cutimage - Fotolia
Not every organization has the budget to buy spare hardware and simply let it sit in anticipation of a disaster that may never happen. Even so, redundancy is important because you never know when a data center disaster might destroy the organization's hardware. Here are three ways to offset the financial challenges associated with hardware redundancy:
Negotiate hardware redundancy as part of a maintenance contract. Some organizations establish maintenance contracts with their hardware vendors. These contracts vary in scope, but, in general, they have the organization pay a fee each year to have the hardware vendor handle any necessary desktop or server hardware repairs. There have also been instances in which an organization negotiates redundant hardware as a part of its maintenance agreement. In these types of situations, the organization doesn't actually have hardware redundancy, but rather requires the vendor to supply it in the event it is ever needed. Think of it as a hardware insurance policy.
Establish a hardware co-op. In this type of situation, several organizations get together and collectively purchase server hardware that can be used in the event of an emergency.
Try cloud redundancy. Some organizations replicate standby copies of virtual machines to public cloud providers. That way, workloads can temporarily transition to the cloud in the event the organization's primary hardware is ever damaged or destroyed. This isn't a perfect plan because bringing the workload back on premises will require the purchase of hardware. Even so, using the cloud prevents the organization from hardware redundancy purchases in advance of a disaster.
Replication software can help with data redundancy
Be prepared for potential hardware failure
Ensure data protection with redundant backup copies
Dig Deeper on Disaster recovery planning - management
Related Q&A from Brien Posey
Microsoft Teams storage limits can be complex for organizations to track. Learn the details and how to add Microsoft 365 storage to avoid capacity ... Continue Reading
Consider the fine print of encrypting data at rest. For example, access control permissions can make or break a storage encryption plan. Continue Reading
It's critical for an organization to know what data it needs to retain and where to store it. Some data is required for retention by law, so a ... Continue Reading