Evolving from Cloud Backup to Business Continuity

Continuity was developed to minimize downtime when disaster strikes.  When we talk about Continuity, we are talking about two pieces:  Local Continuity and Cloud Continuity. 

Local Continuity or local failover is where a server or virtual host (the box that hosts multiple virtual servers) has been replicated to another piece of hardware in the office.  In the event of a failure you immediately spin up a duplicate environment and keep working with little down time. 

Cloud Continuity or cloud failover is where you replicate your on-premise servers to servers in a remote data center (the cloud).  In the event of a failure, your complete environment is spun up and you can access it remotely. 

Together, both local and cloud continuity is a complete solution that gives you protection from data loss, server loss or site loss and gets you running quickly, minimizing downtime.  You can do either local or cloud or a hybrid of the two.  This technology has also become much less expensive than it was even two years ago.

 

 Solutions

We typically package this technology into three solutions, depending on our client’s budget.  While we prefer both local and cloud continuity, we know that not every company will be willing to spend on a spare server as insurance from failover.  In many cases, when you purchase a new server, we try to repurpose your old server as a local failover appliance.

  • Full Continuity – You have a local failover appliance and have cloud continuity. Recover from local failures in minutes.
  • Hybrid Continuity – You have cloud continuity and on-premise storage device that contains failover images of your servers. In the event of a local failure, we would come onsite with a suitable box and then bring up your environment in a few hours.
  • Cloud-only continuity – You do not have any on-premise backup and just have backup and failure to the cloud. Recover from failures in a couple of hours and response will be much slower than full continuity.


Summary

Look at how your office is backed up right now.  What would happen if your server failed?  What would happen if you had a fire, flood or were without power for any length of time?  How would your business be impacted?

As always, we’re here if you want to discuss,

Charlie Haber…

 

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 18 February 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Hackers Technology Privacy Email Malware Business Internet Hosted Solutions Business Computing Microsoft Computer Software Windows 10 Ransomware IT Services Backup Android Small Business Google Network Security Smartphone Windows User Tips Productivity Mobile Devices Hardware Gmail Data Browser Data Management Efficiency Phishing Business Continuity Internet of Things Facebook App Encryption Office 365 Upgrade Smartphones Saving Money Managed IT Services Remote Monitoring Innovation Microsoft Office Big Data Office Tips Cloud Computing IT Support Word Artificial Intelligence Data Recovery Managed Service Provider Outsourced IT Workplace Tips Tip of the week Risk Management Business Management WiFi IT Support Productivity Spam Miscellaneous Chrome Data storage Social Media Antivirus Cybersecurity Money Firewall Government Customer Service Disaster Recovery Two-factor Authentication Server Apple Settings Windows 10 Content Filtering Employer-Employee Relationship Robot Augmented Reality Printing Data Security Safety Computing Virtual Private Network Google Drive The Internet of Things End of Support Managed IT Services IT Management LiFi Telephone Systems Save Money Virtual Reality Maintenance IBM Analytics Wireless SaaS Apps Bandwidth Data Backup Outlook Customer Relationship Management Hacking Wi-Fi Search Unified Threat Management Monitors Passwords Presentation Administration Business Technology HIPAA Hacker Automation Avoiding Downtime VoIP Office Infrastructure Password Mouse Wireless Technology Communication Recovery Mobile Device Mobile Security Network Hosted Solution Scam Tablet YouTube Vulnerability communications Holiday FCC VPN Computing Infrastructure Hard Disk Drive Firefox Operating System Unified Communications Experience Running Cable Comparison Servers Politics BDR Cryptocurrency Fun Undo Virtual Desktop Title II Alerts Collaboration Techology Application Laptop Specifications Gadgets Document Management Server Management Tech Support Google Maps Bitcoin How To Information Technology Virtualization Online Mail Merge Licensing File Sharing Google Docs Samsung Network Congestion Unified Threat Management Halloween Black Friday Users Statistics Websites Windows 8 Google Wallet Microsoft Excel Address Cooperation Quick Tips Computers User Error Scary Stories Cyber Monday Bluetooth Drones Blockchain Staff Corporate Profile VoIP Display User Printer Sports Smart Technology Social Competition Education Permissions Wearable Technology WannaCry Access Control Time Management Humor Deep Learning Distributed Denial of Service Digital Payment Cabling 5G Hacks Data loss Budget SharePoint Network Management sip BYOD Bring Your Own Device Buisness Managed IT Service Marketing Managed IT Fraud Digital IT solutions Lenovo Applications Downloads Computer Care Touchscreen telephony IP Address Best Practice Vendor Management Break Fix Shortcut Disaster Spyware Website Cortana Superfish IT Technicians Multi-Factor Security Training Storage Mobile Office Business Growth Writing Current Events Hard Drives Downtime Dark Web Patch Management Hotspot Automobile Uninterrupted Power Supply Paperless Office Legal Cybercrime Google Calendar Dark Data Mobile Device Management Alt Codes Retail Going Green Refrigeration Net Neutrality Language Solid State Drive How To Public Speaking Knowledge Networking Legislation Heating/Cooling IT service Lithium-ion battery Typing Social Engineering Computer Repair Cameras Processors Tracking Health CCTV Alert Electronic Medical Records Identity Theft Travel G Suite Notifications Supercomputer Botnet Upgrades Motion Sickness Taxes Crowdsourcing IT Budget Machine Learning 3D Printing Update Emergency IT Consultant Relocation Unsupported Software Chromebook Meetings Cleaning Private Cloud Mobile Data Webcam Emoji Work/Life Balance Mobile Computing Error Point of Sale Black Market Law Enforcement Physical Security CrashOverride Twitter Domains Mirgation Staffing Gadget Personal Information Administrator Web Server Remote Computing GPS