BCMS - Business Continuity Management System

Home » Technology » New Technologies » DST-Lockheed Martin India Innovation » Business Continuity Management System

Technology Description

Business and technology environments are increasingly complex and the reliance upon information technology has become embedded into the success strategies of most organizations. The capacity to respond to situations both planned and unexpected which threaten to disrupt essential business systems and processes is a universal concern of all organizations today. Disaster recovery or DR is the process, policies and procedures related to preparing for recovery or continuous operation of technology infrastructure critical to an organization after a natural or human-induced disaster.1 The founders of Perpetuiti Technologies have developed a proprietary algorithm and developed a software platform utilizing it branded as Business Continuity Management System (BCMS) to monitor, manage and automate these processes and procedures. Additionally; BCMS can forecast the degree of success or failure of these activities relative to an organizations intended recovery time objectives (RTO)2, recovery point objectives (RPO)3 and as associated maximum tolerable period of disruption (MTPOD)4 and present these metrics in a dashboard for visual monitoring of an organization's DR posture.

This innovation arose from the professional experiences of the five founders, Rohil Sharma, Sundar Raman, Sainath Iyer, Prashant Kakade, and Mahesh Patil, while developing custom disaster recovery solutions for the various clients of their prior employers. As a team, they arrived at the conclusion that an application offering automated disaster recovery with native support of common technologies would be beneficial to organizations around the globe. This vision gave birth to Perpetuiti Technologies and eventually BCMS.

BCMS is unique in the systems management arena in that it capitalizes upon known protocols and methods to monitor the performance and availability of technical infrastructure, monitor and manage data replication, but also to re-direct application traffic to a tertiary environment should the primary environment decline to an unacceptable performance level or fail outright. Automating these elements and their failover processes for conventional infrastructure is highly beneficial. Per the innovators, this technology can also be used to perform these actions when virtualized or cloud computing-based resources are utilized as well.


For further information please contact

Information Manager
Email: timeis@ficci.com