Verified Document

Prudent Retaliation To Failure Case Study

¶ … Policy Creation It is critical for organizations to develop and readily have available an incident response policy to address their various business and information technology needs. There are a couple of pivotal factors to account for in such a policy. These include various aspects of creating and maintaining an incident response team, business continuity planning, and a disaster recovery processes. Perhaps one of the most encouraging facets of engendering such a plan is that there are myriad developments within the IT space that can help to facilitate many of the components of these three aspects of this policy. Specifically, there are a number of options involving Cloud computing and data replication, as well as remote Software Oriented Architecture and services delivered through the cloud that can help to make such a policy effective if it ever requires implementation. The utilization of cloud computing and its many services, in addition to prudent data replication, should enable an incident response policy that propagates business continuity for Gem Infosys.

Perhaps the most vital part of this policy is the disaster recovery process that the utilization of certain cloud services can certainly assist with and, in many cases, actually ensure. There are a number of cloud services that provide the sort of infrastructure that can handily backup the physical infrastructure that Gem Infosys utilizes. That infrastructure...

A software as a service offering such as Zetta DataProtect can singlehandedly "offer data backups and disaster recovery for a multitude of files, databases, and entire servers" (Harper, 2014), let alone for the rather modest IT infrastructure and its accordant data that Gem Infosys deploys. In this regard, one of the most salient aspects of this policy is to subscribe to Zetta DataProtect's service which enables organizations to continuously replicate data to the Cloud regardless of appliances. Thus, in the event that there is a firewall breach or some other attack on its physical infrastructure (including its servers), it will have a backup copy of its data in the cloud.
In terms of planning for business continuity, it is essential for Gem Infosys to subscribe to additional Cloud services. One of the most viable aspects of doing so is that such subscriptions and services can only be utilized in instances in which they are necessary -- such as during times of failure or even when conducting maintenance. Due to the cloud service model, companies only pay for services when they are used. Thus, the company should chooses to leverage additional platform as a service options and software oriented architecture that provides the same sort of software that it utilizes…

Sources used in this document:
References

Harper, J. (2014). Cloud data protection. www.dataversity.net Retrieved from http://www.dataversity.net/cloud-data-protection/

Harper, J. (2014). Data replication: the crux of data management. www.dataversity.net Retrieved from http://www.dataversity.net/data-replication-crux-data-management/
Cite this Document:
Copy Bibliography Citation

Related Documents

Financial Analysis and Strategic Alternatives
Words: 1679 Length: 6 Document Type: Essay

Analysis: Strategic Alternatives Assessment and the Financial AnalysisFrom the evaluation of the potential growth opportunities as well as strategies for Southwest Airlines, it was established that the optimal strategic alternative would be better service quality. At present, the airline offers a wide range of product offerings. These, according to the airline, are meant to make customers� travel extraordinary and are inclusive of, but they are not limited to; business select,

Ci Humint on the War Against Terrorism Gender Integration
Words: 11730 Length: 20 Document Type: Essay

Gender Integration in CI/HUMINT and the War against Terrorism Gender Integration in CI/HUMINT on the War against Terrorism in the Middle East and Strategies for Effective Implementation Shea Larson Harry Nimon, Committee Chair Dr. Troy Mitchell, Subject Matter Expert Dr. Amanda Bowers, Committee Member The success of counterinsurgency operations depends on the effectiveness and appropriateness of intelligence gathered. Human subjects are a crucial source of intelligence for counterinsurgency operations. Previously, the U.S. Armed Forces created opportunities

Oil Crisis of 1973: Its
Words: 9741 Length: 33 Document Type: Term Paper

This was good for those that felt OPEC was getting too strong because these changes would have been very difficult to make had the embargo and the oil prices not become such an issue (Reid, 2004). Many countries begin to look for alternatives to the supplies that they were getting from Arab nations and in the years immediately following the embargo many efforts would be directed at the promotion of

Whistleblowing. It Explains and Analyzes the Term
Words: 2874 Length: 8 Document Type: Term Paper

Whistleblowing." It explains and analyzes the term "whistleblowing" and takes a look at the various different issues related to it. Whistleblowing The term "Whistleblowing" is any revelation of information by an employee or candidate for employment which the employee or candidate rationally believes evidences one of the following: violation of law, rule, or regulation gross mismanagement gross waste of funds an abuse of authority substantial and specific danger to public health or

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now