Continuity's RecoveryGuard Reveals DR Flaws - InformationWeek
IoT
IoT
News
Commentary
1/30/2008
10:20 PM
Howard Marks
Howard Marks
Commentary
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Continuity's RecoveryGuard Reveals DR Flaws

Today's large IT environments are dynamic places; applications, volumes, and file systems are added, deleted, and reallocated on SANs on a daily basis. The disaster recovery plan, on the other hand, is updated and tested on an annual basis. As a result, most organizations think their data is better protected than it really is.

Today's large IT environments are dynamic places; applications, volumes, and file systems are added, deleted, and reallocated on SANs on a daily basis. The disaster recovery plan, on the other hand, is updated and tested on an annual basis. As a result, most organizations think their data is better protected than it really is.If the Oracle DBAs say they need another 1TB LUN (logical disk), a storage administrator may skip step 19 in the official provisioning process that says to add the new LUN, and it's doppelganger at the DR site to the replication regime. When each management group looks in their management consoles, everything looks hunky dory.

Continuity Software's RecoveryGuard discovers the Oracle database, which LUNs it's using, and how they're replicating, and raises the red flag that the Oracle database isn't as protected as we thought it was. RecoveryGuard can investigate Oracle, Sybase, and MS SQL Server databases, and EMC's SRDF and Network Appliance SNAPmirror replication.

Continuity Software offers a free 48-hour evaluation and a spokesman told me that they have found at least one gap in the data protection at every company that's taken advantage of the offer. Since in our recent survey almost 60% the respondents indicated that they failed to recover at least one of their important applications in their last DR test, I can believe it.

Right now, RecoveryGuard is for the big boys with EMC and NetApp infrastructures that don't mind paying $2,000/protected server/a year to avoid multimillion dollar data losses. For them, it could be a bargain.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll