About Me

My photo
Scott Arnett is an Information Technology & Security Professional Executive with over 30 years experience in IT. Scott has worked in various industries such as health care, insurance, manufacturing, broadcast, printing, and consulting and in enterprises ranging in size from $50M to $20B in revenue. Scott’s experience encompasses the following areas of specialization: Leadership, Strategy, Architecture, Business Partnership & Acumen, Process Management, Infrastructure and Security. With his broad understanding of technology and his ability to communicate successfully with both Executives and Technical Specialists, Scott has been consistently recognized as someone who not only can "Connect the Dots", but who can also create a workable solution. Scott is equally comfortable playing technical, project management/leadership and organizational leadership roles through experience gained throughout his career. Scott has previously acted in the role of CIO, CTO, and VP of IT, successfully built 9 data centers across the country, and is expert in understanding ITIL, PCI Compliance, SOX, HIPAA, FERPA, FRCP and COBIT.

Monday, June 14, 2010

What is your organization doing for Data Protection & Rapid Recovery Compliance?

What is your organization doing for Data Protection & Rapid Recovery Compliance?


While the largest firms can afford to invest in redundant data centers, real-time failover technologies, and the staff to support them, these approaches are impractical (and the investments unaffordable) for most businesses. So the vast majority of firms have been left with laborious, sequential rebuilding of failed servers after a crash. Hardware repair or replacement is followed by reinstallation of the OS, patches and updates, and each critical application. System settings, registry entries, and passwords all must be configured to the prior state. Only then—typically a day or more after the failure—can recovery of user data from backup tapes or disk archives begin.

Further, an increasing number of organizations now use different operating systems (Windows, Linux, Solaris, Novell, Macintosh, etc.) within their IT infrastructure. In these environments, the complexity and time required for full recovery grows dramatically. Seldom if ever is a business back to normal functionality in an acceptable timeframe. With e-commerce and Web-based customer connections exploding, these historical approaches simply won’t deliver acceptable recovery any longer.


You may have regulatory and compliance requirements around your data protection, and the ability to recover. What is your plan?

No comments:

Post a Comment