Beyond Traditional Disaster Recovery Goals Augmenting the Recovery Consistency Characteristics

Size: px
Start display at page:

Download "Beyond Traditional Disaster Recovery Goals Augmenting the Recovery Consistency Characteristics"

Transcription

1 Beyond Traditional Disaster Recovery Goals Augmenting the Recovery Consistency Characteristics Octavian Paul ROTARU American Sentinel University Abstract For most organizations the disaster recovery goals are limited to Recovery Point Objective (RPO) and Recovery Time Objective (RTO). This perspective on disaster recovery overlooks very important factors that can contribute to the successful implementation of a Disaster Recovery plan. Evaluating metrics beyond recovery time (RTO) and recovery point (RPO) is essential to meet the recovery commitments of an organization. The purpose of this paper is to review existing Disaster Recovery metrics that can augment the Recovery Point and Recovery Time and to propose new metrics for Recovery Consistency. Recovery Consistency Objective is measuring the total data consistency of your Disaster Recovery solution post recovery. Recovery Consistency Objective (RCO) ads data consistency objectives to the disaster recovery objectives of an organization, but often RCO is not enough to evaluate consistency. Going beyond the traditional disaster recovery goals, this paper introduces an assessment method and metrics for the consistency of the module interfaces in addition to the module consistency. The RCO as well as the proposed interface consistency metrics are evaluated in the context of the seven disaster recovery tiers defined by SHARE User Group. Keywords: Business Continuity (BC), Business Resilience, Disaster Recovery (DR), Disaster Recovery Goals, Recovery Consistency Objective (RCO). 1. Introduction A successful disaster recovery plan has well defined goals that are in line with the business requirements. Defining the recovery objectives is one of the most important steps in creating a disaster recovery plan and the objectives are the result of the Business Impact Analysis (BIA). The maximum acceptable downtime in case of a disaster will vary depending on the nature of the business and the financial impacts of the downtime. Depending on the criticality of the data handled and service rendered, the business continuity approaches cover a wide range of options. Most organizations today depend heavily on their IT infrastructure and their data in order to be able to provide service to their customers and the recovery objectives will drive the selection of the disaster recovery strategy and the cost of the IT infrastructure required to support it. Cyber-infrastructure protection, business continuity and disaster recovery, includes safeguarding and ensuring the reliability and availability of key information assets, including personal information of citizens, consumers and employees [13], but reliability and availability need to be backed by data consistency in order to provide proper recovery. Susanto [9] considers IT to be the most important issues of all when discussing BC and DR, not only for being the foundation and backbone of the business but also because IT can play important roles in strategies development and improving efficiency of the whole BCP plan. In today s complex business environment data and application consistency is becoming more and more important. As outlined in [14], managing a combined store consisting of database data and file data in a robust and consistent manner is a challenge for large scale software systems. In such hybrid systems, images, videos, engineering drawings, etc. are stored as files on a file server while meta-data referencing/indexing such files is created and stored in a relational database to take advantage of efficient search. Consistency between database content and files is required for the application to function properly post recovery. Defining a Recovery Point and Recovery Time objective is often not enough to insure successful recovery following a disaster event. Recovery Consistency Characteristics (RCC), as well as Recovery Object Granularity (ROG) and Recovery Time Granularity (RTG) need to be assessed in order to discover risks to which the environment is exposed.

2 2. Metrics that augment the Recovery Point and Recovery Time Objectives Proper evaluation of a disaster recovery solution requires well defined metrics and risk assessment. The Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are usually driven by Service Level Agreements (SLA) that the organization is contractually or legally bound to. RTO defines the time required to recover the lost data while RPO define the potential loss of data (the time gap between the most recent data point that can be recovered and the disaster event). Even if RTO and RPO are enough to measure SLAs, these two metrics do not measure the overall consistency of the date or the risks to which the organization is exposed in case of a disaster event. Meeting the defined RTO and RPO doesn t mean that processing can be resumed. The recovered data may be inconsistent if components are recovered at different points in time. More comprehensive metrics are needed to assess the quality of the recovery plan. The recovery metrics used by most organizations in their business continuity plans fall into three main categories: 1. Recovery Time Characteristics 1.1. Recovery Time Objective (RTO) is the main Recovery Time Characteristics define for any DR solution and defines how quickly service (data and application) is recovered following a disaster scenario Recovery Time Granularity (RTG) measures the time spacing required for selecting a recovery point. RTG defines a logical recovery point selection. 2. Recovery Data Characteristics 2.1. Recovery Point Objective (RPO) defines the time gap between the disaster event and the point in time where data can be recovered. It is essentially a measurement of how much data (measured in time updates) is estimated be lost following a disaster Recovery Object Granularity (ROG) is measuring the granularity of the objects that a disaster recovery solution is capable to recover. 3. Recovery Consistency Characteristics 3.1. RCO measures the usability of recovered data by the associated applications. RCO is defined as percentages, evaluating the number of entities that are consistent after recovery. RTG complements RTO and RPO in situations in which logical failures are encountered. For example, a data replication solution with a zero RPO and well defined RTO will recover from a physical failure but not from a logical failure. Data corruption that is not detected in time will be replicated and compromise the ability to recovery. In such a situation, if no other way to recover exists, the RTG will be undermined, and another recovery solution need to be put in place to provide a recovery point in time in the past prior to the disaster event. As a result, RTO will highly increase. The object granularity defined by ROG can be a storage volume, a file system, a database, a cluster package or service (including all associated storage), etc. Going below a volume or a file system in terms of granularity proves in most situations to be very expensive and requires manual intervention (labor intensive). Measures the Recovery Consistency Characteristics in terms of only RCO is often not enough and the purpose of the next sections of this paper is to assess RCO and introduce new metrics to complement it. 3. Why RCO is not enough Data is point in time consistent only if all of the interrelated data components are exactly as they were at any single instant in time. Disaster recovery plans usually define only recovery point and recovery time objectives. The Recovery Time Objective (RTO) is the duration of time within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with business continuity disruptions. The Recovery Point Objective (RPO) is the maximum tolerable period in which data may be lost. In many circumstances, the consistency of the data may be compromised even if the RPO and RTO are met. In this context the introduction of the Recovery Consistency Objective (RCO) is necessary in order to evaluate the data consistency following recovery. RCO is defined as a percentage measuring the deviation between the actual and the targeted state of business data across systems. RCO is calculated as a percentage that measures the number of consistent modules of the system after recovery reported to the total number of modules of the system: = = c = Number of Consistent Modules t = Total number of modules i = Number of Inconsistent Modules where = +. Even if the recovery point objective and recovery time objective are properly evaluated and can be met,

3 the system can be restored in an inconsistent state, and some of the applications may not be able to properly recover. Let's consider as an example a complex system that is spanning across multiple storage systems. In case replication is synchronous for all storage systems the alternate site will always be in sync with the main production site and data and application consistency will be preserved. However, if the storage systems are using different replication techniques, then the recovery point will be different for each of them. Even if the general RPO is preserved (all storage frames at the alternate site have data at a point in time lower than the general RPO), the difference between the recovery points of different storage devices may result in data inconsistency between applications. Modules may try to access data assuming that it is in sync and fail to find the records that are needed. Similar inconsistencies may occur in case different replication techniques are used for data inside the same frame (synchronous and asynchronous). Depending on the criticality of the application and the way applications or modules are implemented, such application data inconsistencies (different recovery points) may prolong the recovery time and may require manual intervention. Evaluation and correction will take time and extend the recovery time beyond what the business can tolerate. The recovery consistency objective is very important in such situations and reflects the individual requirements of corresponding business data crosssystem consistency. An unplanned IT outage can equate to a disaster, depending on the scope and severity of the problem. RCO is more important than RTO and RPO in the context of BCP processes. RPO and RTO emphasize the traditional IT Disaster Recovery Planning, while RCO goes beyond DRP. An important part of preparing for a disaster is to understand the type of risks your organization is facing. The risk of data inconsistency following disaster recovery is measured by RCO. The cost associated with creating and assuring availability for the enterprise rise dramatically as you approach the requirement for 100% availability. In certain contexts data inconsistency is acceptable as long as system availability is maintained and downtime is reduced. In other business environments data inconsistency may have staggering costs. 4. Improved consistency assessment metrics for disaster recovery RCO measures the usability of recovered data by the associated applications. RTO calculated as described above does not take into consideration interfaces/links between application modules. Let's assume for example that our system has 3 modules, and each module is consistent after recovery. In this example the RCO is 100%. However, if the point in time recovery for the 3 modules is different, some of the links between modules may be inconsistent. In my view interfaces/links between modules of the same system need to be considered when calculating the overall consistency of the system following recovery. If all modules except one are recovered at the same point in time and one module at a different point in time, the interfaces between the module with the different recovery point and the others may be compromised. A better way to asses over consistency of the system is to combine RCO with a consistency objective for module interfaces (Recovery Interface Consistency Objective). The proposed RICO can be calculated as a percentage as well based on the following formula: = = ci = Number of Consistent Module Interfaces ii = Number of Inconsistent Module Interfaces ti = Total Number of Module Interfaces Combining RCO and RICO into a single measurement for consistency is more practical and can be achieved by merging RCO and RICO into one metric. The proposed measurement for recovery consistency is Recovery Total Consistency Objective and is calculated based on the following formula: = + + where n and m are weigh parameters that can be defined based on the number of modules and interfaces and the importance of interfaces vs modules. RTCO is covering both module consistency and interface consistency providing a better measurement than RCO. 5. Disaster Recovery Tiers and Goals The SHARE User Group established 7 tiers of Disaster Recovery solutions. Each of these tiers addresses different requirements and corresponds to a different set of disaster recovery goals. The table below provides disaster recovery goals estimated for each of

4 the 7 Disaster Recovery tiers. Understanding the 7 tiers of Disaster Recovery and the goals associated helps organizations evaluate the DR solution that they currently have in place and determine what level is matching their business requirements. Tier 0 - No offsite data Tier 0 has no DR solution in place. There is no alternate location (hot site) available, no saved information, and no documentation and DR plans. Tier 0 offers no recovery options following a disaster. The ability to recover following a disaster is completely unpredictable and exposes the business to the risk of not being able to recover. No DR goals can be defined and recovery time and recovery point are unpredictable. Even if backups are done, the solution is categorized as Tier 0 if the backups are stored at the same location as the production environment and no proper vaulting procedure is in place. Tier 1 Off-site vaulting Tier 1 DR is relying on backups that are stored at an offsite storage facility (vaulting). No alternate environment (location, hardware, etc.) is available where to restore the date in case of a disaster. RCO depends on the consistency of the backups. Backups taken at different times for different application modules may render the application or some of its modules and interfaces inconsistent. RPO is defined depending on the frequency of the backups. RTO is very hard to define - as a new site needs to be built from scratch (location, infrastructure and equipment), and usually RTO is higher than a week. Recovery time is dependent on when hardware can be supplied or when a building for the new infrastructure can be located and prepared, and can take months. Tier 2 Offsite vaulting with a hot site Tier 2 is relying on backups sent offsite for recovery (same like) Tier 1 plus a hot site. An alternate location is available and backups can be transported there from the offsite storage facility in the event of a disaster. The availability of a hot site reduces the recovery time. RTO can be estimated and is lower than in Tier 1. No time is required to locate an alternate location, purchase and install hardware. The RTO is driven by the time required to recall the backups at the hot site available and load them (restore). RCO and RPO are similar with those offered by Tier 1. Tier 3 - Electronic Vaulting Tier 3 includes everything offered by Tier 2 plus electronic vaulting of a subset of the critical data. Electronic vaulting requires communication lines between the 2 sites and the creation and transmission of backups (traditional backups or data replication) more frequently than traditionally in the regular backup process. The recovery time improves and can be as low as one day. The recovery point improves for the critical data that is electronically vaulted to the remote site. The recovery consistency objective is the same like in Tier 2 the solution continues to be exposed to the risk of inconsistency. There is no notable RCO improvement when compared with Tier 2. Tier 4 - Electronic vaulting to secondary active site Tier 4 is comprised of two data centers with electronic vaulting between the two sites. The secondary site is also active and recovery can be bidirectional. The workload is shared between the two active sites and critical data is continuously transmitted between them, while the recovery of non-critical data continues to rely on off-site vaulting. Data loss is still possible in Tier 4 so the recovery point depends on the frequency with which the two site are synchronized The recovery time is lower, but the risk of inconsistency still exists between critical and noncritical data. Tier 5 - Transaction integrity (two-site, two-phase commit) Tier 5 maintains selected data in sync between the 2 sites. Transactions involving the selected critical set of data will be committed in the same time at both locations (single commit scope). Both primary site and the secondary site need to be updated before the update request is considered successful. A high bandwidth connection is required between the two sites.

5 Recovery consistency is improved, but it is unsure if transaction integrity of critical data is enough to make the whole consistent. Tier 6 - Zero or near-zero data loss Tier 6 involves immediate transfer of data to the alternate site. Data replication is used in order to maintain the two locations in sync. The recovery time is very low as well as the recovery point (data is in sync so the data loss is minimal or zero). There is not dependence on the applications or other resources to provide data consistency. Recovery consistency is assured. Data is considered lost only if a transaction has commenced but the request was not satisfied. This tier encompasses zero loss of data and almost immediate transfer to secondary platform. In such a configuration RCO is usually100%. 6. Conclusions Disaster recovery architecture and plans are driven by business requirements and consistency is often overlooked and not properly evaluated as a disaster recovery parameter. The goal of this paper was to introduce new metrics for consistency following disaster recovery. Interface consistency is introduced and evaluated in addition to module consistency. RICO and RTCO are proposed as alternate metrics to complement RCO and enhance the Recovery Consistency Characteristics. The disaster recovery goals (RPO, RTO and RCO) are evaluated in the context of the 7 tiers of disaster recovery defined by the SHARE User Group. 7. References [1] Octavian Paul Rotaru, Architecting for Disaster Recovery A Practitioner View, WORLDCOMP, Proceedings of SAM 2011, July [2] Cathy Warrick, John Sing, A Disaster Recovery Solution Selection Method, IBM RedBook, 7.pdf, February [3] C. Brooks, M. Bedernjak, I. Juran, J. Merryman, Disaster Recovery Strategies with Tivoli Storage Management, IBM RedBook, 4.pdf, November [4] Philip Clark, Contingency Planning and Strategies, Proceedings of InfoSecCD 2010, October [5] Richard Cocchiara, Beyond disaster recovery: becoming a resilient business, IBM Global Services, ftp://ps.boulder.ibm.com/common/ssi/rep_wh/n/buw0 3014USEN/BUW03014USEN.PDF, June [6] David Rudawitz, Enterprise Architecture and Disaster Recovery Planning On the way to an effective Business Continuity Planning Philosophy, Antervorte Consulting LLC, hitecture_and_disaster_recovery_planning.pdf, November [7] N. Arshad, D.Heimbigner, A. Wolf, Dealing with failures during failure recovery of distributed systems, Proceedings of DEAS 05, NY, USA, [8] Y. Edmund Lien, P. J. Weinberger, Consistency, concurrency, and crash recovery, Proceedings of the 1978 ACM SIGMOD international conference on management of data, NY, USA, [9] Lukman Susanto, Business Continuity/Disaster Recovery Planning, 2003, [10] U.S. Department of Commerce National Bureau of Standards, FIPS PUB 87 Federal Information Processing Standards Publication, Guidelines for ADP Contingency Planning, 1981 March 27. [11] Geoffery Wold, Testing Disaster Recovery Plans, Disaster Recovery Journal, Vol. 3, No. 3, p. 34. [12] Guy Witney Krocker, Disaster Recovery Testing: Cycle the Plan, Plan the Cycle, SANS Institute InfoSec Reading Room, [13] Constatine Karbaliotis, Critical Interests: Business Continuity, Disaster Recovery and Privacy, Symantec, September 2009 [14] Suparna Bhattacharya, C. Mohan, K W Brannon, I Narang, Hui-I Hsiao, M Subramanian, Coordination backup/recovery and data consistency between database and file systems, Proceedings of the 2002 ACM SIGMOD International Conference on Management of data.

Architecting for Disaster Recovery A Practitioner View

Architecting for Disaster Recovery A Practitioner View Architecting for Disaster Recovery A Practitioner View Octavian Paul ROTARU ACMS, Montréal, PQ, Canada Octavian.Rotaru@ACM.org Abstract Few businesses have the capability to effectively recover after a

More information

DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES

DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES Dejan Živanović EMC Technology Solutions Group SEE Presales Manager Dejan.Zivanovic@emc.com 1 The Business Maturity Model V Enabled Web

More information

Business Continuity: Choosing the Right Technology Solution

Business Continuity: Choosing the Right Technology Solution Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail

More information

Disaster Recovery for Oracle Database

Disaster Recovery for Oracle Database Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches

More information

Have a Plan of ATTACK. Not a panic attack. 10 September 2003 IBM Internal Use Only Jarrett Potts, Tivoli Sales Enablement

Have a Plan of ATTACK. Not a panic attack. 10 September 2003 IBM Internal Use Only Jarrett Potts, Tivoli Sales Enablement IBM Software Group Have a Plan of ATTACK Not a panic attack 10 September 2003 IBM Internal Use Only Jarrett Potts, Tivoli Sales Enablement Abstract This session will show the difference between Business

More information

Computer-Aided Disaster Recovery Planning Tools (CADRP)

Computer-Aided Disaster Recovery Planning Tools (CADRP) Computer-Aided Disaster Recovery Planning Tools (CADRP) Omar H. Alhazmi Department of Computer Science Taibah University Medina, Saudi Arabia ohhazmi@taibahu.edu.sa Abstract Information Technology Disaster

More information

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models 1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint

More information

ADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3

ADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3 ADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT Overview EXHIBIT E to Amendment No. 60 The Disaster Recovery (DR) Services, a Tier-Level DR Solution, addresses the

More information

How To Choose A Business Continuity Solution

How To Choose A Business Continuity Solution A Business Continuity Solution Selection Methodology Ellis Holman IBM Corp. Tuesday, March 13, 2012 Session Number 10387 Disclaimer Copyright IBM Corporation 2010. All rights reserved. U.S. Government

More information

Beyond Disaster Recovery: Why Your Backup Plan Won t Work

Beyond Disaster Recovery: Why Your Backup Plan Won t Work Beyond Disaster Recovery: Why Your Backup Plan Won t Work Contents Introduction... 3 The Data Backup Model - Upgraded for 2015... 4 Why Disaster Recovery Isn t Enough... 5 Business Consequences with DR-Only

More information

The Difference Between Disaster Recovery and Business Continuance

The Difference Between Disaster Recovery and Business Continuance The Difference Between Disaster Recovery and Business Continuance In high school geometry we learned that a square is a rectangle, but a rectangle is not a square. The same analogy applies to business

More information

High Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper

High Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper High Availability with Postgres Plus Advanced Server An EnterpriseDB White Paper For DBAs, Database Architects & IT Directors December 2013 Table of Contents Introduction 3 Active/Passive Clustering 4

More information

Windows Geo-Clustering: SQL Server

Windows Geo-Clustering: SQL Server Windows Geo-Clustering: SQL Server Edwin Sarmiento, Microsoft SQL Server MVP, Microsoft Certified Master Contents Introduction... 3 The Business Need for Geo-Clustering... 3 Single-location Clustering

More information

A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN

A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN Eman Al-Harbi 431920472@student.ksa.edu.sa Soha S. Zaghloul smekki@ksu.edu.sa Faculty of Computer and Information

More information

HA / DR Jargon Buster High Availability / Disaster Recovery

HA / DR Jargon Buster High Availability / Disaster Recovery HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster

More information

Things You Need to Know About Cloud Backup

Things You Need to Know About Cloud Backup Things You Need to Know About Cloud Backup Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective and reliable method of safeguarding the increasing

More information

Eliminating End User and Application Downtime:

Eliminating End User and Application Downtime: Eliminating End User and Application Downtime: Architecting the Right Continuous Availability and Disaster Recovery Environment March 2010 Table of Contents Introduction 3 Where to Start 3 Moving to Continuous

More information

Backup and Recovery 1

Backup and Recovery 1 Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup

More information

Audit of the Disaster Recovery Plan

Audit of the Disaster Recovery Plan Audit of the Disaster Recovery Plan Report # 11-05 Prepared by Office of Inspector General J. Timothy Beirnes, CPA, Inspector General Kit Robbins, CISA, CISM, CRISC, Lead Information Systems Auditor TABLE

More information

Cloud Computing and Disaster Recovery

Cloud Computing and Disaster Recovery Understanding the Cloud Environment Cloud Environment = Internet-based data access & exchange + Internet-based access to low cost computing & applications Cloud Computing and Disaster Recovery April 2013

More information

With 57% of small to medium-sized businesses (SMBs) having no formal disaster

With 57% of small to medium-sized businesses (SMBs) having no formal disaster Disaster Recovery For Business Owners Practical Guidance for a Critical Operation With 57% of small to medium-sized businesses (SMBs) having no formal disaster recovery plan (Symantec, 2011), and 52% believing

More information

DISASTER RECOVERY PLANNING GUIDE

DISASTER RECOVERY PLANNING GUIDE DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide

More information

courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview f5 networks P

courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview f5 networks P courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview Business Continuity, Disaster Recovery and Data Center Consolidation IT managers today must be ready for the

More information

Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747

Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747 Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747 Introduction Rajesh Gupta - rajgupta@deloitte.com Solution Network

More information

Comparative analysis of regular and cloud disaster and recovery systems

Comparative analysis of regular and cloud disaster and recovery systems Page 224 of 344 Comparative analysis of regular and cloud disaster and recovery systems Jasmin Azemović Faculty of information technologies University Džemal Bijedić Mostar, Sjeverni logor bb, Bosnia and

More information

GETTING STARTED WITH DISASTER RECOVERY PLANNING

GETTING STARTED WITH DISASTER RECOVERY PLANNING GETTING STARTED WITH DISASTER RECOVERY PLANNING Ten misperceptions, Five best practices EMC PERSPECTIVE Natural and man-made events plus the technology innovations of the 21st century have heightened awareness

More information

Selling Business Continuity to SMBs

Selling Business Continuity to SMBs Selling Business Continuity to SMBs A Three-Step Process to Developing a Successful Business Continuity/Disaster Recovery Practice The impact of data loss and downtime can have profound effects on small

More information

Data protection: Time-proven truths for your disruptive, virtual world

Data protection: Time-proven truths for your disruptive, virtual world WHITE PAPER Data protection: Time-proven truths for your disruptive, virtual world Table of contents Executive summary 2 Fundamentals for protecting virtual and physical environments 3 4 steps toward a

More information

Protecting Microsoft SQL Server

Protecting Microsoft SQL Server Your company relies on its databases. How are you protecting them? Protecting Microsoft SQL Server 2 Hudson Place suite 700 Hoboken, NJ 07030 Powered by 800-674-9495 www.nsisoftware.com Executive Summary

More information

Disaster recovery: Resilient cloud-based disaster recovery

Disaster recovery: Resilient cloud-based disaster recovery Disaster recovery: Resilient cloud-based disaster recovery Disaster recovery and business continuity applications in the cloud offer the benefits of speed, cost efficiency and availability, eliminating

More information

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11 Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node

More information

PROTECTING MICROSOFT SQL SERVER TM

PROTECTING MICROSOFT SQL SERVER TM WHITE PAPER PROTECTING MICROSOFT SQL SERVER TM Your company relies on its databases. How are you protecting them? Published: February 2006 Executive Summary Database Management Systems (DBMS) are the hidden

More information

DISASTER RECOVERY ebook FACING DISASTERS HEAD ON

DISASTER RECOVERY ebook FACING DISASTERS HEAD ON DISASTER RECOVERY ebook FACING DISASTERS HEAD ON CHAPTER 1: Facing Reality CHAPTER 2: Disaster Recovery Considerations CHAPTER 3: Making the Best Choices CHAPTER 4: A Single, Unified Solution CHAPTER 5:

More information

Business Continuity Planning Principles and Best Practices Tom Hinkel and Zach Duke

Business Continuity Planning Principles and Best Practices Tom Hinkel and Zach Duke Business Continuity Planning Principles and Best Practices Tom Hinkel and Zach Duke Agenda Key components essential to a FFIEC compliant Business Continuity Plan Recovery Time Objectives & Recovery Point

More information

The case for cloud-based disaster recovery

The case for cloud-based disaster recovery IBM Global Technology Services IBM SmartCloud IBM SmartCloud Virtualized Server Recovery i The case for cloud-based disaster recovery Cloud technologies help meet the need for quicker restoration of service

More information

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss

More information

Protecting Your Business

Protecting Your Business Protecting Your Business Business Continuity/Disaster Recovery Planning Robert Haberman Senior Product Manager BCP/DRP TELUS BUSINESS SOLUTIONS Business Continuity/Disaster Recovery Planning 1 Agenda:

More information

9/23/2013. Disaster Recovery Planning Best Practices. Over the Next Decade. 75X growth in files. 50X growth in data. 10X growth in servers

9/23/2013. Disaster Recovery Planning Best Practices. Over the Next Decade. 75X growth in files. 50X growth in data. 10X growth in servers Disaster Recovery Planning Best Practices Mohammad Alshafie, Systems Engineer mo@unitrends.com Harold Schmoecker, Regional Sales VP harold@unitrends.com Over the Next Decade 75X growth in files 50X growth

More information

To Tier or not to Tier

To Tier or not to Tier WHITEPAPERS To Tier or not to Tier Replicating VMware Workloads for Disaster Recovery Chances are, you already have protections in place for the event of a big storm that might threaten your business and

More information

Business Insurance FOR YOUR HANA DATABASE

Business Insurance FOR YOUR HANA DATABASE Insurance FOR YOUR HANA DATABASE Why It Pays to Invest in for SAP HANA January 2016 LET S GO 3 4 : The Challenge of Protecting Large Databases Universal Unique to HANA 8 Traditional Backups HANA System

More information

Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution. Database Solutions Engineering

Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution. Database Solutions Engineering Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution Database Solutions Engineering By Subhashini Prem and Leena Kushwaha Dell Product Group March 2009 THIS WHITE PAPER IS FOR INFORMATIONAL

More information

Simplify Your Data Protection Strategies: Best Practices for Online Backup & Recovery

Simplify Your Data Protection Strategies: Best Practices for Online Backup & Recovery Simplify Your Data Protection Strategies: Best Practices for Online Backup & Recovery Souvik Choudhury, Senior Director, Product Management SunGard Availability Services DRAFT www.sungardas.com Agenda

More information

Business Continuity Planning and Disaster Recovery Planning. Ed Crowley IAM/IEM

Business Continuity Planning and Disaster Recovery Planning. Ed Crowley IAM/IEM Business Continuity Planning and Disaster Recovery Planning Ed Crowley IAM/IEM 1 Goals Compare and contrast aspects of business continuity Execute disaster recovery plans and procedures 2 Topics Business

More information

Unitrends Backup & Recovery Solutions and Disaster Recovery Best Practices

Unitrends Backup & Recovery Solutions and Disaster Recovery Best Practices Solution Brief Unitrends Backup & Recovery Solutions and Disaster Recovery Best Practices 2 So you re confident knowing that the backup and recovery solution protecting your business-critical operations

More information

Traditional Disaster Recovery versus Cloud based DR

Traditional Disaster Recovery versus Cloud based DR Traditional Disaster Recovery versus Cloud based DR May 2014 Executive Summary Many businesses want Disaster Recovery (DR) services to prevent either man-made or natural disasters from causing expensive

More information

Synchronous Data Replication

Synchronous Data Replication S O L U T I O N S B R I E F Synchronous Data Replication Hitachi Data Systems Synchronous Data Replication Business continuity has become one of the top issues facing businesses and organizations all around

More information

Implementing Disaster Recovery? At What Cost?

Implementing Disaster Recovery? At What Cost? Implementing Disaster Recovery? At What Cost? Whitepaper Viktor Babkov Technical Director Business Continuity Copyright Business Continuity May 2010 In today s environment, minimizing IT downtime has become

More information

Company Management System. Business Continuity in SIA

Company Management System. Business Continuity in SIA Company Management System Business Continuity in SIA Document code: Classification: Company Project/Service Year Document No. Version Public INDEX 1. INTRODUCTION... 3 2. SIA S BUSINESS CONTINUITY MANAGEMENT

More information

Business Continuity Planning and Disaster Recovery Planning

Business Continuity Planning and Disaster Recovery Planning Business Continuity Planning and Disaster Recovery Planning Ed Crowley IAM/IEM 1 ISC 2 Key Areas of Knowledge Understand business continuity requirements 1. Develop and document project scope and plan

More information

GOVERNMENT FINANCE OFFICERS ASSOCIATION OF MISSOURI SPRING 2012 CONFERENCE IT DISASTER PLAN

GOVERNMENT FINANCE OFFICERS ASSOCIATION OF MISSOURI SPRING 2012 CONFERENCE IT DISASTER PLAN GOVERNMENT FINANCE OFFICERS ASSOCIATION OF MISSOURI SPRING 2012 CONFERENCE IT DISASTER PLAN 2012 Sikich LLP. All Rights Reserved. Presented by: Scott Wegner Partner, Director Networking Services Sikich

More information

Top 10 Disaster Recovery Pitfalls

Top 10 Disaster Recovery Pitfalls Top 10 Disaster Recovery Pitfalls The key to successful disaster recovery is good planning. But with so much at stake for your business, how do you plan with confidence and ensure all stakeholders know

More information

Real-time Protection for Hyper-V

Real-time Protection for Hyper-V 1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate

More information

TECHNICAL SOLUTION BRIEF

TECHNICAL SOLUTION BRIEF EXCHANGE 2010 DAG Microsoft Exchange Database Availability Groups (DAG) provide a simpler way to replicate data than the approaches in previous versions of Exchange, allowing for easier creation of a single-site

More information

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper Copyright 2011-2012 Dbvisit Software Limited. All Rights Reserved v2, Mar 2012 Contents Executive Summary... 1

More information

Virtualizing disaster recovery using cloud computing

Virtualizing disaster recovery using cloud computing IBM Global Technology Services Thought Leadership White Paper January 2012 Virtualizing disaster recovery using cloud computing Transition your applications quickly to a resilient cloud 2 Virtualizing

More information

Using Live Sync to Support Disaster Recovery

Using Live Sync to Support Disaster Recovery Using Live Sync to Support Disaster Recovery SIMPANA VIRTUAL SERVER AGENT FOR VMWARE Live Sync uses backup data to create and maintain a warm disaster recovery site. With backup and replication from a

More information

EonStor DS remote replication feature guide

EonStor DS remote replication feature guide EonStor DS remote replication feature guide White paper Version: 1.0 Updated: Abstract: Remote replication on select EonStor DS storage systems offers strong defense against major disruption to IT continuity,

More information

Sanovi DRM for Oracle Database

Sanovi DRM for Oracle Database Application Defined Continuity Sanovi DRM for Oracle Database White Paper Copyright@2012, Sanovi Technologies Table of Contents Executive Summary 3 Introduction 3 Audience 3 Oracle Protection Overview

More information

Disaster Recovery Planning Guide

Disaster Recovery Planning Guide WHITE PAPER: DISASTER RECOVERY PLANNING GUIDE........................................ Disaster Recovery Planning Guide Who should read this paper CIOs, VP of IT, and anyone involved in Business Continuity

More information

Business Continuity, Disaster Recovery, and Risk Analysis

Business Continuity, Disaster Recovery, and Risk Analysis Business Continuity, Disaster Recovery, and Risk Analysis Paulo Beck Security and Business Continuity Practice Principal Hewlett-Packard, Latin America & Caribbean Region XXVI Salón de Informática La gobernabilidad

More information

Consulting Solutions Disaster Recovery. Yucem Cagdar

Consulting Solutions Disaster Recovery. Yucem Cagdar Consulting Solutions Disaster Recovery Yucem Cagdar Disaster Recovery Strategy How efficient is your DR Plan? Many are not prepared: 42% are not adequately armed with modern disaster recovery solutions,

More information

E x E c u t i v E B r i E f IT Innovation. Business Value. 4 Stages of IT Disaster Recovery Planning Are You Resilient?

E x E c u t i v E B r i E f IT Innovation. Business Value. 4 Stages of IT Disaster Recovery Planning Are You Resilient? IT Innovation. Business Value. 4 Stages of IT Disaster Recovery Planning Are You Resilient? As the enterprise IT landscape becomes more complex, customers more demanding, and computing devices more abundant

More information

State of South Carolina Policy Guidance and Training

State of South Carolina Policy Guidance and Training State of South Carolina Policy Guidance and Training Policy Workshop All Agencies Business Continuity Management Policy June 2014 Agenda Questions & Follow-Up Policy Workshop Overview & Timeline Policy

More information

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation Next Generation Data Protection with Symantec NetBackup 7 Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation White Paper: Next Generation Data Protection with NetBackup

More information

What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility

What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility Your Guide to Cost, Security, and Flexibility What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility 10 common questions answered Over the last decade, cloud backup, recovery

More information

Business Continuity Planning

Business Continuity Planning Business Continuity Planning We believe all organisations recognise the importance of having a Business Continuity Plan, however we understand that it can be difficult to know where to start. That s why

More information

Managed Backup A Strategic Network Consulting white paper

Managed Backup A Strategic Network Consulting white paper Managed Backup A Strategic Network Consulting white paper 2 Managed Backup Executive Summary Businesses survive disasters only if their data survives. But many business owners are so busy running day-to-day

More information

Powered by DATTO. Backup vs. Business Continuity: Using a Recovery Time Objective (RTO) to Better Plan for Your Business

Powered by DATTO. Backup vs. Business Continuity: Using a Recovery Time Objective (RTO) to Better Plan for Your Business Backup vs. Business Continuity: Using a Recovery Time Objective (RTO) to Better Plan for Your Business Executive Summary SMBs in general don t have the same IT budgets and staffs as larger enterprises.

More information

Disaster Recovery Planning for Health care Providers

Disaster Recovery Planning for Health care Providers E-Guide Disaster Recovery Planning for Health care Providers For hospitals, timely access to patient data is critical for maintaining normal operations during a natural or man-made disaster. This Eguide

More information

Backup vs. Business Continuity: Using RTO to Better Plan for Your Business

Backup vs. Business Continuity: Using RTO to Better Plan for Your Business Backup vs. Business Continuity: Using RTO to Better Plan for Your Business Executive Summary SMBs in general don t have the same IT budgets and staffs as larger enterprises. Yet just like larger organizations

More information

Whitepaper: Backup vs. Business Continuity

Whitepaper: Backup vs. Business Continuity Whitepaper: Backup vs. Business Continuity Using RTO to Better Plan for Your Business Executive Summary SMBs in general don t have the same IT budgets and staffs as larger enterprises. Yet just like larger

More information

Traditional Backup vs. Business Continuity

Traditional Backup vs. Business Continuity Whitepaper: Traditional Backup vs. Business Continuity - Page 1 Traditional Backup vs. Business Continuity Using Recovery Objectives to Develop a Better Plan for your Data Protection SMBs and large enterprises

More information

Disaster Recovery. Hendry Taylor Tayori Limited

Disaster Recovery. Hendry Taylor Tayori Limited Disaster Recovery Hendry Taylor Tayori Limited Agenda What is Business Continuity planning (BCP) What is Disaster Recovery (DR) and Disaster Recovery Planning (DRP) Overview Lifecycle Analysis Plan design

More information

Business Continuity. What do we mean by Business Continuity? No downtime!

Business Continuity. What do we mean by Business Continuity? No downtime! What do we mean by Business Continuity? No downtime! How much will your customers be affected if your server suddenly failed and a complete restoration took a full day? Would accessing your server even

More information

Welcome to My E-Book

Welcome to My E-Book Welcome to My E-Book I decided to write this e-book as a response to the many questions that I get from business owners about data backup solutions. I have seen first-hand that business owners are very

More information

The Big Bang: cloud resiliency and the data explosion

The Big Bang: cloud resiliency and the data explosion Deborah Orr, Forbes Insights Analyst Daniel Witteveen, Director, IBM Cloud Managed Backup and Data Virtualization 03/23/2015 The Big Bang: cloud resiliency and the data explosion 2015 IBM Corporation Agenda

More information

Why you need a new approach to Disaster Recovery

Why you need a new approach to Disaster Recovery Why you need a new approach to Disaster Recovery Summary Disaster Recovery as a Service (DRaaS) not only ensures business critical applications and data are available rapidly in the event of a partial

More information

Availability Digest. What is Active/Active? October 2006

Availability Digest. What is Active/Active? October 2006 the Availability Digest What is Active/Active? October 2006 It is a fundamental fact that any system can and will fail at some point. The secret to achieving extreme availabilities is to let it fail, but

More information

Business white paper. environments. The top 5 challenges and solutions for backup and recovery

Business white paper. environments. The top 5 challenges and solutions for backup and recovery Business white paper Protecting missioncritical application environments The top 5 challenges and solutions for backup and recovery Table of contents 3 Executive summary 3 Key facts about mission-critical

More information

Virtualization. Disaster Recovery. A Foundation for Disaster Recovery in the Cloud

Virtualization. Disaster Recovery. A Foundation for Disaster Recovery in the Cloud Technology Paper Disaster Acronym: DR The process, policies, and procedures that enable a business to recover data and systems after a disaster. A Foundation for Disaster in the Cloud Introduction Virtualization

More information

Backup vs. Business Continuity: Using RTO to Better Plan for Your Business Networks Plus

Backup vs. Business Continuity: Using RTO to Better Plan for Your Business Networks Plus networksplus.com 800.299.1704 Backup vs. Business Continuity: Using RTO to Better Plan for Your Business Networks Plus Executive Summary SMBs in general don t have the same IT budgets and staffs as larger

More information

Virtual Disaster Recovery

Virtual Disaster Recovery Virtual Disaster Recovery White Paper September 16, 2008 Kelly Laughton Davenport Group Consultant Davenport Group 2008. All rights reserved. Introduction Today s data center has evolved into a complex,

More information

Our Business Continuity Solutions Ensure Long-Term Success

Our Business Continuity Solutions Ensure Long-Term Success Hill Country Our Business Continuity Solutions Ensure Long-Term Success Hill Country Our Business Continuity Solutions Ensure Long-Term Success Why Business Continuity Planning Matters Whether you own

More information

White Paper. Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1. Copyright 2014, ezdi, LLC.

White Paper. Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1. Copyright 2014, ezdi, LLC. White Paper ezcac: HIPAA Compliant Cloud Solution Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1 Copyright 2014, ezdi, LLC. TECHNICAL SAFEGUARDS Access Control 164.312 (a) (1)

More information

RPO represents the data differential between the source cluster and the replicas.

RPO represents the data differential between the source cluster and the replicas. Technical brief Introduction Disaster recovery (DR) is the science of returning a system to operating status after a site-wide disaster. DR enables business continuity for significant data center failures

More information

Abhi Rathinavelu Foster School of Business

Abhi Rathinavelu Foster School of Business Abhi Rathinavelu Foster School of Business What is Disaster? A disaster is considered any incident or event that results in a major interruption of business operations Major: Earthquake >5.0, Volcanic

More information

CA API Management SaaS

CA API Management SaaS SaaS Listing CA API Management SaaS 1. Introduction This document provides standards and features that apply to the CA API Management SaaS offering ( Service ) provided to the Customer and defines the

More information

SQL Server High Availability: After Virtualization SQL PASS Virtualization Virtual Chapter September 11, 2013

SQL Server High Availability: After Virtualization SQL PASS Virtualization Virtual Chapter September 11, 2013 SQL Server High Availability: After Virtualization SQL PASS Virtualization Virtual Chapter September 11, 2013 About David Klee Founder and Chief Architect, Heraflux Technologies Teammate, Linchpin People

More information

RecoverGuard software will find the critical configuration errors your last DR test missed.

RecoverGuard software will find the critical configuration errors your last DR test missed. D R V U L N E R A B I L I T Y A N A LY S I S CONTINUITY SOFTWARE RecoverGuard software will find the critical configuration errors your last DR test missed. And we can prove it. Recently, one of the largest

More information

Business Continuity with the. Concerto 7000 All Flash Array. Layers of Protection for Here, Near and Anywhere Data Availability

Business Continuity with the. Concerto 7000 All Flash Array. Layers of Protection for Here, Near and Anywhere Data Availability Business Continuity with the Concerto 7000 All Flash Array Layers of Protection for Here, Near and Anywhere Data Availability Version 1.0 Abstract Concerto 7000 All Flash Array s Continuous Data Protection

More information

Disaster Recovery Plan and Backup Strategy for a website

Disaster Recovery Plan and Backup Strategy for a website Disaster Recovery Plan and Backup Strategy for a website Sanjiv Agarwala CISSP,CISA,CISM,CGEIT,ITIL,MBCI,ISO27001,ISO9001 Director, Trainer and Principal Consultant Oxygen Consulting Services Pvt. Ltd.

More information

An introduction to disaster recovery. And how DrAAS from I.R.I.S. Ondit can help!

An introduction to disaster recovery. And how DrAAS from I.R.I.S. Ondit can help! An introduction to disaster recovery And how DrAAS from I.R.I.S. Ondit can help! Events That Impact Information Availability Events that require a data center move: Fewer than 1% of occurrences Natural

More information

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Three

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Three Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Three Information Security- Perspective for Management Business Impact Analysis ( BIA ) and Business

More information

Disaster Recovery Planning Guide

Disaster Recovery Planning Guide Who should read this paper ICIOs, VP of IT, and anyone involved in Business Continuity Planning. Content Introduction....3 Assess Your Business Needs....3 Are You Missing the True Impact of Silent Disasters?...4

More information

Disaster Recovery of Tier 1 Applications on VMware vcenter Site Recovery Manager

Disaster Recovery of Tier 1 Applications on VMware vcenter Site Recovery Manager Disaster Recovery of Tier 1 Applications on VMware vcenter Site Recovery Manager This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by

More information

White Paper for Data Protection with Synology Snapshot Technology. Based on Btrfs File System

White Paper for Data Protection with Synology Snapshot Technology. Based on Btrfs File System White Paper for Data Protection with Synology Snapshot Technology Based on Btrfs File System 1 Table of Contents Introduction 3 Data Protection Technologies 4 Btrfs File System Snapshot Technology How

More information

Storage System High-Availability & Disaster Recovery Overview [638]

Storage System High-Availability & Disaster Recovery Overview [638] Storage System High-Availability & Disaster Recovery Overview [638] John Wolfgang Enterprise Storage Architecture & Services jwolfgang@vicominfinity.com 26 June 2014 Agenda Background Application-Based

More information

DISASTER RECOVERY 101 3 Steps You Need to Take (Before It s Too Late)

DISASTER RECOVERY 101 3 Steps You Need to Take (Before It s Too Late) DISASTER RECOVERY 101 3 Steps You Need to Take (Before It s Too Late) Introduction... 4 Disaster Recovery vs. Business Continuity... 4 Why You Need to Read this ebook... 5 Chapter 1: The Risks (aka, The

More information

BUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g

BUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g BUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g ENABLED BY EMC VMAX 10K AND EMC RECOVERPOINT Technical Presentation EMC Solutions Group 1 Agenda Business case Symmetrix VMAX 10K overview RecoverPoint

More information

Business Continuity Management

Business Continuity Management Business Continuity Management cliftonlarsonallen.com Introductions Brian Pye CliftonLarsonAllen Senior Manager Business Risk Services group 15 years of experience with Business Continuity Megan Moore

More information