Disaster Recovery

Disaster Recovery


Most natural disasters are somewhat predictable. The unnatural ones which cripple an organization are not. There are countless disasters which could occur at a moment's notice. Understanding each scenario and practicing the defined response by creating a recovery strategy is critical to an organization's ability to overcome the disaster.

Measurements for disaster recovery

Because of its relation to each application and associated data set, a disaster recovery strategy starts by first understanding the acceptable losses and downtime across the organization as a whole.

4 key measurements are used by high powered IT leaders to manage a disaster recovery strategy:

  • Recovery Point Objective (RPO): The maximum time frame an organization is willing to lose data.
  • Recovery Time Objective (RTO): The time it should take to make the switch.
  • Recovery Time Actual (RTA): The actual time it took to make the switch.
  • RTA-RTO Gap: If this value is zero or your RTA is less than your RTO then you are in compliance with your organization's objectives.
  • The RPO value sort of dictates the budget or is decided upon by the budget available. Therefore, IT teams work to design the solution based on this.

    This team, however, then needs to measure the RTO and RTA of a quarterly exercise because the more you are willing to spend the lower the objective can be. 

    Although the DR process is designed & tested by the DR group, it really is an organizational movement. Think of it like a fire alarm going off at a school.

    The entire organization needs to behave in a certain way while the fire alarm’s locations, ability to ring, alerting process, response of fire team, police, etc. are already grooved.

     It is easy to do the process but sometimes hard to get the organizational response processes worked out.


    Scenarios can be categorized under the following areas:

    • Loss of Key Staff
    • Loss of Key Technical Infrastructure
    • Loss or Corruption of Key Data: Backing up data without a DR plan is one of the most dangerous things a company can do. It creates a false sense of security and leaves organisations unnecessarily exposed to risk. 
    • Environmental

    Source:  John Mathieu ►Go.Allari ✩✩✩✩✩

    Related Articles: 

    Are you positioning to Maximize Agility?

    jde installations attacked by cyber criminals

    JDE Installations Attacked by Cyber Criminals

    JDE Installations Attacked by Cyber Criminals The threat is real. In the

    ​Read More
    JDE vulnerability for your business

    60% of Security Breaches are from Known Unpatched Vulnerabilities

    60% of Security Breaches are from Known Unpatched Vulnerabilities  Vulnerabilities are flaws

    ​Read More
    Cost Calculator Book a Call

    Get Weekly Updates on Key Issues Facing IT Directors

    Subscribe to our Weekly E-zine

    Founded in 1999, Trailblazer Allari is making a bold move towards providing IT Operations and Maintenance, as well as Cost and Efficiency conscious IT Leaders via an Innovative On-demand Consumption-based Service Value Model. IT Leaders gain access to processes and expertise for Scheduled Maintenance, On-Demand IT Tasks and Advanced IT Projects.
    All delivered as IT-As-A-Service (ITaaS) via the Go.Allari Platform for daily support and projects related to ERP, Database, Helpdesk, Security, and Vulnerability Management. Its breadth of Platform Coverage is extensive, covering all Major Platforms including JD Edwards EnterpriseOne, Oracle Database, MS SQL, Microsoft BI, Qualys IT Security and many more.
    Allari supports its customers from locations around the Globe 24/7. To learn more visit: