Disaster Recovery and Business Continuity Considerations

Size: px
Start display at page:

Download "Disaster Recovery and Business Continuity Considerations"

Transcription

1 2012 Disaster Recovery and Business Continuity Considerations ANDY BRETT, CHANNEL 3 CONSULTING CTO CHANNEL 3 CONSULTING Manor House, 1 The Crescent, Leatherhead Surrey, KT22 8DH

2 Introduction When it comes to provision of business systems and the supporting IT, much is said about disaster recovery (DR) but actually achieving it can be more elusive than initially anticipated. And that assumes a comprehensive understanding from the outset, both in terms of what is actually meant by a 'disaster' and how 'recovery' might be achieved. The starting point should actually be a view on Business Continuity (BC). Any business would prefer to have no system failure or downtime at all, but this of course comes at a cost. Taking an informed view of business need and properly understanding the potential impact of such failures will enable a pragmatic, cost effective and maintainable approach to business continuity and disaster recovery. Business Continuity is essentially about ensuring that the business processes can continue to operate, and staff can continue to work, in the event that one or more of the technology components relied upon to follow those processes becomes unavailable for any reason. In such circumstances this will require staff to revert to use of alternate systems or applications where available, or in extreme cases, manual and/or paper-based processes. In either case consideration must be given to the 'recovery' aspects of entering data captured during any outage back into the primary system once it again becomes available. All areas of the business should have comprehensive Business Continuity plans in place, which prescribe processes to be followed in the event that normal operation is interrupted for any reason - and this will include technical as well as non-technical reasons. This can be quite a significant piece of work, especially for larger organisations, so should be planned and executed properly, with all business and technical stakeholders involved throughout the process. The definition of a Disaster in technology terms can also be discussed at length, but is typically considered, from a business perspective, to be the inability to access 'critical' business systems for a period of time, primarily due to failure of one or more technology components. The process by which recovery from that 'Disaster' scenario is achieved technically will depend upon a number of factors, primarily driven by the way in which the technical solution has been architected, designed, implemented and maintained. Achieving Technical Continuity The ultimate objective is to achieve technical continuity such that failure of one or more components of the overall technical solution has minimal impact on the business - in fact does not 'adversely impact' the business would be a better term, and is subject to agreement with the business. The level of continuity that can be achieved by the technology will depend upon the level of 'resilience' of the solution as a whole. Most solutions are comprised of a number of technical components. If not properly architected, designed and implemented, any one of those solution components could be a single point of failure (spof) - a single network cable running between two pieces of equipment being a simple example. Properly designed solutions will therefore typically avoid any single points of failure, although there is a corresponding increase in cost to achieve such an objective. In the end it comes September 2012 Page 1 of 8

3 down to an assessment of cost versus risk, which should be assessed from the business level downwards. To a certain extent, a prudent level of technical resilience will be built into any solution, irrespective of business need, if only because this has a positive impact on the cost of maintaining and supporting that solution - i.e. it is simply more cost effective to operate and manage a solution that does not keep failing. It is worth noting at this point that from the users' perspective the perception will be at the level of 'service' or 'application' resilience, not technical resilience. However, for the purposes of this discussion we will focus on technical resilience, the options for which can then be assessed separately in determining an appropriate level of service/application resilience. Technology 'Layers' In order to discuss the methods by which Business and Technical Continuity can be achieved, and ultimately provide support for Disaster Recovery, it is probably easiest to consider a generic technical environment described in 'layers' as a starting point (whilst recognising that there are a number of more advanced technical solutions that collapse or combine layers into a single service provision more of which later). The diagram below provides a simplified representation of such layers. The network layer is the first (lowest) layer in the diagram and provides connectivity and communication between all components, systems, locations and users (essentially providing connectivity between layers). Other layers are 'built on' this lower layer and include disc storage, computer servers, applications, end user devices, etc. The user experiences the technical environment from the 'top down' - i.e. from the presentation layer - and is often unaware of the type and composition of layers of technology that underpin delivery of the service they are using, which is the way it should be. Services can be thought of as overlaying vertically up and down the layers, utilising various components within each of the layers. When represented in this manner it can be seen that a failure in any one layer has the potential to directly impact the user experience if that layer is a key component of the service being used (clearly not all components in all layers necessarily contribute to all services accessed by end users). For example, failure of a component at the storage layer could mean that an application layer component cannot access data and freezes (stops working), which in turn means that the user experiences loss of the application service at the presentation layer. It should therefore be clear that technical resilience needs to be built into each layer, as well as between layers. Introducing resilience at one layer may improve the level of availability of components within September 2012 Page 2 of 8

4 that layer, but ultimately does little to ensure continuity of the service being used by the end user community and only partially enables disaster recovery. For a truly resilient technology environment, and therefore business service, consideration must be given to all components in all layers that contribute to or support those services. These measures will minimise the likelihood of a disaster occurring and should facilitate improved speed of recovery should a disaster occur. Key Concepts In defining the type of technical solution to be implement in support of disaster recovery and business continuity there are two primary concepts to be considered from a business service perspective: 1. The first is the point in time to which the system/service should be recoverable as a minimum. For example, if you take a copy (a backup) of the system data and its state every evening at 6pm, then in the event of a failure and loss of data that system can only be recovered to the last time a copy (backup) was taken i.e. 6pm on the previous day. Any data entered after this time up until the next time a copy is taken will have been lost and must be re-entered manually. This is known as the Recovery Point Objective (RPO) and can vary from days to minutes generally the more recent the RPO, the greater the cost. 2. The second is how long it should take to recover a system/service back to full operational state from the point at which it is recognised to have failed. This will largely depend upon how long the business is able to cope without the system/service (criticality) and how long it actually takes to restore that system/service (e.g. the time it takes to enter any data captured manually during the system/service outage as part of the business continuity process that is created after the RPO). This is known as the Recovery Time Objective (RTO). Typically the more critical the system/service is to the business, the shorter the desired RTO. Once again the shorter the RTO the greater the cost, generally speaking. Each system/service used by the business will usually have an RTO and RPO defined and agreed with the business as part of the overall Service Level Agreement (SLA) for that system/service. These RPO and RTO figures are then used to determine the most appropriate level of technical resilience and capability for each of the above technology layers often needing to consider these aspects across as well as within layers. The following sections outline considerations when implementing each of the above layers in order to achieve the defined RPO and RTO criteria for each service. Network As mentioned earlier, the network underpins all layers. Without connectivity it does not matter whether all components within all the other layers are operational or not. No network connection means that the user will be unable to logon to their PC and access the required application(s) across the network. (There may be levels of contingency that allow the user to log on to their PC locally and use installed September 2012 Page 3 of 8

5 applications such as Microsoft Word and Excel, or a cut down version of a business application, but most business services rely on applications and data hosted centrally within the data centre.) Resilience at the network layer is achieved through diverse routing of primary, secondary and even tertiary links, alternate routes between locations, multiple instances of network switches and other equipment. Modern network technologies use a combination of physical hardware and complex software appliances to improve network resilience, capacity and throughput, combined with increased levels of monitoring to ensure optimal service is available all the time. Investment in a robust and secure network infrastructure is a fundamental element of any technical continuity strategy. Data Centre The data centre is another key component in ensuring resilience and security of service provision. A properly constructed data centre not only provides physical security for expensive equipment and confidential data, it also provides an optimal environment within which to host and run the core technology components comprising the other layers (primarily network, storage and servers). Air conditioning within the data centre environment will ensure that the correct temperature and humidity levels are maintained at all times which prevent equipment overheating and failing. Appropriate levels of clean power feed ensure that systems are always on and not subjected to spikes in power levels. No power means no systems/service. Power provision will include an Uninterruptable Power Supply (UPS essentially a collection of batteries) which can power the systems for a short period of time (usually minutes) in the event of a failure of the main power supply. This short period of time is sufficient for locally sited generators (where installed) to start up and take over the power provision for several days until the main power supply is restored. If no generators are installed, the short period of time allows systems to be shutdown in a controlled manner, thus ensuring data is not corrupted or lost. Other features of the data centre include its location (away from hazards and risks), environmental monitoring and alerting, additional capacity for growth, etc. There are recognised standards ( tiers ) of data centre construction and provision that provide increasing levels of security and resilience Tier 1 through to Tier 4. Of course a single data centre itself can be viewed as a single point of failure, which is why most high availability services are implemented across two, and sometimes more, data centres. This enables further operation of systems across multiple data centres in a coordinated manner, thus improving resilience and ease of recovery in the event of a disaster. However, there is still much work to do within the other layers to realise coherent operation across dual data centres. All of the above features are critical to ensuring continuity of technical and therefore business services. Investing significant amounts of time and money in technology for the other layers without investing in data centre provision is a false economy, and whilst many organisations recognise this and make the investment they do not always realise the full benefits. September 2012 Page 4 of 8

6 Storage The storage layer is probably one of the most commonly mentioned components when it comes to discussions about business continuity, disaster recovery and resilience. There is often the misconception that ensuring a secure and resilient storage layer will resolve the majority of concerns about disaster recovery. Whilst the storage layer is most certainly a key component of service resilience and DR, it cannot achieve the required levels of continuity alone. The most common technology used within this layer is the Storage Area Network (SAN). A SAN is essentially a large number of traditional computer discs all connected together and held centrally, usually within a purpose built data centre. Access to the collection of discs is provided via specialist high speed connections. An individual SAN is then able to provide a good level of resilience by applying various approaches to storing the business data on the collection of discs (e.g. writing two copies of the data onto two separate discs at the same time known as mirroring). However, whilst a single SAN provides a level of resilience it does not prevent outages occurring as a result of loss of that SAN for any reason (e.g. failure of the mechanism that coordinates the writing of the data to the discs, multiple disc failures, etc.). To increase the level of resilience at the storage layer further technology components and processes are required. One method is to add a second SAN and make a copy of all of the data from the first SAN onto the second again this is referred to as mirroring and can take several forms. This second SAN would ideally be hosted at a different, geographically remote, location from the first SAN to prevent both SANs being lost in the event of a disaster at one location (e.g. fire, flood, failure of the air conditioning within the data centre causing equipment to overheat, etc.). Copying all data to the second SAN usually requires both SANs to be of the same specification and capacity (although there are technologies that allow heterogeneous storage arrays to be interconnected). It also requires high specification connectivity between the SAN locations to ensure the volume of data can be managed consistently and in a sufficiently timely manner. Copying of data to the second SAN in real time for example places a limit on the physical distance between two SANs, although recent technical solutions at the network layer are now offering alternative approaches to mirroring of data. How soon the data is mirrored across to a second SAN is a key factor in enabling the RPO, but comes at a price. Features within the SAN equipment itself enable mirroring or snapping of images of data and systems from one SAN to the other, but the frequency with which this can be achieved will depend upon a number of factors including the number of systems, the amount of data involved, the capacity of the connection between the SANs, the capacity of the SAN equipment itself to actually read and write the data being copied, etc. Whilst mirroring of data ensures copies of that data are more likely to be available in the event that one source fails, it does not protect the data from corruption. Incorrect modification or deletion of data in one location will be mirrored to the copy instantly if real time mirroring is enabled. And that corruption may not be detected for some time. September 2012 Page 5 of 8

7 The risk of loss or corruption of data is mitigated using a backup procedure, which takes a copy of the data at specific points in time e.g. daily, every 12 hours, etc. In the instance of corruption, the hope is that any issue is detected before the next backup is taken, at which point a known good copy of the data can be restored from the last backup. If a backup has already been taken which includes the corruption it may be necessary to go back to previous backups to obtain a known good copy of the data. This of course means that any other updates since the backup was taken will have been lost and data may need to be re-entered manually following restoration of that data. There are a number of mechanisms and approaches to enabling data backup, which are too detailed for this paper, but needless to say a sufficiently robust backup regime is key to continuity and disaster recovery. The frequency with which backups are conducted will also be a factor in determining an appropriate level of RPO. And don t forget data restoration. It is no good backing up data if it cannot be read back from the backup medium, which is why a good backup strategy and plan will conduct validation and test restoration processes on backed up data on a regular basis. One point on storage which may seem obvious but is worth stating: applications must be configured to store their data at the storage layer in order to benefit from the increased levels of resilience and security. Holding data on the local disc drives of desktop machines or servers sitting under a desk may be a cheap solution, but does not provide the levels of resilience or security typically required by the business. Once again, having a resilient and highly available storage layer is a key component of continuity and disaster recovery, but does not achieve a fully resilient service alone. It requires coordinated implementation of technologies and configuration across all the layers. Computer Servers This layer includes the main computer systems that host the business applications and tools. These applications will include more generic systems such as database servers (Microsoft SQLServer, Oracle, etc.), communication and collaboration tools ( servers, document management systems, etc.) and business applications (patient administration systems, departmental systems, etc.). In order to ensure that these applications and tools are available to the business as and when required (usually within defined and agreed Service Level Agreement (SLA) thresholds) the computer server layer, often referred to as the compute layer, needs to have a level of resilience designed and built into it as well. Improved levels of resilience can be achieved by using more than one physical computer server to support a single application. In this way failure of a server or a component within a server does not prevent the hosted application from running. This is typically known as clustering where two or more physical servers are connected together to run the application processes required. Failure of one component of the cluster results in the workload for that component being distributed across the remaining physical computers. September 2012 Page 6 of 8

8 However the latest trend is to move to a virtual server environment often referred to as virtual machines or VMs. This model is similar to clustering in that multiple physical servers are used to host a single, or indeed multiple, applications with failure of any one component not preventing failure of the applications. With VMs the physical servers are reduced to small form factor devices (printed circuit boards referred to as blades ) which plug into a shelf in a rack. Each device is a powerful computer with its own CPU and memory, and multiple blades can be plugged into a single shelf on a rack. Virtual server software then runs across all the blades and can selectively allocate resources (CPU, memory, etc.) to applications dynamically based on various rules and software configuration. Further devices can be added as required and will simply be included in the pool of resources managed by the virtual server software. Examples of such software are VMWare s vsphere and Microsoft s Hyper-V. Applications running within VM environments are typically not aware that the computer server on which they are running is actually software. However, application vendors do need to test and warranty their applications to run within a VM environment in order for them to commit to provide maintenance and support, and this should be verified with the vendor before moving applications to a VM environment. There are instances where vendors will not support, or do not recommend, use of VMs for hosting of their applications. One example is the Microsoft SQLServer database, which tends to split opinion of whether it should be hosted within a VM environment or not, depending upon the level of processing it must carry out. Whilst many organisations are moving towards use of VMs, it is not unusual for a number of applications to still be running on non-vm (physical server) environments for various reasons. However it is probably true to say that within the health community current VM deployments operate wholly within a single data centre, and whilst the level of resilience within that environment is good, no crossdata-centre failover capability tends to be enabled. Failure of the VM compute environment in one data centre will require a level of manual effort to restore systems and services at the other data centre. The time it takes to achieve this restoration will directly impact upon the Recovery Time Object (RTO) for any applications hosted in that environment. There are tools available that can reduce this time, but without them it can take hours or even days to restore from a complete failure in one data centre. As with the storage layer, having a resilient and highly available compute layer is a key component of continuity and disaster recovery, but does not achieve a fully resilient service alone. It requires coordinated implementation of technologies and configuration across all the layers. Applications As alluded to in the preceding sections, implementation of a highly resilient, highly available compute and storage layer does not necessarily mean that the applications and business services are themselves resilient or highly available. September 2012 Page 7 of 8

9 Whilst simple applications can comprise a single executable file which runs on one server and accesses data from a single location/database, more complex applications are comprised of a number of components, each of which may require its own dedicated server with communications between those components. Hosting applications within a VM environment and storing data on a SAN will improve the availability of that application, but unless the application is architected and design to be resilient to a failure of any one component (e.g. due to a software bug, excess load, performance degradation, etc.) can cause the whole application to fail even though the underlying servers and storage continue to run normally. This is exactly the same single point of failure concept as described in the network layer above. Applications can be designed such that there are multiple processes sharing a common workload, which can be distributed across a number of (virtual) servers, which in turn could be located across multiple data centres. Failure of any one component does not affect the overall operation of the application and therefore service. Add in a resilient storage layer which replicates data to an alternative location, combined with intelligence in the compute and/or application layer which knows which is the primary source of data and switches to use it automatically and there is a significantly increased level of resilience and availability of the service. In reality most applications are not architected and designed to operate in this fashion and primarily rely on the underlying server and storage infrastructure to ensure that they are able to continue running. In the event of a failure/disaster manual intervention is required to achieve recovery, and typically involves bringing up another instance of the application at an alternate location, ensuring the data is up to date and then making the application available to end users. There are a number of tools available to assist in this recovery process, but they mostly require levels of capability to have been implemented at the storage and compute layers in order for them to operate successfully. An example of one such tool from the VM suite is Site Recovery Manager (SRM). Whilst a number of these aspects will be addressed as part of a strategic IT roadmap, much of the responsibility in this layer lies with the business applications themselves. No amount of technical resilience can mitigate a poorly architected and designed application, which is why preference should always be given to deploying enterprise level applications where high availability and continuity of service is a critical business requirement. Integration This is the glue that enables the flow of information between application layer components, which in turn enables business process. Failure of the integration layer or a component therein can have serious consequences for the business. Within a healthcare environment for example, failure of the integration interface between two critical business systems can mean that the whole business must revert to paperbased processes. No small undertaking for a large healthcare organisation. Mitigating the risk of failure at this layer is similar in approach to that for the application layer. Whilst a level of resilience can be achieved through the underlying host infrastructure, the integration solution itself must be architected and designed to withstand failure of any one component. This will be September 2012 Page 8 of 8

10 especially important for an environment that has a large number of interfaces, all of which are dependent upon other systems for information flow. Implementation of the integration layer is typically performed using an off-the-shelf integration product such as Intersystems Ensemble or Microsoft s BizTalk. These products are usually referred to as an Integration Engine and enable the interoperability between business systems. Although largely invisible to the business (unless there is a failure) the integration engine is increasingly becoming one of the critical systems upon which business process flow, and therefore continuity, is dependent. Presentation and Access Devices There is a limited amount that can be done at this level. The presentation layer (the application screens that the user accesses) will mostly be driven by the application layer, so resilience at this level will be wholly dependent upon lower layers of the environment as discussed above. The access devices themselves are susceptible to wear and tear especially when considering portable devices such as laptops, tablets or smartphones. The most cost effective mitigation for failure at this layer is a comprehensive Service Desk function offering a well-managed end user device estate that includes maintenance, support, repair and replacement on a timely basis (again within SLAs agreed with the business for each service). In Conclusion There are a wide variety of existing and new technologies that enable and inform business and technical continuity capability for an organisation. Technological innovations in the area of network, storage and compute such as Cisco s Unified Computing System (UCS) which tightly integrates all three layers into a homogenous service makes it easier to procure and deploy high levels of infrastructure resilience and availability. Discussions with technology partners will help inform decisions in this area, ensuring that an increased reliance on IT systems for the efficient and cost effective delivery of healthcare services are supported through improved levels of resilience and available of those systems and services. Partnering for improved delivery and management of those services also offers opportunities for increased availability and resilience, as well as reducing total cost of ownership, in both on premise and off premise models. Within the current economic climate investment in technology plays a critical part in ensuring cost effective continuity of services across all areas and geographies of the business, ultimately reducing operational costs and overall cost of ownership, whilst increasing performance, resilience, scalability and availability. September 2012 Page 9 of 8

Veritas Storage Foundation High Availability for Windows by Symantec

Veritas Storage Foundation High Availability for Windows by Symantec Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability

More information

Symantec Cluster Server powered by Veritas

Symantec Cluster Server powered by Veritas Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

MAKING YOUR VIRTUAL INFRASTUCTURE NON-STOP Making availability efficient with Veritas products

MAKING YOUR VIRTUAL INFRASTUCTURE NON-STOP Making availability efficient with Veritas products TECHNOLOGY REVIEW MAKING YOUR VIRTUAL INFRASTUCTURE NON-STOP Making availability efficient with Veritas products AUGUST 2015 All businesses have a core set of applications and services that are critical

More information

IBM Global Technology Services March 2008. Virtualization for disaster recovery: areas of focus and consideration.

IBM Global Technology Services March 2008. Virtualization for disaster recovery: areas of focus and consideration. IBM Global Technology Services March 2008 Virtualization for disaster recovery: Page 2 Contents 2 Introduction 3 Understanding the virtualization approach 4 A properly constructed virtualization strategy

More information

Veritas InfoScale Availability

Veritas InfoScale Availability Veritas InfoScale Availability Delivers high availability and disaster recovery for your critical applications Overview protects your most important applications from planned and unplanned downtime. InfoScale

More information

EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers

EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers EMC VPLEX FAMILY Continuous Availability and data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is

More information

Service Description for Hosted Server

Service Description for Hosted Server Service Overview tolomy has created its Hosted Server environment using VMware ESXi which provides the foundation for building and managing a virtualised IT infrastructure. These market leading, production-proven

More information

Symantec Storage Foundation High Availability for Windows

Symantec Storage Foundation High Availability for Windows Symantec Storage Foundation High Availability for Windows Storage management, high availability and disaster recovery for physical and virtual Windows applications Data Sheet: High Availability Overview

More information

Veritas Cluster Server from Symantec

Veritas Cluster Server from Symantec Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

GSN Cloud Contact Centre Availability & DR Datasheet

GSN Cloud Contact Centre Availability & DR Datasheet GSN Cloud Contact Centre Availability & DR Datasheet Commercial in Confidence Reference: GSN CCC - Availability Version: 1.1 Global Speech Networks Pty Ltd Level 8, 636 St Kilda Road Melbourne, Victoria

More information

Building the Virtual Information Infrastructure

Building the Virtual Information Infrastructure Technology Concepts and Business Considerations Abstract A virtual information infrastructure allows organizations to make the most of their data center environment by sharing computing, network, and storage

More information

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery

More information

5 Essential Benefits of Hybrid Cloud Backup

5 Essential Benefits of Hybrid Cloud Backup 5 Essential Benefits of Hybrid Cloud Backup QBR is a backup, disaster recovery (BDR), and business continuity solution targeted to the small to medium business (SMB) market. QBR solutions are designed

More information

Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options

Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

VDI can reduce costs, simplify systems and provide a less frustrating experience for users.

VDI can reduce costs, simplify systems and provide a less frustrating experience for users. 1 INFORMATION TECHNOLOGY GROUP VDI can reduce costs, simplify systems and provide a less frustrating experience for users. infor ation technology group 2 INFORMATION TECHNOLOGY GROUP CONTENTS Introduction...3

More information

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper Copyright 2011-2012 Dbvisit Software Limited. All Rights Reserved v2, Mar 2012 Contents Executive Summary... 1

More information

ABOUT NODE4. node4.co.uk

ABOUT NODE4. node4.co.uk N4CLOUD ABOUT NODE4 At Node4 we provide you with our top class infrastructure of Data Centres with a national core MPLS network so you can take advantage of the benefits that technology brings. We have

More information

How to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems

How to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems W H I T E P A P E R How to Manage Critical Data Stored in Microsoft Exchange Server 2010 By Hitachi Data Systems April 2012 2 Table of Contents Executive Summary and Introduction 3 Mission-critical Microsoft

More information

Neverfail Solutions for VMware: Continuous Availability for Mission-Critical Applications throughout the Virtual Lifecycle

Neverfail Solutions for VMware: Continuous Availability for Mission-Critical Applications throughout the Virtual Lifecycle Neverfail Solutions for VMware: Continuous Availability for Mission-Critical Applications throughout the Virtual Lifecycle Table of Contents Virtualization 3 Benefits of Virtualization 3 Continuous Availability

More information

Managed Security Services SLA Document. Response and Resolution Times

Managed Security Services SLA Document. Response and Resolution Times Managed Security Services SLA Document Appendix A Response and Resolution Times The following table shows the targets of response and resolution times for each priority level: Trouble Priority Response

More information

Implementing Disaster Recovery? At What Cost?

Implementing Disaster Recovery? At What Cost? Implementing Disaster Recovery? At What Cost? Whitepaper Viktor Babkov Technical Director Business Continuity Copyright Business Continuity May 2010 In today s environment, minimizing IT downtime has become

More information

Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs

Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs EMC RECOVERPOINT FAMILY Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs ESSENTIALS EMC RecoverPoint Family Optimizes RPO

More information

EMC VPLEX FAMILY. Continuous Availability and Data Mobility Within and Across Data Centers

EMC VPLEX FAMILY. Continuous Availability and Data Mobility Within and Across Data Centers EMC VPLEX FAMILY Continuous Availability and Data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is

More information

Cisco Nexus 1000V and Cisco Nexus 1110 Virtual Services Appliance (VSA) across data centers

Cisco Nexus 1000V and Cisco Nexus 1110 Virtual Services Appliance (VSA) across data centers Cisco Nexus 1000V and Cisco Nexus 1110 Virtual Services Appliance (VSA) across data centers With the improvement in storage, virtualization and L2 extension technologies, customers can now choose to have

More information

Leveraging Virtualization for Disaster Recovery in Your Growing Business

Leveraging Virtualization for Disaster Recovery in Your Growing Business Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster

More information

Federated Application Centric Infrastructure (ACI) Fabrics for Dual Data Center Deployments

Federated Application Centric Infrastructure (ACI) Fabrics for Dual Data Center Deployments Federated Application Centric Infrastructure (ACI) Fabrics for Dual Data Center Deployments March 13, 2015 Abstract To provide redundancy and disaster recovery, most organizations deploy multiple data

More information

Database Resilience at ISPs. High-Availability. White Paper

Database Resilience at ISPs. High-Availability. White Paper Database Resilience at ISPs High-Availability White Paper Internet Service Providers (ISPs) generally do their job very well. The commercial hosting market is segmented in a number of different ways but

More information

Solution Overview. Business Continuity with ReadyNAS

Solution Overview. Business Continuity with ReadyNAS Business Continuity with ReadyNAS What is ReadyNAS? ReadyNAS is a family of network storage solutions for small and medium businesses, workgroups, and remote/home offices. ReadyNAS delivers unified storage

More information

Backup and Redundancy

Backup and Redundancy Backup and Redundancy White Paper NEC s UC for Business Backup and Redundancy allow businesses to operate with confidence, providing security for themselves and their customers. When a server goes down

More information

Building Reliable, Scalable AR System Solutions. High-Availability. White Paper

Building Reliable, Scalable AR System Solutions. High-Availability. White Paper Building Reliable, Scalable Solutions High-Availability White Paper Introduction This paper will discuss the products, tools and strategies available for building reliable and scalable Action Request System

More information

EMC SOLUTIONS TO OPTIMIZE EMR INFRASTRUCTURE FOR CERNER

EMC SOLUTIONS TO OPTIMIZE EMR INFRASTRUCTURE FOR CERNER EMC SOLUTIONS TO OPTIMIZE EMR INFRASTRUCTURE FOR CERNER ESSENTIALS Mitigate project risk with the proven leader, many of largest EHR sites run on EMC storage Reduce overall storage costs with automated

More information

Deployment Options for Microsoft Hyper-V Server

Deployment Options for Microsoft Hyper-V Server CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES

More information

TalentLink Disaster Recovery & Service Continuity

TalentLink Disaster Recovery & Service Continuity Technical Services Briefing Document TalentLink Disaster Recovery & Service Continuity Version 1.2 (January 2012) Contents Overview Planning for Service Continuity Disaster Recovery Process Business Continuity

More information

Server and Storage Virtualization: A Complete Solution A SANRAD White Paper

Server and Storage Virtualization: A Complete Solution A SANRAD White Paper Server and Storage Virtualization: A Complete Solution A SANRAD White Paper copyright SANRAD 2008 SANRAD Inc. www.sanrad.com Server and Storage Virtualization: A Complete Solution A SANRAD Whitepaper Server

More information

Client Study Portfolio

Client Study Portfolio Client Study Portfolio Client Study 1: UK District Council A re-architecture of the client s RAC Environment and full 24/7 support of the client s database systems thereafter has eliminated the risk of

More information

Sagari Ltd. Service Catalogue and Service Level Agreement For Outsource IT Services

Sagari Ltd. Service Catalogue and Service Level Agreement For Outsource IT Services Sagari Ltd Service Catalogue and Service Level Agreement For Outsource IT Services Managed Services Service Level Agreement 1 Introduction This Service Catalogue and Service Level Agreement (SLA) constitutes

More information

flexible Enterprise Virtual Data Centre Extreme availability, flexible cost models and highly scalable infrastructure Delivering more performance

flexible Enterprise Virtual Data Centre Extreme availability, flexible cost models and highly scalable infrastructure Delivering more performance Do More evdc Extreme availability, flexible cost models and highly scalable infrastructure Delivering more performance flexible Adapt s enterprise virtual data centre (evdc) is an award-winning virtual

More information

BACKUP IS DEAD: Introducing the Data Protection Lifecycle, a new paradigm for data protection and recovery WHITE PAPER

BACKUP IS DEAD: Introducing the Data Protection Lifecycle, a new paradigm for data protection and recovery WHITE PAPER BACKUP IS DEAD: Introducing the Data Protection Lifecycle, a new paradigm for data protection and recovery Despite decades of research and development into backup and data protection, enterprise customers

More information

xxx Managed Services ans.co.uk

xxx Managed Services ans.co.uk xxx Managed Services ans.co.uk 2 ANS Managed Services ANS Managed Services Our Managed Service capabilities are the lifeblood of our business and stand us apart from our competition. We have over 300 customers

More information

24/7 Monitoring Pro-Active Support High Availability Hardware & Software Helpdesk. itg CloudBase

24/7 Monitoring Pro-Active Support High Availability Hardware & Software Helpdesk. itg CloudBase 24/7 Monitoring Pro-Active Support High Availability Hardware & Software Helpdesk Onsite Support itg CloudBase Pro-Active managed it support services for one single cost per month covers all aspects of

More information

Eliminating End User and Application Downtime:

Eliminating End User and Application Downtime: Eliminating End User and Application Downtime: Architecting the Right Continuous Availability and Disaster Recovery Environment March 2010 Table of Contents Introduction 3 Where to Start 3 Moving to Continuous

More information

CA ARCserve Family r15

CA ARCserve Family r15 CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales Rami.Nasser@ca.com The ARCserve Family More than Backup The only solution that: Gives customers control over their changing

More information

Perceptive Software Platform Services

Perceptive Software Platform Services Perceptive Software Platform Services CLOUD SOLUTIONS process and content management Perceptive Software Platform Services Perceptive Software process and content management systems have been deployed

More information

Zerto Virtual Manager Administration Guide

Zerto Virtual Manager Administration Guide Zerto Virtual Manager Administration Guide AWS Environment ZVR-ADVA-4.0U2-01-23-07-15 Copyright 2015, Zerto Ltd. All rights reserved. Information in this document is subject to change without notice and

More information

What are the benefits of Cloud Computing for Small Business?

What are the benefits of Cloud Computing for Small Business? Cloud Computing A Small Business Guide. Whilst more and more small businesses are adopting Cloud Computing services, it is fair to say that most small businesses are still unsure of what Cloud Computing

More information

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

CA ARCserve Replication and High Availability Deployment Options for Hyper-V Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization

More information

The Benefits of Virtualizing

The Benefits of Virtualizing T E C H N I C A L B R I E F The Benefits of Virtualizing Aciduisismodo Microsoft SQL Dolore Server Eolore in Dionseq Hitachi Storage Uatummy Environments Odolorem Vel Leveraging Microsoft Hyper-V By Heidi

More information

Quorum DR Report. Top 4 Types of Disasters: 55% Hardware Failure 22% Human Error 18% Software Failure 5% Natural Disasters

Quorum DR Report. Top 4 Types of Disasters: 55% Hardware Failure 22% Human Error 18% Software Failure 5% Natural Disasters SAP High Availability in virtualized environments running on Windows Server 2012 Hyper-V Part 1: Overview Introduction Almost everyone is talking about virtualization and cloud computing these days. This

More information

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication

More information

IMPROVING VMWARE DISASTER RECOVERY WITH EMC RECOVERPOINT Applied Technology

IMPROVING VMWARE DISASTER RECOVERY WITH EMC RECOVERPOINT Applied Technology White Paper IMPROVING VMWARE DISASTER RECOVERY WITH EMC RECOVERPOINT Applied Technology Abstract EMC RecoverPoint provides full support for data replication and disaster recovery for VMware ESX Server

More information

OmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman

OmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman OmniCube SimpliVity OmniCube and Multi Federation ROBO Reference Architecture White Paper Authors: Bob Gropman Date: April 13, 2015 SimpliVity and OmniCube are trademarks of SimpliVity Corporation. All

More information

Using EMC Data Protection Advisor with EMC Data Domain Deduplication Storage Systems

Using EMC Data Protection Advisor with EMC Data Domain Deduplication Storage Systems Using EMC Data Protection Advisor with EMC Data Domain Deduplication Storage Systems Applied Technology Abstract EMC Data Protection Advisor (DPA) provides a comprehensive set of features to analyze data

More information

ABSTRACT. February, 2014 EMC WHITE PAPER

ABSTRACT. February, 2014 EMC WHITE PAPER EMC APPSYNC SOLUTION FOR MANAGING PROTECTION OF MICROSOFT SQL SERVER SLA-DRIVEN, SELF-SERVICE CAPABILITIES FOR MAXIMIZING AND SIMPLIFYING DATA PROTECTION AND RECOVERABILITY ABSTRACT With Microsoft SQL

More information

SUBJECT: REPLACEMENT OF CORPORATE ELECTRONIC DATA STORAGE, BACKUP AND DISASTER RECOVERY SOLUTIONS

SUBJECT: REPLACEMENT OF CORPORATE ELECTRONIC DATA STORAGE, BACKUP AND DISASTER RECOVERY SOLUTIONS REPORT TO CABINET TO BE HELD ON 15 SEPTEMBER 2015 Key Decision No Forward Plan Ref No 23K Corporate Priority The proposals in this report contribute to the delivery of all the Council s priorities Cabinet

More information

Planning for the Worst SAS Grid Manager and Disaster Recovery

Planning for the Worst SAS Grid Manager and Disaster Recovery Paper SAS1897-2015 Planning for the Worst SAS Grid Manager and Disaster Recovery ABSTRACT Glenn Horton and Doug Haigh, SAS Institute Inc. Many companies use geographically dispersed data centers running

More information

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11 Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node

More information

HP StorageWorks Data Protection Strategy brief

HP StorageWorks Data Protection Strategy brief HP StorageWorks Data Protection Strategy brief Your business depends on IT more than ever before. The availability of key application services and information is critical to maintain business processes,

More information

South Colonie Central School District Server Virtualization and Disaster Recovery Plan

South Colonie Central School District Server Virtualization and Disaster Recovery Plan Server Virtualization and Disaster Recovery Plan Prepared by Lucid Solutions Group Table of Contents Executive Summary... 2 Disaster Recovery Overview... 2 Data Corruption, Accidental Deletion and Prevention...

More information

Transforming Control System to a Virtualized Platform, including On Process Migration. Anneke Vemer ExxonMobil

Transforming Control System to a Virtualized Platform, including On Process Migration. Anneke Vemer ExxonMobil Transforming Control System to a Virtualized Platform, including On Process Migration Anneke Vemer ExxonMobil ARC conference, Antwerp, 5-Mar-2013 Cleared ExxonMobil External Technical Publication 2013.1104

More information

Virtualization. Disaster Recovery. A Foundation for Disaster Recovery in the Cloud

Virtualization. Disaster Recovery. A Foundation for Disaster Recovery in the Cloud Technology Paper Disaster Acronym: DR The process, policies, and procedures that enable a business to recover data and systems after a disaster. A Foundation for Disaster in the Cloud Introduction Virtualization

More information

Backup & Disaster Recovery for Business

Backup & Disaster Recovery for Business Your complete guide to Online Backup and Disaster Recovery Backup & Disaster Recovery for Business 1 Doc V1.0 Jan 2014 Table of Contents 3 Hosted Desktop Backup and Disaster Recovery (DR) today 4 Different

More information

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future. Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your

More information

COMPARISON OF VMware VSHPERE HA/FT vs stratus

COMPARISON OF VMware VSHPERE HA/FT vs stratus COMPARISON OF VMware VSHPERE HA/FT vs stratus ftserver SYSTEMS White Paper 2 Ensuring Availability of Virtualized Business-Critical Applications in an Always-On World Introduction Virtualization has become

More information

Cloud Computing, Virtualization & Green IT

Cloud Computing, Virtualization & Green IT Cloud Computing, Virtualization & Green IT Cloud computing can change how IT supports business Consider the following: As much as 85% of computing capacity sits idle in distributed computing environments.

More information

Our Cloud Offers You a Brighter Future

Our Cloud Offers You a Brighter Future Our Cloud Offers You a Brighter Future Qube Global Software Cloud Services are used by many diverse organisations including financial institutions, international service providers, property companies,

More information

Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011

Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Executive Summary Large enterprise Hyper-V deployments with a large number

More information

Disaster Recovery 101. Sudarshan Ranganath & Matthew Phillips Ellucian

Disaster Recovery 101. Sudarshan Ranganath & Matthew Phillips Ellucian Disaster Recovery 101 Sudarshan Ranganath & Matthew Phillips Ellucian SESSION OBJECTIVES Business continuity is critical to every institution and its IT organization. How do you set up your ERP and other

More information

0.00 2000 2001 2002 2003 2004 2005 Year

0.00 2000 2001 2002 2003 2004 2005 Year 1 Background 1.1 Healthcare organisations are increasingly generating and thus storing information in electronic format. This is an eclectic mix of Email, Microsoft Office Documents, Images as well as

More information

The rise of the hybrid network model

The rise of the hybrid network model The rise of the hybrid network model Hybrid networks offer the promise of greater flexibility and capacity, improved application performance and cheaper price points than traditional Wide Area Networks

More information

Redefining Microsoft SQL Server Data Management

Redefining Microsoft SQL Server Data Management Redefining Microsoft SQL Server Data Management Contact Actifio Support As an Actifio customer, you can get support for all Actifio products through the Support Portal at http://support.actifio.com/. Copyright,

More information

CA Cloud Overview Benefits of the Hyper-V Cloud

CA Cloud Overview Benefits of the Hyper-V Cloud Benefits of the Hyper-V Cloud For more information, please contact: Email: sales@canadianwebhosting.com Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter

More information

CA XOsoft Replication and CA XOsoft High Availability CA Partner Frequently Asked Questions

CA XOsoft Replication and CA XOsoft High Availability CA Partner Frequently Asked Questions Q1. What do the terms Replication and High Availability mean? A. In the context of these two products, replication refers to the process of copying all application data from one server to another over

More information

INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists

INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists Preventing Data Loss INSIDE > Disaster Recovery Types and Categories > Disaster Recovery Site Types > Disaster Recovery Procedure Lists > Business Continuity Plan 1 Preventing Data Loss White Paper Overview

More information

(Formerly Double-Take Backup)

(Formerly Double-Take Backup) (Formerly Double-Take Backup) An up-to-the-minute copy of branch office data and applications can keep a bad day from getting worse. Double-Take RecoverNow for Windows (formerly known as Double-Take Backup)

More information

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered Over the last decade, cloud backup, recovery and restore (BURR) options have emerged

More information

Optimizing Data Protection Operations in VMware Environments

Optimizing Data Protection Operations in VMware Environments Optimizing Data Protection Operations in VMware Environments March 2009 Data protection is critical for small and medium business (SMB) customers. Evolving business and regulatory mandates are driving

More information

BUSINESSES NEED TO MAXIMIZE PRODUCTIVITY, LOWER COSTS AND DECREASE RISKS EVERY DAY.

BUSINESSES NEED TO MAXIMIZE PRODUCTIVITY, LOWER COSTS AND DECREASE RISKS EVERY DAY. NSA Cloud Suite Powered by BUSINESSES NEED TO MAXIMIZE PRODUCTIVITY, LOWER COSTS AND DECREASE RISKS EVERY DAY. In this age of information, this means you need your servers, desktops and applications up

More information

Why Email Fails MessageOne Survey of Email Outages

Why Email Fails MessageOne Survey of Email Outages Why Email Fails MessageOne Survey of Email Outages White Paper MessageOne, Inc. 11044 Research Blvd. Building C, Fifth Floor Austin, TX 78759 Toll-Free: 888.367.0777 Telephone: 512.652.4500 Fax: 512.652.4504

More information

ICT, PROCUREMENT AND ASSET MANAGEMENT 18 APRIL 2008 SUB-COMMITTEE DISASTER RECOVERY/CONTINGENCY PLANNING

ICT, PROCUREMENT AND ASSET MANAGEMENT 18 APRIL 2008 SUB-COMMITTEE DISASTER RECOVERY/CONTINGENCY PLANNING ICT, PROCUREMENT AND ASSET MANAGEMENT 18 APRIL 2008 SUB-COMMITTEE DISASTER RECOVERY/CONTINGENCY PLANNING Report by Director of Finance and Corporate Resources PURPOSE OF REPORT To bring before the Sub-Committee

More information

Adlib Hosting - Service Level Agreement

Adlib Hosting - Service Level Agreement Adlib Hosting - Service Level Agreement June 2014 This service level agreement (SLA) applies to the Adlib Hosting services provided by Axiell ALM Netherlands BV, and includes the activities and facilities

More information

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist for As the importance and value of corporate data grows, complex enterprise IT environments need

More information

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4

More information

VMware Site Recovery Manager with EMC RecoverPoint

VMware Site Recovery Manager with EMC RecoverPoint VMware Site Recovery Manager with EMC RecoverPoint Implementation Guide EMC Global Solutions Centers EMC Corporation Corporate Headquarters Hopkinton MA 01748-9103 1.508.435.1000 www.emc.com Copyright

More information

Backup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland

Backup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland Backup and Recovery Solutions for Exadata Cor Beumer Storage Sales Specialist Oracle Nederland Recovery Point and Recovery Time Wks Days Hrs Mins Secs Secs Mins Hrs Days Wks Data Loss (Recovery Point Objective)

More information

Program Summary. Criterion 1: Importance to University Mission / Operations. Importance to Mission

Program Summary. Criterion 1: Importance to University Mission / Operations. Importance to Mission Program Summary DoIT provides support for 1,200 virtual and 150 physical servers. Housed in DoIT data centers to take advantage of climate control, power conditioning and redundancy, fire suppression systems,

More information

EMC BACKUP-AS-A-SERVICE

EMC BACKUP-AS-A-SERVICE Reference Architecture EMC BACKUP-AS-A-SERVICE EMC AVAMAR, EMC DATA PROTECTION ADVISOR, AND EMC HOMEBASE Deliver backup services for cloud and traditional hosted environments Reduce storage space and increase

More information

Technology Insight Series

Technology Insight Series Advancing VMware-based Data Resilience John Webster August, 2011 Technology Insight Series Evaluator Group Advancing VMware-based Data Resilience Copyright 2011 Evaluator Group, Inc. All rights reserved.

More information

Information Services hosted services and costs

Information Services hosted services and costs Information Services hosted services and costs 1. Overview Information Services (I.S.) has provided a popular hosting service for specialized departmental servers for many years. Servers hosted by I.S.

More information

Evolving Datacenter Architectures

Evolving Datacenter Architectures Technology Insight Paper Evolving Datacenter Architectures HP technologies for Cloud ready IT By Russ Fellows January, 2013 Enabling you to make the best technology decisions Evolving Datacenter Architectures

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...

More information

A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN

A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN Eman Al-Harbi 431920472@student.ksa.edu.sa Soha S. Zaghloul smekki@ksu.edu.sa Faculty of Computer and Information

More information

Fax Server Cluster Configuration

Fax Server Cluster Configuration Fax Server Cluster Configuration Low Complexity, Out of the Box Server Clustering for Reliable and Scalable Enterprise Fax Deployment www.softlinx.com Table of Contents INTRODUCTION... 3 REPLIXFAX SYSTEM

More information

ENTERPRISE STORAGE WITH THE FUTURE BUILT IN

ENTERPRISE STORAGE WITH THE FUTURE BUILT IN ENTERPRISE STORAGE WITH THE FUTURE BUILT IN Breakthrough Efficiency Intelligent Storage Automation Single Platform Scalability Real-time Responsiveness Continuous Protection Storage Controllers Storage

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES This Product Schedule Terms & Conditions is incorporated into a Services Agreement also comprising the General Terms and Conditions which the Customer

More information

DeltaV Virtualization High Availability and Disaster Recovery

DeltaV Virtualization High Availability and Disaster Recovery DeltaV Distributed Control System Whitepaper October 2014 DeltaV Virtualization High Availability and Disaster Recovery This document describes High Availiability and Disaster Recovery features supported

More information

Complete Storage and Data Protection Architecture for VMware vsphere

Complete Storage and Data Protection Architecture for VMware vsphere Complete Storage and Data Protection Architecture for VMware vsphere Executive Summary The cost savings and agility benefits of server virtualization are well proven, accounting for its rapid adoption.

More information

Access to easy-to-use tools that reduce management time with Arcserve Backup

Access to easy-to-use tools that reduce management time with Arcserve Backup Access to easy-to-use tools that reduce management time with Arcserve Backup In business, evolution is constant. Staff grows. New offices spring up. New applications are being implemented, and typically,

More information

SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery

SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery www.citrix.com Contents Introduction... 3 Fitting Disaster Recovery to the Cloud... 3 Considerations for Disaster Recovery

More information