Welcome!

Related Topics: @CloudExpo, Java IoT, Microservices Expo, Linux Containers, Cloud Security, @BigDataExpo

@CloudExpo: Article

Integrate Cloud-Based Disaster Recovery into Business Continuity Strategy

DRaaS will continue to gain market strength as a solution this year while evolving to better meet customer requirements

Cloud-based Recovery-as-a-Service (RaaS) is becoming big business. Research and Markets forecasts the global market of RaaS and cloud-based business continuity will reach $5.77 billion by 2018, creating major opportunities for business continuity and risk management specialists alike. Likewise, Reportstack announced recently the global Disaster Recovery-as-a Service (DRaaS) market is expected to grow at a Compound Annual Growth Rate (CAGR) of 54.64 percent from 2014 to 2018.[1]

One of the leading drivers for small and mid-size businesses (SMBs) as well as enterprises seeking cloud solutions is Disaster Recovery (DR).[2]Organizations seek improved resiliency and failover in response to service disruptions of all kinds including natural disasters, cyber-attacks and technical malfunctions. In 2013, the financial impact of natural disasters worldwide was more than double the $100 billion estimate of 1990.[3]McAfee® Labs Threats Report indicates service disruptions are inevitable and becoming more predictable, with a reported 20 million new types of malware in the third quarter of 2013 alone. In a recent survey, IDC found that 71 percent of respondents experienced less than 10 hours of annual downtime, with a projected financial impact for SMBs of $125,000. Larger enterprise organizations could potentially have a corresponding annual financial impact of $17 million.[4] Dun & Bradstreet surveyed Fortune 500 companies with 59% of respondents reporting 1.5 hours of downtime each week, amounting to a projected $46 million impact annually for companies of 10,000 employees or more.[5]

However, the impact may be even greater. In a 2013 Ponemon Institute study, 91 percent of the participants reported that their organizations experienced unplanned downtime in the past two years. When you consider it takes about two days to recover from an IT event, if at all, the cost can be much higher in terms of lost revenue and damage to a company's reputation through reduced customer loyalty.

Floods, mudslides, ice and snow storms, hurricanes, tornados and cyclones, fires and droughts have one thing in common: all can have a negative financial impact on day-to-day business. Hurricane Sandy ranked as the largest global disaster in 2012 with a price tag of $65 billion. At the same time, New Jersey residents and municipalities had to cover an additional $8 million to $13 million in unmet expenses. Businesses are still trying to recover from the hurricane, with many resorting to bankruptcy protection. In 2013, 296 adverse weather events, predominantly in Europe and Asia, caused $192 billion in worldwide economic losses. Although the dollar amount was 4 percent less than the 10-year average, the number of events was greater than the 10-year average of 259.[6]

Other factors generating a need for Disaster Recovery planning include the risk potential from cyber attacks on Wi-Fi access into secure networks, Distributed Denial of Service (DDoS) attacks, resistant malware, insider threats, attacks on employee-owned device, or bring your own device (BYOD), and breakdowns with out-of-date, legacy systems.

Banks have been particularly hard hit in the last couple of years by DDoS attacks, prompting an April 2014 notice from the Federal Financial Institutions Examination Council (FFIEC), which requires banks to assess risk, monitor, and develop response plans to mitigate against DDoS attacks.[7] Attacks are becoming more sophisticated and can shut down business activity, slow website connections or prevent access to institutional websites. These attacks can be system-wide or come in via peripherals. For instance, an unsecured keyboard video mouse (KVM) switch allows cyber attackers to capture keystrokes and password information or access information through unauthorized universal serial bus (USB) devices and microphones.[8]

Cybercriminals are becoming stealthy and developing tools and botnet source codes that are increasingly complex and capable of avoiding detection. Cryptolocker, for instance, can be delivered by e-mail and is added to the start-up menu. It encrypts the data, infects the system and locks the organization out. Criminals then demand a ransom to unlock the data.[9]

Today, 31 percent of PCs continue to run on Windows XP operating systems. It's not just PCs that are at risk, as a number of medical devices and point of sale (POS) systems use Windows to run transactions, and the systems are not consistently updated. In April 2014, Microsoft announced it would no longer provide support and updates, placing systems and equipment at increased risk for cyber attacks. Because enterprise and institutions invest so much time and money in legacy hardware and software, these systems will require expert knowledge moving forward to maintain system security.

Business Continuity Planning is No Longer Optional
All of these factors point to the need for systematic security planning. Business Continuity Management (BCM) refers to the plans executed and activities performed on a daily basis to maintain business consistency and ensure critical business systems will be available when disaster strikes. And although the term Business Continuity Management is used interchangeably with DR, it is considered to be a separate, overarching strategic plan which includes disaster recovery, crisis management, incident response and contingency planning, as well as business impact analysis, recovery time objective (RTO) and recovery point objective (RPO).

BCM is a set of processes and practices created to identify and mitigate threats and their potential impact while providing the framework to prevent, mitigate and recover from disruptions of all kinds including the implementation of new programs, processes, system virtualization and other process shifts. And, although closely related, DR is more about the process of building continuity capabilities for infrastructure and applications. More specifically, DR is the business' ability to maintain critical operations and provide services during a disruptive event.[10]

Disaster recovery and business continuity continue to rank as two of today's top business concerns due to the prevalence of natural and man-made disruptions. A recent Continuity Insights and KPMG Continuity Management Program Benchmarking study was conducted to determine whether enterprise organizations are prepared for a disruptive event. The study involved 434 executives from 22 countries. Approximately 71 percent of those surveyed indicated a senior management board had been established for the purpose of developing a BCM, which made a big difference when conducting business impact analyses (BIAs), recovery objectives, adopting global standards and addressing cyber security issues. However, 36 percent of the respondents indicated they did not address cyber terrorism issues in the BCM. More than half of those surveyed stated they were prompted to initiate a BCM plan, DR plan or crisis management plan due to a disruption. Outages were due to weather problems, power interruptions and IT security issues and represented a nine percent increase in disruptions over the previous year's responses.[11]

Zero Tolerance for Downtime
New technologies and business trends such as virtualization and mobile device BYOD policies, cloud computing, real-time data analysis, e-commerce, third-party cloud-based providers, and globalization are prompting more companies to establish DR and BCM plans as part of overall business strategies. These trends make 24x7 availability the number one priority. At the same time, enterprise organizations are seeking fast Internet speeds, real-time information and ubiquitous connectivity to remain competitive, which leaves no room for downtime.

So, what is the cost if a business continuity plan is not instituted? Plenty, according to leading analysts. In a published study by Touche Ross and ioSafe, companies without a DR plan have a survival rate of less than 10 percent. Gartner, a leading information technology research company, breaks it down even further, predicting 25 percent of PCs will fail this year, while mid-sized companies will experience about 20 hours of network, system and application downtime at an average cost of $70,000 an hour. Forrester, another leading research company, predicts that 24 percent of companies will have a full data disaster.[12]

Business Continuity Planning is Key
In its annual business continuity trends study, Continuity Central reports some interesting findings in the way survey respondents are handling business continuity this year. More than half of those surveyed expect to make small changes to existing BCM plans in 2014, while a quarter of the respondents are expecting bigger changes, and eight percent anticipate a more thoroughly integrated plan. Five percent will implement ISO 22301 projects this year. As the first international standard developed for BCM, the ISO 22301 specifies what requirements businesses must meet to ensure the business recovers from a disaster or disruptive event.

Secure Data with Cloud Computing
Now that cloud computing has matured as a platform, more companies are beginning to trust that moving critical data to the cloud will ensure against loss in the event of a disaster or event. Forbes predicts that overall cloud spending will grow by about 25% this year, reaching $100 billion for software and services as well as cloud infrastructure. More SMBs will join the cloud at a growth rate of 20 percent over the next five years and more mid-sized companies will move to public clouds.[13]

More companies are seeking ways to reduce the cost of DR, which represents about 25 percent of the overall IT budget, without sacrificing security. However, as network architecture gains complexity, data recovery from on-site storage is becoming a long and arduous process, and on-site backup and restore has increased risk associated with it due to its potential for failure. The cost becomes even greater when organizations put time, effort and money into additional architecture to mirror all servers, applications, data, software and network connections. To that point, CIOs realize cloud storage poses less of a risk while the recovery process makes sound financial sense. Cost avoidance is gained as enterprise no longer needs to make large capital investments and infrastructure upgrades to maintain availability.

Cloud Service Providers (CSPs) offer a range of storage options and as-a-service offerings, which makes DRaaS a faster and more simplified process. Likewise, virtualized servers have brought down the cost of cloud storage, making it easier for SMBs to compete on the same level as larger organizations.

DRaaS Provides a Low Cost Solution
DRaaS is a flexible platform, enabling enterprise organizations to choose whether it's necessary to restore the entire organizational infrastructure or just critical applications. Organizations gain more control because they get to decide how data should be saved and what critical infrastructure needs to be restored and in what order. A recent study by the Aberdeen Group reports DRaaS is growing as the preferred solution because it reduces the risk of losing critical business data and experiencing a business interruption; critical applications can be up and running in minutes, not days; and it's a faster way of bringing the business back to normal.

Benefits of DRaaS as a pay-as-you-go recovery model are lower costs and minimized downtime as applications are automatically restarted once the problem is identified. Because DRaaS is on a virtual platform rather than on an on-site server, business continuity requirements to meet performance standards and consistency can also be achieved. A virtual backup site provides much needed data replication while providing faster recovery time at a lower cost because it runs on higher capacity, shared architecture. Testing can occur more frequently, because the system is always ready and does not have to be placed offline to test.[14]

Creating a Business Continuity Plan
A greater number of businesses today are taking advantage of cost-effective, pay-as-you-go DRaaS and BCM plans. BCM takes into account the scope of requirements for backup and restoration of data, applications, systems and in some cases, facilities, to ensure business continuity when disaster strikes. The first step when developing DRaaS or BCM is finding the right cloud service provider to help your organization determine solution architecture to meet your recovery performance needs and requirements; this can be done by performing a business impact analysis with a qualified professional. Once complete, a feasibility plan is needed to ensure proper procedures are implemented and followed. Results must then be measured by testing the system repeatedly for availability, completeness and verified backup. The plan should then be shared with key personnel so everyone knows their roles and responsibilities when downtime occurs.

The Future of DRaaS and BCM
DRaaS will continue to gain market strength as a solution this year while evolving to better meet customer requirements. The service is expected to become faster while efficiently optimizing infrastructure storage and servers. Virtualization will be key to meeting customer service level agreements while addressing recovery point and recovery time objectives. Platform flexibility will be integrated with self-service for larger companies with internal IT staff. Expect more companies to ask for a hybrid combination of DR strategies combining on-premise backup solutions with cloud platforms for data archiving and recovery. This way, on-site and cloud applications can be synched for rapid recovery.

Some customers will seek multiple CSPs for different cloud services, opening up new opportunities for vendors and risk management specialists. Storage is expected to double in growth in 10 years, while IT staff remains in demand. CSPs and risk management specialists who can serve as trusted IT advisors will be better positioned to take advantage of opportunities from companies seeking purpose-built back-up solutions. While at the same time, CSPs who enact simple, consumer-oriented pricing strategies will make decision-making easier for enterprise and speed up the sales cycle for solution specialists and channel partners. Last but not least, giving the customers what they want, true customer support, can make the difference in building a larger customer base and improving customer loyalty.[15]

More Stories By Mike Castañeda

Mike Castañeda is the Director of Technology at Lam Cloud Management, a New Jersey-based provider of proven Business Continuity, Workplace Recovery, Data Center and Network solution.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Latest Stories
Companies can harness IoT and predictive analytics to sustain business continuity; predict and manage site performance during emergencies; minimize expensive reactive maintenance; and forecast equipment and maintenance budgets and expenditures. Providing cost-effective, uninterrupted service is challenging, particularly for organizations with geographically dispersed operations.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace. Traditional approaches for driving innovation are now woefully inadequate for keeping up with the breadth of disruption and change facin...
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in Embedded and IoT solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced server Building Block Solutions® for Data Center, Cloud Computing, Enterprise IT, Hadoop/Big Data, HPC and ...
How will your company move to the cloud while ensuring a solid security posture? Organizations from small to large are increasingly adopting cloud solutions to deliver essential business services at a much lower cost. According to cyber security experts, the frequency and severity of cyber-attacks are on the rise, causing alarm to businesses and customers across a variety of industries. To defend against exploits like these, a company must adopt a comprehensive security defense strategy that is ...
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
SYS-CON Events announced today that MangoApps will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. MangoApps provides modern company intranets and team collaboration software, allowing workers to stay connected and productive from anywhere in the world and from any device. For more information, please visit https://www.mangoapps.com/.
SYS-CON Events announced today TechTarget has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. TechTarget is the Web’s leading destination for serious technology buyers researching and making enterprise technology decisions. Its extensive global networ...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management...
The essence of data analysis involves setting up data pipelines that consist of several operations that are chained together – starting from data collection, data quality checks, data integration, data analysis and data visualization (including the setting up of interaction paths in that visualization). In our opinion, the challenges stem from the technology diversity at each stage of the data pipeline as well as the lack of process around the analysis.
Many banks and financial institutions are experimenting with containers in development environments, but when will they move into production? Containers are seen as the key to achieving the ultimate in information technology flexibility and agility. Containers work on both public and private clouds, and make it easy to build and deploy applications. The challenge for regulated industries is the cost and complexity of container security compliance. VM security compliance is already challenging, ...
SYS-CON Events announced today that Alert Logic, Inc., the leading provider of Security-as-a-Service solutions for the cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Alert Logic, Inc., provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Ful...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...