WHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER

Size: px
Start display at page:

Download "WHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER"

Transcription

1 WHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER

2 Insurance for IT Infrastructure? We can buy insurance for contract performance, pitching arms and even vacations. But when it comes to information technology (IT) processes and systems, the risk factors to business are too great and the level of complexity makes things difficult to quantify. As an enterprise business, the only choice is to protect your own interests. Many BCDR sources provide information about strategy, data center design, and data replication techniques. But few sources directly address one of the most fundamental elements of an effective BCDR strategy: the underlying communications network. This has lead to the growth of Business Continuity and Disaster Recovery (BCDR) planning, a business function that works as self insurance against the loss of IT services, among other things. It starts with thoroughly assessing risks to determine the proper amount of coverage then working to mitigate those risks as effectively as possible. Many BCDR sources provide information about strategy, data center design, and data replication techniques. But few sources directly address one of the most fundamental elements of an effective BCDR strategy: the underlying communications network. This white paper examines how the network impacts the BCDR plan, describes what a highly reliable communications infrastructure is and why it might belong in your BCDR plan. We give you four critical questions to ask based on common points of failure, to help you reduce the risk of a network outage and make you better able to recover if it happens. The paper concludes with a case study scenario based on a national, geographically dispersed company. Separate Topics, Common Considerations Business continuity and disaster recovery are two separate disciplines. Business continuity refers to the processes, policies and procedures related to recovering or continuing critical services in the event of a natural disaster or human-induced incident. Disaster recovery, in turn, is the process by which an organization resumes business after a disruptive event. The two topics are often grouped together because of their many common considerations. Business Continuity An effective business continuity plan must first classify each IT process and resource as it relates to business operations. Are they critical, important, or marginal? Next, an appropriate level of risk needs to be established by the executive team based on the business impact of a failure to a system or process. For example, there may be little business impact associated with an interruption to a cafeteria pointof-sale application, but an e-commerce website might be considered critical. Lastly, processes should be developed and tested to ensure that each IT function is protected in line with its established level of risk. There are systems for which any interruption would represent a significant loss. Others, although still critical, could still recover from a small delay during a switch to a backup server. In other words, there are systems we must protect from ever failing, and systems we must be able to recover. The challenge is less in identifying what is critical, but rather in knowing how to protect it. To guard the availability of various IT services, you can find many options. Many applications have built-in resiliency to certain types of failures. Protection for many systems must be manually designed and implemented. But even with the most well-engineered and executed business continuity plan, outages can occur. This brings us to the second phase of IT risk management: disaster recovery. Disaster Recovery Disaster recovery planning is the way we support recovery from a loss. Disasters come in many different forms: natural, accidental and malicious. Likewise, recovery plans are often developed with multiple layers of protection. For example, the protection of a critical system may involve the use of a RAID storage array combined with local mirroring and nightly off-site backups. Most recovery strategies rely on the use of

3 diverse resources either logical or physical to avoid putting all eggs in one basket. High Availability Networks vs. Highly Available Services If you hear the terms high availability and broadband in the same sentence, it s probably referring to geography. That is, you can connect to this service anywhere. However, you ll seldom hear about things like five nines availability in respect to a DSL connection. These types of services are typically classified as consumer services and, more often than not, are delivered on a best-effort basis. Highly available services are business-class services with built-in provisions for fault tolerance and disaster recovery. Recovery techniques and strategies are as varied as the types of disasters they are designed to mitigate. New solutions continue to help reduce risk and improve recovery times. Whether you re maintaining redundant servers or operating hardened data centers, businesses have many options for recovery strategies. One such revolution in recovery services has emerged with Cloud computing. Though virtualization, Cloud computing enables businesses to deploy recovery solutions in the Cloud that are both logically and physically diverse. Virtualization technology has had a tremendous impact on disaster recovery and has introduced a whole new level of complexity. Cloud solutions are simpler to implement, yet they introduce their own unique set of BCDR concerns. In fact, these types of solutions highlight one element of the overall BCDR plan that is easy to take for granted: the communications network. The Role of the Communications Network Almost every BCDR plan, at some level, relies on network communications. Whether you re connecting to a redundant disk array over a local area network (LAN) or using an off-site cloud storage facility over a high-speed storage area network (SAN) connection, your communications link should be a key consideration in both business continuity and subsequent disaster recovery planning. The communications link is often overlooked when considering networks and disaster recovery. We tend to first consider protecting ourselves against the problems that occur locally, at our location. For example, if your business is located in a hurricane zone, you think about protection from flooding and other physical damage to your place of business. But odds are that your business also relies on connections to the outside world of suppliers, sales staff or remote offices. Maybe the hurricane misses your office and instead destroys the central office eight blocks away through which all of your network connections originate. While your building may be physically untouched, the business impact from the loss of your network connection could be tremendous. How do you protect against this type of disaster? Eliminating the 4 Critical Points of Failure On-From a communications network perspective, eliminating common failure points is subject to the engineering rules and best practices of each carrier. But for most BCDR planning purposes, addressing four critical points of failure can help incrementally reduce your overall risk of a network outage. You should ask your carrier pointed questions about physical network routes, gateway facility design, equipment reliability, and technical features. Question 1: Can you demonstrate physical route diversity? Route diversity is one of the most challenging items to address. The reasons are both physical and operational. There are limited ways to physically connect to any given location. Rights of way are strictly controlled and, although it would seem that there are an infinite number of ways to connect City A to City B, there may be as few as three or four major long-haul route paths between those cities. All telecommunications carriers serving a particular city share these common routes. This is why a single fiber cut often impacts multiple carriers.

4 Further complicating the issue, only a few carriers actually build and maintain their own fiber connections. Many carriers simply lease or purchase connectivity from these carriers. From a business perspective, who builds and who leases is kept somewhat secret. Dark Fiber Considerations Many businesses consider building their own communications network to gain greater control of their network. Keep in mind that if you are looking to acquire rights to use dark fiber, you ll need to deploy your own equipment at the point where the fiber terminates in a carrier s gateway. In addition to the task of lighting the fiber, you ll need to ensure that your own gateway within the carrier s facility is built reliably. For example, to ensure that you are protected from Farmer John s annual spring plow fiber cut, you arrange to have communication services from your data center to your main office delivered by two different carriers. Unbeknownst to you, Carrier A has purchased fiber from Carrier B, and everyone s fiber is in the same cable running through Farmer John s field. Unless you directly ask, you may not know whether your carrier owns or leases their connections in a given area. The bottom line: working with multiple carriers does not guarantee multiple routes. In some cases, separate paths might be best provided by a single carrier that actually operates their fiber resources and can provide you with routes that they know to be physically diverse. Question 2: How is your gateway facility designed for power, security, cooling and diverse connectivity? A carrier gateway or central office represents another single point of failure, due to its single physical location. The gateway is home to the equipment used to create communications services. Whether the service is data, voice or video, the equipment that creates it requires a secure location with space, power and cool air. How do you know if your gateway is a carrier grade facility? Ask your provider about: Redundant Power Gateways can be designed with multiple power connections using separate paths to the main power grid. Multiple power supplies within the building should have UPS and generator backups. Physical Security Physical security protects equipment from unauthorized access. Gateways should be protected by multiple layers of access control; for example, systems may need to provide separate access to areas managed by different carriers. Resilient Cooling Within a gateway, highly reliable and well-designed cooling systems are critical. Diverse Connectivity Just as carriers share rights of way, they also share gateway space. You cannot assume that because you use multiple carriers they have separate network resources. Ask you carrier where your connections are terminated. Is it in their gateway or a leased facility? There is an enormous difference between enterprise-grade and carrier-grade communications equipment. You cannot take for granted that every communications provider deploys carrier-grade equipment. Also, consider route diversity within the gateway. Separate physical paths can often home back to a single gateway. While this could pose an increased risk, it can be mitigated by diverse building penetrations, laterals, and cable tray routing. Question 3: Do you use carrier-grade communications equipment? There is an enormous difference between enterprisegrade and carrier-grade communications equipment. Both a large enterprise and a carrier may have gigabyte routers in their data centers, and those routers may have very similar performance characteristics. But that s where the similarity ends. Carrier-grade equipment is designed to allow for multiple redundant power feeds. It will likely incorporate redundant power supplies and data processing cards. It is typically designed to be mounted in a hardened environment and to operate in extreme environmental conditions.

5 You cannot take for granted that every communications provider deploys carrier-grade equipment. This isn t to say that in some cases the enterprise-grade equipment may actually provide a reliable solution. Ultimately, the best way to understand the reliability the carrier expects to derive from any particular system is to ask them to put in writing, in the form of a Service Level Agreement (SLA). If there is no SLA for service availability, or if the SLA is best-effort, you need to carefully consider how the loss of connectivity could impact both your business continuity and disaster recovery efforts. Question 4: Does the SLA support the service from end-to-end? When it comes to technical features for fault tolerance, each communications technology is designed differently. Some technologies are purposefully designed with no fault tolerance. For example, if a message were lost for a certain application, trying to recover it might cost more in terms of resources than the impact of the loss itself. Optical transport systems, on the other hand, are usually designed with mechanisms that provide for nearly instantaneous fault recovery. While understanding how these technologies work would be of value, you don t need to be a telecommunications engineer to decipher the strength or weaknesses of each technology as it pertains to your BCDR planning. The solution is as simple as a close examination of the service SLA. The metric that you want to consider is the network availability. You should understand what the availability specification is and how it is specified. You ll want to know if it includes the entire connection path or if it only includes the core carrier network. The best SLAs will include the entire service connection from end-to-end. Data Replication Overview Data replication is often one of the most key processes business use to provide for business continuity. Unlike a backup, which are just snapshots in time, a replicated database is a live copy that changes with the primary image. Synchronous replication provides the highest protection against data loss, yet also requires the most resources. In a synchronous system, whenever a new piece of information is stored, it is written to two separate storage systems. The application must wait until a write acknowledgement is received from both systems before the operation can be completed. When storage systems are in different physical locations, the connection bandwidth, reliability and latency between the locations are very important. Asynchronous replication does not require an immediate write acknowledgement. Because of this, the replicated storage system can be located much further away and has less stringent network connectivity requirements. However, these solutions are subject to lag there can be a significant difference between the two storage images due to the delay time it takes for the write action to complete on the replicated system. The network is the primary source for this delay, so be sure to manage the amount of acceptable lag and provide a sufficient amount of bandwidth. Backup Datacenter MPLS Network Secondary asynchronous replication via MPLS Network Medical Manufacturing Facility Primary Secondary Corporate HQ Datacenter Primary synchronous replication via redundant diversely routed DWDM links

6 Incorporating Highly Available Services into the BCDR Plan With an understanding of how the communications network can be designed to provide highly available services, we can better take advantage of the service benefits. Knowing the right questions to ask about how the service is provided by the carrier can help you specify the correct type of connections for a particular service in light of your specific business continuity plans. Example Scenario Through the assessment of their operations, an international medical products company determined that their supply chain management database is mission-critical and needs to be protected with a storage replication solution. Their manufacturing facility is located in an area subject to extreme weather, so they desired a geographically diverse backup system. Since the database is accessed and updated often, they sought solutions for both synchronous and asynchronous replication. The synchronous replication storage was placed within one of their branch locations located in the same city as their main data center. Since DWDM would provide very low latency, they chose to use a dedicated DWDM service for the connectivity. Additionally, they chose a protected service so that a fiber cut wouldn t interrupt their operations. They also worked with the carrier to ensure that their protection fiber was built over a diverse physical route. To allow for geographic diversity, the company set up an asynchronous replicated storage system with the remote disk array located in a leased data center space in a different city. Performance of the replication system was still important, but because it wouldn t impact their day-to-day operations as significantly, they chose to use a private MPLS-based VPN for this connectivity. While replication can require large amounts of bandwidth, its demands can be a very bursty. To control cost, a usage-based service was used that allows the company to better manage costs yet still have access to high bandwidth as required. And since this service is redundant to their primary synchronous solution, they selected a communications service with an availability SLA of 99.99% that covered their entire connection from end-to-end. Your communications are vital; from providing the voice connections you need to contact your employees and customers, to the data connections used to access to your off-line storage. Summary Business continuity and disaster recovery planning requires businesses to asses their entire operation. As we look to self insure, we must think like an insurance company. The first step to putting a policy in place should be a careful risk assessment. As your organization prepares its BCDR plan, assess all of your risks. Know the points of failure. Your communications are vital; from providing the voice connections you need to contact your employees and customers, to the data connections used to access to your off-line storage. There are highly available communications solutions available that, when properly applied, can greatly help you manage your risks. We build, operate and take end-to-end responsibility for the network solutions that connect you to the world. We put customers first and take ownership of reliability and security across our broad portfolio Level 3 Communications, LLC. All Rights Reserved. Level 3, Level 3 Communications, the Level 3 Logo, MyLevel3 and Vyvx are either registered service marks or service marks of Level 3 Communications, LLC and/or one of its Affiliates in the United States and/or other countries. Level 3 services are provided by wholly owned subsidiaries of Level 3 Communications, Inc. Any other service names, product names, company names or logos included herein are the trademarks or service marks of their respective owners. REV. 08/14

Hybrid Cloud for Business Communications

Hybrid Cloud for Business Communications Hybrid Cloud for Business Communications THE ESSENTIAL GUIDE So you re considering hybrid cloud for your business communications. You re not alone! In fact, more and more businesses are turning to cloud

More information

Building Infrastructure for Private Clouds Cloud InterOp 2014"

Building Infrastructure for Private Clouds Cloud InterOp 2014 Building Infrastructure for Private Clouds Cloud Connect @ InterOp 2014" Paul Savill Senior Vice President Product Management, Core Network Services Level 3 Communications Key Network Strategy/ Design

More information

Differentiating Your Datacentre in the Networked Future John Duffin

Differentiating Your Datacentre in the Networked Future John Duffin Differentiating Your Datacentre in the Networked Future John Duffin Managing Director, South Asia. Uptime Institute July 2017 2017 Uptime Institute, LLC The Global Datacentre Authority 2 2017 Uptime Institute,

More information

WHITE PAPER. Header Title. Side Bar Copy. Header Title 5 Reasons to Consider Disaster Recovery as a Service for IBM i WHITEPAPER

WHITE PAPER. Header Title. Side Bar Copy. Header Title 5 Reasons to Consider Disaster Recovery as a Service for IBM i WHITEPAPER Side Bar Copy Header Title Header Title 5 Reasons to Consider Disaster Recovery as a Service for IBM i WHITEPAPER Introduction Due to the complexity of protecting ever-changing infrastructures and the

More information

Diverse Connect. Guaranteed connectivity for all your critical applications

Diverse Connect. Guaranteed connectivity for all your critical applications Diverse Connect Guaranteed connectivity for all your critical applications 1 Your business can t afford outages 2 As you migrate more applications and business communications to the cloud, network outages

More information

Appendix 3 Disaster Recovery Plan

Appendix 3 Disaster Recovery Plan Appendix 3 Disaster Recovery Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A3-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision

More information

Business Continuity and Disaster Recovery. Ed Crowley Ch 12

Business Continuity and Disaster Recovery. Ed Crowley Ch 12 Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster

More information

A Practical Guide to Cost-Effective Disaster Recovery Planning

A Practical Guide to Cost-Effective Disaster Recovery Planning White Paper PlateSpin A Practical Guide to Cost-Effective Disaster Recovery Planning Organizations across the globe are finding disaster recovery increasingly important for a number of reasons. With the

More information

MPLS SOLUTION How to Make the Best Choice for Your Business

MPLS SOLUTION How to Make the Best Choice for Your Business HOW-TO GUIDE Choosing the Right MPLS SOLUTION How to Make the Best Choice for Your Business TABLE OF CONTENTS Introduction 3 CH. 1 Why Organizations Choose MPLS 4 CH. 2 What Types of MPLS Solutions Will

More information

IBM TS7700 grid solutions for business continuity

IBM TS7700 grid solutions for business continuity IBM grid solutions for business continuity Enhance data protection and business continuity for mainframe environments in the cloud era Highlights Help ensure business continuity with advanced features

More information

Transform your network and your customer experience. Introducing SD-WAN Concierge

Transform your network and your customer experience. Introducing SD-WAN Concierge Transform your network and your customer experience Introducing SD-WAN Concierge Optimize your application performance, lower your total cost of ownership and simplify your network management. 2X Bandwith

More information

MPLS VERSUS CARRIER ETHERNET 7 REASONS WHY ETHERNET IS AN ECONOMICAL ALTERNATIVE

MPLS VERSUS CARRIER ETHERNET 7 REASONS WHY ETHERNET IS AN ECONOMICAL ALTERNATIVE MPLS VERSUS CARRIER ETHERNET 7 REASONS WHY ETHERNET IS AN SUMMARY The telecom marketplace is a fragmented one. It s difficult to understand what options are available and which service is the most economical

More information

Connect To. A Better Communications Experience

Connect To. A Better Communications Experience Connect To A Better Communications Experience Thriving In a Digital Economy 60.7% of buildings are in the Fiber Gap with no accessibility to fiber. 1 We are in a hyper-connected, high-tech economy. And

More information

CONFIGURATION GUIDE WHITE PAPER JULY ActiveScale. Family Configuration Guide

CONFIGURATION GUIDE WHITE PAPER JULY ActiveScale. Family Configuration Guide WHITE PAPER JULY 2018 ActiveScale Family Configuration Guide Introduction The world is awash in a sea of data. Unstructured data from our mobile devices, emails, social media, clickstreams, log files,

More information

WHY NETWORK FAILOVER PROTECTION IS A BUSINESS NECESSITY

WHY NETWORK FAILOVER PROTECTION IS A BUSINESS NECESSITY WHY NETWORK FAILOVER PROTECTION IS A BUSINESS NECESSITY Since its early days in the 1990s, the Internet has truly transformed the world. It would be difficult, if not impossible, to find an industry that

More information

Why the Threat of Downtime Should Be Keeping You Up at Night

Why the Threat of Downtime Should Be Keeping You Up at Night Why the Threat of Downtime Should Be Keeping You Up at Night White Paper 2 Your Plan B Just Isn t Good Enough. Learn Why and What to Do About It. Server downtime is an issue that many organizations struggle

More information

Understanding Virtual System Data Protection

Understanding Virtual System Data Protection Understanding Virtual System Data Protection Server virtualization is the most important new technology introduced in the data center in the past decade. It has changed the way we think about computing

More information

BT Connect Networks that think Optical Connect UK

BT Connect Networks that think Optical Connect UK BT Connect Networks that think Optical Connect UK Fast, reliable, secure and affordable Connecting the heart of your organisation Your organisation and its people rely on its applications email, databases,

More information

Business Benefits of Policy Based Data De-Duplication Data Footprint Reduction with Quality of Service (QoS) for Data Protection

Business Benefits of Policy Based Data De-Duplication Data Footprint Reduction with Quality of Service (QoS) for Data Protection Data Footprint Reduction with Quality of Service (QoS) for Data Protection By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (Auerbach) October 28th,

More information

Step into the future. HP Storage Summit Converged storage for the next era of IT

Step into the future. HP Storage Summit Converged storage for the next era of IT HP Storage Summit 2013 Step into the future Converged storage for the next era of IT 1 HP Storage Summit 2013 Step into the future Converged storage for the next era of IT Karen van Warmerdam HP XP Product

More information

Network Diversity and Survivability:

Network Diversity and Survivability: Network Diversity and Survivability: Five ways to evolve to true diversity WHITE PAPER An Independent Analysis Published on Behalf of Spectrum Enterprise TABLE OF CONTENTS Executive Summary... 2 Different

More information

Transform your network and your customer experience. Introducing SD-WAN Concierge

Transform your network and your customer experience. Introducing SD-WAN Concierge Transform your network and your customer experience Introducing SD-WAN Concierge Optimize your application performance, lower your total cost of ownership and simplify your network management. 2X Bandwith

More information

Veritas Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL 2008

Veritas Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL 2008 Veritas Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL 2008 Windows Server 2003 Windows Server 2008 5.1 Application Pack 1 Veritas Storage Foundation

More information

HUAWEI OceanStor Enterprise Unified Storage System. HyperReplication Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

HUAWEI OceanStor Enterprise Unified Storage System. HyperReplication Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD. HUAWEI OceanStor Enterprise Unified Storage System HyperReplication Technical White Paper Issue 01 Date 2014-03-20 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may

More information

IT your way - Hybrid IT FAQs

IT your way - Hybrid IT FAQs Hybrid IT IT your way - Hybrid IT FAQs Create a strategy that integrates in-house and outsourced IT services to meet ever-changing business requirements. Combine on-premise and off premise solutions Mix

More information

RingCentral White Paper UCaaS Connectivity Options in the New Age. White Paper. UCaaS Connectivity Options in the New Age: Best Practices

RingCentral White Paper UCaaS Connectivity Options in the New Age. White Paper. UCaaS Connectivity Options in the New Age: Best Practices White Paper UCaaS Connectivity Options in the New Age: Best Practices 1 Today s IT stacks are cloud-first, taking advantage of the many benefits of SaaS applications, while answering the increasing needs

More information

WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY

WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY White Paper 2 Why Building Security Systems Need Continuous Availability Always On Is the Only Option. If All Systems Go Down, How Can You React

More information

High Availability for Cisco Unified Communications on the Cisco Unified Computing System (UC on UCS)

High Availability for Cisco Unified Communications on the Cisco Unified Computing System (UC on UCS) White Paper High Availability for Cisco Unified Communications on the Cisco Unified Computing System (UC on UCS) Updated January 2013 2012 Cisco and/or its affiliates. All rights reserved. This document

More information

Disaster Recovery Is A Business Strategy

Disaster Recovery Is A Business Strategy Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...

More information

Network Service Description

Network Service Description Network Service Description Applies to: Office 365 Dedicated Topic Last Modified: 2015-09-03 Contents... 1 Network Architecture... 2 Customer Connectivity to Services... 5 Customer-Owned Private Network

More information

Balancing RTO, RPO, and budget. Table of Contents. White Paper Seven steps to disaster recovery nirvana for wholesale distributors

Balancing RTO, RPO, and budget. Table of Contents. White Paper Seven steps to disaster recovery nirvana for wholesale distributors White Paper Seven steps to disaster recovery nirvana for wholesale distributors Balancing RTO, RPO, and budget In our last white paper, Thinking through the unthinkable: Disaster recovery for wholesale

More information

THE FASTEST WAY TO CONNECT YOUR NETWORK. Accelerate Multiple Location Connectivity with Ethernet Private Line Solutions FIBER

THE FASTEST WAY TO CONNECT YOUR NETWORK. Accelerate Multiple Location Connectivity with Ethernet Private Line Solutions FIBER THE FASTEST WAY TO CONNECT YOUR NETWORK Accelerate Multiple Location Connectivity with Ethernet Private Line Solutions FIBER In today s competitive business environment, speed is the name of the game.

More information

ALCATEL Edge Services Router

ALCATEL Edge Services Router ALCATEL 7420 Edge Services Router Alcatel builds next generation networks, delivering integrated end-to-end voice and data networking solutions to established and new carriers, as well as enterprises and

More information

Transport is now key for extended SAN applications. Main factors required in SAN interconnect transport solutions are:

Transport is now key for extended SAN applications. Main factors required in SAN interconnect transport solutions are: E Transport is now key for extended SAN applications. Main factors required in SAN interconnect transport solutions are: Native support for all SAN protocols including ESCON, Fibre Channel and Gigabit

More information

CONSIDERATIONS BEFORE MOVING TO THE CLOUD

CONSIDERATIONS BEFORE MOVING TO THE CLOUD CONSIDERATIONS BEFORE MOVING TO THE CLOUD What Management Needs to Know Part I By Debbie C. Sasso Principal When talking technology today, it s very rare that the word Cloud doesn t come up. The benefits

More information

Advanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER

Advanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER Advanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER Introduction Disaster Recovery (DR) is a fundamental tool for mitigating IT and business risks. But because it is perceived as

More information

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud W H I T E P A P E R : O P E N. V P N C L O U D Implementing A Secure OpenVPN Cloud Platform White Paper: OpenVPN Cloud Platform Implementing OpenVPN Cloud Platform Content Introduction... 3 The Problems...

More information

Introduction to Business continuity Planning

Introduction to Business continuity Planning Week - 06 Introduction to Business continuity Planning 1 Introduction The purpose of this lecture is to give an overview of what is Business Continuity Planning and provide some guidance and resources

More information

IPMA State of Washington. Disaster Recovery in. State and Local. Governments

IPMA State of Washington. Disaster Recovery in. State and Local. Governments IPMA State of Washington Disaster Recovery in State and Local Governments Disaster by the Numbers Over 70% of agencies had some sort of data loss incident in 2012 Under 5% report that they were able to

More information

Reliable, fast data connectivity

Reliable, fast data connectivity Data Reliable, fast data connectivity Discover business-grade, high speed data connectivity Harness cloud services - converge data and voice Our family of high-speed IP connectivity services connects your

More information

SD-WAN Transform Your Agency

SD-WAN Transform Your Agency Federal SD-WAN Transform Your Agency 1 Overview Is your agency facing network traffic challenges? Is migration to the secured cloud hogging scarce bandwidth? How about increased mobile computing that is

More information

Choosing the Right. Ethernet Solution. How to Make the Best Choice for Your Business

Choosing the Right. Ethernet Solution. How to Make the Best Choice for Your Business Choosing the Right Ethernet Solution How to Make the Best Choice for Your Business TABLE OF CONTENTS Introduction 3 CH. 1 Why Do Organizations Choose Ethernet? 4 CH. 2 What Type of Ethernet Solutions Will

More information

YOUR CONDUIT TO THE CLOUD

YOUR CONDUIT TO THE CLOUD COLOCATION YOUR CONDUIT TO THE CLOUD MASSIVE NETWORKS Enterprise-Class Data Transport Solutions SUMMARY COLOCATION PROVIDERS ARE EVERYWHERE. With so many to choose from, how do you know which one is right

More information

Data Services. Reliable, high-speed data connectivity

Data Services. Reliable, high-speed data connectivity Data Services Reliable, high-speed data connectivity Discover businessgrade, high-speed data connectivity Our family of data services includes (with Fibre To The Cabinet and Converged Voice and Data),

More information

SIMPLE, FLEXIBLE CONNECTIONS FOR TODAY S BUSINESS. Ethernet Services from Verizon

SIMPLE, FLEXIBLE CONNECTIONS FOR TODAY S BUSINESS. Ethernet Services from Verizon SIMPLE, FLEXIBLE CONNECTIONS FOR TODAY S BUSINESS Ethernet Services from Verizon For growing businesses, the network is more important than ever. It s the foundation for all of the technology that helps

More information

Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution

Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution The Ever-Present Storage Management Conundrum In the modern IT landscape, the storage management conundrum is as familiar

More information

Virtualization with Protection for SMBs Using the ReadyDATA 5200

Virtualization with Protection for SMBs Using the ReadyDATA 5200 Virtualization with Protection for SMBs Using the ReadyDATA WHITE PAPER For most small-to-medium size businesses, building a virtualization solution that provides scalability, reliability, and data protection

More information

How to license Oracle Database programs in DR environments

How to license Oracle Database programs in DR environments How to license Oracle Database programs in DR environments Author: Andra Tarata It is commonly known that the use of almost any Oracle software program requires a license. But how does that work when you

More information

PRODUCT OVERVIEW. Storage and Backup. Flexible Scalable Storage Solutions for. Product Overview. Storage and Backup

PRODUCT OVERVIEW. Storage and Backup. Flexible Scalable Storage Solutions for. Product Overview. Storage and Backup PRODUCT OVERVIEW Flexible Scalable Storage Solutions for Today s Data Driven Businesses 1 2 PRODUCT OVERVIEW Summary Data is essential in driving business and the sheer amount of it for any enterprise

More information

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery White Paper Business Continuity Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery Table of Contents Executive Summary... 1 Key Facts About

More information

Help your Cisco customers defend against downtime and reduce costs

Help your Cisco customers defend against downtime and reduce costs Help your Cisco customers defend against downtime and reduce costs Why and when to sell Eaton Power Management solutions Incorporating power management with Cisco solutions boosts your sales revenue, while

More information

Managing Data Center Interconnect Performance for Disaster Recovery

Managing Data Center Interconnect Performance for Disaster Recovery Managing Data Center Interconnect Performance for Disaster Recovery Data center interconnects (DCI) are traditionally used for critical data replication to meet corporate compliance and continuity requirements.

More information

Disk-Based Data Protection Architecture Comparisons

Disk-Based Data Protection Architecture Comparisons Disk-Based Data Protection Architecture Comparisons Abstract The dramatic drop in the price of hard disk storage combined with its performance characteristics has given rise to a number of data protection

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

RECOVERY & BUSINESS CONTINUITY SERVICES. Protect your data. Recover your environment. Manage your recovery.

RECOVERY & BUSINESS CONTINUITY SERVICES. Protect your data. Recover your environment. Manage your recovery. RECOVERY & BUSINESS CONTINUITY SERVICES Protect your data. Recover your environment. Manage your recovery. While it s true that businesses rely on IT services more than ever, it s also true that the environments

More information

arcserve r16.5 Hybrid data protection

arcserve r16.5 Hybrid data protection arcserve r16.5 Hybrid data protection Whether you re protecting the data center, remote offices or desktop resources, you need a solution that helps you meet today s demanding service-level agreements

More information

Building Backup-to-Disk and Disaster Recovery Solutions with the ReadyDATA 5200

Building Backup-to-Disk and Disaster Recovery Solutions with the ReadyDATA 5200 Building Backup-to-Disk and Disaster Recovery Solutions with the ReadyDATA 5200 WHITE PAPER Explosive data growth is a challenging reality for IT and data center managers. IDC reports that digital content

More information

Annual Public Safety PSAP Survey results

Annual Public Safety PSAP Survey results Annual Public Safety PSAP Survey results 573 PSAP Employees Surveyed March - July 2016 2016 Stratus Technologies. All Rights Reserved. 1 Stratus PSAP Survey March 2016 From March 2016 through July of 2016,

More information

Improving Business Continuity for the

Improving Business Continuity for the Improving Business Continuity for the Remote Office EXECUTIVE SUMMARY Remote System availability is critical to maintaining business continuity. Network outages and related disruptions in services account

More information

What happens to my phones if the Internet connection goes down?

What happens to my phones if the Internet connection goes down? What happens to my phones if the Internet connection goes down? With a traditional phone system, all call processing hardware is locatedon-site, along with handsets, call recording equipment, voice-mail

More information

What can the OnBase Cloud do for you? lbmctech.com

What can the OnBase Cloud do for you? lbmctech.com What can the OnBase Cloud do for you? lbmctech.com The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, long tracks of outstanding

More information

EVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER

EVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER WHITE PAPER EVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER Overview Enterprises lose $700 billion from downtime; losses fall into three categories: lost revenue (17%), lost productivity (73%), and

More information

INNOVATIVE SD-WAN TECHNOLOGY

INNOVATIVE SD-WAN TECHNOLOGY INNOVATIVE SD-WAN TECHNOLOGY Enhance network performance and increase ROI with WANworX TM Many of the WAN deployments today are based on older technology that was acceptable when businesses did not run

More information

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business

More information

A Model for Resilience

A Model for Resilience A Model for Resilience THREE STEPS TO CREATING A RESILIENT, CHANGE-READY ENTERPRISE Business resilience is the ability to anticipate risk, mitigate the impact and move forward with confidence as you transform

More information

INFORMATION SECURITY- DISASTER RECOVERY

INFORMATION SECURITY- DISASTER RECOVERY Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy

More information

UPS system failure. Cyber crime (DDoS ) Accidential/human error. Water, heat or CRAC failure. W eather related. Generator failure

UPS system failure. Cyber crime (DDoS ) Accidential/human error. Water, heat or CRAC failure. W eather related. Generator failure BEST PRACTICES: LEVERAGING CLOUD AND COLOCATION TO AVOID DOWNTIME Business continuity implementations that address traditional and emerging threats KEY TAKEAWAYS The cost for unplanned downtime has never

More information

Total Cost of Ownership: Benefits of the OpenText Cloud

Total Cost of Ownership: Benefits of the OpenText Cloud Total Cost of Ownership: Benefits of the OpenText Cloud OpenText Managed Services in the Cloud delivers on the promise of a digital-first world for businesses of all sizes. This paper examines how organizations

More information

Backup and Restore Strategies

Backup and Restore Strategies Backup and Restore Strategies WHITE PAPER How to identify the appropriate life insurance for your data At home, you safeguard against any incident to protect your family, your life, your property everything

More information

Emergence of Business Continuity to Ensure Business and IT Operations. Solutions to successfully meet the requirements of business continuity.

Emergence of Business Continuity to Ensure Business and IT Operations. Solutions to successfully meet the requirements of business continuity. Emergence of Business Continuity to Ensure Business and IT Operations Solutions to successfully meet the requirements of business continuity. 2 3 4 5 Introduction Use of Virtualization Technology as a

More information

Backup vs. Business Continuity

Backup vs. Business Continuity EBOOK Backup vs. Business Continuity 1 datto.com Data protection solutions are essential for businesses of all sizes to implement, regardless of size, industry and geographic location. In this white paper,

More information

Module 4 STORAGE NETWORK BACKUP & RECOVERY

Module 4 STORAGE NETWORK BACKUP & RECOVERY Module 4 STORAGE NETWORK BACKUP & RECOVERY BC Terminology, BC Planning Lifecycle General Conditions for Backup, Recovery Considerations Network Backup, Services Performance Bottlenecks of Network Backup,

More information

TOP REASONS TO CHOOSE DELL EMC OVER VEEAM

TOP REASONS TO CHOOSE DELL EMC OVER VEEAM HANDOUT TOP REASONS TO CHOOSE DELL EMC OVER VEEAM 10 This handout overviews the top ten reasons why customers choose Data Protection from Dell EMC over Veeam. Dell EMC has the most comprehensive data protection

More information

Connectivity to Cloud-First Applications

Connectivity to Cloud-First Applications Aruba and Riverbed Partner to Accelerate and Optimize Mobile-First Connectivity to Cloud-First Applications Today s workforce is more distributed, more mobile, and more demanding. Constant availability

More information

IBM TotalStorage Enterprise Storage Server Model 800

IBM TotalStorage Enterprise Storage Server Model 800 A high-performance resilient disk storage solution for systems across the enterprise IBM TotalStorage Enterprise Storage Server Model 800 e-business on demand The move to e-business on demand presents

More information

Executive Report. Using the CyrusOne IX for Active-Active, Active-Passive and Active-DR Interconnection

Executive Report. Using the CyrusOne IX for Active-Active, Active-Passive and Active-DR Interconnection Executive Report Using the CyrusOne IX for Active-Active, Active-Passive and Active-DR Interconnection A better use of time and money is to use large Web-scale carrier-neutral data centers containing the

More information

EdgeConnectSP The Premier SD-WAN Solution

EdgeConnectSP The Premier SD-WAN Solution SERVICE PROVIDER EdgeConnectSP The Premier SD-WAN Solution Build High-Performance Managed SD-WAN Services Challenges with Legacy WANs Significant shifts in application and traffic patterns, including the

More information

Smart Fiber is Smart Business. Connectivity Benefits to Property Managers and Tenants

Smart Fiber is Smart Business. Connectivity Benefits to Property Managers and Tenants Smart Fiber is Smart Business Connectivity Benefits to Property Managers and Tenants Attract More Tenants Smart Fiber is smart business for property managers and commercial building owners. When you offer

More information

Solution Brief. IBM eserver BladeCenter & VERITAS Solutions for Microsoft Exchange

Solution Brief. IBM eserver BladeCenter & VERITAS Solutions for Microsoft Exchange Solution Brief IBM e BladeCenter & VERITAS Solutions for Microsoft IBM e BladeCenter and VERITAS: Working Together to Deliver High Availability For Microsoft August 2003 1 Table of Contents Executive Summary...3

More information

Introduction. Read on and learn some facts about backup and recovery that could protect your small business.

Introduction. Read on and learn some facts about backup and recovery that could protect your small business. Introduction No business can afford to lose vital company information. Small-business owners in particular must take steps to ensure that client and vendor files, company financial data and employee records

More information

What's in this guide... 4 Documents related to NetBackup in highly available environments... 5

What's in this guide... 4 Documents related to NetBackup in highly available environments... 5 Contents Chapter 1 About in this guide... 4 What's in this guide... 4 Documents related to NetBackup in highly available environments... 5 Chapter 2 NetBackup protection against single points of failure...

More information

CLOUDALLY EBOOK. Best Practices for Business Continuity

CLOUDALLY EBOOK. Best Practices for Business Continuity CLOUDALLY EBOOK 8 Disaster Recovery Best Practices for Business Continuity Introduction Disaster can strike at any moment, and it s impossible to plan for every eventuality. When Hurricane Katrina hit

More information

Public and Private Interdependencies Filling a Gap in Most Continuity Plans

Public and Private Interdependencies Filling a Gap in Most Continuity Plans Public and Private Interdependencies Filling a Gap in Most Continuity Plans John A Jackson Executive Vice President Fusion Risk Management, Inc. The evolution of the continuity industrytechnology advancement

More information

A Ready Business rises above infrastructure limitations. Vodacom Power to you

A Ready Business rises above infrastructure limitations. Vodacom Power to you A Ready Business rises above infrastructure limitations Vodacom Power to you Vodacom Business Nigeria Managed Hosted Services Get Ready to free up your business. To succeed in today s world of dramatic

More information

Peer Software and Scality - A Distributed File System Approach to Scale-out Storage

Peer Software and Scality - A Distributed File System Approach to Scale-out Storage Peer Software and Scality - A Distributed File System Approach to Scale-out Storage Contents Introduction - What We All Want........................... 2 Why Cloud Gateways................................

More information

Data Services. Reliable, high-speed data connectivity. Group Ltd

Data Services. Reliable, high-speed data connectivity. Group Ltd Data Services Reliable, high-speed data connectivity Group Ltd Discover businessgrade, high-speed data connectivity Harness cloud services - converge data and voice Our family of high-speed IP connectivity

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting

More information

CASE STUDY: Borrego Health

CASE STUDY: Borrego Health In Brief Industry Health / Medical Industry Challenge Network downtime was affecting mission critical operations such as VOIP, EHS and Citrix One carrier s MPLS network didn t cover all locations, creating

More information

Continuous Processing versus Oracle RAC: An Analyst s Review

Continuous Processing versus Oracle RAC: An Analyst s Review Continuous Processing versus Oracle RAC: An Analyst s Review EXECUTIVE SUMMARY By Dan Kusnetzky, Distinguished Analyst Most organizations have become so totally reliant on information technology solutions

More information

SQL Server HA and DR: A Simple Strategy for Realizing Dramatic Cost Savings

SQL Server HA and DR: A Simple Strategy for Realizing Dramatic Cost Savings SQL Server HA and DR: A Simple Strategy for Realizing Dramatic Cost Savings by Joseph D Antoni Microsoft Data Platform MVP Significant savings in both SQL licensing and SAN TCO. As companies become increasingly

More information

Disaster Happens; Don t Be Held

Disaster Happens; Don t Be Held Disaster Happens; Don t Be Held Arm yourself with EVault Hostage Mike Challender Regional Channel Sales Manager Carbonite KEY CONSIDERATIONS FOR DISASTER-PROOF DATA What are your risk factors for data

More information

Virtual Disaster Recovery

Virtual Disaster Recovery The Essentials Series: Managing Workloads in a Virtual Environment Virtual Disaster Recovery sponsored by by Jaime Halscott Vir tual Disaster Recovery... 1 Virtual Versus Physical Disaster Recovery...

More information

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc.

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. Table of Contents Section I: The Need for Warm Standby...2 The Business Problem...2 Section II:

More information

Data Services. Reliable, high-speed data connectivity

Data Services. Reliable, high-speed data connectivity Data Services Reliable, high-speed data connectivity Discover businessgrade, high-speed data connectivity Our family of data services includes Broadband (with Fibre To The Cabinet and Converged Voice and

More information

Data center interconnect for the enterprise hybrid cloud

Data center interconnect for the enterprise hybrid cloud WHITEPAPER Data center interconnect for the enterprise hybrid cloud The world is moving to the cloud. Everything from entertainment and consumer mobile applications to enterprise software and government

More information

Information Technology Disaster Recovery Planning Audit Redacted Public Report

Information Technology Disaster Recovery Planning Audit Redacted Public Report 1200, Scotia Place, Tower 1 10060 Jasper Avenue Edmonton, Alberta T5J 3R8 edmonton.ca/auditor Information Technology Disaster Recovery Planning Audit Redacted Public Report June 12, 2018 City of Edmonton

More information

FLEXIBLE NETWORK SERVICES TO DRIVE YOUR ENTERPRISE AT CLOUD SPEED. Solution Primer

FLEXIBLE NETWORK SERVICES TO DRIVE YOUR ENTERPRISE AT CLOUD SPEED. Solution Primer FLEXIBLE NETWORK SERVICES TO DRIVE YOUR ENTERPRISE AT CLOUD SPEED Solution Primer ABSTRACT Software Defined Networking (SDN) has delivered significant benefits to datacenter networks, making it possible

More information

Features. HDX WAN optimization. QoS

Features. HDX WAN optimization. QoS May 2013 Citrix CloudBridge Accelerates, controls and optimizes applications to all locations: datacenter, branch offices, public and private clouds and mobile users Citrix CloudBridge provides a unified

More information

CONTENTS. 1. Introduction. 2. How To Store Data. 3. How To Access Data. 4. Manage Data Storage. 5. Benefits Of SAN. 6. Conclusion

CONTENTS. 1. Introduction. 2. How To Store Data. 3. How To Access Data. 4. Manage Data Storage. 5. Benefits Of SAN. 6. Conclusion CONTENTS 1. Introduction 2. How To Store Data 3. How To Access Data 4. Manage Data Storage 5. Benefits Of SAN 6. Conclusion 1. Introduction: A Storage Area Network (SAN) is a dedicated network that carries

More information

Avoiding the Cost of Confusion: SQL Server Failover Cluster Instances versus Basic Availability Group on Standard Edition

Avoiding the Cost of Confusion: SQL Server Failover Cluster Instances versus Basic Availability Group on Standard Edition One Stop Virtualization Shop Avoiding the Cost of Confusion: SQL Server Failover Cluster Instances versus Basic Availability Group on Standard Edition Written by Edwin M Sarmiento, a Microsoft Data Platform

More information