Title: Georgia Enterprise Technology Services Disaster Recovery Category: Disaster Recovery and Business Continuity Readiness Contact: Mr.
|
|
- Howard Eaton
- 8 years ago
- Views:
Transcription
1 NASCIO 2015 State IT Recognition Awards Title: Georgia Enterprise Technology Services Disaster Recovery Category: Disaster Recovery and Business Continuity Readiness Contact: Mr. Calvin Rhodes CIO, State of Georgia Executive Director, GTA State: Georgia Project Initiation Date: March 2010 Project Completion Date: August 2014
2 EXECUTIVE SUMMARY A large component of the Georgia Enterprise Technology Services (GETS) program, a groundbreaking initiative for the Georgia state government, was to address the huge risks found by both internal and independent assessments in the area of disaster recovery (DR). These risks were significant and included aging equipment, underfunding, inconsistent operating standards and failure to comply with industry best practices. In addition, the state lacked the latest technical skills. Georgia turned to IBM, a private-sector leader in technology service delivery, to correct these problems. Together, they established the state s first comprehensive technology DR program. As a result, the state of Georgia is saving money, staying current with modern technology, ensuring confidential data remains safe and secure, and protecting business continuity from outside threats. The path toward IT transformation was not easy, but it was well worth the effort. The changes that have already taken place and are continuing to evolve will benefit all Georgians well into the future. BUSINESS PROBLEM AND SOLUTION DESCRIPTION The state of Georgia was exposed to significant risk by not having adequate DR plans. The Georgia Technology Authority (GTA) recognized the need to develop and implement a plan to protect critical systems in the event of a disaster. Many types of unplanned events threaten the functionality of state agency IT systems, affecting the availability of services and data these systems provide. Georgia s state agencies faced momentous challenges in addressing these concerns, including difficulties with logistics and repetitive costs. Data and critical applications were dispersed across multiple data centers, on unrelated platforms, relying on dissimilar data protection strategies and procedures. The state lacked the appropriate location and facilities required for a stable and secure recovery site. GETS Participating Agencies Department of Community Health (DCH) (DDS) Department of Human Services (DHS) Department of Natural Resources (DNR) Department of Administrative Services (DOAS) Department of Revenue (DOR) (GBI) Georgia Department of Corrections (GDC) Georgia Technology Authority (GTA) State Accounting Office (SAO) Department of Juvenile Justice (DJJ) Department of Public Health (DPH) Office of Planning and Budget (OPB) Department of Behavioral Health and Developmental Disabilities (DBHDD) 1
3 To address these challenges, GTA partnered with IBM to develop and deliver an evolutionary DR services plan that would meet the needs of 14 GETS agencies, each with its own unique recovery scenarios and requirements for more than 400 applications. For everyday operations, GTA and IBM developed a plan to consolidate applications into a new, common hosting environment: Georgia Enterprise Technology Services Hosting Environment (GETS-HE). The new hosting environment takes advantage of economies of scale, including common infrastructure, platforms, and data protection platforms and procedures. These same economies of scale could then be applied to a common DR services plan. A four-tiered recovery scheme was developed to identify critical systems and applications, as well as how rapidly each system must be recovered in the event of a disaster. Tier-0 designates the most critical systems that need to be recovered within the first 32 hours of a disaster declaration. Tier-1 applications are recovered within one week. Tier-2 applications are recovered within two weeks. Tier-3 applications are recovered at the agency s discretion, if and when the agency determines a need based on the severity and duration of the disaster. State of Georgia Tier-0 Applications Agency Name Department of Community Health Department of Community Health Application Name Computerized Criminal History Law Enforcement Message Switch Laboratory Information Management System Justice Trax Investigative Case Management System Membership Enrollment Management System Citrix Presentation Server Suite Interface Modules Centralized License Processing GBI Motor Vehicle Records Driver s License System 2
4 As servers were migrated into the GETS-HE, they were converted when possible to a virtual platform, which was established to support security and regulatory data classifications. A common storage area network (SAN), managed under SAN Volume Controllers (SVC), allowed for implementing virtual data segregation and global mirroring to provide real-time data replication to a remote site. As applications designated Tier-0 were migrated into the GETS-HE, storage requirements were satisfied through the use of the SAN, which enabled data to be replicated at the remote recovery site. IBM Tivoli Storage Manager (TSM) was selected for the common data protection platform used to back up all applications migrating into the GETS-HE, including Tier-1, Tier-2 and Tier-3. Backups were scheduled to meet each agency s recovery objectives. Backups support both production and DR by vaulting copies off-site, so they can be shipped to the recovery site in the event of a disaster. Disaster Recovery Plan Facts Over 400 applications have Disaster Recovery coverage Complete network can be built out and functional in first eight hours of DR event Mainframe is up within first 18 hours of DR event Critical host and server-based applications available within 32 hours The IBM Resiliency Services location in Boulder, Colorado, was selected for the remote DR recovery site. A specific state of Georgia Rapid Recovery SAN environment for storing replicated data is maintained onsite. Economies of scale apply to the recovery site, where shared hardware is maintained, including mainframe services and server hardware that match or exceed production specifications. Taking advantage of the shared hardware at the recovery site, systems are pre-cabled to SAN storage. SVC virtual disks are also predefined, but as mainframe, host and server hardware are selected they only need to be patched in at the time a disaster is declared. This preparatory step, in combination with the replicated operating system and synchronized data, allows for the mainframe to be recovered within 18 hours and Tier-0 host and server-based applications to be available within the designated 32-hour recovery objective. SAN storage using data synchronization also achieves the same recovery objective. At the time a disaster is declared, the backup tapes will be identified, retrieved and validated. Once the TSM environment and other data-backup software are restored and server hardware platforms provisioned at the recovery site, Tier-1 applications will be restored from tape, validated and made ready for acceptance processing by the appropriate agencies. Restoration and acceptance processing begin within the first 50 hours of a disaster and continue for up to one week, depending on the complexity of the application and the number of hosts or servers involved. During a disaster, agencies will determine whether to recover Tier-2 and Tier-3 applications based on the prevailing status of the disaster. If determined necessary, these applications will be recovered using a tape-based recovery strategy. 3
5 SIGNIFICANCE The primary focus of the DR services plan is to support applications hosted in the GETS-HE. However, server and application migrations to the GETS-HE are a lengthy process, so a DR services plan was needed to support applications both before and after migrations are completed. The DR services plan, which supports more than 400 applications, and the recovery site had to be versatile and flexible to support an application s current status and location, until it was fully migrated into the GETS-HE. IBM performs annual DR exercises for the GETS environment; four have been successfully completed. Participating agencies set unique criteria for their specific DR plan. The agencies score the exercise independently, and the results are bound by service-level agreements with GTA. Multiple data centers have to be simulated inside the recovery site, until all the servers and applications are eventually migrated into the GETS-HE. Simulations are necessary to isolate the DR testing from the production network, while still allowing access and data exchange with the production environment. Over five years, DR test plans and objectives have changed. This speaks to the evolution of service delivery processes required in a developing environment. Yet, changing regulatory requirements actually helped create more stability by leading to standardized hardware platforms, which in turn reduced variations in operating systems. Architecture (based on the GETS-HE production network) is implemented at the recovery site to match connectivity and security postures. A portion of the network is part of the shared services of the recovery facility. All shared server and host hardware are pre-cabled into the shared network infrastructure, so logical network configurations can rapidly bring networks into operation. Permanent network components are also deployed in Boulder. These include switches, routers, firewalls and network infrastructure services. The permanent components are integrated with the shared recovery site infrastructure, so the complete network and associated connectivity are functional and available within the first eight hours of a disaster. 4
6 BENEFITS OF THE PROJECT Benefits realized through the DR environment created by the GTA and IBM partnership include: A greater assurance that critical data and services can be re-established for Georgia residents in the event of a disaster. DR requirements are reduced when servicing standard server hardware and operating systems to implement preparatory actions that shorten system setup time and result in applications being restored much more rapidly. The increased flexibility in the DR environment allows for new applications to be added more quickly to the DR program. State agencies are better able to meet regulatory requirements associated with applications in the GETS HE. Governance of the DR services plan takes place without distracting agencies from their daily business functions. Global mirroring of critical data allows applications to be recovered much more quickly than employing a tape-based recovery strategy. More efficient use of resources, through economies of scale, allows a greater number of applications to be serviced in the DR environment. Through its partnership with IBM, the state of Georgia has access to established facilities, a wealth of knowledge in DR methodologies, distributed local access facilities providing direct connectivity into a secure recovery site, and an extensive depth of experienced personnel all of which can be applied to recovery efforts in the midst of the chaos associated with a disaster. 5
AGENCY STORAGE ILLUSTRATIONS BEFORE AND AFTER TRANSFORMATION
Mark Latham Kevin Stanford Jeff Strane November 14, 2013 2013 GETS Education Program Special Session AGENCY STORAGE ILLUSTRATIONS BEFORE AND AFTER TRANSFORMATION Housekeeping Please: Pick up a boxed lunch
More information2011 NASCIO Recognition Award Nomination State of Georgia
2011 NASCIO Recognition Award Nomination State of Georgia Nomination Category: Enterprise IT Management Initiatives Title of Nomination: Georgia Enterprise Technology Services Nomination Submitted By:
More informationVirtual Disaster Recovery
Virtual Disaster Recovery White Paper September 16, 2008 Kelly Laughton Davenport Group Consultant Davenport Group 2008. All rights reserved. Introduction Today s data center has evolved into a complex,
More informationData Protection History, Evolution, Best Practices By Global Data Vault
Data Protection History, Evolution, Best Practices By Global Data Vault Introduction As business data processing has evolved, so have the methods and best practices for data protection. This white paper
More informationBACKUP SECURITY GUIDELINE
Section: Information Security Revised: December 2004 Guideline: Description: Backup Security Guidelines: are recommended processes, models, or actions to assist with implementing procedures with respect
More informationTSM (Tivoli Storage Manager) Backup and Recovery. Richard Whybrow Hertz Australia System Network Administrator
TSM (Tivoli Storage Manager) Backup and Recovery Richard Whybrow Hertz Australia System Network Administrator 2 Preparation meets success 3 Hertz Service Delivery Hertz has over 220 car hire locations
More informationIT DISASTER RECOVERY BEST PRACTICES AND LESSONS LEARNED FROM HURRICANE SANDY. White Paper Series
IT DISASTER RECOVERY BEST PRACTICES AND LESSONS LEARNED FROM HURRICANE SANDY White Paper Series 2 IT DISASTER RECOVERY BEST PRACTICES AND LESSONS LEARNED FROM HURRICANE SANDY In late October 2012, Hurricane
More informationADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3
ADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT Overview EXHIBIT E to Amendment No. 60 The Disaster Recovery (DR) Services, a Tier-Level DR Solution, addresses the
More informationOpen Source Mainframe Backup with Hercules
Open Source Mainframe Backup with Hercules An Overview of the Hercules Disaster Recovery Solution 1 Issue: Mainframe Computer Backup Why? Business Need stay in business 60% of all organizations that have
More informationIBM Global Technology Services March 2008. Virtualization for disaster recovery: areas of focus and consideration.
IBM Global Technology Services March 2008 Virtualization for disaster recovery: Page 2 Contents 2 Introduction 3 Understanding the virtualization approach 4 A properly constructed virtualization strategy
More informationHow To Create A Large Enterprise Cloud Storage System From A Large Server (Cisco Mds 9000) Family 2 (Cio) 2 (Mds) 2) (Cisa) 2-Year-Old (Cica) 2.5
Cisco MDS 9000 Family Solution for Cloud Storage All enterprises are experiencing data growth. IDC reports that enterprise data stores will grow an average of 40 to 60 percent annually over the next 5
More informationCourse 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005
Course Syllabus Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005 About this Course Elements of this syllabus are subject to change. This three-day instructor-led
More informationInformation Services hosted services and costs
Information Services hosted services and costs 1. Overview Information Services (I.S.) has provided a popular hosting service for specialized departmental servers for many years. Servers hosted by I.S.
More informationHave a Plan of ATTACK. Not a panic attack. 10 September 2003 IBM Internal Use Only Jarrett Potts, Tivoli Sales Enablement
IBM Software Group Have a Plan of ATTACK Not a panic attack 10 September 2003 IBM Internal Use Only Jarrett Potts, Tivoli Sales Enablement Abstract This session will show the difference between Business
More informationCall: 08715 900800. Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT
Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT The VirtuousIT DR/BC solution is designed around RecoveryShield from Thinking SAFE. The service includes a local backup appliance
More informationDisaster Recovery Design Through Collaboration and Creative Data Management
Disaster Recovery Design Through Collaboration and Creative Data Management Bob Booth University of Illinois Urbana Champaign CITES Design Criteria - Constraints Budget constraints, not enough for: Equivalent
More informationImplementing Disaster Recovery? At What Cost?
Implementing Disaster Recovery? At What Cost? Whitepaper Viktor Babkov Technical Director Business Continuity Copyright Business Continuity May 2010 In today s environment, minimizing IT downtime has become
More informationsecure Agent Secure Enterprise Solutions
secure Agent Secure Enterprise Solutions SecureAgent Software The Secure Data Solution U.S. Patent 7,293,179; European Patent 1669872; and Others Pending Midrange Systems SecureAgent Software 2448 E 81
More informationETERNUS CS High End Unified Data Protection
ETERNUS CS High End Unified Data Protection Optimized Backup and Archiving with ETERNUS CS High End 0 Data Protection Issues addressed by ETERNUS CS HE 60% of data growth p.a. Rising back-up windows Too
More informationIBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
More informationOregon-Montana Disaster Recovery Phase 1 & 2
Oregon-Montana Disaster Recovery Phase 1 & 2 Oregon Department of Administrative Services Enterprise Technology Services http://www.oregon.gov/das/ets/pages/index.aspx Category: Disaster Recovery/Security
More informationIBM Tivoli Storage Manager
Help maintain business continuity through efficient and effective storage management IBM Tivoli Storage Manager Highlights Increase business continuity by shortening backup and recovery times and maximizing
More informationBackup and Recovery 1
Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup
More informationSecure Your Business with EVault Cloud-Connected Solutions
Secure Your Business with EVault Cloud-Connected Solutions Winfried Posthumus Channel Sales Manager NL Winfried.Posthumus@evault.com 11/22/2012 2012 EVault, Inc. All Rights Reserved 1 Agenda Who is EVault
More informationVirtual Infrastructure Security
Virtual Infrastructure Security 2 The virtual server is a perfect alternative to using multiple physical servers: several virtual servers are hosted on one physical server and each of them functions both
More informationOracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
More informationVirtualizing disaster recovery using cloud computing
IBM Global Technology Services Thought Leadership White Paper January 2012 Virtualizing disaster recovery using cloud computing Transition your applications quickly to a resilient cloud 2 Virtualizing
More informationVirtual Server and Storage Provisioning Service. Service Description
RAID Virtual Server and Storage Provisioning Service Service Description November 28, 2008 Computer Services Page 1 TABLE OF CONTENTS INTRODUCTION... 4 VIRTUAL SERVER AND STORAGE PROVISIONING SERVICE OVERVIEW...
More informationThe case for cloud-based data backup
IBM Global Technology Services IBM SmartCloud IBM Managed Backupi The case for cloud-based data backup IBM SmartCloud Managed Backup offers significant improvement over traditional data backup methods
More informationOregon-Montana Disaster Recovery Phase 1
Oregon-Montana Disaster Recovery Phase 1 Oregon Department of Administrative Services Enterprise Technology Services http://www.oregon.gov/das/ets/pages/index.aspx Category 10: Cyber Security Project Completion
More informationNASCIO 2015 State IT Recognition Awards
NASCIO 2015 State IT Recognition Awards Title: State of Georgia Private Security Cloud Implementation Category: Cybersecurity Contact: Mr. Calvin Rhodes CIO, State of Georgia Executive Director, GTA calvin.rhodes@gta.ga.gov
More informationGuardian365. Managed IT Support Services Suite
Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service
More information5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007
5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007 Course Number: 5054A Course Length: 2 Days Course Overview This 2-day course teaches messaging engineers to
More informationBackup with synchronization/ replication
Backup with synchronization/ replication Peer-to-peer synchronization and replication software can augment and simplify existing data backup and retrieval systems. BY PAUL MARSALA May, 2001 According to
More informationINSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists
Preventing Data Loss INSIDE > Disaster Recovery Types and Categories > Disaster Recovery Site Types > Disaster Recovery Procedure Lists > Business Continuity Plan 1 Preventing Data Loss White Paper Overview
More informationIBM Storage Management within the Infrastructure Laura Guio Director, WW Storage Software Sales October 20, 2008
IBM Storage Management within the Infrastructure Laura Guio Director, WW Storage Software Sales October 20, 2008 IBM Information Infrastructure Proven Capabilities Manage Information Risks Information
More informationWhitepaper - Disaster Recovery with StepWise
Whitepaper - Disaster Recovery with StepWise Copyright Invizion Pty Ltd. All rights reserved. First Published October, 2010 Invizion believes the information in this publication is accurate as of its publication
More informationData Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software
Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key
More informationDISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES
DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES Dejan Živanović EMC Technology Solutions Group SEE Presales Manager Dejan.Zivanovic@emc.com 1 The Business Maturity Model V Enabled Web
More informationStrategies for Bare Machine Recovery
Strategies for Bare Machine Recovery Protecting Your Mission-Critical Servers Differing BMR Strategies System reinstallation Full system reinstallation using installation CDs (Windows and ITSM client)
More informationDisaster Recovery Hosting Provider Selection Criteria
Disaster Recovery Hosting Provider Selection Criteria By, Solution Director 6/18/07 As more and more companies choose to use Disaster Recovery (DR), services the questions that keep coming up are What
More informationwww.rackwareinc.com RackWare Solutions Disaster Recovery
RackWare Solutions Disaster Recovery RackWare Solutions Disaster Recovery Overview Business Continuance via Disaster Recovery is an essential element of IT and takes on many forms. The high end consists
More informationImplementing and Managing Windows Server 2008 Hyper-V
Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Windows Server 2008 Type: Course Delivery Method:
More informationSecure, Scalable and Reliable Cloud Analytics from FusionOps
White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...
More informationIBM Global Technology Services September 2007. NAS systems scale out to meet growing storage demand.
IBM Global Technology Services September 2007 NAS systems scale out to meet Page 2 Contents 2 Introduction 2 Understanding the traditional NAS role 3 Gaining NAS benefits 4 NAS shortcomings in enterprise
More informationCloud Computing Disaster Recovery (DR)
Cloud Computing Disaster Recovery (DR) Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Need for Disaster Recovery (DR) What happens when you
More informationBACKUP IS DEAD: Introducing the Data Protection Lifecycle, a new paradigm for data protection and recovery WHITE PAPER
BACKUP IS DEAD: Introducing the Data Protection Lifecycle, a new paradigm for data protection and recovery Despite decades of research and development into backup and data protection, enterprise customers
More informationPlanning for a Disaster Using Tivoli Storage Manager. Laura G. Buckley Storage Solutions Specialists, Inc.
Planning for a Disaster Using Tivoli Storage Manager Laura G. Buckley Storage Solutions Specialists, Inc. Objective Discuss how DRM assists in the recovery of the ADSM server and clients in a disaster
More informationWhy Should Companies Take a Closer Look at Business Continuity Planning?
whitepaper Why Should Companies Take a Closer Look at Business Continuity Planning? How Datalink s business continuity and disaster recovery solutions can help organizations lessen the impact of disasters
More informationMCSE 5053/5054 - Designing a Messaging Infrastructure and High Availability Messaging Solution Using Microsoft Exchange Server 2007
MCSE 5053/5054 - Designing a Messaging Infrastructure and High Availability Messaging Solution Using Microsoft Exchange Server 2007 Duration: 5 Days Course Price: $2,975 Software Assurance Eligible Course
More informationEMC Disk Library with EMC Data Domain Deployment Scenario
EMC Disk Library with EMC Data Domain Deployment Scenario Best Practices Planning Abstract This white paper is an overview of the EMC Disk Library with EMC Data Domain deduplication storage system deployment
More informationWHITE PAPER. The 5 Critical Steps for an Effective Disaster Recovery Plan
WHITE PAPER The 5 Critical Steps for an Effective Disaster Recovery Plan 2 WHITE PAPER The 5 Critical Planning Steps For An Effective Disaster Recovery Plan Introduction In today s climate, most enterprises
More informationDisaster recovery: Resilient cloud-based disaster recovery
Disaster recovery: Resilient cloud-based disaster recovery Disaster recovery and business continuity applications in the cloud offer the benefits of speed, cost efficiency and availability, eliminating
More informationDisaster Recovery Feature of Symfoware DBMS
Disaster Recovery Feature of Symfoware MS V Teruyuki Goto (Manuscript received December 26, 2006) The demands for stable operation of corporate information systems continue to grow, and in recent years
More informationFundamentals of a Windows Server Infrastructure MOC 10967
Fundamentals of a Windows Server Infrastructure MOC 10967 Course Outline Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation
More informationHuawei OceanStor Backup Software Technical White Paper for NetBackup
Huawei OceanStor Backup Software Technical White Paper for NetBackup Huawei Page 1 of 14 Copyright Huawei. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form
More informationIBM Virtualization Engine TS7700 GRID Solutions for Business Continuity
Simplifying storage processes and ensuring business continuity and high availability IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity The risks are even greater for companies that
More informationHow To Choose A Business Continuity Solution
A Business Continuity Solution Selection Methodology Ellis Holman IBM Corp. Tuesday, March 13, 2012 Session Number 10387 Disclaimer Copyright IBM Corporation 2010. All rights reserved. U.S. Government
More informationActual trends in backup protection solution IBM Backup Products and Services
Actual trends in backup protection solution IBM Backup Products and Services Gražvydas Govaras IT Architektas 2013-03-19 Tivoli Storage Manager Fastback Continuos Data Protection solution for Windows and
More informationB U S I N E S S C O N T I N U I T Y P L A N
B U S I N E S S C O N T I N U I T Y P L A N 1 Last Review / Update: December 9, 2015 Table of Contents Purpose...3 Background...3 Books and Records Back-up and Recovery...4 Mission Critical Systems...
More informationOvercoming Security Challenges to Virtualize Internet-facing Applications
Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing
More informationYiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1
EaseUS Todo Backup Reliable Backup & Recovery Solution EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1 Part 1 Overview EaseUS Todo Backup Solution Guide. All Rights Reserved Page 2 Introduction
More informationDublin City University
Asset Management Policy Asset Management Policy Contents Purpose... 1 Scope... 1 Physical Assets... 1 Software Assets... 1 Information Assets... 1 Policies and management... 2 Asset Life Cycle... 2 Asset
More informationConstant Replicator: An Introduction
Data Availability Storage Software Constant Replicator: An Introduction Configurations, Applications and Solutions of Constant Replicator A White Paper A Constant Data Technology Document August 2004 Copyright
More informationI D C V E N D O R S P O T L I G H T
I D C V E N D O R S P O T L I G H T R e c o ve r y i n t h e C l o u d July 2011 Adapted from The State of Business Continuity in End-User Environments in 2011 by Laura DuBois, Jean S. Bozman, and Eric
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! http://www.pass4test.com We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 000-061 Title : IBM Dynamic Infrastructure Technical Support Leader Vendors
More informationLibrary Recovery Center
Library Recovery Center Ever since libraries began storing bibliographic information on magnetic disks back in the 70 s, the challenge of creating useful back-ups and preparing for a disaster recovery
More informationHigh Availability & Disaster Recovery Development Project. Concepts, Design and Implementation
High Availability & Disaster Recovery Development Project Concepts, Design and Implementation High Availability & Disaster Recovery Development Project CONCEPTS Who: Schmooze Com Inc, maintainers, core
More informationExam : IBM 000-061. : IBM NEDC Technical Leader. Version : R6.1
Exam : IBM 000-061 Title : IBM NEDC Technical Leader Version : R6.1 Prepking - King of Computer Certification Important Information, Please Read Carefully Other Prepking products A) Offline Testing engine
More informationCourse Outline. ttttttt
10967 - Fundamentals of a Windows Server Infrastructure General Description Learn the fundamental knowledge and skills that you need to build a Windows Server infrastructure with Windows Server 2012. This
More informationDisaster Recovery Remote off-site Storage for single server environment
. White Paper Disaster Recovery Remote off-site Storage for single server environment When it comes to protecting your data there is no second chance January 1, 200 Prepared by: Bill Schmidley CompassPoint
More informationArchiving, Backup, and Recovery for Complete the Promise of Virtualization
Archiving, Backup, and Recovery for Complete the Promise of Virtualization Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that
More informationDAS, NAS or SAN: Choosing the Right Storage Technology for Your Organization
DAS, NAS or SAN: Choosing the Right Storage Technology for Your Organization New Drivers in Information Storage Data is unquestionably the lifeblood of today s digital organization. Storage solutions remain
More informationTechnical Considerations in a Windows Server Environment
Technical Considerations in a Windows Server Environment INTRODUCTION Cloud computing has changed the economics of disaster recovery and business continuity options. Accordingly, it is time many organizations
More informationnwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
More informationEnhancements of ETERNUS DX / SF
shaping tomorrow with you ETERNUS - Business-centric Storage Enhancements of ETERNUS DX / SF Global Product Marketing Storage ETERNUS Business-centric Storage Agenda: 1 Overview of the top 3 innovations
More informationEnterprise Governance and Planning
GEORGIA TECHNOLOGY AUTHORITY Title: Enterprise Operational Environment PSG Number: SO-10-003.02 Topical Area: Operations / Performance and Capacity Document Type: Standard Pages: 5 Issue Date: July 15,
More informationEMC DATA DOMAIN EXTENDED RETENTION SOFTWARE: MEETING NEEDS FOR LONG-TERM RETENTION OF BACKUP DATA ON EMC DATA DOMAIN SYSTEMS
SOLUTION PROFILE EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE: MEETING NEEDS FOR LONG-TERM RETENTION OF BACKUP DATA ON EMC DATA DOMAIN SYSTEMS MAY 2012 Backups are essential for short-term data recovery
More informationCity of Coral Gables
City of Coral Gables Information Technology Department IT TECHNICAL SUPPORT DIVISION Infrastructure Upgrade Plan Systems, Applications, Network, and Telecommunications Infrastructure OVERVIEW Last revision:
More informationReduce your data storage footprint and tame the information explosion
IBM Software White paper December 2010 Reduce your data storage footprint and tame the information explosion 2 Reduce your data storage footprint and tame the information explosion Contents 2 Executive
More informationCase Studies. Data Sheets : White Papers : Boost your storage buying power... use ours!
TM TM Data Sheets : White Papers : Case Studies For over a decade Coolspirit have been supplying the UK s top organisations with storage products and solutions so be assured we will meet your requirements
More informationHP Data Protector software Zero Downtime Backup and Instant Recovery
HP Data Protector software Zero Downtime Backup and Instant Recovery Business Uninterrupted with HP Data Protector Zero Downtime Backup and Instant Recovery software With today s increasing emphasis on
More informationBackup and Redundancy
Backup and Redundancy White Paper NEC s UC for Business Backup and Redundancy allow businesses to operate with confidence, providing security for themselves and their customers. When a server goes down
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
More informationThree Things to Consider Before Implementing Cloud Protection
WHITEPAPER Three Things to Consider Before Implementing Cloud Protection Cloud Backup vs. Cloud Recovery VS Cloud Backup http://www.quorum.net/ 2013 QuorumLabs, Inc. All Rights Reserved. Cloud Recovery
More informationIP Storage On-The-Road Seminar Series
On-The-Road Seminar Series Disaster Recovery and Data Protection Page 1 Agenda! The Role of IP in Backup!Traditional use of IP networks for backup! backup capabilities! Contemporary data protection solutions
More informationQuantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication
PRODUCT BRIEF Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication NOTICE This Product Brief contains proprietary information protected by copyright. Information in this
More informationThe Big Bang: cloud resiliency and the data explosion
Deborah Orr, Forbes Insights Analyst Daniel Witteveen, Director, IBM Cloud Managed Backup and Data Virtualization 03/23/2015 The Big Bang: cloud resiliency and the data explosion 2015 IBM Corporation Agenda
More informationAvailability and Disaster Recovery: Basic Principles
Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer
More informationGTA Board of Directors September 4, 2014
GTA Board of Directors September 4, 2014 Our Strategic Vision Our Mission A transparent, integrated enterprise where technology decisions are made with the citizen in mind To provide technology leadership
More informationDesigning a Microsoft SharePoint 2010 Infrastructure
Course Code: M10231 Vendor: Microsoft Course Overview Duration: 5 RRP: 1,980 Designing a Microsoft SharePoint 2010 Infrastructure Overview This five day ILT course teaches IT professionals to design and
More informationGTA Board of Directors December 4, 2014
GTA Board of Directors December 4, 2014 Our Strategic Vision Our Mission A transparent, integrated enterprise where technology decisions are made with the citizen in mind To provide technology leadership
More informationMigration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module
Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module WHITE PAPER May 2015 Contents Advantages of NEC / Iron Mountain National
More informationOne Solution for Real-Time Data protection, Disaster Recovery & Migration
One Solution for Real-Time Data protection, Disaster Recovery & Migration Built-in standby virtualisation server Backs up every 15 minutes up to 12 servers On and Off-site Backup User initialed file, folder
More informationEffective Storage Management for Cloud Computing
IBM Software April 2010 Effective Management for Cloud Computing April 2010 smarter storage management Page 1 Page 2 EFFECTIVE STORAGE MANAGEMENT FOR CLOUD COMPUTING Contents: Introduction 3 Cloud Configurations
More informationAudience. At Course Completion. Prerequisites. Course Outline. Take This Training
Designing a High Availability Messaging Solution using Microsoft Exchange Server 2007 Course 5054A: Two days; Instructor-Led Preliminary Course Syllabus Note: You are viewing a Preliminary Course Syllabus.
More informationDB2 9 for LUW Advanced Database Recovery CL492; 4 days, Instructor-led
DB2 9 for LUW Advanced Database Recovery CL492; 4 days, Instructor-led Course Description Gain a deeper understanding of the advanced features of DB2 9 for Linux, UNIX, and Windows database environments
More informationPart Two: Technology overview
Already covered: Part One: Introduction to BackupAssist Now: Part Two: Technology overview 64 Backup Rsync Backups Still to come: Part Three: Putting it all together Server 2008 family. Image your entire
More informationcourtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview f5 networks P
courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview Business Continuity, Disaster Recovery and Data Center Consolidation IT managers today must be ready for the
More informationSOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY
SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY Among the priorities for efficient storage management is an appropriate protection architecture. This paper will examine how to architect storage
More information