Disaster Recovery Architecture
A global company that draws its success from technological innovation, the highest quality standards and the passion and energy of its employees. This manufacturing company continuously focuses on new developments and industry solutions in order to offer its customers sustainable competitive advantages.
The company has stood for innovative automation in various industries for many years.
Business Challenge
The company was not adequately protected against ransomware attacks. Although a security concept was in place, the risk of production downtime could not be completely eliminated. This threat was constantly present and required urgent action to ensure the security and continuity of operations. In addition, the permanent threat is also constantly present in the media, which has also increased interest within the company.
Solution
Basically, IT disaster recovery management defines the technical strategies, capabilities, plans and processes to achieve the defined business recovery plans. This includes a wide range of activities aimed at ensuring business continuity in the event of a catastrophic event.
The KBC IT Disaster Recovery Architecture goes one step further and covers all relevant areas to realize a comprehensive solution. The KBC IT Disaster Recovery Architecture seamlessly integrates these three areas to create a holistic solution that better protects the organization from the impact of ransomware attacks and other catastrophic events while ensuring business continuity.
Consulting
- Business impact analysis
- IT contingency plan
- Gap analysis to industry standards
- Governance process design
Infrastructure
- Continuity/disaster recovery solution
- Detailed planning of the target architecture
- Infrastructure (servers, storage, licenses, connectivity) on-premises or in the cloud
- Periodic restore tests and creation of recovery reports
Security
- Round-the-clock support from the KBC Cyber Defense Center
- Analysis of Windows systems
- Linux live analysis
- Analysis of security-relevant log data
- Analysis of data, declaration of detected security-relevant threats