Redstor backs up TCTA

October 2017 Editor's Choice, Infrastructure, Products & Solutions

The Trans-Caledon Tunnel Authority (TCTA) has been able to streamline and enhance its backup process through the implementation of the Redstor Enterprise Server solution. It provides the government body with the means to quickly and securely backup its mission-critical data.

The state-owned Trans-Caledon Tunnel Authority (TCTA) is a specialised liability management body. Its mission is to finance and implement bulk raw water infrastructure cost-effectively and within an acceptable risk framework to benefit consumers. Originally established as a special purpose vehicle to fulfil South Africa’s obligations in respect of the Lesotho Highlands Water Project, the TCTA is in line with government policy and practice to seek off–balance sheet funding options for infrastructure projects. These must recover their costs through end-user tariffs.

The TCTA was using a tape-based backup system to ensure business continuity would be taken care of in the event of a crisis. However, Nikesh Maharaj, network and infrastructure specialist at the TCTA says this was not an ideal solution.

“Performing tape backups was a tedious process that had to be done overnight. Not only was it incredibly time-consuming, the backups did not always complete, resulting in wasted resources and a risk to the business.

“We were introduced to Redstor (previously Attix5) through our service provider, Internet Solutions (IS). At the time, this enabled us to migrate from a tape-based system to disk backups that were much more user-friendly to perform as well as significantly faster,” he says.

Subsequently, the TCTA has implemented Redstor Server Edition (SE) and, more recently, migrated to Enterprise Server Edition (ESE) to further enhance its backup and business continuity approach.

“Using Redstor has cut down our backup time considerably. Previously, our file server used to take between 12 and 16 hours to perform a complete backup. With ESE, this has been reduced to 43 minutes,” says Maharaj.

He goes on to say that beyond the peace of mind that having Redstor provides, the TCTA has also benefited from improved productivity. “As soon as a backup is completed, the system generates an e-mail which is sent to the appropriate personnel. And because all of this is done before 21:00, there is time to respond or address any issues should we run into a problem without impacting our daily operations.”

Maharaj says Redstor enables the TCTA to easily perform weekly tests on its backups to ensure business optimisation is taken care of and that its disaster recovery strategy can more accurately reflect real-time events. In the past, this was all done retroactively limiting the efficiency of its business operations.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Eight MP dome for harsh environments
Axis Communications SA Surveillance Products & Solutions
Axis Communications announced a marine-grade stainless steel camera that offers performance in harsh environments. Enclosed in an electropolished stainless steel casing, it can withstand the corrosive effects of seawater and cleaning chemicals.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...