The biggest flaw in any DR plan is that it tends to focus on systems: planning for hardware and network services, defining RTOs and RPOs, and testing backing and recovery processes.
In years past, there were few options for providing Disaster Recovery (DR) services for end-user computing. For many businesses, the desktop DR strategy was to transition to employee-owned devices connected to core business systems over residential Wi-Fi networks. While this approach may have been simple and cheap, it also presented significant security concerns. Insecure devices on insecure networks can never be made secure. Something better was needed. At that time, the hot EUC technology was VDI, but as a DR solution, VDI made sense only if you were already using it as part of your overall desktop strategy.
DaaS, on the other hand, offered all the benefits of VDI while bypassing both the upfront capital investment and the hard work of implementing and maintaining the underlying platform. Needless to say, that’s where a lot of the smart money ended up. But that was several years ago. Times change, and there’s a problem with DaaS (and, more critically, with DaaS for DR) that is increasingly difficult to ignore.
When looking through the prism of today’s threat matrix, using DaaS for DR falls short. Conventional security models operate on the assumption that everything on the inside of an organization’s network can be trusted, and that assumption is being challenged by increasingly sophisticated attacks and insider threats. Most DaaS implementations are physically hosted in the cloud, but they logically reside inside the enterprise network perimeter and are firmly bound to perimeter-based security models.
The biggest flaw in any DR plan is that it tends to focus on systems: planning for hardware and network services, defining RTOs and RPOs, and testing backing and recovery processes. This approach does not take into consideration that something may be needed to replace the physical workplace or physical office space when disaster strikes.
Tehama is more than DaaS. It is a secure service delivery platform, designed to enable enterprise to rapidly engage the contingent workforce, while protecting both customer and service provider from the consequences of today’s sophisticated attacks and insider threats.
When disaster strikes and your physical workplace is unavailable, Tehama is a secure, compliant solution that helps in the following ways:
- Provides a backup virtual workplace on-demand when a disaster has struck your physical workspace.
- When physical access is no longer available, work may still continue because you can access your corporate systems remotely.
- Detailed logging and auditing ensure that only your employees have access to what they need and you maintain granular control over the remote work environment.
Solutions built to conform to yesterday’s security architecture are no defense against today’s threats. And an increasing number of businesses are looking to a security architecture to protect sensitive data and improve their ability to defend against today’s cyber threats. Tehama is here to help.
Benefit from Tehama’s
SOC 2 Type II compliant platform which comes with 105 SOC controls already built-in.
Deep forensic auditing and compliance for secure access and monitoring of a global workforce 24 x 7.
Launch “ready-to-work” complete and productive work environments — in minutes, not months.
Eliminate credential theft and lateral network movement associated with VPN access.
Reduce costs and delays by avoiding IT infrastructure procurement and deployment.