Federated storage: How to secure the availability of business critical applications

Federated storage: How to secure the availability of business critical applications

Securing operational continuity for business critical applications is key to being able to compete in current markets. When a company suffers a failure or must manage a scheduled event that interrupts its systems, this can put its corporate image at risk and affects productivity. This is due to employees and/or customers not being able to use strategic business applications, which could result in substantial financial losses that might jeopardize the survival of the company.

The costs caused by unavailable business critical applications have a tremendous impact. According to AMR Research Inc. hourly losses by market segment due to application interruptions can amount to: US$100,000 (insurance), US$150,000 (retail), US$170,000 (transport), US$250,000 (banking), US$320,000 (telecommunications), US$350,000 (manufacturing) and US$400,000 (investments).

Traditional solutions for incidents or scheduled events involve slow recovery, and they require a specialized team of people, hardware and software. They result in service timeouts, and do not satisfy the availability that is required for business critical applications.

A response to maintain application continuity during scheduled events or failures, and even when moving data between platforms, is called “Federated Storage”.

This solution unifies business critical information and uses centralized management. Its main function is to provide constant strategic application availability even when incidents occur.

“Federated Storage” operates in “active-active” mode, which ensures that users have access to exactly the same information in two locations at the same time. This keeps the minimum Recovery Time Objective (RTO) equal or close to zero, and transparently moves information between remote sites.

This technology enables companies and organizations to access a solution that secures operational continuity, without putting data integrity at risk. But the most important thing is that this solution protects the corporate image. It increases credibility and builds customer’s confidence. It protects the business from unexpected interruptions and reduces losses.

Adopting this solution becomes an imperative, when the costs associated with a single interruption are taken into account, and keeping systems operating continually is such a critical business requirement.