Rapid Recovery from Logical Corruption

Size: px
Start display at page:

Download "Rapid Recovery from Logical Corruption"

Transcription

1 Rapid Recovery from Logical Corruption Brett Quinn DellEMC 1 Nov 2016 Session DD

2 Topics Physical vs Logical Recovery SnapVX zdp: Data Protector for z Systems Isolated Recovery Solutions

3 Logical vs Physical Data Recovery Synchronous Primary Secondary DC2 DC1 Asynchronous Tertiary (Out Of Region) DC3

4 Physical Recovery SWAP Synchronous Primary Secondary DC2 DC1 Asynchronous SWAP Tertiary OOR DC3

5 Logical Recovery Primary Synchronous Secondary DC2 DC1 Asynchronous Tertiary OOR DC3

6 Logical Recovery Primary Synchronous Secondary DC2 DC1 Asynchronous Tertiary OOR DC3

7 Data Interdependence Data Lake Mobile Data Batch Flat Files DB2/IMS/ Other

8 8:15 SnapVX 10:00 9:15 8 AM 8:45 9:30 9:45 8:30 9:00

9 Incorporate Snaps for Data Copies New TimeFinder SnapVX Production Volume REDUCED IMPACT Target-less Snapshots Snapshot INCREASED AGILITY Up to 256 Snapshots per source Up to 1024 Linked Targets (snaps and/or clones) per source EASE OF USE User-defined name/version number Automatic expiration if desired Snapshot Linked Target Snapshot

10 TimeFinder SnapVX Pointer-Based SNAPs Source Device (TDEV) CREATE & ACTIVATE TERMINATE Snapshot (up to 256) 10 A.M. LINK / UNLINK Target Device(s) (TDEV) 12 Noon Host volume Snapshot Pointer Data structure Storage Resource Pool

11 zdp Data Protector for z Systems

12 zdp A z/os based solution that automates SnapVX snapshot creation/deletion Enables rapid recovery from a spectrum of risks to data: Processing error Human error Malicious intent Think: a time machine for the mainframe Scheduler

13 Why zdp? Logical vs Physical Protection DC1 Replication solutions focus the physical: availability with data integrity Planned and Unplanned outage events S Asynchronous P Multiple copies EVERYTHING gets physically replicated Even the logical corruptions! DC3 Synchronous S DC2

14 Why zdp? Logical vs Physical Protection DC1 Replication solutions focus the physical: availability with data integrity Planned and Unplanned outage events Multiple copies EVERYTHING gets physically replicated Even the logical corruptions! Today 1 additional full PIT copy Copy 1: near real time Copy 2: new PIT created every 24 hrs. 24 hours to find corruption Up to 24 hours of data loss 1 2 DC3 Asynchronous Synchronous DC2

15 Why zdp? Logical Protection zdp focuses on the logical: recovery from loss of data integrity Continual point in time copy creation Automated Selectable recovery points Brings Point in Time recovery capability to database and non-database systems Provides applications with recovery capability when not designed-in Provides cross-application recovery point Supports both FBA and CKD data Source Target Snapshot 1 Snapshot 2 Snapshot N

16 Rethinking DB2 Image Copy and Recovery processes To Image Copy or Not to image copy, that is the question System Level Backup in DB2 supports use of individual objects for recovery Creation of an image copy of an object from an SLB Use the SLB for object recovery and improve concurrency during recovery of multiple objects Benefits of using zdp for DB2 recovery Recovery Acceleration due to: Elimination of data restore time More recent copies of data mean less log to be traversed Reduced Image Copy processing Saves CPU and I/O resources If you use Virtual Tapes, the capacity requirements are minimized If you use Physical Tape, you need fewer tapes If you use Disk, the storage capacity requirements and network capacity (if replicated) are reduced

17 zdp Structural Elements Source Linked Target Snapshot 1 Snapshot 2 Versioned Data Group (VDG) Logical group of source volumes that associates volumes along with settings for creating multiple PIT images. Snapshot: Pointer based, point in time image of a single volume Snapset: Named point in time consistent image of all source volume snapshots in a VDG. Snapset capture: Continuous automated process of creating Snapsets Target set: Group of devices which have been defined to zdp as the desired LINK targets to a snapset. Snapshot 256

18 zdp deployment options zdp SCF source snap source snap source snap zdp supports snapset creation: Locally attached to VMAX3

19 zdp deployment options zdp SCF R1 snap SRDF/S or SRDF/A or PPRC R2 snap R1 snap R2 snap R1 snap R2 snap zdp supports snapset creation in: Locally attached VMAX3 Remote to VMAX3 via SRDF/S or SRDF/A (up to 4 hops) R1 array can be VMAX2 for sending SnapVX commands to a VMAX3 for remote execution

20 zdp deployment options R1 snap SRDF/S or SRDF/A or PPRC R2 snap zdp SCF R1 snap R2 snap R1 snap R2 snap zdp supports snapset creation in: Locally attached VMAX3 Remote to VMAX3 via SRDF/S or SRDF/A (up to 4 hops) R1 array can be VMAX2 or VMAX3 Direct attached to SRDF target array

21 Z Data Protector Summary Source Linked Target Snapshot 1 Snapshot 2 Host automation solution Frequent creation/deletion of snapshots Benefit: Fast recovery from logical corruption Features Summary Up to 144X more recovery capability compared to a daily snapshot Keep up to 256 versions of each volume Select snapshots to LINK by timestamp Automatic roll-off of aged snapshots Space estimation and monitoring Consistent scale (32,000 volumes) Snapshot 256

22 Building Business Resiliency Isolated Recovery Solutions

23 Cyber attacks get sophisticated Are you staying ahead of the criminal evolution? Traditional Threats Emerging Threats Cyber Theft Denial of Service Attacks Cyber Extortion Cyber Destruction Isolated Recovery Solutions protect against these types of attacks

24 REGULATORY CYBER DESTRUCTION PREVENTION GUIDANCE National Security Agency: best practices to protect information systems and networks from a destructive malware attack include... Segregate network systems Federal Reserve System: financial institutions should consider taking the following steps... such as logical network segmentation, hard backups, air gapping [and] physical segmentation of critical systems Federal Financial Institutions Examination Council (FFIEC): An air-gapped data backup architecture limits exposure to a cyber attack and allows for restoration of data to a point in time before the attack began. European Banking Authority: Competent authorities should assess whether the institution has comprehensive and tested business resilience and continuity plans in place Securities and Exchange Commission: A series of high-profile recent events involving systems-related issues further highlights the need for market participants to bolster the operational integrity of their automated systems in this area. National Association of Insurance Commissioners:... it is vital for state insurance regulators to provide effective cybersecurity guidance regarding the protection of the insurance sector s data security and infrastructure..

25 What are regulators Focused On? Executive Management needs to establish how much cyber and data breach insurance levels are appropriate for the firm Enterprise environments need to have a Cyber Breach Management Program that includes a life cycle approach to data protection Environments must implement multiple data replication technologies and methods to reduce the probability of data contamination Environments must deploy a multi-tiered approach to where data copies are stored to enable restore and recovery of business and environment data

26 WHAT IS ISOLATED RECOVERY? WHAT DOES IT PROTECT AGAINST? Characteristics: A Protected Copy of Data that is: Isolated Off-Net No Connections Cannot be directly accessed Multiple Roll-Back Points Maintained How: Periodic Copies of Critical Data Systems are isolated Data is Periodically Validated What does it protect against? Cyber Destruction Data Hostage BECAUSE YOU NEED TO THINK LIKE A HACKER!!!

27 WHY YOU NEED BOTH IR AND A DR SOLUTION ISOLATED RECOVERY IS NOT TRADITIONAL BC/DR IRS Systems are Isolated An isolated data center environment that is disconnected from the network and restricted from users other than those with proper clearance. Data is either Copied Periodically over an Air Gap or persistently replicated over a secure link infrastructure Software to perform data copies to a secondary storage and backup targets as well as procedures to schedule the copy over air gap between the production environment and the isolated recovery area or preserve a copy in the IR environment. Integrity Checking & Alerting Workflows to stage copied data in the isolated recovery zone and perform periodic integrity checks to rule out that it was affected by malware, along with mechanisms to trigger alerts in the event of a breach. Recovery & Remediation Procedures to perform recovery / remediation after an incident.

28 The most critical data first Compute Applications Validate & Store Protect the heartbeat of the business first Prioritize top applications or data sets to protect Usually less than 10% of data (this is NOT DR!) Start with a core set and build from there Highest Priority Data

29 Mainframe IR SOLUTION OVERVIEW Primary DC Corporate Network DR / BU Site FICON & Network Air Gap SRDF or Replicator Only Isolated Site Isolated data center environment Disconnected from the network Business data continuously received minimizing RPO Restricted from users other than those with proper clearance Planning: Business Critical Systems RPO/RTO Throughput Requirements Isolation: Isolated DC Environment Dedicated Link SRDF or Replicator Only FICON & Network Air Gap Hidden Local Copies that cannot be deleted Validation: Maintain gold copy Compare to incoming copy Tools application dependent Rate of Change Sentinel Record Injection Recovery: Standard failback mechanisms Additional remediation / validation

30 Concept: MF Isolated Air-Gapped Recovery System Preserves PiT copies on physically isolated VMAX Isolation from: Personnel Networks Primary Site zdp task FICON Production VMAX FICON either: 1. Not Connected 2. Not Genned Isolated Room Ensures recoverability from catastrophic large scale data corruption or deletion R 11 SRDF Persistent or periodic R2 zdp zdp Linked Targets Enhanced security for PiT copy Dual actors Access Control Lists SRDFA to Secondary Site For Disaster recovery Isolated Recovery VMAX

31 Concept: MF Isolated Air-Gapped Recovery System Preserves PiT copies on physically isolated VMAX Isolation from: Personnel Networks Primary Site FICON Production VMAX FICON either: 1. Not Connected 2. Not Genned Isolated Room Ensures recoverability from catastrophic large scale data corruption or deletion R 11 SRDF Persistent or periodic R2 zdp zdp Linked Targets Enhanced security for PiT copy Dual actors Access Control Lists SRDFA to Secondary Site For Disaster recovery Isolated Recovery VMAX zdp task

32 DLM Isolated Recovery Solution Components Production CEC R1 FICON & Network AIR GAP P DD or VNX Replication Isolated Recovery System S Snap zdp Changing Data Mgmt CEC Scheduled scripts creates several space efficient Fail- Safe library Images All TCPIP Sockets Closed on DLm storage except Replicator Separate dedicated storage replication ports Separate Dedicated Replication Network Backup Volumes / Restore Points Instant Access*** Retention Periods / WORM Cost Effective RPO = Hours to 1 Day* Primary Storage Backup Appliance zdp Isolated Recovery System RTO = Hours to Days** Can co-exist with and enhance an existing BC/DR Solution Tape Data is continuously periodically copied in to IRS environment File System Snapshot multiple space efficient Fail-Safe Llibrary images Management CEC is hardwired to IRS Solution Un-addressable Snapshot Copies allow multiple restore points Management CEC can be used used to periodically validate data * Adjustable based on desired security window ** Depends on # of Volumes, Data etc. ***Lower Performance

33 Summary Recovery from Logical corruption is the next wave of Business Continuity planning Operational errors and malicious attacks are real and emerging threats. Tools and procedures must be developed based on perpetual and persistent data copy technologies Consider the applicability of Isolated Recovery Solutions for your enterprise

34 Session feedback Please submit your feedback at Session is DD

Copyright 2016 EMC Corporation. All rights reserved.

Copyright 2016 EMC Corporation. All rights reserved. 1 BUILDING BUSINESS RESILIENCY Isolated Recovery Services NAZIR VELLANI (ERNST & YOUNG) & DAVID EDBORG (EMC GLOBAL SERVICES) 2 PRESENTERS Nazir Vellani (EY) Senior Manager Tel: +1 214 596 8985 Email: nazir.vellani@ey.com

More information

DATA PROTECTOR FOR Z SYSTEMS(ZDP) ESSENTIALS

DATA PROTECTOR FOR Z SYSTEMS(ZDP) ESSENTIALS DATA PROTECTOR FOR Z SYSTEMS(ZDP) ESSENTIALS ABSTRACT This white paper describes Data Protector z Systems (zdp) features and functionality for the VMAX 950F for mainframe. July, 2017 WHITE PAPER To learn

More information

Dell EMC Isolated Recovery

Dell EMC Isolated Recovery Dell EMC Isolated Recovery Andreas El Maghraby Advisory Systems Engineer DPS @andyem_si GLOBAL SPONSORS Incident Response: Categories of Cybercrime Activity April to June 2016 37% 27% 12% 9% 7% 7% 5% 2

More information

Universal Storage Consistency of DASD and Virtual Tape

Universal Storage Consistency of DASD and Virtual Tape Universal Storage Consistency of DASD and Virtual Tape Jim Erdahl U.S.Bank August, 14, 2013 Session Number 13848 AGENDA Context mainframe tape and DLm Motivation for DLm8000 DLm8000 implementation GDDR

More information

Simplify and Improve DB2 Administration by Leveraging Your Storage System

Simplify and Improve DB2 Administration by Leveraging Your Storage System Simplify and Improve Administration by Leveraging Your Storage System Ron Haupert Rocket Software, Inc. March 1, 2011 Session Number 8404 Session Agenda Database and Storage Integration Overview System-Level

More information

DISK LIBRARY FOR MAINFRAME

DISK LIBRARY FOR MAINFRAME DISK LIBRARY FOR MAINFRAME Geographically Dispersed Disaster Restart Tape ABSTRACT Disk Library for mainframe is Dell EMC s industry leading virtual tape library for mainframes. Geographically Dispersed

More information

Simplify and Improve IMS Administration by Leveraging Your Storage System

Simplify and Improve IMS Administration by Leveraging Your Storage System Simplify and Improve Administration by Leveraging Your Storage System Ron Haupert Rocket Software, Inc. March 3, 2011 Session Number: 8568 Session Agenda Database and Storage Integration Overview System

More information

Simplify and Improve IMS Administration by Leveraging Your Storage System

Simplify and Improve IMS Administration by Leveraging Your Storage System Simplify and Improve Administration by Leveraging Your Storage System Ron Bisceglia Rocket Software, Inc. August 9, 2011 Session Number: 9406 Session Agenda and Storage Integration Overview System Level

More information

Blue Cross Blue Shield of Minnesota - Replication and DR for Linux on System z

Blue Cross Blue Shield of Minnesota - Replication and DR for Linux on System z Blue Cross Blue Shield of Minnesota - Replication and DR for Linux on System z Brian Peterson, Blue Cross Blue Shield of Minnesota Gail Riley, EMC March 3, 2011 Objectives At the end of this session, you

More information

Blue Cross Blue Shield of Minnesota - Replication and DR for Linux on System z

Blue Cross Blue Shield of Minnesota - Replication and DR for Linux on System z Blue Cross Blue Shield of Minnesota - Replication and DR for Linux on System z Brian Peterson, Blue Cross Blue Shield of Minnesota Brian_D_Peterson@bluecrossmn.com Gail Riley, EMC Riley_Gail@emc.com August

More information

Data Protection Everywhere

Data Protection Everywhere Data Protection Everywhere For the modern data center Syed Saleem Advisory Systems Engineer Pillars of the modern data center Protection and trust Security/Governance Encryption Data Protection Services/Support

More information

New trends in Virtual Tape: Cloud and Automation

New trends in Virtual Tape: Cloud and Automation New trends in Virtual Tape: Cloud and Automation Robin Fromm Dell EMC Date of presentation (07/11/2017) Session 2 AGENDA Virtual Tape Architecture and Tiering Cloud Object Storage Mainframe Tape Cloud

More information

Cloud Security Myths Paul Mazzucco, Chief Security Officer

Cloud Security Myths Paul Mazzucco, Chief Security Officer Cloud Security Myths Paul Mazzucco, Chief Security Officer Discussion Points >Yesterday s standards: today s security myths >Cloud security: an ongoing mandate >Actions to take now 90% of Businesses Breached

More information

DISK LIBRARY FOR MAINFRAME

DISK LIBRARY FOR MAINFRAME DISK LIBRARY FOR MAINFRAME Geographically Dispersed Disaster Restart Tape ABSTRACT Disk Library for mainframe is Dell EMC s industry leading virtual tape library for IBM zseries mainframes. Geographically

More information

ReDefine Enterprise Storage

ReDefine Enterprise Storage ReDefine Enterprise Storage What s New With VMAX 1 INDUSTRY S FIRST ENTERPRISE DATA PLATFORM 2 LOW LATENCY Flash optimized NO DOWNTIME Always On availability BUSINESS ORIENTED 1-Click Service Levels CLOUD

More information

EMC CORE TECHNOLOGIES

EMC CORE TECHNOLOGIES EMC CORE TECHNOLOGIES EMC ROCKS THE CLOUD MEDIA PRE-BRIEFING EMBARGOED UNTIL: 5AM ET TUESDAY, NOVEMBER 17, 2015 1 THE POWER OF THE PORTFOLIO 3 REQUIREMENTS TO ACCELERATE IT TRANSFOMATION SIMPLIFY & AUTOMATE

More information

'Why' Ultra High Availability and Integrated EMC-Brocade Data Replication Networks

'Why' Ultra High Availability and Integrated EMC-Brocade Data Replication Networks 'Why' Ultra High Availability and Integrated EMC-Brocade Data Replication Networks Dr. Steve Guendert Brocade Communications Systems Brian Kithcart EMC Corporation August 13, 2013 Session Number: 14093

More information

Disaster Recovery Is A Business Strategy

Disaster Recovery Is A Business Strategy Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...

More information

Business continuity management and cyber resiliency

Business continuity management and cyber resiliency Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Business continuity management and cyber resiliency Introductions Eric Wunderlich,

More information

Business Continuity and Disaster Recovery. Ed Crowley Ch 12

Business Continuity and Disaster Recovery. Ed Crowley Ch 12 Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster

More information

The Nuances of Backup and Recovery Solutions

The Nuances of Backup and Recovery Solutions DEFINING THE RIGHT DATA PROTECTION STRATEGY The Nuances of Backup and Recovery Solutions Cindy LaChapelle, Principal Consultant, ISG ISG WHITE PAPER 2012 Information Services Group, Inc. All Rights Reserved

More information

Table of Contents. Sample

Table of Contents. Sample TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 4 1.1 GOALS AND OBJECTIVES... 5 1.2 REQUIRED REVIEW... 5 1.3 APPLICABILITY... 5 1.4 ROLES AND RESPONSIBILITIES SENIOR MANAGEMENT AND BOARD OF DIRECTORS...

More information

TOP REASONS TO CHOOSE DELL EMC OVER VEEAM

TOP REASONS TO CHOOSE DELL EMC OVER VEEAM HANDOUT TOP REASONS TO CHOOSE DELL EMC OVER VEEAM 10 This handout overviews the top ten reasons why customers choose Data Protection from Dell EMC over Veeam. Dell EMC has the most comprehensive data protection

More information

LAYERED DATA PROTECTION STRATEGY PRESERVES CONTINUITY OF VITAL PATIENT SERVICES

LAYERED DATA PROTECTION STRATEGY PRESERVES CONTINUITY OF VITAL PATIENT SERVICES LAYERED DATA PROTECTION STRATEGY PRESERVES CONTINUITY OF VITAL PATIENT SERVICES Isolated recovery solution for today s healthcare digital environment ABSTRACT With cyberthreats becoming more sophisticated

More information

10 Reasons Why Your DR Plan Won t Work

10 Reasons Why Your DR Plan Won t Work 10 Reasons Why Your DR Plan Won t Work Jim Damoulakis CTO, GlassHouse Technologies, Inc. Sept. 29, 2005 DR Vision Imagine Prepared to handle multiple categories of disaster Clearly documented policies

More information

De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid

De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (CRC)

More information

TSM Paper Replicating TSM

TSM Paper Replicating TSM TSM Paper Replicating TSM (Primarily to enable faster time to recoverability using an alternative instance) Deon George, 23/02/2015 Index INDEX 2 PREFACE 3 BACKGROUND 3 OBJECTIVE 4 AVAILABLE COPY DATA

More information

Copyright 2010 EMC Corporation. Do not Copy - All Rights Reserved.

Copyright 2010 EMC Corporation. Do not Copy - All Rights Reserved. 1 Using patented high-speed inline deduplication technology, Data Domain systems identify redundant data as they are being stored, creating a storage foot print that is 10X 30X smaller on average than

More information

Simple And Reliable End-To-End DR Testing With Virtual Tape

Simple And Reliable End-To-End DR Testing With Virtual Tape Simple And Reliable End-To-End DR Testing With Virtual Tape Jim Stout EMC Corporation August 9, 2012 Session Number 11769 Agenda Why Tape For Disaster Recovery The Evolution Of Disaster Recovery Testing

More information

Rethinking Backup and Recovery Strategies with IMS Recovery Expert

Rethinking Backup and Recovery Strategies with IMS Recovery Expert Rethinking Backup and Recovery Strategies with IMS Recovery Expert Ron Bisceglia Rocket Software March 13, 2012 Session 10805 Topics Cost of Downtime How often do we backup our data? How do we backup our

More information

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE John McDonald 1 What is Trust? Can I trust that my assets will be available when I need them? Availability Critical Assets Security Can I trust

More information

DISK LIBRARY FOR MAINFRAME

DISK LIBRARY FOR MAINFRAME DISK LIBRARY FOR MAINFRAME Mainframe Tape Replacement with cloud connectivity ESSENTIALS A Global Virtual Library for all mainframe tape use cases Supports private and public cloud providers. GDDR Technology

More information

Recovery at a Click - where to be in 18 months

Recovery at a Click - where to be in 18 months Recovery at a Click - where to be in 18 months IBM Resiliency Orchestration with Cyber Incident Recovery In today s environment, businesses cannot tolerate downtime + Expectation is to be Always-on + Creating

More information

Mainframe Backup Modernization Disk Library for mainframe

Mainframe Backup Modernization Disk Library for mainframe Mainframe Backup Modernization Disk Library for mainframe Mainframe is more important than ever itunes Downloads Instagram Photos Twitter Tweets Facebook Likes YouTube Views Google Searches CICS Transactions

More information

Redefine Data Protection: Next Generation Backup And Business Continuity

Redefine Data Protection: Next Generation Backup And Business Continuity Redefine Data Protection: Next Generation Backup And Business Continuity 1 Business Is Being Redefined Leveraging the Power of Technology Megatrends CLOUD MOBILE SOCIAL BIG DATA 2 Creating New Next Gen

More information

Lab Validation Report

Lab Validation Report Lab Validation Report NetApp SnapManager for Oracle Simple, Automated, Oracle Protection By Ginny Roth and Tony Palmer September 2010 Lab Validation: NetApp SnapManager for Oracle 2 Contents Introduction...

More information

Cyber Resilience. Think18. Felicity March IBM Corporation

Cyber Resilience. Think18. Felicity March IBM Corporation Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack

More information

Comment protéger le Data Center du futur?

Comment protéger le Data Center du futur? Comment protéger le Data Center du futur? NAWFAL SAOUD Regional Sales Manager NWA( North and West Africa) DELL EMC Data Protection Solutions Division Tale of Two Worlds Traditional apps IT On premise Next

More information

UPS system failure. Cyber crime (DDoS ) Accidential/human error. Water, heat or CRAC failure. W eather related. Generator failure

UPS system failure. Cyber crime (DDoS ) Accidential/human error. Water, heat or CRAC failure. W eather related. Generator failure BEST PRACTICES: LEVERAGING CLOUD AND COLOCATION TO AVOID DOWNTIME Business continuity implementations that address traditional and emerging threats KEY TAKEAWAYS The cost for unplanned downtime has never

More information

DAHA AKILLI BĐR DÜNYA ĐÇĐN BĐLGĐ ALTYAPILARIMIZI DEĞĐŞTĐRECEĞĐZ

DAHA AKILLI BĐR DÜNYA ĐÇĐN BĐLGĐ ALTYAPILARIMIZI DEĞĐŞTĐRECEĞĐZ Information Infrastructure Forum, Istanbul DAHA AKILLI BĐR DÜNYA ĐÇĐN BĐLGĐ ALTYAPILARIMIZI DEĞĐŞTĐRECEĞĐZ 2010 IBM Corporation Information Infrastructure Forum, Istanbul IBM XIV Veri Depolama Sistemleri

More information

DLm8000 Product Overview

DLm8000 Product Overview Whitepaper Abstract This white paper introduces EMC DLm8000, a member of the EMC Disk Library for mainframe family. The EMC DLm8000 is the EMC flagship mainframe VTL solution in terms of scalability and

More information

A Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist

A Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist A Survival Guide to Continuity of Operations David B. Little Senior Principal Product Specialist Customer Perspective: Recovery Time & Objective Asynchronous Replication Synchronous Replication WAN Clustering

More information

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City 1 Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City The opinions expressed are those of the presenters and are not those of the Federal Reserve Banks, the

More information

IMS Disaster Recovery Tools Solutions IMS Recovery Expert

IMS Disaster Recovery Tools Solutions IMS Recovery Expert SHARE Anaheim, CA March, 2011 IMS Disaster Recovery Tools Solutions GLENN GALLER Certified S/W IT Specialist Advanced Technical Skills Ann Arbor, Michigan gallerg@us.ibm.com IBM Disaster Recovery Solutions

More information

HPE Converged Data Solutions

HPE Converged Data Solutions HPE Converged Data Solutions Erdinc Kaya - kaya@hpe.com Storage Solution Architect Areas of Transformation & HPE IM&P A platform approach for effectively managing and protecting all information enterprise-wide

More information

Replication is the process of creating an

Replication is the process of creating an Chapter 13 Local tion tion is the process of creating an exact copy of data. Creating one or more replicas of the production data is one of the ways to provide Business Continuity (BC). These replicas

More information

Verron Martina vspecialist. Copyright 2012 EMC Corporation. All rights reserved.

Verron Martina vspecialist. Copyright 2012 EMC Corporation. All rights reserved. Verron Martina vspecialist 1 TRANSFORMING MISSION CRITICAL APPLICATIONS 2 Application Environments Historically Physical Infrastructure Limits Application Value Challenges Different Environments Limits

More information

DELL EMC VMAX ALL FLASH 950F OVERVIEW FOR MAINFRAME ENVIRONMENTS

DELL EMC VMAX ALL FLASH 950F OVERVIEW FOR MAINFRAME ENVIRONMENTS DELL EMC VMAX ALL FLASH 950F OVERVIEW FOR MAINFRAME ENVIRONMENTS ABSTRACT This white paper describes the features that are available for DELL EMC VMAX for IBM z systems. The latest Mainframe features are

More information

Under the Covers. Benefits of Disk Library for Mainframe Tape Replacement. Session 17971

Under the Covers. Benefits of Disk Library for Mainframe Tape Replacement. Session 17971 Under the Covers Benefits of Disk Library for Mainframe Tape Replacement Session 17971 Session Overview DLm System Architecture Virtual Library Architecture VOLSER Handling Formats Allocating/Mounting

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Trends in Data Protection CDP and VTL

Trends in Data Protection CDP and VTL Trends in Data Protection CDP and VTL Agnes Lamont, TimeSpring Jason Iehl, Network Appliance SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member

More information

Redefine Data Protection: Next Generation Backup & Business Continuity Solutions

Redefine Data Protection: Next Generation Backup & Business Continuity Solutions Redefine Data Protection: Next Generation Backup & Business Continuity Solutions 1 Creating New Next Gen Applications Existing Workloads Continue to Grow 2 How Can Data Protection Help? Lower Cost Reduce

More information

WHAT S NEW WITH TIMEFINDER FOR EMC SYMMETRIX VMAX

WHAT S NEW WITH TIMEFINDER FOR EMC SYMMETRIX VMAX White Paper WHAT S NEW WITH TIMEFINDER FOR EMC SYMMETRIX VMAX Applied Technology for traditional and virtual environments Abstract This white paper describes the latest EMC TimeFinder features available

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

Copyright 2015 EMC Corporation. All rights reserved. Published in the USA.

Copyright 2015 EMC Corporation. All rights reserved. Published in the USA. This solution guide describes the disaster recovery modular add-on to the Federation Enterprise Hybrid Cloud Foundation solution for SAP. It introduces the solution architecture and features that ensure

More information

DATA PROTECTION IN A ROBO ENVIRONMENT

DATA PROTECTION IN A ROBO ENVIRONMENT Reference Architecture DATA PROTECTION IN A ROBO ENVIRONMENT EMC VNX Series EMC VNXe Series EMC Solutions Group April 2012 Copyright 2012 EMC Corporation. All Rights Reserved. EMC believes the information

More information

Business Continuity & Disaster Recovery

Business Continuity & Disaster Recovery Business Continuity & Disaster Recovery Technology and Process Alessio Di Benedetto Presales Manager Roma, 7 th of May 2010 1 Objectives The objective of this workshop is to provide: an overview of the

More information

Florida State University

Florida State University Florida State University Disaster Recovery & Business Continuity Planning Overview October 24, 2017 1 Key Readiness Questions Has your department identified the business functions and infrastructure that

More information

Cyber Resiliency. Felicity March. May 2018

Cyber Resiliency. Felicity March. May 2018 Cyber Resiliency Felicity March May 2018 1 Cyber Resiliency Cyber Resiliency is the ability of an organization to continue to function with the least amount of disruption in the face of cyber attacks.

More information

THE POWER OF TECH-SAVVY BOARDS:

THE POWER OF TECH-SAVVY BOARDS: THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES

More information

Unified Management for Virtual Storage

Unified Management for Virtual Storage Unified Management for Virtual Storage Storage Virtualization Automated Information Supply Chains Contribute to the Information Explosion Zettabytes Information doubling every 18-24 months Storage growing

More information

Transform Availability

Transform Availability Transform Availability EMC Continuous Availability Advisory Services Presenter: 1 Agenda Introduction Why Continuous Availability? Customer Challenges EMC s Approach Service Description Delivery Timeline

More information

CANVAS DISASTER RECOVERY PLAN AND PROCEDURES

CANVAS DISASTER RECOVERY PLAN AND PROCEDURES CANVAS DISASTER RECOVERY PLAN AND PROCEDURES Instructure Security, Engineering, and Operations INSTRUCTURE, INC. 6330 South 3000 East Salt Lake City, Utah 84121 Table of Contents Disaster Plan and Procedures...

More information

Keys to a more secure data environment

Keys to a more secure data environment Keys to a more secure data environment A holistic approach to data infrastructure security The current fraud and regulatory landscape makes it clear that every firm needs a comprehensive strategy for protecting

More information

Countering ransomware with HPE data protection solutions

Countering ransomware with HPE data protection solutions Countering ransomware with HPE data protection solutions What is ransomware? Definition Malware that prevents or limits users from accessing their system by: Locking the system s screen Encrypting files

More information

Business Continuity Plan Executive Overview

Business Continuity Plan Executive Overview Business Continuity Plan Executive Overview In terms of business continuity and disaster recovery planning, Harland Clarke s mission is to ensure the availability of critical business functions and Information

More information

How Symantec Backup solution helps you to recover from disasters?

How Symantec Backup solution helps you to recover from disasters? How Symantec Backup solution helps you to recover from disasters? Finn Henningsen Presales Specialist Technology Days 2011 1 Thank you to our sponsors Technology Days 2011 2 Agenda Why do we bother? Infrastructure

More information

Achieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX

Achieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX Achieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX Introduction Planning for recovery is a requirement in businesses of all sizes. In implementing an operational

More information

DELL EMC MAINFRAME TECHNOLOGY OVERVIEW

DELL EMC MAINFRAME TECHNOLOGY OVERVIEW DELL EMC MAINFRAME TECHNOLOGY OVERVIEW ABSTRACT This white paper provides an overview of Dell EMC s product offerings for the IBM Z environment. It is intended for customers or prospective customers interested

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

PROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS

PROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS >> PROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS COMPUTACENTER HELPS ORGANISATIONS INCREASE THE AVAILABILITY AND INTEGRITY OF THEIR INFORMATION ASSETS WITH NEW-GENERATION DATA PROTECTION SOLUTIONS >> PROTECT

More information

Azure Webinar. Resilient Solutions March Sander van den Hoven Principal Technical Evangelist Microsoft

Azure Webinar. Resilient Solutions March Sander van den Hoven Principal Technical Evangelist Microsoft Azure Webinar Resilient Solutions March 2017 Sander van den Hoven Principal Technical Evangelist Microsoft DX @svandenhoven 1 What is resilience? Client Client API FrontEnd Client Client Client Loadbalancer

More information

Oracle Zero Data Loss Recovery Appliance (ZDLRA)

Oracle Zero Data Loss Recovery Appliance (ZDLRA) Oracle Zero Data Loss Recovery Appliance (ZDLRA) Overview Attila Mester Principal Sales Consultant Data Protection Copyright 2015, Oracle and/or its affiliates. All rights reserved. Safe Harbor Statement

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

Step into the future. HP Storage Summit Converged storage for the next era of IT

Step into the future. HP Storage Summit Converged storage for the next era of IT HP Storage Summit 2013 Step into the future Converged storage for the next era of IT 1 HP Storage Summit 2013 Step into the future Converged storage for the next era of IT Karen van Warmerdam HP XP Product

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

FOR FINANCIAL SERVICES ORGANIZATIONS

FOR FINANCIAL SERVICES ORGANIZATIONS RSA BUSINESS-DRIVEN SECURITYTM FOR FINANCIAL SERVICES ORGANIZATIONS MANAGING THE NEXUS OF RISK & SECURITY A CHANGING LANDSCAPE AND A NEW APPROACH Today s financial services technology landscape is increasingly

More information

Hitachi Modern Data Protection and Copy Data Management Solutions

Hitachi Modern Data Protection and Copy Data Management Solutions Hitachi Modern Data Protection and Copy Data Management Solutions Transform Critical Application Availability and Resiliency OVERVIEW Traditional backup and recovery solutions cannot keep up with today

More information

Brussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security

Brussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security Cyber Resiliency Minimizing the impact of breaches on business continuity Jean-Michel Lamby Associate Partner - IBM Security Brussels Think Brussels / Cyber Resiliency / Oct 4, 2018 / 2018 IBM Corporation

More information

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity Understanding Cyber Insurance & Regulatory Drivers for Business Continuity Lily Yeoh, CISSP, CBCP lily@cb1security.com https://www.cb1security.com Agenda BC/DR Business Drivers Recent Regulatory & Cyber

More information

Copyright 2012 EMC Corporation. All rights reserved.

Copyright 2012 EMC Corporation. All rights reserved. 1 TRANSFORM IT+BUSINESS+YOURSELF DISASTER RECOVERY FOR MISSION CRITICAL APPLICATIONS EMC FORUM 2012 SKOPJE Dejan Živanović Presales Manager Dejan.Zivanovic@emc.com 2 Cloud A New Architecture Old World

More information

VMware Site Recovery Technical Overview First Published On: Last Updated On:

VMware Site Recovery Technical Overview First Published On: Last Updated On: VMware Site Recovery Technical Overview First Published On: 11-28-2017 Last Updated On: 11-29-2017 1 Table of Contents 1. VMware Site Recovery Technical Overview 1.1.Introduction 1.2.Overview 1.3.Use Cases

More information

Copyright 2012 EMC Corporation. All rights reserved.

Copyright 2012 EMC Corporation. All rights reserved. 1 TRANSFORMING MICROSOFT APPLICATIONS TO THE CLOUD Louaye Rachidi Technology Consultant 2 22x Partner Of Year 19+ Gold And Silver Microsoft Competencies 2,700+ Consultants Worldwide Cooperative Support

More information

Breakthrough Data Recovery for IBM AIX Environments

Breakthrough Data Recovery for IBM AIX Environments Breakthrough Data Recovery for IBM AIX Environments How New Technologies Are Making Data Protection, Recovery and High Availability Easier and More Affordable Introduction Downtime and data loss pose intolerable

More information

Chapter 11. SnapProtect Technology

Chapter 11. SnapProtect Technology Chapter 11 SnapProtect Technology Hardware based snapshot technology provides the ability to use optimized hardware and disk appliances to snap data on disk arrays providing quick recovery by reverting

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

Cyber Threat Intelligence Debbie Janeczek May 24, 2017

Cyber Threat Intelligence Debbie Janeczek May 24, 2017 Cyber Threat Intelligence Debbie Janeczek May 24, 2017 AGENDA Today s Cybersecurity Challenges What is Threat Intelligence? Data, Information, Intelligence Strategic, Operational and Tactical Threat Intelligence

More information

Automating the Top 20 CIS Critical Security Controls

Automating the Top 20 CIS Critical Security Controls 20 Automating the Top 20 CIS Critical Security Controls SUMMARY It s not easy being today s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises

More information

SEMINAR. Achieve 100% Backup Success! Achieve 100% Backup Success! Today s Goals. Today s Goals

SEMINAR. Achieve 100% Backup Success! Achieve 100% Backup Success! Today s Goals. Today s Goals Presented by: George Crump President and Founder, Storage Switzerland www.storagedecisions.com Today s Goals Achieve 100% Backup Success! o The Data Protection Problem Bad Foundation, New Problems o Fixing

More information

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Technology Risk Management in Banking Industry Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Change in Threat Landscape 2 Problem & Threats faced by Banking Industry

More information

VMAX: Achieving dramatic performance and efficiency results with EMC FAST VP

VMAX: Achieving dramatic performance and efficiency results with EMC FAST VP VMAX: Achieving dramatic performance and efficiency results with EMC FAST VP Tony Negro EMC Corporation Vendor Sponsored Session Insert Custom Session QR if Desired. AGENDA The Symmetrix VMAX Family Enginuity

More information

SQL Server Virtualization 201

SQL Server Virtualization 201 Virtualization 201 Management and Risk Mitigation PASS Virtualization Virtual Chapter 2014.05.15 About David Klee @kleegeek davidklee.net gplus.to/kleegeek linked.com/a/davidaklee Specialties / Focus Areas

More information

EMC ProtectPoint. Solutions Guide. Version REV 03

EMC ProtectPoint. Solutions Guide. Version REV 03 EMC ProtectPoint Version 3.5 Solutions Guide 302-003-476 REV 03 Copyright 2014-2017 Dell Inc. or its subsidiaries. All rights reserved. Published May 2017 Dell believes the information in this publication

More information

Data Storage, Recovery and Backup Checklists for Public Health Laboratories

Data Storage, Recovery and Backup Checklists for Public Health Laboratories Data Storage, Recovery and Backup Checklists for Public Health Laboratories DECEMBER 2018 Introduction Data play a critical role in the operation of a laboratory information management system (LIMS) and

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) June 2017 INSERT YEAR HERE Contact Information: Jeremy Dalpiaz AVP, Cyber and Data Security Policy Jeremy.Dalpiaz@icba.org ICBA Summary

More information

THE STATE OF CLOUD & DATA PROTECTION 2018

THE STATE OF CLOUD & DATA PROTECTION 2018 THE STATE OF CLOUD & DATA PROTECTION 2018 Survey Results: 10 Findings on how over 800 IT Pros handle Disaster Recovery & Cloud Adoption. INTRODUCTION The Unitrends 2018 annual survey of IT professionals

More information