Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
7 tiers of disaster recovery
Transcript of 7 tiers of disaster recovery
No data or system backup. Disaster recovery has not been considered.
Data is backed up and taken to another site (physically) where is can be restored. This site is known as a "hot site" where data can be accessed in the event of a disaster.
This tier builds upon tier 2. Backups are taken electronically and transmitted to a hot site. Typically they will be transmitted through a secure internet connection or VPN. These electronic backups will be more up to date than tapes.
0 No data backup
1 Data backup with no hot site
2 Data backup with hot site
3 Electronic transmission to hot site
4 Snap shot copies to hot site
5 Critical data synchronised to hot site
6 Data mirrored to hot site with fast recovery
7. Hot site becomes real time duplicate
Backups are taken and transported off site. (not to a hot site)
Backups are physically transported to another location and there will be a time delay in retrieving backups.
Point in time or snapshot copies are taken and electronically transmitted to the hot site. These snapshots my take place every few hours and therefore a number of backups may exist for each day.
Critical data is kept synchronised between the business and the hot site. there will be no data loss in the event of a disaster to critical systems.
This is sometimes known as transactional integrity.
Data is mirrored in real time to the hot site.
This hot site can become active very quickly as restoration times for data will be fast.
Building on Tier 6 with the addition that restores are automatic - the hot site is a duplicate to the business site at all time.