LogoLogo
  • TRUST CENTER
    • Trust Center Syntphony
    • Security
      • Security Organizational Model
      • Security Governance Approach
      • Security Risk Management
      • People Security
      • Identity and Access Management
      • Secure Software Development
      • Acceptable User of Assets
      • Security Operations & Security Incident Management
      • Security in IT Operations
      • Physical Security
      • Suppliers Security Management
    • Conformity
    • Business Continuity
      • Business Continuity Approach
    • Support Model
      • Customer Support Policy
        • Support Plans
          • Support Case Severity
          • Support Limitations
          • Technical Account Manager
        • Value Added Services
          • Product Upgrade Plan
          • Case Escalation
          • Lifecycle Policy And Legacy Support
          • Proactive Business Monitoring
      • Service Level Agreements
        • Definitions
        • Customer Obligations
        • Service Credits
          • Maximum Financial Credit
        • Exclusions
      • Pricing
  • PRODUCTS
    • Compliance Management
      • Infrastructure
      • Conformity
      • Support Model
        • Customer Obligations
        • SLA Subscriptions
          • Services
          • Incident
          • Service Request & change Management
          • System availability
          • Limitations
          • Definitions
          • Overarching services
          • Sandbox workspace
        • Business Continuity
        • Security
    • Content Services
      • Privacy
        • Manages Privacy - SaaS
        • Manages Privacy - On Premise
      • Infrastructure
      • Conformity
    • Conversational AI
      • Privacy
      • Infrastructure
      • Conformity
    • Employee Intranet
      • Infrastructure
      • Conformity
    • Immersive Experiences
      • Privacy
        • Meta Privacy Notice
        • Meta Privacy Notice - NAKA
      • Infrastructure
      • Conformity
    • Intelligent Automation
      • Privacy
      • Infrastructure
      • Conformity
    • Intelligent Document Processing
      • Privacy
      • Infrastructure
      • Conformity
    • Knowledge Search
      • Privacy
      • Infrastructure
      • Conformity
    • Learning Tech
      • Privacy
      • Infrastructure
      • Conformity
    • Loyalty
      • Privacy
      • Infraestructure
      • Conformity
    • Mobility Management
      • Privacy
      • Infrastructure
      • Conformity
    • Operation Transformation Strategy
      • Infrastructure
      • Conformity
    • Payments
      • Privacy
      • Infrastructure
      • Conformity
    • Perfect Store
      • Infrastructure
    • Pricing Management
      • Infrastructure
    • Process Management
      • Privacy
      • Infrastructure
      • Conformity
    • Sales
      • Privacy
      • Infrastructure
      • Conformity
    • Security Privacy and Integrity Platform
      • Infrastructure
    • Short-term Power Trading
      • Privacy
      • Infrastructure
      • Conformity
    • Smart Multi-cloud Management
      • Privacy
      • Infrastructure
      • Conformity
    • Stations
      • Privacy
      • Infrastructure
      • Conformity
    • Virtual Care
      • Privacy
        • Manages Privacy - SaaS
        • Manages Privacy - On Premise
      • Infrastructure
      • Conformity
Powered by GitBook

About us

  • Syntphony website
  • NTT DATA Syntphony solutions

Syntphony © NTT DATA Spain, S.L.U 2025 - All rights reserved

On this page

Was this helpful?

Export as PDF
  1. PRODUCTS
  2. Compliance Management
  3. Support Model

Business Continuity

Business Continuity

Business continuity is established by leveraging redundant components in multiple layers which provides a high availability of the system. Automatized regular backups and infrastructure provisioning processes are also implemented to avoid data lost and downtime.

Layer
Redundancy model

Nodes

Worker nodes are distributed in multiple data centers in the same geographical region. This way, business continuity is achieved at the region level while data compliance requirements are met. In special cases where placement in multiple zones would prevent the application from starting in another zone, single zone deployments are used. In this situation, redundancy is maintained at node level, but not at data center level. Additional protection is achieved through a continuous backup process.

Applications

This depends on the application itself and its ability to support multi- instance deployments. In the case of a single replica, the application is re-scheduled, resulting in a short downtime. An auto-healing mechanism ensures application restart in case of problem and maximizes availability.

Kubernetes Control Plane

Kubernetes control plane controls the scheduling of jobs in the nodes, instances across multiple data centers to warrant business continuity

Persistence

Client data is saved in multiple database instances backed up in secondary storage devices. Additional protection is achieved through an automated continuous backup process. Documents are stored in a high available, durable and versionable storage system.

Databases

Provider-managed databases warrant business continuity at data center level.

Additional Components

Components outside the Kubernetes cluster such as load balancers, message brokers and image r epositories are also redundantly provisioned.

SCM Workspace

A SCM workspace (tenant) is a self-contained area in which all client data and system configuration and users are kept. The Workspace provides the interaction between human users or systems

and the services provided by SCM.

PreviousSandbox workspaceNextSecurity

Last updated 4 months ago

Was this helpful?