Business Continuity Program Review

Size: px
Start display at page:

Download "Business Continuity Program Review"

Transcription

1 PROJECT VS. PROGRAM: THE BUSINESS CONTINUITY MANAGEMENT CHALLENGE 1998 Kathleen A. Lucey W e now do very well what we set out to do 20 years ago: develop emergency response plans, run tests at alternate sites where we recover computer platforms, and sometimes networks. We can implement high availability solutions using cutting edge technologies. But we have done less well developing our profession as an integral and structured component of the business. It was 20 years ago as well that we saw the emergence of tools that organized the art of programming information systems into steps, stages, life cycle phases, all of which defined activities and prescribed certain procedures and documentation. We need to do this now for our own profession. What are our best practices for creating and managing our programs? Where is our trade literature that speaks to the issue of how to move from recovery plan development to a strong ongoing program, and perhaps, more importantly, how to keep that program healthy and growing over time? This development of a methodology for structured, formal continuity program is now the single most important challenge facing our profession. Many organizations (if not most) are now grappling with these issues, and many are stuck. We have demonstrated that we can develop new recovery solutions for some new technologies, but we need above all to get our management house in order to make significant progress, no matter how complex our recovery strategies may become, we need to become an integrated part of the business. The following case study deals with the development of a Business Continuity Program over 5 years at a large multinational firm. The Program is now a well-regarded part of the company. It started as just another recovery plan development project. The difference, however, is that we began early to look forward to the ongoing program, and have developed a set of tools that has helped us to formalize our activities. These tools have helped us to get to where we are now: we have a logo, we have an identity, we offer a very specific, detailed set of services that make up the ongoing recovery capability for participating business units. Case Study: The Road Map to Recovery Program Five years ago, in the beginning of 1994, we were faced with a challenge: how to move a large company, with many applications running on multiple vendor platforms, toward development of a basic recovery capability. A global study regarding the impact of the loss of critical applications had just been completed at great expense. There were reams of data, but no direction for moving forward to an action plan. Within 18 months, for as many of the defined critical systems as management had decided were truly important (46), we had implemented backup and recovery strategies. These were documented in recovery plans and other documentation. Our profession is good at this kind of project: there was nothing new here, other than perhaps the size of the project. But then what? The development project glory was fading, the sponsors of the original project were no longer in the organization. We were pretty much looking out over the cliff. We were faced with the real challenge of moving out of project mode and into program mode. This is far more difficult than even the largest of development projects.

2 We did gain one advantage from the Development Project. Since the project was so large, we needed to work in phases, which we called waves. As Wave 1 systems completed their implementation, they needed to transition to an ongoing support mode. Then the Wave 2 systems would simultaneously go through their development phase. And so, midway through the development project, we were already involved in an ongoing program. Therefore, as part of the development project, we had already begun to embed elements that facilitated the longer term program. We have been developing other structural elements all along the way. One of the most important of these, System Complexity Classification, was developed only last year. The program is still evolving, and will continue to change to meet the emerging needs of our participating business units. The following set of structural elements has helped us to move from an ad-hoc mode to a systematic approach that is effective both for the Program and for its participants 1. System Complexity Classification. When a new system or business area wishes to join the program, it is classified according to its complexity. This translates to a resource requirement, and ultimately to a fee which can then be billed back to the requesting department. This is important, because at the current time, all costs must be billed back each business area from the service department. The following table represents how this classification works. The deliverables are the same for each phase, but the amount of resource varies according the complexity of the system/business area. The 80/20 rule applies: most participating systems or business areas fall into one of the boxes. Of course, sometimes customization is necessary but this is the rare exception. Complexity/ Phase Small Medium Large Development a b c Year 1 maintenance d e f Year 2+ maintenance g h i 2. Recovery Class Criteria. This tool assigns the application/platform/business area a specific recovery class. There are 4 different classes, each based on the primary recovery and backup strategy drivers: RTO (Recovery Time Objective) and RPO (Recovery Point Objective). Each class then specifies the following: Alternate site characteristics Backup requirements, including type, frequency, monitoring, offsite storage characteristics and procedures. Data recovery procedures Disaster recovery plan characteristics: organization, form, content, testing, coordination with other emergency plans Validation: procedures for ensuring the integrity of software, data, and hardware of the recreated systems. 2

3 3. Vital Records Backups: Requirements and Recommended Procedures. This document has two parts: A) A detailed discussion of disaster backup theory Types, frequency, advantages and disadvantages Why disaster backups must be treated differently from file backups used to restore faulty components (i.e., disk) or re-create deleted or damaged files. Procedures for transport to offsite locations; characteristics of effective offsite locations Retention of disaster backup files: minimum number of full cycles to be retained B) An explanation of the required content of a Vital Records Backup Technical Operating Procedure Disaster Backup Creation Frequency and Type Storage Device Names Creation Journal File State at time of backup creation Disaster Backup Storage Disaster Backup Retention Creating Hardware Characteristics Disaster Backup Transport Removal of Disaster Backups from Offsite Storage. Detailed procedures for: Normal retrieval : expiration of retention date Exceptional retrieval: Need for file recovery Need for disaster recovery testing Need for disaster recovery 4. Vital Records Backup Technical Operating Procedure. A separate document is created and maintained for the named critical resources associated with each system/business area that participates in the program. This document follows the requirements defined in the Vital Records Backup Requirements document above, and is subject to quarterly review and updating to reflect environmental or other changes. 5. The Business Continuity Program Test Protocol. This very detailed document is the road map leading participants through the various testing phases and activities. It specifies the content and procedures for the two pre-test meetings, the post-test review meeting, and defines the content of required test documentation and its distribution. As an example, this is the list of items for the second pre-test meeting: Timing: 30 days prior to the test Participants: Leader of the meeting, team members, other required participation depending on the type of test Preparation for the meeting: who does the following: Review the documentation from the previous meeting Reserve meeting room; remind participants of meeting two days prior to the meeting Arrange for conference call with alternate site vendor 3

4 Fax test information to vendor Document any action items open from the previous meeting Document any new contract requirements to alternate site vendor; obtain new contract proposal if necessary Make copies of all relevant information for each meeting participant Meeting agenda Discuss action items from previous meeting Review system configuration; review new alternate site contract if necessary Review test objectives and alternate site configuration in detail Discuss any equipment that will be brought to the alternate site Review and finalize test staffing and roles Review information for the shipment of backup tapes: who will receive the notification call that tapes have been received Review existing recovery documentation. If any changes are necessary, make new copies and take to the test Make conference call to alternate site vendor Determine lodging and catering requirements Post-test Planning Activities Meeting record is written and distributed within 3 business days of the meeting Activities for Business Continuity Program participant and technical participants, including timing 6. The Continuity Documentation Maintenance and Distribution Technical Operating Procedures. This document is created for each system/business area participating in the Program. It defines critical responsibilities for review and updating of the various pieces of continuity documentation, and defines the quarterly cycle of update, publication, and distribution of new documentation. 7. Program Testing Rules. Each system/business area participating in the program MUST perform four test exercises per year. Two of these are relocation tests; two are paper or notification exercises. We have determined, based on experience, that a continuity exercise must occur at least once each quarter in order to allow participants to begin to integrate business continuity concepts into their normal workday. 6. The Three-Year Maintenance Strategy. For each system/business area participating in the Program, primary and secondary objectives are defined for each of the coming three years. These objectives are supported by testing activity, and are harmonized with test exercises being conducted for other systems/business areas participating in the Program. We begin first with component certification, including personnel cross-training, and progress to multiple-platform recoveries and user participation that will reflect ever closer the realities that would be encountered at time of disaster. These documents are updated annually with a rolling 3-year window. 4

5 The Impact of All of These Tools? Those business areas participating in the Business Continuity Program know what they will receive, and how much to budget for these services. When a business area comes to the Program and asks for assistance in recovering a computer platform, this is what happens: 1. An initial analysis is performed, which results in definition of the recovery class, and a classification of system complexity. 2. A project plan is created which defines the timing for the deliverables which are standard to all development projects: Definition of the backup strategy and the recovery strategy: implementation of these in the most cost-effective manner Creation of the Vital Records Backup TOP Creation of the Continuity Documentation Maintenance and Distribution TOP The Business Continuity Plan, including any technical system restoration information The integration of information regarding this project with the existing sitewide logistic support plans The performance of a basic test of the backup and recovery strategies, generally involving re-creation of a system at the alternate site 3. A cost is applied based on the system complexity definition. 4. The business unit approves the project plan and the development phase is initiated. In order for the system to move into the ongoing Program, the business unit must approve the cost for First-Year Maintenance. This is an annual fee, based on the system complexity classification. Deliverables are standard for all projects in first-year maintenance: 1. Design and documentation of a 3-year Maintenance Strategy. This includes primary and secondary objectives for each of the next three years. Design of test exercises to include at least two system re-creation or user relocation tests per year, as well as two paper/notification tests per year. These tests are designed specifically to support the yearly objectives. They take into account potential multi-platform tests involving other systems, and Maintenance Strategies for other Program participants. 2. Execution of the formal Test Protocol for each of the test exercises planned for the year. 3. Review, physical update and distribution of the standard continuity documentation for each participating system/business area: Continuity Plan, Vital Records Backup TOP, Continuity Documentation Maintenance and Distribution TOP. In order to continue to participate in the Program, the business unit must then approve the cost for each subsequent year of maintenance. This is an annual fee, and is based on the system complexity classification. Standard deliverables are the same as for first year maintenance, except that the Maintenance Strategy is now simply updated, rather than being written for the first time. The cost based on the system complexity classification is therefore somewhat less than for year 1 maintenance. All of this standardization makes it easy to bring on new Program participants. 5

6 The Business Continuity Program has a name, a logo, and an identity: this comes as a direct result of the structured, recurrent, defined nature of the Program s activities. We can market the program because it has a defined shape. Another effect is that this year, we have planned for 76 separate test exercises with knowledge of how much resource we need and when. We can bring new Program personnel up to speed very quickly: they have a reference point for all Program activities. Because we know our committed resource requirements for the Program, we can then identify and focus on strategic issues as they arise, dealing with the challenges of new technology implementation and the larger issues of interlocking systems and networks. The systematic nature of our ongoing tactical program frees us to focus scarce resources where they can best be deployed, supplementing with less senior resources to deliver our well-defined standard services. Conclusion It took a long time and almost 20 years of experience in the business for me to truly understand the primordial importance of management and political issues to the success of any disaster recovery or business continuity effort. About 12 years ago, while I was a consultant for a French consulting firm in Paris, I had a knockdown drag-out with my manager, who insisted on the importance of developing and sustaining a personal relationship with the client, and on the regular use of formal project management reporting. I argued that the project could stand on its own technical merits. I could not have been more wrong: it was a hard lesson. Perhaps it was because I came to the business as a technologist; perhaps it was also because many of the major commercial services providers and plan development software providers in our industry have concentrated so much on technical solutions. I can t help thinking and hoping that our industry has now come to a critical watershed, where we have reached a sufficient level of maturity to look beyond today s newest backup or recovery solution. And that this new maturity will help us to understand and master our role as a critical business function, whether that business manufactures widgets or computers or supplies electricity or telephone service. I know that for a long time, I looked primarily at the technology and at the newest technology recovery solution. I still tend to look at the role of the technology in supporting business requirements. But I consciously try now to look first at the business, and then at its critical processes and resources, some of which are technology-based, some of which are not. This attitude helps to keep me focused on the basic raison-d être of our entire industry: ensure the ability of the business to stay in business during a crisis. In order to do this, the business continuity program must function effectively and well in and of itself. I know too that this attitude is of critical importance to the very scary challenge now facing our industry: contingency planning for Year 2000 projects. Ultimately, management and political issues are always more important than the implementation of any particular technical recovery solution. As we move toward the new challenges facing our industry, we need to remind ourselves often of this reality. Will we move forward, armed with new attitudes and tools, or will we the adopt the ostrich attitude that we have so often observed in regard to our own industry in business managers, in technology developers? We must become effective leaders in our own realm, and to do so we need solid logistics and management tools supporting us. The program I have discussed in this paper is the beginning of a new understanding of what we are about as an industry. Let s get on with it!! 6

SOUTH LAKELAND DISTRICT COUNCIL INTERNAL AUDIT FINAL REPORT IT 11-02. IT Backup, Recovery and Disaster Recovery Planning

SOUTH LAKELAND DISTRICT COUNCIL INTERNAL AUDIT FINAL REPORT IT 11-02. IT Backup, Recovery and Disaster Recovery Planning SOUTH LAKELAND DISTRICT COUNCIL INTERNAL AUDIT FINAL REPORT IT 11-02 IT Backup, Recovery and Disaster Recovery Planning Executive Summary Introduction As part of the 2011/12 Audit Plan and following discussions

More information

Disaster Recovery. Stanley Lopez Premier Field Engineer Premier Field Engineering Southeast Asia Customer Services and Support

Disaster Recovery. Stanley Lopez Premier Field Engineer Premier Field Engineering Southeast Asia Customer Services and Support Disaster Recovery Stanley Lopez Premier Field Engineer Premier Field Engineering Southeast Asia Customer Services and Support Categories of Risk Financial Operational Reputational Market share Revenue

More information

WHITE PAPER. The 5 Critical Steps for an Effective Disaster Recovery Plan

WHITE PAPER. The 5 Critical Steps for an Effective Disaster Recovery Plan WHITE PAPER The 5 Critical Steps for an Effective Disaster Recovery Plan 2 WHITE PAPER The 5 Critical Planning Steps For An Effective Disaster Recovery Plan Introduction In today s climate, most enterprises

More information

15 Organisation/ICT/02/01/15 Back- up

15 Organisation/ICT/02/01/15 Back- up 15 Organisation/ICT/02/01/15 Back- up 15.1 Description Backup is a copy of a program or file that is stored separately from the original. These duplicated copies of data on different storage media or additional

More information

Overview of how to test a. Business Continuity Plan

Overview of how to test a. Business Continuity Plan Overview of how to test a Business Continuity Plan Prepared by: Thomas Bronack Phone: (718) 591-5553 Email: bronackt@dcag.com BRP/DRP Test Plan Creation and Exercise Page: 1 Table of Contents BCP/DRP Test

More information

Planning a Backup Strategy

Planning a Backup Strategy Planning a Backup Strategy White Paper Backups, restores, and data recovery operations are some of the most important tasks that an IT organization performs. Businesses cannot risk losing access to data

More information

Version: 1.5 2014 Page 1 of 5

Version: 1.5 2014 Page 1 of 5 Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware

More information

DEFINING THE RIGH DATA PROTECTION STRATEGY

DEFINING THE RIGH DATA PROTECTION STRATEGY DEFINING THE RIGH DATA PROTECTION STRATEGY The Nuances of Backup and Recovery Solutions By Cindy LaChapelle, Principal Consultant, ISG www.isg-one.com INTRODUCTION Most organizations have traditionally

More information

PARKES SHIRE COUNCIL BUSINESS CONTINUITY POLICY

PARKES SHIRE COUNCIL BUSINESS CONTINUITY POLICY PARKES SHIRE COUNCIL BUSINESS CONTINUITY POLICY PARKES SHIRE COUNCIL BUSINESS CONTINUITY POLICY CONTENTS INTRODUCTION... 1 PURPOSE... 1 POLICY... 1 DEFINITIONS... 1 RESPONSIBILITY... 1 RELATED DOCUMENTATION...

More information

Automating the Data Center The First Steps Make All the Difference

Automating the Data Center The First Steps Make All the Difference Automating the Data Center The First Steps Make All the Difference By: Harris Kern s Enterprise Computing Institute The past decade had brought tremendous technological advances to the data center: open

More information

Simplify Your Data Protection Strategies: Best Practices for Online Backup & Recovery

Simplify Your Data Protection Strategies: Best Practices for Online Backup & Recovery Simplify Your Data Protection Strategies: Best Practices for Online Backup & Recovery Souvik Choudhury, Senior Director, Product Management SunGard Availability Services DRAFT www.sungardas.com Agenda

More information

IF DISASTER STRIKES IS YOUR BUSINESS READY?

IF DISASTER STRIKES IS YOUR BUSINESS READY? 1 IF DISASTER STRIKES IS YOUR BUSINESS READY? DISASTER RECOVERY and BUSINESS CONTINUITY: WHAT YOU NEED TO KNOW Realize the Power of Technology Many business owners put off disaster planning, perhaps thinking

More information

Attachment to Data Center Services Multisourcing Service Integrator Master Services Agreement

Attachment to Data Center Services Multisourcing Service Integrator Master Services Agreement Attachment to Data Center Services Multisourcing Service Integrator Master Services Agreement DIR Contract No. DIR-DCS-MSI-MSA-001 Between The State of Texas, acting by and through the Texas Department

More information

William Rider Manager Disaster Recovery & Data Security The Johns Hopkins Health System & University

William Rider Manager Disaster Recovery & Data Security The Johns Hopkins Health System & University William Rider Manager Disaster Recovery & Data Security The Johns Hopkins Health System & University Competitive Leadership- Twelve Principles For Success Brian Billick Chapter 3 Be Be Prepared The time

More information

Hybrid Business Cloud Backup

Hybrid Business Cloud Backup Hybrid Business Cloud What it is. What it s good for. Tom Gallivan Vice President of Sales February 25 th, 2014 2 AGENDA Hybrid Business Cloud 1 2 3 4 5 Data Loss and Cloud vs. Hybrid Business Cloud Sizing

More information

B U S I N E S S C O N T I N U I T Y P L A N

B U S I N E S S C O N T I N U I T Y P L A N B U S I N E S S C O N T I N U I T Y P L A N 1 Last Review / Update: December 9, 2015 Table of Contents Purpose...3 Background...3 Books and Records Back-up and Recovery...4 Mission Critical Systems...

More information

Agenda. Overview Configuring the database for basic Backup and Recovery Backing up your database Restore and Recovery Operations Managing your backups

Agenda. Overview Configuring the database for basic Backup and Recovery Backing up your database Restore and Recovery Operations Managing your backups Agenda Overview Configuring the database for basic Backup and Recovery Backing up your database Restore and Recovery Operations Managing your backups Overview Backup and Recovery generally focuses on the

More information

Disaster Recovery Checklist Disaster Recovery Plan for <System One>

Disaster Recovery Checklist Disaster Recovery Plan for <System One> Disaster Recovery Plan for SYSTEM OVERVIEW PRODUCTION SERVER HOT SITE SERVER APPLICATIONS (Use bold for Hot Site) ASSOCIATED SERVERS KEY CONTACTS Hardware Vendor System Owners Database Owner

More information

Welcome to My E-Book

Welcome to My E-Book Welcome to My E-Book I decided to write this e-book as a response to the many questions that I get from business owners about data backup solutions. I have seen first-hand that business owners are very

More information

Implementing Disaster Recovery? At What Cost?

Implementing Disaster Recovery? At What Cost? Implementing Disaster Recovery? At What Cost? Whitepaper Viktor Babkov Technical Director Business Continuity Copyright Business Continuity May 2010 In today s environment, minimizing IT downtime has become

More information

Recovery, BYOD and the Cloud. Director of Managed Services

Recovery, BYOD and the Cloud. Director of Managed Services The Modern Backup: Recovery, BYOD and the Cloud Brian J Page, CISSP Director of Managed Services Structured: Your Trusted Technology Partner Founded in 1992 Headquartered in Portland, OR. Offices in Oregon,

More information

Backup Software? Article on things to consider when looking for a backup solution. 11/09/2015 Backup Appliance or

Backup Software? Article on things to consider when looking for a backup solution. 11/09/2015 Backup Appliance or 11/09/2015 Backup Appliance or Backup Software? Article on things to consider when looking for a backup solution. Ray Quattromini FORTUNA POWER SYSTEMS LTD T: 01256 782030 E: RAY@FORTUNADATA.COM W: WWW.FORTUNADATA.COM

More information

Information Privacy and Security Program Title:

Information Privacy and Security Program Title: Page: 1 of 11 I. PURPOSE: The purpose of this standard is to protect the safety of our workforce members and mitigate potential risk(s) that could materially affect the ability of the facility to remain

More information

Oregon-Montana Disaster Recovery Phase 1

Oregon-Montana Disaster Recovery Phase 1 Oregon-Montana Disaster Recovery Phase 1 Oregon Department of Administrative Services Enterprise Technology Services http://www.oregon.gov/das/ets/pages/index.aspx Category 10: Cyber Security Project Completion

More information

Virtual Disaster Recovery

Virtual Disaster Recovery Virtual Disaster Recovery White Paper September 16, 2008 Kelly Laughton Davenport Group Consultant Davenport Group 2008. All rights reserved. Introduction Today s data center has evolved into a complex,

More information

Virtualization. Disaster Recovery. A Foundation for Disaster Recovery in the Cloud

Virtualization. Disaster Recovery. A Foundation for Disaster Recovery in the Cloud Technology Paper Disaster Acronym: DR The process, policies, and procedures that enable a business to recover data and systems after a disaster. A Foundation for Disaster in the Cloud Introduction Virtualization

More information

The Business Continuity Maturity Continuum

The Business Continuity Maturity Continuum The Business Continuity Maturity Continuum Nick Benvenuto & Brian Zawada Protiviti Inc. 2004 Protiviti Inc. EOE Agenda Terminology Risk Management Infrastructure Discussion A Proposed Continuity Maturity

More information

Disaster Recovery Planning. By Janet Coggins

Disaster Recovery Planning. By Janet Coggins Comp 5940 Project Disaster Recovery Planning By Janet Coggins Janet H. Coggins Page 1 11/21/2004 Table of Contents List of each Section....Page 2 Section 1 Executive Summary Overview of the scope of the

More information

Business Virtualization

Business Virtualization Business Virtualization Why should I consider server virtualization? Save money. Often servers are dedicated to just one or two applications. As a result servers in many organizations are only using 15

More information

Oregon-Montana Disaster Recovery Phase 1 & 2

Oregon-Montana Disaster Recovery Phase 1 & 2 Oregon-Montana Disaster Recovery Phase 1 & 2 Oregon Department of Administrative Services Enterprise Technology Services http://www.oregon.gov/das/ets/pages/index.aspx Category: Disaster Recovery/Security

More information

Securing Your Microsoft SQL Server Databases in an Enterprise Environment

Securing Your Microsoft SQL Server Databases in an Enterprise Environment Securing Your Microsoft SQL Server Databases in an Enterprise Environment Contents Introduction...1 Taking Steps Now to Secure Your Data...2 Step 1: Back Up Everything...2 Step 2: Simplify as Much as

More information

BUSINESS CONTINUITY PLAN OVERVIEW

BUSINESS CONTINUITY PLAN OVERVIEW BUSINESS CONTINUITY PLAN OVERVIEW INTRODUCTION The purpose of this document is to provide Loomis customers with an overview of the company s Business Continuity Plan (BCP). Because of the specific and

More information

Recovery Site Evaluation: Finding Viable Alternatives

Recovery Site Evaluation: Finding Viable Alternatives Delivering the business value of IT. Recovery Site Evaluation: Finding Viable Alternatives Michael Croy Director, Business Continuity Solutions, Forsythe Solutions Group Session Agenda - Past to Present:

More information

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization. WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read

More information

BACKUP IS DEAD: Introducing the Data Protection Lifecycle, a new paradigm for data protection and recovery WHITE PAPER

BACKUP IS DEAD: Introducing the Data Protection Lifecycle, a new paradigm for data protection and recovery WHITE PAPER BACKUP IS DEAD: Introducing the Data Protection Lifecycle, a new paradigm for data protection and recovery Despite decades of research and development into backup and data protection, enterprise customers

More information

How do you test to determine which backup and restore technology best suits your business needs?

How do you test to determine which backup and restore technology best suits your business needs? KEY CRITERIA WHEN SELECTING BACKUP AND RESTORE TECHNOLOGY FOR WINDOWS SYSTEMS How do you test to determine which backup and restore technology best suits your business needs? Real-Time Recovery delivers

More information

DISASTER RECOVERY PLANNING GUIDE

DISASTER RECOVERY PLANNING GUIDE DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide

More information

REMOTE BACKUP-WHY SO VITAL?

REMOTE BACKUP-WHY SO VITAL? REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote

More information

WHITE PAPER. Business Continuity Planning

WHITE PAPER. Business Continuity Planning Armstrong Consulting GmbH Zieglergasse 1/14, A-1070 Vienna, Austria tel: +43-1-5248737-40 web: www.armstrongconsulting.com email: bcp@armstrongconsulting.com WHITE PAPER Business Continuity Planning or

More information

Best Practices for Using Symantec Online Storage for Backup Exec

Best Practices for Using Symantec Online Storage for Backup Exec WHITE PAPER: xxxxxx Data Protection [00-Cover_Bar] Best Practices for Using Symantec Online Storage for Backup Exec Confidence in a connected world. White Paper: Data Protection Best Practices for Using

More information

Business Continuity and Capacity Building

Business Continuity and Capacity Building Business Continuity and Capacity Building April 10, 2015 Business Continuity and Capacity Building April 10, 2015 1 / 14 Developing Institutional Business Continuity Plans and Implications for Capacity

More information

July 30, 2009. Internal Audit Report 2009-08 Information Technology Business Continuity Plan Information Technology Department

July 30, 2009. Internal Audit Report 2009-08 Information Technology Business Continuity Plan Information Technology Department Internal Audit Report 2009-08 Introduction. The Municipality depends heavily on technology and automated information systems, and their disruption for even a few days could have a severe impact on critical

More information

Backup and Archiving Explained. White Paper

Backup and Archiving Explained. White Paper Backup and Archiving Explained White Paper Backup vs. Archiving The terms backup and archiving are often referenced together and sometimes incorrectly used interchangeably. While both technologies are

More information

DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS

DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS Appendix L DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS I. GETTING READY A. Obtain written commitment from top management of support for contingency planning objectives. B. Assemble

More information

EMC NETWORKER SNAPSHOT MANAGEMENT

EMC NETWORKER SNAPSHOT MANAGEMENT White Paper Abstract This white paper describes the benefits of NetWorker Snapshot Management for EMC Arrays. It also explains the value of using EMC NetWorker for snapshots and backup. June 2013 Copyright

More information

How To Backup At Qmul

How To Backup At Qmul TSM Backup and Restore Strategy and Overview (Draft) Prepared by: Trevor Leigh Version: 1.1 Page 1 of 13 Document Owner: Name/Position Steve Wicks, Servers & Storage Manager Revision History Version Description

More information

Sibling Rivalries: Integrating Data Management Technologies

Sibling Rivalries: Integrating Data Management Technologies Sibling Rivalries: Integrating Data Management Technologies Randy Kerns Senior Strategist Evaluator Group Agenda Perspective Sibling elements in managing storage of data Data Protection Tiering Archiving

More information

DO NOT ASSUME THAT THE BACKUP IS CORRECT. MAKE SURE IT IS.

DO NOT ASSUME THAT THE BACKUP IS CORRECT. MAKE SURE IT IS. BACKING UP DATABASES & ASSOCIATED FILES It is not the responsibility of Incisive Software Limited, or any agent appointed by us, to configure or ensure the reliability and validity of the backing up of

More information

Disaster Recovery Planning

Disaster Recovery Planning Assess, Adjust, Improve An LXI Publication Page 1 of 11 Your company's ability to recover is a high priority. In a survey by Contingency Planning & Management Magazine of 1437 contingency planners, 76%

More information

Disaster Recovery Plan Documentation for Agencies Instructions

Disaster Recovery Plan Documentation for Agencies Instructions California Office of Information Security Disaster Recovery Plan Documentation for Agencies Instructions () November 2009 SCOPE AND PURPOSE The requirements included in this document are applicable to

More information

Traditional Backups Vs. Backup and Disaster Recovery and Continuity (BDR-c)

Traditional Backups Vs. Backup and Disaster Recovery and Continuity (BDR-c) Traditional Backups Vs. Backup and Disaster Recovery and Continuity (BDR-c) Purpose of backing things up Cybernut Solutions provides outsourced IT support from a wealth of knowledgeable technicians and

More information

Combining Onsite and Cloud Backup

Combining Onsite and Cloud Backup Combining Onsite and Cloud Backup How businesses of all sizes can protect growing volumes of data and their bottom line Copyright Acronis, Inc., 2002 2012 ompanies of all sizes are dealing with large and

More information

Technology Recovery Plan Instructions

Technology Recovery Plan Instructions State of California California Information Security Office Technology Recovery Plan Instructions SIMM 5325-A (Formerly SIMM 65A) September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF

More information

NSI Solutions with Microsoft VSS

NSI Solutions with Microsoft VSS Published: March 2004 Abstract With the introduction of Volume Shadow Copy Service (VSS) in Microsoft Windows Server 2003 and Windows Storage Server 2003 and the strength of NSI Software Double-Take you

More information

Advent. Disaster Recovery: Options for Investment Managers. A White Paper from Advent Software and CyGem Ltd. Advent Software, Inc.

Advent. Disaster Recovery: Options for Investment Managers. A White Paper from Advent Software and CyGem Ltd. Advent Software, Inc. Advent Disaster Recovery: Options for Investment Managers A White Paper from Advent Software and CyGem Ltd. Advent Software, Inc. This communication is provided by Advent Software, Inc. for informational

More information

Whitepaper. Disaster Recovery as a Service (DRaaS): A DR solution for all

Whitepaper. Disaster Recovery as a Service (DRaaS): A DR solution for all Whitepaper Disaster Recovery as a Service (DRaaS): A DR solution for all Disaster Recovery as a service: A DR solution for all Disaster Recovery (DR) is more important today than ever before. Why? Because

More information

The case for cloud-based disaster recovery

The case for cloud-based disaster recovery IBM Global Technology Services IBM SmartCloud IBM SmartCloud Virtualized Server Recovery i The case for cloud-based disaster recovery Cloud technologies help meet the need for quicker restoration of service

More information

CISM Certified Information Security Manager

CISM Certified Information Security Manager CISM Certified Information Security Manager Firebrand Custom Designed Courseware Chapter 4 Information Security Incident Management Exam Relevance Ensure that the CISM candidate Establish an effective

More information

University Executive Committee. IT Steering Group. IT Back-up and Recovery Policy (Data)

University Executive Committee. IT Steering Group. IT Back-up and Recovery Policy (Data) University Executive Committee IT Steering Group IT Back-up and Recovery Policy (Data) Background In March 2007 the Audit Committee received an IT Position Audit report from the Business Assurance Service

More information

The Cost Savings of Archiving

The Cost Savings of Archiving The Cost Savings of Archiving The Case for Archiving There are many reasons why organizations should archive their electronic communication data. Some of those reasons include the following points. High

More information

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices September 2008 Recent advances in data storage and data protection technology are nothing short of phenomenal. Today,

More information

BACKUP SECURITY GUIDELINE

BACKUP SECURITY GUIDELINE Section: Information Security Revised: December 2004 Guideline: Description: Backup Security Guidelines: are recommended processes, models, or actions to assist with implementing procedures with respect

More information

Creating a Catalog for ILM Services. Bob Mister Rogers, Application Matrix Paul Field, Independent Consultant Terry Yoshii, Intel

Creating a Catalog for ILM Services. Bob Mister Rogers, Application Matrix Paul Field, Independent Consultant Terry Yoshii, Intel Creating a Catalog for ILM Services Bob Mister Rogers, Application Matrix Paul Field, Independent Consultant Terry Yoshii, Intel SNIA Legal Notice The material contained in this tutorial is copyrighted

More information

Application / Hardware - Business Impact Analysis Template. MARC Configuration Requirements. Business Impact Analysis

Application / Hardware - Business Impact Analysis Template. MARC Configuration Requirements. Business Impact Analysis Application / Hardware - Business Impact Analysis Template The single most important thing we can do is help you understand the criticality of each application, supporting hardware/server/pc and the required

More information

Running Successful Disaster Recovery Tests

Running Successful Disaster Recovery Tests Running Successful Disaster Recovery Tests Understanding the DR Process Running Successful Disaster Recovery Tests Understanding the DR Process Presented by Ray Lucchesi President Silverton Consulting,

More information

The Shift Cloud Computing Brings to Disaster Recovery

The Shift Cloud Computing Brings to Disaster Recovery The Shift Cloud Computing Brings to Disaster Recovery Mike Klein President, Online Tech June 21, 2010 Disasters Happen WHY DISASTER RECOVERY? How Do You Recover All of Your Electronic Assets? Recover Your

More information

Considerations when Choosing a Backup System for AFS

Considerations when Choosing a Backup System for AFS Considerations when Choosing a Backup System for AFS By Kristen J. Webb President and CTO Teradactyl LLC. October 21, 2005 The Andrew File System has a proven track record as a scalable and secure network

More information

How To Protect Data On Network Attached Storage (Nas) From Disaster

How To Protect Data On Network Attached Storage (Nas) From Disaster White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains

More information

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0 DISASTER RECOVERY Omniture Disaster Plan June 2, 2008 Version 2.0 CHAPTER 1 1 Disaster Recovery Plan Overview In the event that one of our data collection environments are unavailable due to an event,

More information

How to Build a Disaster Recovery Plan

How to Build a Disaster Recovery Plan How to Build a Disaster Recovery Plan Best Practices, Templates & Tools E-BOOK EXECUTIVE SUMMARY How do you start building a DR plan? While there are lots of tools from vendors, it s hard to find a practical

More information

Using the NDMP File Service for DMA- Driven Replication for Disaster Recovery. Hugo Patterson

Using the NDMP File Service for DMA- Driven Replication for Disaster Recovery. Hugo Patterson Using the NDMP File Service for DMA- Driven Replication for Disaster Recovery Hugo Patterson Connectathon 2006 Data Protection Today Clients DMA App Server Tape library Offsite Storage Backup to tape Put

More information

Business Continuity Plans- Technology. Preparation Instructions. Inventory and Assessment. System Backup Procedures

Business Continuity Plans- Technology. Preparation Instructions. Inventory and Assessment. System Backup Procedures Business Continuity Plans- Technology Preparation Instructions Lutheran Community Services Northwest has operational offices in almost 30 separate locations throughout the states of Washington, Oregon,

More information

Business Continuity Overview

Business Continuity Overview Business Continuity Overview Beverley A. Retjos Senior Manager WW SWG Security & Controls 03/12/07 Business Continuity Management (BCM) Process of ensuring that a business is prepared to survive any disruption

More information

The Benefits of Integrated. Cloud Recovery as a Service

The Benefits of Integrated. Cloud Recovery as a Service The Benefits of Integrated Cloud Recovery as a Service The Benefits of Integrated Cloud Backup and Recovery Cloud computing is today s hottest topic in IT. Businesses of all sizes are trying to achieve

More information

9/3/2009. Information Systems Disaster Recovery. Learning Objectives. Why have a plan? unexpected? APPA-Institute for Facilities Management

9/3/2009. Information Systems Disaster Recovery. Learning Objectives. Why have a plan? unexpected? APPA-Institute for Facilities Management Information Systems Disaster Recovery APPA-Institute for Facilities Management J. Craig Klimczak, D.V.M., M.S. Vice-Chancellor for Technology St. Louis Community College 300 South Broadway St. Louis, MO

More information

Identify and Protect Your Vital Records

Identify and Protect Your Vital Records Identify and Protect Your Vital Records INTRODUCTION The Federal Emergency Management Agency s Federal Preparedness Circular 65 states The protection and ready availability of electronic and hardcopy documents,

More information

Providing a quality IT Support & Consultancy service in the South East

Providing a quality IT Support & Consultancy service in the South East Providing a quality IT Support & Consultancy service in the South East At M2 Computing, we provide flexible, affordable IT consultancy and systems support across the South East. With a proven track record

More information

Union County. Electronic Records and Document Imaging Policy

Union County. Electronic Records and Document Imaging Policy Union County Electronic Records and Document Imaging Policy Adopted by the Union County Board of Commissioners December 2, 2013 1 Table of Contents 1. Purpose... 3 2. Responsible Parties... 3 3. Availability

More information

Why Should Companies Take a Closer Look at Business Continuity Planning?

Why Should Companies Take a Closer Look at Business Continuity Planning? whitepaper Why Should Companies Take a Closer Look at Business Continuity Planning? How Datalink s business continuity and disaster recovery solutions can help organizations lessen the impact of disasters

More information

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP

More information

Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business. www.integrit-network.com

Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business. www.integrit-network.com Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business www.integrit-network.com Business Continuity & Disaster Survival Strategies for the Small & Mid Size Business AGENDA:

More information

TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY FREQUENTLY ASKED QUESTIONS OVERVIEW CORPORATE CONTINUITY PROGRAM.

TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY FREQUENTLY ASKED QUESTIONS OVERVIEW CORPORATE CONTINUITY PROGRAM. TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY FREQUENTLY ASKED QUESTIONS July 2015 OVERVIEW The intent of this document is to provide external customers and auditors with a high-level overview of the

More information

Managed IT Services. Eliminating technology pains for small businesses

Managed IT Services. Eliminating technology pains for small businesses Eliminating technology pains for small businesses Having a complete IT department is not a viable solution for most small businesses, and very few small companies can afford to deploy even one permanent

More information

DISASTER RECOVERY: PLANNING AHEAD FOR BUSINESS CONTINUITY

DISASTER RECOVERY: PLANNING AHEAD FOR BUSINESS CONTINUITY DISASTER RECOVERY: PLANNING AHEAD FOR BUSINESS CONTINUITY OCTOBER 2012 Sponsored by Contingency planning for IT is a step businesses should take to ensure continuity and production in a state of emergency.

More information

Optimizing Backup and Data Protection in Virtualized Environments. January 2009

Optimizing Backup and Data Protection in Virtualized Environments. January 2009 Optimizing Backup and Data Protection in Virtualized Environments January 2009 Introduction The promise of maximizing IT investments while minimizing complexity has resulted in widespread adoption of server

More information

Technical Considerations in a Windows Server Environment

Technical Considerations in a Windows Server Environment Technical Considerations in a Windows Server Environment INTRODUCTION Cloud computing has changed the economics of disaster recovery and business continuity options. Accordingly, it is time many organizations

More information

Audit of the Disaster Recovery Plan

Audit of the Disaster Recovery Plan Audit of the Disaster Recovery Plan Report # 11-05 Prepared by Office of Inspector General J. Timothy Beirnes, CPA, Inspector General Kit Robbins, CISA, CISM, CRISC, Lead Information Systems Auditor TABLE

More information

W H I T E P A P E R. Disaster Recovery: You Can Afford It

W H I T E P A P E R. Disaster Recovery: You Can Afford It W H I T E P A P E R Disaster Recovery: You Can Afford It Preparing for a data disaster is one of those projects that is always getting delayed in small and medium sized businesses. The daily proverbial

More information

Maintenance Connection Disaster Recovery Plan

Maintenance Connection Disaster Recovery Plan Maintenance Connection Disaster Recovery Plan Last Revised: January 2014 Maintenance Connection, Inc. 1477 Drew Ave. Suite 103 Davis, CA 95695 8885673434 1 Introduction Maintenance Connection s Disaster

More information

How To Choose A Business Continuity Solution

How To Choose A Business Continuity Solution A Business Continuity Solution Selection Methodology Ellis Holman IBM Corp. Tuesday, March 13, 2012 Session Number 10387 Disclaimer Copyright IBM Corporation 2010. All rights reserved. U.S. Government

More information

Disk-to-Disk-to-Tape (D2D2T)

Disk-to-Disk-to-Tape (D2D2T) Where Disk Fits into Backup Tape originated in the 1950 s as the primary storage device for computers. It was one of the first ways to store data beyond the memory of a computer, which at the time was

More information

How To Get A Backup Service From Ronald Eyres

How To Get A Backup Service From Ronald Eyres R 0 RE Cloud Backup as a Service and Reliable DR Introduction RE Cloud BaaS is a complete replacement for on-premise backup and offsite data protection. It offers all the benefits of the most advanced

More information

Data Center Assistance Group, Inc. DCAG Contact: Tom Bronack Phone: (718) 591-5553 Email: bronackt@dcag.com Fax: (718) 380-7322

Data Center Assistance Group, Inc. DCAG Contact: Tom Bronack Phone: (718) 591-5553 Email: bronackt@dcag.com Fax: (718) 380-7322 Business Continuity and Disaster Recovery Job Descriptions Table of Contents Business Continuity Services Organization Chart... 2 Director Business Continuity Services Group... 3 Manager of Business Recovery

More information

Library Recovery Center

Library Recovery Center Library Recovery Center Ever since libraries began storing bibliographic information on magnetic disks back in the 70 s, the challenge of creating useful back-ups and preparing for a disaster recovery

More information

Data Loss in a Virtual Environment An Emerging Problem

Data Loss in a Virtual Environment An Emerging Problem Data Loss in a Virtual Environment An Emerging Problem Solutions to successfully meet the requirements of business continuity. An Altegrity Company 2 3 4 5 Introduction Common Virtual Data Loss Scenarios

More information

Information Management Advice 18 - Managing records in business systems: Overview

Information Management Advice 18 - Managing records in business systems: Overview Information Management Advice 18 - Managing records in business systems: Overview Introduction The purpose of this Advice is to assist agencies to identify and manage State records in business systems,

More information

Checklist For Business Recovery

Checklist For Business Recovery Checklist For Business Recovery Completed By: Name: Company: Room: Street: City, State, Zip: Phone #: Business Recovery Plan for: Business Recovery Plan (BRP)--LEVEL 1 (Executive Awareness/Authority) 1.

More information

Business Continuity Plan

Business Continuity Plan Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions

More information

CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT

CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT JANUARY 2008 GUIDELINE ON BUSINESS CONTINUITY GUIDELINE CBK/PG/14

More information

Total Cost of Ownership Analysis

Total Cost of Ownership Analysis Total Cost of Ownership Analysis Abstract A total cost of ownership (TCO) analysis can measure the cost of acquiring and operating a new technology solution against a current installation. In the late

More information