A Glossary of CRM Security-Related Terminology

  • by Judith M. Myerson , Systems Engineer and Architect/Owner
  • December 17, 2012
Here is list of CRM security terms that you will find useful in helping you understand the concept using backup and recovery in depth.

Backup and recovery in depth refers to the strategy of creating multiple layers of recovery parameters (rather than a single layer) to better back up and recover the SAP CRM infrastructure in case of a major system or data issue. Parameters such as a recovery point objective, recovery time objective, and maximum tolerable downtime are all part of an in-depth backup and recovery strategy for SAP CRM. The benefit of this strategy is that if a layer in layered backup fails, another one can take over — or the system returns to a previous layer and updates it before continuing to other aspects of the layered backup.

An organization often needs more than the standard practices for backing up and restoring SAP CRM databases to comply with data retention policies for industries such as retail, health care, energy services, manufacturing, and media. A standard backup and recovery strategy usually includes backup sources, destinations, frequency, and scheduling, as well as security policies. It does not include multiple layers of recovery parameters to measure the effectiveness of backing up and recovering data in each layer. Some examples of the benefits of a multi-layer backup and recovery strategy include cost savings, risk mitigation process improvement, offsite storage, and the security of continuous backup. Following is a list of helpful terms to help you understand this topic.

Judith M. Myerson

Judith M. Myerson is a systems architect and engineer and an SAP consultant. She is the author of the Enterprise System Integration, Second Edition, handbook, RFID in the Supply Chain: A Guide to Selection and Implementation, and several articles on enterprise-wide systems, database technologies, application development, SAP, RFID technologies, project management, risk management, and GRC.

See more by this author


Comments

No comments have been submitted on this article. 


Please log in to post a comment.

To learn more about subscription access to premium content, click here.