Prevent a Data Disaster with Backup, Restore, and Recovery Strategies

  • by Kehinde Eseyin, Security Architect
  • September 25, 2009
Review some best practices that should be adopted when you plan and implement a strategy for data protection in an SAP CRM system landscape.
Key Concept

An effective backup, restore, and recovery strategy is vital to an organization because data is one of the building blocks of a business. Backup, restore, and recoveryactivities ensure that an organization can get back on track within a reasonable amount of time in the event of a disaster — without compromising the integrity of the database. The adoption of a data loss strategy is crucial for the SAP CRM system landscape because permanent loss of sensitive business data such as customer balances, sales data, and profitability reports due to physical errors, logical errors, or external factors can have adverse legal, regulatory, and business implications on a company.

The SAP CRM system landscape is a complex infrastructure with many components that are integrated with the SAP CRM server. These components include the SAP ERP back-end system, the Communication Station, Software Agent Framework (SAF), the Mobile Application Studio (MAS), the Mobile Application Repository (MAR), and the CRM Mobile Client. Some of these components have a different database than the SAP CRM server. As a result, managing backup, restore, and recovery operations can be challenging, especially as they relate to data volume, sources, repositories, integrity, and consistency. If appropriate strategies are not in place, it can lead to the loss of data and system downtime. Therefore, it is expedient to build and implement a strategy that is well-poised to handle these challenging areas.

Kehinde Eseyin

Kehinde Eseyin is a security architect. He holds a bachelor’s degree in computer science. He has about 12 years of IT security, governance framework, IS risk, and compliance experience gained by working in numerous global organizations. Over the years, he has demonstrated competencies in security design, information assurance, cyber security, data privacy, threat and vulnerability management, penetration testing, business architecture, project management, IT audit, IS controls framework, and identity and access management.

See more by this author


No comments have been submitted on this article. 

Please log in to post a comment.

To learn more about subscription access to premium content, click here.