Tutorial

Network disaster recovery and business continuity technology tutorial

Just as a working network is critical for normal day-to-day operations, the same is true during disaster recovery operations. In fact, it's possible to argue that a working network is even more important while recovery is underway because so many recovery operations depend on network access to succeed.

We've created this disaster recovery (DR)/businesss continuity (BC) technology tutorial to help you understand the complexities of

    Requires Free Membership to View

disaster recovery and networking. Whether you are getting started with server virtualization, are creating a disaster recovery network checklist or need to learn more about protecting your VoIP systems, we have the answers here.

NETWORK DISASTER RECOVERY TUTORIAL: TABLE OF CONTENTS

>> Network access during the disaster recovery operations process
>> A sample disaster recovery network checklist procedure
>> Disaster recovery tips for protecting your VoIP systems
>> Top server virtualization myths in disaster recovery and business continuity
>> Including employees in your disaster recovery plan
>> Disaster recovery networking news and expert advice

NETWORK ACCESS DURING THE DISASTER RECOVERY OPERATIONS PROCESS

Disaster recovery or business continuity plans must address specific elements of network access in the context of making them available as quickly and completely as possible, at least for members of the DR/BC teams (and over time, for the entire workforce as well). Learn about network access during DR operations in this article.

A SAMPLE DISASTER RECOVERY NETWORK CHECKLIST PROCEDURE

When it comes to executing a disaster recovery or business continuity plan for your network, time and accuracy are of the utmost importance. The goals of disaster recovery and business continuity are time-sensitive and critical, so checklists make an ideal tool when faced with a situation where those plans get called into service. Learn what to include in a disaster recovery network checklist in this article.

DISASTER RECOVERY TIPS FOR PROTECTING YOUR VoIP SYSTEMS

Voice over IP (VoIP) technology is the principal technology for supporting converged or unified communications. In addition to the infrastructure vulnerabilities that plague traditional telephony-based systems, VoIP-based systems suffer from a number of other issues. Before you invest in VoIP, you should learn how to protect your investment if a disaster occurs. Learn about protecting your VoIP systems in this article.

 TOP SERVER VIRTUALIZATION MYTHS IN DISASTER RECOVERY AND BUSINESS CONTINUITY

Server virtualization is a popular topic in business continuity and disaster recovery. At the same time, many myths surround BC, DR, high availability (HA) and data protection, recovery time objectives (RTOs) and recovery point objectives (RPOs). Here's a look at the top server virtualization myths in DR and BC planning.

INCLUDING EMPLOYEES IN YOUR DR PLAN

Disaster recovery and business continuity are not just about assessments, business impact analyses, plans and exercises. They are also about the people who run the company, manage business processes and interface with clients, suppliers, investors and stakeholders. While most organizations that address BC/DR consider the impact of disruptions on technology and business processes, what can they do to protect their most important asset -- their employees? Learn about how to include employees in your disaster recovery plan in this article.

DISASTER RECOVERY NETWORKING NEWS AND EXPERT ADVICE

Get up-to-date news and how-to information about voice and data communications, WAN acceleration/optimization, network services and recovery site configuration. Bookmark our special section on disaster recovery networking news and expert advice to stay up to date on the latest networking and disaster recovery technologies.

This was first published in August 2010

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: