{"id":13331,"date":"2020-08-26T15:00:46","date_gmt":"2020-08-26T18:00:46","guid":{"rendered":"https:\/\/ostec.blog\/?p=13331"},"modified":"2020-10-02T10:45:07","modified_gmt":"2020-10-02T13:45:07","slug":"high-availability-how-and-when-to-use","status":"publish","type":"post","link":"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/","title":{"rendered":"High availability, understand how and when to use it"},"content":{"rendered":"<p>Most organizations treat information as the most valuable asset to their business, justifying increasingly aggressive investments in technologies to ensure their security and availability. The challenges in this regard are innumerable, involving a wide range of logical factors, and physical resources, so that satisfactory levels of information availability in organizations are reached.<\/p>\n<p>To confirm the above, it is worth rescuing the three basic pillars of Information Security (SI), which are confidentiality, <em>integrity<\/em> and availability of information. In this post, we will describe essential points related to the maintenance of <em>availability<\/em>, as a fundamental item of the security strategy, in a corporate environment.<\/p>\n<h2>High availability and redundancy.<\/h2>\n<p>The concept of <strong>high availability<\/strong> is associated with the uninterrupted operation of technological assets used in the organization&#8217;s daily operations. In corporate environment, the term used is high availability (HA). Most of the companies do not apply high availability concepts in their day-to-day; however, the informatization of the processes makes HA become a reality in an increasing number of companies, including smaller ones. On the other hand, organizations dealing with critical business processes should treat <strong>high availability<\/strong> as a critical success factor, seeking to maintain and monitor it frequently.<\/p>\n<p>The concept of redundancy is synergistic with <strong>high availability<\/strong> and refers to the ability to bypass failures by applying redundant assets in the company&#8217;s structure. The redundant assets have the function of assuming the function of the primary assets, in case of unavailability. A technology ecosystem has several assets, such as routers, switches, <a href=\"https:\/\/blog.ostec.com.br\/seguranca-perimetro\/firewall-conceito-terminologia\">firewalls<\/a>, servers, among others, and these should be evaluated when implementing a redundant structure.<\/p>\n<h2>Difficulties of implementation<\/h2>\n<p>Highly available environments require substantial investment for their structuring. Undoubtedly, having an environment with <strong>high availability<\/strong> and redundancy concepts requires not only well-organized internal processes but also investments to duplicate much of the organization&#8217;s physical\/logical structure, including firewalls, internet circuits, switches, servers, arrays, among others. While requiring high investments, <strong>HA<\/strong> is essential for certain types of business.<\/p>\n<p>Many companies enable investments in <strong>HA<\/strong> environments based on the economy generated by the possible unavailability of services offered to internal employees and customers. The costs involved in the unavailability of the operation go from the inside out, including idle employees, customers without access to services, loss of credibility and legal proceedings. Therefore, it is important for managers to verify how much downtime, during which period the company&#8217;s operation will be unavailable, the company can support and analyze in detail the cost generated by the unavailability vs. the investments to deploy a <strong>HA<\/strong> environment. It will bring visibility to evaluate investments in structures, <strong>appropriately available<\/strong>, according to the reality of each business.<\/p>\n<h2>The importance of information availability<\/h2>\n<p>Nowadays, companies are increasingly dependent on information, creating a high dependence on the technological assets that underpin their operation. Any failure or unavailability of these components can cause incalculable damage to the business. Therefore, it is important that managers devise strategies to minimize the impact caused by technological failures, creating adequate environments for the reality of their company, reducing to the maximum the impacts generated by the unavailability of services critical to the business.<\/p>\n<p>Do you know how much downtime does your company tolerate? How is your IT <strong>high availability<\/strong> strategy? Tell us your opinion, questions and experiences in the comments!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most organizations treat information as the most valuable asset to their business, justifying increasingly aggressive investments in technologies to ensure their security and availability. The challenges in this regard are innumerable, involving a wide range of logical factors, and physical resources, so that satisfactory levels of information availability in organizations are reached. To confirm the [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":12857,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[984],"tags":[],"class_list":["post-13331","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>High availability, understand how and when to use it - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"description\" content=\"High availability in corporate environments, understand the difficulties for its implementation and its importance for business continuity. Check it out!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"High availability, understand how and when to use it - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"High availability in corporate environments, understand the difficulties for its implementation and its importance for business continuity. Check it out!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-26T18:00:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-02T13:45:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/02\/cabo-conectado-em-modem.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thais Souza\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/\"},\"author\":{\"name\":\"Thais Souza\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33\"},\"headline\":\"High availability, understand how and when to use it\",\"datePublished\":\"2020-08-26T18:00:46+00:00\",\"dateModified\":\"2020-10-02T13:45:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/\"},\"wordCount\":550,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/02\/cabo-conectado-em-modem.jpg\",\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/\",\"url\":\"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/\",\"name\":\"High availability, understand how and when to use it - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/02\/cabo-conectado-em-modem.jpg\",\"datePublished\":\"2020-08-26T18:00:46+00:00\",\"dateModified\":\"2020-10-02T13:45:07+00:00\",\"description\":\"High availability in corporate environments, understand the difficulties for its implementation and its importance for business continuity. Check it out!\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/02\/cabo-conectado-em-modem.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/02\/cabo-conectado-em-modem.jpg\",\"width\":928,\"height\":534,\"caption\":\"Cabo conectado em modem\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"High availability, understand how and when to use it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33\",\"name\":\"Thais Souza\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g\",\"caption\":\"Thais Souza\"},\"url\":\"https:\/\/ostec.blog\/en\/author\/thais-souza\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"High availability, understand how and when to use it - OSTEC | Seguran\u00e7a digital de resultados","description":"High availability in corporate environments, understand the difficulties for its implementation and its importance for business continuity. Check it out!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/","og_locale":"en_US","og_type":"article","og_title":"High availability, understand how and when to use it - OSTEC | Seguran\u00e7a digital de resultados","og_description":"High availability in corporate environments, understand the difficulties for its implementation and its importance for business continuity. Check it out!","og_url":"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2020-08-26T18:00:46+00:00","article_modified_time":"2020-10-02T13:45:07+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/02\/cabo-conectado-em-modem.jpg","type":"image\/jpeg"}],"author":"Thais Souza","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/"},"author":{"name":"Thais Souza","@id":"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33"},"headline":"High availability, understand how and when to use it","datePublished":"2020-08-26T18:00:46+00:00","dateModified":"2020-10-02T13:45:07+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/"},"wordCount":550,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/02\/cabo-conectado-em-modem.jpg","articleSection":["General"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/","url":"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/","name":"High availability, understand how and when to use it - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/02\/cabo-conectado-em-modem.jpg","datePublished":"2020-08-26T18:00:46+00:00","dateModified":"2020-10-02T13:45:07+00:00","description":"High availability in corporate environments, understand the difficulties for its implementation and its importance for business continuity. Check it out!","breadcrumb":{"@id":"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/02\/cabo-conectado-em-modem.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/02\/cabo-conectado-em-modem.jpg","width":928,"height":534,"caption":"Cabo conectado em modem"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/en\/general\/high-availability-how-and-when-to-use\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/en\/"},{"@type":"ListItem","position":2,"name":"High availability, understand how and when to use it"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33","name":"Thais Souza","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g","caption":"Thais Souza"},"url":"https:\/\/ostec.blog\/en\/author\/thais-souza\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/13331","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/comments?post=13331"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/13331\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media\/12857"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media?parent=13331"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/categories?post=13331"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/tags?post=13331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}