Editor's Note: Preparing for the Worst
Managers describe their plans for protecting the business from disasters and avoiding classic blunders.
Computerworld - Are you overspending on disaster recovery? I know it seems like a ridiculous question. How could you be? Newspaper headlines throw more risks -- and regulators throw more requirements -- in your face almost every day. Besides, this is a special report on disaster recovery, so of course it's full of suggestions of Things You Ought to Do, which usually require spending more money, not less. Even if your disaster recovery situation is pretty good, you still have to worry about your suppliers and outsourcing contractors.
But it is possible to overspend on disaster recovery, especially if you listen to every vendor saying you must do x, y and z to comply with the Sarbanes-Oxley Act. (None of those sales weasels have actually read the law or its regulations, you can bet on that.)
Tim DeLisle, managing principal at Corigelan LLC, a disaster recovery consultancy in Chicago, says the way to avoid overspending is to establish three tiers of disaster recovery based on business requirements. It begins with the CIO asking business managers which few applications are truly critical and require recovery within 24 hours to keep the business afloat. You don't have to mirror everything! The second tier of applications, which require recovery in 48 to 72 hours, may need only inexpensive tape backup, while the third tier may need nothing at all, DeLisle says.
All that the business executives and regulators really require is that you take prudent steps for business continuity. You don't have to bankrupt the company.
See the full special report.
Mitch Betts is Computerworld's Features editor. Contact him at email@example.com.
- Editor's Note: Preparing For The Worst
- Disaster Homework
- Rising From Disaster
- Classic Mistakes
- Get In Sync With Suppliers
- A Dose of Reality
- The Almanac: Disaster Recovery
- Opinion: Hold Outsourcers To High Standards
- Shark Tank: Disaster Recovery
- Data Recovery Planning: The First Step
- A Business Continuity Checklist
- One IT Manager's Story of Recovery After a Disaster
- Survivor's Guide: 10 Disaster Recovery Tips
- Calculating the Cost of Downtime
Read more about Disaster Recovery in Computerworld's Disaster Recovery Topic Center.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- IT Security - Fighting the Silent Threat "IT Security - Fighting the Silent Threat" is a global report into business attitudes and opinions on IT security. Download the report now...
- Cutting Complexity - Simplifying Security This white paper looks at how the latest IT Systems Management solutions can simplify and automate a vast range of routine IT management...
- Your Data under Siege: Defeating the Enemy of Complexity Even if you have adequate antivirus protection, are there still holes in your IT security armor? Is lack of bandwidth to manage the...
- Build Your IT Security Business Case In this latest whitepaper from Kaspersky Lab, you'll find useful facts, examples and business case arguments to help you get buy-in and commitment...
- Pre-Engineered solutions from VCE Simplify Core Infrastructure Implementation In this video, the CTO of Purdue Pharma, a privately held pharmaceutical company explains how Purdue transformed their data center infrastructure with VCE.
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now All Disaster Recovery White Papers | Webcasts