Select Page

Disaster Recovery as a Service (DRaaS) at a Glance

You have production datacenters, you have a number of servers that are direct or network attached as primary storage.  You need to have disaster recovery plan. You would do this through Backup and replication.  physical and virtual servers or Apps. On-perm or cloud ? or both ?  Restore or compete automated Failover and failback ?

These are some questions you need to answer . ..

Disaster Recovery as a Service (DRaaS) at a Glance
It’s an automatic failover. You can backup to your primary storage or backup to managed backup appliance. The provider backs up the physical and virtual machine images and its data to the cloud, and it boots up from restored VMs. The managed backup appliances is talking to the cloud provider, and that’s another way to look at that from a production datacenter point of view.

Multiple Replication options exist for DRaaS

Multiple replications often exists for DR as a service and this is something you have to take into consideration. SAN-to-SAN replication actually require matching hardware. Host replication, and they would be agent based as well as the hypervisor replication and those are actually replicating constantly to other hosts.

Disaster Recovery as a Service (DRaaS) at a Glance
When you’re talking about actual replication from a software perspective, software versus hardware replication; in software replication you don’t have to actually go from one datacenter where your hardware is one standard. You may be all dell but you are going over to another datacenter and that datacenter doesn’t have to have dell. The software is obscuring that layer from the DR software. You don’t have to create a second datacenter that happens to be in a cloud managed by somebody else.

There’s lots of different flavors to the stuff, different ways to look at it quite frankly depending on how often you need to update, how often you want asynchronous or synchronous, how much out of sync you are allowed to be. It kind of determines how much money you want to spend will determine which of these you are actually going to go after.

Lynx Ransomware: Attack Vectors, Impact, and Mitigation Strategies

Lynx Ransomware: Attack Vectors, Impact, and Mitigation Strategies

Lynx ransomware is a fast-spreading and highly disruptive malware that encrypts critical business data and demands ransom payments for decryption. It can halt operations, compromise sensitive information, and cause significant financial damage. Recent reports indicate...

8Base Ransomware: Detection, Prevention, and Mitigation

8Base Ransomware: Detection, Prevention, and Mitigation

8Base ransomware is a rapidly growing cyber threat targeting businesses across various sectors. Known for its sophisticated tactics and double extortion model, it encrypts critical data and steals sensitive information, demanding ransom for both. As the risk of 8Base...

Inside Rhysida Ransomware: Infiltration, Impact, and Prevention

Inside Rhysida Ransomware: Infiltration, Impact, and Prevention

Rhysida ransomware is a dangerous cyber threat that has been disrupting organizations since May 2023. Known for its double extortion tactics, Rhysida encrypts files and exfiltrates sensitive data, pressuring victims to pay or face public exposure. It infiltrates...

Turla Ransomware: Comprehensive Analysis of the Russian APT

Turla Ransomware: Comprehensive Analysis of the Russian APT

Turla ransomware is a sophisticated cyber threat known for its stealthy operations and advanced infiltration techniques. Leveraging custom malware, zero-day vulnerabilities, and highly targeted attacks, Turla poses a significant risk to corporate networks across...

You May Also Like

Subscribe To Our Newsletter

Join our mailing list to receive the latest news, updates, and promotions from StoneFly.

Please Confirm your subscription from the email