DISASTER RECOVERY RUN BOOK

Size: px
Start display at page:

Download "DISASTER RECOVERY RUN BOOK"

Transcription

1 Disaster Recovery Run Book Template Provided by Xtium, Inc [YOUR LOGO HERE] Date of Last Update: MM/DD/YYYY DISASTER RECOVERY RUN BOOK

2 Page 2 Foreword By Laura DuBois, Program Vice President, Storage, IDC The Disaster Recovery Imperative Nearly all organizations today rely on information technology and the data it manages to operate. Keeping computers and networks running, and data accessible, is imperative. Without this information technology, customers cannot be serviced, orders taken, transactions completed, patients treated, and on and on. Disasters that create IT downtime are numerous and common, spanning the physical and logical, the man-made and natural. Organizations must be resilient to these disasters, and able to operate in a disruption of any type, whether it is a security incident, human error, device failure, or power failure. State of Preparedness Most organizations know the importance of disaster recovery, and firms of all sizes are investing to drive greater uptime. An IDC study on business continuity and disaster recovery (DR) showed that unplanned events of most concern were power, telecom, and data center failures (physical infrastructure) more so than natural events such as fire or weather. Security was considered the second most critical and extreme threat to business resiliency. Seventy-one percent of those surveyed had as many as 10 hours of unplanned downtime over a 12-month period. This underscores the importance of greater uptime and DR, which is driving firms to conduct DR tests more frequently. Approximately one in four firms are conducting DR testing quarterly or monthly, while another 45% are testing semi-annually or annually. This is a marked increase from previous research, which IDC conducted three years ago, where firms were testing annually at best. However, 25% of firms are still not doing any DR testing. IDC Advice DR planning is complex and spans three key areas: technology, people, and process. From an IT perspective, planning starts with a business impact analysis (BIA) by application/workload. Natural tiers or stages of DR begin at phase 1 infrastructure (networking, AD, DHCP, etc.) then extend to recovery by application tiers. Each application tier should have an established recovery time objective (RTO) and recovery point objective (RPO) based on business risk. DR testing is essential to adequate recovery of systems and data, but also to uncover events or conditions met during real disasters scenarios that were not previously accounted for. Examples

3 Page 3 include change management such as the needed reconfiguration of applications or systems. Also, the recovery of systems in the right sequence is important. To ensure that DR testing, planning, and recovery is organized and effective, many organizations use a disaster recovery "run book." A DR run book is a working document, unique to every organization, which outlines the necessary steps to recover from a disaster or service interruption. It provides an instruction set for personnel in the event of a disaster, including both infrastructure and process information. Run books, or updates to run books, are the outputs of every DR test. However, a run book is only useful if it is up-to-date. If documented properly, it can take the confusion and uncertainty out the recovery environment which, during an actual disaster, is often in a state of panic. Using the run book template provided here by Xtium can make the difference for an organization between two extremes: being prepared for an unexpected event and efficiently recovering, or never recovering at all.

4 Page 4 Your Disaster Recovery Run Book A disaster recovery run book is a working document unique to every organization that outlines the necessary steps to recover from a disaster or service interruption. Run books should be updated as part of your organization s change management practice. For instance, once a production change has been committed, run book restoration instructions should be reviewed for accuracy. In addition to synchronizing run books with corporate change management, the outcomes and action plans of each DR test should also be incorporated into run book update cycles. How to Use this Template This template outlines the critical components of your disaster recovery and business continuity practices. Disaster recovery tests should be regularly conducted, reviewed, and plans subsequently updated. Use this template as a guide for documenting your disaster recovery test efforts. It includes sections to specify contact information, roles and responsibilities, disaster scenarios likely to affect your business and recovery priorities for your business IT assets. Keep in mind there may be more sections of a run book based on your deployment model; this template serves as a standard with all its sections applicable (and necessary) to any disaster recovery testing procedure. Similarly, your run book may look different if you are working with a managed service provider that handles most or all aspects of your disaster recovery tests. If you have further questions about DR tests, take a look at our disaster recovery testing guide, available for free at xtium.com, or contact us for more information.

5 Page 5 DR Scenarios Though not part of the run book itself, we re providing this section to list some common events that would cause DR scenarios. These threats are general and could affect any business, so you might also want to list those which would threaten your business specifically. Research firm Forrester outlined some of the most common causes of disaster scenarios from a 2011/2012 study. The findings illuminate the fact that your business should not just be prepared for the news-making types of disaster threats (hurricanes or tornados, for example). Instead, consider all these potential causes for disaster: Source:

6 Page 6 It is wise to also list disaster scenarios that are unique to, or are more likely to affect, your business. For each possibility, include details on the scenario, methods for data restoration on the part of the provider and your company, and procedures by which DR events will be initiated. For example: Scenario #1: List your first disaster scenario or business continuity threat here. Examples might include significant loss of hardware, a power outage of significant length, an infrastructure outage, disk corruption, or loss of most or all systems due to unavoidable natural disaster. Identify and address those disaster scenarios that are most relevant and likely to affect your business. For each scenario, include: Overview of the associated scenario and systems most likely to be affected by the threat Time frame of potential outages, based on the likely elements of the specific scenario Systems that may be brought up locally via on-premise failover equipment or premisebased cloud enablement technology Procedures for initiation of system failover to external data centers Priority schedule for system restoration Procedures for contacting your hosting provider (if applicable) to initiate critical support Continue listing disaster scenarios with all important details. Do not feel limited to only a few disaster recovery scenarios; list all those that could realistically impact your business along with the associated recovery procedures. The table below may be an effective tool for listing your potential DR scenarios: Event Plan of Action Owner Power failure Enact affected system run book plans Application business owner Data center failure Enact total failover plan Disaster Recovery Coordinator (DRC) Pending weather event (winter storm, hurricane, etc.) Review all DR plans, notify DRC, put key employees on standby Disaster Recovery Coordinator (DRC) Business Owner

7 Page 7 Distribution List This secion is also critical to the development of your run book. You must keep a clearly defined distribution list for the run book, ensuring that all key stakeholders have access to the document. Use the chart below to indicate the stakeholders to whom this run book will be distributed. Role Name Phone Owner Approver Auditor Contributor (Technical) Contributor (DBA) Contributor (Network) Contributor (Vendor) Location Specify the location(s) where this document may be found in electronic and/or hard copy. You may wish to include it on your company s shared drive or portal. If located on a shared drive or company portal, consider providing a link here so the most recent version is readily accessible. If this run book is also stored as a hard copy in one or multiple locations, list those locations here (along with who has access to those locations). We do recommend making your run book available outside of shared networks, as the document must be readily accessible at time of disaster in the event that primary systems like are not accessible to employees. In other words, ensure your run book is accessible under any circumstances!

8 Page 8 Table of Contents Document Control 7 Contact Information 8 Data Center Access Control List 10 Communication Structure of Plan 11 Declaration Guidelines 13 Alert Response Procedures 15 Issue Management and Escalation 16 Changes to SOP During Recovery 17 Infrastructure Overview 19 Data Center 19 Network Layout Topology 21 Access to Facilities 21 Order of Restoration 22 System Configuration 23 Backup Configuration 25 Monitors 26 Roles and Responsibilities 27 Data Restoration Processes 29

9 Page 9 Document Control Document creation and edit records should be maintained by your company s disaster recovery coordinator (DRC) or business continuity manager (BCM). If your organization does not have a DRC, consider creating that role to manage all future disaster recovery activities. Document Name Disaster Recovery Run Book for [Your Company s Name Here] Version Date created Date last modified Last modified by Keep the most up-to-date information on your disaster recovery plan in this section, including the most recent dates your plan was accessed, used and modified. Keep a running log, with as many lines as necessary, on document changes and document reviews, as well. Document Change History Version Date Description Approval V /20/2010 Initial version Business Owner / DRC V1.1 12/30/2010 End of year DR test action plan updates to run book Test Manager / DRC

10 Page 10 Contact Information This section will list your service provider s contacts (if applicable) along with those from your IT department. This is the team that will conduct ongoing disaster recovery operations and respond in the case of a true emergency. Specific roles listed below are examples of those that might comprise your team. All of these roles need to be in communication when in a disaster recovery mode of operation. For pending events, this same distribution list should be used to provide advanced notice of potential incidents. Customer support teams should also not be overlooked as they are the first line of communication to your customer base. Forgetting this step will cause extra work on your primary recovery team as they take time to explain what is going on. Your company s contacts Title Phone Name Disaster Recovery Coordinator Primary phone Secondary phone Name Chief Information Officer Primary phone Secondary phone Name Network Systems Administrator Primary phone Secondary phone Name Database Systems Administrator Primary phone Secondary phone Name Chief Security Officer Primary phone Secondary phone Name Chief Technology Officer Primary phone Secondary phone Name Business Owner Primary phone Secondary phone Name Application Development Lead (as applicable) Primary phone Secondary phone Name Data Center Manager Primary phone Secondary phone Name Customer Support Manager Primary phone Secondary phone Name Call Center Manager Primary phone

11 Page 11 Service Provider Contacts (if applicable) Role Phone Name Disaster Recovery Coordinator Primary phone Secondary phone Name Customer Service Primary phone Secondary phone Name Emergency Support Primary If you phone are working with a Secondary service phone provider, this position might be alternately filled with Name Sr. System Engineer Primary an account phone or test manager. Secondary phone Name Director Service Delivery Primary phone Secondary phone

12 Page 12 Data Center Access Control List Maintain an up-to-date access control list (ACL) specifying who, in both your company and your IT service provider (if applicable), has access to your data center and resources therein. Also specify which individuals can introduce guests to the data center. This will be useful for determining, in the event of an emergency scenario, who may be designated a point person for facilitating access to critical infrastructure. During a recovey event your primary operations team is going to be busy recovering systems, so be sure you know who to contact and how to gain access to your data center. Examples are provided in the table below. Remove, replace and add individuals to this list as appropriate for your organization and infrastructure. Name Role Contact Info Access level Name Chief Technology Officer Phone General access Can authorize guest access Name Director of Service Delivery Phone General access Can authorize guest access Name Service Delivery Engineer Phone Server room access, cage/cabinet, NOC access Cannot authorize guest access Name Systems Engineer Phone Name Network Engineer Phone Name Chief Security Officer Phone Name Chief Information Officer Phone Server room access Cannot authorize guest access Server room access Cannot authorize guest access General Access Can authorize guest access General Access Can authorize guest access

13 Page 13 Communication Structure of Plan Disaster event call tree During any disaster event there should be a defined call tree specifying the exact roles and procedures for each member of your IT organization to communicate with key stakeholders (both inside and outside of your company). When defining the call structure, limit your tree and branches to a 1:10 ratio of caller to call recipient. As a first step, for example, your Disaster Recovery Coordinator might call both the company CEO and head of operations, both of whom would then inform the appropriate contacts in their teams along with key customers, service providers, and other stakeholders responsible for correcting the service outage and restoring data and operations. An example call tree might appear as follows:

14 Page 14 And, for the situation written above, your general progression of calls might be as follows: Sr. Systems Engineer Disaster Recovery Coordinator Head of Operations Director of Service Delivery Network Engineer Systems Administrator CEO Director of Business Development Sales contact PR Representative

15 Page 15 Declaration Guidelines As you create your run book, you must consider guidelines for declaring a disaster scenario. Guidelines that we recommend are specified in the chart below: Situation Action Owner Workaround does not exist in a matter of time that does not affect customer SLAs Restoration procedres cannot be completed in your production environment A production environment no longer exists or is unable to be accessed Service provider issues cannot be resolved Declare application level failover and enact failover to secondary site Declare application level failover and enact failover to secondary site Declare a data center failure and enact a total failover plan from primary to secondary data center Notify service provider and have them enact DR plans The use of technology can be incorporated into the declration steps of a DR plan. Be sure not to declare on the first instance of an event unless it is completely understood that secondary instances of the event will result in increased damage to your customer or your business sytems. The table below details some standard practices to use in order to mitigate premature declarations. SLAs should be built in a manner that allows for some troubleshooting and system restoration prior to the need to declare a disaster. Also use this section to outline standard monitoring procedures along with associated thresholds. List all system monitors, what they do, their associated thresholds, associated alerts when those thresholds are met or exceeded, the individual(s) who receive the alerts, and the remediation steps for each monitor. List event monitoring standards by defining thresholds for event types, durations, corrective actions to be taken once the threshold is met, and event criticality level. Use the following chart (or a derivative thereof for your monitoring standards) to specify event monitoring standards.

16 Page 16 The first few rows have been filled in with examples: Event Type Duration of Event Corrective Action Event criticality Performance Monitoring Status = Warning Alert Level > 2 minutes Isolate problem device / recycle device Critical Level Memory Usage > 80% > 5 minutes - Isolate physical device / virtual machine - configure memory pool increase - clear memory cache - clear memory buffer CPU Usage > 90% > 3 minutes - increase compute allocation (virtual) - add additional compute resources into application pool Memory > 15 minutes - check memory queue - clear memory cache of affected system - increase memory allocation (virtual) Critical Level Critical Level Storage Network Ping Check IP Check These event types (memory, storage, network, ping check and IP check) are categories of events for which you should list specific examples in this chart.

17 Page 17 Alert Response Procedures List out your step-by-step procedures for responding to service issue alerts in this section. As an example, Xtium s ticket submission and response procedures follow this general outline: Service interruption identified > Service Delivery Manager contacted 1. Ticket is opened with support team (either in-house or third party provider s ticket creation system). 2. Contact key stakeholders to ensure they are aware of the alert and determine if any current activity or recent changes may be responsible for the service interruption. 3. Verify that alert is legitimate and not an isolated single user issue or monitoring time out. 4. Notify end users of ticket creation. 5. Contact the appropriate member(s) of your operations or engineering teams to notify them of the alert and assign investigation and data restoration procedures.

18 Page 18 Issue Management and Escalation This section should list detailed procedures for issue management and escalation, when necessary, in the case of an unmet service objective. Escalation procedures will vary by levels of operation and severity of the associated activities. At Xtium, for example, we categorize standard operating procedure interruptions in five levels (5 being the lowest severity, 1 the highest). Of course, these can and will differ among organizations. The following serves only as an example: 1 Fatal Functionality has ceased completely with no known workaround for all users. Impact is highest. 2 Critical Functionality is critically impaired but still operational for some users. Impact is high. 3 Serious Functionality is impaired but workarounds still exist for all users. Impact is moderate. 4 Minor Some functionality is impaired but there is a reasonable workaround for some users. Impact is low. 5 Request This is an enhancement-related service request that does not at all impact current operations or functionality. Depending on the severity of the service interruption, your escalation procedures will vary by parties involved, response chain, response time and target resolution.

19 Page 19 Changes to SOP During Recovery Recovery events necessitate the priority of data and business process restoration. At times, other non-critical standard operating procedures (SOPs) must be suspended. During a recovery event, recovery operations should take precedent over inbound queries or tickets. Monitors and alerts should also be reviewed for suspension until recovery is complete. This is a best practice procedure to avoid flooding your network operations center (NOC) and support teams with bogus or bad alarms. Change management policies should also be altered to expedite recovery procedures. For example, adding a new server or firewall rule in a standard environment might take one day once all necessary reviews and permissions are met. But during recovery operations, a standard firewall change should be expedited to support recovery operations. Ticketing of work during recovery operations should be reviewed to ensure the necessity of any requested tasks. Non-critical tickets should be deferred and addressed once recovery procedures are complete. Remember, the number one rule in recovery is: Recover! Get things back up and running whether in a workaround, failover or full restore state. That in mind, use this section to identify which standard operating procedures will be suspended in the event of a true emergency scenario (one that would fall under your critical or fatal service interruption classifications). List out specifications for change management, monitors and alerts, and problem and issue resolution during recovery procedures. Certain non-critical standard operating procedures may be suspended, such as in the following situation: A user submits a call/ticket to your service desk stating they cannot access the company website. This ticket would be responded to with a message that your organization is currently in a recovery operations cycle and your service ticket will be addressed as soon as technicians have completed the restoration work.

20 Page 20 System Level Procedures Your run book content, up to this point, has addressed organizational points of concern. At this stage in your run book you should have fully documented procedures in your company for issue management and escalation, criteria for evaluating and declaring an emergency scenario, and procedures for ensuring all key stakeholders and responsible parties are in communication and are ready and able to take the necessary steps to begin disaster recovery procedures. From this point forward, the run book will shift focus to system level procedures to address infrastructure and network level configurations, restoration steps, and system level responsibilities while in disaster recovery mode.

21 Page 21 Infrastructure Overview Provide a detailed overview of your IT environment in this section, including the location(s) of all data center(s), nature of use of those facilities (e.g. colocation, tape storage, cloud hosting), security features of your infrastructure and the hosting facilities, and procedures for access to those facilities. Data center Specify the location of all facilities in which your company s data is stored. Include an address and directions to each location. Examples of a data center diagram need to be detailed enough to provide your backup recovery team member the necessary information to Example Simple data center diagram: perform his or her responsibilities if called upon. Source:

22 Page 22 Example Detailed data center diagram: Source:

23 Page 23 Network Layout Topology Source: Access to Facilities Data centers and colocation facilities typically maintain strict entry protocol. Certain members of your organization will typically hold the appropriate credentials to enter the facility. Detail members of your team (and/or your IT service provider s team) who have access to all data facilities along with any requirements for access.

24 Page 24 Order of Restoration This section will include instructions for recovery personnel to follow that lay out which infrastructure components to restore and in which order. It should take into account application dependencies, authentication, middleware, database and third party elements and list restoration items by system or application type. Ensure that this order of restoration is understood before engaging in restore work. An example is provided below. The rest of the table should be filled out in the exact order that restoration procedures are to be completed. Order of Restoration Table: Server Name Server Role Order of Restoration OS / Patch level Application loaded Ws12_VF1 Web Server Valley Forge 1 Restore prior to db12_vf1 startup ESX4.1 Apache

25 Page 25 System Configuration This section should include systems and application specific typology diagrams and an inventory of elements that comprise your overall system. Include networking, web app middleware, database and storage elements, along with third party systems that connect to and share data with this system. Network table: Device type You should lay out each of your systems separately and include a table for your network, server layout and storage layout. Name Primary IP OS level Gateway Subnet Mask Firewall Load balancer Switch Router Server table: Server Name/Priority OS Patch IP Address Sub Gateway DNS Alternate DNS Secondary IPs Production Mac Address

26 Page 26 Storage table: Name LUN Address RAID configuration Host name

27 Page 27 Backup Configuration Use this section to list instructions specifying the servers, directories and files from (and to) which backup procedures will be run. This should be the location of your last known good copy of production data. Server Software Version Backup Cycle Backup Source Backup Target

28 Page 28 Monitors Listed by server, be sure that these monitors are put in place and activated as part of your restore activities. Restoring from a disaster should result in a mirror to your production environment (even if scaled). Monitors and alerts are a critical element to your production system. Server name Monitor Cycle Alert

29 Page 29 Roles and Responsibilities Service Delivery Responsibility Assignment Matrix Table Key Code Description This matrix describes the participation by various roles to complete DR tasks or deliverables. It clarifies roles and responsibilities for IT stakeholders in your organization as well as any service providers involved with your business disaster recovery program. Fill in the matrix below, specifying the roles for your company, your service provider (if applicable) and any other 3 rd parties that will be involved in your disaster recovery tests. R A C I Responsible Party: Those who do the work to achieve the task Accountable Party: The party ultimately answerable for the correct and thorough completion of the deliverable or task, and the one from whom responsible party is delegated the work Consulted Party: Those whose opinions are sought, typically subject matter experts; and with whom there is two-way communication Informed Party: Those who are kept up-to-date on progress, often only on completion of the task or deliverable; and with whom there is just one-way communication Positions that will fill these roles and responsibilities will often include your DR coordinator, network engineer, database engineer, systems engineer, application owner, data center service coordinator, and your service provider. Identify the responsibilities of each of these roles in a disaster event, then map them onto a matrix of all activities associated with recovery procedures, as in the example table provided below. Activity Responsible Parties R A C I Maintain situational management of recovery events DRC DRC DRC All React to server outage alerts React to file system alerts React to host outage alerts React to network outage alerts Document technical landscape Configure network for system access Configure VPN and acceleration between your business and service provider network (if applicable

30 Page 30 Maintain DNS or host file Monitor service provider network availability (if applicable) Diagnose service provider network errors (if applicable Create named users at OS level Create domain users Manage OS privileges Create virtual machines Convert physical servers to virtual servers Install base operating system Configure operating system Configure OS disks Diagnose OS errors Start/Stop the virtual machine Windows OS licensing (or your operating system) Security hardening of the OS Daily server level backup Patch Management for Windows servers (or your operating system) Provide a project manager Provide a key technical contact for OS, network, and SAN Coordinate deployment schedule Support, management and update of Protection Software Install, support management and update of Terminal Server

31 Page 31 Data Restoration Processes Use this section to outline the steps necessary to respond to outage alerts and, subsequently, restore data from backup records. Include your order of backup operations in this section, including data dependencies (based on organization of your data backups) and troubleshooting steps. These processes will be followed in the event that a data recovery is necessary, including scenarios in which data is still running but a backup is needed, restoring data in a post-disaster event or restoring from a backup volume. In this section you should identify the order of operations for a data restore, the location of your backup, and step-by-step procedures to re-establish your data volumes into your production environment. Restoration Procedures Though your order of operations should stay relatively consistent, list steps taken for each and every backup system. For example: Payroll system backup: System XYZ Payroll Start Db server vm2345-qa1 Start Application server vm354-r1 This is only an example of what procedures for one system restoration may look like. For each of your actual systems, similarly list step-by-step instructions for full system backup. Start web server vm6_ws4 Terminal server to Ws1_Vf1_Payroll Login to backup archive url: backup.archive.payroll Create temp target folder for backup file Login: user1 Password: 1resu Nagivate to most recent backup file Select file Select restore target Ws1_Vf1_PayrollProd1 Initiate restore

32 Page 32 Select overwrite options Confirm dialog box warning Are you sure? Complete restore backup file Login to Ws1_Vf1_PayrollProd1 Start Payroll App local\temp\dirs\payrollprod1.exe Navigate via Explorer to temp backup folder Select file Open payrollprod application console Select data source > temp\backup\payrollws1bckup Import Validate through report test 1 run Use the rest of this section to similarly list restoration procedures for each of your backup systems.

33 Page 33 Have questions about this run book or disaster recovery for your business? Contact Us!

Statement of Service Enterprise Services - AID Microsoft IIS

Statement of Service Enterprise Services - AID Microsoft IIS Statement of Service Enterprise Services - AID Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The

More information

MCSA Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring

MCSA Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring MCSA Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange

More information

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services Network Computing Architects Inc. (NCA), provides outsourced IT services by monitoring and managing clients computing assets. Included Services: For all systems covered under NOC Support, the following

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

Technical Considerations in a Windows Server Environment

Technical Considerations in a Windows Server Environment Technical Considerations in a Windows Server Environment INTRODUCTION Cloud computing has changed the economics of disaster recovery and business continuity options. Accordingly, it is time many organizations

More information

IT Disaster Recovery Plan Template

IT Disaster Recovery Plan Template HOPONE INTERNET CORP IT Disaster Recovery Plan Template Compliments of: Tim Sexton 1/1/2015 An information technology (IT) disaster recovery (DR) plan provides a structured approach for responding to unplanned

More information

Template Courtesy of: Cloudnition LLC 55 W. 22 nd St Suite 115 Lombard, IL 60148 (630) 297-4090 www.cloudnition.com

Template Courtesy of: Cloudnition LLC 55 W. 22 nd St Suite 115 Lombard, IL 60148 (630) 297-4090 www.cloudnition.com Template Courtesy of: Cloudnition LLC 55 W. 22 nd St Suite 115 Lombard, IL 60148 (630) 297-4090 www.cloudnition.com 1 1.1 Introduction 1.2 Purpose 1.3 Priorities 2.1 About your business 2.1.1 Business

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

The 5 Most Commonly Used Disaster Recovery Process

The 5 Most Commonly Used Disaster Recovery Process DR Risk Assessment White Paper This document provides an overview of Equilibrium s disaster recovery risk analysis and remediation methodology. This methodology was developed over a period of 10+ years

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

State of Alaska. Service Level Agreement. for. Enterprise Technology Services Infrastructure Services Hosting. June 25, 2012 VERSION 1.

State of Alaska. Service Level Agreement. for. Enterprise Technology Services Infrastructure Services Hosting. June 25, 2012 VERSION 1. State of Alaska Service Level Agreement for Enterprise Technology Services Infrastructure Services Hosting June 25, 2012 VERSION 1.0 Date Author(s) Version Change Summary 3/23/12 Corey Kos Initial Draft

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Offsite Disaster Recovery Plan

Offsite Disaster Recovery Plan 1 Offsite Disaster Recovery Plan Offsite Disaster Recovery Plan Presented By: Natan Verkhovsky President Disty Portal Inc. 2 Offsite Disaster Recovery Plan Introduction This document is a comprehensive

More information

<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP

<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP IT Disaster Recovery Plan Template By Paul Kirvan, CISA, CISSP, FBCI, CBCP Revision History REVISION DATE NAME DESCRIPTION Original 1.0 2 Table of Contents Information Technology Statement

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring

MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring MCSE Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0 DISASTER RECOVERY Omniture Disaster Plan June 2, 2008 Version 2.0 CHAPTER 1 1 Disaster Recovery Plan Overview In the event that one of our data collection environments are unavailable due to an event,

More information

Disaster Recovery 101. Sudarshan Ranganath & Matthew Phillips Ellucian

Disaster Recovery 101. Sudarshan Ranganath & Matthew Phillips Ellucian Disaster Recovery 101 Sudarshan Ranganath & Matthew Phillips Ellucian SESSION OBJECTIVES Business continuity is critical to every institution and its IT organization. How do you set up your ERP and other

More information

Disaster Recovery Hosting Provider Selection Criteria

Disaster Recovery Hosting Provider Selection Criteria Disaster Recovery Hosting Provider Selection Criteria By, Solution Director 6/18/07 As more and more companies choose to use Disaster Recovery (DR), services the questions that keep coming up are What

More information

DISASTER RECOVERY WITH AWS

DISASTER RECOVERY WITH AWS DISASTER RECOVERY WITH AWS Every company is vulnerable to a range of outages and disasters. From a common computer virus or network outage to a fire or flood these interruptions can wreak havoc on your

More information

a Disaster Recovery Plan

a Disaster Recovery Plan Construction of a Disaster Recovery Plan David Godwin, Sr. Sales Engineer March 18, 2014 Objectives Understand What Disaster Recovery is? Why is Disaster Recovery Needed? Effectively assist customers or

More information

CompTIA Cloud+ 9318; 5 Days, Instructor-led

CompTIA Cloud+ 9318; 5 Days, Instructor-led CompTIA Cloud+ 9318; 5 Days, Instructor-led Course Description The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments,

More information

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend: CompTIA Cloud+ Length: 5 Days Who Should Attend: Project manager, cloud computing services Cloud engineer Manager, data center SAN Business analyst, cloud computing Summary: The CompTIA Cloud+ certification

More information

Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute

Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute Service Level Management Service Level Management deals with how user service requirements are understood and managed.

More information

Statement of Service Enterprise Services - MANAGE Microsoft IIS

Statement of Service Enterprise Services - MANAGE Microsoft IIS Statement of Service Enterprise Services - MANAGE Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The

More information

Disaster Recovery White Paper

Disaster Recovery White Paper Introduction Remote access plays a critical role in successfully executing a business recovery plan both in terms of providing access for existing remote users and accommodating the potential increase

More information

MANAGEMENT AUDIT REPORT DISASTER RECOVERY PLAN DEPARTMENT OF FINANCE AND ADMINISTRATIVE SERVICES INFORMATION TECHNOLOGY SERVICES DIVISION

MANAGEMENT AUDIT REPORT DISASTER RECOVERY PLAN DEPARTMENT OF FINANCE AND ADMINISTRATIVE SERVICES INFORMATION TECHNOLOGY SERVICES DIVISION MANAGEMENT AUDIT REPORT OF DISASTER RECOVERY PLAN DEPARTMENT OF FINANCE AND ADMINISTRATIVE SERVICES INFORMATION TECHNOLOGY SERVICES DIVISION REPORT NO. 13-101 City of Albuquerque Office of Internal Audit

More information

HA / DR Jargon Buster High Availability / Disaster Recovery

HA / DR Jargon Buster High Availability / Disaster Recovery HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster

More information

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES This Product Schedule Terms & Conditions is incorporated into a Services Agreement also comprising the General Terms and Conditions which the Customer

More information

INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists

INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists Preventing Data Loss INSIDE > Disaster Recovery Types and Categories > Disaster Recovery Site Types > Disaster Recovery Procedure Lists > Business Continuity Plan 1 Preventing Data Loss White Paper Overview

More information

ACME Enterprises IT Infrastructure Assessment

ACME Enterprises IT Infrastructure Assessment Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3

More information

Clovis Municipal School District Information Technology (IT) Disaster Recovery Plan

Clovis Municipal School District Information Technology (IT) Disaster Recovery Plan Clovis Municipal School District Information Technology (IT) Disaster Recovery Plan Revision History REVISION DATE NAME DESCRIPTION Draft 1.0 Eric Wimbish IT Backup Disaster Table of Contents Information

More information

IT Security Agency Policies and Procedures

IT Security Agency Policies and Procedures Revised Date: 12/20/11 (formatting) Page 1 of 6 IT Security Agency Policies and Procedures Firewall Change Control Procedure Policy Objectives: The purpose of this document is to define Admin s process

More information

CLOUD SERVICE SCHEDULE

CLOUD SERVICE SCHEDULE CLOUD SERVICE SCHEDULE 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule, unless

More information

Lesson Plans Managing a Windows 2003 Network Infrastructure

Lesson Plans Managing a Windows 2003 Network Infrastructure Lesson Plans Managing a Windows 2003 Network Infrastructure (Exam 70-291) Table of Contents Course Overview... 2 Section 0.1: Introduction... 3 Section 1.1: Client Configuration... 4 Section 1.2: IP Addressing...

More information

BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS)

BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS) BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS) 1. Introduction This Statement of Work (SOW) is an appendix to the existing Master Services Agreement between

More information

3M Command Center. Installation and Upgrade Guide

3M Command Center. Installation and Upgrade Guide 3M Command Center Installation and Upgrade Guide Copyright 3M, 2015. All rights reserved., 78-8129-3760-1d 3M is a trademark of 3M. Microsoft, Windows, Windows Server, Windows Vista and SQL Server are

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

VMware@SoftLayer Cookbook Disaster Recovery (DR)

VMware@SoftLayer Cookbook Disaster Recovery (DR) VMware@SoftLayer Cookbook Disaster Recovery (DR) IBM Global Technology Services: Khoa Huynh (khoa@us.ibm.com) Daniel De Araujo (ddearaujo@us.ibm.com) Bob Kellenberger (kellenbe@us.ibm.com) VMware: Merlin

More information

AV-006: Installing, Administering and Configuring Windows Server 2012

AV-006: Installing, Administering and Configuring Windows Server 2012 AV-006: Installing, Administering and Configuring Windows Server 2012 Career Details Duration 105 hours Prerequisites This course requires that student meet the following prerequisites, including that

More information

Table of Contents. CSC CloudCompute Service Description Summary CSC 1

Table of Contents. CSC CloudCompute Service Description Summary CSC 1 Table of Contents Overview... 2 CSC CloudCompute Infrastructure... 2 Virtual Environment... 2 Compute Capacity... 2 Networks... 3 CSC Cloud Store Overview... 3 Service Tier Choices... 3 CloudCompute Storage...

More information

Virtualizing your Datacenter

Virtualizing your Datacenter Virtualizing your Datacenter with Windows Server 2012 R2 & System Center 2012 R2 Part 2 Hands-On Lab Step-by-Step Guide For the VMs the following credentials: Username: Contoso\Administrator Password:

More information

MyOfficePlace Business Critical Services Handbook

MyOfficePlace Business Critical Services Handbook MyOfficePlace Business Critical Services Handbook 1. Support overview Mission statement MyOfficePlace LTD. is committed to responding quickly to your inquiries. We will help you ensure that your IT environments

More information

Consulting Solutions Disaster Recovery. Yucem Cagdar

Consulting Solutions Disaster Recovery. Yucem Cagdar Consulting Solutions Disaster Recovery Yucem Cagdar Disaster Recovery Strategy How efficient is your DR Plan? Many are not prepared: 42% are not adequately armed with modern disaster recovery solutions,

More information

SaaS Security for the Confirmit CustomerSat Software

SaaS Security for the Confirmit CustomerSat Software SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

Cisco Disaster Recovery: Best Practices White Paper

Cisco Disaster Recovery: Best Practices White Paper Table of Contents Disaster Recovery: Best Practices White Paper...1 Introduction...1 Performance Indicators for Disaster Recovery...1 High Level Process Flow for Disaster Recovery...2 Management Awareness...2

More information

Building a Disaster Recovery Program By: Stieven Weidner, Senior Manager

Building a Disaster Recovery Program By: Stieven Weidner, Senior Manager Building a Disaster Recovery Program By: Stieven Weidner, Senior Manager Part two of a two-part series. If you read my first article in this series, Building a Business Continuity Program, you know that

More information

This course is intended for IT professionals who are responsible for the Exchange Server messaging environment in an enterprise.

This course is intended for IT professionals who are responsible for the Exchange Server messaging environment in an enterprise. 10233A: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Course Number: 10233A Course Length: 5 Day Course Overview This instructor-led course provides you with the knowledge

More information

Disaster Recovery for Ingres. Abstract

Disaster Recovery for Ingres. Abstract Disaster Recovery for Ingres A general disaster recovery discussion followed by Ingres specific issues and recommendations 2002-2003 Comprehensive Consulting Solutions, Inc., All rights reserved. Abstract

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Cisco Unified Computing Remote Management Services

Cisco Unified Computing Remote Management Services Cisco Unified Computing Remote Management Services Cisco Remote Management Services are an immediate, flexible management solution that can help you realize the full value of the Cisco Unified Computing

More information

Statement of Service Enterprise Services - MANAGE AppTone Server Management for SharePoint

Statement of Service Enterprise Services - MANAGE AppTone Server Management for SharePoint Statement of Service Enterprise Services - MANAGE AppTone Server Management for SharePoint CUSTOMER Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

Interactive-Network Disaster Recovery

Interactive-Network Disaster Recovery Interactive-Network Disaster Recovery BACKGROUND IT systems are vulnerable to a variety of disruptions, ranging from mild (e.g., short-term power outage, disk drive failure) to severe (e.g., terrorism,

More information

MS-55115: Planning, Deploying and Managing Microsoft Project Server 2013

MS-55115: Planning, Deploying and Managing Microsoft Project Server 2013 MS-55115: Planning, Deploying and Managing Microsoft Project Server 2013 Description The goal of this three-day instructor-led course is to provide students with the knowledge and skills necessary to effectively

More information

Using Emergency Restore to recover the vcenter Server has the following benefits as compared to the above methods:

Using Emergency Restore to recover the vcenter Server has the following benefits as compared to the above methods: Executive Summary This document provides certain best practices with regards to the Emergency Restore feature in vsphere Data Protection 5.5 release. It also describes the methods and processes to be used

More information

Table of Contents... 1

Table of Contents... 1 ... 1 Chapter 1 Introduction... 4 1.1 Executive Summary... 4 1.2 Goals and Objectives... 5 1.3 Senior Management and Board of Directors Responsibilities... 5 1.4 Business Continuity Planning Processes...

More information

GOVERNMENT FINANCE OFFICERS ASSOCIATION OF MISSOURI SPRING 2012 CONFERENCE IT DISASTER PLAN

GOVERNMENT FINANCE OFFICERS ASSOCIATION OF MISSOURI SPRING 2012 CONFERENCE IT DISASTER PLAN GOVERNMENT FINANCE OFFICERS ASSOCIATION OF MISSOURI SPRING 2012 CONFERENCE IT DISASTER PLAN 2012 Sikich LLP. All Rights Reserved. Presented by: Scott Wegner Partner, Director Networking Services Sikich

More information

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining

More information

Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE

Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE Acronis Backup & Recovery for Mac Acronis Backup & Recovery & Acronis ExtremeZ-IP This document describes the technical requirements and best practices for implementation of a disaster recovery solution

More information

California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE

California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE Table of Contents 1.0 GENERAL... 2 1.1 SUMMARY...2 1.2 REFERENCES...2 1.3 SUBMITTALS...2 1.3.1 General...2 1.3.2 Service Request...3 1.4 EXPECTATIONS...3 1.4.1 OTech...3 1.4.2 Customer...3 1.5 SCHEDULING...4

More information

CLOUD SERVICE SCHEDULE Newcastle

CLOUD SERVICE SCHEDULE Newcastle CLOUD SERVICE SCHEDULE Newcastle 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule,

More information

Veeam ONE What s New in v9?

Veeam ONE What s New in v9? Veeam ONE What s New in v9? Veeam ONE is a powerful monitoring, reporting and capacity planning tool for the Veeam backup infrastructure, VMware vsphere and Microsoft Hyper-V. It helps enable Availability

More information

MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013

MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013 MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013 1. ABOUT THIS GUIDE...3 1.1 S NEW CTOMERS...3 1.2 S ALL CTOMERS...3 1.3 OUR S...3 1.4 KEEPING R CONTACT DETAILS UP-TO-DATE...4 1.5 RECORDING R

More information

Request for Proposal Technology Services Maintenance and Support

Request for Proposal Technology Services Maintenance and Support Request for Proposal Technology Services Maintenance and Support Maintenance and Support July 19, 2014 Celerity Educational Group is seeking an IT consulting firm to manage Maintenance of our Network Systems

More information

Deploy App Orchestration 2.6 for High Availability and Disaster Recovery

Deploy App Orchestration 2.6 for High Availability and Disaster Recovery Deploy App Orchestration 2.6 for High Availability and Disaster Recovery Qiang Xu, Cloud Services Nanjing Team Last Updated: Mar 24, 2015 Contents Introduction... 2 Process Overview... 3 Before you begin...

More information

Information Services. Standing Service Level Agreement (SLA) Firewall and VPN Services

Information Services. Standing Service Level Agreement (SLA) Firewall and VPN Services Information Services Standing Service Level Agreement (SLA) Firewall and VPN Services Overview This service level agreement (SLA) is between Information Services (IS), and any unit at the University of

More information

MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required) MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking

More information

INFRASTRUCTURE AS A SERVICE (IAAS) SERVICE SCHEDULE Australia

INFRASTRUCTURE AS A SERVICE (IAAS) SERVICE SCHEDULE Australia INFRASTRUCTURE AS A SERVICE (IAAS) SERVICE SCHEDULE Australia 1 DEFINITIONS Capitalised terms in this Service Schedule not otherwise defined here have the meaning given in the Standard Terms and Conditions:

More information

Managing and Maintaining a Windows Server 2003 Network Environment

Managing and Maintaining a Windows Server 2003 Network Environment Managing and maintaining a Windows Server 2003 Network Environment. AIM This course provides students with knowledge and skills needed to Manage and Maintain a Windows Server 2003 Network Environment.

More information

ensurcloud Service Level Agreement (SLA)

ensurcloud Service Level Agreement (SLA) ensurcloud Service Level Agreement (SLA) Table of Contents ensurcloud Service Level Agreement 1. Overview... 3 1.1. Definitions and abbreviations... 3 2. Duties and Responsibilities... 5 2.1. Scope and

More information

Active Directory Infrastructure Design Document

Active Directory Infrastructure Design Document Active Directory Infrastructure Design Document Written By Sainath KEV Microsoft MVP Directory Services Microsoft Author TechNet Magazine, Microsoft Operations Framework Microsoft Speaker - Singapore Document

More information

UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY

UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY Originator: IT Performance and Capacity Management Policy Approval and Version Control Approval Process: Position or Meeting

More information

MSP Center Plus Features Checklist

MSP Center Plus Features Checklist Features Checklist Your evaluation is not complete until you check out top vendors and the price. Here is a list prepared based customer queries. Features General Easy web interface with admin, technician,

More information

Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013. Designtech Cloud-SaaS Hosting and Delivery Policy

Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013. Designtech Cloud-SaaS Hosting and Delivery Policy Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013 Page i Designtech Cloud-SaaS Hosting and Delivery Policy Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013 Page ii

More information

VMware vcloud Air - Disaster Recovery User's Guide

VMware vcloud Air - Disaster Recovery User's Guide VMware vcloud Air - Disaster Recovery User's Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Course 55115: Planning, Deploying and Managing Microsoft Project Server 2013

Course 55115: Planning, Deploying and Managing Microsoft Project Server 2013 CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Course 55115: Planning, Deploying and Managing Microsoft Project Server 2013 Length: 3 Days Audience:

More information

1 Data Center Infrastructure Remote Monitoring

1 Data Center Infrastructure Remote Monitoring Page 1 of 7 Service Description: Cisco Managed Services for Data Center Infrastructure Technology Addendum to Cisco Managed Services for Enterprise Common Service Description This document referred to

More information

TalentLink Disaster Recovery & Service Continuity

TalentLink Disaster Recovery & Service Continuity Technical Services Briefing Document TalentLink Disaster Recovery & Service Continuity Version 1.2 (January 2012) Contents Overview Planning for Service Continuity Disaster Recovery Process Business Continuity

More information

Why Email Fails MessageOne Survey of Email Outages

Why Email Fails MessageOne Survey of Email Outages Why Email Fails MessageOne Survey of Email Outages White Paper MessageOne, Inc. 11044 Research Blvd. Building C, Fifth Floor Austin, TX 78759 Toll-Free: 888.367.0777 Telephone: 512.652.4500 Fax: 512.652.4504

More information

Cloud Computing Disaster Recovery (DR)

Cloud Computing Disaster Recovery (DR) Cloud Computing Disaster Recovery (DR) Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Need for Disaster Recovery (DR) What happens when you

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

IBM G-Cloud Microsoft Windows Active Directory as a Service

IBM G-Cloud Microsoft Windows Active Directory as a Service IBM G-Cloud Microsoft Windows Active Directory as a Service Service Definition IBM G-Cloud Windows AD as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business

More information

ADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3

ADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3 ADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT Overview EXHIBIT E to Amendment No. 60 The Disaster Recovery (DR) Services, a Tier-Level DR Solution, addresses the

More information

24/7 Monitoring Pro-Active Support High Availability Hardware & Software Helpdesk. itg CloudBase

24/7 Monitoring Pro-Active Support High Availability Hardware & Software Helpdesk. itg CloudBase 24/7 Monitoring Pro-Active Support High Availability Hardware & Software Helpdesk Onsite Support itg CloudBase Pro-Active managed it support services for one single cost per month covers all aspects of

More information

Best Practices in Disaster Recovery Planning and Testing

Best Practices in Disaster Recovery Planning and Testing Best Practices in Disaster Recovery Planning and Testing axcient.com 2015. Axcient, Inc. All Rights Reserved. 1 Best Practices in Disaster Recovery Planning and Testing Disaster Recovery plans are widely

More information

Virtual Server and Storage Provisioning Service. Service Description

Virtual Server and Storage Provisioning Service. Service Description RAID Virtual Server and Storage Provisioning Service Service Description November 28, 2008 Computer Services Page 1 TABLE OF CONTENTS INTRODUCTION... 4 VIRTUAL SERVER AND STORAGE PROVISIONING SERVICE OVERVIEW...

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide Virtual Appliance Setup Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective

More information

CLOUD SERVICES FOR EMS

CLOUD SERVICES FOR EMS CLOUD SERVICES FOR EMS Greg Biegen EMS Software Director Cloud Operations and Security September 12-14, 2016 Agenda EMS Cloud Services Definitions Hosted Service Managed Services Governance Service Delivery

More information

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב עש ספיר מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.

More information

Business Continuity Plan

Business Continuity Plan Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions

More information

Every Silver Lining Has a Vault in the Cloud

Every Silver Lining Has a Vault in the Cloud Irvin Hayes Jr. Autodesk, Inc. PL6015-P Don t worry about acquiring hardware and additional personnel in order to manage your Vault software installation. Learn how to spin up a hosted server instance

More information

55115 - Planning, Deploying and Managing Microsoft Project Server 2013

55115 - Planning, Deploying and Managing Microsoft Project Server 2013 55115 - Planning, Deploying and Managing Microsoft Project Server 2013 Duration: 3 Days Course Price: $1,785 Software Assurance Eligible Course Description Course Overview The goal of this three-day instructor-led

More information

SteelFusion with AWS Hybrid Cloud Storage

SteelFusion with AWS Hybrid Cloud Storage Solution Guide SteelFusion with AWS Hybrid Cloud Storage March 2016 The Challenge According to IDC, to meet the demands of global customer and global talent requirements, companies have to maintain remote

More information

How to Design and Implement a Successful Disaster Recovery Plan

How to Design and Implement a Successful Disaster Recovery Plan How to Design and Implement a Successful Disaster Recovery Plan Feb. 21 ASA Office-Administrative Section is Sponsored by Today s ASAPro Webinar is Brought to You by the How to Ask a Question Questions

More information

Business Continuity: Choosing the Right Technology Solution

Business Continuity: Choosing the Right Technology Solution Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail

More information

Complete Managed Services. Proposal for managed services for the City of Tontitown

Complete Managed Services. Proposal for managed services for the City of Tontitown Complete Managed Services Proposal for managed services for the City of Tontitown Complete Managed Services Components Windows Server 2008, Windows Server 2012 1. Proactive Maintenance of Server(s) Proactive

More information

Statement of Service Enterprise Services - AID Servers: Windows/Linux/Unix Network Infrastructure: Switches/Routers/Firewall/Wireless Access

Statement of Service Enterprise Services - AID Servers: Windows/Linux/Unix Network Infrastructure: Switches/Routers/Firewall/Wireless Access Statement of Service Enterprise Services - AID Servers: Windows/Linux/Unix Network Infrastructure: Switches/Routers/Firewall/Wireless Access Customer Proprietary Rights The information in this document

More information