Today
2025.07.02
·Î±×ÀΠ|  È¸¿ø°¡ÀÔ
Ȩ | °øÁö/À̺¥Æ® | Àüü±â»ç
Ȩ > ´º½º > ¸Å°ÅÁø
     
Disaster Recovery Journal Volume 21, Issue 4 (Fall 2008 Issue)
Seven Best Practices for Avoiding
Disasters during Disaster Recovery
¹Ì±¹ ÀçÇØº¹±¸Àú³Î(DRJ) 2008³â °¡À»È£
¸ð¹üÀûÀÎ ÀçÇØº¹±¸Ã¼
»ç¿ëÀÚ ¾î·Á¿ò È£¼Ò, ¡°Ç¥ÁØÈ­µÇÁö ¾ÊÀº ±â¼ú°ú Àåºñ¡±
2009³â 01¿ù 15ÀÏ (¸ñ) 13:43:40 ÆíÁý±¹ marketing@di-focus.com

ÀçÇØº¹±¸(DR, Disaster Recovery)¸¦ À̾߱âÇÒ ¶§, Ȥ½Ã¶óµµ º¹±¸°èȹÀÌ À߸øµÇ°Å³ª ½ÇÁ¦ »óȲ¿¡¼­ DR½Ã½ºÅÛ °¡µ¿ ½Ã ¹®Á¦°¡ »ý±æ ¼ö ÀÖ´Ù´Â °ÍÀº ÀüÇô °í·ÁµÇÁö ¾Ê´Â´Ù(failure is not an option). º¸Åë ÀçÇØº¹±¸°èȹÀº À¯±âÀûÀ¸·Î ü°èÈ­µÅ ‘¹æÅºÁ¶³¢’¿Í °°ÀÌ ºñÁî´Ï½º¿¬¼Ó¼ºÀ» È®º¸Çϱâ À§ÇØ ºóÆ´ÀÌ ¾øµµ·Ï ¼ö¸³µÅ¾ß ÇÑ´Ù´Â ±â´ë¸¦ ¸¹ÀÌ ¹Þ´Â´Ù. ÇÏÁö¸¸ ½ÇÁ¦·Î ÀÌ·¯ÇÑ ¿ä±¸ ¼öÁØÀ» ¸¸Á·Çϱâ À§Çؼ­´Â Çϵå¿þ¾î, ¼ÒÇÁÆ®¿þ¾î¸¦ Æ÷ÇÔÇÏ´Â DR ½Ã½ºÅÛÀÇ ¸ðµç ±¸¼º¿ä¼ÒµéÀÌ Á¶È­¸¦ ÀÌ·ç°í »óÈ£¿î¿µ¼º(interoperability)ÀÌ º¸ÀåµÅ¾ß ÇÑ´Ù. ¿¹¸¦ µé¾î ÁöÁø, È«¼ö µî ÀçÇØ¹ß»ý ½Ã¿¡ °æÂû, ¼Ò¹æ´ç±¹ µî ÁÖ¿ä °ü°èÀÚµéÀ» ¿¬°áÇØÁÖ´Â Åë½Å½Ã½ºÅÛÀ» »ý°¢ÇØ º¼ ¶§, ÀÌ ½Ã½ºÅÛÀÇ Àå¾Ö¹ß»ýÀ¸·Î ÀÎÇØ »ç¿ëÀ» ¸øÇÏ´Â °æ¿ì ¹ß»ýÇÒ ¹®Á¦µéÀº ºÒ º¸µí »·ÇÏ´Ù.
For many organizations, when it comes to disaster recovery, failure is not an option. When financial setbacks or even survival of the business are on the line, IT professionals must make sure their disaster recovery plan is “bullet-proof” - every part of the implemented disaster recovery (DR) solution needs to work together transparently to effectively ensure business continuity. If not, disaster recovery can become a catastrophe instead of an invaluable business insurance policy. To avoid disasters in a DR implementation, all components of the DR system need to work in harmony, thus interoperability between different software and hardware components is key to making sure this happens. Think about how important it is for radio systems used by police and fire departments to communicate with each other without a hitch when a major disaster strikes in their precinct. An inability for them to connect severely inhibits emergency coordination.

IT ½Ã½ºÅÛȯ°æµµ ¸¶Âù°¡Áö·Î, ÀçÇØ¿¹¹æ°ú º¹±¸½Ã½ºÅÛ °£¿¡µµ ³×Æ®¿öÅ©¿Í °°Àº ÀÎÅÍÆäÀ̽º·Î ¿¬°áµÇ¾î¾ß Çϱ⠶§¹®¿¡ ½Ã½ºÅÛ °£ ÅëÇÕ(integration)ÀÇ Á߿伺Àº ¾Æ¹«¸® °­Á¶Çصµ Áö³ªÄ¡Áö ¾Ê´Â´Ù. ¸¸¾à ÃÖ÷´Ü ±â¼ú·Î ¹«ÀåÇÑ ´ÜÀ§ ¼Ö·ç¼ÇÀÌ ÁÖ¿ä¾÷¹« ¾ÖÇø®ÄÉÀ̼ǰú Àß À¶ÇÕµÇÁö ¸øÇÏ°í ½Å¼ÓÇÑ º¹±¸¿ª·® È®º¸¿¡ ¹æÇذ¡ µÈ´Ù¸é ±× ÇØ´ç ¼Ö·ç¼ÇÀº µ¥ÀÌÅͼ¾ÅÍ ³»¿¡ Á¸ÀçÇÒ ÀÌÀ¯°¡ ¾ø´Ù.
Similarly in the IT environment, disaster prevention and recovery systems have to permit communication with each other. That’s why integration between systems is so important. For example, if a point solution with state-of-the-art features to support certain business functions doesn’t interoperate well with other business critical applications and hinders your ability to recover quickly - that kind of solution simply doesn’t belong in the data center.

ÀÌ·¯ÇÑ ÀÌÀ¯·Î °æ¿µÁøÀº DR °èȹÀ» ±¸ÇöÇϱâ Àü¿¡ ÀçÇØº¹±¸¿Í ºñÁî´Ï½º¿¬¼Ó¼ºÀÇ ¸ðµç Ãø¸éÀ» ºüÁü¾øÀÌ °í·ÁÇØ¾ß ÇÑ´Ù. ÃÖÁ¾»ç¿ëÀÚ(end-users)´Â µ¥ÀÌÅÍ¿Í IT ¼­ºñ½ºÀÇ Áß´Ü ¾ø´Â »ç¿ëÀ» ¿øÇϰí ÀÖÀ¸¸ç, ÀÌ·¯ÇÑ ¿ä±¸»çÇ×À» ¸¸Á·½Ã۱â À§Çؼ­ IT´Â ³ôÀº ¼öÁØÀÇ ÅëÇÕ µ¥ÀÌÅͺ¸È£°¡ °¡´ÉÇØ¾ß Çϸç ÀÌ´Â ÅëÇÕµÈ IT ÀÎÇÁ¶ó(integrated IT infrastructures)¸¦ ÅëÇØ¼­ ½ÇÇöµÉ ¼ö ÀÖ´Ù.
For this reason, both business and IT executives need to make sure that before they implement a DR plan, they have checked that all aspects of disaster recovery and business continuity are being addressed transparently and seamlessly. In addition, end-users have come to expect and depend on continuous 24x7x365 access to data and services. To meet this requirement, IT must provide them with a higher level of integrated protection for their data. Even the most basic services rely heavily on integrated IT infrastructures.

µ¥ÀÌÅÍ Á¢±Ù, ¼­ºñ½º ÀÌ¿ëÀÌ ¾ÈµÈ´Ù´Â °ÍÀº Ã¥ÀÓÀº ¹°·Ð ½Å·ÚÀÇ ¹®Á¦À̱⵵ ÇÏ´Ù. ÀçÇØ·Î ÀÎÇØ ȸ»ç°¡ ¸ÁÇϰųª ¾Ç¿µÇâÀ» ¹ÌÄ¡´Â °ÍÀ» ¹æÁöÇϱâ À§Çؼ­ DR ¼Ö·ç¼ÇÀº ¹ß»ý°¡´É¼ºÀÌ ÀÖ´Â ´Ù¾çÇÑ À§ÇùÀ¸·ÎºÎÅÍ º¸È£¸¦ °¡´ÉÄÉ ÇÏ´Â ÅëÇսýºÅÛÀ» Æ÷ÇÔÇØ¾ß ÇÑ´Ù.
Moreover, not only can businesses be held accountable if access to services is disrupted, but they can also be found liable. To avoid going out of business or be negatively impacted in the event of disasters, DR solutions must include integrated systems that are able to deliver protection against a wide range of potential threats.

ÀçÇØº¹±¸°èȹÀº Áö±Ý Å« º¯È­¸¦ °Þ°í ÀÖÀ¸¸ç, ÀÌ´Â ³î¶ö Àϵµ ¾Æ´Ï´Ù. »õ·Î¿î DR¸ðµ¨Àº ¾ÈÁ¤ÀûÀÎ DR°ú ºñÁî´Ï½º¿¬¼Ó¼ºÀ» °¡´ÉÄÉ ÇÏ´Â IT Ç÷§Æû ±â¹Ý ÇÏ¿¡¼­ ÅëÇյе¥ÀÌÅÍ º¹Á¦(data replication), °í°¡¿ë¼º(high availability), °í¼º´É ¹é¾÷(high-performance backup), Áö¼ÓÀûµ¥ÀÌÅͺ¸È£(CDP, continuous data protection), ±×¸®°í Á¶È¸ °¡´ÉÇÑ(verifiable) º¹±¸ÇÁ·Î¼¼½º¸¦ ¾Æ¿ï·¯¾ß ÇÑ´Ù. ÇÏÁö¸¸ ÀÌ·¯ÇÑ °ÍÀº ¾ÆÁ÷ ÀÌ»óÀûÀÎ »óÅÂÀ̸ç, Çö½ÇÀº ÀÌ¿¡ ÈξÀ ¸ø ¹ÌÄ¡´Â °æ¿ì°¡ ¸¹¾Æ¼­ ¾ÆÁ÷µµ Ç¥ÁØÈ­µÅ ÀÖÁö ¾ÊÀº À̱âÁ¾ ±â¼ú°ú Àåºñ·Î ¿î¿µ°ú »ç¿ë¿¡ ¾î·Á¿òÀ» È£¼ÒÇÏ´Â °ÍÀÌ ºñÀϺñÀçÇÏ´Ù.
It’s no surprise, that disaster recovery planning is undergoing significant changes. The new model seeks to bring everything together onto an IT platform that can ensure smooth disaster recovery and seamless business continuity. It should include data replication, high availability, reliable high-performance backup, continuous data protection, and a verifiable recovery process. At least, that is the ideal for which IT should strive. The reality for most customers falls somewhat short of this goal. Many users struggle with a hodge-podge of disparate technologies that can be a nightmare for the IT administrators to manage. The end goal for anyone in disaster recovery planning should be to one day be able to see and perform all disaster recovery management through a “single pane of glass.”

±×·¡¼­ DR ¼Ö·ç¼ÇÀº ¿©·¯ Á¦Ç°°ú Ç÷§Æû¿¡¼­µµ ¿î¿µÀÌ °¡´ÉÇϵµ·Ï ¸ðµâÈ­µÈ ´Ù °èÃþ Á¢±Ù¹æ¹ý(modular multi-layered approach)À» Æ÷ÇÔÇØ¾ß ÇÏ¸ç ´ÙÀ½°ú °°Àº »çÇ×µéÀ» ÁÖ·Î °í·ÁÇØ¾ß ÇÑ´Ù.
Disaster recovery solutions, then, should include a modular multi-layered approach to data protection that works across products and platforms. Here are seven tips to help make disaster recovery management a reality for almost any business.

1) ¿ì¼±¼øÀ§¸¦ Á¤ÇÔ
µ¥ÀÌÅÍÀÇ Á߿伺¿¡ µû¶ó(¿ªÀÚÁÖ: HW °üÁ¡¿¡¼­ ½ºÅ丮ÁöÀÇ Æ¼¾î(Tier)°³³äÀº »çÀÌÁ ¿ëµµ¿¡ µû¶ó ±¸ºÐÀ» Çϸç, ¿©±â¿¡¼­´Â SW °üÁ¡¿¡¼­ µ¥ÀÌÅÍÀÇ Á߿伺À» ±âÁØÀ¸·Î Â÷º°È­ÇØ °¡Ä¡ Á¤µµ¿¡ µû¶ó¼­ Áß¿äÇÑ Á¤º¸´Â ¼º´É ÁÁÀº ‘Tier One’ ½ºÅ丮Áö¿¡ ÀúÀå, °ü¸®Çϰí Á߿䵵°¡ ¶³¾îÁö´Â °ÍÀº »¡¸® ¹é¾÷ÇØ¼­ Å×ÀÌÇÁ·Î º¸°üÇϰڴٴ ‘Tier Two’ ¶Ç´Â ‘Three’ ¼öÁØÀ¸·Î ±¸ºÐÇÏ¿´À½) º¸°ü, °ü¸®¼öÁØÀ» ´Þ¸®ÇØ È¿°úÀûÀ̰í È¿À²ÀûÀÎ ¿¹»êÁýÇàÀÌ µÅ¾ß ÇÑ´Ù. µû¶ó¼­ µ¥ÀÌÅÍÀÇ Á߿伺°ú °¡Áö°í ÀÖ´Â ½ºÅ丮ÁöÀÇ ¼º´É, ¿ä°ÇÀ» ºÐ¼®, ¿ì¼±¼øÀ§È­ÇØ ¿¬¼Ó¼ºÈ®º¸¿¡µµ Àû¿ëÇØ¾ß ÇÑ´Ù. ¿ì¼±¼øÀ§°¡ ³ôÀº µ¥ÀÌÅÍ´Â CDP¿Í ¿ø°Ý º¹Á¦¸¦ ÅëÇØ º¸È£ÇØ¾ß Çϰí, ¿ì¼±¼øÀ§°¡ ¶³¾îÁö´Â µ¥ÀÌÅÍ´Â µð½ºÅ©, Å×ÀÌÇÁ µîÀ¸·Î ¹é¾÷ÇØ ¿ø°ÝÁö¿¡ º¸°üÇÏ¸é µÈ´Ù.
1) Establish Priorities (Set your Priorities Straight)
Not all data is created equal. Therefore, it is a waste of the budget to use expensive Tier One storage when cheaper Tier Two or Tier Three will suffice. For that reason, it is vital that you evaluate your storage needs and determine what information actually needs to be continuously backed up and always available (such as financial transaction databases). High priority data stores should also be protected by remote replication and CDP (continuous data protection) to enable rapid recovery. Lower priority data, on the other hand, can be backed up and recovered from disk and older data can be moved offline to tape storage. In archiving older data, though, be sure to retain copies of any applications that will be needed to access that data in the future. Otherwise you may run into problems at a later date and be unable to restore this data. Using a multi-level protection approach allows you to apply the right level of protection to your data according to its value to the business, thereby providing appropriate protection while saving money.

2) ºü¸£°í Á¤È®ÇÑ º¹±¸´É·ÂÀ» È®º¸
µ¥ÀÌÅÍ º¹±¸ °üÁ¡¿¡¼­´Â ÀçÇØ, Àå¾Ö¹ß»ý ½ÃÁ¡À¸·Î Á¤È®ÇÏ°í ºü¸£°Ô º¹±¸µÇ´Â °ÍÀÌ ÇʼöÀûÀ̸ç, ±¸ÇöÀÌ °¡´É ÇÏ·Á¸é ¼¼ °èÃþÀÇ º¸È£(three layers of protection)°¡ ÇÊ¿äÇϸç ÀÌ´Â CDP, ½º³À¼¦(snapshots, ½ÃÁ¡¹é¾÷) ±×¸®°í Ç® ¹é¾÷(full backups)À¸·Î ³ª¿­ÇÒ ¼ö ÀÖ´Ù. Ç® ¹é¾÷Àº º¸Åë ÀÏÁÖÀÏ ÀÌ»ó °É¸®¸ç, ½º³À¼¦Àº Ç® ¹é¾÷ °£ ƯÁ¤ ½ÃÁ¡À» ¹é¾÷, °ü¸®ÇÑ´Ù. ÇÑÆí, CDP´Â ÀϹÝÀûÀÎ ¹é¾÷ÀÌ ÀϺ° ±â¹ÝÀ¸·Î ¼öÇàµÇ´Â °Í°ú ´Þ¸® CDP´Â ÇÊ¿ä·Î ÇÏ´Â ½ÃÁ¡ ȤÀº Áֱ⿡ µû¶ó ¼ö½Ã·Î µ¥ÀÌÅ͸¦ ¹é¾÷ÇØ µ¥ÀÌÅÍÀÇ °¡¿ë¼ºÀ» ±Ø´ëÈ­Çϰí ÃÖ½ÅÀÇ µ¥ÀÌÅÍ·Î ½Å¼ÓÈ÷ º¹±¸ÇÒ ¼ö ÀÖ´Ù.
2) Establish Rapid, Pinpoint Recovery Capability
For critical data stores, it is essential that you have the capability to quickly return to an exact point in time to restore the data as it existed at that time. Implementation of this requires three layers of protection: CDP, snapshots and full backups. A full backup is typically done over the weekend. Snapshots are taken at specified points between backups. CDP, on the other hand, provides continuous byte-by-byte replication of data changes giving the greatest amount of protection between snapshots and backups - minimizing any negative business impact associated with extended downtime.

3) µ¥ÀÌÅÍ º¹±¸ Å×½ºÆ®¸¦ ¼öÇà - ÁÖ±âÀûÀ¸·Î Ç×»ó
¸¸¾à º¹Á¦, º¸°üµÅ ÀÖ´Â ¹é¾÷µ¥ÀÌÅͰ¡ ¸Á°¡Á®¼­ À̸¦ °¡Áö°í ¾÷¹«¿Í ½Ã½ºÅÛÀ» º¹±¸, ȯ¿øÇÒ ¼ö ¾ø´Ù¸é »ç½Ç ¹é¾÷½Ã½ºÅÛÀº ¹«¿ëÁö¹°ÀÌ µÈ´Ù. ÇÏÁö¸¸ ½ÇÁ¦·Î ÀÌ·¯ÇÑ °æ¿ì°¡ ¸¹ÀÌ ÀϾ±â ¶§¹®¿¡, ÁÖ±âÀû(ºÐ±â³ª ¿¬°£ÀÌ ¾Æ´Ñ ÀϺ° ¶Ç´Â ÁÖ º°·Î ÀÚÁÖ ÇÏ´Â °ÍÀÌ ¹Ù¶÷Á÷)À¸·Î µ¥ÀÌÅÍ ¹é¾÷ Å×½ºÆ®°¡ ÁÖ»ç¾÷Àå°ú ´ëü»ç¾÷ÀåÀ» ¸ðµÎ¸¦ ´ë»óÀ¸·Î ÀçÇØº¹±¸½Ã½ºÅÛ(DR systems)À» °¡µ¿°ú ¿¬°èÇØ ¼öÇàÇØ¾ß ÇÑ´Ù.
3) Test Your Data Recovery - Always
Back-up systems are worthless if the copied data cannot be restored. Yet all too frequently, this turns out to be the case. Non-disruptive tests should be run regularly (daily and weekly, not quarterly or yearly) on DR systems at both the primary and secondary locations. These tests should be conducted while systems are online and continually replicate and back-up any changes without impacting users and processes. Don’t wait until after a disaster to find out that the backup files are corrupted and unusable. Frequent testing is the best way to avoid the unexpected during disaster recovery and give both IT and business execs peace of mind.

4) ÅëÇÕÁ¤¸®, ±×¸®°í º¹Á¦ ¼öÇà
µ¥ÀÌÅͼ¾ÅÍÀÇ ¹é¾÷Àº ÃÖ¼ÒÇÑ ¹Ýµå½Ã ÇØ¾ß ÇÏ´Â ¿ä°ÇÀ̾úÁö¸¸ Á¡Â÷ ½Ã½ºÅÛȯ°æÀÌ ºÐ»êÈ­µÇ°í ¼ö¸¹Àº Áö»ç¿Í ¿ø°ÝÁö »ç¾÷ÀåÀ» ¿î¿µÇϸ鼭 ÀÌÁ¦´Â À̰͸¸ °¡Áö°í´Â ÃæºÐÄ¡ ¾Ê´Ù. ¶ÇÇÑ ¸¹Àº ÀÓÁ÷¿øÀÌ VPNÀ» ÀÌ¿ëÇØ ȸ»ç ½Ã½ºÅÛ°ú ³×Æ®¿öÅ©¸¦ Á¢±ÙÇØ ¾÷¹«¸¦ Çϰí ÀÖÀ¸¸ç, ÀçÅñٹ«¿Í ¹«¼±·£ÀÌ ÀåÂøµÈ ³ëÆ®ºÏ»Ó ¾Æ´Ï¶ó ºí·¢º£¸®, PDA, ½º¸¶Æ®ÆùÀ» Ȱ¿ëÇØ ¿ø°Ý/À̵¿ ¾÷¹«¸¦ ÇÏ´Â °æ¿ìµµ °è¼Ó Áõ°¡Çϰí ÀÖ´Ù. ÀÌ·¯ÇÑ ¾÷¹«µéÀ» ÅëÇØ »ý°Ü³ª´Â µ¥ÀÌÅ͵éÀº ÁÖ±âÀûÀ¸·Î º»ºÎ¿¡¼­ ¹é¾÷À» ÇØ¾ß Çϸç, Àå¼Ò¿Í »ó°ü¾øÀÌ µ¥ÀÌÅÍ´Â º¸È£µÅ¾ß ÇÒ Çʿ伺ÀÌ Ä¿Áö°í ÀÖ´Ù. ÀÌ·¯ÇÑ ¿ä°ÇµéÀº Å×ÀÌÇÁ¸¦ ÅëÇØ ¹é¾÷ÇÏ´Â ¿©·¯ ±â¼ú¹æ½ÄÀ» »ç¾çÈ­½Ã۰í ÀÖÀ¸¸ç µ¥ÀÌÅ͵éÀ» ÅëÇÕÇØ Áß¾Ó µ¥ÀÌÅͼ¾ÅÍ¿¡ ¿ø°Ý º¹Á¦ÇÏ´Â ¿©·¯ ±â¼úµéÀÇ ¹ßÀü°ú ÀÌÀÇ Àû¿ë, Ȱ¿ë »ç·Ê¸¦ Áõ´ë½Ã۰í ÀÖ´Ù.
4) Consolidate and Replicate
Backing up the data center is the minimum requirement. In today’s distributed, mobile environment, however, that simply isn’t enough. Companies in the U.S. alone have more than one million remote offices and branch offices (ROBOs). In addition there are all the employees who utilize a VPN from their home office, mobile workers with laptops, plus all the blackberries, PDAs, smart phones, and thumb drives that may contain corporate data. All remote data needs to be backed up to the central office on a regular basis. Data, regardless of location, needs to be protected. Using remote replication to consolidate data to a central data center also provides benefits and safety nets. It allows for tape-less ROBOs, eliminates risks associated with tape transport issues and the need for specialized IT personal - protecting all your data while reducing your risk and saving you money.

5) ¿ø°Ý º¹Á¦ - ¿ø°ÝÁö»ç¹«½ÇÀÇ ÀÌÁß È°¿ë
ƯÁ¤ ¿ø°Ý»ç¹«½Ç/»ç¾÷ÀåÀ» ¾÷¹«¼öÇà Àå¼Ò»Ó ¾Æ´Ï¶ó DR »çÀÌÆ®·Î ÁöÁ¤ÇØ Áß¾Ó µ¥ÀÌÅͼ¾ÅͷκÎÅÍ µ¥ÀÌÅ͸¦ ¹é¾÷ÇÏ´Â °Íµµ ÁÁÀº ¾ÆÀ̵ð¾îÀÏ ¼ö ÀÖ´Ù. ¶ÇÇÑ DR ½Ã¼³ÀÇ ±¸Ãà¿¡´Â ¸¹Àº ºñ¿ëÀÌ µé±â ¶§¹®¿¡, ´ë¾ÈÀ¸·Î ÄÚ·ÎÄÉÀ̼Ç(co-location, ¿ªÀÚÁÖ: »ó¿ë IDC ¼¾ÅÍÀÇ ¼­ºñ½º¸¦ ÀÌ¿ëÇÏ´Â °ÍÀ¸·Î µ¥ÀÌÅͼ¾ÅÍ ¿î¿µ Àü¹®È¸»ç¿¡¼­ Á¦°øÇÏ´Â Ãʰí¼Ó ³×Æ®¿öÅ©, Àü¿ë°ø°£, ¼­¹ö°ü¸® ¹× ¿î¿µ Áö¿ø ¼­ºñ½º¸¦ Á¦°ø¹ÞÀ» ¼ö ÀÖ¾î ´õ ³ª¾Æ°¡¼­´Â ³×Æ®¿öÅ©, ½Ã½ºÅÛÀÇ ¾Æ¿ô¼Ò½Ì±îÁöµµ °¡´É) ½Ã¼³À» ÀÌ¿ëÇÏ´Â °Íµµ ´ë¾ÈÀ¸·Î »ý°¢ÇÒ ¼ö ÀÖ´Ù.
5) Establish Remote Replication - Dual Use of ROBOs
It’s a smart move to designate one or more remote or branch offices as a DR site and replicate data from the primary data center to those locations. Alternately, instead of using a remote office as a DR site, you can use a co-location facility. Remember that you may need to add bandwidth or use a WAN optimization appliance to facilitate full replication. DR facilities can be very costly, so dual use of ROBOs for DR is just smart business ? it delivers shared efficiencies and cost savings.

6) ƯÁ¤ Ç÷§Æû¿¡ ±¸¾ÖµÇÁö ¾ÊÀ½
¹é¾÷°ú º¹±¸¼Ö·ç¼ÇÀ» ¼±ÅÃ, µµÀÔÇÏ´Â °æ¿ì¿¡ Çϵå¿þ¾î¿Í OS(À©µµ¿ì, ¸®´ª½º µî)¿Í °°Àº ¼ÒÇÁÆ®¿þ¾î°¡ ƯÁ¤ Ç÷§Æû(¿ªÀÚÁÖ: ¿î¿µÃ¼°è(OS), ÄÄÇ»ÅÍ ½Ã½ºÅÛÀÇ º¸Á¶ ÇÁ·Î±×·¥, ±×¸®°í ¸¶ÀÌÅ©·ÎÇÁ·Î¼¼¼­, ³í¸®¿¬»êÀ» ¼öÇàÇϰí, ÄÄÇ»ÅÍ ³»ÀÇ µ¥ÀÌÅÍ À̵¿À» °üÀåÇÏ´Â ¸¶ÀÌÅ©·Î Ĩ µîÀ¸·Î ±¸¼º)¿¡ ÀÇÁ¸Çϰųª Á¦ÇѵÇÁö ¾Ê¾Æ¾ß ÇÑ´Ù. DR ¼Ö·ç¼ÇÀº ¿©·¯ ÇüÅÂÀÇ ¹°¸®Àû °¡»óÈ­ ¼­¹ö ¾ÆÅ°ÅØÃ³»Ó ¾Æ´Ï¶ó SAN(Storage Area Networks, ¿ªÀÚÁÖ: FC(±¤)¸¦ ÀÌ¿ëÇÑ ½ºÅ丮Áö·Î ½ºÅ丮Áö¿Í ¼­¹ö, ½ºÅ丮Áö °£ ³×Æ®¿öÅ©¸¦ ÀǹÌÇϸç NAS: Network Attached Storage¿¡ ºñÇØ °í¼º´É¿¡ °í°¡ÀÇ ¼Ö·ç¼ÇÀÓ), °¡»óÈ­ Å×ÀÌÇÁ ¶óÀ̺귯¸® µîÀ» ¼ö¿ëÇÒ ¼ö ÀÖ¾î¾ß ÇÑ´Ù.
6) Be an Agnostic
Select a back-up and recovery solution that is both hardware and operating system agnostic. Even if you currently consider yourself a Windows or Linux shop, you don’t want to limit your future options by only being able to backup a certain platform. The DR software must also be able to fluidly accommodate different physical and virtualized server architectures as well as storage area networks, network attached storage, and virtual tape libraries. Maintaining similar infrastructures at your DR site can be very costly and limiting. A more cost-effective alternative is any-to-any replication, which gives you exceptional freedom and flexibility when it comes to setting up and maintaining your DR environment.

7) º¹ÀâÇÏÁö ¾Ê¾Æ¾ß ÇÔ
¸ðµâÈ­µÅ ÀÖÀ¸¸é¼­µµ ÅëÇÕµÈ DR ¼Ö·ç¼ÇÀ» Ȱ¿ëÇÏ´Â °ÍÀÌ ÇÊ¿äÇÏ´Ù. ¿©·¯ º¹ÀâÇÑ ´ÜÀ§¼Ö·ç¼ÇÀÇ ÁýÇÕü·Î ÀÌ·ïÁö´Â °æ¿ì¿¡´Â º¹±¸½ÇÆÐ µî ¹®Á¦¹ß»ý ½Ã Ã¥ÀÓ¼ÒÀç°¡ ¸íÈ®ÇÏÁö ¾Ê´Ù.
7) Keep it Simple
Use a modular yet integrated DR solution rather than trying to cobble one together yourself. When you have a data disaster, the last thing you need is vendor finger pointing as to who is to blame for a failed recovery. It’s always best to deal with one vendor who has full responsibility for making it work.

ÇѰ¡Áö ´ÙÇེ·¯¿î »ç½ÇÀº ±â¼úÁøº¸·Î ÀÎÇØ Á¾ÇÕÀûÀ̰í ÅëÇÕµÈ ÀçÇØº¹±¸½Ã½ºÅÛÀ» ±¸ÇöÇÏ´Â °ÍÀÌ Á¡Á¡ °¡´ÉÇØÁö°í ÀÖ´Ù´Â °ÍÀÌ´Ù. µð½ºÅ© ½ºÅ丮Áö´Â ½Ã°£ÀÌ Áö³²¿¡ µû¶ó °è¼Ó Àú·ÅÇØÁö°í ÀÖ°í µ¥ÀÌÅÍ Áߺ¹Á¦°Å(de-duplication, ¿ªÀÚÁÖ: ¹é¾÷ ÆÄÀÏ ÀúÀå ½Ã Áߺ¹µÈ ºÎºÐÀ» Á¦°ÅÇÑ ÈÄ ÀúÀåÇÔ) ±â¼ú, WAN ºñµ¿±â µ¥ÀÌÅÍ º¹Á¦ ¿ª·®(WAN asynchronous data replication capabilities), ±×¸®°í WAN °¡¼Ó Àåºñ ±â¼úÀ» ÅëÇØ ¿ø°Ýº¹Á¦¸¦ È¿°úÀûÀ̰í È¿À²ÀûÀ¸·Î °¡´ÉÄÉ Çϰí ÀÖ´Ù. ÀÌÁ¦ ´õ ÀÌ»ó ÅëÇÕµÈ DRÀº ºñ½ÎÁö¸¸ °¡Áö°í ÀÖÀ¸¸é ÁÁÀº(nice-to-have) °ÍÀÌ ¾Æ´Ï¶ó ÃæºÐÈ÷ Ȱ¿ë °¡´ÉÇÏ°í ¾øÀÌ´Â Àý´ë »ì ¼ö ¾ø´Â º¸Çè(insurance policy)ÀÎ ¼ÀÀÌ´Ù.
Maturing Field
The good news is that it has never been easier to set up a comprehensive and integrated disaster recovery system than it is today. Disk storage prices have plummeted in recent years; data deduplication, over the WAN asynchronous data replication capabilities and WAN acceleration appliances have reduced the size of pipelines needed for remote replication making DR affordable and possible. Today vendors can offer a mature set of feature-rich disaster recovery products and provide you with a complete DR solution. Therefore, integrated DR is no longer an expensive nice-to-have. In fact, DR is very much an insurance policy you can afford and cannot afford to do without.

 


±â°íÀÚ: ÆÐƼ ´í
¹ø¿ª: À¯Á¾±â, Deloitte ¾ÈÁøÈ¸°è¹ýÀÎ ±â¾÷¸®½ºÅ©ÀÚ¹®º»ºÎ ¸Å´ÏÀú, ¿µ±¹ BCI(Business Continuity Institute) Çѱ¹´ëÇ¥, BS 25999 Technical Expert (registered by BSI)
Patty Then is principal product marketing manager for CA’s recovery management solution. Then has more than 25 years of IT industry experience and has worked in various capacities including technical systems engineering, management, sales, and education.

 

ÆíÁý±¹ÀÇ ´Ù¸¥±â»ç º¸±â  
¨Ï Àç³­Æ÷Ä¿½º(http://www.diofocus.com) ¹«´ÜÀüÀç ¹× Àç¹èÆ÷±ÝÁö | ÀúÀ۱ǹ®ÀÇ   

     
Àüü±â»çÀǰß(0)  
      ÀÚµ¿µî·Ï¹æÁö¿ë Äڵ带 ÀÔ·ÂÇϼ¼¿ä!   
 
   * 200ÀÚ±îÁö ¾²½Ç ¼ö ÀÖ½À´Ï´Ù. (ÇöÀç 0 byte/ÃÖ´ë 400byte)
   * ¿å¼³µî ÀνŰø°Ý¼º ±ÛÀº »èÁ¦ ÇÕ´Ï´Ù. [¿î¿µ¿øÄ¢]
Àüü±â»çÀǰß(0)
°¡Àå ¸¹ÀÌ º» ±â»ç
ÇØÆÄ¸®µµ ÀÌÁ¦ ¡®ÀÚ¿¬Àç³­¡¯, ¹Ù´Ù...
¡°Åä¾çÇÔ¼ö·® 60%¿¡µµ »ê»çÅ¡±,...
ÇÑ´«À¸·Î º¸´Â 6¿ù 13ÀÏÀÚ Àç³­...
¡°»êÀÌ ¸ÕÀú ¸»ÇØÁش١±, ±¹¸³°ø¿ø...
"Áøµå±â¡¤¸ð±â, ´õ ¿À·¡¡¤´õ ³Ð°Ô...
¡°¹Ù´Ù±îÁö ¿À¿°½Ãų ¼ø ¾ø´Ù¡±, ...
¡°33µµ ³ÑÀ¸¸é 2½Ã°£¸¶´Ù È޽ġ±...
ÇÑ´«À¸·Î º¸´Â 6¿ù 12ÀÏÀÚ Àç³­...
Àå¸Àºñ´Â ½ÃÀ۵ƴµ¥, ¡®Ä§¼ö ¾Ç¸ù...
¹Ýº¹µÇ´Â Àü·ÂÇöÀå Âü»ç, ¾ðÁ¦±îÁö...

°³ÀÎÁ¤º¸Ãë±Þ¹æÄ§ û¼Ò³âº¸È£Á¤Ã¥ ȸ»ç¼Ò°³ Á¤±â±¸µ¶ ±¤°í¹®ÀÇ ÀÌ¿ë¾à°ü À̸ÞÀϹ«´Ü¼öÁý °ÅºÎ
ÁÖ¼Ò: (¿ì) 07402 ¼­¿ï ¿µµîÆ÷±¸ °¡¸¶»ê·Î46°¡±æ 9, 2Ãþ ¤ý TEL) 02-735-0963 ¤ý FAX) 02-722-7073
ÀÎÅͳݽŹ® µî·Ï¹øÈ£:¼­¿ï¾Æ00353 ¤ýµî·Ï¿¬¿ùÀÏ:2007³â 4¿ù 16ÀϤý ¹ßÇàÀÎ:¤ý ÆíÁýÀÎ:
û¼Ò³âº¸È£Ã¥ÀÓÀÚ:
Copyright ¨Ï 2007 Daily À§±â°ü¸®°æ¿µ All Rights Reserved. mail to admin@di-focus.com