Select Page

Disaster Recovery as a Service (DRaaS) at a Glance

You have production datacenters, you have a number of servers that are direct or network attached as primary storage.  You need to have disaster recovery plan. You would do this through Backup and replication.  physical and virtual servers or Apps. On-perm or cloud ? or both ?  Restore or compete automated Failover and failback ?

These are some questions you need to answer . ..

Disaster Recovery as a Service (DRaaS) at a Glance
It’s an automatic failover. You can backup to your primary storage or backup to managed backup appliance. The provider backs up the physical and virtual machine images and its data to the cloud, and it boots up from restored VMs. The managed backup appliances is talking to the cloud provider, and that’s another way to look at that from a production datacenter point of view.

Multiple Replication options exist for DRaaS

Multiple replications often exists for DR as a service and this is something you have to take into consideration. SAN-to-SAN replication actually require matching hardware. Host replication, and they would be agent based as well as the hypervisor replication and those are actually replicating constantly to other hosts.

Disaster Recovery as a Service (DRaaS) at a Glance
When you’re talking about actual replication from a software perspective, software versus hardware replication; in software replication you don’t have to actually go from one datacenter where your hardware is one standard. You may be all dell but you are going over to another datacenter and that datacenter doesn’t have to have dell. The software is obscuring that layer from the DR software. You don’t have to create a second datacenter that happens to be in a cloud managed by somebody else.

There’s lots of different flavors to the stuff, different ways to look at it quite frankly depending on how often you need to update, how often you want asynchronous or synchronous, how much out of sync you are allowed to be. It kind of determines how much money you want to spend will determine which of these you are actually going to go after.

Want new articles before they get published?
Subscribe to our Awesome Newsletter.

Conti Ransomware: In-Depth Technical Breakdown

Conti Ransomware: In-Depth Technical Breakdown

Conti ransomware has earned notoriety, notably for its involvement in the Costa Rican government hack. Operating as a ransomware-as-a-service (RaaS) group, Conti specializes in infiltrating networks, encrypting crucial data, and extorting exorbitant sums of money. In...

Supply Chain Attack: The Achilles’ Heel of Enterprise Security

Supply Chain Attack: The Achilles’ Heel of Enterprise Security

Supply chain attacks have emerged as a formidable threat vector in the landscape of cybercrime, posing significant risks to enterprises of all sizes and industries. Among the various tactics employed by threat actors, ransomware attacks leveraging supply chain...

How to Set Up S3 Object Storage for Veeam Data Platform

How to Set Up S3 Object Storage for Veeam Data Platform

Veeam v12 introduced Direct-to-Object storage, enabling S3 object storage as the primary backup repository. Prior to this, S3 object storage integration relied on Veeam's Scale-Out Backup Repository (SOBR), using a performance tier and a capacity tier, which extended...

Watering Hole Attacks Unveiled: A Comprehensive Cyberthreat Overview

Watering Hole Attacks Unveiled: A Comprehensive Cyberthreat Overview

Watering hole attacks, akin to their namesake in the natural world where predators strategically position themselves near watering holes to intercept prey, have become a significant peril in the digital realm. In the vast landscape of cybersecurity, understanding the...

Man-in-the-Middle Attack: Cyberthreat Amidst Data Streams

Man-in-the-Middle Attack: Cyberthreat Amidst Data Streams

In the fast-paced arena of enterprise-level digital operations, the looming threat of cyber vulnerabilities demands our undivided attention. Among these threats, the Man-in-the-Middle (MitM) attack emerges as a silent, yet formidable, adversary capable of infiltrating...

You May Also Like

Subscribe To Our Newsletter

Join our mailing list to receive the latest news, updates, and promotions from StoneFly.

Please Confirm your subscription from the email