1 IBM Business Continuity and Resiliency Services January 2009 Business resilience: The best defense is a good offense Develop a best practices strategy using a tiered approach
2 Page 2 Contents 2 Introduction 3 What is business resilience? Are you ready? What are business risks? Key challenges Using a tiered approach for resilience 11 Benefits of resilience tiers 12 How you can use resilience tiers 13 Who should define the tiered metrics? 13 Four levels of resilience 19 Summary Introduction In the world we live, disaster recovery is not an option, it s a must. But is just thinking about disaster recovery limiting your view point? Should you consider a broader approach that is systematic and proactive, instead of reactive? At a time when you need it most, a strong business resilience strategy can save you time, effort and money. Instead of typical strategies and execution for recovery, with business resilience strategies in place, your business can be ready right from the start. Perhaps you have heard of business resilience concepts, or maybe you have even considered implementing resiliency strategies in your organization but need guidance about what steps you need to take to optimize your investment and protection. This paper will provide you with a better understanding of the value of business resilience and how your IT architecture and management teams can use a tiered resilience approach to balance and align your technology capabilities and investments with your business requirements.
3 Page 3 Highlights Business resilience is the ability to rapidly adapt and respond to risks. What is business resilience? Business resilience is the ability to rapidly adapt and respond to business disruptions and to maintain continuous business operations, be a more trusted partner, and enable growth. True business resilience starts with understanding exactly what your business needs in order to survive unexpected events and plan ahead for challenges that could come at any time. Whether an event is IT related, business related, or a natural disaster, there will always be challenges to overcome. Think of business resilience as your ticket to continued business service and operational continuity proper planning, readiness, and the ability to respond quickly to any threat or opportunity. Focusing only on disasters lead organizations to work defensively, but a proactive approach to business resilience helps enable your organization to respond to an unexpected event more quickly and more cost-effectively. In addition to disaster situations, a strong business resilience program can help your organization prepare for audits and demonstrate compliance with regulatory requirements. Perhaps you already have a disaster recovery plan in place. Isn t that good enough? When it comes to data privacy and system outages, and your business is on the line, there is no such thing as good enough. Business resilience is important because effective resilience strategies enable you to avoid costly downtime, avert many security attacks, and lessen the impact of other catastrophic events.
4 Page 4 With the constant-changing landscapes of today s business environments, are you ready? In our constantly changing business environments, organizations face increasing risk exposures due to greater global and regional dependencies, in addition to complications with supply chains and global demands. In tight, competitive markets and uncertain economic times, brand vulnerabilities and data integrity risks also top the priority list. However, perhaps the most common vulnerability is business disruption or downtime. When day-to-day business is disrupted, for any reason, the financial impact can ruin your business. The indirect impacts of downtime such as lost market share, decreased productivity, regulatory non-compliance and damaged reputation are equally damaging. To get an idea as to if your business is ready for the next threat, interruption or challenge, ask yourself the following questions: Have you recently experienced a disruption? What impact did it have on your operations? What risks pose the greatest threat to your continuous business operations? Are your business operations sufficiently scalable to accommodate a major increase in workload, in response to a spike in demand for your services? How does your current recovery capacity match your peak business processing volumes? Have you considered the resilience capabilities of your key business partners and third-party service providers?
5 Page 5 Highlights Business risks can be event driven, data driven or even business driven. What are business risks exactly? Your business is exposed to risks that can come from all directions and in many scenarios. Business risks can be event driven, data driven, or even business driven. These risks are more prevalent during events that are triggered by regional power failures or natural disasters. However, your business is also at risk from relatively minor incidents. In fact, most disasters are the result of a collection of relatively small events happening at the same time in response to a common trigger. During data-driven events such as virus attacks, data corruption, disk failure, application outages, and network problems, you can minimize your exposure if you fully understand and prepare for, or even prevent a disastrous event. The same can be said for business-driven risks such as audits, new product roll-outs, future marketing promotions, or even failure to meet industry standards. If you are prepared for these events, you are in a better position to react faster, meet requirements and often exceed expectations. Event-driven risks such as natural disasters, regional power outages, acts of war, or even economic downturns can be minimized if you identify your vulnerabilities and plan accordingly. If your resilience strategy plans for these events, the actual impact to your business can be reduced.
6 Page 6 The following illustration provides an overview of specific data, business and event-driven risks as well as estimated monetary consequences: The curve on this chart follows an approximate $100,000,000 cost of outage. Consider that small cost outages that happen frequently have been reasonably well addressed by technology solutions such as antivirus software and firewalls, etc. Disk failure and data corruption problems have also been reduced or eliminated by technology-related solutions. Organizations now need to address business and event disruptions that are lower in probability, but of much greater impact should they occur. By identifying potential vulnerabilities, you can design resilience solutions so that you are ready to respond and minimize impact of disruptive events.
7 Page 7 Highlights Key challenges Viewing resilience as a strategic enabler Defining the value of business resilience Working with advanced technologies Maintaining continuous availability for your business services Key challenges Implementing any resilience plan comes with challenges. One of the key challenges is assessing risk versus cost how vulnerable are you and how much will it cost to protect you? A second challenge is moving executives away from an insurance mentality and toward viewing resilience as a strategic enabler. In today s tight economic climate, there is intense internal competition for resources. Rationalizing the return on investment of resilience strategies can be difficult. From an IT perspective, many companies face complex challenges when dealing with advanced technologies. For example, many organizations use security technologies such as firewalls and encryption. If your organization is faced with a disruptive event or outage, will you be able to provide continuous availability for business service? If, in fact, you use these technologies, implementing alternative resources during disruptive events for high availability is the key to proper preparation. Effective business resilience strategies can help you identify alternative solutions and plan for those times when you need it most.
8 Page 8 A major challenge for many organizations is determining which solution is best and provides the optimum amount of protection. Once this decision is made, procuring funding is often the next challenge. A key to successful business resilience is fully understanding the level of protection your business needs and then creating a strategic plan accordingly. This will help protect you from wasting money on unnecessary technologies, while still providing effective business resilience. Getting executive support for funding is more easily facilitated when a sound plan can demonstrate the value of business resilience across the organization accounting for business, workforce and technology requirements. Perhaps the most overlooked challenge with resilience planning is the human factor. During times of distress and chaos, organizations focus available resources on responding to difficult situations. Often, individuals work around the clock until the situation is resolved. Sustaining overworked personnel may not be an effective business strategy, especially when a crisis is at hand. In times of crisis, you need your employees at peak performance. An effective business resilience approach can help you take a look at potential risks and plan your workloads accordingly. When making a mistake is not an option,
9 Page 9 Highlights this type of strategy reduces stress on your employees and cuts down on potential human errors due to overworked personnel. You can also develop strategies for times when your workforce may be unavailable, during a natural disaster, for example. Using resilience tiers as a best practice for defining your architectural approach The most effective resilience planning comes from understanding your situational and organizational needs before a disastrous event can occur. Resilience tiers help you accomplish this. Resilience tiers help you understand how much resilience you really need throughout your entire enterprise, and also help you identify how to optimize your investment. Resilience tiers classify business resilience requirements into a set of consistent technology metrics and criteria. Resilience tiers use a classification system that defines levels of resilience to match your business-driven requirements. Resilience tiers span all business units, services or technologies, and streamline the direction for building a resilient architecture. Resilience tiers provide an objective scale of classification for business resilience requirements a set of consistent metrics and criteria across your organization that are then linked to technical
10 Page 10 resilience requirements and capabilities. Business resilience requires an architectural approach that also spans the breadth of enterprise capabilities. Resilience tiers provide that approach by: Defining a broad continuum of business resilience requirements that apply to all IT-enabled processes and services in an enterprise Linking those requirements to a set of technology domains that address all capabilities and resources in the IT environment Providing technical characteristics, criteria and metrics that enable the results to be measured against business resilience expectations and to be monitored and managed for ongoing operations For example, consider the different expectations and terminology for availability requirements used by IT executives and business executives. IT architects and executives analyze performance in uptime measurements, typically IT service level agreements that exclude non-operating hours, such as maintenance windows. However, a business executive assesses performance in terms of the tangible availability of business services, regardless of the cause of disruption. From a business perspective, there is no distinction between availability and uptime. A true resilience measure is holistic, viewing the availability of a robust business service and not an availability average of each functional component.
11 Page 11 Highlights Resilience tiers help rationalize the optimum resilience solutions. Benefits of resilience tiers Defining, developing and maintaining resilience tiers and associated resilience capabilities have a number of benefits to an enterprise, such as: Business-to-IT alignment Rationalization of investments in resilience capabilities Improvements to enterprise risk planning, strategy and architecture More prescriptive management of the IT environment to achieve enterprise-wide business resilience Resilience tiers can also help with gap analysis across the business, service and technology domain levels, as well as with the reuse and integration of resilience solutions aligned to resilience tiers with solution architectures. Another benefit is that traditionally, disaster recovery managers own the budget for disaster recovery and IT development, while operation managers have the need to design resiliency into their technical solutions. Resilience tiers help bridge the communications and planning gap for business continuity resilience and planning. In addition, resilience tiers can help you pursue resilience requirements as an integrated, enterprise-wide approach that achieves greater affordability for your organization.
12 Page 12 How you can use resilience tiers There are multiple scenarios in which you can use tiers to strategize and align with your business resilience needs. For example, for new application development and deployment, resilience tiers provide the comprehensive set of definitions, technical characteristics, criteria, and metrics that you need to design to specific service levels of service. Using this objective and quantitative approach as part of the non-functional requirements definition and prioritization will ensure that the resilience objectives and acceptable costs, will be integral to the overall service quality. In addition, the cost and time to design into new applications is much cheaper as opposed to retrofitting into a production environment that is experiencing operational outages. An organization can also use resilience tiers for guidance to mitigate the potential chaos caused by situations such as mergers and acquisitions. The merger of two IT organizations can result in differing, and sometimes even incompatible processes for managing day-to-day operations as well as lengthy debates and delays in prioritizing new development and deploying new technologies. Resilience tiers provide a framework for selecting best practices from each, enabling two IT organizations to align to a single, target architecture. Resilience tiers can help to reconcile business resilience requirements and to guide the infrastructure requirements, architectural design decisions and major initiatives that will be implemented to achieve the future state resilient IT environment.
13 Page 13 Highlights Resilience tiers help define a framework that addresses all infrastructure components. Lastly, resilience tiers are a critical element in cloud computing initiatives. A tiered resilience approach enables you to define a replicable and measurable framework that can address all infrastructure components including storage, networking and load balancing, and that can scale to address a range of client resilience requirements. In addition, the tiered resilience approach applies to a wide range of architectural patterns and resilience solutions such as redundancy, clustering, grid, virtualization and replication. Who should define and maintain resilience tiers? In general, definition of resilience tiers is a team responsibility. The primary teams are service level management team (IT) and business representatives; they should take responsibility for the definition, documentation, maintenance and communication of the resilience tiers. Secondary teams should include enterprise, business, information system (IS) and IT architecture teams as well as the requirements management team; they should contribute and support the primary team effort. Four levels of resilience IBM has a four-tier approach to resilience tiers. Each tier serves as a set of design guidelines that specify the characteristics of industry best practices for each of eight technology domains: facilities, network, storage, server, database management system (DBMS), middleware, application architecture, and systems management. These domains span the four resilience tiers defined by IBM as Platinum, Gold, Silver and Bronze; while IBM categorizes these tiers as such, some technology professionals may refer to resilience tiers as Tier 1, 2, 3, and 4, or Priority I, II, III, and IV, or even as critical, essential, routine, and nonessential business applications. More important than the labels is each
14 Page 14 Highlights resilience tier translates into defined metrics categories, such as availability targeted typically defined as percent, percent, 99.9 percent and 99.5 percent for Platinum, Gold, Silver and Bronze, respectively as provided in the following table: Four levels of resilience: Platinum Resilience Tiers Platinum Gold Silver Bronze Gold Silver Bronze Service level Business Business Business Non-critical, objectives functions that, if unavailable, will result in either financial or legal penalties based on regulatory restrictions. Typically assigned to the top 5 to 10 percent of applications that drive revenue and profits, and that highly impact brand reputation. functions that present a potentially broad impact across the internal organization. During critical processing windows cannot afford to be without this function. functions that support backoff functions such as analysis and reporting. back-end, offline business functions. Typically alternate, but less desirable, methods are available to achieve same business function to support tolerance for extended outages. Service level Continuous Near continuous High availability Moderate availability availability percent 99.9 percent availability requirements percent Up to four hour Up to four hour 99.5 percent Zero planned outages planned outages (maintenance) planned outages (maintenance) Service level Return to service Local: Return to Return to Local: Return to recoverability in less than five service in less service in less service in less requirements minutes (all events). than five minutes. Data Center: Return to service in less than two hours. than two hours (all events). than eight hours. Data Center: Return to service in less than in specified timeframe (days to weeks).
15 Page 15 As an example, let s analyze the four resilience tiers for defining data storage availability. The Platinum resilience tier defines this as access to data that is always available; whereas the Bronze resilience tier classifies this as a best effort to provide access to data in a defined availability window. Depending on what your business resilience requirements are, either level might provide adequate data storage availability; however, the Platinum resilience tier provides a constant level of availability. The recoverability strategy for the Platinum resilience tier reduces return to service to less than five minutes for all events, where as the Bronze resilience tier classifies return to service in less than eight hours for local recovery only, and up to two weeks for the data center. Again, depending on what your business requirements are, either level could provide adequate recoverability; however, the Platinum resilience tier provides the fastest recoverability for your most mission-critical business functions.
16 Page 16 Highlights Understanding the delivery requirements of specific levels of resilience ensures your strategy will provide the optimum amount of resilience. While many organizations may not need Platinum level resilience, continuous availability is mandatory for some organizations such as core banking operations, space and defense operations, and telecom industries. Understanding the requirements and solutions that enable delivery of specific levels of resilience ensures that your strategy will provide the optimum amount of resilience for your organization. Resilience tiers enable you to selectively invest in priority business resilience needs and to prioritize your needs. As another example, IBM used resilience tiers to help a major financial services institution redesign their availability architecture. This customer identified the following problems: The application development teams were building and rolling out solutions without structure such as rules, documentation, and evaluation with other teams. The IT services and support organization lacked an availability and recoverability classification framework for IT service offerings. The enterprise architecture team did not have a method for defining or assessing the IT architecture domains and service classes. Across the enterprise, there was no common view of what best practices should guide the development of service classes or resilience tiers.
17 Page 17 Highlights Using the tiered approach, IBM mapped service level requirements with the existing technology portfolio and identified potential remediation activities. IBM consultants used the resilience tier approach to help this client establish a common framework to address all of these issues. The consulting team started with an assessment to identify gaps between the installed technology components and the baseline technology characteristics associated with the resilience tiers. IBM consultants conducted interviews to understand the operational environment of these applications, including infrastructure, database, and application components. A representative set of outage scenarios was reviewed and inherent infrastructure pain points were identified. Based on the information received, IBM was able to identify specific gaps in the infrastructure, measured against the baseline technology characteristics, and to assign a relative risk for the availability gaps identified. Using the tiered approach, IBM then mapped service level requirements with the existing technology portfolio. As a result, IBM identified potential remediation activities to close those identified gaps. The goal of this assessment was to define a set of immediate, tactical actions to improve availability of IT systems. Some of the tactical actions also directly supported the development of a longer term, strategic roadmap of major initiatives that would help the client meet business availability expectations for the in-scope applications; this roadmap included project milestones and high level cost estimates.
18 Page 18 As a result of the IBM engagement, the bank s IT organization adopted a framework for classifying and defining resilience tiers for their critical applications. They also initiated a collaborative effort between the Application Development and IT Operations Services leadership (senior executives) to assess the remaining portfolio of critical business applications. This client identified IBM s value propositions as: IBM s resilience tiers were accepted as a best-practice technique for classifying and grouping business applications. The customer s enterprise architecture team adopted IBM s framework for assessing its portfolio of critical applications. The customer adopted the resilience tiers for future assessment of availability and recoverability requirements for new business applications. As a result, the resilience tiers became a unification tool for gaining consensus across all IT teams.
19 Page 19 Summary The tiered approach to resilience can help you plan for intrusive events proactively. This helps you maximize your return on investment from assets, technology and people at the time when you need it most. Using resilience tiers to develop effective long-term strategies ensures that shorter term tactical actions are properly aligned and help your organization progress along the resilience maturity continuum. But keep in mind, you do not need to accomplish this all at once; business resilience is a journey. Investing in proper assessment and design up front will help make sure that your longterm resilience investments preserve value over time. The IBM Resiliency Consulting team can draw upon our global reach with many years of experience as an asset based business, equipped with specialized tools. We can also draw upon experiences of exposure to companies around the world facing similar issues. So when you need help, IBM is ready to assist. We can help you analyze your organization s requirements, goals, and budget to find out exactly what level of resilience you need. We can help you define a roadmap to get there. We help you prioritize a set of milestones and measurements and a solution designed to improve the resiliency of your business. We help you establish your own best defense using a resilience tiers approach.
20 For more information For more information about our business continuity and resiliency consulting services, please contact your IBM representative or visit: ibm.com/services/bcrs Additionally, IBM Global Financing can tailor financing solutions to your specific IT needs. For more information on great rates, flexible payment plans and loans, and asset buyback and disposal, visit: ibm.com/financing Copyright IBM Corporation 2009 IBM Global Services Route 100 Somers, NY U.S.A. Produced in the United States of America January 2009 All Rights Reserved IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol ( or ), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at Copyright and trademark information at ibm.com/legal/copytrade.shtml References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM operates. BUW03008-USEN-00
IBM Global Technology Services Thought Leadership White Paper May 2011 Business resilience: Providing targeted resilience solutions for the enterprise Develop a best-practices resilience strategy using
IBM Global Technology Services Thought Leadership White Paper October 2011 Supporting information technology risk management It takes an entire organization 2 Supporting information technology risk management
IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary
Risk mitigation for business resilience White paper A comprehensive, best-practices approach to business resilience and risk mitigation. September 2007 2 Contents 2 Overview: Why traditional risk mitigation
Security solutions To support your business objectives Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives. For an On Demand Business, security
IBM Global Technology Services IBM SmartCloud IBM SmartCloud Virtualized Server Recovery i The case for cloud-based disaster recovery Cloud technologies help meet the need for quicker restoration of service
IBM Global Technology Services How to integrate cloud-based disaster recovery into your existing business continuity plans Richard Cocchiara: IBM Distinguished Engineer; CTO IBM Business Continuity & Resiliency
Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success
-oriented architecture White paper March 2009 Introduction to SOA governance and Best practices for development and deployment Bill Brown, executive IT architect, worldwide SOA governance SGMM lead, SOA
The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
IBM Global Technology Services March 2008 Virtualization for disaster recovery: Page 2 Contents 2 Introduction 3 Understanding the virtualization approach 4 A properly constructed virtualization strategy
Service quality management solutions To support your business objectives Implement a unified approach to service quality management. Highlights Deliver high-quality software applications that meet functional
Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER CONTENTS ADAPTING TO THE CONSTANTLY CHANGING ENVIRONMENT....................... 1 THE FOUR KEY BENEFITS OF AUTOMATION..................................
IBM Solution Architecture for Energy and Utilities Framework Accelerating Solutions for Smarter Utilities The IBM Solution Architecture for Energy and Utilities Framework Providing a foundation for solutions
IBM Netcool network management solutions for enterprise The big picture view that focuses on optimizing complex enterprise environments Highlights Enhance network functions in support of business goals
IBM Global Technology Services White Paper IBM Business Continuity and Resiliency Services Using the cloud to improve business resilience Choose the right managed services provider to limit reputational
Simplifying storage processes and ensuring business continuity and high availability IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity The risks are even greater for companies that
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Business Continuity Trends, Requirements and Expectations in 2009 Brian Zawada (MBCP) Director of Consulting Services Avalution Consulting Overview What Is Business Continuity? The Value Proposition What
White paper September 2009 Realizing business value with mainframe security management Page 2 Contents 2 Executive summary 2 Meeting today s security challenges 3 Addressing risks in the mainframe environment
White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK By James Christiansen, VP, Information Management Executive Summary The Common Story of a Third-Party Data Breach It begins with a story in the newspaper.
IBM Sales and Distribution White paper Create Operational Flexibility with Cost-Effective Cloud Computing Chemicals and petroleum 2 Create Operational Flexibility with Cost-Effective Cloud Computing Executive
How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 2 How does IBM deliver cloud security? Contents 2 Introduction 3 Cloud governance 3 Security governance, risk management
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture 2 Data Security and Privacy Principles for IBM SaaS Contents 2 Introduction
IBM Global Services Information technology infrastructure key to your business success. In today s complex business environment, new opportunities constantly emerge, which can challenge a company s ability
Service management IT service management: resetting priorities for an uncertain economy. Smarter management for a dynamic infrastructure Richard Esposito, vice president, IT strategy and architecture services,
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
IBM Global Services October 2005 Beyond disaster recovery: becoming a resilient business. An object-oriented framework and methodology by Richard Cocchiara Chief technology officer for business resilience
Achieve Economic Synergies by Managing Your Human Capital In The Cloud By Orblogic, March 12, 2014 KEY POINTS TO CONSIDER C LOUD S OLUTIONS A RE P RACTICAL AND E ASY TO I MPLEMENT Time to market and rapid
Global Technology Services Research Report Risk Management The economics of IT risk and reputation What business continuity and IT security really mean to your organization Findings from the IBM Global
IBM Software Thought Leadership White Paper September 2010 Effective storage management and data protection for cloud computing Protecting data in private, public and hybrid environments 2 Effective storage
IBM Sales and Distribution Chemicals and Petroleum White Paper Tapping the benefits of business analytics and optimization A rich source of intelligence for the chemicals and petroleum industries 2 Tapping
IBM Software Thought Leadership White Paper August 2014 Applying IBM Security solutions to the NIST Cybersecurity Framework Help avoid gaps in security and compliance coverage as threats and business requirements
IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.
IBM Software IBM TRIRIGA: The power of true integration in workplace management solutions 2 IBM TRIRIGA: The power of true integration in workplace management solutions Introduction In today s increasingly
IBM business performance management solutions White paper Establishing a business performance management ecosystem. IBM Software Group March 2004 Page 2 Contents 2 Executive summary 3 Business performance
Change GovernancE Serena Change Governance Executive Brief Change. Your organization can t escape it. But it can take advantage of it. Globalization. Regulatory compliance. Competitive pressures. Mergers
IBM Global Services September 2008 Reaping the rewards of your serviceoriented architecture infrastructure How real-life organizations are adding up the cost savings and benefits Executive summary Growing
IBM Unstructured Data Identification and Management Discover, recognize, and act on unstructured data in-place Highlights Identify data in place that is relevant for legal collections or regulatory retention.
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
IBM Global Technology Services Thought Leadership White Paper April 2014 The seven essential practices for effective business continuity management Building a business-centric program to help reduce risk
Using metadata to understand data in a hybrid environment Table of contents 3 The four pillars 4 7 Trusting your information: A business requirement 7 9 Helping business and IT talk the same language 10
White Paper Intel Information Technology Computer Manufacturing Information Security Measuring the Return on IT Security Investments Intel IT developed a model for measuring return on security investment
Transforming your content into a trusted, strategic asset Agile enterprise content management and the IBM Information Agenda. Delivering a common information framework for uncommon business agility Highlights
WHITE PAPER By Tony Thomas Senior Network Engineer and Product Manager Numara TM Software Inc. ADAPTING TO THE CONSTANTLY CHANGING IT ENVIRONMENT The challenge in controlling the corporate IT infrastructure
Achieving Control: The Four Critical Success Factors of Change Management Technology Concepts & Business Considerations T e c h n i c a l W H I T E P A P E R Table of Contents Executive Summary...........................................................
IBM Software White paper December 2010 Reduce your data storage footprint and tame the information explosion 2 Reduce your data storage footprint and tame the information explosion Contents 2 Executive
IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM
IBM Global Services June 2003 Deploying Resilient Customer Relationship s Anju Bhargava, Jackye Malloy Jones, Frank Rodegeb, Rob Bucci Page 2 Contents 2 Introduction - CRM is a Corporate Strategy 3 CRM
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
Neverfail Solutions for VMware: Continuous Availability for Mission-Critical Applications throughout the Virtual Lifecycle Table of Contents Virtualization 3 Benefits of Virtualization 3 Continuous Availability
IBM Software December 2010 Leverage the IBM Tivoli advantages in storage management IBM Tivoli storage management solutions outperform the competition 2 Leverage the IBM Tivoli advantages in storage management
A Custom Technology Adoption Profile Commissioned By EMC Corporation How Organizations Are Improving Business Resiliency With Continuous IT Availability February 2013 Introduction: Business Stakeholders
Proactive Performance Management for Enterprise Databases Abstract DBAs today need to do more than react to performance issues; they must be proactive in their database management activities. Proactive
Asset management Your asset is your business. The more challenging the economy, the more valuable the asset becomes. Decisions are magnified. Risk is amplified. Data is about more than numbers. It tells
Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able
Operational Risk Management - The Next Frontier The Risk Management Association (RMA) Operational risk is not new. In fact, it is the first risk that banks must manage, even before they make their first
IBM Software Cloud service delivery and management Rethink IT. Reinvent business. 2 Cloud service delivery and management Virtually unparalleled change and complexity On this increasingly instrumented,
Managed Services Buying Guide Eight ways to sustain 99.999% SLAs for vital business processes. In the real world. w w w. s t r a t u s. c o m Mission-critical SLAs demand mission-critical managed services.
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:
IBM Sales and Distribution IBM and Manhattan Associates Innovating across the supply chain and beyond 2 IBM and Manhattan Associates Market-leading companies realize that their supply chains are strategic
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
IBM Global Technology Services Business Continuity and Resiliency Services IBM index reveals key indicators of business continuity exposure and maturity Will a more holistic approach to business continuity
Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions
IBM ediscovery Identification and Collection Turning unstructured data into relevant data for intelligent ediscovery Highlights Analyze data in-place with detailed data explorers to gain insight into data
DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide
Consulting Services Consulting Services Injazat Consulting Injazat Consulting collaborates with its clients in the development of their businesses from an end-to-end perspective through the delivery of
IBM Global Business Services Navigating the Road to Growth and Success Bringing innovation and affordable solutions to the midmarket Midsize Business Table of contents Defining the midmarket........................................................................
ROUTES TO VALUE Business Service : How fast can you get there? BMC Software helps you achieve business value quickly Each Route to Value offers a straightforward entry point to BSM; a way to quickly synchronize
Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Cloud computing To support your business objectives Breaking through the haze: understanding and leveraging cloud computing. Intelligence explosion demands a new computing model A new, intelligent planet
IBM Academy of Technology Thought Leadership White Paper October 2010 Cloud computing insights from 110 implementation projects IBM Academy of Technology Survey 2 Cloud computing insights from 110 implementation
IBM Global Services April 2008 Five best practices for deploying a successful service-oriented architecture Leveraging lessons learned from the IBM Academy of Technology Executive Summary Today s innovative
Enhance visibility into and control over software projects IBM Rational change and release management software Accelerating the software delivery lifecycle Faster delivery of high-quality software Software
BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS Disasters happen. Don t wait until it s too late. OVERVIEW It s inevitable. At some point, your business will experience data loss. It could
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise