1 An Archive Audit to Support Disaster Recovery Linda Kempster IMERGE Consulting 6115 Winchester Place Sarasota, FL Phone/FAX: Presented at the THIC Meeting at the Del Mar Hilton Del Mar CA on January 22, 2002
2 2001 The Year of Vulnerability Awareness Two Groups: Those affected directly Those affected indirectly
3 Up in Smoke US Customs Bureau of ATF IRS investigators CIA Investment brokers Financial firms Insurance companies Family members
4 The Search Begins PCs: (computers or paper collectors?) 12% increase in paper usage since % increase in use of computers. US spends $25B/year filing, storing and retrieving paper documents.
5 The Data Cloud Paper Floppies CDs Laptops Mainframes Servers Networks Archives
6 Pre-Sept 11 Buzz Words Disaster Recovery Awareness emerged in 1993 after first attack Y2K Forced us to clean up our act
7 Disaster Recovery Plus! Carrie Lewis, The Yankee Group: Disaster recovery must go beyond simply saving data; a plan must also protect business processes. How much time will it take to get things up and running again? Do you want a separate site running - a mirrored site - so there is no interruption in service, and how often do you want backups done?"
8 NYSE and DR In the wake of the Sept. 11 attacks, disaster recovery planning will be a key focus of New York Stock Exchange inspections, executive VP Edward Kwalwasser of NYSE stated. Congress is very interested in this so the NYSE will inspect member firms' disaster recovery plans during routine examinations and may propose new rules in this area.
9 FBI Requirements "Right now, the FBI has a large number of computers that cannot even send pictures of potential terrorists to other FBI terminals because they do not have the adequate computer capacity," Rep. David Obey (D-Wis.) The supplemental spending bill, for example, gives the FBI $56 million for data backup and warehousing and $237 million to speed up its Trilogy program to modernize its IT infrastructure
10 IRS Funding The Internal Revenue Service received $16 million, of which $13.5 million is for backup systems in case its systems are compromised.
11 US Customs The Commercial Recovery Services program includes building a primary backup facility at least 20 miles from Customs' Springfield, VA, data center and a second facility at least 350 miles away. Customs officials said they are seeking firms to replicate the agency's computer systems and regularly backup their data.
12 US Customs (cont d) In the event of a disaster, Customs wants to have fallback systems up and running with data that is no more than 36 hours old for its missioncritical applications, including its Automated Commercial System, which handles imports at the nation's borders. The cost of the project is estimated at more than $1 million, according to Federal Sources Inc. Total of FBI, IRS and Customs: $300M
13 Types of Damaging Events Sustained loss of telecommunications Structural damage Sustained electrical supply failures Restricted facility access Smoke damage Gas leaks Hazardous materials release Water damage
14 Vulnerability Analysis A matrix chart can indicate the relationship between the probability of the event occurring, the operational impact and the resources required to implement preventative measures during and after an event causing casualty. Vulnerability varies with the size of an organization
15 Size of Business Someone once measured businesses impacted by the first World Trade Center bombing and a California earthquake. "Small to Medium" businesses (under 500 users on site) experienced a 50% rate of going out of business if they could not get to their data. Lesson: D/R is actually more important for small/medium businesses - since they are more volatile to any changes in their operating model
16 2002 Buzz Words Crisis Management Business Continuity Convergence Continuous Availability Disaster Recovery Planning Service Decentralization (critical resources) 2002 may see businesses pulling out of deluxe office HQs and moving into discrete, distributed office environments.
17 Crisis Management Probably the biggest failure experienced by businesses during September 11th was in their crisis management plans. This will be an important business continuity driver in 2002, as companies seek to develop crisis management plans that are tried, tested and guaranteed to work. This area of the market will see many new entrants as CM companies tap into a potentially lucrative market for their specialist services.
18 Business Continuity and Record Storage The demand for records storage for legislative reasons will be a driver for business continuity. Digital records are now legally admissible evidence in most countries. Legislation demands that data is stored for many years in a highly available and absolutely resilient system. Business continuity measures are essential in achieving this requirement.
19 Business Continuity and Information Security Around the world, information security legislation is increasingly demanding business continuity measures. Examples include Gramm-Leach-Bliley and HIPAA, in the US, and the Data Protection Act in the UK. This trend will continue in 2002 and will, in turn, encourage the uptake of the international information security standard ISO 17799
20 Convergence Convergence issues will become one of the most talked about areas of business continuity in Telecommunication systems and information technology were once thought of as separate networks, they are now interlinked and are increasingly missioncritical.
21 Convergence (cont d) Information systems will continue to be more tied to data and document storage technologies so that an enterprise is served by a single system. To accomplish this, archive systems must be tied closer to nearline systems and nearline systems must be tied closer to online systems
22 Continuous Availability Many mission-critical processes have moved from requiring high availability (HA) to continuous (100 percent) availability. Expect to see the refining of products for this market in 2002, with continuous availability making HA offerings obsolete in some markets. In other markets, the difference between HA (keeping the users productive) and DR (keeping the data survivable) is important so that user and management expectations are set correctly.
23 Continuous Availability of Archives Evaluate and potentially decrease the number of media per drive Evaluate and potentially increase number of drives per JB Re-evaluate most efficient use of JB clusters
24 Continuous Availability of the Internet Internet availability will become more important in 2002, and not just for e-commerce firms. Business use of the Internet is growing rapidly and mission-critical processes are being transferred to the IP network, making the continuous availability of Internet services increasingly important will see a greater focus upon availability, security and resilience of processing systems
25 Disaster Recovery Planning The key to remember that no company has as much as stake during your disaster as you do. Jason Buffington, NSI Software
26 DR Plans and Tests Is there a plan? Has it been tested? Are there update procedures in place? Do operators have copies? Office, home, car,?? Critical folks have access to emergency resources? Cash for cars, flights, hotels?
27 Systems Recovery Who has the license keys? Does the DR plan include 800 numbers? Do the right people have the codes to provide and start back-up recovery activities? Are tapes clearly marked? Who has computer room access? Vendors? Users? Consultants? When? During/after shift times?
28 Data Recovery Plans Does your plan include mail, , incoming data and output requirements? Do you know what the mission critical data is? Do you know who the owners are? Are they on your backup distribution list?
29 Initiating the Plans A place to start the DR process is to examine the system as it operates on a day-to-day basis. Departments where poor design or overly complicated "solutions" are in place may hamper the development of the DR plan.
30 Sample Recovery Details In order to get back into operational status, an inventory needs to be available for possible repurchasing equipment. Digital camera or sensor specifications Batch mode specifications Data conversion specifications Output specifications Storage and HSM specifications Tape supplies, spare drives
31 DR Not for Systems Alone A DR plan does not end with the data or the servers. If the plan does not include the people, there will be no one sitting at the consoles of those newly shipped PC's, redundant servers and mirrored archives. A key to successful DR is that the redundant facility must be far enough away that it is not susceptible to the outage (i.e. power grid, hurricane, flood, etc) but close enough that key people can get there if necessary.
32 The Critical Human Elements
33 A Vacuum of Organization How long can you afford to be down?
34 Downtime Cost Estimates Elusive estimates span a vast spectrum, from $1,000 to $100,000 per hour - even $100,000 per minute for real-time transactions. Server downtime is tied to the applications environment, producing much higher costs for transaction processing and manufacturing environments. The Gartner Group points out that downtime cost computations typically only figure productivity loss to an organization but they ignore transaction loss, loss of business, or customer dissatisfaction.
35 Statistics from CTR Most companies value 100 MB at more than $1M. (Jon Toigo). 43% of lost or stolen data is valued at $5M. (Jon Toigo). 43% of companies experiencing disasters never reopen and 29% close within 2 years. (McGladrey and Pullen) 1 out of 500 data centers will have a severe disaster each year. (McGladrey and Pullen)
Business Continuity and Disaster Recovery Planning from an Information Technology Perspective Presenter: David Bird, Director of Sales, Business Technology Consultant phone: 215-672-7100 email: firstname.lastname@example.org
Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success
DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide
Double-Take in a HIPAA Regulated Health Care Industry Abstract: This document addresses the contingency plan and physical access control requirements of the Administrative Simplification security provision
Disaster Recovery Planning for Homesteaders 2004 Paul Edwards & Associates Introduction The term homesteading comes from the days of the pioneers that setled in the midwest and western United States. That
whitepaper Why Should Companies Take a Closer Look at Business Continuity Planning? How Datalink s business continuity and disaster recovery solutions can help organizations lessen the impact of disasters
Technical White Paper Disaster Recovery for Small Businesses A disaster recovery plan helps you understand what data is critical to your business operations and how to best protect it from unexpected failures.
Prepared by Rod Davis, ABCP, MCSA November, 2011 Disaster an event, which causes the loss of an essential service, or part of it, for a length of time which imperils mission achievement. (Andrew Hiles,
Top 10 Disaster Recovery Pitfalls The key to successful disaster recovery is good planning. But with so much at stake for your business, how do you plan with confidence and ensure all stakeholders know
2009 EDITION Expecting the Unexpected Disaster Preparedness Strategies for Small Business Expecting the Unexpected Disaster Preparedness Strategies for Small Business When it Comes to Disaster Readiness,
2010 Symantec Disaster Recovery Study Global Results Methodology Applied Research performed survey 1,700 enterprises worldwide 5,000 employees or more Cross-industry 2 Key Findings Virtualization and Cloud
disaster recovery - the importance of having a plan Disasters, whether manmade or acts of nature, can strike anywhere at any time with little or no warning. In fact, companies that do not have a Disaster
Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business www.integrit-network.com Business Continuity & Disaster Survival Strategies for the Small & Mid Size Business AGENDA:
. White Paper Disaster Recovery Remote off-site Storage for single server environment When it comes to protecting your data there is no second chance January 1, 200 Prepared by: Bill Schmidley CompassPoint
TOP TEN TIPS FOR IT DISASTER RECOVERY PLANNING Introduction Today, businesses of all sizes rely on information technology for critical day-to-day operations. Even small to mid-sized businesses are vulnerable
Understanding Disaster Recovery in California Protecting your Enterprise Session Overview Why do we Prepare What is? How do I analyze (measure) it? What to do with it? How do I communicate it? What does
Disaster Recovery as a Service 2013 Whitepaper In India, the DRaaS offering gains huge significance because of various reasons: frequent occurrence of earthquakes and heavy rains, unrest in various parts
2014 Service Availability Benchmark Survey Published by Executive Summary This benchmark survey presents service availability metrics that allow IT infrastructure, business continuity, and disaster recovery
WHITE PAPER Page 0 Planning for the Worst Case Scenario: FORMULATING YOUR BUSINESS CONTINUITY PLAN 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of Contents Overview... 2 What is Disaster
This white paper describes the three reasons why backup is a strategic element of your IT plan and why it is critical to your business that you plan and execute a strategy to protect 100 percent of your
FiVE FATAL MYTHS ABOUT DATA BACKUP Businesses have become dependent upon their computers and the data residing on them. This data is their lifeblood. Protect your business before a data loss becomes catastrophic.
Business Continuity Planning Guide For Small Businesses Prepared by the City of Vaughan Emergency Planning Department 1 Business Continuity Planning Business Continuity Planning (BCP) is a planning process
with the Cloud Desktop email@example.com (866) 796-0310 www.os33.com In preparing for the unexpected, most companies put specific disaster recovery plans in place. Without planning, recovering from a disaster
Author: Mike Herrmann With organizations looking for new ways to cut costs and increase productivity, the use of cloud computing has grown. The most common form of cloud computing is for vendors making
Frequently Asked Questions about Cloud and Online Backup With more companies realizing the importance of protecting their mission-critical data, we know that businesses are also evaluating the resiliency
Be Prepared How Small/ Mid Size Companies Can Protect Their Business By Sean W. O Donnell, President, Datacor, Inc. Introduction Recent disasters have brought the need for organizations to focus on business
Enabling Small Business Success 2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business 2008 All Covered Inc. www.allcovered.com Contents EXECUTIVE SUMMARY... 3 RECOMMENDATIONS...
Brochure More information from http://www.researchandmarkets.com/reports/2787481/ Disaster Recovery Business Continuity Premium Edition Description: The Disaster Recovery Plan (DRP) Template PREMIUM Edition
DISASTER RECOVERY WITH AWS Every company is vulnerable to a range of outages and disasters. From a common computer virus or network outage to a fire or flood these interruptions can wreak havoc on your
Your company relies on its databases. How are you protecting them? Protecting Microsoft SQL Server 2 Hudson Place suite 700 Hoboken, NJ 07030 Powered by 800-674-9495 www.nsisoftware.com Executive Summary
Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business Business Continuity & Disaster Survival Strategies for the Small and Mid Size Business AGENDA Welcome / Introduction
How to Design and Implement a Successful Disaster Recovery Plan Feb. 21 ASA Office-Administrative Section is Sponsored by Today s ASAPro Webinar is Brought to You by the How to Ask a Question Questions
MANAGED WORKSTATIONS: Keeping your IT running What state are your PCs in? Systems running slowly? PCs or laptops crashing for no reason? Too much time trying to resolve simple IT issues? Out-of-date software?
Temple university Auditing a business continuity management BCM November, 2015 Auditing BCM Agenda 1. Introduction 2. Definitions 3. Standards 4. BCM key elements IT Governance class - IT audit program
The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss
Disaster Recovery, Business Continuity & Other Lessons Learned FTA Annual Conference Nashville, Tennessee Bob Tangorre Nonie Manion New York State Tax & Finance September 11-A Different Type of Disaster
Section: Information Security Revised: December 2004 Guideline: Description: Backup Security Guidelines: are recommended processes, models, or actions to assist with implementing procedures with respect
CONSIDERATIONS BEFORE MOVING TO THE CLOUD What Management Needs to Know Part I By Debbie C. Sasso Principal When talking technology today, it s very rare that the word Cloud doesn t come up. The benefits
What is a COOP? Continuity of Operations Planning A step by step guide for business A Continuity Of Operations Plan (COOP) is a MANAGEMENT APPROVED set of agreed-to preparations and sufficient procedures
White Paper: ISO 22301 Business Continuity Management An Overview ISO 22301 Business Continuity Management An Overview Introduction As incidents such as malicious activism, terrorist attacks and environmental
DISASTER RECOVERY: PLANNING AHEAD FOR BUSINESS CONTINUITY OCTOBER 2012 Sponsored by Contingency planning for IT is a step businesses should take to ensure continuity and production in a state of emergency.
The Cloud Threat Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it This white paper outlines the concerns that often prevent midsized enterprises from taking advantage of the Cloud.
The Essential Guide for Protecting Your Legal Practice From IT Downtime www.axcient.com Introduction: Technology in the Legal Practice In the professional services industry, the key deliverable of a project
the Availability Digest Banks Use Synchronous Replication for Zero RPO February 2010 Two banks, the Bank of New York and the Fifth Third Bank, have each built highly-resilient, triplexed center complexes
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Disaster Recovery Testing Is Being Adequately Performed, but Problem Reporting and Tracking Can Be Improved May 3, 2012 Reference Number: 2012-20-041 This
The Weakest Link in Disaster Recovery By Alex Bakman, CEO Much of the focus of disaster recovery planning is on creating redundant data sites and backup tapes. Very often, a crucial component is overlooked:
Disaster Recovery for Ingres A general disaster recovery discussion followed by Ingres specific issues and recommendations 2002-2003 Comprehensive Consulting Solutions, Inc., All rights reserved. Abstract
Cloud Computing Chapter 10 Disaster Recovery and Business Continuity and the Cloud Learning Objectives Define and describe business continuity. Define and describe disaster recovery. Describe the benefits
New Clerk Academy August 13, 2015 Disaster Recovery OVERVIEW Presentation Agenda Introduction and Definitions DR Motivators and Drivers Recovery Challenges Scope of Disasters Components of Recovery Plans
Brochure More information from http://www.researchandmarkets.com/reports/2786932/ Disaster Recovery Plan (Business Continuity) Template Description: The Disaster Planning Template is over 200 pages and
Planning and Implementing Disaster Recovery for DICOM Medical Images A White Paper for Healthcare Imaging and IT Professionals I. Introduction It s a given - disaster will strike your medical imaging data
Disaster Recovery & Business Continuity James Adamson Library Systems Office Library Management Information Data Services Financial Procurement Cataloging Inventory/searching Circulation Central Library
Documentation for data centre migrations Data centre migrations are part of the normal life cycle of a typical enterprise. As organisations expand, many reach a point where maintaining multiple, distributed
GOVERNMENT FINANCE OFFICERS ASSOCIATION OF MISSOURI SPRING 2012 CONFERENCE IT DISASTER PLAN 2012 Sikich LLP. All Rights Reserved. Presented by: Scott Wegner Partner, Director Networking Services Sikich
WHITE PAPER PROTECTING MICROSOFT SQL SERVER TM Your company relies on its databases. How are you protecting them? Published: February 2006 Executive Summary Database Management Systems (DBMS) are the hidden
Version 8.0 2014 Copyright Janco Associates, Inc. - http://www.e-janco.com Page 1 Table of Contents 1 1.0 Plan Introduction... 4 1.1 Mission and Objectives... 5 Compliance... 5 ISO Compliance Process...
DISASTER RECOVERY ebook FACING DISASTERS HEAD ON CHAPTER 1: Facing Reality CHAPTER 2: Disaster Recovery Considerations CHAPTER 3: Making the Best Choices CHAPTER 4: A Single, Unified Solution CHAPTER 5:
Datacenter Hosting Scalable Technology and Insurance for Your Business nsacom.com Datacenter Hosting Scalable Technology and Insurance for Your Business Datacenter Hosting Gives You the Best of Both Worlds
Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity task is resuming business critical operations. Having
Simplifying storage processes and ensuring business continuity and high availability IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity The risks are even greater for companies that
LOB #303: DISASTER RECOVERY Technology Infrastructure Services Purpose Disaster Recovery (DR) for IT is a capability to restore enterprise-wide technology infrastructure, applications and data that are
Select Q&A, D. Scott, F. DeSalvo Research Note 6 February 2003 Midsize Enterprise Summit Business Continuity Questions Current events have created a new awareness of the importance of business continuity
Website Disaster Recovery Contents Overview... 2 Disaster Preparedness for the Internet Age... 2 Some Fundamental Questions... 2 Planning Your Recovery... 3 Start with a Backup Plan... 4 Backup Commandments...
HOSTED VOIP 61 Greenheys Business Centre Manchester Science Park Manchester M15 6JJ // Hosted VoIP If you are looking for a fully managed telephony service to install into new premises or to replace or
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING AND SOLUTIONS FOR IT AND TELECOM DECISION MAKERS Executive Summary Today s businesses rely heavily on voice communication systems and data networks to such
EDP HOSTING SERVICES Reducing Your Costs & Protecting Your Business Cost-effective, client focused, business solutions. Building relationships for business growth Considering outsourcing your computing
Paper 176-28 Future Trends and New Developments in Data Management Jim Lee, Princeton Softech, Princeton, NJ Success in today s customer-driven and highly competitive business environment depends on your
networksplus.com 800.299.1704 Backup vs. Business Continuity: Using RTO to Better Plan for Your Business Networks Plus Executive Summary SMBs in general don t have the same IT budgets and staffs as larger
April 15, 2016 Presented by David Falldien Disaster Recovery: For business continuity About Me: Senior System Administrator at Dalhousie University Working in IT for 15 years, and the DalCard Program for
09laliberte-p44 3/4/08 3:46 PM Page 2 MANAGEMENT STRATEGIES How Disaster-Tolerant Is Your Company? By Bob Laliberte Bob Laliberte is an analyst with the Enterprise Strategy Group, www. enterprisestrategygroup.com,
Data Backup Options for SME s As an IT Solutions company, Alchemy are often asked what is the best backup solution? The answer has changed over the years and depends a lot on your situation. We recognize
Email Hosted Exchange Email 1 2 Hosted Exchange Services 2 Hosted Exchange Email Where security, availability and professional image all meet together. There are few business decisions that can be as quick
Disaster Recovery Feature of Symfoware MS V Teruyuki Goto (Manuscript received December 26, 2006) The demands for stable operation of corporate information systems continue to grow, and in recent years
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 13 Business Continuity Objectives Define environmental controls Describe the components of redundancy planning List disaster recovery
FOREWORD Richard L. Arnold, CBCP Publisher, Editor-in-Chief Disaster Recovery Journal (DRJ) Disaster Recovery Planning: The technological aspect of business continuity planning. The advance planning and
MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is
7 Critical Facts Every Business Owner Must Know About Protecting Their Computer Network From Downtime, Data Loss, Viruses, Hackers and Disasters If You Depend On Your Computer Network To Run Your Business,
Audit of the Disaster Recovery Plan Report # 11-05 Prepared by Office of Inspector General J. Timothy Beirnes, CPA, Inspector General Kit Robbins, CISA, CISM, CRISC, Lead Information Systems Auditor TABLE