Mitigate Disaster & Security Risks Using Enterprise Change Management
Source: Configuration Management
At one time, all the business applications critical to the enterprise resided on big iron in the data center. The IT professional could protect the essential business computing resources of the enterprise by adhering to simple principles. Back up the server(s) daily, keep off-site backups, prevent unauthorized access and manipulation of data through careful user account management and ensure manual processes could be employed for business operations in the event of significant downtime. The goal of these precautions: ensure that critical computing services could be reproduced in a reasonable time frame with little or no data loss. The techniques used to realize this goal in an organization are referred to as Disaster Recovery Planning or Business Continuity Planning.