Business continuity and the cloud

1 April 2017 Editor's Choice, Infrastructure, Security Services & Risk Management

Business continuity is imperative for the success of any organisation, especially in a market where customers demand constant availability and where certain IT applications and systems can be as critical as life and death. Downtime is simply unacceptable. Without the correct systems and processes in place, oversights can still occur, therefore the organisation is at risk.

Johan Scheepers.
Johan Scheepers.

While businesses have been backing up data and mirroring systems for years to prevent data loss and system failure, the traditional means of retrieving data and recovering systems from another location is typically a lengthy process, resulting in hours, if not days, of downtime. Ensuring an organisation remains constantly available regardless of what happens to infrastructure is a challenge that is leading many organisations to consider more modern backup solutions, such as the cloud.

CIOs’ and IT executives’ concerns are constantly colliding with misconceptions and outdated information. They embrace the idea of the cloud, yet are still wary of it. There is a common belief that if data is not hosted within the organisation, then it exists beyond the control of the business and is, thus, a security risk. CIOs know that they need better disaster recovery and they understand the importance of data, however, enough of the IT budget still may not be allocated to spend on technology to support both.

Yet cloud investment is gradually increasing year-on-year as CIOs slowly begin to realise the value that the cloud brings to their data recovery and business continuity plan, whether as a standalone technology, or as part of a hybrid solution.

Flexible, available backup

When looking at disaster recovery and business continuity in the context of the cloud, it’s about more than having protection in place in case of large scale disasters. The cloud gives organisations the option of having parts of their business exist in various locations, however, all are accessible immediately should they be targeted by the likes of ransomware or suffer a system failure.

The elasticity of the resources available in the cloud means that not everything has to be stored there, sitting cold and unused in case of a disaster and costing a fortune in the process. Cloud gives the advantage of allowing organisations to use it on demand, leveraging only what they need at any given time. They have the flexibility to store and access as much data and resources as they require, at any time, without significant investment in infrastructure, or worrying about purchasing more hardware to cater for growth. They also have the agility to adjust what is important as their priorities change.

A fully automated cloud backup and recovery solution reduces the need for manual input and ensures that a business’s data is always there when needed. The nature of having multiple locations available means that an organisation can recover only what they need, when they need it. An organisation may not need yesterday’s data, however it may need to access a previous iteration. The cloud enables this to happen instantly.

As part of a hybrid solution, the cloud also allows organisations to easily and seamlessly move data between their on-premise systems and the cloud as if both are part of the same environment. This gives businesses a single view of their data and systems – vital for proper data management and analysis.

Making cloud backup work for you

One of the main deterrents to adopting the cloud is that it can be a complex endeavour to undertake, particularly when there is more than one environment to consider. The various systems and applications, whether on premise or in the cloud, all look different, behave differently and offer different services. Managing and aligning them can be very tricky. Organisations need to look for ways to simplify their approach to minimise this complexity.

The most common problem with moving to the cloud is that businesses tend to architect their cloud apps based on assumptions made around their current infrastructure. Most enterprises contain a variety of systems gathered over several years. It is important that organisations understand the characteristics and restrictions of existing systems in order to ensure they will function as they are expected to in the cloud. Certain legacy systems, for example, may be too old for cloud compatibility and need to be adapted for the cloud.

CIOs and IT management should conduct comprehensive portfolio assessments prior to moving to the cloud, ensuring that priority is given to those applications and systems deemed most critical. Critical systems need to always be available and, therefore, need automatic failover. If this is not happening, the business can ensure that it is rewritten to enable automation, or that there is a plan in place for them so that the risk of downtime is reduced.

Perhaps most important of all is that an organisation has a suitable disaster recovery and business continuity strategy in place. Despite service level agreements (SLAs), cloud providers are not responsible for their customers’ data or failover methods. Businesses are responsible for their own data and failover, and need to have the right processes and mechanisms in place to ensure that they do not lose data or suffer downtime.

Having a plan in place to ensure that there is full and proper automation wherever its needed, that that failover is seamless, that management of all data and systems is unified across all platforms, with a single view, and that the relevant systems are current and exactly mirrored, is vital. Without this, errors can still occur and there is still the potential for risk.

For more information contact Commvault, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...