A technique for data redundancy that involves using different hardware, software and technology platforms within your security architecture.
- Redundancy: does not allow a single point of failure
- Adaptability: different platforms can allow for different purposes
- Resiliency: Can reduce the risk of falling victim to a single attack or exploit
- Enhanced recovery options: Having diverse platforms can facilitate quicker recovery
- Compliance and regulation: Some regulation requires diversity in security measures