Hot Topics in IT Disaster Recovery
|
|
- Kathryn Cole
- 6 years ago
- Views:
Transcription
1 Risk Masters International LLC Hot Topics in IT Disaster Recovery Steven J. Ross Executive Principal A Presentation for the Middle Tennessee Chapter of ISACA
2 The Popular View of IT Disaster Recovery Today The general view Back up the data Run an annual test Recover when and if necessary Actually, there s a lot going on Acquisitions and divestitures Assessing data center risk Developing Disaster Recovery architecture Recovering from cyber attacks DRaaS 2
3 Acquisitions and Divestitures The risks in integrating or separating business continuity management capabilities Differences Risks DR programs at different levels of maturity and capability Different management expectations for recoverability, availability and resilience Different interdependencies among and between business functions and technologies Different budgets for tools, redundant equipment, alternate sites, etc. Different levels of acceptance of DR in the culture Critical business functions, applications and technologies overlooked in the plans Failure to take advantage of best practices Lowered morale of DR professionals Inadequate preparation for events of the transition, especially for IT, and unexpected events in the future Inability to build upon the two DR functions for continuous improvement in the future 3
4 Acquisitions and Divestitures, continued Top 10 transition initiatives 1. Develop an effective governance structure 2. Develop continuous improvement processes 3. Consolidate IT infrastructure recovery 4. Consolidate application recovery 5. Establish a long-term BCM vision/strategy 6. Retain best practices 7. Test new recovery procedures 8. Train personnel in new recovery procedures 9. Enhance BCM staff capabilities 10. Adopt leading-edge BCM tools 4
5 Acquisitions and Divestitures, continued 1. Develop an effective governance structure 2. Develop continuous improvement processes 3. Consolidate IT infrastructure recovery 4. Consolidate application recovery 5. Establish a long-term DR vision/strategy 6. Retain best practices 7. Test new recovery procedures 8. Train personnel in new recovery procedures 9. Enhance DR staff capabilities 10. Adopt leading-edge DR tools Business Continuity Capability Critical/Resilient Non-critical/Timeconsuming Slow/Difficult Fast/Easy Speed of Accomplishment 5
6 Assessing Data Center Risk Do data centers matter anymore? Isn t everything being done on mobile devices and standalone servers? No The real work of companies and government agencies is occurring in rooms filled with machines Centralized, organization-owned data centers Centralized colocation data centers Distributed data centers Data centers in the cloud The best form of IT Disaster Recovery is not to have a disaster at all 6
7 Assessing Data Center Risk, continued The physical layer matters, and so do the machines in it 7
8 Assessing Data Center Risk, continued Uptime Institute tier ratings Active capacity components to support the IT load Distribution paths Concurrently maintainable Tier I Tier II Tier III Tier IV N N+1 N active and 1 alternate N after any failure (2N) 2 simultaneously active No No Yes Yes Fault tolerance No No No Yes Compartmentalization Continuous cooling No No No Yes Load density dependent Load density dependent Load density dependent Class A Source: Uptime Institute Data Center Site Infrastructure Tier Standard: Topology 8
9 Assessing Data Center Risk, continued How to Assess Data Center Risk, Resilience and Sustainability Study as built blueprints Walk through the data center for a high level perspective Interview Data center manager/operators Facilities manager Security manager/guard staff Inspect Underfloor (if there is one) Above ceiling (look for brown spots) MEP (confirm ratings) Telecommunications and power lines (walk the lines) Around the outside of the building and in the vicinity (walk and drive) 9
10 Assessing Data Center Risk, continued How to Assess Data Center Risk, Resilience and Sustainability Review Maintenance logs Access logs Incident analyses Purchase orders Map what you see to standards and tier ratings Verify management s expectations for continuous service Is 5 nines enough? Unplanned Downtime per Year Seconds in a year = 31,536,000 Uptime % Seconds 99% 315, Days 2 nines % 103, Days Tier % 79, Hours Tier % 31, Hours 3 nines 99.99% 3, Hours 4 nines % Minutes 5 nines % Minutes Tier % Minutes Tier % 32 32Seconds 6 nines % 3.2 3Seconds 7 nines Source for Tier Ratings: Tier Ratings Define Site Infrastructure Performance, W. P. turner et al. 10
11 Developing Disaster Recovery Architecture What is a Disaster Recovery architecture? Architecture The character or style of building; a fundamental underlying design of computer hardware, software, or both Disaster Recovery Architecture The selection of system components and their configuration, designed to provide recoverability for some or all components used for productive purposes The analysis that produces such an architecture Rationale for choosing certain features Rationale for not choosing other alternatives Cost/benefit analysis Cost/risk analysis Feasibility and reliability 11
12 Developing Disaster Recovery Architecture, continued What is a Disaster Recovery architecture? The architecture needs to resolve all levels of the technology stack Physical location(s) Facilities Computing platforms Servers Mobile devices Storage Telecommunications Local Wide area Staffing Applications 12
13 Developing Disaster Recovery Architecture, continued What is a Disaster Recovery architecture? Implementation modes Internal Colocation Outsourced Hot site Cloud Hybrid Recovery timeframes Aligned with the BIA results Governance Future growth and design 13
14 Developing Disaster Recovery Architecture, continued Components of a Disaster Recovery architecture Implementation cost and timeframe Recovery tiers and sequence Capacity Current Planned Performance Business as usual Disruption Location Talent pool Standard of living Infrastructure Hazards Butte Odessa 14
15 Recovering from a Cyber Attack Recovery from What? Disclosure of information Plug the leak Ensure that there are no others Prevent recurrence If personal information is involved, notify government agencies Most normal operations can continue while the recovery proceeds Web site vandalism Close the site Fix the problem Return to normal operations The may be the most common occurrence, since web sites are the most exposed to anonymous users 15
16 Recovering from a Cyber Attack Recovery from What? Manipulation of data Stop all applications whose data is known to be affected Treat all other data with caution Identify and repair the cause of the problem Using DBA tools and user-based controls, identify and repair erroneous data and pointers These tools are in use for problems other than cyberattacks Determine whether some data has been deleted and if possible replace it Requires the use of backups, perhaps over many generations Restart applications, with caution In some cases, operations might continue, if new activity can be isolated from faulty existing data 16
17 Recovering from a Cyber Attack Recovery from What? Manipulation or destruction of software Identify infected software Compare current software with validated copies Hashing would be the most applicable technique In some cases, software vendors may be able to publish the signature of a known attack Recovery requires trusted images and a clean environment Logs and journals also required to roll forward Replace infected or destroyed software This may require going back as far as the last vendor release Subsequent local updates may need to be rolled forward Operations cannot continue in the affected environment until the software is replaced and possibly updated 17
18 Recovering from a Cyber Attack Recovery from What? Manipulation or destruction of data Identify affected databases Wherever software is attacked, it must be assumed that the related data was affected also However, there may be interactions among databases not reflected in software Recover manipulated or destroyed data This will require going back as far as the known date of an attack Subsequent local updates may need to be rolled forward Logs and journals are also required to roll forward Replicated data may be infected; hence the need for backups 18
19 Disaster Recovery as a Service (DRaaS) The Cloud and Disaster Recovery Service Use Eliminating Long Term Storage Archiving Rare restoration Tape libraries Backup and Recovery Point in time image Repairs Magnetic tape Disaster Recovery as a Service (DRaaS) Disaster recovery Recovery sites & staff 19
20 Disaster Recovery as a Service (DRaaS), continued Advantages of DRaaS Much faster recovery for the most critical applications, depending on SLAs selected (and paid for) As little as an hour available Greatly reduced constraint of having enough technically skilled personnel to perform a recovery Testing more frequently, with less cost and more convenience for personnel Elimination or at least reduction of the use of tape Data deduplication and compression might reduce the bandwidth for communication with the vendor No need to travel for testing or an actual recovery 20
21 Disaster Recovery as a Service (DRaaS), continued Factors to Consider Cloud vendor with a DRaaS offering or a Disaster Recovery vendor with a cloud? A cloud or a backup site? Internal replication and redundancy are critical attributes A cloud service or outsourcing? The quality of vendor personnel The quality and quantity of the vendor s data centers Locations Infrastructure Vendor-owned or colocation facility Insourcing How easily can you get your applications and data back 21
22 Disaster Recovery as a Service (DRaaS), continued Factors to Consider SLAs Can they be met Testing All at the same time? Vendor reliability (see Insourcing) Platform compatibility Storage sharing Data security/encryption In transit At rest Key management Access control 22
23 Disaster Recovery as a Service (DRaaS), continued Leading vendors it depends who you ask Source: Gartner, 2016 Source: Forrester Research, Inc
24 Feedback? 24
IT your way - Hybrid IT FAQs
Hybrid IT IT your way - Hybrid IT FAQs Create a strategy that integrates in-house and outsourced IT services to meet ever-changing business requirements. Combine on-premise and off premise solutions Mix
More informationAre You Protected. Get Ahead of the Curve
Are You Protected Get Ahead of the Curve DEMOGRAPHICS INTERVIEWED 2,200 IT DECISION- MAKERS IN 3 REGIONS: 500 Americas 1,100 Europe, Middle East, and Africa 600 Asia Pacific Japan INDEPENDENT RESEARCH
More informationDisaster Recovery and Business Continuity Planning (Mile2)
Disaster Recovery and Business Continuity Planning (Mile2) Course Number: DRBCP Length: 4 Day(s) Certification Exam This course will help you prepare for the following exams: ABCP: Associate Business Continuity
More informationIntroduction to Business continuity Planning
Week - 06 Introduction to Business continuity Planning 1 Introduction The purpose of this lecture is to give an overview of what is Business Continuity Planning and provide some guidance and resources
More informationVirtual protection gets real
Virtual protection gets real How to protect virtual machines from downtime and data loss 5 must-have features for VM backup Businesses virtualize to consolidate resources, reduce costs and increase workforce
More informationBUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW
BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business
More informationThe Nuances of Backup and Recovery Solutions
DEFINING THE RIGHT DATA PROTECTION STRATEGY The Nuances of Backup and Recovery Solutions Cindy LaChapelle, Principal Consultant, ISG ISG WHITE PAPER 2012 Information Services Group, Inc. All Rights Reserved
More informationDisaster Recovery Is A Business Strategy
Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...
More informationCisco Director Class SAN Planning and Design Service
Cisco Director Class SAN Planning and Design Service Rapidly Plan and Deploy a Cisco Director Class MDS Solution for More Efficient Storage Networking Service Overview Cisco s intelligent storage networking
More informationA Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist
A Survival Guide to Continuity of Operations David B. Little Senior Principal Product Specialist Customer Perspective: Recovery Time & Objective Asynchronous Replication Synchronous Replication WAN Clustering
More informationExpert Reference Series of White Papers. Understanding Data Centers and Cloud Computing
Expert Reference Series of White Papers Understanding Data Centers and Cloud Computing 1-800-COURSES www.globalknowledge.com Understanding Data Centers and Cloud Computing Paul Stryer, Global Knowledge
More informationRepairing the Broken State of Data Protection
Repairing the Broken State of Data Protection April 2016 Oracle s modern data protection solutions address both business continuity and disaster recovery, reducing IT costs and simplifying data protection
More informationDisaster recovery strategic planning: How achievable will it be?
April 16 18, 2012 Talking Stick Resort Scottsdale, Arizona Disaster recovery strategic planning: How achievable will it be? Prudence Marasigan Ernst & Young Advisory Services, Senior Manager prudence.marasigan@ey.com
More informationWHITE PAPER. Header Title. Side Bar Copy. Header Title 5 Reasons to Consider Disaster Recovery as a Service for IBM i WHITEPAPER
Side Bar Copy Header Title Header Title 5 Reasons to Consider Disaster Recovery as a Service for IBM i WHITEPAPER Introduction Due to the complexity of protecting ever-changing infrastructures and the
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting
More informationBUSINESS CONTINUITY: THE PROFIT SCENARIO
WHITE PAPER BUSINESS CONTINUITY: THE PROFIT SCENARIO THE BENEFITS OF A COMPREHENSIVE BUSINESS CONTINUITY STRATEGY FOR INCREASED OPPORTUNITY Organizational data is the DNA of a business it makes your operation
More informationBUSINESS CONTINUITY MANAGEMENT
BUSINESS CONTINUITY MANAGEMENT 64 th RBAP National Convention & General Membership Meeting 29 30 May 2017 PRESENTATION OUTLINE 2015 Disasters in Numbers 2016 & 2017 Top Business Risks What is BCM? Supervisory
More information2012 Business Continuity Management for CRISIS. Network Infrastructure for BCM
2012 Business Continuity Management for CRISIS Network Infrastructure for BCM FACTS about lack of DR Planning After the incident of the World Trade Center, 40% of the companies without disaster recovery
More informationThe Future of Business Continuity & Resiliency
The Future of Business Continuity & Resiliency Richard Cocchiara: IBM Distinguished Engineer; CTO IBM Business Continuity & Resiliency Services (BCRS); Managing Partner IBM Resiliency Consulting Services
More informationTHE FOUR STEPS TO A TAPELESS BACKUP ENVIRONMENT: YOUR HOW-TO GUIDE FOR DATA MANAGEMENT SUCCESS INTRODUCTION
THE FOUR STEPS TO A TAPELESS BACKUP ENVIRONMENT: YOUR HOW-TO GUIDE FOR DATA MANAGEMENT SUCCESS WHITE PAPER CONTENTS 1 INTRODUCTION 2 ASSESSMENT 3 EVALUATION 6 IMPLEMENTATION 7 MANAGEMENT 8 CONCLUSION INTRODUCTION
More informationNORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers
Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.
More informationProtecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery
White Paper Business Continuity Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery Table of Contents Executive Summary... 1 Key Facts About
More informationTake Back Lost Revenue by Activating Virtuozzo Storage Today
Take Back Lost Revenue by Activating Virtuozzo Storage Today JUNE, 2017 2017 Virtuozzo. All rights reserved. 1 Introduction New software-defined storage (SDS) solutions are enabling hosting companies to
More informationTSC Business Continuity & Disaster Recovery Session
TSC Business Continuity & Disaster Recovery Session Mohamed Ashmawy Infrastructure Consulting Pursuit Hewlett-Packard Enterprise Saudi Arabia Mohamed.ashmawy@hpe.com Session Objectives and Outcomes Objectives
More informationTHE STATE OF CLOUD & DATA PROTECTION 2018
THE STATE OF CLOUD & DATA PROTECTION 2018 Survey Results: 10 Findings on how over 800 IT Pros handle Disaster Recovery & Cloud Adoption. INTRODUCTION The Unitrends 2018 annual survey of IT professionals
More informationDisaster Recovery Webinar August 11, 2015
Disaster Recovery Webinar August 11, 2015 SPEAKERS Marcelo Oliveira, Product Director, Cable & Wireless Marcelo has several years of experience in Information Technology, having worked with organizations
More informationTransforming Data Protection with HPE: A Unified Backup and Recovery June 16, Copyright 2016 Vivit Worldwide
Transforming Data Protection with HPE: A Unified Backup and Recovery June 16, 2016 Copyright 2016 Vivit Worldwide Brought to you by Copyright 2016 Vivit Worldwide Hosted By Bob Crews President Checkpoint
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR HONG KONG
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR HONG KONG 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationWhat to Look for in a DRaaS Solution
What to Look for in a DRaaS Solution Storage Switzerland, LLC GEORGE CRUMP - LEAD ANALYST Introduction Disaster Recovery as a Service (DRaaS) outsources and simplifies the most difficult situations that
More informationEMC GLOBAL DATA PROTECTION INDEX STUDY KEY RESULTS & FINDINGS FOR THE USA
EMC GLOBAL DATA PROTECTION INDEX STUDY KEY RESULTS & FINDINGS FOR THE USA 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationRoadmap to Availability
Roadmap to Availability 1 Agenda Business and Availability in 2005 Our Availability Challenges in 2005 Building Your Availability Roadmap Managing Availability some insight 1 Business and Availability
More informationON CALL, ALL THE TIME DISASTER RECOVERY AS A SERVICE FROM WINDSTREAM
ON CALL, ALL THE TIME DISASTER RECOVERY AS A SERVICE FROM WINDSTREAM DATA IS THE LIFEBLOOD OF MODERN BUSINESS 74% of organizations are backing up more than 11 terabytes of data according to Enterprise
More informationThe Microsoft Large Mailbox Vision
WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more email has many advantages. Large mailboxes
More informationVMware vsphere 4. The Best Platform for Building Cloud Infrastructures
Table of Contents Get the efficiency and low cost of cloud computing with uncompromising control over service levels and with the freedom of choice................ 3 Key Benefits........................................................
More informationRFP Questions Guideline For Data Center Buyers
RFP Questions Guideline For Data Center Buyers Rev: 00W0052015 1 P a g e This guideline document is a supporting download for our webinar titled 5 RFP Questions Data Center Buyers Must Ask a Provider and
More informationDisaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper By Anton Els
Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper By Anton Els Copyright 2017 Dbvisit Software Limited. All Rights Reserved V3, Oct 2017 Contents Executive Summary...
More informationWhat you need to know about disaster recovery in the
What you need to know about disaster recovery in the cloud @NigelTozer What you will learn today about leveraging the Cloud for DR Why cloud DR makes sense Workloads considerations Cloud DR in practice
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDIA
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDIA 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationHYBRID CLOUD BACKUP & DISASTER RECOVERY
HYBRID CLOUD BACKUP & DISASTER RECOVERY What is NexProtect? NexProtect is a cost-effective, Hybrid Cloud Backup & Disaster Recovery solution that meets your business needs with an on-site appliance that
More informationStorage Infrastructure Optimization
Brussels, Belgium, 13th TF-Storage Meeting Denis Stanarevic, IBM SIO South East Europe Storage Infrastructure Optimization Setup the scene Cost Categories Environment Time To run... You need The complete
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDONESIA
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDONESIA 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GlOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationWHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER
WHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER Insurance for IT Infrastructure? We can buy insurance for contract performance, pitching arms and even vacations. But when it comes
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR UAE
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR UAE 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationYOUR CONDUIT TO THE CLOUD
COLOCATION YOUR CONDUIT TO THE CLOUD MASSIVE NETWORKS Enterprise-Class Data Transport Solutions SUMMARY COLOCATION PROVIDERS ARE EVERYWHERE. With so many to choose from, how do you know which one is right
More informationBusiness Continuity & Disaster Recovery
knowledge partner MARKET INSIGHT Business Continuity & Disaster Recovery Considerations for Saudi Organizations /mobily @MobilyBusiness 056 010 0901 I business.sales@mobily.com.sa About Us Mobily; the
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR ITALY
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR ITALY 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR BRAZIL
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR BRAZIL 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationAppendix 3 Disaster Recovery Plan
Appendix 3 Disaster Recovery Plan DRAFT March 5, 2007 Revision XX Qwest Government Services, Inc. 4250 North Fairfax Drive Arlington, VA 22203 A3-i RFP: TQC-JTB-05-0002 March 5, 2007 REVISION HISTORY Revision
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AMERICAS
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AMERICAS 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR APJ
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR APJ 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationAltius IT Policy Collection
Altius IT Policy Collection Complete set of cyber and network security policies Over 100 Policies, Plans, and Forms Fully customizable - fully customizable IT security policies in Microsoft Word No software
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 13 Business Continuity Objectives Define business continuity Describe the components of redundancy planning List disaster recovery
More informationDISASTER RECOVERY TESTING, YOUR EXCUSES, AND HOW TO WIN
DISASTER RECOVERY TESTING, YOUR EXCUSES, AND HOW TO WIN INTRODUCTION You can plan, look at diagrams, listen to consultants, but you still won t know that all your recovery capabilities will actually work
More informationTechnology Outsourcing with Cloud Computing. Understanding the Opportunity
Technology Outsourcing with Cloud Computing Understanding the Opportunity Cloud Basics Cloud Benefits Summary Q&A Agenda CLOUD BASICS What is the cloud? Software As a Service Infrastructure As a Service
More informationShaping the Cloud for the Healthcare Industry
Shaping the Cloud for the Healthcare Industry Louis Caschera Chief Information Officer CareTech Solutions www.caretech.com > 877.700.8324 Information technology (IT) is used by healthcare providers as
More informationBuyer s Guide: DRaaS features and functionality
Buyer s Guide: DRaaS features and functionality Disaster recovery without a secondary site DRaaS for the midmarket When a server stops responding, for whatever reason, the fastest way to resume service
More informationNWPPA2016. Disaster Recovery NWPPA Reno, NV Copyright 2016, IVOXY Consulting, LLC
NWPPA2016 Disaster Recovery NWPPA Reno, NV Copyright 2016, IVOXY Consulting, LLC About Us Our Consulting Services We perform assessments, design, implementation, project management, support & training
More informationTotal Cost of Ownership: Benefits of the OpenText Cloud
Total Cost of Ownership: Benefits of the OpenText Cloud OpenText Managed Services in the Cloud delivers on the promise of a digital-first world for businesses of all sizes. This paper examines how organizations
More informationBusiness Continuity & Disaster Recovery
Business Continuity & Disaster Recovery Technology and Process Alessio Di Benedetto Presales Manager Roma, 7 th of May 2010 1 Objectives The objective of this workshop is to provide: an overview of the
More informationSan Francisco Chapter. What an auditor needs to know
What an auditor needs to know Course Objectives Understand what a data center looks and feels like Know what to look for in a data center and what questions to ask Deepening understanding of controls that
More informationTotal Cost of Ownership: Benefits of ECM in the OpenText Cloud
Total Cost of Ownership: Benefits of ECM in the OpenText Cloud OpenText Managed Services brings together the power of an enterprise cloud platform with the technical skills and business experience required
More informationNEC Express5800 R320f Fault Tolerant Servers & NEC ExpressCluster Software
NEC Express5800 R320f Fault Tolerant Servers & NEC ExpressCluster Software Downtime Challenges and HA/DR Solutions Undergoing Paradigm Shift with IP Causes of Downtime: Cost of Downtime: HA & DR Solutions:
More informationIT Consulting and Implementation Services
PORTFOLIO OVERVIEW IT Consulting and Implementation Services Helping IT Transform the Way Business Innovates and Operates 1 2 PORTFOLIO OVERVIEW IT Consulting and Implementation Services IT is moving from
More informationTOP REASONS TO CHOOSE DELL EMC OVER VEEAM
HANDOUT TOP REASONS TO CHOOSE DELL EMC OVER VEEAM 10 This handout overviews the top ten reasons why customers choose Data Protection from Dell EMC over Veeam. Dell EMC has the most comprehensive data protection
More informationModule 4 STORAGE NETWORK BACKUP & RECOVERY
Module 4 STORAGE NETWORK BACKUP & RECOVERY BC Terminology, BC Planning Lifecycle General Conditions for Backup, Recovery Considerations Network Backup, Services Performance Bottlenecks of Network Backup,
More informationTransforming your IT infrastructure Journey to the Cloud Mike Sladin
Transforming your IT infrastructure Journey to the Cloud Mike Sladin Director, Global Strategic Partners, APJ Symantec Corporation IT Infrastructure Transformation Journey Business Agility IT as a Service
More informationCASE STUDY: USING THE HYBRID CLOUD TO INCREASE CORPORATE VALUE AND ADAPT TO COMPETITIVE WORLD TRENDS
CASE STUDY: USING THE HYBRID CLOUD TO INCREASE CORPORATE VALUE AND ADAPT TO COMPETITIVE WORLD TRENDS Geoff Duncan, Senior Solutions Architect, Digital Fortress Brandon Tanner, Senior Manager, Rentsys Recovery
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR TURKEY
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR TURKEY 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationSERVICE DESCRIPTION MANAGED BACKUP & RECOVERY
Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....
More informationDifferentiating Your Datacentre in the Networked Future John Duffin
Differentiating Your Datacentre in the Networked Future John Duffin Managing Director, South Asia. Uptime Institute July 2017 2017 Uptime Institute, LLC The Global Datacentre Authority 2 2017 Uptime Institute,
More informationThree Steps Toward Zero Downtime. Guide. Solution Guide Server.
Three Steps Toward Zero Downtime Guide Solution Guide Server Server Solution Guide Three Steps Toward Zero Downtime Introduction Service uptime is a top priority for many business operations. From global
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AUSTRALIA
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AUSTRALIA 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationCIO Guide: Disaster recovery solutions that work. Making it happen with Azure in the public cloud
CIO Guide: Disaster recovery solutions that work Making it happen with Azure in the public cloud Consult Build Transform Support When you re considering a shift to Disaster Recovery as a service (DRaaS),
More informationInfocomm Professional Development Forum 2011
Infocomm Professional Development Forum 2011 1 Agenda Brief Introduction to CITBCM Certification Business & Technology Impact Analysis (BTIA) Workshop 2 Integrated end-to-end approach in increasing resilience
More informationSungard Availability Services Information Availability... Delivers
Information Availability... Delivers Why choose Sungard AS? 7,000+ customers worldwide 100% recovery success in 30+ years in business 3,400+ invocations supported 5 million+ sq ft of operations space and
More information10 Reasons Why Your DR Plan Won t Work
10 Reasons Why Your DR Plan Won t Work Jim Damoulakis CTO, GlassHouse Technologies, Inc. Sept. 29, 2005 DR Vision Imagine Prepared to handle multiple categories of disaster Clearly documented policies
More informationIT risks and controls
Università degli Studi di Roma "Tor Vergata" Master of Science in Business Administration Business Auditing Course IT risks and controls October 2018 Agenda I IT GOVERNANCE IT evolution, objectives, roles
More informationWHITE PAPER. Title. Managed Services for SAS Technology
WHITE PAPER Hosted Title Managed Services for SAS Technology ii Contents Performance... 1 Optimal storage and sizing...1 Secure, no-hassle access...2 Dedicated computing infrastructure...2 Early and pre-emptive
More informationVirtualization. Disaster Recovery. A Foundation for Disaster Recovery in the Cloud
Technology Paper Disaster Acronym: DR The process, policies, and procedures that enable a business to recover data and systems after a disaster. A Foundation for Disaster in the Cloud Introduction Virtualization
More informationDR Planning. Presented by. Matt Stolk Associate Director Northwest Regional Data Center Florida State University
DR Planning Presented by Matt Stolk Associate Director Northwest Regional Data Center Florida State University Why are we here? Over the last couple of years, business continuity has become more of a priority
More informationEMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS AND RESULTS FOR FRANCE
EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS AND RESULTS FOR FRANCE 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION
More informationBusiness Benefits of Policy Based Data De-Duplication Data Footprint Reduction with Quality of Service (QoS) for Data Protection
Data Footprint Reduction with Quality of Service (QoS) for Data Protection By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (Auerbach) October 28th,
More informationIBM Storage Software Strategy
IBM Storage Software Strategy Hakan Turgut 1 Just how fast is the data growing? 128 GB/ person The World s total data per person No Problem I I think I can do this We have a problem 24 GB/ person 0.8 GB/
More informationDATA CENTRE SOLUTIONS
DATA CENTRE SOLUTIONS NOW OPTIMIZATION IS WITHIN REACH. CONVERGED INFRASTRUCTURE VIRTUALIZATION STORAGE NETWORKING BACKUP & RECOVERY POWER & COOLING 2 INCREASE AGILITY, STARTING IN YOUR DATA CENTRE. Chances
More informationDowntime Prevention Buyer s Guide. 6 QUESTIONS to help you choose the right availability protection for your applications
Downtime Prevention Buyer s Guide 6 QUESTIONS to help you choose the right availability protection for your applications Question 6 questions to help you choose the right availability protection for your
More informationRapid Recovery from Logical Corruption
Rapid Recovery from Logical Corruption Brett Quinn DellEMC 1 Nov 2016 Session DD Topics Physical vs Logical Recovery SnapVX zdp: Data Protector for z Systems Isolated Recovery Solutions Logical vs Physical
More informationHigh Availability and Disaster Recovery Solutions for Perforce
High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce
More informationCopyright 2012 EMC Corporation. All rights reserved.
1 TRANSFORM IT+BUSINESS+YOURSELF DISASTER RECOVERY FOR MISSION CRITICAL APPLICATIONS EMC FORUM 2012 SKOPJE Dejan Živanović Presales Manager Dejan.Zivanovic@emc.com 2 Cloud A New Architecture Old World
More informationGroton Data Center Migration Project
Groton Data Center Migration Project Category Enterprise IT Management Initiatives State Connecticut Contact Mark Raymond, Chief Information Officer mark.raymond@ct.gov Project May 2014 Initiation End
More informationSQL Server Consolidation with Server Virtualization on NetApp Storage
White Paper SQL Server Consolidation with Server Virtualization on NetApp Storage Generosa Litton and Richard Preston, NetApp March 2010 WP-7095 FLEXIBLE AND EFFICIENT STORAGE CONSOLIDATION FOR SQL SERVER
More informationRealiable and extensive solutions for your business #EmpoweringYourFuture
it services Realiable and extensive solutions for your business #EmpoweringYourFuture Invest your business IT system with Lintasarta IT Services. Empowering Your Future it services Lintasarta IT Services
More informationAre you protected? Get ahead of the curve Global data protection index
Are you protected? Get ahead of the curve Global data protection index 1 Demographics Interviewed 2,200 IT decision-makers In 3 regions: 500 Americas 1,100 Europe, Middle East, and Africa 600 Asia Pacific
More informationUsing Deduplication: 5 Steps to Backup Efficiencies
W H I TEP A P E R Using Deduplication: 5 Steps to Backup Efficiencies B Y M I C H A E L S P I N D L E R, P R A C T I C E M ANA G E R, D ATA L I N K ABSTRACT Deduplication technologies are providing dramatic
More informationFlorida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government
Florida Government Finance Officers Association Staying Secure when Transforming to a Digital Government Agenda Plante Moran Introductions Technology Pressures and Challenges Facing Government Technology
More informationPaul Hodge Virtualization Solutions: Improving Efficiency, Availability and Performance
2012 Honeywell Users Group Americas Sustain.Ability. Paul Hodge Virtualization Solutions: Improving Efficiency, Availability and Performance 1 Experion Virtualization Solutions Overview 2 Virtualization
More informationBuild a viable plan for disaster recovery and crisis management.
Disaster recovery and crisis management solutions To support your IT objectives Build a viable plan for disaster recovery and crisis management. Highlights Build a plan to help respond to and recover from
More informationBusiness Continuity Planning: Documentation During EMR Downtime. The webcast will begin shortly...
Business Continuity Planning: Documentation During EMR Downtime The webcast will begin shortly... You have been automatically muted. Please use the Q&A panel to submit questions during the presentation
More informationvsan Mixed Workloads First Published On: Last Updated On:
First Published On: 03-05-2018 Last Updated On: 03-05-2018 1 1. Mixed Workloads on HCI 1.1.Solution Overview Table of Contents 2 1. Mixed Workloads on HCI 3 1.1 Solution Overview Eliminate the Complexity
More informationNext Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures
Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures Next 1 What we see happening today. The amount of data businesses must cope with on a daily basis is getting
More information