Reducing Risk in Your Data Protection Environment with EMC Data Protection Advisor
|
|
- Deborah Pearson
- 6 years ago
- Views:
Transcription
1 Reducing Risk in Your Data Protection Environment with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features to improve compliance with business and regulatory requirements for protection and retention of data, while reducing the risk of data loss. This white paper outlines how Data Protection Advisor helps avoid the costs associated with lost data, both from legal and governmental fines and reduced customer satisfaction. July 2009
2 Copyright 2009 EMC Corporation. All rights reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED AS IS. EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com All other trademarks used herein are the property of their respective owners. Part Number h6446 Applied Technology 2
3 Table of Contents Executive summary...4 Introduction...4 Audience... 4 Overview...4 Industry statistics...5 Centralize monitoring and control across domains... 6 Improving IT efficiency... 8 Trusted independent verification...11 Example of regulations...12 Sarbanes-Oxley Conclusion...13 References...13 Applied Technology 3
4 Executive summary Compliance with business and government data protection requirements is not a revenue-generating activity. However, the converse (non-compliance) can be costly and have a negative impact on the business. Data is central to all businesses, and protecting this data is very important. The inability to recover company data after a critical failure at a primary site can put an entire company at risk, with catastrophic consequences for employees, shareholders, and customers alike. As a result, almost every company today is subject to one or more sets of data protection regulations, be they industry, government, or internal requirements. It is not only important for backups to meet stated Service Level Agreements (SLAs) on a daily basis but for companies to be able to prove compliance when audited. Failure to do so can lead to fines and in the worst case, irrecoverable data that can put a company at risk. Requirements such as HIPAA, Sarbanes-Oxley, FDA, and SEC regulations can impact already overloaded IT budgets. EMC Data Protection Advisor is a proven solution that compares established policies with the enforcement of those policies. Data Protection Advisor alerts when gaps in protection are found, so that you can make corrections, get back on track, and in many cases avoid problems before they arise. Data Protection Advisor can also accelerate the time required to satisfy audits, thereby reducing the time needed to get back to business. Introduction This white paper gives an overview of EMC Data Protection Advisor and provides an outline of how Data Protection Advisor helps avoid the costs associated with lost data, both from legal and governmental fines and reduced customer satisfaction. Audience This white paper is aimed at mid- to high-level management responsible for storage technology costs, IT operations, legal counsel, and CIO level management. Overview The primary requirement for compliance management is an audit trail of all data protection activities that take place. The information on these activities must be retained and made available for inspection if required, with the ability to obtain data for a specific subset of protected systems over a given time period. Complying with SLAs and regulations is a drain on IT resources, first to protect the data as specified and then to report back to the business and regulators on how well the requirements were met. Regulations such as Sarbanes-Oxley (SOX) direct companies to define their own best practice and then adhere to that best practice. There are thousands of regulations that companies may be subject to beyond SOX. To improve attainment of SLA goals, IT follows a cyclical process of finding issues, fixing them, reporting back, and looking for the next protection gap. Reporting back to the business and auditors is a continuously changing requirement. As the environment grows, companies are acquired, new regulations are imposed and new technologies are adopted; many companies adopt third-party reporting solutions as a way of eliminating scripting. Third-party solutions also have the benefit of being unbiased, something that is critical when responding to audits. The business and auditors can request information on all aspects of the Data Protection Management process, such as success rates, data retention, unprotected data or clients, missed backups, and where data is retained (what tape in which location). The variations of each request are endless. Lastly, the need for compliance is continuous and must be sustained over time. Applied Technology 4
5 To minimize the impact on an environment, a Data Protection Management solution must meet several criteria: Provide heterogeneous support for data protection solutions and the surrounding infrastructure Improve IT operations, and the resources used to manage and report on achievement of service levels Maintain an unbiased record of events for reporting to the business and auditors, including changes to the policies and retention of data The end goal for this process of establishing, maintaining, and reporting is to ensure that data is protected and recoverable. Industry statistics As IT struggles to maintain compliance, the amount of data produced is growing at 60 percent CAGR, and the percentage of data that has intense protection requirements will increase by 50 percent. Some industry statistics relating to data protection activities are as follows: Over 40 percent of all companies that experience a disaster never reopen, and more than 25 percent of those that do reopen close within two years. 1 After a major disaster, an average company will lose at least 25 percent of the daily revenue in the first six days, while over 40 percent will be lost if a disaster lasts up to 24 days percent of companies that suffer a significant data loss are out of business within five years. 1 In a recent court case a service provider was fined $900,000 for failure to back up 27 GB of data, after a system upgrade lost the original 27 GB of data. 2 In another case, a European service provider was fined $3 million for failure to protect data. The percentage of data that will be Security, Compliance, and Preservation Intense will grow sharply between 2008 and 2012: Compliance Intense will grow from 25 percent to 35 percent. Preservation Intense will grow from 22 percent to 38 percent. Security Intense will grow from 33 percent to 45 percent. 3 During the economic downturn, companies will focus on consolidating IT, helping the company achieve regulatory compliance and securing the company s sensitive data 4 Risk to your data can come from current protection practices, as well as growth of data and an increase in the percentage of data requiring increased protection. Loss of data can lead to severe fines or even failure of a business. During the economic slowdown, many companies are focusing on improving data protection and compliance. To get an idea of the level of effort required, let us do a quick calculation: Assume 1,000 hosts, averaging three backups per day, and a 90 percent success rate. This results in 300 failed backups per day. Use an average of 15 minutes to resolve a failure and record your actions: 300 failures * 15 min each = 75 hours per day, or roughly 10 people full time Clearly this is not achievable, so something has to give. This strongly suggests the need for automation to reduce workload, highlight critical failures, improve success rates, and catch developing issues before they become a fire drill. 1 IBM, Disaster Recovery Journal, Global Disaster Recovery Preparedness Online Survey, October 2007; Forrester Research, What Your Business Can Learn about Disaster Recovery from Financial Institutions, June Information Week, IBM Fined $900,000 for Failing to Backup, October IDC Digital Universe white paper, sponsored by EMC, May Forrester Consulting, 2009 Data Protection Budgets, Priorities, and Technology Adoption, February 2009 Applied Technology 5
6 Centralize monitoring and control across domains Why centralize monitoring and control through a Data Protection Management (DPM) solution? As companies grow and expand they acquire new data protection technologies, open new locations, and get into areas with new regulations. This growth results in a conglomeration of products and policies, scripts, and reporting mechanisms. Even in an environment with a single solution, it is not easy to get all the data required. To meet this need, many environments write scripts to extract data for each purpose, backup solution, location, or business unit. This provides an incomplete picture, is tough to maintain, and rarely helps move the business forward. Having a solution that collects data from across all locations, all backup solutions including the supporting infrastructure, and clients creates a central repository and console to monitor, alert, and report on all aspects of your data protection environment. Broad heterogeneous support is critical; otherwise you end up with multiple products and increased effort. Products in this space are known as DPM products. EMC Data Protection Advisor is a DPM solution that supports all major backup applications, as well as collection from SAN/LAN, disk/tape, clients, switches and more; providing status, configuration, and performance data. This approach improves visibility and allows a holistic, yet granular view across locations and data protection topologies. Consider this example: A business has locations in London, Boston, and Sydney with finance in each location, utilizing different backup products for each site. Data Protection Advisor could seamlessly run a report against all three locations combining TSM, NBU, and NW into a single report for financial reports. Then in a matter of a couple clicks, the business could broaden the same report to the entire data center in each location. Figure 1 summarizes the backup and restore activities across five backup applications for the last week. Figure 1. Summary of the backup and restore activities across five backup applications Figure 2 shows those clients that have failed three times in the last week. Figure 3 shows the number of clients with one, two, or three failures in the last week. Applied Technology 6
7 Figure 2. Clients that have failed three times in the last week Figure 3. Number of clients with one, two, or three failures in the last week Figure 4 summarizes configuration change activity for the Amazon backup server for the last week, showing what was changed and when. Applied Technology 7
8 Figure 4. Configuration change activity for the Amazon backup server for the last week Improving IT efficiency The drain on IT resources relating to achieving service levels for data protection falls into two main categories: First, the ability to actually achieve a successful backup of the information, and second, the ability to record and report on achievement. Successful backups are critical to the recoverability of data and systems enabling the business to run. A successful backup is one that enables a system or application to be recovered. Policy failures occur when backup operations complete without errors, but do not enable recovery of the company s data. Making this more challenging is differentiating the critical systems from those that are less than critical. Unsuccessful data protection strategies treat each failure individually, resulting in repeated failures and high levels of business exposure. Basic backup failure information must be augmented with business- and application-specific SLAs to ensure that critical failures are given precedence over those that do not directly affect the business. Applied Technology 8
9 Almost as important as understanding the criticality of a system is the ability to resolve problems quickly. It is the heterogeneous support for hardware and software in Data Protection Advisor that gives operations access to the needed information quickly to determine which component is the bottleneck or point of failure. Combining fast problem resolution, with a focus on critical systems failures, ensures that operations treat systems appropriately. By quickly resolving issues on key systems first, Data Protection Advisor accelerates achievement of service levels. The second challenge is reporting on how well IT is performing against its data protection goals. Reporting is a daily activity, and so are changes to the number and types of reports requested. Relying on scripts to generate reports for each backup solution or location puts a heavy manual burden on each environment. More complex requests like how long is data retained, where is data located, when was the last successful backup, and so on will drive more scripts creation. When auditors are involved, the number and type of reports can be dramatically higher. EMC Data Protection Advisor directly addresses reporting on the achievement of the stated goals. Data Protection Advisor can very quickly generate reports that capture the entire environment or focus on a specific subset of systems and data. Having comprehensive reporting that is extremely flexible eliminates the need for scripts and the associated writing and rewriting. Having simple, flexible, comprehensive reporting accelerates the completion of audits by enabling you to answer requests in minutes. Consider another example: A service provider that uses Data Protection Advisor to manage its environment gets audited regularly to satisfy contractual requirements. Audits typically took about two weeks to complete, with activities such as writing reports, digging through logs, and explaining why failures happened and how they were resolved. After deploying Data Protection Advisor, an audit now takes 1 2 hours instead of hours previously, resulting in a 95 percent reduction. A central repository with information from across the environment enables running analysis to detect changing or developing conditions; these are situations that you would not normally look for due to the level of effort. Data Protection Advisor constantly monitors for the following: Backups with a big swing in the amount of data protected Changes in performance Extending backups that threaten to exceed the window Backups slowing down Capacity shortage Waiting for these situations to appear results in fire drills, but Data Protection Advisor can alert on these conditions to proactively address the issues. Figure 5 summarizes the configuration change activity for the Amazon backup server for the last week, showing what was changed and when. Figure 6 shows the exposure details for clients for the last week. Applied Technology 9
10 Figure 5. Configuration change activity for the Amazon backup server for the last week Figure 6. Exposure details for clients for the last week Applied Technology 10
11 Trusted independent verification The need for independent verification exists even when IT operations have a handle on how well data protection operations are meeting stated goals. Custom written scripts can be subject to manipulation to reflect a higher success rate than what is actually achieved. One of the most elusive aspects of managing a data protection environment is capturing change. As we all know, change is the one constant, but there is no tie between the backup solutions and any change control software that may be deployed, even if the change control captures the proposed changes. Some of the changes that are captured by Data Protection Advisor include new backup policies, changes to retention periods, and changes to media pools, which directly impact the retention of data. Capturing the actual changes is critical to understanding what was changed, by whom, and when the change occurred. This change information can be leveraged to support claims that policies have been consistently applied and maintained. To make an audit go much more smoothly, having a solution outside of the backup application that can validate the success of backups can be a real timesaver. Data Protection Advisor provides comprehensive reporting to customers, allowing them to validate if the SLAs stated in the contract were achieved. DPM solutions such as Data Protection Advisor provide an independent third-party solution to validate the successful achievement of the stated SLAs. Knowing that your data is protected and recoverable is critical to any business recovery plan. A recent Data Protection Advisor customer had its environment outsourced and was receiving status reports from its service provider. Since the service provider had incentive to achieve certain success rates, the idea existed that its custom scripts might be manipulated. This was not the case, but the conflict of interest existed and without third-party verification, there was no way to distinguish accurate reporting from manipulated reporting. By leveraging DPA, the customer was able to verify that SLAs were met, and can now track the recoverability of systems and which systems are at risk. The dashboard in Figure 7 shows a summary of backup activity over the last week, showing success rates, clients most at risk, and changes to configurations. Applied Technology 11
12 Figure 7. Summary of backup activity over the last week Example of regulations Although much has been written around the area of compliance, it can be hard to pin down specific requirements, much less ways of meeting those requirements. Data Protection Advisor contains alerts and reports that help meet these requirements as well as best practices to ensure that audits against such regulations are successful. In addition, Data Protection Advisor allows companies to define their own best practices, which are enforced in the same way. Sarbanes-Oxley Sarbanes-Oxley is one of the most wide-reaching and yet one of the vaguest regulations that affects data protection touching public companies in the U.S. Rather than mandate specific practices it suggests that companies implement their own best practices. The result is that many companies are unsure of what to do in this critical area. Critical to SOX is the ability to show consistency consistency in the establishment and application of backup and retention policies, as well as the success of those policies. Auditors will want to see that policies have been established and have remained consistent over time, and that the protection of the data was successful. Without tremendous efforts it is difficult to do this without a DPM solution such as Data Protection Advisor. Figure 7 provides a quick snapshot, while the data behind this chart can be examined in much greater detail for further satisfaction. Figure 8 shows how Data Protection Advisor categorizes Applied Technology 12
13 reports for fast access and categorizes hosts by their priority. Grouping similar clients accelerates running reports against systems at the same tier of importance to the business. Figure 8. Data Protection Advisor categorizes reports for fast access, and similarly hosts can be categorized by their priority Conclusion When selecting a product, ensure that it is truly heterogeneous, otherwise you will simply be creating more work to deploy and manage multiple products, and then to rationalize them to auditors and create common reports for the business. EMC Data Protection Advisor enables you to automate a great deal of your DPM process, maximizing the effectiveness of your data protection solutions, exposing gaps in compliance, tracking changes to policies, validating independent third-party protection, reducing risk of fines and litigation resulting from lost data, and reducing the level of effort to meet these requirements. References The following can provide additional information and can be found on Powerlink, EMC s passwordprotected customer- and partner-only extranet. Note that EMC Backup Advisor version 3.1 has been renamed and released as EMC Data Protection Advisor 5.0: EMC Data Protection Advisor Reference Guide EMC Data Protection Advisor Administration Guide EMC Data Protection Advisor Installation Guide EMC Data Protection Advisor User Guide EMC Data Protection Advisor Compatibility Matrix For access to Evaluation licenses, go to the Data Protection Advisor page on EMC.com: and Recovery/Data Protection Advisor Applied Technology 13
Technology Insight Series
EMC Avamar for NAS - Accelerating NDMP Backup Performance John Webster June, 2011 Technology Insight Series Evaluator Group Copyright 2011 Evaluator Group, Inc. All rights reserved. Page 1 of 7 Introduction/Executive
More informationIBM Real-time Compression and ProtecTIER Deduplication
Compression and ProtecTIER Deduplication Two technologies that work together to increase storage efficiency Highlights Reduce primary storage capacity requirements with Compression Decrease backup data
More informationThe Ultimate Guide for Virtual Server Protection
The Ultimate Guide for Virtual Server Protection 4 QUESTIONS EVERYONE SHOULD ASK ABOUT VIRTUAL SERVER DATA PROTECTION IT leadership should be looking to storage and data management teams to ensure they
More informationCOMPREHENSIVE RETENTION COMPLIANCE: HOW KEEPITSAFE ONLINE BACKUP CAN HELP YOUR BUSINESS
COMPREHENSIVE RETENTION COMPLIANCE: HOW KEEPITSAFE ONLINE BACKUP CAN HELP YOUR BUSINESS Learn more about how KeepItSafe can help to reduce costs, save time, and provide compliance for online backup, disaster
More informationArchive Legislation: archiving in the United Kingdom. The key laws that affect your business
Archive Legislation: Email archiving in the United Kingdom The key laws that affect your business Contents Laws regulating archiving, who they apply to and the penalties 3 Who is affected? 3 All private
More informationEMC VIPR SRM: VAPP BACKUP AND RESTORE USING VMWARE VSPHERE DATA PROTECTION ADVANCED
White paper EMC VIPR SRM: VAPP BACKUP AND RESTORE USING VMWARE VSPHERE DATA PROTECTION ADVANCED Abstract This white paper provides a working example of how to back up and restore an EMC ViPR SRM vapp using
More informationControlling Costs and Driving Agility in the Datacenter
Controlling Costs and Driving Agility in the Datacenter Optimizing Server Infrastructure with Microsoft System Center Microsoft Corporation Published: November 2007 Executive Summary To help control costs,
More informationSymantec Document Retention and Discovery
IT POLICY COMPLIANCE Symantec Document Retention and Discovery A state-of-the-art solution that simplifies the discovery of email and other files, enhances litigation readiness, and helps ensure compliance
More informationData Protection for Virtualized Environments
Technology Insight Paper Data Protection for Virtualized Environments IBM Spectrum Protect Plus Delivers a Modern Approach By Steve Scully, Sr. Analyst February 2018 Modern Data Protection for Virtualized
More informationINTELLIGENCE DRIVEN GRC FOR SECURITY
INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to
More informationEvaluator Group Inc. Executive Editor: Randy Kerns
Avoiding an Infrastructure Cost Explosion as You Move to Exchange 2010 Metalogix Archive Manager Evaluator Group Inc. Technology Insight Series Executive Editor: Randy Kerns Version 1: January 2012 Copyright
More informationTracking and Reporting
Secure File Transfer Tracking and Reporting w w w. b i s c o m. c o m 321 Billerica Road, Chelmsford, MA phone: 978-250-1800 email: sales@biscom.com EXECUTIVE SUMMARY The Internet has made it easier than
More informationStart Now with Information Governance
Start Now with Information Governance Applying Information Governance to Unstructured Content 1 Information by 2020: The Big Picture There will be lots of it 35 ZB Generated by individuals >70% Digital
More informationThe Data Protection Rule and Hybrid Cloud Backup
The 3-2-1 Data Protection Rule and Hybrid Cloud Backup IT teams are under extreme pressure to improve backup, disaster recovery and data protection to eliminate downtime and facilitate digital transformation.
More informationEMC Centera CentraStar/SDK Compatibility with Centera ISV Applications
EMC Centera CentraStar/SDK Compatibility with Centera ISV Applications A Detailed Review Abstract This white paper provides an overview on the compatibility between EMC Centera CentraStar and SDK releases,
More informationRSA Solution Brief. The RSA Solution for Cloud Security and Compliance
The RSA Solution for Cloud Security and Compliance The RSA Solution for Cloud Security and Compliance enables enduser organizations and service providers to orchestrate and visualize the security of their
More informationMoving From Reactive to Proactive Storage Management with an On-demand Cloud Solution
Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution The Ever-Present Storage Management Conundrum In the modern IT landscape, the storage management conundrum is as familiar
More informationINTEGRATING EMC XTENDER AND DISKXTENDER FOR ELECTRONIC MESSAGING ARCHIVAL WITH NETAPP NEARSTORE
White Paper INTEGRATING EMC EMAILXTENDER AND DISKXTENDER FOR ELECTRONIC MESSAGING ARCHIVAL WITH NETAPP NEARSTORE Abstract This white paper describes how to use the EMC EmailXtender archiving solution to
More informationNext Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures
Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures Next 1 What we see happening today. The amount of data businesses must cope with on a daily basis is getting
More informationDISASTER RECOVERY TESTING, YOUR EXCUSES, AND HOW TO WIN
DISASTER RECOVERY TESTING, YOUR EXCUSES, AND HOW TO WIN INTRODUCTION You can plan, look at diagrams, listen to consultants, but you still won t know that all your recovery capabilities will actually work
More informationWHY SECURE MULTI-TENANCY WITH DATA DOMAIN SYSTEMS?
Why Data Domain Series WHY SECURE MULTI-TENANCY WITH DATA DOMAIN SYSTEMS? Why you should take the time to read this paper Provide data isolation by tenant (Secure logical data isolation for each tenant
More informationEMC Ionix IT Compliance Analyzer Application Edition
DATA SHEET EMC Ionix IT Compliance Analyzer Application Edition Part of the Ionix Data Center Automation and Compliance Family Automatically validates application-related compliance with IT governance
More informationData safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.
WHITE PAPER Data safety for digital business. One solution for hybrid, physical, and virtual environments. It s common knowledge that the cloud plays a critical role in helping organizations accomplish
More informationSQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY
SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY THE INTERSECTION OF COMPLIANCE AND DIGITAL DATA Organizations of all sizes and shapes must comply with government and industry regulations.
More informationTHE STATE OF CLOUD & DATA PROTECTION 2018
THE STATE OF CLOUD & DATA PROTECTION 2018 Survey Results: 10 Findings on how over 800 IT Pros handle Disaster Recovery & Cloud Adoption. INTRODUCTION The Unitrends 2018 annual survey of IT professionals
More informationGovernance, Risk, and Compliance: A Practical Guide to Points of Entry
An Oracle White Paper January 2010 Governance, Risk, and Compliance: A Practical Guide to Points of Entry Disclaimer The following is intended to outline our general product direction. It is intended for
More informationCA Test Data Manager Key Scenarios
WHITE PAPER APRIL 2016 CA Test Data Manager Key Scenarios Generate and secure all the data needed for rigorous testing, and provision it to highly distributed teams on demand. Muhammad Arif Application
More informationEMC Celerra Replicator V2 with Silver Peak WAN Optimization
EMC Celerra Replicator V2 with Silver Peak WAN Optimization Applied Technology Abstract This white paper discusses the interoperability and performance of EMC Celerra Replicator V2 with Silver Peak s WAN
More informationGreen Governance Growth
G3 Data Centers Green Governance Growth DELIVER MORE WITH LESS The economic downturn changed the dynamics of the business world. It shifted the measure of success, driving companies to rethink how they
More informationWhite Paper Server. Five Reasons for Choosing SUSE Manager
White Paper Server Five Reasons for Choosing SUSE Manager Server White Paper Five Reasons for Choosing SUSE Manager SUSE Manager for Comprehensive Linux Systems Management According to a recent Forrester
More informationSolving Exchange and.pst Management Problems in Microsoft Environments An Osterman Research White Paper
Solving Exchange and.pst Management Problems in Microsoft Environments An Osterman Research White Paper Table of Contents Why You Should Read This White Paper Problems in Managing Exchange and.pst Files
More informationWhy Continuity Matters
Why Email Continuity Matters Contents What is Email Continuity and Why it Matters........................... 1 Challenges to Email Continuity................................... 2 Increasing Email Management
More informationThe Nuances of Backup and Recovery Solutions
DEFINING THE RIGHT DATA PROTECTION STRATEGY The Nuances of Backup and Recovery Solutions Cindy LaChapelle, Principal Consultant, ISG ISG WHITE PAPER 2012 Information Services Group, Inc. All Rights Reserved
More informationDELL EMC DATA DOMAIN RETENTION LOCK SOFTWARE
WHITEPAPER DELL EMC DATA DOMAIN RETENTION LOCK SOFTWARE A Detailed Review ABSTRACT Enterprises continue to see an exponential growth in the structured and unstructured data that is proliferating across
More information74% 2014 SIEM Efficiency Report. Hunting out IT changes with SIEM
2014 SIEM Efficiency Report Hunting out IT changes with SIEM 74% OF USERS ADMITTED THAT DEPLOYING A SIEM SOLUTION DIDN T PREVENT SECURITY BREACHES FROM HAPPENING Contents Introduction 4 Survey Highlights
More informationPOWERING NETWORK RESILIENCY WITH UPS LIFECYCLE MANAGEMENT
POWERING NETWORK RESILIENCY WITH UPS LIFECYCLE MANAGEMENT Network downtime is a business disrupter, cutting off communication between employees and customers, bringing service delivery to a halt. Yet all
More informationDisaster Recovery Is A Business Strategy
Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...
More informationOracle s Engineered Systems Approach to Maximizing Database Protection
Technology Insight Paper Oracle s Engineered Systems Approach to Maximizing Database Protection By John Webster January, 2016 Enabling you to make the best technology decisions Oracle s Engineered Systems
More information15-MINUTE GUIDE. SMARTER BACKUP Transform your future
EMC 15-MINUTE GUIDE TO SMARTER BACKUP Transform your future 15-MINUTE GUIDE TABLE OF CONTENTS OVERVIEW TODAY S CHALLENGES TREND #1: MASSIVE DATA GROWTH TREND #2: IT BUDGET DILEMMA TREND #3: VIRTUALIZATION
More informationOracle Buys Automated Applications Controls Leader LogicalApps
Oracle Buys Automated Applications Controls Leader LogicalApps To strengthen Oracle s Governance, Risk and Compliance Suite with Real-time Policy Enforcement October 26, 2007 Disclaimer The following is
More informationDemystifying GRC. Abstract
White Paper Demystifying GRC Abstract Executives globally are highly focused on initiatives around Governance, Risk and Compliance (GRC), to improve upon risk management and regulatory compliances. Over
More informationBUSINESS CONTINUITY: THE PROFIT SCENARIO
WHITE PAPER BUSINESS CONTINUITY: THE PROFIT SCENARIO THE BENEFITS OF A COMPREHENSIVE BUSINESS CONTINUITY STRATEGY FOR INCREASED OPPORTUNITY Organizational data is the DNA of a business it makes your operation
More informationIsaca EXAM - CISM. Certified Information Security Manager. Buy Full Product.
Isaca EXAM - CISM Certified Information Security Manager Buy Full Product http://www.examskey.com/cism.html Examskey Isaca CISM exam demo product is here for you to test the quality of the product. This
More informationEMC Disk Library Automated Tape Caching Feature
EMC Disk Library Automated Tape Caching Feature A Detailed Review Abstract This white paper details the EMC Disk Library configuration and best practices when using the EMC Disk Library Automated Tape
More informationCA ARCserve Backup. Benefits. Overview. The CA Advantage
PRODUCT BRIEF: CA ARCSERVE BACKUP R12.5 CA ARCserve Backup CA ARCSERVE BACKUP, A HIGH-PERFORMANCE, INDUSTRY-LEADING DATA PROTECTION PRODUCT, UNITES INNOVATIVE DATA DEDUPLICATION TECHNOLOGY, POWERFUL STORAGE
More informationCost savings of disk-based backup using a Dell PowerVault DL Backup to Disk Appliance powered by Symantec Backup Exec 2010 R2 vs.
Cost savings of disk-based backup using a Dell PowerVault DL Backup to Disk Appliance powered by Symantec Backup Exec 2010 R2 vs. tape-based backup Executive summary Disk-based backup offers both cost
More informationThe Microsoft Large Mailbox Vision
WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more email has many advantages. Large mailboxes
More informationExam4Tests. Latest exam questions & answers help you to pass IT exam test easily
Exam4Tests http://www.exam4tests.com Latest exam questions & answers help you to pass IT exam test easily Exam : CISM Title : Certified Information Security Manager Vendor : ISACA Version : DEMO 1 / 10
More informationIndustry-leading solutions for transforming data centers into drivers of business value and innovation. Symantec in the Data Center
Industry-leading solutions for transforming data centers into drivers of business value and innovation Symantec in the Data Center 1 In today s wired world, all companies depend on enterprise applications
More informationLab Validation Report
Lab Validation Report NetApp SnapManager for Oracle Simple, Automated, Oracle Protection By Ginny Roth and Tony Palmer September 2010 Lab Validation: NetApp SnapManager for Oracle 2 Contents Introduction...
More informationeguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments
eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments Today s PCI compliance landscape is one of continuing change and scrutiny. Given the number
More informationIBM TS7700 grid solutions for business continuity
IBM grid solutions for business continuity Enhance data protection and business continuity for mainframe environments in the cloud era Highlights Help ensure business continuity with advanced features
More informationBuild a viable plan for disaster recovery and crisis management.
Disaster recovery and crisis management solutions To support your IT objectives Build a viable plan for disaster recovery and crisis management. Highlights Build a plan to help respond to and recover from
More informationProtecting Microsoft Hyper-V 3.0 Environments with Arcserve
Protecting Microsoft Hyper-V 3.0 Environments with Arcserve Adding value to your Hyper-V environment. Today, you face demanding service level agreements (SLAs) while having to address staffing and budget
More informationSecuring Your SWIFT Environment Using Micro-Segmentation
Securing Your SWIFT Environment Using Micro-Segmentation WP201801 Overview By January 1, 2018, all SWIFT customers must self-attest to their compliance with the new SWIFT Customer Security Program (CSP).
More informationMaximizing IT Security with Configuration Management WHITE PAPER
Maximizing IT Security with Configuration Management WHITE PAPER Contents 3 Overview 4 Configuration, security, and compliance policies 5 Establishing a Standard Operating Environment (SOE) and meeting
More informationSQL Server 2008 Consolidation
Technology Concepts and Business Considerations Abstract The white paper describes how SQL Server 2008 consolidation provides solutions to basic business problems pertaining to the usage of multiple SQL
More informationChapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/
Chapter 1 Storage Concepts 4 - Storage Concepts In order to understand CommVault concepts regarding storage management we need to understand how and why we protect data, traditional backup methods, and
More informationOptim. Optim Solutions for Data Governance. R. Kudžma Information management technical sales
Optim Solutions for Data Governance R. Kudžma Information management technical sales kudzma@lt.ibm.com IBM Software Group 10/23/2009 2008 IBM Corporation What is Data Governance Data Governance is the
More informationHP BladeSystem Matrix
HP BladeSystem Matrix Industry s first Converged Infrastructure platform that delivers IT services in minutes Solution brief Get the benefits of shared services today A better approach for productivity
More informationThe case for cloud-based data backup
IBM Global Technology Services IBM SmartCloud IBM Managed Backupi The case for cloud-based data backup IBM SmartCloud Managed Backup offers significant improvement over traditional data backup methods
More informationInformation Lifecycle Management for Business Data. An Oracle White Paper September 2005
Information Lifecycle Management for Business Data An Oracle White Paper September 2005 Information Lifecycle Management for Business Data Introduction... 3 Regulatory Requirements... 3 What is ILM?...
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationA SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS
A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS Introduction If you re a growing service organization, whether a technology provider, financial services corporation, healthcare company, or professional
More informationFirst Financial Bank. Highly available, centralized, tiered storage brings simplicity, reliability, and significant cost advantages to operations
Customer Profile First Financial Bank Highly available, centralized, tiered storage brings simplicity, reliability, and significant cost advantages to operations A midsize community bank with a service
More informationUsing Self-Protecting Storage to Lower Backup TCO
Economic Insight Paper Using Self-Protecting Storage to Lower Backup TCO A TCO comparison of NetApp s integrated data protection solution vs. a traditional backup to an external PBBA By John Webster, Sr.
More informationTechnical Note P/N REV A01 March 29, 2007
EMC Symmetrix DMX-3 Best Practices Technical Note P/N 300-004-800 REV A01 March 29, 2007 This technical note contains information on these topics: Executive summary... 2 Introduction... 2 Tiered storage...
More informationGlobal Headquarters: 5 Speen Street Framingham, MA USA P F
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R T a k i n g a S i n g l e - S y s t e m A p p r o a c h t o E n a b l e F a s
More informationOracle Database Vault
An Oracle White Paper July 2009 Oracle Database Vault Introduction... 3 Oracle Database Vault... 3 Oracle Database Vault and Regulations... 4 Oracle Database Vault Realms... 5 Oracle Database Vault Command
More informationWhat is Penetration Testing?
What is Penetration Testing? March 2016 Table of Contents What is Penetration Testing?... 3 Why Perform Penetration Testing?... 4 How Often Should You Perform Penetration Testing?... 4 How Can You Benefit
More informationarcserve r16.5 Hybrid data protection
arcserve r16.5 Hybrid data protection Whether you re protecting the data center, remote offices or desktop resources, you need a solution that helps you meet today s demanding service-level agreements
More informationDell PowerVault DL2100 Powered by CommVault
Dell PowerVault DL2100 Powered by CommVault A Dell White Paper CENTRALIZED DATA MANAGEMENT FOR REMOTE AND BRANCH OFFICE (ROBO) ENVIRONMENTS CONTENTS EXECUTIVE SUMMARY 3 RETURN ON INVESTMENT OF CENTRALIZING
More informationSarbanes-Oxley Act (SOX)
Sarbanes-Oxley Act (SOX) Introduction The Sarbanes-Oxley (SOX) Act was introduced in 2002 to protect shareholders and the general public from fraudulent accounting activities by bringing greater accountability
More informationCost savings of disk-based backup using the Dell PowerVault DL2100 powered by Symantec Backup Exec 2010 vs. tape-based backup
Cost savings of disk-based backup using the Dell PowerVault DL2100 powered by Symantec Backup Exec 2010 vs. tape-based backup Executive summary Disk-based backup offers both cost and time savings over
More informationIBM Global Technology Services December 2008 Business continuity and resiliency services from IBM
IBM Global Technology Services December 2008 Business continuity and resiliency services from IBM Helping business stay in business 2 IBM Global Technology Services Contents 3 Determining your risk factors
More informationWHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY
WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY White Paper 2 Why Building Security Systems Need Continuous Availability Always On Is the Only Option. If All Systems Go Down, How Can You React
More informationProtect Your Data At Every Point Possible. Reduce risk while controlling costs with Dell EMC and Intel #1 in data protection 1
Protect Your Data At Every Point Possible Reduce risk while controlling costs with Dell EMC and Intel #1 in data protection 1 Transform IT to protect your data in the digital era As the growth, mobility
More informationFive Key Considerations for Selecting Cloud Recovery Services
Five Key Considerations for Selecting Cloud Recovery Services Looking for a cloud-based solution for backup and recovery? Here are some important things to keep in mind when interviewing providers. By
More informationUSING QUALYSGUARD TO MEET SOX COMPLIANCE & IT CONTROL OBJECTIVES
WHITE PAPER USING QUALYSGUARD TO MEET SOX COMPLIANCE & IT CONTROL OBJECTIVES Table of Contents I. Overview II. COSO to CobIT III. CobIT / COSO Objectives met by using QualysGuard 2 3 4 Using QualysGuard
More informationThe Upside to Active Mail Management - Five Reasons to Actively Manage Mail
The Upside to Active Mail Management - Five Reasons to Actively Manage Mail A White Paper from Avalon Introduction As we are all aware, the state of mail management in most organizations is not good. Most
More informationEMC DiskXtender for Windows and EMC RecoverPoint Interoperability
Applied Technology Abstract This white paper explains how the combination of EMC DiskXtender for Windows and EMC RecoverPoint can be used to implement a solution that offers efficient storage management,
More informationAchieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX
Achieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX Introduction Planning for recovery is a requirement in businesses of all sizes. In implementing an operational
More informationRSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief
RSA Solution Brief The RSA Solution for VMware View: Managing Securing the the Lifecycle Virtual of Desktop Encryption Environment Keys with RSA Key Manager RSA Solution Brief 1 According to the Open Security
More informationVirtualizing the SAP Infrastructure through Grid Technology. WHITE PAPER March 2007
Virtualizing the SAP Infrastructure through Grid Technology WHITE PAPER March 2007 TABLE OF CONTENTS TABLE OF CONTENTS 2 Introduction 3 The Complexity of the SAP Landscape 3 Specific Pain Areas 4 Virtualizing
More informationPowerBroker Auditing & Security Suite Version 5.6
PowerBroker Auditing & Security Suite Version 5.6 New and Updated Features BeyondTrust PowerBroker Auditing & Security Suite performs centralized real-time change auditing for Active Directory, file systems,
More informationDon t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud
Don t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud Don t Jeopardize Your Business: 5 Key Business Continuity Use Cases for Cloud Summary Backup and recovery continue to be among
More informationSymantec NetBackup 7 for VMware
V-Ray visibility into virtual machine protection Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing
More informationVMWARE PROTECTION WITH DELL EMC NETWORKER 9
VMWARE PROTECTION WITH DELL EMC NETWORKER 9 Solution Overview ABSTRACT This white paper describes the integration of Dell EMC NetWorker with VMware vcenter. It also includes details on the NetWorker architecture
More informationFrom Single File Recovery to Full Restore: Choosing the Right Backup and Recovery Solution for Your Cloud Data
From Single File Recovery to Full Restore: Choosing the Right Backup and Recovery Solution for Your Cloud Data Workloads in the cloud need a backup solution in the cloud. For companies with traditional
More informationThe Convergence of Security and Compliance
ebook The Convergence of Security and Compliance How Next Generation Endpoint Security Manages 5 Core Compliance Controls Table of Contents Introduction....3 Positive versus Negative Application Security....3
More informationSOLUTION BRIEF RSA ARCHER BUSINESS RESILIENCY
RSA ARCHER BUSINESS RESILIENCY INTRODUCTION Organizations are becoming a complex tapestry of products and services, processes, technologies, third parties, employees and more. Each element adds another
More informationHow WhereScape Data Automation Ensures You Are GDPR Compliant
How WhereScape Data Automation Ensures You Are GDPR Compliant This white paper summarizes how WhereScape automation software can help your organization deliver key requirements of the General Data Protection
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationMODERNIZE INFRASTRUCTURE
SOLUTION OVERVIEW MODERNIZE INFRASTRUCTURE Support Digital Evolution in the Multi-Cloud Era Agility and Innovation Are Top of Mind for IT As digital transformation gains momentum, it s making every business
More information-archiving. project roadmap CHAPTER 1. archiving Planning, policies and product selection
INSIDE email archiving Planning, policies and product selection CHAPTER 1 Ready to dive into email archiving? Try this four-phased approach to get your project up and running Email-archiving project roadmap
More informationKnow Your Customer. c360 Microsoft Dynamics CRM 4.0 Product Catalog
c360 Microsoft Dynamics CRM 4.0 Product Catalog Know Your Customer c360 products extend the functionality and industry focus of Microsoft Dynamics CRM c360 Core Productivity Pack Explorer (CRM Search Engine)
More informationVMware BCDR Accelerator Service
AT A GLANCE The rapidly deploys a business continuity and disaster recovery (BCDR) solution with a limited, pre-defined scope in a non-production environment. The goal of this service is to prove the solution
More informationISACA Cincinnati Chapter March Meeting
ISACA Cincinnati Chapter March Meeting Recent and Proposed Changes to SOC Reports Impacting Service and User Organizations. March 3, 2015 Presenters: Sayontan Basu-Mallick Lori Johnson Agenda SOCR Overview
More informationSix Sigma in the datacenter drives a zero-defects culture
Six Sigma in the datacenter drives a zero-defects culture Situation Like many IT organizations, Microsoft IT wants to keep its global infrastructure available at all times. Scope, scale, and an environment
More informationBACKUP TO THE FUTURE A SPICEWORKS SURVEY
BACKUP TO THE FUTURE A SPICEWORKS SURVEY 02 BACKUP TO THE FUTURE A SPICEWORKS SURVEY METHODOLOGY This research study was conducted by Spiceworks, the professional network for the IT industry, from a survey
More information