By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Just as a working network is critical for normal day-to-day operations, the same is true during disaster recovery operations. In fact, it's possible to argue that a working network is even more important while recovery is underway because so many recovery operations depend on network access to succeed.
We've created this disaster recovery (DR)/businesss continuity (BC) technology tutorial to help you understand the complexities of disaster recovery and networking. Whether you are getting started with server virtualization, are creating a disaster recovery network checklist or need to learn more about protecting your VoIP systems, we have the answers here.
NETWORK DISASTER RECOVERY TUTORIAL: TABLE OF CONTENTS
>> Network access during the disaster recovery operations process
>> A sample disaster recovery network checklist procedure
>> Disaster recovery tips for protecting your VoIP systems
>> Top server virtualization myths in disaster recovery and business continuity
>> Including employees in your disaster recovery plan
>> Disaster recovery networking news and expert advice
Disaster recovery or business continuity plans must address specific elements of network access in the context of making them available as quickly and completely as possible, at least for members of the DR/BC teams (and over time, for the entire workforce as well). Learn about network access during DR operations in this article.
When it comes to executing a disaster recovery or business continuity plan for your network, time and accuracy are of the utmost importance. The goals of disaster recovery and business continuity are time-sensitive and critical, so checklists make an ideal tool when faced with a situation where those plans get called into service. Learn what to include in a disaster recovery network checklist in this article.
Voice over IP (VoIP) technology is the principal technology for supporting converged or unified communications. In addition to the infrastructure vulnerabilities that plague traditional telephony-based systems, VoIP-based systems suffer from a number of other issues. Before you invest in VoIP, you should learn how to protect your investment if a disaster occurs. Learn about protecting your VoIP systems in this article.
TOP SERVER VIRTUALIZATION MYTHS IN DISASTER RECOVERY AND BUSINESS CONTINUITY
Server virtualization is a popular topic in business continuity and disaster recovery. At the same time, many myths surround BC, DR, high availability (HA) and data protection, recovery time objectives (RTOs) and recovery point objectives (RPOs). Here's a look at the top server virtualization myths in DR and BC planning.
INCLUDING EMPLOYEES IN YOUR DR PLAN
Disaster recovery and business continuity are not just about assessments, business impact analyses, plans and exercises. They are also about the people who run the company, manage business processes and interface with clients, suppliers, investors and stakeholders. While most organizations that address BC/DR consider the impact of disruptions on technology and business processes, what can they do to protect their most important asset -- their employees? Learn about how to include employees in your disaster recovery plan in this article.
DISASTER RECOVERY NETWORKING NEWS AND EXPERT ADVICE
Get up-to-date news and how-to information about voice and data communications, WAN acceleration/optimization, network services and recovery site configuration. Bookmark our special section on disaster recovery networking news and expert advice to stay up to date on the latest networking and disaster recovery technologies.