A technique for data redundancy that involves using different hardware, software and technology platforms within your security architecture.

  • Redundancy: does not allow a single point of failure
  • Adaptability: different platforms can allow for different purposes
  • Resiliency: Can reduce the risk of falling victim to a single attack or exploit
  • Enhanced recovery options: Having diverse platforms can facilitate quicker recovery
  • Compliance and regulation: Some regulation requires diversity in security measures