Rapid Recovery from Logical Corruption
|
|
- Samson Lyons
- 6 years ago
- Views:
Transcription
1 Rapid Recovery from Logical Corruption Brett Quinn DellEMC 1 Nov 2016 Session DD
2 Topics Physical vs Logical Recovery SnapVX zdp: Data Protector for z Systems Isolated Recovery Solutions
3 Logical vs Physical Data Recovery Synchronous Primary Secondary DC2 DC1 Asynchronous Tertiary (Out Of Region) DC3
4 Physical Recovery SWAP Synchronous Primary Secondary DC2 DC1 Asynchronous SWAP Tertiary OOR DC3
5 Logical Recovery Primary Synchronous Secondary DC2 DC1 Asynchronous Tertiary OOR DC3
6 Logical Recovery Primary Synchronous Secondary DC2 DC1 Asynchronous Tertiary OOR DC3
7 Data Interdependence Data Lake Mobile Data Batch Flat Files DB2/IMS/ Other
8 8:15 SnapVX 10:00 9:15 8 AM 8:45 9:30 9:45 8:30 9:00
9 Incorporate Snaps for Data Copies New TimeFinder SnapVX Production Volume REDUCED IMPACT Target-less Snapshots Snapshot INCREASED AGILITY Up to 256 Snapshots per source Up to 1024 Linked Targets (snaps and/or clones) per source EASE OF USE User-defined name/version number Automatic expiration if desired Snapshot Linked Target Snapshot
10 TimeFinder SnapVX Pointer-Based SNAPs Source Device (TDEV) CREATE & ACTIVATE TERMINATE Snapshot (up to 256) 10 A.M. LINK / UNLINK Target Device(s) (TDEV) 12 Noon Host volume Snapshot Pointer Data structure Storage Resource Pool
11 zdp Data Protector for z Systems
12 zdp A z/os based solution that automates SnapVX snapshot creation/deletion Enables rapid recovery from a spectrum of risks to data: Processing error Human error Malicious intent Think: a time machine for the mainframe Scheduler
13 Why zdp? Logical vs Physical Protection DC1 Replication solutions focus the physical: availability with data integrity Planned and Unplanned outage events S Asynchronous P Multiple copies EVERYTHING gets physically replicated Even the logical corruptions! DC3 Synchronous S DC2
14 Why zdp? Logical vs Physical Protection DC1 Replication solutions focus the physical: availability with data integrity Planned and Unplanned outage events Multiple copies EVERYTHING gets physically replicated Even the logical corruptions! Today 1 additional full PIT copy Copy 1: near real time Copy 2: new PIT created every 24 hrs. 24 hours to find corruption Up to 24 hours of data loss 1 2 DC3 Asynchronous Synchronous DC2
15 Why zdp? Logical Protection zdp focuses on the logical: recovery from loss of data integrity Continual point in time copy creation Automated Selectable recovery points Brings Point in Time recovery capability to database and non-database systems Provides applications with recovery capability when not designed-in Provides cross-application recovery point Supports both FBA and CKD data Source Target Snapshot 1 Snapshot 2 Snapshot N
16 Rethinking DB2 Image Copy and Recovery processes To Image Copy or Not to image copy, that is the question System Level Backup in DB2 supports use of individual objects for recovery Creation of an image copy of an object from an SLB Use the SLB for object recovery and improve concurrency during recovery of multiple objects Benefits of using zdp for DB2 recovery Recovery Acceleration due to: Elimination of data restore time More recent copies of data mean less log to be traversed Reduced Image Copy processing Saves CPU and I/O resources If you use Virtual Tapes, the capacity requirements are minimized If you use Physical Tape, you need fewer tapes If you use Disk, the storage capacity requirements and network capacity (if replicated) are reduced
17 zdp Structural Elements Source Linked Target Snapshot 1 Snapshot 2 Versioned Data Group (VDG) Logical group of source volumes that associates volumes along with settings for creating multiple PIT images. Snapshot: Pointer based, point in time image of a single volume Snapset: Named point in time consistent image of all source volume snapshots in a VDG. Snapset capture: Continuous automated process of creating Snapsets Target set: Group of devices which have been defined to zdp as the desired LINK targets to a snapset. Snapshot 256
18 zdp deployment options zdp SCF source snap source snap source snap zdp supports snapset creation: Locally attached to VMAX3
19 zdp deployment options zdp SCF R1 snap SRDF/S or SRDF/A or PPRC R2 snap R1 snap R2 snap R1 snap R2 snap zdp supports snapset creation in: Locally attached VMAX3 Remote to VMAX3 via SRDF/S or SRDF/A (up to 4 hops) R1 array can be VMAX2 for sending SnapVX commands to a VMAX3 for remote execution
20 zdp deployment options R1 snap SRDF/S or SRDF/A or PPRC R2 snap zdp SCF R1 snap R2 snap R1 snap R2 snap zdp supports snapset creation in: Locally attached VMAX3 Remote to VMAX3 via SRDF/S or SRDF/A (up to 4 hops) R1 array can be VMAX2 or VMAX3 Direct attached to SRDF target array
21 Z Data Protector Summary Source Linked Target Snapshot 1 Snapshot 2 Host automation solution Frequent creation/deletion of snapshots Benefit: Fast recovery from logical corruption Features Summary Up to 144X more recovery capability compared to a daily snapshot Keep up to 256 versions of each volume Select snapshots to LINK by timestamp Automatic roll-off of aged snapshots Space estimation and monitoring Consistent scale (32,000 volumes) Snapshot 256
22 Building Business Resiliency Isolated Recovery Solutions
23 Cyber attacks get sophisticated Are you staying ahead of the criminal evolution? Traditional Threats Emerging Threats Cyber Theft Denial of Service Attacks Cyber Extortion Cyber Destruction Isolated Recovery Solutions protect against these types of attacks
24 REGULATORY CYBER DESTRUCTION PREVENTION GUIDANCE National Security Agency: best practices to protect information systems and networks from a destructive malware attack include... Segregate network systems Federal Reserve System: financial institutions should consider taking the following steps... such as logical network segmentation, hard backups, air gapping [and] physical segmentation of critical systems Federal Financial Institutions Examination Council (FFIEC): An air-gapped data backup architecture limits exposure to a cyber attack and allows for restoration of data to a point in time before the attack began. European Banking Authority: Competent authorities should assess whether the institution has comprehensive and tested business resilience and continuity plans in place Securities and Exchange Commission: A series of high-profile recent events involving systems-related issues further highlights the need for market participants to bolster the operational integrity of their automated systems in this area. National Association of Insurance Commissioners:... it is vital for state insurance regulators to provide effective cybersecurity guidance regarding the protection of the insurance sector s data security and infrastructure..
25 What are regulators Focused On? Executive Management needs to establish how much cyber and data breach insurance levels are appropriate for the firm Enterprise environments need to have a Cyber Breach Management Program that includes a life cycle approach to data protection Environments must implement multiple data replication technologies and methods to reduce the probability of data contamination Environments must deploy a multi-tiered approach to where data copies are stored to enable restore and recovery of business and environment data
26 WHAT IS ISOLATED RECOVERY? WHAT DOES IT PROTECT AGAINST? Characteristics: A Protected Copy of Data that is: Isolated Off-Net No Connections Cannot be directly accessed Multiple Roll-Back Points Maintained How: Periodic Copies of Critical Data Systems are isolated Data is Periodically Validated What does it protect against? Cyber Destruction Data Hostage BECAUSE YOU NEED TO THINK LIKE A HACKER!!!
27 WHY YOU NEED BOTH IR AND A DR SOLUTION ISOLATED RECOVERY IS NOT TRADITIONAL BC/DR IRS Systems are Isolated An isolated data center environment that is disconnected from the network and restricted from users other than those with proper clearance. Data is either Copied Periodically over an Air Gap or persistently replicated over a secure link infrastructure Software to perform data copies to a secondary storage and backup targets as well as procedures to schedule the copy over air gap between the production environment and the isolated recovery area or preserve a copy in the IR environment. Integrity Checking & Alerting Workflows to stage copied data in the isolated recovery zone and perform periodic integrity checks to rule out that it was affected by malware, along with mechanisms to trigger alerts in the event of a breach. Recovery & Remediation Procedures to perform recovery / remediation after an incident.
28 The most critical data first Compute Applications Validate & Store Protect the heartbeat of the business first Prioritize top applications or data sets to protect Usually less than 10% of data (this is NOT DR!) Start with a core set and build from there Highest Priority Data
29 Mainframe IR SOLUTION OVERVIEW Primary DC Corporate Network DR / BU Site FICON & Network Air Gap SRDF or Replicator Only Isolated Site Isolated data center environment Disconnected from the network Business data continuously received minimizing RPO Restricted from users other than those with proper clearance Planning: Business Critical Systems RPO/RTO Throughput Requirements Isolation: Isolated DC Environment Dedicated Link SRDF or Replicator Only FICON & Network Air Gap Hidden Local Copies that cannot be deleted Validation: Maintain gold copy Compare to incoming copy Tools application dependent Rate of Change Sentinel Record Injection Recovery: Standard failback mechanisms Additional remediation / validation
30 Concept: MF Isolated Air-Gapped Recovery System Preserves PiT copies on physically isolated VMAX Isolation from: Personnel Networks Primary Site zdp task FICON Production VMAX FICON either: 1. Not Connected 2. Not Genned Isolated Room Ensures recoverability from catastrophic large scale data corruption or deletion R 11 SRDF Persistent or periodic R2 zdp zdp Linked Targets Enhanced security for PiT copy Dual actors Access Control Lists SRDFA to Secondary Site For Disaster recovery Isolated Recovery VMAX
31 Concept: MF Isolated Air-Gapped Recovery System Preserves PiT copies on physically isolated VMAX Isolation from: Personnel Networks Primary Site FICON Production VMAX FICON either: 1. Not Connected 2. Not Genned Isolated Room Ensures recoverability from catastrophic large scale data corruption or deletion R 11 SRDF Persistent or periodic R2 zdp zdp Linked Targets Enhanced security for PiT copy Dual actors Access Control Lists SRDFA to Secondary Site For Disaster recovery Isolated Recovery VMAX zdp task
32 DLM Isolated Recovery Solution Components Production CEC R1 FICON & Network AIR GAP P DD or VNX Replication Isolated Recovery System S Snap zdp Changing Data Mgmt CEC Scheduled scripts creates several space efficient Fail- Safe library Images All TCPIP Sockets Closed on DLm storage except Replicator Separate dedicated storage replication ports Separate Dedicated Replication Network Backup Volumes / Restore Points Instant Access*** Retention Periods / WORM Cost Effective RPO = Hours to 1 Day* Primary Storage Backup Appliance zdp Isolated Recovery System RTO = Hours to Days** Can co-exist with and enhance an existing BC/DR Solution Tape Data is continuously periodically copied in to IRS environment File System Snapshot multiple space efficient Fail-Safe Llibrary images Management CEC is hardwired to IRS Solution Un-addressable Snapshot Copies allow multiple restore points Management CEC can be used used to periodically validate data * Adjustable based on desired security window ** Depends on # of Volumes, Data etc. ***Lower Performance
33 Summary Recovery from Logical corruption is the next wave of Business Continuity planning Operational errors and malicious attacks are real and emerging threats. Tools and procedures must be developed based on perpetual and persistent data copy technologies Consider the applicability of Isolated Recovery Solutions for your enterprise
34 Session feedback Please submit your feedback at Session is DD
Copyright 2016 EMC Corporation. All rights reserved.
1 BUILDING BUSINESS RESILIENCY Isolated Recovery Services NAZIR VELLANI (ERNST & YOUNG) & DAVID EDBORG (EMC GLOBAL SERVICES) 2 PRESENTERS Nazir Vellani (EY) Senior Manager Tel: +1 214 596 8985 Email: nazir.vellani@ey.com
More informationDATA PROTECTOR FOR Z SYSTEMS(ZDP) ESSENTIALS
DATA PROTECTOR FOR Z SYSTEMS(ZDP) ESSENTIALS ABSTRACT This white paper describes Data Protector z Systems (zdp) features and functionality for the VMAX 950F for mainframe. July, 2017 WHITE PAPER To learn
More informationDell EMC Isolated Recovery
Dell EMC Isolated Recovery Andreas El Maghraby Advisory Systems Engineer DPS @andyem_si GLOBAL SPONSORS Incident Response: Categories of Cybercrime Activity April to June 2016 37% 27% 12% 9% 7% 7% 5% 2
More informationUniversal Storage Consistency of DASD and Virtual Tape
Universal Storage Consistency of DASD and Virtual Tape Jim Erdahl U.S.Bank August, 14, 2013 Session Number 13848 AGENDA Context mainframe tape and DLm Motivation for DLm8000 DLm8000 implementation GDDR
More informationSimplify and Improve DB2 Administration by Leveraging Your Storage System
Simplify and Improve Administration by Leveraging Your Storage System Ron Haupert Rocket Software, Inc. March 1, 2011 Session Number 8404 Session Agenda Database and Storage Integration Overview System-Level
More informationDISK LIBRARY FOR MAINFRAME
DISK LIBRARY FOR MAINFRAME Geographically Dispersed Disaster Restart Tape ABSTRACT Disk Library for mainframe is Dell EMC s industry leading virtual tape library for mainframes. Geographically Dispersed
More informationSimplify and Improve IMS Administration by Leveraging Your Storage System
Simplify and Improve Administration by Leveraging Your Storage System Ron Haupert Rocket Software, Inc. March 3, 2011 Session Number: 8568 Session Agenda Database and Storage Integration Overview System
More informationSimplify and Improve IMS Administration by Leveraging Your Storage System
Simplify and Improve Administration by Leveraging Your Storage System Ron Bisceglia Rocket Software, Inc. August 9, 2011 Session Number: 9406 Session Agenda and Storage Integration Overview System Level
More informationBlue Cross Blue Shield of Minnesota - Replication and DR for Linux on System z
Blue Cross Blue Shield of Minnesota - Replication and DR for Linux on System z Brian Peterson, Blue Cross Blue Shield of Minnesota Gail Riley, EMC March 3, 2011 Objectives At the end of this session, you
More informationBlue Cross Blue Shield of Minnesota - Replication and DR for Linux on System z
Blue Cross Blue Shield of Minnesota - Replication and DR for Linux on System z Brian Peterson, Blue Cross Blue Shield of Minnesota Brian_D_Peterson@bluecrossmn.com Gail Riley, EMC Riley_Gail@emc.com August
More informationData Protection Everywhere
Data Protection Everywhere For the modern data center Syed Saleem Advisory Systems Engineer Pillars of the modern data center Protection and trust Security/Governance Encryption Data Protection Services/Support
More informationNew trends in Virtual Tape: Cloud and Automation
New trends in Virtual Tape: Cloud and Automation Robin Fromm Dell EMC Date of presentation (07/11/2017) Session 2 AGENDA Virtual Tape Architecture and Tiering Cloud Object Storage Mainframe Tape Cloud
More informationCloud Security Myths Paul Mazzucco, Chief Security Officer
Cloud Security Myths Paul Mazzucco, Chief Security Officer Discussion Points >Yesterday s standards: today s security myths >Cloud security: an ongoing mandate >Actions to take now 90% of Businesses Breached
More informationDISK LIBRARY FOR MAINFRAME
DISK LIBRARY FOR MAINFRAME Geographically Dispersed Disaster Restart Tape ABSTRACT Disk Library for mainframe is Dell EMC s industry leading virtual tape library for IBM zseries mainframes. Geographically
More informationReDefine Enterprise Storage
ReDefine Enterprise Storage What s New With VMAX 1 INDUSTRY S FIRST ENTERPRISE DATA PLATFORM 2 LOW LATENCY Flash optimized NO DOWNTIME Always On availability BUSINESS ORIENTED 1-Click Service Levels CLOUD
More informationEMC CORE TECHNOLOGIES
EMC CORE TECHNOLOGIES EMC ROCKS THE CLOUD MEDIA PRE-BRIEFING EMBARGOED UNTIL: 5AM ET TUESDAY, NOVEMBER 17, 2015 1 THE POWER OF THE PORTFOLIO 3 REQUIREMENTS TO ACCELERATE IT TRANSFOMATION SIMPLIFY & AUTOMATE
More information'Why' Ultra High Availability and Integrated EMC-Brocade Data Replication Networks
'Why' Ultra High Availability and Integrated EMC-Brocade Data Replication Networks Dr. Steve Guendert Brocade Communications Systems Brian Kithcart EMC Corporation August 13, 2013 Session Number: 14093
More informationDisaster Recovery Is A Business Strategy
Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...
More informationBusiness continuity management and cyber resiliency
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Business continuity management and cyber resiliency Introductions Eric Wunderlich,
More informationBusiness Continuity and Disaster Recovery. Ed Crowley Ch 12
Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster
More informationThe Nuances of Backup and Recovery Solutions
DEFINING THE RIGHT DATA PROTECTION STRATEGY The Nuances of Backup and Recovery Solutions Cindy LaChapelle, Principal Consultant, ISG ISG WHITE PAPER 2012 Information Services Group, Inc. All Rights Reserved
More informationTable of Contents. Sample
TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 4 1.1 GOALS AND OBJECTIVES... 5 1.2 REQUIRED REVIEW... 5 1.3 APPLICABILITY... 5 1.4 ROLES AND RESPONSIBILITIES SENIOR MANAGEMENT AND BOARD OF DIRECTORS...
More informationTOP REASONS TO CHOOSE DELL EMC OVER VEEAM
HANDOUT TOP REASONS TO CHOOSE DELL EMC OVER VEEAM 10 This handout overviews the top ten reasons why customers choose Data Protection from Dell EMC over Veeam. Dell EMC has the most comprehensive data protection
More informationLAYERED DATA PROTECTION STRATEGY PRESERVES CONTINUITY OF VITAL PATIENT SERVICES
LAYERED DATA PROTECTION STRATEGY PRESERVES CONTINUITY OF VITAL PATIENT SERVICES Isolated recovery solution for today s healthcare digital environment ABSTRACT With cyberthreats becoming more sophisticated
More information10 Reasons Why Your DR Plan Won t Work
10 Reasons Why Your DR Plan Won t Work Jim Damoulakis CTO, GlassHouse Technologies, Inc. Sept. 29, 2005 DR Vision Imagine Prepared to handle multiple categories of disaster Clearly documented policies
More informationDe-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid
De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (CRC)
More informationTSM Paper Replicating TSM
TSM Paper Replicating TSM (Primarily to enable faster time to recoverability using an alternative instance) Deon George, 23/02/2015 Index INDEX 2 PREFACE 3 BACKGROUND 3 OBJECTIVE 4 AVAILABLE COPY DATA
More informationCopyright 2010 EMC Corporation. Do not Copy - All Rights Reserved.
1 Using patented high-speed inline deduplication technology, Data Domain systems identify redundant data as they are being stored, creating a storage foot print that is 10X 30X smaller on average than
More informationSimple And Reliable End-To-End DR Testing With Virtual Tape
Simple And Reliable End-To-End DR Testing With Virtual Tape Jim Stout EMC Corporation August 9, 2012 Session Number 11769 Agenda Why Tape For Disaster Recovery The Evolution Of Disaster Recovery Testing
More informationRethinking Backup and Recovery Strategies with IMS Recovery Expert
Rethinking Backup and Recovery Strategies with IMS Recovery Expert Ron Bisceglia Rocket Software March 13, 2012 Session 10805 Topics Cost of Downtime How often do we backup our data? How do we backup our
More informationTRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald
TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE John McDonald 1 What is Trust? Can I trust that my assets will be available when I need them? Availability Critical Assets Security Can I trust
More informationDISK LIBRARY FOR MAINFRAME
DISK LIBRARY FOR MAINFRAME Mainframe Tape Replacement with cloud connectivity ESSENTIALS A Global Virtual Library for all mainframe tape use cases Supports private and public cloud providers. GDDR Technology
More informationRecovery at a Click - where to be in 18 months
Recovery at a Click - where to be in 18 months IBM Resiliency Orchestration with Cyber Incident Recovery In today s environment, businesses cannot tolerate downtime + Expectation is to be Always-on + Creating
More informationMainframe Backup Modernization Disk Library for mainframe
Mainframe Backup Modernization Disk Library for mainframe Mainframe is more important than ever itunes Downloads Instagram Photos Twitter Tweets Facebook Likes YouTube Views Google Searches CICS Transactions
More informationRedefine Data Protection: Next Generation Backup And Business Continuity
Redefine Data Protection: Next Generation Backup And Business Continuity 1 Business Is Being Redefined Leveraging the Power of Technology Megatrends CLOUD MOBILE SOCIAL BIG DATA 2 Creating New Next Gen
More informationLab Validation Report
Lab Validation Report NetApp SnapManager for Oracle Simple, Automated, Oracle Protection By Ginny Roth and Tony Palmer September 2010 Lab Validation: NetApp SnapManager for Oracle 2 Contents Introduction...
More informationCyber Resilience. Think18. Felicity March IBM Corporation
Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack
More informationComment protéger le Data Center du futur?
Comment protéger le Data Center du futur? NAWFAL SAOUD Regional Sales Manager NWA( North and West Africa) DELL EMC Data Protection Solutions Division Tale of Two Worlds Traditional apps IT On premise Next
More informationUPS system failure. Cyber crime (DDoS ) Accidential/human error. Water, heat or CRAC failure. W eather related. Generator failure
BEST PRACTICES: LEVERAGING CLOUD AND COLOCATION TO AVOID DOWNTIME Business continuity implementations that address traditional and emerging threats KEY TAKEAWAYS The cost for unplanned downtime has never
More informationDAHA AKILLI BĐR DÜNYA ĐÇĐN BĐLGĐ ALTYAPILARIMIZI DEĞĐŞTĐRECEĞĐZ
Information Infrastructure Forum, Istanbul DAHA AKILLI BĐR DÜNYA ĐÇĐN BĐLGĐ ALTYAPILARIMIZI DEĞĐŞTĐRECEĞĐZ 2010 IBM Corporation Information Infrastructure Forum, Istanbul IBM XIV Veri Depolama Sistemleri
More informationDLm8000 Product Overview
Whitepaper Abstract This white paper introduces EMC DLm8000, a member of the EMC Disk Library for mainframe family. The EMC DLm8000 is the EMC flagship mainframe VTL solution in terms of scalability and
More informationA Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist
A Survival Guide to Continuity of Operations David B. Little Senior Principal Product Specialist Customer Perspective: Recovery Time & Objective Asynchronous Replication Synchronous Replication WAN Clustering
More informationCybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City
1 Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City The opinions expressed are those of the presenters and are not those of the Federal Reserve Banks, the
More informationIMS Disaster Recovery Tools Solutions IMS Recovery Expert
SHARE Anaheim, CA March, 2011 IMS Disaster Recovery Tools Solutions GLENN GALLER Certified S/W IT Specialist Advanced Technical Skills Ann Arbor, Michigan gallerg@us.ibm.com IBM Disaster Recovery Solutions
More informationHPE Converged Data Solutions
HPE Converged Data Solutions Erdinc Kaya - kaya@hpe.com Storage Solution Architect Areas of Transformation & HPE IM&P A platform approach for effectively managing and protecting all information enterprise-wide
More informationReplication is the process of creating an
Chapter 13 Local tion tion is the process of creating an exact copy of data. Creating one or more replicas of the production data is one of the ways to provide Business Continuity (BC). These replicas
More informationVerron Martina vspecialist. Copyright 2012 EMC Corporation. All rights reserved.
Verron Martina vspecialist 1 TRANSFORMING MISSION CRITICAL APPLICATIONS 2 Application Environments Historically Physical Infrastructure Limits Application Value Challenges Different Environments Limits
More informationDELL EMC VMAX ALL FLASH 950F OVERVIEW FOR MAINFRAME ENVIRONMENTS
DELL EMC VMAX ALL FLASH 950F OVERVIEW FOR MAINFRAME ENVIRONMENTS ABSTRACT This white paper describes the features that are available for DELL EMC VMAX for IBM z systems. The latest Mainframe features are
More informationUnder the Covers. Benefits of Disk Library for Mainframe Tape Replacement. Session 17971
Under the Covers Benefits of Disk Library for Mainframe Tape Replacement Session 17971 Session Overview DLm System Architecture Virtual Library Architecture VOLSER Handling Formats Allocating/Mounting
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationTrends in Data Protection CDP and VTL
Trends in Data Protection CDP and VTL Agnes Lamont, TimeSpring Jason Iehl, Network Appliance SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationTrends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation
Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member
More informationRedefine Data Protection: Next Generation Backup & Business Continuity Solutions
Redefine Data Protection: Next Generation Backup & Business Continuity Solutions 1 Creating New Next Gen Applications Existing Workloads Continue to Grow 2 How Can Data Protection Help? Lower Cost Reduce
More informationWHAT S NEW WITH TIMEFINDER FOR EMC SYMMETRIX VMAX
White Paper WHAT S NEW WITH TIMEFINDER FOR EMC SYMMETRIX VMAX Applied Technology for traditional and virtual environments Abstract This white paper describes the latest EMC TimeFinder features available
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationCopyright 2015 EMC Corporation. All rights reserved. Published in the USA.
This solution guide describes the disaster recovery modular add-on to the Federation Enterprise Hybrid Cloud Foundation solution for SAP. It introduces the solution architecture and features that ensure
More informationDATA PROTECTION IN A ROBO ENVIRONMENT
Reference Architecture DATA PROTECTION IN A ROBO ENVIRONMENT EMC VNX Series EMC VNXe Series EMC Solutions Group April 2012 Copyright 2012 EMC Corporation. All Rights Reserved. EMC believes the information
More informationBusiness Continuity & Disaster Recovery
Business Continuity & Disaster Recovery Technology and Process Alessio Di Benedetto Presales Manager Roma, 7 th of May 2010 1 Objectives The objective of this workshop is to provide: an overview of the
More informationFlorida State University
Florida State University Disaster Recovery & Business Continuity Planning Overview October 24, 2017 1 Key Readiness Questions Has your department identified the business functions and infrastructure that
More informationCyber Resiliency. Felicity March. May 2018
Cyber Resiliency Felicity March May 2018 1 Cyber Resiliency Cyber Resiliency is the ability of an organization to continue to function with the least amount of disruption in the face of cyber attacks.
More informationTHE POWER OF TECH-SAVVY BOARDS:
THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES
More informationUnified Management for Virtual Storage
Unified Management for Virtual Storage Storage Virtualization Automated Information Supply Chains Contribute to the Information Explosion Zettabytes Information doubling every 18-24 months Storage growing
More informationTransform Availability
Transform Availability EMC Continuous Availability Advisory Services Presenter: 1 Agenda Introduction Why Continuous Availability? Customer Challenges EMC s Approach Service Description Delivery Timeline
More informationCANVAS DISASTER RECOVERY PLAN AND PROCEDURES
CANVAS DISASTER RECOVERY PLAN AND PROCEDURES Instructure Security, Engineering, and Operations INSTRUCTURE, INC. 6330 South 3000 East Salt Lake City, Utah 84121 Table of Contents Disaster Plan and Procedures...
More informationKeys to a more secure data environment
Keys to a more secure data environment A holistic approach to data infrastructure security The current fraud and regulatory landscape makes it clear that every firm needs a comprehensive strategy for protecting
More informationCountering ransomware with HPE data protection solutions
Countering ransomware with HPE data protection solutions What is ransomware? Definition Malware that prevents or limits users from accessing their system by: Locking the system s screen Encrypting files
More informationBusiness Continuity Plan Executive Overview
Business Continuity Plan Executive Overview In terms of business continuity and disaster recovery planning, Harland Clarke s mission is to ensure the availability of critical business functions and Information
More informationHow Symantec Backup solution helps you to recover from disasters?
How Symantec Backup solution helps you to recover from disasters? Finn Henningsen Presales Specialist Technology Days 2011 1 Thank you to our sponsors Technology Days 2011 2 Agenda Why do we bother? Infrastructure
More informationAchieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX
Achieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX Introduction Planning for recovery is a requirement in businesses of all sizes. In implementing an operational
More informationDELL EMC MAINFRAME TECHNOLOGY OVERVIEW
DELL EMC MAINFRAME TECHNOLOGY OVERVIEW ABSTRACT This white paper provides an overview of Dell EMC s product offerings for the IBM Z environment. It is intended for customers or prospective customers interested
More informationBUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE
BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not
More informationPROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS
>> PROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS COMPUTACENTER HELPS ORGANISATIONS INCREASE THE AVAILABILITY AND INTEGRITY OF THEIR INFORMATION ASSETS WITH NEW-GENERATION DATA PROTECTION SOLUTIONS >> PROTECT
More informationAzure Webinar. Resilient Solutions March Sander van den Hoven Principal Technical Evangelist Microsoft
Azure Webinar Resilient Solutions March 2017 Sander van den Hoven Principal Technical Evangelist Microsoft DX @svandenhoven 1 What is resilience? Client Client API FrontEnd Client Client Client Loadbalancer
More informationOracle Zero Data Loss Recovery Appliance (ZDLRA)
Oracle Zero Data Loss Recovery Appliance (ZDLRA) Overview Attila Mester Principal Sales Consultant Data Protection Copyright 2015, Oracle and/or its affiliates. All rights reserved. Safe Harbor Statement
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationStep into the future. HP Storage Summit Converged storage for the next era of IT
HP Storage Summit 2013 Step into the future Converged storage for the next era of IT 1 HP Storage Summit 2013 Step into the future Converged storage for the next era of IT Karen van Warmerdam HP XP Product
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationFOR FINANCIAL SERVICES ORGANIZATIONS
RSA BUSINESS-DRIVEN SECURITYTM FOR FINANCIAL SERVICES ORGANIZATIONS MANAGING THE NEXUS OF RISK & SECURITY A CHANGING LANDSCAPE AND A NEW APPROACH Today s financial services technology landscape is increasingly
More informationHitachi Modern Data Protection and Copy Data Management Solutions
Hitachi Modern Data Protection and Copy Data Management Solutions Transform Critical Application Availability and Resiliency OVERVIEW Traditional backup and recovery solutions cannot keep up with today
More informationBrussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security
Cyber Resiliency Minimizing the impact of breaches on business continuity Jean-Michel Lamby Associate Partner - IBM Security Brussels Think Brussels / Cyber Resiliency / Oct 4, 2018 / 2018 IBM Corporation
More informationUnderstanding Cyber Insurance & Regulatory Drivers for Business Continuity
Understanding Cyber Insurance & Regulatory Drivers for Business Continuity Lily Yeoh, CISSP, CBCP lily@cb1security.com https://www.cb1security.com Agenda BC/DR Business Drivers Recent Regulatory & Cyber
More informationCopyright 2012 EMC Corporation. All rights reserved.
1 TRANSFORM IT+BUSINESS+YOURSELF DISASTER RECOVERY FOR MISSION CRITICAL APPLICATIONS EMC FORUM 2012 SKOPJE Dejan Živanović Presales Manager Dejan.Zivanovic@emc.com 2 Cloud A New Architecture Old World
More informationVMware Site Recovery Technical Overview First Published On: Last Updated On:
VMware Site Recovery Technical Overview First Published On: 11-28-2017 Last Updated On: 11-29-2017 1 Table of Contents 1. VMware Site Recovery Technical Overview 1.1.Introduction 1.2.Overview 1.3.Use Cases
More informationCopyright 2012 EMC Corporation. All rights reserved.
1 TRANSFORMING MICROSOFT APPLICATIONS TO THE CLOUD Louaye Rachidi Technology Consultant 2 22x Partner Of Year 19+ Gold And Silver Microsoft Competencies 2,700+ Consultants Worldwide Cooperative Support
More informationBreakthrough Data Recovery for IBM AIX Environments
Breakthrough Data Recovery for IBM AIX Environments How New Technologies Are Making Data Protection, Recovery and High Availability Easier and More Affordable Introduction Downtime and data loss pose intolerable
More informationChapter 11. SnapProtect Technology
Chapter 11 SnapProtect Technology Hardware based snapshot technology provides the ability to use optimized hardware and disk appliances to snap data on disk arrays providing quick recovery by reverting
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More informationCybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com
Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding
More informationCyber Threat Intelligence Debbie Janeczek May 24, 2017
Cyber Threat Intelligence Debbie Janeczek May 24, 2017 AGENDA Today s Cybersecurity Challenges What is Threat Intelligence? Data, Information, Intelligence Strategic, Operational and Tactical Threat Intelligence
More informationAutomating the Top 20 CIS Critical Security Controls
20 Automating the Top 20 CIS Critical Security Controls SUMMARY It s not easy being today s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises
More informationSEMINAR. Achieve 100% Backup Success! Achieve 100% Backup Success! Today s Goals. Today s Goals
Presented by: George Crump President and Founder, Storage Switzerland www.storagedecisions.com Today s Goals Achieve 100% Backup Success! o The Data Protection Problem Bad Foundation, New Problems o Fixing
More informationTechnology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited
Technology Risk Management in Banking Industry Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Change in Threat Landscape 2 Problem & Threats faced by Banking Industry
More informationVMAX: Achieving dramatic performance and efficiency results with EMC FAST VP
VMAX: Achieving dramatic performance and efficiency results with EMC FAST VP Tony Negro EMC Corporation Vendor Sponsored Session Insert Custom Session QR if Desired. AGENDA The Symmetrix VMAX Family Enginuity
More informationSQL Server Virtualization 201
Virtualization 201 Management and Risk Mitigation PASS Virtualization Virtual Chapter 2014.05.15 About David Klee @kleegeek davidklee.net gplus.to/kleegeek linked.com/a/davidaklee Specialties / Focus Areas
More informationEMC ProtectPoint. Solutions Guide. Version REV 03
EMC ProtectPoint Version 3.5 Solutions Guide 302-003-476 REV 03 Copyright 2014-2017 Dell Inc. or its subsidiaries. All rights reserved. Published May 2017 Dell believes the information in this publication
More informationData Storage, Recovery and Backup Checklists for Public Health Laboratories
Data Storage, Recovery and Backup Checklists for Public Health Laboratories DECEMBER 2018 Introduction Data play a critical role in the operation of a laboratory information management system (LIMS) and
More informationNORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers
Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.
More informationICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)
ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) June 2017 INSERT YEAR HERE Contact Information: Jeremy Dalpiaz AVP, Cyber and Data Security Policy Jeremy.Dalpiaz@icba.org ICBA Summary
More informationTHE STATE OF CLOUD & DATA PROTECTION 2018
THE STATE OF CLOUD & DATA PROTECTION 2018 Survey Results: 10 Findings on how over 800 IT Pros handle Disaster Recovery & Cloud Adoption. INTRODUCTION The Unitrends 2018 annual survey of IT professionals
More information