Beyond disaster recovery: becoming a resilient business.
|
|
|
- Julianna Hudson
- 10 years ago
- Views:
Transcription
1 IBM Global Services October 2005 Beyond disaster recovery: becoming a resilient business. An object-oriented framework and methodology by Richard Cocchiara Chief technology officer for business resilience
2 Page 2 Contents 2 Executive summary 4 Coping with continuous change 5 What business resilience means some basic requirements 6 The business resilience framework an object-oriented approach 12 The business resilience transformation lifecycle a roadmap for becoming a stronger, more responsive business 23 Why IBM? Executive summary As you probably understand all too well, today s business environment is characterized by rapid, unpredictable change. Some changes bring opportunities for your business, while others bring challenges and sometimes even threats. But no matter what, your business has to be responsive and resilient seamlessly taking advantage of opportunities while mitigating risks. Your IT infrastructure must be designed to help ensure the continuity of your business operations in the event of an unexpected disruption, and to secure data integrity. It also must help you comply with government regulations and integrate risk strategies to reduce costs, and it must be able to scale rapidly and automatically as the market changes. To help organizations understand and manage the process of becoming resilient, IBM has developed an object-oriented framework and transformation lifecycle. Borrowing from the concept of an object-oriented database, IBM has created a business resilience framework that is designed to help you identify the object layers that make up your company ranging from the strategic overlay, all the way down to the nuts-and-bolts technologies and facilities. Within each layer, the objects are assigned specific attributes that
3 Page help manage the risks associated with each object. Once you understand these objects, their attributes and the relationships among them, you can begin to identify areas for improvement. IBM can take you through the business resilience transformation lifecycle to help you: Determine which risks may affect your organization Calculate the potential impact that these risks could have on your organization Plan for how the objects in your current infrastructure could respond to these risks Design or update your infrastructure to mitigate these risks and to leverage any opportunities that might arise from market changes Execute your strategy for improving your business resilience Implement the changes to each object layer Test your overall resilience Manage your resilience program to incorporate improvements and changes in technology. This white paper explores the business and technical advantages of an objectoriented framework and transformation lifecycle for business resilience.
4 Page Any risk, whether opportunity or threat, requires a response from your business. Coping with continuous change As you know, fluctuating business conditions are a double-edged sword. Almost any risk whether it comes in the form of an opportunity or a threat requires a response from your business. If you respond inappropriately or too slowly, you could lose ground to your competitors. For example, while too much success may not sound like a threat to your business, it can become one if you re not prepared to handle a surge in customer demand. When Victoria s Secret televised a fashion show during the 1997 American football Super Bowl, the company was unable to scale to meet the ensuing demand for access to its Web site, resulting in significant performance degradation and customer dissatisfaction. On the other hand, a disruption in business operations and services, whether from a natural disaster, a terrorist strike, a cyber attack or a simple malfunction, can seriously reduce your revenues and even do long-term damage to your brand. Industry estimates indicate that upwards of 40 percent of organizations without business continuity and recovery plans will go out of business within a few years of a major disaster. Combining several disparate risk management strategies into a single, integrated resilience strategy is the best response to the threat of disaster. The best response to the threat of disaster is to combine several disparate risk management strategies into a single, integrated resilience strategy that will allow your organization to adapt and respond rapidly to opportunities, regulations and risks in order to maintain highly secure continuous business operations, be a more trusted partner and enable growth. Because such an approach addresses both the positive and negative ramifications of risk, IBM uses the term business resilience to distinguish between this comprehensive strategy and narrower approaches, such as disaster recovery, high availability, security and business continuity.
5 Page 5 A business resilience framework should address six key areas. A holistic approach to a business resilience strategy can help you minimize risks, maximize opportunities and address compliance needs simultaneously. What business resilience means some basic requirements In worldwide studies conducted by The FactPoint Group, a Silicon Valleybased research company, for IBM in both 2004 and 2005, 1 CEOs highlighted the six key areas that a business resilience framework should address: Continuity of business operations become more anticipatory, adaptive and robust, from IT through all business processes Regulatory compliance comply with new and changing government rules and regulations more quickly and cost-effectively Integrated risk management to reduce costs stay competitive by managing risk more efficiently and cost-effectively Security, privacy and data protection protect against internal and external threats, and help develop a critical information management policy Access to expertise and skills (via outsourcing or training) develop the infrastructure to support the easy acquisition and management of expert assistance in maintaining continuous business operations Market readiness anticipate and respond to changing market conditions and accelerating research and development as necessary to get the right products to the right buyers at the right time. In the past, businesses typically have addressed these concerns separately. However, many companies now recognize that it s more cost-effective to combine them into a single, integrated strategy. A holistic approach can help minimize risks, maximize opportunities and address compliance needs all at the same time. But how do you perform a holistic risk assessment of your entire enterprise without missing any critical element? IBM has found that an object-oriented framework can help you model your total business infrastructure and clearly identify issues that must be addressed to make your business more resilient.
6 Page Resilience layer Object class Object Attribute Value Maturity value Attribute relationships Process IT process Problem management Change management Owner John Smith 3 Common primary owner with change management, with no secondary or tertiary owner defined Owner John Smith 3 Common primary owner with problem management, with no secondary or tertiary owner defined Maturity levels 1 = No owner 2 = Multiple owners 3 = Primary owner defined, no backup 4 = Primary and secondary owner defined 5 = Primary and secondary owner with defined authorities Table 1. Sample objects and attributes IBM has identified a collection of components, called objects, that together can be used to model an entire business infrastructure. The business resilience framework an object-oriented approach IBM has spent years analyzing what is necessary to ensure business resilience. In the process, IBM has identified a collection of components called objects that together can be used to model your entire business infrastructure. Inspired by the concept of database objects, these components have attributes that help define them in terms of their ability to address the six basic requirements of business resilience. Objects can share similar attributes, and these shared attributes, in turn, help define the relationships among objects. And objects with shared attributes can be grouped into object classes. Companies can then use these classes to understand common issues and to speed the deployment of improvements and upgrades designed to promote resilience.
7
Beyond disaster recovery: becoming a resilient business.
IBM Global Services October 2005 Beyond disaster recovery: becoming a resilient business. An object-oriented framework and methodology by Richard Cocchiara Chief technology officer for business resilience
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
Reduce your data storage footprint and tame the information explosion
IBM Software White paper December 2010 Reduce your data storage footprint and tame the information explosion 2 Reduce your data storage footprint and tame the information explosion Contents 2 Executive
Risk management + Strategic planning IT TAKES AN ENTIRE ORGANIZATION
1 Risk management + Strategic planning IT TAKES AN ENTIRE ORGANIZATION Background 2 Technology has become the central component of business operations Businesses have become more vulnerable to risks associated
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Strategies for assessing cloud security
IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary
Beyond Disaster Recovery: The Business Resilience Transformation Methodology
Beyond Disaster Recovery: The Business Transformation Methodology Richard Cocchiara Chief Technology Officer for Business IBM Global Services (845) 496-1478 Agenda A definition of resiliency Trends in
Using the Cloud for Business Resilience
Allen Downs IBM Business Continuity and Resiliency Services Using the Cloud for Business Resilience June 20, 2011 1 Agenda Why resiliency matters A successful cloud-based approach to resiliency Moving
Panel Session: Lessons Learned in Smart Grid Cybersecurity
PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory
DYNAMIC INFRASTRUCTURE Helping build a smarter planet
John Sheehy Systems Architect 18 Feb 2009 Building a smarter planet with a dynamic infrastructure DYNAMIC INFRASTRUCTURE Helping build a smarter planet 1 2009 IBM Corporation The world is smaller and flatter.
Risk mitigation for business resilience White paper. A comprehensive, best-practices approach to business resilience and risk mitigation.
Risk mitigation for business resilience White paper A comprehensive, best-practices approach to business resilience and risk mitigation. September 2007 2 Contents 2 Overview: Why traditional risk mitigation
50x 2020 40 Zettabytes*
IBM Global Technology Services How to integrate cloud-based disaster recovery into your existing business continuity plans Richard Cocchiara: IBM Distinguished Engineer; CTO IBM Business Continuity & Resiliency
Customer FIRST for Wonderware IntelaTrac Program Guide. Getting Maximum Value with Best-in-Class Services and Support
Customer FIRST for Wonderware IntelaTrac Program Guide Getting Maximum Value with Best-in-Class Services and Support 02 About Schneider Electric and Wonderware Schneider Electric is a leading global technology
THE CXO S GUIDE TO MANAGING EXPANSION... WHILE CONTROLLING COSTS & COMPLIANCE CONSIDERATIONS
THE CXO S GUIDE TO MANAGING EXPANSION... WHILE CONTROLLING COSTS & COMPLIANCE CONSIDERATIONS The CXO s Guide to Managing Expansion While Controlling Costs & Compliance Considerations 2 45% OF IT PROFESSIONALS
Provide access control with innovative solutions from IBM.
Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business
Key Cyber Risks at the ERP Level
Key Cyber Risks at the ERP Level Process & Industrial Products (P&IP) Sector December, 2014 Today s presenters Bhavin Barot, Sr. Manager Deloitte & Touche LLP Goran Ristovski, Manager Deloitte & Touche
BT Conferencing Business Continuity Management. Planning to stay in business
BT Conferencing Business Continuity Management Planning to stay in business Planning for the unexpected In today s connected world, businesses are increasingly dependent on their communications and networked
Why You Should Consider Cloud- Based Email Archiving. A whitepaper by The Radicati Group, Inc.
. The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Why You Should Consider Cloud- Based
Why Should Companies Take a Closer Look at Business Continuity Planning?
whitepaper Why Should Companies Take a Closer Look at Business Continuity Planning? How Datalink s business continuity and disaster recovery solutions can help organizations lessen the impact of disasters
I S O I E C 2 7 0 0 2 2 0 1 3 I N F O R M A T I O N S E C U R I T Y A U D I T T O O L
15.1 ESTABLISH SECURITY AGREEMENTS WITH SUPPLIERS 15.1.1 EXPECT SUPPLIERS TO COMPLY WITH RISK MITIGATION AGREEMENTS Do you clarify the information security risks that exist whenever your suppliers have
Cloud Computing Services Strategy & Roadmap
Cloud Computing Services Produced by Oakland County Information Technology Table of Contents Background... 3 What is Cloud Computing?... 3 Who Uses Cloud Computing?... 3 Benefits of Cloud Computing...
Leveraging the Cloud for Your Business
Leveraging the Cloud for Your Business by CornerStone Telephone Company 2 Third Street Troy, NY 12180 As consumers, we enjoy the benefits of cloud services from companies like Amazon, Google, Apple and
Onboarding. Design Build Attract
Onboarding Design Build Attract The most critical time in an executive s career is the first 100 days in a new role. Executives promoted or hired into new roles are expected to not only find their way,
Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
For healthcare, change is in the air and in the cloud
IBM Software Healthcare Thought Leadership White Paper For healthcare, change is in the air and in the cloud Scalable and secure private cloud solutions can meet the challenges of healthcare transformation
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
Reasons Enterprises. Prefer Juniper Wireless
Reasons Enterprises Prefer Juniper Wireless Juniper s WLAN solution meets the mobility needs of today s enterprises by delivering the highest levels of reliability, scalability, management, and security.
SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE (2013-29) ON THIRD PARTY RELATIONSHIPS
SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE (2013-29) ON THIRD PARTY RELATIONSHIPS An overview of how the Shared Assessments Program SIG 2014
Hosting and cloud services both provide incremental and complementary benefits to the organization
33 Yonge St., Suite 420, Toronto, Ontario Canada, M5E 1G4 W H I T E P A P E R I D C a n d T E L U S E n t e r p r i s e C l o u d S t u d y, 2 0 1 3 : C a p i t a l i z i n g on C l o u d ' s W i n d o
The IBM data governance blueprint: Leveraging best practices and proven technologies
May 2007 The IBM data governance blueprint: Leveraging best practices and proven technologies Page 2 Introduction In the past few years, dozens of high-profile incidents involving process failures and
IBM Software Cloud service delivery and management
IBM Software Cloud service delivery and management Rethink IT. Reinvent business. 2 Cloud service delivery and management Virtually unparalleled change and complexity On this increasingly instrumented,
DEPARTMENT OF HOMELAND SECURITY
DEPARTMENT OF HOMELAND SECURITY Funding Highlights: Provides $39.5 billion, a decrease of 0.5 percent or $191 million, below the 2012 enacted level. The Budget continues strong investments in core homeland
SaaS Adoption Lifecycle in Life-Sciences Companies
www.arisglobal.com A White Paper Presented By ArisGlobal SaaS Adoption Lifecycle in Life-Sciences Companies by Achal Verma, Associate Director - Program Delivery, Cloud Services Abstract With increasing
Firewall Administration and Management
Firewall Administration and Management Preventing unauthorised access and costly breaches G-Cloud 5 Service Definition CONTENTS Overview of Service... 2 Protects Systems and data... 2 Optimise firewall
Microsoft Services Premier Support. Security Services Catalogue
Microsoft Services Premier Support Security Services Catalogue 2014 Microsoft Services Microsoft Services helps you get the most out of your Microsoft Information Technology (IT) investment with integrated
HBR Consulting Data Center Service Offerings
HBR Consulting Data Center Service Offerings Executive Brief of Market Needs and Service Delivery Offerings 2014 HBR CONSULTING LLC. All rights reserved. Discussion Outline Practice and Service Overview
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
Project, Program & Portfolio Management Help Leading Firms Deliver Value
in collaboration with Project, Program & Portfolio Help Leading Firms Deliver Value Managing Effectively & Efficiently Through an Enterprise PMO Program & Portfolio : Aligning IT Capabilities with Business
Managing business risk
Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
Why Crisis Response and Business Continuity Plans Fail
Why Crisis Response and Business Continuity Plans Fail 10 Lessons Learned from Real-World Experience Many organizations invest considerable time, money and effort in developing Crisis Response and Business
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Executive Summary As cloud service providers mature, and expand and refine their offerings, it is increasingly difficult for
Optimizing the Data Center for Today s Federal Government
WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S FEDERAL......... GOVERNMENT............................... Optimizing the Data Center for Today s Federal Government Who should read this paper CIOs,
GETTING THE MOST FROM THE CLOUD. A White Paper presented by
GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
IBM Information Technology Services Global sourcing.
IBM Information Technology Services Global sourcing. Move with agility and challenge competitors worldwide. Globalization. Growth. Compliance.» The challenges that you face today in the financial services
Hosting JDE EnterpriseOne in the Cloud Hear how one company went to the cloud
Hosting JDE EnterpriseOne in the Cloud Hear how one company went to the cloud October 2015 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T Agenda Organizational
IBM index reveals key indicators of business continuity exposure and maturity
IBM Global Technology Services Business Continuity and Resiliency Services IBM index reveals key indicators of business continuity exposure and maturity Will a more holistic approach to business continuity
Defining a blueprint for a smarter data center for flexibility and cost-effectiveness
IBM Global Technology Services Cross-industry Defining a blueprint for a smarter data center for flexibility and cost-effectiveness Analytics-based services provide insight for action 2 Defining a blueprint
JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
Customer FIRST Program Guide
Customer FIRST Program Guide Best-in-Class Software Maintenance, Support & Services Get Maximum Value from Your Assets with Avantis Software & Services 1 About Schneider Electric and Avantis Schneider
Preparing your network for the mobile onslaught
IBM Global Technology Services Thought Leadership White Paper Preparing your network for the mobile onslaught How networks can overcome the security, delivery challenges posed by mobile devices 2 Preparing
Test Data Management for Security and Compliance
White Paper Test Data Management for Security and Compliance Reducing Risk in the Era of Big Data WHITE PAPER This document contains Confidential, Proprietary and Trade Secret Information ( Confidential
Business Continuity & Crisis Management
Group Standard Business Continuity & Crisis Management The need to plan and respond effectively is critical to the successful management of any crisis situation. Business Continuity Management is the holistic
NASCIO 2014 State IT Recognition Awards
NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos
Business Continuity Policy
Business Continuity Policy Page 1 of 15 Business Continuity Policy First published: Amendment record Version Date Reviewer Comment 1.0 07/01/2014 Debbie Campbell 2.0 11/07/14 Vicky Ryan Updated to include
Business Performance Management
Business Performance Management Beth T. Smith Vice President, IBM Business Performance Management Agenda Business performance management market Business performance management from IBM Why IBM for business
Business Case for Voltage SecureMail Mobile Edition
WHITE PAPER Business Case for Voltage SecureMail Mobile Edition Introduction Mobile devices such as smartphones and tablets have become mainstream business productivity tools with email playing a central
Building the business case for continuity and resiliency
Global Technology Services Research Analysis Risk Management Building the business case for continuity and resiliency The economics of IT risk and reputation and their importance to business continuity
Standard for Business Continuity/Disaster Recovery (BC/DR) Service Providers
Section One Standard for Business Continuity/Disaster Recovery (BC/DR) Service Providers The awareness of BC/DR services has grown due to the threats from terrorism and geopolitical tension. There are
Customer FIRST Program Guide. Best-in-Class Software Maintenance, Support and Services Getting Maximum Value from Your Wonderware Software
Customer FIRST Program Guide Best-in-Class Software Maintenance, Support and Services Getting Maximum Value from Your Wonderware Software 1 About Schneider Electric and Wonderware Schneider Electric is
CASE STUDY. IDC & Managed Hosting
Netmagic Helps Pharmaceutical and CPG Company with Reliable, Robust Infrastructure and Adhere to Compliance with Audit Services Life Sciences companies have been making headway in the global scene for
DISASTER RECOVERY FOR PUBLIC HEALTH. August 2007
DISASTER RECOVERY FOR PUBLIC HEALTH August 2007 National events like the terrorist attacks of 2001 and Hurricanes Katrina and Rita have focused attention on the need for recovery planning. Citizens who
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business
Enabling Small Business Success 2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business 2008 All Covered Inc. www.allcovered.com Contents EXECUTIVE SUMMARY... 3 RECOMMENDATIONS...
Risk Management Philosophy and Approach
Risk Management Philosophy and Approach We identify and manage risks to reduce the uncertainty associated with executing our business strategies and maximising opportunities that may arise. Risks can take
The Geospatial Approach to Cybersecurity: An Executive Overview. An Esri White Paper January 2014
The Geospatial Approach to Cybersecurity: An Executive Overview An Esri White Paper January 2014 Copyright 2014 Esri All rights reserved. Printed in the United States of America. The information contained
FORMULATING YOUR BUSINESS CONTINUITY PLAN
WHITE PAPER Page 0 Planning for the Worst Case Scenario: FORMULATING YOUR BUSINESS CONTINUITY PLAN 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of Contents Overview... 2 What is Disaster
Microsoft s Cloud Networks
Microsoft s Cloud Networks Page 1 Microsoft s Cloud Networks Microsoft s customers depend on fast and reliable connectivity to our cloud services. To ensure superior connectivity, Microsoft combines globally
FLEXIBILITY AGILITY AVAILABILITY BOLSTER YOUR BANK S I.T.
CDW FINANCIAL SERVICES WE GET IT BOLSTER YOUR BANK S I.T. FLEXIBILITY of financial institutions are planning to outsource the same or additional IT services in the next 12 to 18 months.* AGILITY AVAILABILITY
Email Security and Availability: A Holistic Solution to a Critical Problem
I D C V E N D O R S P O T L I G H T Email Security and Availability: A Holistic Solution to a Critical Problem August 2005 Adapted from Worldwide Secure Content Management 2004 2008 Forecast Update and
IT Governance Charter
Version : 1.01 Date : 16 September 2009 IT Governance Network South Africa USA UK Switzerland www.itgovernance.co.za [email protected] 0825588732 IT Governance Network, Copyright 2009 Page 1 1 Terms
The economics of IT risk and reputation
Global Technology Services Research Report Risk Management The economics of IT risk and reputation What business continuity and IT security really mean to your organization Findings from the IBM Global
10 Critical Requirements for Cloud Applications:
10 Critical Requirements for Cloud Applications: How to Recognise Cloud Providers and Applications that Deliver Real Value 10 Critical Requirements for Cloud Applications: How to Recognise Cloud Providers
Business resilience: The best defense is a good offense
IBM Business Continuity and Resiliency Services January 2009 Business resilience: The best defense is a good offense Develop a best practices strategy using a tiered approach Page 2 Contents 2 Introduction
Service Availability Metrics
2014 Service Availability Benchmark Survey Published by Executive Summary This benchmark survey presents service availability metrics that allow IT infrastructure, business continuity, and disaster recovery
Cloud Computing Safe Harbor or Wild West?
IT Best Practices Series Cloud Computing Safe Harbor or Wild West? With IT expenditures coming under increasing scrutiny, the cloud is being sold as an oasis of practical solutions. It s true that many
Agile Cloud-Enabled Services (ACES)
Experience the commitment WHITE PAPER The future of public sector ERP: Agile Cloud-Enabled Services (ACES) The landscape for public sector enterprise resource planning (ERP) system deployments is changing
