Skip to content
11:11 Systems
Rethink Connected
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • Cloud Console
          Cloud Console
          Compliance
          Compliance

      • Column 2
        • Global Regions
          Cloud Regions
          Catalyst
          Planning and Assessment

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      •  
      • Careers
      • Technology Partners
      • Customer Stories
  • Products & Services
    • Products & Services
      • CLOUD
      • Cloud Overview
      • Public Cloud
      • Private Cloud
      • Object Storage
      • Cloud Labs
      • Colocation/Bare-Metal
      • BACKUP
      • Backup Overview
      • Backup
      • Microsoft 365 Backup
      • DISASTER RECOVERY
      • DRaaS Overview
      • DRaaS for Veeam
      • DRaaS for Zerto
      • Autopilot
      • SECURITY
      • Security Overview
      • Continuous Risk Scanning
      • Managed SIEM
      • Managed EDR
      • Managed Firewall
      • CONNECTIVITY
      • Connectivity Overview
      • SD-WAN
      • Multi-Cloud Connect
      • Managed IP
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Console Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Cloud Console
    • Compliance
    • Cloud Regions
    • Planning and Assessment
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Colocation/Bare-Metal
    • BACKUP
    • Backup Overview
    • Backup
    • Microsoft 365 Backup
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • Autopilot
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • CLOUD CONNECTIVITY
    • Connectivity Overview
    • SD-WAN
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • Column 2
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Success Center
    • API Documentation
  • Contact
  • Console Login
  • Free Trial
Tags: Disaster Recovery
Author: 11:11 Systems
Date: September 8, 2017

Beyond Disasters — Do More with DR

Disaster_RecoveryEditor’s Note: As of January 2022, iland is now 11:11 Systems, a managed infrastructure solutions provider at the forefront of cloud, connectivity, and security. As a legacy iland.com blog post, this article likely contains information that is no longer relevant. For the most up-to-date product information and resources, or if you have further questions, please refer to the 11:11 Systems Success Center or contact us directly.

In the wake of Hurricane Harvey, after unprecedented amounts of flooding have finally begun to recede from the Houston area, we wanted to avoid focusing on the disastrous event itself. It would be doing those impacted by the storm a disservice to write a commentary on protecting data after a time when protecting loved ones was significantly more important. Instead, we wanted to share other reasons why it would be beneficial to have a solid DRaaS (Disaster Recovery as a Service) plan in place.

We all know that geographic redundancy and replicating critical workloads can keep businesses up and running during events such as Harvey, but there are many more use cases for DRaaS than just natural disasters and a key one is testing. Testing a DR plan can ensure that when the unforeseen happens, your business is ready. Beyond readiness, however, there are a few other key reasons why testing can be important for your business.

When delivering Zerto for DR solutions for our customers, 11:11 Systems creates an environment on our secure cloud with preconfigured networks for both live and test failovers. The test network is completely isolated and can serve as a sandbox for all of your DR and out-of-band testing needs without any impact on production or replication. In addition to typical DR testing, there are a number of use cases for leveraging that isolated environment. We’re going to shed some light on the following three use cases for DR testing:

Security/Penetration Testing

Let’s face it, as fearful of security events as we all are at this point, many organizations are also scared of impacting critical systems by performing security checks on their production systems. Having an isolated environment to conduct security tests is invaluable. The 11:11 Cloud offers a litany of security tools, reportable compliance metrics, multi-factor authentication, encryption of data at rest, and role-based access control.

Within this isolated test environment, you’re able to perform test failovers of the workloads you’d like to audit without impacting production. Now that you have a test bed established, you can start by performing penetration tests. Unbeknownst to you, there might be critical vulnerabilities present in those systems. You’ll be able to run a vulnerability scan from 11:11’s Cloud Console, potentially identifying chinks in your systems’ armor. Following that, you could inject sample malware into the environment to test against our Trend Micro Deep Security suite’s capabilities in regards to detection. Other tools worth checking against would be malicious file detection, intrusion detection and prevention, and URL filtering. There are many open-source tools and publicly available utilities for simulating malicious activity. Many 11:11 customers have found security vulnerabilities and weaknesses in their IT systems by deploying this DR security testing use case. “Hack” away, friends!

Code Development/Quality Assurance

These days, almost all organizations do some level of internal development. Many have also adopted agile development principles along the way. Unfortunately, not everyone has adopted Test-Driven Development (TDD), whereby you write tests before you write code. You simply refactor the code until the test passes. Boom – automatic quality assurance (in an ideal world, that is).

With this newfound agility, however, comes the propensity to release code a bit too hastily. Why not test in an isolated environment? By performing a test failover of your development systems, you can begin to run those applications in a pseudo-real-world environment. Often times, it’s not until the services are live that you find errors. Debugging in this sandbox allows your development team to clean up what otherwise might have gone undetected until launch. This practice will save from having to issue patches down the line and ultimately result in higher quality code releases that are less likely to have negative impacts on your employees or customers.

Application Changes/Patching

Speaking of patches, they’re going to happen. If so, why not test the patches, or any other code changes for that matter, in a test environment? We’ve had a number of customers find this environment conducive to finding issues and bugs much sooner.

Many customers will adopt a crawl, walk, run strategy when moving to the cloud. Leveraging replication to the cloud can be a stepping stone to cloud adoption. A test environment could be a foray into setting up a true cloud-based testing and development environment, but we’ll leave that for another blog post. In the meantime, use the power of Zerto and the integration into our secure cloud to know that development can be done in isolation.

As you can see, we’ve identified a few pretty cool use cases for DR testing. In doing so, we mentioned Zerto and the 11:11 Cloud. We’d encourage you to learn more if you’re unfamiliar. Keep in mind that setup, installation, and configuration of Zerto are extremely seamless, and some 11:11 customers have adopted a phased approach to protecting their environments. At a minimum, organizations should consider protecting their most mission-critical workloads to start. Natural disasters might prompt organizations to consider DR, but don’t forget some of the added benefits of adopting a regular testing cadence. Keep in mind that with 11:11’s cost-conscious approach to DR events, you only pay for resources you consume. To wrap this up, we just have one question:

What other use cases have you come across? Feel free to respond in the comments section below. Thanks in advance!

To conclude, please keep Houston, Texas, and the entire Gulf Coast region in your thoughts and prayers as they begin the recovery process.

Categories: DRaaS, Security, ZertoBy 11:11 SystemsSeptember 8, 2017
Tags: Disaster Recovery
11:11 Systems

Author: 11:11 Systems

Post navigation

PreviousPrevious post:DRaaS Doesn’t Have to Break the Bank — Reserved Storage and Burst ComputeNextNext post:Remote Console Access – Do You Need It in Your Cloud?

Related Posts

Preparing for 2023 with 11:11 Systems: IT Trends in Security, Cloud, and More
February 1, 2023
What is 11:11 Systems?
What is 11:11 Systems? A company built on cloud, connectivity, and security
January 30, 2023
11:11 Systems Wins 2022 Backup and Disaster Recovery Award from Cloud Computing Magazine
January 25, 2023
Why Staying Connected to the Cloud Can Be Simple, Secure, and Seamless
Why Staying Connected to the Cloud Can Be Simple, Secure, and Seamless
January 24, 2023
11:11 Managed Connectivity Solutions
11:11 Managed Connectivity Solutions
January 23, 2023
Risky Business
Risky Business: Managing Vulnerabilities by Prioritizing Risk
January 11, 2023
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Connectivity Solutions
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • Twitter
  • Facebook
  • Youtube

© 2023 11:11 Systems Inc., All Rights Reserved | Privacy Notice

Go to Top
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information that allows us to process data such as browsing behavior. Not consenting or withdrawing consent, may adversely affect certain features and functions. By clicking Accept, closing this message, or continuing to browse, you consent to these technologies and accept our Privacy Notice.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}