BUSINESS CONTINUITY PLAN Document Number: 100-P-01 v1.4
|
|
- Timothy Palmer
- 5 years ago
- Views:
Transcription
1 BUSINESS CONTINUITY PLAN Document Number: 100-P-01 v DR Committee 1
2 Table of Contents REVISION HISTORY... 3 PURPOSE... 3 POLICY... 3 DR COMMITTEE... 3 POLICY MANAGEMENT... 3 EMPLOYEE TRAINING AND AWARENESS... 4 TESTING AND PREPARATION... 4 DATA BACKUP PLAN... 5 CUSTOMER DATA BACKUP... 5 CORPORATE DATA BACKUP... 6 DATA BACKUP VERIFICATION... 6 PERSONNEL MANAGEMENT... 6 BUSINESS DISRUPTION RESPONSE PLAN... 7 IDENTIFICATION... 7 DECLARATION... 7 CATEGORIZATION... 8 ESTABLISH COMMAND CENTER... 8 COMMUNICATION METHODS... 9 POST MORTEM... 9 CATASTROPHIC SITE FAILURE PLAN EQUIPMENT FAILOVER PROCEDURES FAILBACK PROCEDURES Public 2
3 Revision History Update Version Date Author Initial Plan 1.0 1/4/2013 Eric Hester Add 2014 committee updates 1.1 2/9/2014 Eric Hester Add Testing Timeline /7/2014 Eric Hester Add Document number /13/2014 Joe Phillips Add Outage Response process 1.2 1/30/2015 Joe Phillips Revised Document number/location 1.3 5/16/2015 Joe Phillips Add 2015 DR committee updates 1.3 5/20/2015 Joe Phillips Update Site Failover Plan 1.3 8/6/2015 Joe Phillips, Jonathan Nalley, Eric Hester Updates from Annual review 1.4 4/4/2016 Joe Phillips Update to DR Committee members titles 1.4 8/30/2016 Joe Phillips Purpose The intent of this plan is to define a business continuity framework for Green Cloud Technologies so as to limit the effect of service disruptions to both the company and its customers. The plan described herein is a working plan which evolves over time through testing and experience, and therefore requires continual review. An essential mechanism of the framework is the practice of consistent testing and subsequent revision of the working plan. Policy DR Committee For the purposes of oversight a DR committee is formed consisting of the following: CTO COO Director of Business Operations Manager of Network Operations This committee will convene no less than once a year to formally review the documented policies, processes, information in this document and update appropriately based on experienced gained through operations of the business in the previous year. Any updates recommended between such meetings will require approval via of the entire committee. The committee will also be responsible for management of ongoing testing of the outlined plan to be performed on a recurring basis to be scheduled at their discretion. Policy Management The most recent electronic version of this document must be maintained in the following locations: Public 3
4 In the Documentation Library, on the company file server On the internal corporate WIKI Printed copies of the most recent version should always be on hand at the following locations: CTO s Office and Home NOC Manager s Office and Home Network Operation Center All Datacenters Any revisions to this document require the approval of the DR committee prior to formal updates to this document can be made and distributed. Once approved by the DR committee, any revisions made to this document require that the revision history table be appropriately updated and all of the locations outlined above be updated with the new iteration of the document. Employee Training and Awareness All employees will be required to sign an acknowledgement of this document (via the Security Policy Acknowledgement form). All departments must perform business continuity training at new employee on-boarding, and as policy updates are made available. The DR committee is responsible for confirming that all training is accurate and complete. Testing and Preparation It is imperative that the processes outlined in this document are routinely tested in as near real world conditions as possible to ensure the best possible experience when real catastrophe strikes. Routine component level redundancy testing and preventative maintenance are the key functions to avoid many catastrophic failure scenarios. Each of these processes have separate process documentation, but together are critical to the success of business continuity efforts and to be made a priority of the Operations team. Individual component level testing and elemental preventative maintenance is conducted routinely each quarter, with reasonable effort to test the recovery processes for catastrophic equipment and network failure on a yearly basis. The annual tests must at a minimum validate the overall process in lieu of implementing an actual customer impacting failure. Public 4
5 Data Backup Plan Customer Data Backup Green Cloud customer data is housed on an enterprise class SAN/NAS infrastructure. Backups occur using snapshots and are stored and recoverable in accordance with each customer s individual service agreement, based on selected the IaaS service option entitled Storage Profile. NOTE: DRaaS ExpressRestore customers and Desktop as a Service (DaaS) customers are afforded the same restore capabilities as the Local storage profile. A snapshot is a point-in-time backup of data saved to disk. In a snapshot, only the changed blocks from the current image are saved, preventing the need to store the entire file system at the time of each backup. This allows for an instant rollback to a previous point in time, which for Green Cloud is typically between 12 a.m. (midnight) and 2 a.m. Coordinated Universal Time (UTC) of each calendar day. "Local" A snapshot of the virtual server image will be created and saved automatically on a daily basis to the local Storage Area Network (SAN). Each individual daily snapshot is archived by default for seven (7) calendar days on the same storage platform on which the virtual server resides. "Offsite Backup" A snapshot of the virtual server image will be created and saved automatically on a daily basis to the local SAN. Each individual daily snapshot is archived by default for seven (7) calendar days on the same storage platform, and additionally to an alternative, geographically disparate SAN. The secondary SAN will have no I/O guarantee, and recovery can occur by moving the snapshot back to the primary SAN when it becomes available. "24 Hour" A snapshot of the virtual server image will be created and saved automatically on a daily basis to the local SAN. Each individual daily snapshot is archived by default for seven (7) calendar days on the same storage platform, and additionally to an alternative, geographically disparate SAN. The secondary SAN will have a corresponding I/O guarantee (storage profile type) as that of the primary SAN. Should the primary SAN become unavailable, the server image(s) can be restored at the secondary location within twenty-four (24) hours. "6 Hour" A snapshot of the virtual server image will be created and saved automatically at least every six (6) to the local SAN. Each individual daily snapshot is archived by default for seven (7) calendar days on the same storage platform, and additionally to an alternative, geographically disparate SAN. The secondary SAN will have a corresponding I/O guarantee (storage profile type) as that of the primary SAN. Should the primary SAN become unavailable, the server image(s) can be restored at the secondary location within six (6) hours. Recovery Option Snapshot Destination(s) Restore Destination(s) RTO RPO Local SAN Retention Local Only Local SAN Local SAN None 24 Hrs 7 Days Offsite Local & Offsite Local SAN None 24 Hrs 7 Days 24 Hour Local & Offsite Local or Offsite 24 Hrs 24 Hrs 7 Days 6 Hour Local & Offsite Local or Offsite 6 Hrs 6 Hrs 7 Days w/ ExpressRestore Local Local 1 Hr <15 Min 7 Days Public 5
6 Corporate Data Backup Green Cloud s critical corporate data is housed on an enterprise class SAN/NAS infrastructure in dedicated clusters, logically and physically separate from customer data. The corporate data backup plan is twofold to account for both critical and non-critical information and systems. Critical information and systems are those that support the production environment necessary to support customer and employee services, such as management and monitoring appliances, authentication servers, and databases. All other systems and data are considered non-critical. For non-critical data, backups occur using snapshots which are stored both on the same local storage platform as where the particular virtual server resides, and additionally the snapshots are copied to an alternative, geographically disparate SAN environment. Snapshots are taken at least every six (6) hours. The secondary SAN has a corresponding I/O guarantee (storage profile type) as that of the primary SAN. Should the primary SAN become unavailable, the server image(s) can be restored at the secondary location within six (6) hours. For critical data, backups occur using snapshots at the local SAN level in the same fashion as non-critical data. Additionally, disaster recovery software is continually replicating backups to an alternative, geographically disparate SAN environment. Should a business disruption occur on a critical system, the disaster recovery software can be leveraged to restore systems and applications to the secondary SAN within one (1) hour, with restore points as recent as fifteen (15) minutes. Any data stored locally on desktops or laptops is not be backed up to the file server(s) and therefore is not recoverable. Corporate security and information management policy state that all corporate data resides on the corporate file servers and is not to be downloaded, transferred, or moved elsewhere. Data Backup Verification Since snapshots are based on previous state of actual blocks of the active file system they are inherently verified. The replication of data between data centers is verified via checksums of each data block transferred. Any failure of the snapshot or replication process is monitored and resolved by network operations. As part of routine redundancy and failover testing a random sampling of VMs should be brought online from snapshots both locally and from replicated data to ensure no corruption has occurred. Personnel Management The safety of personnel during a crisis of any kind is paramount. To this end, all staff shall be equipped with necessary means to continue to work from the safest location possible. Personal computers -- or company provided laptops should be configured with these minimums: Telephony Soft-Client with pre-built credentials USB Headset Preconfigured VPN Access Desktop as a Service (DaaS) Client With remote access credentials preconfigured, the outage leader can insure that the physical work locations of all employees are safe and considerate of travel conditions. Public 6
7 For inclement weather or catastrophic scenarios involving the Corporate (Greenville) office, Operations management will determine if travel is unsafe and may instruct scheduled staff to work from their home or an alternative safe location. For catastrophic scenarios involving the data center(s), but not the Corporate office, technical staff is expected to convene at the Corporate office. During a critical event, abnormal working hours are to be expected. Operations management will schedule the employees shifts to insure continued productivity while preventing fatigue. If an unscheduled event requires staff to work beyond their normally scheduled days or times, the outage leader will provide to staff and management a shift schedule. Business Disruption Response Plan Identification When a potential outage is discovered through network, hardware, or software alarms or by repeated customer trouble reports in a short timeframe, the identifying personnel will immediately notify a member of the DR committee via telephone and in the following escalating order: NOC Manager Operations Management CTO COO Updated contact information for the above personnel is available in the Employee Directory. All potential outage communications will include a short description of the scenario discovered, an estimate of the number of customers possibly impacted, and any patterns or common elements discovered in initial triage. These actions and relevant data are to be recorded in an Incident ticket, per the Incident Management process. From here on referred to as the "master" ticket for the issue, all related customer reported Incidents will be linked to the master ticket. The master ticket will be updated as trouble isolation occurs and the level of impact changes in the discovery phase. Once a member of management has been reached, they will designate the outage leader and begin the process to assess and determine the scope of the outage and appropriate action per the process described below. In the unlikely scenario that none of the above forms of communication methods are functional (e.g. catastrophic natural event), any available Operations and Engineering personnel are to converge on a designated command center to manage the event and subsequent customer communications to a reasonable degree, with physical safety being of primary concern. Declaration At the discretion of the designated leader, an outage will be declared and at that time will be assigned one of the following color-coded severity levels. Based on the severity/category assigned to the system event, internal and external communication are to immediately follow. Public 7
8 Categorization The categorization schema for business disruptions is based two factors: the scope of the issue from an infrastructure perspective and the volume of end-users impacted by the event. The severity level determines the internal and external communication methods, the processes necessary to meet service level agreements, and supports a continual improvement model. White The definition of a white level event: Impact is limited to a small percentage of total customers; or the issue is isolated to a single network or equipment failure and can be resolved in short timeframe; or there is less than 1 hour anticipated downtime. Yellow The definition of a yellow level event: Impact is limited to less than one-half of total customer base; or the issue is isolated to a particular service (e.g. Hosted PBX, DRaaS, IaaS); or there is an undetermined estimated time to repair (ETR) but known root cause. Orange The definition of an orange level event: Impact is to more than one-half of total customer base; or issue is not isolated to a particular service (e.g. network, compute, etc.); or there is an undetermined ETR and an unknown root cause. Red The definition of a red level event: Impact is to more three-quarters of total customer base; or issue results in the customer s inability to contact Green Cloud (e.g. , web and telephone services are down). Customers Impacted Scope / Services Impacted Severity Level Low Isolated element White < 50% > 50% or Single service (e.g. PBX, DRaaS) Multiple services (e.g. network, compute) Yellow Orange > 75% All Green Cloud communications Red Establish Command Center Once the outage has been declared, an internal command center will be established for technical personnel communication, and if necessary personnel may need to convene at the most appropriate rendezvous location. The establishment of a physical command center will be made at the discretion of the outage leader based on conditions such as scope of issue, inclement weather, availability of internet and telephone connectivity, and the safety of personnel. The pre-designated locations have been identified as: Public 8
9 Corporate Office (Greenville) Conference Room Greenville Data Center War Room Nashville Data Center Conference Room Communication Methods A declaration will be delivered internally to all Green Cloud employees indicating the severity level and initial facts about the disruption. As the outage is further identified, the severity level may change. Depending on the severity level, initial notification will be made via the Green Cloud public Operational Status web page: Green Cloud recommends that all end-users, partners, vendors and employees subscribe to updates via the Operational Status web page. Updates are currently available via and/or SMS (text message). Both internal and external updates will be provided at the pre-designated time intervals, depending on the severity outlined in the chart below, via approved communication methods. Regular updates are the responsibility of the outage leader. Communication WHITE YELLOW ORANGE RED Update status.grncld.net? Y Y Y Y Updates Method Status Page Status Page Status Page Status Page Updates Frequency (minimum) None 2hrs 1hr 30min Management Follow Up N N Y Y Provide Reason for Outage document N N Y Y Post Mortem Upon conclusion of an event, it will be the responsibility of Operations Management to provide an Reason For Outage (RFO) document detailing the outage, its root cause, and actions taken to be shared with customers who request the RFO. This RFO will be available to all employees on the corporate file server. For Orange and Red level events, each member of management will be assigned a portion of the impacted customers list to personally contact, provide the RFO, and manage the delegation of any technical follow-up issues. Any lessons learned, customer and partner feedback, and corrective actions intended to prevent re-occurrences of the disruption (if avoidable) will be provided to the DR Committee at this time to allow for continual improvement. Public 9
10 Catastrophic Site Failure Plan Equipment Failover Process In the unlikely event an entire Green Cloud data center facility is lost to catastrophic failure of either all or a majority of its facilities, failover to the data replication site for the failed data center must be evaluated. The determination to initiate failover will be made by the outage leader, CTO, and all available members of senior management. This decision will be made based on the severity of the damage to the data center facility itself and/or its critical infrastructure such as green cloud equipment, power, network, cooling. If the team determines that the restoration time at the impacted facility is greater than the time required to failover, then the failover will commence. Failover steps shall be outlined in detail in the respective and appropriate Engineering and Operations standard operating procedures, however the overall process may require one or more of the following: Site survey and Site shutdown Any remaining operational equipment in the failed site will be shut down completely to avoid conflict with services enabled at the failover site. a. Survey team arrives on-site to assess severity level and establish visual confirmation of event b. All equipment powered off and physically removed from PDUs c. Note: This step can and may be completed in parallel with network failover Network Failover a. Failover the firewall configuration (Cisco ASA Security Context) b. Establish vcloud External network gateways as sub-interfaces on Po1 on ASR c. Where possible, move private carrier interconnect circuits to failed site Storage Failover All replicated volumes at the failover site will be brought online as active storage following the vendors and/or internal procedures a. Change ds* DNS records b. Make cloned/snapshot/synthetic VMs online (Tintri) and snapshot copy on e-series Internal Compute Management Failover All replicated VMware infrastructure such as vcenter, vshield Manager, vcloud Director will be brought online Customer Compute Failover All failover compute resources will be brought online on the failover VLANs a. Take failover hosts out of maintenance mode Customer VM Failover All Customer VMs which have been replicated will be brought online following the priorities set forth by their designated Restore Time Objective (RTO), i.e. 6 hour RTO customers first, then 24 Hour RTO customers next, etc. Public 10
11 Failback Procedures Once the failed facility has been fully repaired and cleared for use by both the data center provider and Green Cloud Engineering, a determination may be made to return services to the vacant facility. In many cases, it is preferable to leave restored/recovered VMs running at the secondary site for an extended period of time. A failback procedure occurs in much the same way as a failover but in the opposite direction. Because of this downtime is to be expected. Engineering and Sr. Management will make the decision as to if, when and how to perform such an operation. Public 11
Infrastructure as a Service (IaaS) Public, Private and Hybrid Cloud Solutions from Green Cloud Technologies.
Public, Private and Hybrid Cloud Solutions from Green Cloud Technologies. Green Cloud has been a pleasure to work with every step of the way. They were able to analyze my infrastructure and recommend technology
More informationDISASTER RECOVERY PRIMER
DISASTER RECOVERY PRIMER 1 Site Faliure Occurs Power Faliure / Virus Outbreak / ISP / Ransomware / Multiple Servers Sample Disaster Recovery Process Site Faliure Data Centre 1: Primary Data Centre Data
More informationINFORMATION SECURITY- DISASTER RECOVERY
Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy
More informationSolution Pack. Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Managed Database Service Selections and Prerequisites Subject Governing Agreement Term DXC Services Requirements Agreement between DXC and Customer
More informationUniversity Information Systems. Administrative Computing Services. Contingency Plan. Overview
University Information Systems Administrative Computing Services Contingency Plan Overview Last updated 01/11/2005 University Information Systems Administrative Computing Services Contingency Plan Overview
More informationService Level Agreement
This ( ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply all Managed Services to Customer. The Master Agreement entered into between LightEdge
More informationManaged Service. Managed Services. High Availability / Disaster Recovery Solutions. Cloud and Hosting Solutions. Security Solutions.
Managed Service Managed Services IBM i Intel AIX High Availability / Disaster Recovery Solutions Design & Implementation Monitoring Cloud and Hosting Solutions Security Solutions Single Sign-On Assessments
More informationDisaster Recovery-to-the- Cloud Best Practices
Disaster Recovery-to-the- Cloud Best Practices HOW TO EFFECTIVELY CONFIGURE YOUR OWN SELF-MANAGED RECOVERY PLANS AND THE REPLICATION OF CRITICAL VMWARE VIRTUAL MACHINES FROM ON-PREMISES TO A CLOUD SERVICE
More informationVersion v November 2015
Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise
More informationBUSINESS CONTINUITY. Topics covered in this checklist include: General Planning
BUSINESS CONTINUITY Natural and manmade disasters are happening with alarming regularity. If your organization doesn t have a great business continuity plan the repercussions will range from guaranteed
More informationv February 2016
Service Description HPE Application Performance Management on Software-as-a- Service v2.1 20 February 2016 This Service Description describes the components and services included in HPE Application Performance
More informationCANVAS DISASTER RECOVERY PLAN AND PROCEDURES
CANVAS DISASTER RECOVERY PLAN AND PROCEDURES Instructure Security, Engineering, and Operations INSTRUCTURE, INC. 6330 South 3000 East Salt Lake City, Utah 84121 Table of Contents Disaster Plan and Procedures...
More informationSERVICE DESCRIPTION MANAGED BACKUP & RECOVERY
Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....
More informationDisaster Recovery and Mitigation: Is your business prepared when disaster hits?
1 Disaster Recovery and Mitigation: Is your business prepared when disaster hits? 2 Our speaker today: Catherine Roy, Director of PMO at Hosting 15 years Project Management experience At HOSTING since
More informationCUNY Graduate Center Information Technology. IT Provisioning for Business Continuity & Disaster Recovery Effective Date: April 6, 2018
CUNY Graduate Center Information Technology IT for & Effective Date: April 6, 2018 Introduction Organization Information Technology (IT) is the division of the Graduate Center responsible for voice, video
More informationVersion v November 2015
Service Description HPE Project and Portfolio Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Project and
More informationApplication Lifecycle Management on Softwareas-a-Service
Service Description HPE Application Lifecycle Management on Software-as-a- Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Application
More informationService Level Agreement (SLA) and Service Level Objectives (SLO)
Service Level Agreement (SLA) and Service Level Objectives (SLO) Ver 1.4 Table of Contents 1. Overview.... 3 2. Definitions.... 3 3. Credit Standards... 3 3.1 Datacenter... 4 3.2 Infrastructure... 4 3.3
More informationWhat is Data Protection and Disaster Recovery?
powered by MORE What is Data Protection and Disaster Recovery? A HANDBOOK FOR COST-EFFECTIVE DISASTER PLANNING powered by MORE Data loss and disasters will impact every business in time. Fortunately, data
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 13 Business Continuity Objectives Define business continuity Describe the components of redundancy planning List disaster recovery
More informationEpicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)
Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification
More informationCLOUD DISASTER RECOVERY. A Panel Discussion
CLOUD DISASTER RECOVERY A Panel Discussion SPEAKERS Michael Kemps Founder & CEO Innovative Computing Systems, Inc. Mike Paul CTO Innovative Computing Systems, Inc. Sonny Sheth Senior Systems Engineer Innovative
More informationBUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW
BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business
More informationWhite Paper BC/DR in the Cloud Era
BC/DR in the Cloud Era Today, enterprises of all sizes are virtualizing their mission-critical applications, either within their own data center, or with an external cloud vendor. One key driver is to
More informationCUNY Graduate Center Information Technology IT Provisioning for Business Continuity & Disaster Recovery Effective Date: November 14, 2018
CUNY Graduate Center Information Technology IT for & Effective Date: November 14, 2018 Introduction Organization Information Technology (IT) is the division of the Graduate Center responsible for voice,
More informationWelcome! Considering a Warm Disaster Recovery Site?
Welcome! Considering a Warm Disaster Recovery Site? Today s Moderator: Chris Riley Director 410-771-5544 x4331 criley@syssrc.com Today s Presenter: Rich Glenn Director 410-771-5544 x4420 rglenn@syssrc.com
More informationServeRestore Service Description
ServeRestore Service Description... 2 ServeRestore Service Options... 2 ServeRestore Service Limitations... 2 ServeRestore Implementation Plan and Timeline... 4 ServeRestore Disaster Recovery Process...
More informationAnnual Public Safety PSAP Survey results
Annual Public Safety PSAP Survey results 573 PSAP Employees Surveyed March - July 2016 2016 Stratus Technologies. All Rights Reserved. 1 Stratus PSAP Survey March 2016 From March 2016 through July of 2016,
More informationDisaster Recovery (DR) Planning with the Cloud Desktop
with the Cloud Desktop Info@RIAWorkSpace.com 877.361.3499 www.riaworkspace.com In preparing for the unexpected, most companies put specific disaster recovery plans in place. Without planning, recovering
More informationBC/DR Strategy with VMware
BC/DR Strategy with VMware VMware vforum, 2014 Andrea Teobaldi Systems Engineer @teob77 2014 VMware Inc. All rights reserved. What s on the agenda? Defining the problem Definitions VMware technologies
More informationProjectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
More informationBuyer s Guide: DRaaS features and functionality
Buyer s Guide: DRaaS features and functionality Disaster recovery without a secondary site DRaaS for the midmarket When a server stops responding, for whatever reason, the fastest way to resume service
More informationThe following table provides additional detail by identifying the items included in the service.
roduct ervice Description Iaa Intel This service component is delivered as a set of assets, hardware and software to provide Intel based computing services for Microsoft Windows and Linux. The service
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationNetwork Performance, Security and Reliability Assessment
Network Performance, Security and Reliability Assessment Presented to: CLIENT NAME OMITTED Drafted by: Verteks Consulting, Inc. 2102 SW 20 th Place, Suite 602 Ocala, Fl 34474 352-401-0909 ASSESSMENT SCORECARD
More informationContinuity of Business
White Paper Continuity of Business SAS Continuity of Business initiative reflects our commitment to our employees, to our customers, and to all of the stakeholders in our global business community to be
More informationTECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
More informationHYBRID CLOUD BACKUP & DISASTER RECOVERY
HYBRID CLOUD BACKUP & DISASTER RECOVERY What is NexProtect? NexProtect is a cost-effective, Hybrid Cloud Backup & Disaster Recovery solution that meets your business needs with an on-site appliance that
More informationEVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER
WHITE PAPER EVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER Overview Enterprises lose $700 billion from downtime; losses fall into three categories: lost revenue (17%), lost productivity (73%), and
More informationVEMBU VS VEEAM Why Vembu is Better. VEMBU TECHNOLOGIES
VEMBU VS VEEAM Why is Better VEMBU TECHNOLOGIES vs About Technologies is a well known technology innovator in offering Backup & Disaster Recovery () product targeted at IT-Administrators in large, medium
More informationService Level Agreement
Service Level Agreement Version 2018.1 Copyright 2018 Aldridge PO Box 56506, Houston, TX 77256-6506 713.403.9150 http://aldridge.com Contents Contents... 2 Agreement... 3 The Aggregate Set of Agreements
More informationMUNICIPALITY OF NORRISTOWN. Responses to Proposal Questions
Q: What are the pain points being experienced with the current IT setup? A: Age of the equipment, reliability of service, no redundancy for internet service. Q: How is technology managed today? A: Outsourced
More informationVMware vcloud Air Accelerator Service
DATASHEET AT A GLANCE The VMware vcloud Air Accelerator Service assists customers with extending their private VMware vsphere environment to a VMware vcloud Air public cloud. This Accelerator Service engagement
More informationDon t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Don t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud Don t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud Summary Backup and recovery continue to be among
More informationService Description CloudCore
CloudCore TITLE: CloudCore DOCUMENT REF NO: QMS REC117 DESCRIPTION: Service description for the CloudCore service. OWNER / AUTHORITY: QMS / ISMS DOCUMENT CROSS REFERENCE: Director of Product and Service
More informationCUNY Graduate Center Information Technology. IT Provisioning for Business Continuity & Disaster Recovery Effective Date: May 26, 2017
CUNY Graduate Center Information Technology IT for & Effective Date: May 26, 2017 Introduction Organization Information Technology (IT) is the division of the Graduate Center responsible for voice, video
More informationDisaster Recovery Planning
Disaster Recovery Planning How to Ensure your IT systems are protected and your business keeps running should disaster strike. Benefits of Using Disaster Recovery as a Service DRaaS over Traditional Disaster
More informationDR Planning for SMBs. E-Guide
E-Guide Improving DR plans is always top of mind for storage professionals at small and medium sized organizations. This guide provides storage pros with the necessary information to improve the effectiveness
More informationDisaster Recovery Plan
Earth Wind & Fire LLP Disaster Recovery Plan Managing Disaster Recovery Author 7/19/2017 EWF Disaster Recovery Plan EWF LLP Disaster Recovery Plan Author Version Revision Date J. Smith 1.0 June 01, 2015
More informationCisco Meraki Privacy and Security Practices. List of Technical and Organizational Measures
Cisco Meraki Privacy and Security Practices List of Technical and Organizational Measures Introduction Meraki takes a systematic approach to data protection, privacy, and security. We believe a robust
More informationBusiness Continuity and Disaster Recovery. Ed Crowley Ch 12
Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster
More informationAppendix 3 Disaster Recovery Plan
Appendix 3 Disaster Recovery Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A3-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision
More informationSOP Unplanned Outages/Major Incidents
Table of Contents Definitions... 2 Incident... 2 Declaring... 2 Incident Levels... 3 Priority 1... 3 Priority 2... 3 Priority 3... 3 Priority 4... 3 Mission Critical Services... 3 Authentication... 3 Computer
More informationArcserve Solutions for Amazon Web Services (AWS)
Arcserve Solutions for Amazon Web Services (AWS) Introduction The public cloud has become a major factor in all IT decision making due to its endless supply of technical resources at an affordable cost.
More information` 2017 CloudEndure 1
` 2017 CloudEndure 1 Table of Contents Executive Summary... 3 Production Machines in the Organization... 4 Production Machines Using Disaster Recovery... 5 Workloads Primarily Covered by Disaster Recovery...
More informationAtmosphere Fax Network Architecture Whitepaper
Atmosphere Fax Network Architecture Whitepaper Contents Introduction... 3 The 99.99% Uptime Fax Network... 4 Reliability and High Availability... 5 Security... 7 Delivery... 9 Network Monitoring... 11
More informationAudit & Advisory Services. IT Disaster Recovery Audit 2015 Report Date January 28, 2015
Audit & Advisory Services IT Disaster Recovery Audit 2015 Report Date January 28, 2015 Audit & Advisory Services Mission and Function The JCCC Audit & Advisory Services department provides an independent
More informationTechnical Plan Version 7.11
Technical Plan Version 7.11 January 6, 2014 Table of Contents Table of Contents... Section 1: Environment... 1.1: Network... Section 2: Hardware/Software... 2.1: Storage... 2.2: Hypervisor... 2.3: Operating
More informationarcserve r16.5 Hybrid data protection
arcserve r16.5 Hybrid data protection Whether you re protecting the data center, remote offices or desktop resources, you need a solution that helps you meet today s demanding service-level agreements
More informationDude Solutions Business Continuity Overview
Dude Solutions Business Continuity Overview Table of Contents Overview.... 2 Primary and Disaster Recovery Data Centers.... 2 Network Infrastructure.... 3 Emergency Processes.... 3 Power and Cooling Systems....
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationVirtualization with Arcserve Unified Data Protection
Virtualization with Arcserve Unified Data Protection Server and desktop virtualization have become very pervasive in most organizations, and not just in the enterprise. Everybody agrees that server virtualization
More informationReal-time Protection for Microsoft Hyper-V
Real-time Protection for Microsoft Hyper-V Introduction Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate of customer adoption. Moving resources to
More informationDisaster Recovery. Lewan Technology, Zerto, FORTRUST & Faction Inc
Disaster Recovery Lewan Technology, Zerto, FORTRUST & Faction Inc Panel The Panel: Scott Pelletier, LewanTechnology, CTO Rob McClary, SVP & GM, FORTRUST Rick Vincent, Director Solutions/Product Engineering,
More informationTintri Cloud Connector
TECHNICAL WHITE PAPER Tintri Cloud Connector Technology Primer & Deployment Guide www.tintri.com Revision History Version Date Description Author 1.0 12/15/2017 Initial Release Bill Roth Table 1 - Revision
More informationTexas A&M AgriLife Research Procedures
Texas A&M AgriLife Research Procedures 29.01.99.A0.02 Enterprise File Service Approved: December 15, 2011 Revised: September 12, 2014 Next Scheduled Review: September 12, 2019 PROCEDURE STATEMENT This
More informationWHITE PAPER- Managed Services Security Practices
WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to
More informationConRes IaaS Management Services for Microsoft Azure
ConRes IaaS Management Services for Microsoft Azure Table of Contents 1. 2. 3. 4. 5. 6. 7. Introduction... 3 Pre-requisites... 3 Onboarding Infrastructure to ConRes IaaS Management Services for Azure...
More information10 Reasons Why Your DR Plan Won t Work
10 Reasons Why Your DR Plan Won t Work Jim Damoulakis CTO, GlassHouse Technologies, Inc. Sept. 29, 2005 DR Vision Imagine Prepared to handle multiple categories of disaster Clearly documented policies
More informationPrinciples of Protection: Cybersecurity Data Protection. 11/01/2017 Julia Breaux William Sellers
Principles of Protection: Cybersecurity Data Protection 11/01/2017 Julia Breaux William Sellers Introductions Julia Breaux Internal Controls and Compliance Manager (225) 214-3898 Julia.Breaux@eatel.com
More informationManaged WAN SLA. Contents
Managed WAN SLA Contents Terminology... 2 Service Description... 2 Service Offerings... 2 Private Network Services... 2 Ethernet Connectivity... 2 T-1 Connectivity... 3 Other Connectivity... 3 Internet
More informationIBM Cloud for VMware Solutions Zerto Virtual Replication
IBM Cloud for VMware Solutions Zerto Virtual Replication Date: 31 st May 2017 Version: 1.0 Page 1 of 24 Table of Contents 1 Introduction... 4 1.1 Pre-requisites... 4 2 System Context... 5 2.1 Actors...
More informationCOMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN)
ATTACHMENT IDENTIFIER: SD-WAN, Ver. 1.0 COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN) The following additional terms and conditions are applicable
More informationIPMA State of Washington. Disaster Recovery in. State and Local. Governments
IPMA State of Washington Disaster Recovery in State and Local Governments Disaster by the Numbers Over 70% of agencies had some sort of data loss incident in 2012 Under 5% report that they were able to
More informationC H A P T E R Overview Figure 1-1 What is Disaster Recovery as a Service?
CHAPTER 1 Cisco Disaster Recovery as a Service Solution (DRaaS) architecture described in this document is designed to provide a new set of related capabilities allowing Virtualized Multi-Tenant Data Center
More informationTECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT
TECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT Statement of Intent The Information Technology Center (MVECA) and school district mutually agree that this Service Level Agreement (SLA) documents school technology
More informationAdvanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER
Advanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER Introduction Disaster Recovery (DR) is a fundamental tool for mitigating IT and business risks. But because it is perceived as
More information21CTL Disaster Recovery, Workload Mobility and Infrastructure as a Service Proposal. By Adeyemi Ademola E. Cloud Engineer
21CTL Disaster Recovery, Workload Mobility and Infrastructure as a Service Proposal By Adeyemi Ademola E. Cloud Engineer 1 Contents Introduction... 5 1.2 Document Purpose and Scope...5 Service Definition...
More informationTHE STATE OF CLOUD & DATA PROTECTION 2018
THE STATE OF CLOUD & DATA PROTECTION 2018 Survey Results: 10 Findings on how over 800 IT Pros handle Disaster Recovery & Cloud Adoption. INTRODUCTION The Unitrends 2018 annual survey of IT professionals
More informationVersion v January 2016
Service Description HPE StormRunner Load Version v2.1 20 January 2016 This Service Description describes the components and services included in HPE StormRunner Load (which also may be referred to as SaaS
More informationXO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services
1.0 PRODUCT AND SERVICES 1.1 Product Descriptions. XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services (a) XO IP VPN. XO IP VPN is a layer 3 data networking
More informationModule 4 STORAGE NETWORK BACKUP & RECOVERY
Module 4 STORAGE NETWORK BACKUP & RECOVERY BC Terminology, BC Planning Lifecycle General Conditions for Backup, Recovery Considerations Network Backup, Services Performance Bottlenecks of Network Backup,
More informationMicrosoft SQL Server
Microsoft SQL Server Abstract This white paper outlines the best practices for Microsoft SQL Server Failover Cluster Instance data protection with Cohesity DataPlatform. December 2017 Table of Contents
More informationNU Cloud Terms of Service
Overview This document represents the Terms of Service among Northwestern Information Technology (IT) and participating tenants in the NUCloud private cloud environment at Northwestern. The goal of these
More informationIntroduction to Business continuity Planning
Week - 06 Introduction to Business continuity Planning 1 Introduction The purpose of this lecture is to give an overview of what is Business Continuity Planning and provide some guidance and resources
More informationOracle Managed Cloud Services for Software as a Service - Service Descriptions. February 2018
Oracle Managed Cloud Services for Software as a Service - Service Descriptions February 2018 Table of Contents Oracle Managed Cloud GxP Compliance for SaaS...3 Oracle Managed Cloud Helpdesk for SaaS...5
More informationDisaster Recovery Is A Business Strategy
Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...
More informationDisaster Recovery Webinar August 11, 2015
Disaster Recovery Webinar August 11, 2015 SPEAKERS Marcelo Oliveira, Product Director, Cable & Wireless Marcelo has several years of experience in Information Technology, having worked with organizations
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationConcord Fax Network Architecture. White Paper
Concord Fax Network Architecture White Paper Page 2 Table of Contents Introduction 3 The 99.99% Uptime Fax Network 4 Reliability and High Availability 5 Security 9 Delivery 14 Network Monitoring 19 About
More informationHosting Services - Infrastructure. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options
This Hosting Service - Infrastructure Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services
More informationWeb Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012
Web Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012 Table of Contents 1 General Overview... 2 2 Service Description... 2 2.1 Service Scope... 2 2.1.1 Eligibility Requirements... 2 2.1.2
More informationDisaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper By Anton Els
Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper By Anton Els Copyright 2017 Dbvisit Software Limited. All Rights Reserved V3, Oct 2017 Contents Executive Summary...
More informationPage 1 of 8 ATTACHMENT H
Page 1 of 8 This is Attachment A (Statement of Work Definitions) to the Agreement between the County of Orange, CA ( County ) and Vendor. In the event of a conflict between the definitions set forth in
More informationAljex Software, Inc. Business Continuity & Disaster Recovery Plan. Last Updated: 1/30/2017.
Aljex Software, Inc. Business Continuity & Disaster Recovery Plan Last Updated: 1/30/2017 Table of Contents Introduction... 3 Business Continuity... 3 Employee Structure... 3 On-Site Disruption Procedures...
More informationBare Metal Cloud. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description
This Bare Metal Cloud Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer.
More informationManaged WAN SLA. Contents
Managed WAN SLA Contents Terminology... 2 Service Description... 2 General... 2 Levels and Offerings... 2 Private Network Services... 2 Features... 2 Internet Access... 3 Features... 3 Service Level Metrics...
More informationCopyright 2015 EMC Corporation. All rights reserved. Published in the USA.
This solution guide describes the disaster recovery modular add-on to the Federation Enterprise Hybrid Cloud Foundation solution for SAP. It introduces the solution architecture and features that ensure
More informationProtecting VMware vsphere/esx Environments with CA ARCserve
Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting VMware vsphere/esx Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while
More informationWest AT&T TXT Power Service Guide
West AT&T TXT29-1-1 Power Service Guide Table of Contents 1. Introduction... 2 2. Service Features... 2 2.1. Service Overview... 2 3. ITS... 3 3.1. Service Use Cases... 3 3.2. Customer Provided Public
More information