Beyond Traditional Disaster Recovery Goals Augmenting the Recovery Consistency Characteristics
|
|
- Sophia Jackson
- 8 years ago
- Views:
Transcription
1 Beyond Traditional Disaster Recovery Goals Augmenting the Recovery Consistency Characteristics Octavian Paul ROTARU American Sentinel University Abstract For most organizations the disaster recovery goals are limited to Recovery Point Objective (RPO) and Recovery Time Objective (RTO). This perspective on disaster recovery overlooks very important factors that can contribute to the successful implementation of a Disaster Recovery plan. Evaluating metrics beyond recovery time (RTO) and recovery point (RPO) is essential to meet the recovery commitments of an organization. The purpose of this paper is to review existing Disaster Recovery metrics that can augment the Recovery Point and Recovery Time and to propose new metrics for Recovery Consistency. Recovery Consistency Objective is measuring the total data consistency of your Disaster Recovery solution post recovery. Recovery Consistency Objective (RCO) ads data consistency objectives to the disaster recovery objectives of an organization, but often RCO is not enough to evaluate consistency. Going beyond the traditional disaster recovery goals, this paper introduces an assessment method and metrics for the consistency of the module interfaces in addition to the module consistency. The RCO as well as the proposed interface consistency metrics are evaluated in the context of the seven disaster recovery tiers defined by SHARE User Group. Keywords: Business Continuity (BC), Business Resilience, Disaster Recovery (DR), Disaster Recovery Goals, Recovery Consistency Objective (RCO). 1. Introduction A successful disaster recovery plan has well defined goals that are in line with the business requirements. Defining the recovery objectives is one of the most important steps in creating a disaster recovery plan and the objectives are the result of the Business Impact Analysis (BIA). The maximum acceptable downtime in case of a disaster will vary depending on the nature of the business and the financial impacts of the downtime. Depending on the criticality of the data handled and service rendered, the business continuity approaches cover a wide range of options. Most organizations today depend heavily on their IT infrastructure and their data in order to be able to provide service to their customers and the recovery objectives will drive the selection of the disaster recovery strategy and the cost of the IT infrastructure required to support it. Cyber-infrastructure protection, business continuity and disaster recovery, includes safeguarding and ensuring the reliability and availability of key information assets, including personal information of citizens, consumers and employees [13], but reliability and availability need to be backed by data consistency in order to provide proper recovery. Susanto [9] considers IT to be the most important issues of all when discussing BC and DR, not only for being the foundation and backbone of the business but also because IT can play important roles in strategies development and improving efficiency of the whole BCP plan. In today s complex business environment data and application consistency is becoming more and more important. As outlined in [14], managing a combined store consisting of database data and file data in a robust and consistent manner is a challenge for large scale software systems. In such hybrid systems, images, videos, engineering drawings, etc. are stored as files on a file server while meta-data referencing/indexing such files is created and stored in a relational database to take advantage of efficient search. Consistency between database content and files is required for the application to function properly post recovery. Defining a Recovery Point and Recovery Time objective is often not enough to insure successful recovery following a disaster event. Recovery Consistency Characteristics (RCC), as well as Recovery Object Granularity (ROG) and Recovery Time Granularity (RTG) need to be assessed in order to discover risks to which the environment is exposed.
2 2. Metrics that augment the Recovery Point and Recovery Time Objectives Proper evaluation of a disaster recovery solution requires well defined metrics and risk assessment. The Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are usually driven by Service Level Agreements (SLA) that the organization is contractually or legally bound to. RTO defines the time required to recover the lost data while RPO define the potential loss of data (the time gap between the most recent data point that can be recovered and the disaster event). Even if RTO and RPO are enough to measure SLAs, these two metrics do not measure the overall consistency of the date or the risks to which the organization is exposed in case of a disaster event. Meeting the defined RTO and RPO doesn t mean that processing can be resumed. The recovered data may be inconsistent if components are recovered at different points in time. More comprehensive metrics are needed to assess the quality of the recovery plan. The recovery metrics used by most organizations in their business continuity plans fall into three main categories: 1. Recovery Time Characteristics 1.1. Recovery Time Objective (RTO) is the main Recovery Time Characteristics define for any DR solution and defines how quickly service (data and application) is recovered following a disaster scenario Recovery Time Granularity (RTG) measures the time spacing required for selecting a recovery point. RTG defines a logical recovery point selection. 2. Recovery Data Characteristics 2.1. Recovery Point Objective (RPO) defines the time gap between the disaster event and the point in time where data can be recovered. It is essentially a measurement of how much data (measured in time updates) is estimated be lost following a disaster Recovery Object Granularity (ROG) is measuring the granularity of the objects that a disaster recovery solution is capable to recover. 3. Recovery Consistency Characteristics 3.1. RCO measures the usability of recovered data by the associated applications. RCO is defined as percentages, evaluating the number of entities that are consistent after recovery. RTG complements RTO and RPO in situations in which logical failures are encountered. For example, a data replication solution with a zero RPO and well defined RTO will recover from a physical failure but not from a logical failure. Data corruption that is not detected in time will be replicated and compromise the ability to recovery. In such a situation, if no other way to recover exists, the RTG will be undermined, and another recovery solution need to be put in place to provide a recovery point in time in the past prior to the disaster event. As a result, RTO will highly increase. The object granularity defined by ROG can be a storage volume, a file system, a database, a cluster package or service (including all associated storage), etc. Going below a volume or a file system in terms of granularity proves in most situations to be very expensive and requires manual intervention (labor intensive). Measures the Recovery Consistency Characteristics in terms of only RCO is often not enough and the purpose of the next sections of this paper is to assess RCO and introduce new metrics to complement it. 3. Why RCO is not enough Data is point in time consistent only if all of the interrelated data components are exactly as they were at any single instant in time. Disaster recovery plans usually define only recovery point and recovery time objectives. The Recovery Time Objective (RTO) is the duration of time within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with business continuity disruptions. The Recovery Point Objective (RPO) is the maximum tolerable period in which data may be lost. In many circumstances, the consistency of the data may be compromised even if the RPO and RTO are met. In this context the introduction of the Recovery Consistency Objective (RCO) is necessary in order to evaluate the data consistency following recovery. RCO is defined as a percentage measuring the deviation between the actual and the targeted state of business data across systems. RCO is calculated as a percentage that measures the number of consistent modules of the system after recovery reported to the total number of modules of the system: = = c = Number of Consistent Modules t = Total number of modules i = Number of Inconsistent Modules where = +. Even if the recovery point objective and recovery time objective are properly evaluated and can be met,
3 the system can be restored in an inconsistent state, and some of the applications may not be able to properly recover. Let's consider as an example a complex system that is spanning across multiple storage systems. In case replication is synchronous for all storage systems the alternate site will always be in sync with the main production site and data and application consistency will be preserved. However, if the storage systems are using different replication techniques, then the recovery point will be different for each of them. Even if the general RPO is preserved (all storage frames at the alternate site have data at a point in time lower than the general RPO), the difference between the recovery points of different storage devices may result in data inconsistency between applications. Modules may try to access data assuming that it is in sync and fail to find the records that are needed. Similar inconsistencies may occur in case different replication techniques are used for data inside the same frame (synchronous and asynchronous). Depending on the criticality of the application and the way applications or modules are implemented, such application data inconsistencies (different recovery points) may prolong the recovery time and may require manual intervention. Evaluation and correction will take time and extend the recovery time beyond what the business can tolerate. The recovery consistency objective is very important in such situations and reflects the individual requirements of corresponding business data crosssystem consistency. An unplanned IT outage can equate to a disaster, depending on the scope and severity of the problem. RCO is more important than RTO and RPO in the context of BCP processes. RPO and RTO emphasize the traditional IT Disaster Recovery Planning, while RCO goes beyond DRP. An important part of preparing for a disaster is to understand the type of risks your organization is facing. The risk of data inconsistency following disaster recovery is measured by RCO. The cost associated with creating and assuring availability for the enterprise rise dramatically as you approach the requirement for 100% availability. In certain contexts data inconsistency is acceptable as long as system availability is maintained and downtime is reduced. In other business environments data inconsistency may have staggering costs. 4. Improved consistency assessment metrics for disaster recovery RCO measures the usability of recovered data by the associated applications. RTO calculated as described above does not take into consideration interfaces/links between application modules. Let's assume for example that our system has 3 modules, and each module is consistent after recovery. In this example the RCO is 100%. However, if the point in time recovery for the 3 modules is different, some of the links between modules may be inconsistent. In my view interfaces/links between modules of the same system need to be considered when calculating the overall consistency of the system following recovery. If all modules except one are recovered at the same point in time and one module at a different point in time, the interfaces between the module with the different recovery point and the others may be compromised. A better way to asses over consistency of the system is to combine RCO with a consistency objective for module interfaces (Recovery Interface Consistency Objective). The proposed RICO can be calculated as a percentage as well based on the following formula: = = ci = Number of Consistent Module Interfaces ii = Number of Inconsistent Module Interfaces ti = Total Number of Module Interfaces Combining RCO and RICO into a single measurement for consistency is more practical and can be achieved by merging RCO and RICO into one metric. The proposed measurement for recovery consistency is Recovery Total Consistency Objective and is calculated based on the following formula: = + + where n and m are weigh parameters that can be defined based on the number of modules and interfaces and the importance of interfaces vs modules. RTCO is covering both module consistency and interface consistency providing a better measurement than RCO. 5. Disaster Recovery Tiers and Goals The SHARE User Group established 7 tiers of Disaster Recovery solutions. Each of these tiers addresses different requirements and corresponds to a different set of disaster recovery goals. The table below provides disaster recovery goals estimated for each of
4 the 7 Disaster Recovery tiers. Understanding the 7 tiers of Disaster Recovery and the goals associated helps organizations evaluate the DR solution that they currently have in place and determine what level is matching their business requirements. Tier 0 - No offsite data Tier 0 has no DR solution in place. There is no alternate location (hot site) available, no saved information, and no documentation and DR plans. Tier 0 offers no recovery options following a disaster. The ability to recover following a disaster is completely unpredictable and exposes the business to the risk of not being able to recover. No DR goals can be defined and recovery time and recovery point are unpredictable. Even if backups are done, the solution is categorized as Tier 0 if the backups are stored at the same location as the production environment and no proper vaulting procedure is in place. Tier 1 Off-site vaulting Tier 1 DR is relying on backups that are stored at an offsite storage facility (vaulting). No alternate environment (location, hardware, etc.) is available where to restore the date in case of a disaster. RCO depends on the consistency of the backups. Backups taken at different times for different application modules may render the application or some of its modules and interfaces inconsistent. RPO is defined depending on the frequency of the backups. RTO is very hard to define - as a new site needs to be built from scratch (location, infrastructure and equipment), and usually RTO is higher than a week. Recovery time is dependent on when hardware can be supplied or when a building for the new infrastructure can be located and prepared, and can take months. Tier 2 Offsite vaulting with a hot site Tier 2 is relying on backups sent offsite for recovery (same like) Tier 1 plus a hot site. An alternate location is available and backups can be transported there from the offsite storage facility in the event of a disaster. The availability of a hot site reduces the recovery time. RTO can be estimated and is lower than in Tier 1. No time is required to locate an alternate location, purchase and install hardware. The RTO is driven by the time required to recall the backups at the hot site available and load them (restore). RCO and RPO are similar with those offered by Tier 1. Tier 3 - Electronic Vaulting Tier 3 includes everything offered by Tier 2 plus electronic vaulting of a subset of the critical data. Electronic vaulting requires communication lines between the 2 sites and the creation and transmission of backups (traditional backups or data replication) more frequently than traditionally in the regular backup process. The recovery time improves and can be as low as one day. The recovery point improves for the critical data that is electronically vaulted to the remote site. The recovery consistency objective is the same like in Tier 2 the solution continues to be exposed to the risk of inconsistency. There is no notable RCO improvement when compared with Tier 2. Tier 4 - Electronic vaulting to secondary active site Tier 4 is comprised of two data centers with electronic vaulting between the two sites. The secondary site is also active and recovery can be bidirectional. The workload is shared between the two active sites and critical data is continuously transmitted between them, while the recovery of non-critical data continues to rely on off-site vaulting. Data loss is still possible in Tier 4 so the recovery point depends on the frequency with which the two site are synchronized The recovery time is lower, but the risk of inconsistency still exists between critical and noncritical data. Tier 5 - Transaction integrity (two-site, two-phase commit) Tier 5 maintains selected data in sync between the 2 sites. Transactions involving the selected critical set of data will be committed in the same time at both locations (single commit scope). Both primary site and the secondary site need to be updated before the update request is considered successful. A high bandwidth connection is required between the two sites.
5 Recovery consistency is improved, but it is unsure if transaction integrity of critical data is enough to make the whole consistent. Tier 6 - Zero or near-zero data loss Tier 6 involves immediate transfer of data to the alternate site. Data replication is used in order to maintain the two locations in sync. The recovery time is very low as well as the recovery point (data is in sync so the data loss is minimal or zero). There is not dependence on the applications or other resources to provide data consistency. Recovery consistency is assured. Data is considered lost only if a transaction has commenced but the request was not satisfied. This tier encompasses zero loss of data and almost immediate transfer to secondary platform. In such a configuration RCO is usually100%. 6. Conclusions Disaster recovery architecture and plans are driven by business requirements and consistency is often overlooked and not properly evaluated as a disaster recovery parameter. The goal of this paper was to introduce new metrics for consistency following disaster recovery. Interface consistency is introduced and evaluated in addition to module consistency. RICO and RTCO are proposed as alternate metrics to complement RCO and enhance the Recovery Consistency Characteristics. The disaster recovery goals (RPO, RTO and RCO) are evaluated in the context of the 7 tiers of disaster recovery defined by the SHARE User Group. 7. References [1] Octavian Paul Rotaru, Architecting for Disaster Recovery A Practitioner View, WORLDCOMP, Proceedings of SAM 2011, July [2] Cathy Warrick, John Sing, A Disaster Recovery Solution Selection Method, IBM RedBook, 7.pdf, February [3] C. Brooks, M. Bedernjak, I. Juran, J. Merryman, Disaster Recovery Strategies with Tivoli Storage Management, IBM RedBook, 4.pdf, November [4] Philip Clark, Contingency Planning and Strategies, Proceedings of InfoSecCD 2010, October [5] Richard Cocchiara, Beyond disaster recovery: becoming a resilient business, IBM Global Services, ftp://ps.boulder.ibm.com/common/ssi/rep_wh/n/buw0 3014USEN/BUW03014USEN.PDF, June [6] David Rudawitz, Enterprise Architecture and Disaster Recovery Planning On the way to an effective Business Continuity Planning Philosophy, Antervorte Consulting LLC, hitecture_and_disaster_recovery_planning.pdf, November [7] N. Arshad, D.Heimbigner, A. Wolf, Dealing with failures during failure recovery of distributed systems, Proceedings of DEAS 05, NY, USA, [8] Y. Edmund Lien, P. J. Weinberger, Consistency, concurrency, and crash recovery, Proceedings of the 1978 ACM SIGMOD international conference on management of data, NY, USA, [9] Lukman Susanto, Business Continuity/Disaster Recovery Planning, 2003, [10] U.S. Department of Commerce National Bureau of Standards, FIPS PUB 87 Federal Information Processing Standards Publication, Guidelines for ADP Contingency Planning, 1981 March 27. [11] Geoffery Wold, Testing Disaster Recovery Plans, Disaster Recovery Journal, Vol. 3, No. 3, p. 34. [12] Guy Witney Krocker, Disaster Recovery Testing: Cycle the Plan, Plan the Cycle, SANS Institute InfoSec Reading Room, [13] Constatine Karbaliotis, Critical Interests: Business Continuity, Disaster Recovery and Privacy, Symantec, September 2009 [14] Suparna Bhattacharya, C. Mohan, K W Brannon, I Narang, Hui-I Hsiao, M Subramanian, Coordination backup/recovery and data consistency between database and file systems, Proceedings of the 2002 ACM SIGMOD International Conference on Management of data.
Architecting for Disaster Recovery A Practitioner View
Architecting for Disaster Recovery A Practitioner View Octavian Paul ROTARU ACMS, Montréal, PQ, Canada Octavian.Rotaru@ACM.org Abstract Few businesses have the capability to effectively recover after a
More informationDISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES
DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES Dejan Živanović EMC Technology Solutions Group SEE Presales Manager Dejan.Zivanovic@emc.com 1 The Business Maturity Model V Enabled Web
More informationBusiness Continuity: Choosing the Right Technology Solution
Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail
More informationDisaster Recovery for Oracle Database
Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches
More informationHave a Plan of ATTACK. Not a panic attack. 10 September 2003 IBM Internal Use Only Jarrett Potts, Tivoli Sales Enablement
IBM Software Group Have a Plan of ATTACK Not a panic attack 10 September 2003 IBM Internal Use Only Jarrett Potts, Tivoli Sales Enablement Abstract This session will show the difference between Business
More informationComputer-Aided Disaster Recovery Planning Tools (CADRP)
Computer-Aided Disaster Recovery Planning Tools (CADRP) Omar H. Alhazmi Department of Computer Science Taibah University Medina, Saudi Arabia ohhazmi@taibahu.edu.sa Abstract Information Technology Disaster
More informationTABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models
1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint
More informationADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3
ADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT Overview EXHIBIT E to Amendment No. 60 The Disaster Recovery (DR) Services, a Tier-Level DR Solution, addresses the
More informationHow To Choose A Business Continuity Solution
A Business Continuity Solution Selection Methodology Ellis Holman IBM Corp. Tuesday, March 13, 2012 Session Number 10387 Disclaimer Copyright IBM Corporation 2010. All rights reserved. U.S. Government
More informationBeyond Disaster Recovery: Why Your Backup Plan Won t Work
Beyond Disaster Recovery: Why Your Backup Plan Won t Work Contents Introduction... 3 The Data Backup Model - Upgraded for 2015... 4 Why Disaster Recovery Isn t Enough... 5 Business Consequences with DR-Only
More informationThe Difference Between Disaster Recovery and Business Continuance
The Difference Between Disaster Recovery and Business Continuance In high school geometry we learned that a square is a rectangle, but a rectangle is not a square. The same analogy applies to business
More informationHigh Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper
High Availability with Postgres Plus Advanced Server An EnterpriseDB White Paper For DBAs, Database Architects & IT Directors December 2013 Table of Contents Introduction 3 Active/Passive Clustering 4
More informationWindows Geo-Clustering: SQL Server
Windows Geo-Clustering: SQL Server Edwin Sarmiento, Microsoft SQL Server MVP, Microsoft Certified Master Contents Introduction... 3 The Business Need for Geo-Clustering... 3 Single-location Clustering
More informationA SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN
A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN Eman Al-Harbi 431920472@student.ksa.edu.sa Soha S. Zaghloul smekki@ksu.edu.sa Faculty of Computer and Information
More informationHA / DR Jargon Buster High Availability / Disaster Recovery
HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster
More informationThings You Need to Know About Cloud Backup
Things You Need to Know About Cloud Backup Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective and reliable method of safeguarding the increasing
More informationEliminating End User and Application Downtime:
Eliminating End User and Application Downtime: Architecting the Right Continuous Availability and Disaster Recovery Environment March 2010 Table of Contents Introduction 3 Where to Start 3 Moving to Continuous
More informationBackup and Recovery 1
Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup
More informationAudit of the Disaster Recovery Plan
Audit of the Disaster Recovery Plan Report # 11-05 Prepared by Office of Inspector General J. Timothy Beirnes, CPA, Inspector General Kit Robbins, CISA, CISM, CRISC, Lead Information Systems Auditor TABLE
More informationCloud Computing and Disaster Recovery
Understanding the Cloud Environment Cloud Environment = Internet-based data access & exchange + Internet-based access to low cost computing & applications Cloud Computing and Disaster Recovery April 2013
More informationWith 57% of small to medium-sized businesses (SMBs) having no formal disaster
Disaster Recovery For Business Owners Practical Guidance for a Critical Operation With 57% of small to medium-sized businesses (SMBs) having no formal disaster recovery plan (Symantec, 2011), and 52% believing
More informationDISASTER RECOVERY PLANNING GUIDE
DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide
More informationcourtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview f5 networks P
courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview Business Continuity, Disaster Recovery and Data Center Consolidation IT managers today must be ready for the
More informationRajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747
Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747 Introduction Rajesh Gupta - rajgupta@deloitte.com Solution Network
More informationComparative analysis of regular and cloud disaster and recovery systems
Page 224 of 344 Comparative analysis of regular and cloud disaster and recovery systems Jasmin Azemović Faculty of information technologies University Džemal Bijedić Mostar, Sjeverni logor bb, Bosnia and
More informationGETTING STARTED WITH DISASTER RECOVERY PLANNING
GETTING STARTED WITH DISASTER RECOVERY PLANNING Ten misperceptions, Five best practices EMC PERSPECTIVE Natural and man-made events plus the technology innovations of the 21st century have heightened awareness
More informationSelling Business Continuity to SMBs
Selling Business Continuity to SMBs A Three-Step Process to Developing a Successful Business Continuity/Disaster Recovery Practice The impact of data loss and downtime can have profound effects on small
More informationData protection: Time-proven truths for your disruptive, virtual world
WHITE PAPER Data protection: Time-proven truths for your disruptive, virtual world Table of contents Executive summary 2 Fundamentals for protecting virtual and physical environments 3 4 steps toward a
More informationProtecting Microsoft SQL Server
Your company relies on its databases. How are you protecting them? Protecting Microsoft SQL Server 2 Hudson Place suite 700 Hoboken, NJ 07030 Powered by 800-674-9495 www.nsisoftware.com Executive Summary
More informationDisaster recovery: Resilient cloud-based disaster recovery
Disaster recovery: Resilient cloud-based disaster recovery Disaster recovery and business continuity applications in the cloud offer the benefits of speed, cost efficiency and availability, eliminating
More informationInformix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11
Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node
More informationPROTECTING MICROSOFT SQL SERVER TM
WHITE PAPER PROTECTING MICROSOFT SQL SERVER TM Your company relies on its databases. How are you protecting them? Published: February 2006 Executive Summary Database Management Systems (DBMS) are the hidden
More informationDISASTER RECOVERY ebook FACING DISASTERS HEAD ON
DISASTER RECOVERY ebook FACING DISASTERS HEAD ON CHAPTER 1: Facing Reality CHAPTER 2: Disaster Recovery Considerations CHAPTER 3: Making the Best Choices CHAPTER 4: A Single, Unified Solution CHAPTER 5:
More informationBusiness Continuity Planning Principles and Best Practices Tom Hinkel and Zach Duke
Business Continuity Planning Principles and Best Practices Tom Hinkel and Zach Duke Agenda Key components essential to a FFIEC compliant Business Continuity Plan Recovery Time Objectives & Recovery Point
More informationThe case for cloud-based disaster recovery
IBM Global Technology Services IBM SmartCloud IBM SmartCloud Virtualized Server Recovery i The case for cloud-based disaster recovery Cloud technologies help meet the need for quicker restoration of service
More informationThe Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments
The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss
More informationProtecting Your Business
Protecting Your Business Business Continuity/Disaster Recovery Planning Robert Haberman Senior Product Manager BCP/DRP TELUS BUSINESS SOLUTIONS Business Continuity/Disaster Recovery Planning 1 Agenda:
More information9/23/2013. Disaster Recovery Planning Best Practices. Over the Next Decade. 75X growth in files. 50X growth in data. 10X growth in servers
Disaster Recovery Planning Best Practices Mohammad Alshafie, Systems Engineer mo@unitrends.com Harold Schmoecker, Regional Sales VP harold@unitrends.com Over the Next Decade 75X growth in files 50X growth
More informationTo Tier or not to Tier
WHITEPAPERS To Tier or not to Tier Replicating VMware Workloads for Disaster Recovery Chances are, you already have protections in place for the event of a big storm that might threaten your business and
More informationBusiness Insurance FOR YOUR HANA DATABASE
Insurance FOR YOUR HANA DATABASE Why It Pays to Invest in for SAP HANA January 2016 LET S GO 3 4 : The Challenge of Protecting Large Databases Universal Unique to HANA 8 Traditional Backups HANA System
More informationProtecting Microsoft SQL Server with an Integrated Dell / CommVault Solution. Database Solutions Engineering
Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution Database Solutions Engineering By Subhashini Prem and Leena Kushwaha Dell Product Group March 2009 THIS WHITE PAPER IS FOR INFORMATIONAL
More informationSimplify Your Data Protection Strategies: Best Practices for Online Backup & Recovery
Simplify Your Data Protection Strategies: Best Practices for Online Backup & Recovery Souvik Choudhury, Senior Director, Product Management SunGard Availability Services DRAFT www.sungardas.com Agenda
More informationBusiness Continuity Planning and Disaster Recovery Planning. Ed Crowley IAM/IEM
Business Continuity Planning and Disaster Recovery Planning Ed Crowley IAM/IEM 1 Goals Compare and contrast aspects of business continuity Execute disaster recovery plans and procedures 2 Topics Business
More informationUnitrends Backup & Recovery Solutions and Disaster Recovery Best Practices
Solution Brief Unitrends Backup & Recovery Solutions and Disaster Recovery Best Practices 2 So you re confident knowing that the backup and recovery solution protecting your business-critical operations
More informationTraditional Disaster Recovery versus Cloud based DR
Traditional Disaster Recovery versus Cloud based DR May 2014 Executive Summary Many businesses want Disaster Recovery (DR) services to prevent either man-made or natural disasters from causing expensive
More informationSynchronous Data Replication
S O L U T I O N S B R I E F Synchronous Data Replication Hitachi Data Systems Synchronous Data Replication Business continuity has become one of the top issues facing businesses and organizations all around
More informationImplementing Disaster Recovery? At What Cost?
Implementing Disaster Recovery? At What Cost? Whitepaper Viktor Babkov Technical Director Business Continuity Copyright Business Continuity May 2010 In today s environment, minimizing IT downtime has become
More informationCompany Management System. Business Continuity in SIA
Company Management System Business Continuity in SIA Document code: Classification: Company Project/Service Year Document No. Version Public INDEX 1. INTRODUCTION... 3 2. SIA S BUSINESS CONTINUITY MANAGEMENT
More informationBusiness Continuity Planning and Disaster Recovery Planning
Business Continuity Planning and Disaster Recovery Planning Ed Crowley IAM/IEM 1 ISC 2 Key Areas of Knowledge Understand business continuity requirements 1. Develop and document project scope and plan
More informationGOVERNMENT FINANCE OFFICERS ASSOCIATION OF MISSOURI SPRING 2012 CONFERENCE IT DISASTER PLAN
GOVERNMENT FINANCE OFFICERS ASSOCIATION OF MISSOURI SPRING 2012 CONFERENCE IT DISASTER PLAN 2012 Sikich LLP. All Rights Reserved. Presented by: Scott Wegner Partner, Director Networking Services Sikich
More informationTop 10 Disaster Recovery Pitfalls
Top 10 Disaster Recovery Pitfalls The key to successful disaster recovery is good planning. But with so much at stake for your business, how do you plan with confidence and ensure all stakeholders know
More informationReal-time Protection for Hyper-V
1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate
More informationTECHNICAL SOLUTION BRIEF
EXCHANGE 2010 DAG Microsoft Exchange Database Availability Groups (DAG) provide a simpler way to replicate data than the approaches in previous versions of Exchange, allowing for easier creation of a single-site
More informationDisaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper
Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper Copyright 2011-2012 Dbvisit Software Limited. All Rights Reserved v2, Mar 2012 Contents Executive Summary... 1
More informationVirtualizing disaster recovery using cloud computing
IBM Global Technology Services Thought Leadership White Paper January 2012 Virtualizing disaster recovery using cloud computing Transition your applications quickly to a resilient cloud 2 Virtualizing
More informationUsing Live Sync to Support Disaster Recovery
Using Live Sync to Support Disaster Recovery SIMPANA VIRTUAL SERVER AGENT FOR VMWARE Live Sync uses backup data to create and maintain a warm disaster recovery site. With backup and replication from a
More informationEonStor DS remote replication feature guide
EonStor DS remote replication feature guide White paper Version: 1.0 Updated: Abstract: Remote replication on select EonStor DS storage systems offers strong defense against major disruption to IT continuity,
More informationSanovi DRM for Oracle Database
Application Defined Continuity Sanovi DRM for Oracle Database White Paper Copyright@2012, Sanovi Technologies Table of Contents Executive Summary 3 Introduction 3 Audience 3 Oracle Protection Overview
More informationDisaster Recovery Planning Guide
WHITE PAPER: DISASTER RECOVERY PLANNING GUIDE........................................ Disaster Recovery Planning Guide Who should read this paper CIOs, VP of IT, and anyone involved in Business Continuity
More informationBusiness Continuity, Disaster Recovery, and Risk Analysis
Business Continuity, Disaster Recovery, and Risk Analysis Paulo Beck Security and Business Continuity Practice Principal Hewlett-Packard, Latin America & Caribbean Region XXVI Salón de Informática La gobernabilidad
More informationConsulting Solutions Disaster Recovery. Yucem Cagdar
Consulting Solutions Disaster Recovery Yucem Cagdar Disaster Recovery Strategy How efficient is your DR Plan? Many are not prepared: 42% are not adequately armed with modern disaster recovery solutions,
More informationE x E c u t i v E B r i E f IT Innovation. Business Value. 4 Stages of IT Disaster Recovery Planning Are You Resilient?
IT Innovation. Business Value. 4 Stages of IT Disaster Recovery Planning Are You Resilient? As the enterprise IT landscape becomes more complex, customers more demanding, and computing devices more abundant
More informationState of South Carolina Policy Guidance and Training
State of South Carolina Policy Guidance and Training Policy Workshop All Agencies Business Continuity Management Policy June 2014 Agenda Questions & Follow-Up Policy Workshop Overview & Timeline Policy
More informationMayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation
Next Generation Data Protection with Symantec NetBackup 7 Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation White Paper: Next Generation Data Protection with NetBackup
More informationWhat You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility
Your Guide to Cost, Security, and Flexibility What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility 10 common questions answered Over the last decade, cloud backup, recovery
More informationBusiness Continuity Planning
Business Continuity Planning We believe all organisations recognise the importance of having a Business Continuity Plan, however we understand that it can be difficult to know where to start. That s why
More informationManaged Backup A Strategic Network Consulting white paper
Managed Backup A Strategic Network Consulting white paper 2 Managed Backup Executive Summary Businesses survive disasters only if their data survives. But many business owners are so busy running day-to-day
More informationPowered by DATTO. Backup vs. Business Continuity: Using a Recovery Time Objective (RTO) to Better Plan for Your Business
Backup vs. Business Continuity: Using a Recovery Time Objective (RTO) to Better Plan for Your Business Executive Summary SMBs in general don t have the same IT budgets and staffs as larger enterprises.
More informationDisaster Recovery Planning for Health care Providers
E-Guide Disaster Recovery Planning for Health care Providers For hospitals, timely access to patient data is critical for maintaining normal operations during a natural or man-made disaster. This Eguide
More informationBackup vs. Business Continuity: Using RTO to Better Plan for Your Business
Backup vs. Business Continuity: Using RTO to Better Plan for Your Business Executive Summary SMBs in general don t have the same IT budgets and staffs as larger enterprises. Yet just like larger organizations
More informationWhitepaper: Backup vs. Business Continuity
Whitepaper: Backup vs. Business Continuity Using RTO to Better Plan for Your Business Executive Summary SMBs in general don t have the same IT budgets and staffs as larger enterprises. Yet just like larger
More informationTraditional Backup vs. Business Continuity
Whitepaper: Traditional Backup vs. Business Continuity - Page 1 Traditional Backup vs. Business Continuity Using Recovery Objectives to Develop a Better Plan for your Data Protection SMBs and large enterprises
More informationDisaster Recovery. Hendry Taylor Tayori Limited
Disaster Recovery Hendry Taylor Tayori Limited Agenda What is Business Continuity planning (BCP) What is Disaster Recovery (DR) and Disaster Recovery Planning (DRP) Overview Lifecycle Analysis Plan design
More informationBusiness Continuity. What do we mean by Business Continuity? No downtime!
What do we mean by Business Continuity? No downtime! How much will your customers be affected if your server suddenly failed and a complete restoration took a full day? Would accessing your server even
More informationWelcome to My E-Book
Welcome to My E-Book I decided to write this e-book as a response to the many questions that I get from business owners about data backup solutions. I have seen first-hand that business owners are very
More informationThe Big Bang: cloud resiliency and the data explosion
Deborah Orr, Forbes Insights Analyst Daniel Witteveen, Director, IBM Cloud Managed Backup and Data Virtualization 03/23/2015 The Big Bang: cloud resiliency and the data explosion 2015 IBM Corporation Agenda
More informationWhy you need a new approach to Disaster Recovery
Why you need a new approach to Disaster Recovery Summary Disaster Recovery as a Service (DRaaS) not only ensures business critical applications and data are available rapidly in the event of a partial
More informationAvailability Digest. What is Active/Active? October 2006
the Availability Digest What is Active/Active? October 2006 It is a fundamental fact that any system can and will fail at some point. The secret to achieving extreme availabilities is to let it fail, but
More informationBusiness white paper. environments. The top 5 challenges and solutions for backup and recovery
Business white paper Protecting missioncritical application environments The top 5 challenges and solutions for backup and recovery Table of contents 3 Executive summary 3 Key facts about mission-critical
More informationVirtualization. Disaster Recovery. A Foundation for Disaster Recovery in the Cloud
Technology Paper Disaster Acronym: DR The process, policies, and procedures that enable a business to recover data and systems after a disaster. A Foundation for Disaster in the Cloud Introduction Virtualization
More informationBackup vs. Business Continuity: Using RTO to Better Plan for Your Business Networks Plus
networksplus.com 800.299.1704 Backup vs. Business Continuity: Using RTO to Better Plan for Your Business Networks Plus Executive Summary SMBs in general don t have the same IT budgets and staffs as larger
More informationVirtual Disaster Recovery
Virtual Disaster Recovery White Paper September 16, 2008 Kelly Laughton Davenport Group Consultant Davenport Group 2008. All rights reserved. Introduction Today s data center has evolved into a complex,
More informationOur Business Continuity Solutions Ensure Long-Term Success
Hill Country Our Business Continuity Solutions Ensure Long-Term Success Hill Country Our Business Continuity Solutions Ensure Long-Term Success Why Business Continuity Planning Matters Whether you own
More informationWhite Paper. Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1. Copyright 2014, ezdi, LLC.
White Paper ezcac: HIPAA Compliant Cloud Solution Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1 Copyright 2014, ezdi, LLC. TECHNICAL SAFEGUARDS Access Control 164.312 (a) (1)
More informationRPO represents the data differential between the source cluster and the replicas.
Technical brief Introduction Disaster recovery (DR) is the science of returning a system to operating status after a site-wide disaster. DR enables business continuity for significant data center failures
More informationAbhi Rathinavelu Foster School of Business
Abhi Rathinavelu Foster School of Business What is Disaster? A disaster is considered any incident or event that results in a major interruption of business operations Major: Earthquake >5.0, Volcanic
More informationCA API Management SaaS
SaaS Listing CA API Management SaaS 1. Introduction This document provides standards and features that apply to the CA API Management SaaS offering ( Service ) provided to the Customer and defines the
More informationSQL Server High Availability: After Virtualization SQL PASS Virtualization Virtual Chapter September 11, 2013
SQL Server High Availability: After Virtualization SQL PASS Virtualization Virtual Chapter September 11, 2013 About David Klee Founder and Chief Architect, Heraflux Technologies Teammate, Linchpin People
More informationRecoverGuard software will find the critical configuration errors your last DR test missed.
D R V U L N E R A B I L I T Y A N A LY S I S CONTINUITY SOFTWARE RecoverGuard software will find the critical configuration errors your last DR test missed. And we can prove it. Recently, one of the largest
More informationBusiness Continuity with the. Concerto 7000 All Flash Array. Layers of Protection for Here, Near and Anywhere Data Availability
Business Continuity with the Concerto 7000 All Flash Array Layers of Protection for Here, Near and Anywhere Data Availability Version 1.0 Abstract Concerto 7000 All Flash Array s Continuous Data Protection
More informationDisaster Recovery Plan and Backup Strategy for a website
Disaster Recovery Plan and Backup Strategy for a website Sanjiv Agarwala CISSP,CISA,CISM,CGEIT,ITIL,MBCI,ISO27001,ISO9001 Director, Trainer and Principal Consultant Oxygen Consulting Services Pvt. Ltd.
More informationAn introduction to disaster recovery. And how DrAAS from I.R.I.S. Ondit can help!
An introduction to disaster recovery And how DrAAS from I.R.I.S. Ondit can help! Events That Impact Information Availability Events that require a data center move: Fewer than 1% of occurrences Natural
More informationJoint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Three
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Three Information Security- Perspective for Management Business Impact Analysis ( BIA ) and Business
More informationDisaster Recovery Planning Guide
Who should read this paper ICIOs, VP of IT, and anyone involved in Business Continuity Planning. Content Introduction....3 Assess Your Business Needs....3 Are You Missing the True Impact of Silent Disasters?...4
More informationDisaster Recovery of Tier 1 Applications on VMware vcenter Site Recovery Manager
Disaster Recovery of Tier 1 Applications on VMware vcenter Site Recovery Manager This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by
More informationWhite Paper for Data Protection with Synology Snapshot Technology. Based on Btrfs File System
White Paper for Data Protection with Synology Snapshot Technology Based on Btrfs File System 1 Table of Contents Introduction 3 Data Protection Technologies 4 Btrfs File System Snapshot Technology How
More informationStorage System High-Availability & Disaster Recovery Overview [638]
Storage System High-Availability & Disaster Recovery Overview [638] John Wolfgang Enterprise Storage Architecture & Services jwolfgang@vicominfinity.com 26 June 2014 Agenda Background Application-Based
More informationDISASTER RECOVERY 101 3 Steps You Need to Take (Before It s Too Late)
DISASTER RECOVERY 101 3 Steps You Need to Take (Before It s Too Late) Introduction... 4 Disaster Recovery vs. Business Continuity... 4 Why You Need to Read this ebook... 5 Chapter 1: The Risks (aka, The
More informationBUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g
BUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g ENABLED BY EMC VMAX 10K AND EMC RECOVERPOINT Technical Presentation EMC Solutions Group 1 Agenda Business case Symmetrix VMAX 10K overview RecoverPoint
More informationBusiness Continuity Management
Business Continuity Management cliftonlarsonallen.com Introductions Brian Pye CliftonLarsonAllen Senior Manager Business Risk Services group 15 years of experience with Business Continuity Megan Moore
More information