WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY

Similar documents
Why the Threat of Downtime Should Be Keeping You Up at Night

Backup vs. Business Continuity

Balancing RTO, RPO, and budget. Table of Contents. White Paper Seven steps to disaster recovery nirvana for wholesale distributors

Disaster Recovery Is A Business Strategy

Downtime Prevention Buyer s Guide. 6 QUESTIONS to help you choose the right availability protection for your applications

Annual Public Safety PSAP Survey results

Introduction to Business continuity Planning

White Paper: Backup vs. Business Continuity. Backup vs. Business Continuity: Using RTO to Better Plan for Your Business

5 Things Small Businesses Need to Know About Disaster Recovery

An introductory guide to Disaster Recovery and how it can ultimately keep your company alive. A Publication of

From Single File Recovery to Full Restore: Choosing the Right Backup and Recovery Solution for Your Cloud Data

Continuous Processing versus Oracle RAC: An Analyst s Review

BUSINESS CONTINUITY: THE PROFIT SCENARIO

Creating and Testing Your IT Recovery Plan

Backup vs. Business Continuity: Using RTO to Better Plan for Your Business

ARC BRIEF. Application Downtime, Your Productivity Killer. Overview. Trends in Plant Application Adoption. By John Blanchard and Greg Gorbach

Five Key Considerations for Selecting Cloud Recovery Services

Introduction. Read on and learn some facts about backup and recovery that could protect your small business.

Achieving Optimal Returns from Wellhead Operations

Simplifying Downtime Prevention for Industrial Plants. A Guide to the Five Most Common Deployment Approaches

Table of Contents. Sample

5 REASONS YOUR BUSINESS NEEDS NETWORK MONITORING

POWERING NETWORK RESILIENCY WITH UPS LIFECYCLE MANAGEMENT

Disaster Recovery and Business Continuity

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored

THE PATH TO LOWEST TOTAL COST OF OWNERSHIP WITH INDUSTRIAL AUTOMATION OPERATIONAL SYSTEMS. Avoiding Downtime with a Positive ROI

PLAYBOOK. How Do You Plan to Grow? Evaluating Your Critical Infrastructure Can Help Uncover the Right Strategy

DISASTER RECOVERY PRIMER

4 Criteria of Intelligent Business Continuity

Controlling Costs and Driving Agility in the Datacenter

Why Continuity Matters

CLOUDALLY EBOOK. Best Practices for Business Continuity

How can you manage what you can t see?

INTELLIGENCE DRIVEN GRC FOR SECURITY

A Top US Bank Trusts Neustar SiteProtect for Reliable DDoS Protection Depth

VIRTUALIZATION IN INDUSTRIAL PLANTS

The Microsoft Large Mailbox Vision

Build a viable plan for disaster recovery and crisis management.

The 10 Disaster Planning Essentials For A Small Business Network

Protecting Microsoft Hyper-V 3.0 Environments with Arcserve

Disaster Planning Essentials and Disaster Planning Checklist

Balancing the pressures of a healthcare SQL Server DBA

OL Connect Backup licenses

DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP

A Practical Guide to Cost-Effective Disaster Recovery Planning

Protecting VMware vsphere/esx Environments with Arcserve

Microsoft SQL Server on Stratus ftserver Systems

What can the OnBase Cloud do for you? lbmctech.com

A Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc.

A Ready Business rises above infrastructure limitations. Vodacom Power to you

Conducted by Vanson Bourne Research

Kroll Ontrack VMware Forum. Survey and Report

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT

Virtualizing disaster recovery using cloud computing

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

Buyer s Guide: DRaaS features and functionality

10 Hidden IT Risks That Might Threaten Your Business

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud

Florida State University

CONSIDERATIONS BEFORE MOVING TO THE CLOUD

What is Penetration Testing?

WHITE PAPER. The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help

Dell DR4000 Replication Overview

After the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning

InterSystems High Availability Solutions

YOUR CONDUIT TO THE CLOUD

The Cyber War on Small Business

The case for cloud-based data backup

White Paper: Backup vs. Business Continuity. Backup vs. Business Continuity: Using RTO to Better Plan for Your Business

arcserve r16.5 Hybrid data protection

THE INTELLIGENCE AND AUTOMATION WE BUILD INTO OUR SMARTDBA INTEGRATED SOLUTIONS HELP YOU OPTIMIZE PERFORMANCE, INCREASE PRODUCTIVITY, AND ASSURE THE A

What is Data Protection and Disaster Recovery?

BC vs. DR vs. HA vs. EM vs. RM vs. CM: is the difference only terminology?

A revolutionary visual security and analytics solution

How Managed Service Providers Can Meet Market Growth with Maximum Uptime

White Paper. How to select a cloud disaster recovery method that meets your requirements.

Provided as an educational service by: Introduction

Why SaaS isn t Backup

Power Management Solutions Maximise the reliability and efficiency of your power critical facility

The Hidden Costs of Free Database Auditing Comparing the total cost of ownership of native database auditing vs. Imperva SecureSphere

WHITE PAPER. Header Title. Side Bar Copy. Header Title 5 Reasons to Consider Disaster Recovery as a Service for IBM i WHITEPAPER

BUSTED! 5 COMMON MYTHS OF MODERN INFRASTRUCTURE. These Common Misconceptions Could Be Holding You Back

Emergence of Business Continuity to Ensure Business and IT Operations. Solutions to successfully meet the requirements of business continuity.

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

The power management skills gap

3 Ways Businesses Use Network Virtualization. A Faster Path to Improved Security, Automated IT, and App Continuity

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

Top 10 Actions A CIO Can Take To Prepare For A Hurricane. Practical advice from well prepared CIOs of Gulf Coast companies

HIPAA Compliance Checklist

Availability and the Always-on Enterprise: Why Backup is Dead

Take Back Lost Revenue by Activating Virtuozzo Storage Today

How Industrial PoE Switches Facilitate Reliable Outdoor IP Surveillance Networks. Jackey Hsueh Product Manager

Appendix 3 Disaster Recovery Plan

The 10 Disaster Planning Essentials

BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide

VERITAS Volume Replicator. Successful Replication and Disaster Recovery

Backup and Restore Strategies

Transcription:

WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY

White Paper 2 Why Building Security Systems Need Continuous Availability Always On Is the Only Option. If All Systems Go Down, How Can You React in an Emergency? Imagine there is a building security breach that starts to create havoc in a heavily-trafficked area. Of course you ll react immediately because you have top-notch security and automation systems. But what if the server that those systems depend upon is down how would you even know about the emergency? A security system can only provide protection if it s up and running all the time. That s why it s crucial to have a reliable availability solution. If video monitoring systems, access control, or other building security systems go down due to a server outage, it can mean costly, dangerous, and potentially life-threatening consequences. With a nonfunctional security system, there would be no way to know about other breaches or emergencies, or to quickly alert employees of a mandatory evacuation. How would you explain if people lost their lives because you didn t know a crisis was occurring? Read on to learn all about availability, the exact risks of server downtime, the less obvious costs you can incur, and the different types of availability solutions you can use to protect your organization. At first glance, 99 percent server availability for a server sounds great. But when this translates into inaccessible applications for 90+ minutes a week, it s obviously unacceptable. What Exactly Is Availability? When we talk about availability, we re talking about how reliable your server is, and what percentage of time it keeps your applications running. There are three different types of server availability: 1. Backups and Restores: This is achieved by having basic backup, data replication, and failover procedures in place, which are included with conventional servers. This method delivers approximately 99 percent availability, which equates to an average of 87.5 hours of downtime per year, or more than 90 minutes of uninvited downtime per standard work week. 2. High Availability (HA): With an HA solution, applications are accessible a very high percentage of the time. HA solutions include cluster systems (which focus on quick recovery after a failure) and software solutions (which aim to prevent downtime from happening). High availability translates into 99.95 99.99 percent availability, or 52 minutes - 4.5 hours of downtime per year. 3. Continuous Availability (CA): Also called an always-on solution, a CA solution s goal is to eliminate downtime altogether through software or a specialized server system. CA solutions are the ultimate in availability (99.999 percent) and result in just one to five-and-a-half minutes of downtime in a year. At first glance, 99 percent server availability for a server sounds great. But when this translates into inaccessible applications for 90+ minutes a week, it s obviously unacceptable. Security systems have to be continuously operational and that calls for a continuously reliable server.

White Paper 3 The True Costs of Downtime for Building Security The costs of downtime for building security systems may not be immediately obvious. How could you lose money if your server goes down? And what s the likelihood of a security incident occurring? True, a server crash probably won t result in a debit on the company financial reports, and the likelihood of a breach when systems are down is probably low. But the real question is what if? It s your job to protect against a what-if scenario. And that s impossible if your server is down. The fact is, your security systems are fulfilling an important need. If there is a security incident and your server is down, you re not going to be able to respond in the way you must. The risks involved are probably much greater than you realize: 1. If there is an incident, you can t immediately react. Many building security solutions have distributed systems. Information collected at local devices, such as card readers or access control units, is stored locally and sent to the server at specific intervals. A server outage doesn t affect the data collected. What a server outage does affect is your ability to redirect the resources of the distributed system. For example, a manager may need to change security access, reposition cameras, or adjust fire control when an emergency situation arises. If the servers are down, the manager is unable to make these changes at the moment he needs to. If there is a fire and he needs to override the access control, he can t do it. The disaster scenarios are, unfortunately, endless. 2. If systems go down, your liability goes up. If you don t have control over all access points in your building, what could happen? If you are an airport, unauthorized individuals may gain access to restricted areas, putting travelers and airport staff at risk. If you are a concert venue, fans may be able to access restricted areas, compromising the safety of the performers. Whatever type of organization you are, having a nonfunctional security system is a major and potentially life-threatening liability. 3. There could be real financial costs. In many cases, security systems are in place not only to keep people safe, but also to comply with government regulations. Utility companies have to meet demanding requirements for safety and security. Airports need to meet transportation regulations for security. Healthcare and government facilities have strict regulations, too. For these and other organizations, downtime can mean high penalties or even lost licenses. Also, consider that if you re protecting research facilities, they need to be guaranteed highly stable environments. Even the slightest variability in conditions such as temperature, humidity, air flow, and air quality can skew scientific findings and render ongoing research work useless. No scientist wants years worth of work and grant dollars to be lost when an environmentalmonitoring system goes offline. 4. Disasters happen, and you have to be ready. Whether it is a natural disaster or a man-made emergency, we ve all seen the news headlines about catastrophes that claim lives and damage or destroy buildings. The possibility of these events means that disaster recovery is a crucial element of building security. Your security systems should have backup solutions in place in geographically-separated sites so that if a catastrophic event occurs, your assets are protected. Think of the prevention of downtime as one element of a comprehensive disaster recovery plan. In times where you can t prevent a catastrophe from taking out your building (and, therefore, your servers), you can mitigate its impact on your IT systems with off-site backup in place. Whatever type of organization you are, having a nonfunctional security system is a major and potentially life-threatening liability.

White Paper 4 How Typical Building Security Availability Options Fall Short Some companies decide to go with a typical high-availability solution based on their desired availability, IT resources, and/ or server preferences. There are two types of these solutions: clusters and software. Let s get into how these solutions work, and why they aren t ideal for building security systems. High-Availability Clusters This is a solution that aims to recover from downtime as quickly as possible, as opposed to preventing it from occurring. HA clusters are a custom-built system composed of two or more servers that are running with the same configuration. They are connected with cluster software to keep the application data updated on both/all servers. Servers in a high-availability cluster communicate with each other by continually checking for a heartbeat that confirms other servers in the cluster are up and running. If a server fails, another server in the cluster (designated as the failover server) will automatically take over, ideally with minimal disruption to users. The main issue with HA clusters is that downtime is not eliminated. In the event of a server failure, all users who are currently connected to that server lose their connections, and in-flight data is lost. For an organization such as a nuclear power plant, this scenario is likely not tolerable. For example, even during a brief outage, control, security, and other systems would be lost, and the safety of the plant would be compromised. High-Availability Software This type of software is designed to prevent downtime, data loss, and business interruption from occurring, as opposed to recovering as quickly as possible when it does occur. HA software is equipped with predictive features that identify, report, and handle faults before they become problems and cause downtime. High-availability software works with standard x86 servers and doesn t require the skills of highly advanced IT staff to install or maintain it. It is designed to configure and manage its own operation, making the setup of application environments easier and more economical than clusters. While HA software continuously monitors for issues to prevent downtime from occurring, and can provide 99.99% availability, it still results in an average of one hour of unscheduled downtime per year. For many companies, this just won t work. Even a yearly hour of downtime may not, for example, keep a nuclear power plant or an airport within regulation standards. It s also important to note that HA cluster effectiveness is highly dependent on the skills of specialized IT personnel. Clusters can be complex and time-consuming to deploy, and they require programming, testing, and continuous administrative oversight. And because there are two or more servers, you need to license software on each of them. As a result, the total cost of ownership (TCO) is often high. The main issue with HA clusters is that downtime is not eliminated.

White Paper 5 What s Required for an Always-On Security and Automation System For all the reasons we ve delved into, an always-on system is ideal for building security. That means you need a continuousavailability solution, which can be realized in either software or a server system. Continuous-Availability Software This type of solution not only prevents downtime from occurring, but also provides the cost-saving benefits of an always-on solution based on standard x86 servers. Each application lives on two virtual machines. If one machine fails, the applications continue to run on the other machine with no interruptions or data loss. If a component fails, it s replaced by the healthy component from the second system. CA software can also offer disaster recovery and split-site capabilities. It prevents data loss, is simple to configure and manage, requires no special IT skills, and delivers upwards of 99.999 percent availability all on standard servers. Continuous-Availability Server Systems A continuous-availability server system is truly turnkey in that its hardware, software, and services are all integrated for easy management. This type of solution relies on specialized servers that are purposely built to prevent failures from ever occurring. These servers are managed just like standard servers, so they don t require specialized IT personnel to manage them. The sophisticated technology simply runs in the background and isn t apparent to system administrators. CA server systems include redundancy of components and error-detection software. Automatic fault detection and correction is engineered into the design so that most errors are resolved without you even knowing they existed. Plus, continuous-availability servers can run in a virtualized environment. You can expect greater than 99.999 percent availability if you choose this option. CA software and CA server systems both offer the protection a building security system needs. For example, let s go back to the case of a nuclear power plant. With no interruptions and no data loss, security personnel are able to monitor the facility at all times, helping ensure safety and compliance. An organization that can tolerate hours of downtime can take its chances with highavailability solutions. But building security and automation systems simply can t take that risk. In the End, Server Failure Is Not an Option An organization that can tolerate hours of downtime can take its chances with high-availability solutions. But building security and automation systems simply can t take that risk. When people s safety, proprietary technology, or entire businesses are at stake, reliable availability with almost no downtime is truly needed. A system that prevents downtime from happening in the first place is the ideal solution, and with the range of options available today, should be a natural choice for those who manage building security systems.

White Paper 6 About Stratus Stratus Technologies is the leading provider of infrastructure-based solutions that keep your applications running continuously in today s always-on world. Stratus always-on solutions can be rapidly deployed without changes to your applications. Our platform solutions provide end-to-end operational support with integrated hardware, software, and services. Our software solutions are designed to provide always-on capabilities to applications running in your chosen environment physical, virtualized, or cloud. Our approach and our people enable us to identify problems that others miss and prevent application downtime before it occurs. Multiple layers of proactive diagnostic, monitoring, and selfcorrecting services are backed by a global team of engineers who provide immediate support no matter where in the world your system is located. If always on is an application requirement, Stratus Technologies has a solution that fits. When people s safety, proprietary technology, or entire businesses are at stake, reliable availability with almost no downtime is truly needed. Specifications and descriptions are summary in nature and subject to change without notice. Stratus and the Stratus Technologies logo are trademarks or registered trademarks of Stratus Technologies Bermuda Ltd. All other marks are the property of their respective owners. 2015 Stratus Technologies Bermuda Ltd. All rights reserved. 150512