solutions

data recovery

overview

What is continuity of operations?

A disaster recovery plan–sometimes referred to as a business continuity plan or business process contingency plan–describes how an organization will deal with potential disasters.

Years experience

0+

Years experience
Certified experts

0

Certified experts
End user satisfaction

0%

End user satisfaction
Global reach

0countries

Global reach
Service desk

024/7

Service desk

A disaster recovery plan–sometimes referred to as a business continuity plan or business process contingency plan–describes how an organization will deal with potential disasters. Just as a disaster is an event that makes the continuation of normal functions impossible, a disaster recovery plan consists of the precautions taken to minimize the effects of a disaster and enable the organization to either maintain or quickly resume mission–critical functions. Typically, disaster recovery planning involves an analysis of the continuity of business processes in the face of a disaster–corruption, degradation, or destruction of data, applications, and infrastructure. It includes a significant focus on disaster prevention.

Assuming you have completed a risk assessment and have identified potential threats to your IT infrastructure, the next step is to determine which infrastructure elements are most important to the performance of your company’s business. Also assuming that all IT systems and networks are performing normally, your firm ought to be fully viable, competitive and financially solid. When an incident–internal or external–negatively affects the IT infrastructure, the business could be compromised.

WAN Backups and Archives

The goal of backup, archiving, and disaster recovery is guarding and preserving data against loss, but local data protection has limited effectiveness. The same fire, flood, or theft that damages your production data can just as easily destroy the copies of that data. The emergence of the Internet as well as other storage-saving technologies have made remote data protection more practical, agile, efficient, and cost-effective with a much faster resumption of normal operations.

Today, a backup, archive, or disaster recovery set (the group of files or data that constitutes a disaster recovery package) can be stored on the other side of the world as easily as next door. With backups and disaster recovery sets, the primary consideration for the wide area network (WAN) is efficiency: making the most of available bandwidth to move the maximum amount of data in the minimum amount of time. This ensures the shortest recovery point objective (RPO).

Because high-bandwidth WAN connections cost too much for many organizations, several techniques have emerged to reduce the sheer amount of data needed to perform a remote backup or disaster recovery set.

A full backup is an essential starting point. But a full backup can take a long time, which can vastly extend the remote RPO. If it takes 36 hours to perform a complete backup across the WAN, the smallest possible RPO would be 36 hours — far longer than most organizations can tolerate.

When backing up remotely, often to a remote virtual tape library (VTL), most organizations will start with a full backup, then revert to incremental or differential backups to save only files that have changed since the full backup. The technique of “delta differencing” saves just the changed blocks or bytes. So the initial backup or disaster recovery set of 20 TB may take many hours, but an average delta difference of 10 GB per day can be transferred in just a few hours, well within an acceptable daily backup window.

Another data reduction method is data compression, which involves searching for repetitive data segments that can be removed from a file. The mathematical algorithm used to compress the file can rebuild it again when the file is read later. Compression typically cuts data volumes in half. But since not all files compress well, the actual compression ratio varies with file type.

Use of the data reduction technique known as data de-duplication continues to grow. Data de-duplication saves only one unique copy of a file, block or byte to remote storage.

The traditional concepts of full backups or disaster recovery sets are changing. Storage administrators realize they don’t need to back up every single PowerPoint presentation or include each MP3 file in a disaster recovery set. More businesses are focusing on protecting mission-critical applications, while ignoring secondary or nonessential file types.

Recoverability from the WAN

Because backups and disaster recovery sets are useless unless they can be recovered from a remote location, storage administrators must also be concerned with recovery time objectives (RTO). RTOs can be different than RPOs. An organization might need an extremely short RPO to minimize potential data loss, but can tolerate 12 to 24 hours for recovery. What’s critical is that remote data can be recovered within the allotted RTO. In some cases, a business may temporarily draw additional bandwidth from a service provider in order to meet tight RTOs. Recovery drills can be used to train personnel and streamline the recovery operation.

Implications of Archiving Data

Unlike backups or disaster recovery sets, which are typically only accessed after a problem occurs, archival data can be accessed at any time (albeit infrequently). An example of archival data is patient records, where a doctor may only access the patient’s history and medical images during an annual physical or follow-up visit. Remote archives add a measure of data protection by placing the data in another location.

With remote archives, WAN bandwidth is not a major concern because the individual files being saved or accessed are small relative to the total archive size. For example, a patient’s x-ray image may only be a few megabytes that can be pulled across a low-bandwidth WAN link. But if the WAN goes down, the archive becomes inaccessible. One way to mitigate the impact of WAN disruptions is to use a local archive platform, then mirror to a remote archive for data protection.

Remote Storage and Security Issues

Because companies are obligated to protect sensitive data, as well as customers’ personal information against theft or loss, any remote operation should factor in data security. Remote data is often beyond your direct physical control, but unlike tapes that are typically vaulted, WAN connectivity carries the added risk of unauthorized electronic access (aka hacking). Consequently, remote storage should include authentication plans along with the use of encryption. Encryption is only needed for sensitive data or personal information, so it’s usually not necessary to encrypt the entire backup or disaster recovery set. Encryption can be implemented in hardware or through software.

Solutions

Comprehensive IT services include

  • router-1807_67aa302b-3a94-46a7-aa3d-66b8928a87d7

    Network

    Cloud services are network dependent, which is why CFSI network management and monitoring services have become critical to IT.

  • telephone-operator-4682_c9489618-836b-47ec-8489-e15f613cb10c

    Service desk

    CFSI 24/7 support is about maximising service efficiency, resolving problems and driving continuous service improvement.

  • computer-network-1878_39828809-88f9-48e1-9a76-61c99401ec99

    Infrastructure

    CFSI ensures your IT infrastructure is always optimised to support the stable and highly available services organisations demand.

  • settings-server-1872_2e41baf2-8789-4215-b430-db35c3899936

    Endpoint management

    Client and server endpoints are managed as one estate, ensuring security and stability while maximising uptime and employee productivity.

  • source-code-1754_2b435bd8-ce76-4910-8137-7d07a3557fa3

    Applications

    CFSI supports Software as well as on-premise deployments, ensuring applications are always optimised for the best possible user experience.

  • add-image-5030_dcf585b8-8f3d-48ad-8579-a4ad56d14ba6

    Managed services plus

    CFSI provides advanced management tools to clients who want to take their IT Service Management to a higher level.

Benefits

Our services provide a unique range of benefits

  • Control IT Costs

    You can scale your IT Costs according to your requirements and only pay for what you need. Whether that be increasing or decreasing staff, or IT project work.

  • Trusted IT advisor

    Through regular account management meetings your Managed IT service company will be able to oversee your overall IT roadmap and become your trusted advisor.

  • Economy of scale

    As your business grows, its support structure needs to grow, too. When you use a managed IT service you can scale your business up or down with nothing more than a simple discussion.

  • Increased efficiency

    You’ll have your IT needs outsourced to a team of IT experts, and during times where you need additional project support, your managed IT provider supplies the extra staff.

  • Small initial investment

    Managed IT services help you offset the initial investment of technology costs. Rather than spending thousands of dollars on hardware and software upfront.

Stop wasting time and money on technology. Let’s get started

NanoSoft are always accommodating our diverse needs and we feel like they are a part of our company rather than an external supplier.
John H. Bedard, Jr
Pricing and Plan

1 monthly fee for all IT services. No costly surprises