BaaS vendors deliver data protection as a service by hosting the backup software and the primary backup repository in privately operated or public cloud data centers. The backup infrastructure, including backup software and backup servers and storage, is managed by the BaaS vendor. Customers are still responsible for implementing backup policies and performing recovery tasks, but are not responsible for the day-to-day maintenance and operation of the backup system.
The DRaaS market provides for the recovery of enterprise applications at another location in the event of a disaster. The provider can deliver the service as a fully managed, assisted recovery or as a self-service offering. The service should be marketed and sold as a stand-alone, industrialized offering and include, at a minimum: - An on-demand recovery cloud for planned tests, exercises and declarations - Server image and production data replication to the cloud - Automated failover and failback between production and the target cloud environment - Recovery time SLAs
Gartner defines backup and data protection platforms as technologies that capture point-in-time copies of enterprise data for the purpose of recovering it from multiple data loss scenarios, enhancing data protection initiatives, and expanding data insights and access capabilities. These technologies protect enterprise data, applications and infrastructure in hybrid, multicloud and SaaS environments. Backup and data protection platforms are available as software-only, integrated appliances and vendor-developed and hosted backup as a service (BaaS).
IT Resilience Orchestration (ITRO) solutions are chiefly aimed at helping to improve the reliability, speed and granularity of workload recovery due to unplanned outages by automating disaster recovery (DR) processes while lowering costs of DR exercising and DR operations staff. Gartner’s ITRO definition focuses on tools that support a majority of these capabilities: • Automated failover, failback and availability/continuity management • Replication and orchestration • Discovery, dependency mapping and workload analysis • DR management and run book creation • Reporting and validation of recovery capability
Reviews for 'Security Solutions - Others'