Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementSecurity Enterprise Services

Standby Virtual Desktops: A Foundation for a Sound Business Continuity Plan

By Michael Abboud
Standby Virtual Desktops - Security Magazine
April 10, 2018

Natural disasters such as floods, earthquakes, and snowstorms often restrict, if not put a complete halt on, business operations – many times without warning. These outages and disruptions result in millions of dollars in cleanup and lost business. Natural disasters matched with the myriad of cyberthreats, data breaches, human error and hardware malfunction only add to the possibility that a business will experience some type of costly outage or disruption.

According to Gartner, the average cost of IT downtime is $5,600 per minute. Using this figure, what is the impact of a disruption on your business if down for an hour, day, or even a week? Whatever the number, it validates the need to have a business continuity plan. Every business should have one, regardless of their size.

Disaster recovery and business continuity are often thought to be synonymous. As a provider of private cloud solutions, my company’s mantra is “business continuity, not disaster recovery,” as there is a difference.

Disaster recovery focuses on the IT infrastructure of an organization, providing a plan to recover from an outage. Business continuity, on the other hand, focuses on ensuring the entire organization is running at full capacity even when an outage occurs.

Business continuity does not have to be complex, nor should it burn a hole in your IT budget. Standby virtual desktops offer a sensible alternative to maintaining and updating physical desktop computer infrastructures – at a fraction of the cost.

 

Leveraging Cloud-Hosted Desktops

As the IT landscape continues to evolve, traditional desktops considered as part of a business continuity plan are no longer a viable option for organizations. Not only are they costly and extremely maintenance-heavy, they cannot fully support the changing business requirements, especially with respect to security.

By moving to standby virtual desktops via a private cloud environment, enterprises can quickly realize all the benefits of centralized management, enhanced data security and simplified deployment without the steep costs, restrictions or inconveniences.

Remote access is also supported to aid business continuity initiatives and mitigate the risk of downtime. Standby virtual desktops are pre-configured and always ready to perform – even when your office facilities are not. This ensures your employees do not miss a beat as they are able to remain “business as usual” during an outage.

 

Benefits of a True Virtual Infrastructure

Complications associated with designing, enforcing and supporting virtual desktops are a thing of the past. Cloud-hosted virtual desktops come preconfigured and provide the capability to be implemented seamlessly, ready to go at a moment’s notice. This approach reduces the cost traditionally associated with physical desktop maintenance and can minimize the need for technical expertise.

Employees are no longer tethered to any physical device, location or internet connection. Users are provided the capability to start working in one location on one device and seamlessly pick back up where they left off from any device or location; enabling the mobility and flexibility organizations require, without hindering performance, security or compliance.

By taking advantage of standby virtual desktops, organizations are equipped with a proper business continuity solution before an outage or cyberthreat looks to compromise business operations. When disaster strikes, will you and your organization be ready?

KEYWORDS: business continuity cloud computing emergency response

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Michael Abboud is the CEO and Founder of TetherView, a provider of private cloud environments including virtual desktops and virtual servers. He has over 20 years of business technology, healthcare and real estate development experience – with a focus in moving businesses to the cloud and educating stakeholders on how to properly address cyber threats. Abboud studied at NYU and St. Johns.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • coronavirus

    Gartner: A 5-Phase Approach for Resilient Business Continuity Models during Coronavirus Disruptions

    See More
  • Plan Surveillance Placement in a Virtual Environment

    See More
  • SEC0820-Cover-Feat-slide1_900px

    Managing Risk, Business Continuity and Resiliency during a Pandemic

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing