Building a Disaster Recovery Program By: Stieven Weidner, Senior Manager
|
|
- Spencer McKenzie
- 8 years ago
- Views:
Transcription
1 Building a Disaster Recovery Program By: Stieven Weidner, Senior Manager Part two of a two-part series. If you read my first article in this series, Building a Business Continuity Program, you know that a Disaster (IT) Recovery Program is part of a larger Business Continuity Program. Basically, a Disaster (IT) Recovery Program should be developed from the needs of the business, not developed in isolation using assumptions. However, as a Business Continuity and Disaster Recovery expert, I ve come to realize that many companies either do not have the time, the money, or the personnel to develop their Disaster (IT) Recovery Program properly. A Business Continuity Program and Disaster (IT) Recovery Program both have a similar purpose, to protect and recover a business from events detrimental to its immediate and long- term sustainability. Developing the Disaster (IT) Recovery Program based on the outcomes of the Business Continuity Program will ensure you are protecting and recovering the proper IT resources in the appropriate timeframes. However, developing the Disaster (IT) Recovery Program in a vacuum has the potential for overlooking critical business components which may be crucial during times of crisis. A Disaster (IT) Recovery Program, like a Business Continuity Program, is a program and not a project, and has many parts, each important to the overall success of the program. While a company may initiate the program through a short-term project, the effort to maintain this program goes on indefinitely. Below is a diagram providing a somewhat simplistic view of Disaster (IT) Recovery, but it does outline the most critical activities and the sequence the program should follow.
2 1) Risk and BIA: a. Risk (Evaluation and Control): Similar to understanding business risk for the company s Business Continuity Program, a Disaster (IT) Recovery Program begins by understanding and evaluating the IT risk. This is accomplished by reviewing the company s IT risk history as well as projecting what type of risks the company may realize in the future. These risks will be quantified by rating their potential occurrence (how likely they may occur) and their potential impact to the IT infrastructure (how severe of an impact they may have). Once these are known, you must prioritize these risks and develop suitable mitigation strategies (controls) for each of them. Of course, it may be unwise to spend money on risks that have a low probability of occurring or that may have a minimal impact if they do, so a do nothing strategy just may be a reasonable decision. Your leadership will help justify which mitigation strategies to implement and which risks to accept. Keep in mind that insurance should play a part in your mitigation strategy as well. b. Business Impact Analysis (BIA): As stated earlier, a comprehensive Disaster (IT) Recovery Program can only be developed if the business needs are understood. The company must identify what resources it must have and what functions it must perform to survive. Subsequently, the company should pinpoint what resources and functions it can survive without, at least for a period of time. The BIA identifies and reviews the business workflows and functions, prioritizes them based on business need (including critical periods), and determines how quickly they must be recovered to minimize negative business impacts during an event. One of the most important outcomes of the BIA as it relates to the Disaster (IT) Recovery Program is the identification of the Recovery Time Objectives (RTO) and the Recovery Point Objectives (RPO) for business applications. Note: a BIA is generally completed every three to five years depending on the company s business climate. 2) Identify New Business Workflows/Functions: While the BIA identifies the company s current workflows and functions, as well as their criticality and IT requirements, the company must also identify newly implemented business workflows and functions as well as changes in criticality which may impact the current IT environment between BIA intervals. Any new workflow, function,
3 process, equipment, or application, or even a change in a current workflow s criticality (RTO/RPO), may change Business Continuity requirements and, hence, Disaster Recovery requirements. While the IT department may not always be aware of new business initiatives, in order for it to remain proactive and protect company interests, it is strongly recommended that the department participate in the early stages of business development activities. It is expected that business priorities will change over time, and participating in those business planning activities will ensure that longterm and short-term IT strategies will continue to meet business needs and goals. The IT department needs to proactively seek out those changes and work with business leaders to understand their criticality and the possible IT impact. Only then can the IT department develop and modify their infrastructures and recovery strategies appropriately to provide the business the proper disaster recovery support. 3) Develop IT Recovery Strategies: Understanding the current and new business workflows, functions, and criticality will provide the Disaster Recovery planner the ability to identify the associated hardware, software, interfaces, and networks to support them. The Disaster Recovery planner has the task of ensuring that the identified IT recovery infrastructure will meet business needs and the identified RTO and RPO, as well as seamlessly adapt to the current or modified production environment and data backup strategies. 4) Procure Critical IT Recovery Infrastructures and Recovery Location: Implementing the IT recovery strategy may have multiple components. As an example, a business may require a hot site for its critical applications, which has pre-built equipment available to turn on in a moment s notice. For those not-as-critical applications, a drop ship arrangement, which may take a week or more before equipment is delivered, might be a perfect solution. Then again, the business may require a fully functional redundant site for when downtime of any kind is simply not an option. You can buy these services from a vendor, develop them in-house, or combine resources. It s a matter of finding the appropriate solution that s affordable and still meets the company s level of adversity in the face of downtime. 5) Identify Disaster Recovery Plan Requirements: Before Disaster (IT) Recovery plan development can begin, you must assemble the required
4 information, which is based on the IT production environment, as well as the IT recovery environment, and includes all IT stakeholder data, both internal and external to your business. This information provides the plan development process the foundation it needs to be successful. The data I initially focus on capturing is identified in the chart below. Application Hardware Recovery Application Name Device Type Location - Normal Hosting Related Business process/department Device Name (i.e., server name) Location Recovery Facility Vendor Name Vendor Name Vendor Name & Contact Contract & Support Number Contract & Support Number Vendor Declaration Info Software Key (if applicable) OS Version Internal Declaration Authorities Internal App Owner Internal Device Owner DR Plan Names (Plan IDs) RTO, RPO & Recovery Priority IP Addresses DR Plan Owners Backup/Restore Restore Type: Tape/SAN/etc. Restore Agent Type (If applicable) Off-Site vendor & contact info Server Type: physical/virtual Remote Secure Access (RSA)/ Integrated Lights- Out (ILO) IP addresses Device s Domain Name (DNS) Special Required Tools/ Equipment/Information DR Plan Team Members DR Plan Off-site Location(s) Escalation Procedures List of internal/external Stakeholders While all the above information is very important, the three most critical items are the RTO, RPO, and recovery priority. These three provide the Disaster Recovery planner the guidance to develop the recovery plan strategy in the proper order, providing the IT teams a logical sequence to follow and ensuring the Disaster (IT) Recovery Program meets the business requirements. a. Create New Plans: This is the act of developing the disaster recovery plans your company requires to support an IT event. Similar to the
5 development of Business Continuity plans, Disaster (IT) Recovery plans can be as varied as the companies that develop them. My advice for any plan is to keep it simple and to the point. Avoid documenting information that is readily available or isn t necessary during an event. For example, a vendor s documentation may provide all the required recovery steps for an application. Feel free to identify this documentation within your own plans and use it instead of recreating it. Of course, you need to develop a way to keep the information contained in these plans safe, secure, and stored in a location that is both readily accessible and out of harm s way. Many companies have adopted the use of encrypted key fobs to store their recovery plans and other critical business information, but there are many other potential solutions. Web-based software can also be a solution as long as access to the web is available during an event. b. Update Plans: The act of modifying plans with updated information ensures the plans remain viable. Typical updates might include name and contact information changes, changes in hardware configurations, or escalation procedures. These updates are generally identified through Periodic Reviews or the result of exercises. 6) Plan Maintenance: Whether you are maintaining Business Continuity plans, Crisis Management plans, Emergency Response plans, or Disaster (IT) Recovery plans, they are all living documents and should follow the same three basic processes outlined below. a. Exercise and Training: These two activities go hand in hand. Exercising provides training, and training makes exercises more efficient and effective. Plan exercises should, at a minimum, occur once per calendar year. However, many companies exercise much more often. While tabletop exercises provide a low-cost method to walk through the plans and validate plan structure and function, actual recovery exercises provide real-life situational awareness and will not only validate structure and function, but will also exercise staff skill, recovery timeframes, system/software compatibility, and data backups. The company generally develops its exercise schedule and type based on its risk tolerance and/or regulatory requirements. b. Events: Events provide a real-time validation of DR plans, albeit with greater impact to the organization.
6 c. Lessons Learned: If you exercise or actually experience an event and you haven t identified stronger recovery methods, you ve missed a great opportunity. Documenting lessons learned provides the one chance to enhance your company s plans by identifying improvement opportunities and finding their solutions. d. Update Plans: The act of updating plans with the solutions identified through lessons learned will enhance a plan s recoverability and provide better recoveries in the future. 7) Periodic Reviews: Reviews can be broken down into long-term reviews and short-term reviews. a. Long-term reviews provide the process to validate the most current Risk Evaluation and Control and BIA documentation, ensuring the original Business Continuity strategies still meet business goals. If not, new business plans and, hence, new Disaster (IT) Recovery plans would be developed based on any updated strategies. The long-term reviews should be completed every three to five years on average. b. Short-term reviews should be completed at least annually, but it is highly recommended to review your plans more often to ensure the information contained within them remains viable. Contact information becomes stale very quickly if not routinely reviewed. If the company exercises often, formal plan reviews may be required less frequently. 8) Communication Plan: Communications is probably the single most important aspect of any plan, and the communication processes and strategies should be well integrated into the program. Each Disaster (IT) Recovery plan requires a clear process for declaring a disaster, assembling the required IT recovery teams, and determining how, when, and to whom to escalate if required. The communication plan should also provide the procedure for leveraging the support vendors and reaching out to the company s own internal business departments. In addition, a comprehensive communication plan should include the process for establishing an Emergency Operations Center (EOC). The EOC is a pre-established and pre-configured location where IT leadership and communication support functions, such as the help desk, can assemble and support IT recovery functions. The EOC is the focal point for all IT communications including status updates and issue escalation.
7 Today businesses rely heavily on information technology. Even a downtime of short duration can cause considerable impact to business functions. Protecting IT infrastructure from harm has become increasingly important for many businesses and has actually become comparatively less expensive and complex. The use of virtual servers has substantially reduced recovery complexity and, if paired with a remote clustering strategy, can mitigate most of a company s IT risk. Generally, a shorter recovery time, as in the case of remote clustering, means a higher cost to implement and maintain. Keep in mind there are many factors to take into account before deciding on any one strategy. As mentioned above, implementing multiple recovery strategies that combine high availability for the critical applications and a less expensive tape recovery for the less critical applications may be sufficiently effective, at a more realistic cost. The key for developing a successful Disaster (IT) Recovery Program is understanding that business requirements must drive it. The alignment of the IT recovery strategy with business requirements ensures the most critical business functions will be available as quickly as possible, and that the impact to the business is minimized. The risk is yours! Plan accordingly. About Navigate Navigate is a management consulting firm focused on helping clients solve their business problems. We provide solutions in the areas of strategy, business operations, technology and risk. Effective project management, organizational change and leadership flow through everything we do. Objectivity, practical advice and regionally located consultants offer our clients a better consulting experience. We deliver outcomes.
ACTUALLY TEST YOUR PLAN. Disaster Recovery using Shadow Protect. March Madness Lunch & Learn. www.martinandassoc.com 1 AGENDA
AGENDA BEYOND BACKUP ENSURING RECOVER-ABILITY Identify and Quantify Exposure Risk Evolution of Recovery Technologies Build a Recover-Ability Solution Joe Gast Martin & Associates Maintenance Testing &
More informationBusiness Continuity Planning 101. +1 610 768-4120 (800) 634-2016 www.strohlsystems.com info@strohlsystems.com
Business Continuity Planning 101 Presentation Overview What is business continuity planning Plan Development Plan Testing Plan Maintenance Future advancements in BCP Question & Answer What is a Disaster?
More informationa Disaster Recovery Plan
Construction of a Disaster Recovery Plan David Godwin, Sr. Sales Engineer March 18, 2014 Objectives Understand What Disaster Recovery is? Why is Disaster Recovery Needed? Effectively assist customers or
More informationCloud Backup and Recovery
1-888-674-9495 www.doubletake.com Cloud Backup and Recovery Software applications and electronic data are the life blood of a business. When they aren t available due to a disaster or outage, business
More informationBusiness Continuity Management
Business Continuity Management cliftonlarsonallen.com Introductions Brian Pye CliftonLarsonAllen Senior Manager Business Risk Services group 15 years of experience with Business Continuity Megan Moore
More informationThe Shift Cloud Computing Brings to Disaster Recovery
The Shift Cloud Computing Brings to Disaster Recovery Mike Klein President, Online Tech June 21, 2010 Disasters Happen WHY DISASTER RECOVERY? How Do You Recover All of Your Electronic Assets? Recover Your
More informationDISASTER RECOVERY PLANNING GUIDE
DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide
More informationTechnical Considerations in a Windows Server Environment
Technical Considerations in a Windows Server Environment INTRODUCTION Cloud computing has changed the economics of disaster recovery and business continuity options. Accordingly, it is time many organizations
More informationBC / DR Implementation Tying Disaster Recovery Investment to Measurable Business Value
BC / DR Implementation Tying Disaster Investment to Measurable Business Value Continuity Insights Conference May 16-18, 2005 Agenda Purpose Discuss best practice process and tools that might be leveraged
More informationEliminating End User and Application Downtime:
Eliminating End User and Application Downtime: Architecting the Right Continuous Availability and Disaster Recovery Environment March 2010 Table of Contents Introduction 3 Where to Start 3 Moving to Continuous
More information9/3/2009. Information Systems Disaster Recovery. Learning Objectives. Why have a plan? unexpected? APPA-Institute for Facilities Management
Information Systems Disaster Recovery APPA-Institute for Facilities Management J. Craig Klimczak, D.V.M., M.S. Vice-Chancellor for Technology St. Louis Community College 300 South Broadway St. Louis, MO
More informationHow to Design and Implement a Successful Disaster Recovery Plan
How to Design and Implement a Successful Disaster Recovery Plan Feb. 21 ASA Office-Administrative Section is Sponsored by Today s ASAPro Webinar is Brought to You by the How to Ask a Question Questions
More informationThe Weill Cornell Medical College and Graduate School of Medical Sciences. Responsible Department: Information Technologies and Services (ITS)
Information Technology Disaster Recovery Policy Policy Statement This policy defines acceptable methods for disaster recovery planning, preparedness, management and mitigation of IT systems and services
More informationTop 10 Disaster Recovery Pitfalls
Top 10 Disaster Recovery Pitfalls The key to successful disaster recovery is good planning. But with so much at stake for your business, how do you plan with confidence and ensure all stakeholders know
More informationBusiness Continuity: Choosing the Right Technology Solution
Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail
More informationI.T. Disaster Recovery Plan
I.T. Disaster Recovery Plan Ref 000xxxxQ January, 2015 5, 443 Albany Hwy Victoria Park, WA, 6100 p. 1300 664 136 Info@focusnetworks.com.au www.focusnetworks.com.au I.T. Disaster Recovery Plan - January
More informationQ uick Guide to Disaster Recovery Planning An ITtoolkit.com White Paper
This quick reference guide provides an introductory overview of the key principles and issues involved in IT related disaster recovery planning, including needs evaluation, goals, objectives and related
More informationDisaster Recovery and Business Continuity What Every Executive Needs to Know
Disaster Recovery and Business Continuity What Every Executive Needs to Know Bruce Campbell & Sandra Evans Contents Why you need DR and BC What constitutes a Disaster? The difference between disaster recovery
More informationThe Difference Between Disaster Recovery and Business Continuance
The Difference Between Disaster Recovery and Business Continuance In high school geometry we learned that a square is a rectangle, but a rectangle is not a square. The same analogy applies to business
More informationJoint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Four
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Four Data Handling in University Business Impact Analysis ( BIA ) Agenda Overview Terminologies Performing
More informationImplementing Disaster Recovery? At What Cost?
Implementing Disaster Recovery? At What Cost? Whitepaper Viktor Babkov Technical Director Business Continuity Copyright Business Continuity May 2010 In today s environment, minimizing IT downtime has become
More informationSAFETY FIRST. Emerging Trends in IT Disaster Recovery. By Cindy LaChapelle, Principal Consultant. www.isg-one.com
SAFETY FIRST Emerging Trends in IT Disaster Recovery By Cindy LaChapelle, Principal Consultant www.isg-one.com INTRODUCTION Against a backdrop of increasingly integrated and interdependent global service
More informationNEEDS BASED PLANNING FOR IT DISASTER RECOVERY
The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be
More informationWHAT IS DISASTER RECOVERY
WHAT IS DISASTER RECOVERY The definition of Disaster Recovery' tends to vary widely from company to company and is a difficult term to define because it changes and is so varied in each situation. And
More informationD2-02_01 Disaster Recovery in the modern EPU
CONSEIL INTERNATIONAL DES GRANDS RESEAUX ELECTRIQUES INTERNATIONAL COUNCIL ON LARGE ELECTRIC SYSTEMS http:d2cigre.org STUDY COMMITTEE D2 INFORMATION SYSTEMS AND TELECOMMUNICATION 2015 Colloquium October
More informationDisaster Recovery Plan The Business Imperatives
Disaster Recovery Plan The Business Imperatives Table of Contents Disaster Recovery Plan The Business Imperatives... 3 Introduction... 3 A Disaster Recovery Program The Need of the Hour... 3 Approach to
More informationWhitepaper. Disaster Recovery as a Service (DRaaS): A DR solution for all
Whitepaper Disaster Recovery as a Service (DRaaS): A DR solution for all Disaster Recovery as a service: A DR solution for all Disaster Recovery (DR) is more important today than ever before. Why? Because
More informationIT Service Management
IT Service Management Service Continuity Methods (Disaster Recovery Planning) White Paper Prepared by: Rick Leopoldi May 25, 2002 Copyright 2001. All rights reserved. Duplication of this document or extraction
More informationDisaster Recovery Remote off-site Storage for single server environment
. White Paper Disaster Recovery Remote off-site Storage for single server environment When it comes to protecting your data there is no second chance January 1, 200 Prepared by: Bill Schmidley CompassPoint
More informationSCADA Business Continuity and Disaster Recovery. Presented By: William Biehl, P.E. 913-601-0104 (mobile) Bill.Biehl@we-inc.com
SCADA Business Continuity and Disaster Recovery Presented By: William Biehl, P.E. 913-601-0104 (mobile) Bill.Biehl@we-inc.com Business Continuity Planning, a Sound Process A Business Continuity Plan: "A
More informationShankar Gawade VP IT INFRASTRUCTURE ENAM SECURITIES PVT. LTD.
Business Continuity Management & Disaster Recovery Planning Presented by: Shankar Gawade VP IT INFRASTRUCTURE ENAM SECURITIES PVT. LTD. 1 What is Business Continuity Management? Is a holistic management
More informationServerCentral Business Continuity & Disaster Recovery Services
ServerCentral Business Continuity & Disaster Recovery Services SERVERCENTRAL BUSINESS CONTINUITY SERVICE & PROCESS INTRODUCTION At ServerCentral, Business Continuity and Disaster Recovery (BC/DR) refers
More informationOffsite Disaster Recovery Plan
1 Offsite Disaster Recovery Plan Offsite Disaster Recovery Plan Presented By: Natan Verkhovsky President Disty Portal Inc. 2 Offsite Disaster Recovery Plan Introduction This document is a comprehensive
More informationWhat You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility
Your Guide to Cost, Security, and Flexibility What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility 10 common questions answered Over the last decade, cloud backup, recovery
More informationLeveraging Public Cloud for Affordable VMware Disaster Recovery & Business Continuity
White Paper White Paper Managing Public Cloud Computing in the Enterprise Leveraging Public Cloud for Affordable VMware Disaster Recovery & Business Continuity A Quick Start Guide By Edward Haletky Principal
More informationMANAGEMENT AUDIT REPORT DISASTER RECOVERY PLAN DEPARTMENT OF FINANCE AND ADMINISTRATIVE SERVICES INFORMATION TECHNOLOGY SERVICES DIVISION
MANAGEMENT AUDIT REPORT OF DISASTER RECOVERY PLAN DEPARTMENT OF FINANCE AND ADMINISTRATIVE SERVICES INFORMATION TECHNOLOGY SERVICES DIVISION REPORT NO. 13-101 City of Albuquerque Office of Internal Audit
More informationOhio Supercomputer Center
Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
More informationFive Secrets to SQL Server Availability
Five Secrets to SQL Server Availability EXECUTIVE SUMMARY Microsoft SQL Server has become the data management tool of choice for a wide range of business critical systems, from electronic commerce to online
More informationData Center Assistance Group, Inc. DCAG Contact: Tom Bronack Phone: (718) 591-5553 Email: bronackt@dcag.com Fax: (718) 380-7322
Business Continuity and Disaster Recovery Job Descriptions Table of Contents Business Continuity Services Organization Chart... 2 Director Business Continuity Services Group... 3 Manager of Business Recovery
More informationSCHEDULE A DEMO BACKUP AND RECOVERY. deliver true Business Continuity in one, powerful, integrated system.
deliver true Business Continuity in one, powerful, integrated system. Protect Your Business: instantly restore entire systems, email boxes, databases in minutes Backups Verified: each backup is verified
More informationOrchestrating your Disaster Recovery with Quorum onq
WHITEPAPER Orchestrating your Disaster Recovery with Quorum onq http://www.quorum.net/ 2013 QuorumLabs, Inc. All Rights Reserved. Orchestrating your Disaster Recovery with Quorum onq Chances are that you
More informationHigh Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach
High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many
More informationApplication / Hardware - Business Impact Analysis Template. MARC Configuration Requirements. Business Impact Analysis
Application / Hardware - Business Impact Analysis Template The single most important thing we can do is help you understand the criticality of each application, supporting hardware/server/pc and the required
More informationNIST SP 800-34, Revision 1 Contingency Planning Guide for Federal Information Systems
NIST SP 800-34, Revision 1 Contingency Planning Guide for Federal Information Systems Marianne Swanson NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Table Of Contents Introduction to NIST SP 800-34
More informationDisaster Recovery Checklist Disaster Recovery Plan for <System One>
Disaster Recovery Plan for SYSTEM OVERVIEW PRODUCTION SERVER HOT SITE SERVER APPLICATIONS (Use bold for Hot Site) ASSOCIATED SERVERS KEY CONTACTS Hardware Vendor System Owners Database Owner
More informationHow to measure your business resiliency
How to measure your business resiliency Define the KPI s/kri s and scorecards to control your security and business continuity capabilities Krzysztof Pulkiewicz BCMLogic krzysztof.pulkiewicz@bcmlogic.com
More informationWith 57% of small to medium-sized businesses (SMBs) having no formal disaster
Disaster Recovery For Business Owners Practical Guidance for a Critical Operation With 57% of small to medium-sized businesses (SMBs) having no formal disaster recovery plan (Symantec, 2011), and 52% believing
More informationTo Tier or not to Tier
WHITEPAPERS To Tier or not to Tier Replicating VMware Workloads for Disaster Recovery Chances are, you already have protections in place for the event of a big storm that might threaten your business and
More informationDisaster Recovery Plan and Backup Strategy for a website
Disaster Recovery Plan and Backup Strategy for a website Sanjiv Agarwala CISSP,CISA,CISM,CGEIT,ITIL,MBCI,ISO27001,ISO9001 Director, Trainer and Principal Consultant Oxygen Consulting Services Pvt. Ltd.
More informationBackup and Disaster Recovery in Schools
Backup and Disaster Recovery in Schools White Paper Backup and data recovery within schools is changing due to an ever-expanding amount of data. Coupled with this, schools are moving towards a model of
More informationCloud Computing Disaster Recovery (DR)
Cloud Computing Disaster Recovery (DR) Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Need for Disaster Recovery (DR) What happens when you
More informationGOVERNMENT FINANCE OFFICERS ASSOCIATION OF MISSOURI SPRING 2012 CONFERENCE IT DISASTER PLAN
GOVERNMENT FINANCE OFFICERS ASSOCIATION OF MISSOURI SPRING 2012 CONFERENCE IT DISASTER PLAN 2012 Sikich LLP. All Rights Reserved. Presented by: Scott Wegner Partner, Director Networking Services Sikich
More informationHow to Plan for Disaster Recovery and Business Continuity
A TAMP Systems White Paper TAMP Systems 1-516-623-2038 www.drsbytamp.com How to Plan for Disaster Recovery and Business Continuity By Tom Abruzzo, President and CEO Contents Introduction 1 Definitions
More informationProtecting Your Business
Protecting Your Business Business Continuity/Disaster Recovery Planning Robert Haberman Senior Product Manager BCP/DRP TELUS BUSINESS SOLUTIONS Business Continuity/Disaster Recovery Planning 1 Agenda:
More informationHP Business Continuity and Availability with VMware. Create a resilient IT foundation for better business outcomes.
HP Business Continuity and Availability with VMware Create a resilient IT foundation for better business outcomes. Can you keep your business up and running? Whether it s managing an unscheduled power
More informationWhy Should Companies Take a Closer Look at Business Continuity Planning?
whitepaper Why Should Companies Take a Closer Look at Business Continuity Planning? How Datalink s business continuity and disaster recovery solutions can help organizations lessen the impact of disasters
More informationWFT - SAP Disaster Recovery Solution Brief Planning and Automating an SAP Landscape Remote Recovery Procedure
WFT - SAP Disaster Recovery Solution Brief Planning and Automating an SAP Landscape Remote Recovery Procedure Abstract This Solution Brief discusses how WFT Disaster Recovery Services helps a customer
More informationWHITE PAPER. Storage Savings Analysis: Storage Savings with Deduplication and Acronis Backup & Recovery 10
Storage Savings Analysis: Storage Savings with Deduplication and Acronis Backup & Recovery 10 Copyright Acronis, Inc., 2000 2009 Table of contents Executive Summary... 3 The Importance of Deduplication...
More informationBusiness Continuity & Recovery Plan Summary
Introduction An organization s ability to survive a significant business interruption is determined by the company s ability to develop, implement, and maintain viable recovery and business continuity
More informationBest Practices in Healthcare IT Disaster Recovery Planning
BUSINESS WHITE PAPER Best Practices in Healthcare IT Disaster Recovery Planning Assessing your options for leveraging the cloud to enhance compliance, improve recovery objectives, and reduce capital expenditures
More informationThe University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1
Version 3.1 November 22, 2004 TABLE OF CONTENTS PART 1: DISASTER RECOVERY EXPECTATIONS... 3 OVERVIEW...3 EXPECTATIONS PRIOR TO AN INCIDENT OCCURRENCE...3 EXPECTATIONS PRIOR TO A DISASTER OCCURRENCE...4
More informationDeveloping a Backup Strategy for Hybrid Physical and Virtual Infrastructures
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures sponsored by Introduction to Realtime
More informationAUDITING A BCP PLAN. Thomas Bronack Auditing a BCP Plan presentation Page: 1
AUDITING A BCP PLAN Thomas Bronack Auditing a BCP Plan presentation Page: 1 What are the Objectives of a Good BCP Plan Protect employees Restore critical business processes or functions to minimize the
More informationHow Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series How Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution sponsored by Introduction to
More informationInstitute for Business Continuity Training 1623 Military Road, # 377 Niagara Falls, NY 14304-1745
ECP - 601: Effective Business Continuity Management: ISO 22301 This 3-day course provides an intensive, hands-on workshop covering all major aspects for the design of an effective Business Continuity Plan
More informationMain Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications
Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications Suggested Reference : Senft, Sandra; Gallegos, Frederick., 2009.
More informationThe case for cloud-based disaster recovery
IBM Global Technology Services IBM SmartCloud IBM SmartCloud Virtualized Server Recovery i The case for cloud-based disaster recovery Cloud technologies help meet the need for quicker restoration of service
More informationBackup is Good, Recovery is KING
Backup is Good, Recovery is KING Who is Blue Net? Onsite Managed Services, Hybrid Cloud and Fully Hosted Cloud Solutions Provider Proudly serving our clients and fueling success since 2007. Backup is Good,
More informationStorage Backup and Disaster Recovery: Using New Technology to Develop Best Practices
Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices September 2008 Recent advances in data storage and data protection technology are nothing short of phenomenal. Today,
More informationADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3
ADDENDUM 2 TO APPENDIX 1 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT Overview EXHIBIT E to Amendment No. 60 The Disaster Recovery (DR) Services, a Tier-Level DR Solution, addresses the
More informationDisaster recovery strategic planning: How achievable will it be?
Disaster recovery strategic planning: How achievable will it be? Amr Ahmed Ernst & Young Advisory Services, Executive Director amr.ahmed@ey.com Christopher Rivera Ernst & Young Advisory Services, Manager
More informationCompany Overview. Enterprise Cloud Solutions
2016 Company Overview Enterprise Cloud Solutions ENTERPRISE CLOUD SOLUTIONS Unitas Global utilizes leading cloud technologies to optimize enterprise IT environments. By designing, deploying, and managing
More informationBEST PRACTICE GUIDE TO SMALL BUSINESS PROTECTION: BACKUP YOUR SMALL BUSINESS INFORMATION
BEST PRACTICE GUIDE TO SMALL BUSINESS PROTECTION: BACKUP YOUR SMALL BUSINESS INFORMATION ENTER YOUR BUSINESS depends on electronic customer lists, confidential information and business records. Protecting
More informationBusiness Continuity Planning Principles and Best Practices Tom Hinkel and Zach Duke
Business Continuity Planning Principles and Best Practices Tom Hinkel and Zach Duke Agenda Key components essential to a FFIEC compliant Business Continuity Plan Recovery Time Objectives & Recovery Point
More informationBusiness Continuity Planning and Disaster Recovery Planning. Ed Crowley IAM/IEM
Business Continuity Planning and Disaster Recovery Planning Ed Crowley IAM/IEM 1 Goals Compare and contrast aspects of business continuity Execute disaster recovery plans and procedures 2 Topics Business
More informationEMERGENCY PREPAREDNESS PLAN Business Continuity Plan
EMERGENCY PREPAREDNESS PLAN Business Continuity Plan GIS Bankers Insurance Group Powered by DISASTER PREPAREDNESS Implementation Small Business Guide to Business Continuity Planning Surviving a Catastrophic
More informationAddressing the Roadblocks to Application Recovery through Integrated Recovery Management
WHITE PAPER Addressing the Roadblocks to Application Recovery through Integrated Recovery Management EXECUTIVE OVERVIEW Today s market challenges combine with the complexities of application management
More informationWilliam Rider Manager Disaster Recovery & Data Security The Johns Hopkins Health System & University
William Rider Manager Disaster Recovery & Data Security The Johns Hopkins Health System & University Competitive Leadership- Twelve Principles For Success Brian Billick Chapter 3 Be Be Prepared The time
More informationBusiness Continuity Plan
Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions
More informationBusiness Continuity & Recovery Plan Summary
Introduction An organization s ability to survive a significant business interruption is determined by the company s ability to develop, implement, and maintain viable recovery and business continuity
More informationDisaster Recovery. Stanley Lopez Premier Field Engineer Premier Field Engineering Southeast Asia Customer Services and Support
Disaster Recovery Stanley Lopez Premier Field Engineer Premier Field Engineering Southeast Asia Customer Services and Support Categories of Risk Financial Operational Reputational Market share Revenue
More informationAttachment to Data Center Services Multisourcing Service Integrator Master Services Agreement
Attachment to Data Center Services Multisourcing Service Integrator Master Services Agreement DIR Contract No. DIR-DCS-MSI-MSA-001 Between The State of Texas, acting by and through the Texas Department
More informationMany Firms Are Overconfident In Their Disaster Recovery Ability
A Custom Technology Adoption Profile Commissioned By Dell May 2014 Many Firms Are Overconfident In Their Disaster Recovery Ability 1 Introduction In today s world, workers expect 24x7 availability and
More informationBusiness Continuity and Disaster Recovery Planning from an Information Technology Perspective
Business Continuity and Disaster Recovery Planning from an Information Technology Perspective Presenter: David Bird, Director of Sales, Business Technology Consultant phone: 215-672-7100 email: dbird@quatro.com
More informationDEFINING THE RIGH DATA PROTECTION STRATEGY
DEFINING THE RIGH DATA PROTECTION STRATEGY The Nuances of Backup and Recovery Solutions By Cindy LaChapelle, Principal Consultant, ISG www.isg-one.com INTRODUCTION Most organizations have traditionally
More informationHow To Choose A Business Continuity Solution
A Business Continuity Solution Selection Methodology Ellis Holman IBM Corp. Tuesday, March 13, 2012 Session Number 10387 Disclaimer Copyright IBM Corporation 2010. All rights reserved. U.S. Government
More information5 Essential Benefits of Hybrid Cloud Backup
5 Essential Benefits of Hybrid Cloud Backup QBR is a backup, disaster recovery (BDR), and business continuity solution targeted to the small to medium business (SMB) market. QBR solutions are designed
More informationw w w. s t r a t u s. c o m
Managed Services Buying Guide Eight ways to sustain 99.999% SLAs for vital business processes. In the real world. w w w. s t r a t u s. c o m Mission-critical SLAs demand mission-critical managed services.
More informationIntroduction UNDERSTANDING BUSINESS CONTINUITY MANAGEMENT
INFORMATION SECURITY: UNDERSTANDING BUSINESS CONTINUITY MANAGEMENT FACTSHEET This factsheet will introduce you to Business Continuity Management (BCM), which is a process developed to counteract systems
More informationFederal Financial Institutions Examination Council FFIEC. Business Continuity Planning BCP MARCH 2003 MARCH 2008 IT EXAMINATION
Federal Financial Institutions Examination Council FFIEC Business Continuity Planning MARCH 2003 MARCH 2008 BCP IT EXAMINATION H ANDBOOK TABLE OF CONTENTS INTRODUCTION... 1 BOARD AND SENIOR MANAGEMENT
More informationTUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY FREQUENTLY ASKED QUESTIONS OVERVIEW CORPORATE CONTINUITY PROGRAM.
TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY FREQUENTLY ASKED QUESTIONS July 2015 OVERVIEW The intent of this document is to provide external customers and auditors with a high-level overview of the
More informationIF DISASTER STRIKES IS YOUR BUSINESS READY?
1 IF DISASTER STRIKES IS YOUR BUSINESS READY? DISASTER RECOVERY and BUSINESS CONTINUITY: WHAT YOU NEED TO KNOW Realize the Power of Technology Many business owners put off disaster planning, perhaps thinking
More informationA Study on Cloud Computing Disaster Recovery
A Study on Cloud Computing Disaster Recovery Mr.A.Srinivas, Y.Seetha Ramayya, B.Venkatesh HOD and Associate Professor, Dept. Of CSE, Coastal Institute of Technology & Management, Vizianagaram, India Students
More informationReal-time Protection for Hyper-V
1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate
More informationProjectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
More informationAudit of the Disaster Recovery Plan
Audit of the Disaster Recovery Plan Report # 11-05 Prepared by Office of Inspector General J. Timothy Beirnes, CPA, Inspector General Kit Robbins, CISA, CISM, CRISC, Lead Information Systems Auditor TABLE
More informationDISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES
DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES Dejan Živanović EMC Technology Solutions Group SEE Presales Manager Dejan.Zivanovic@emc.com 1 The Business Maturity Model V Enabled Web
More informationCourse: Information Security Management in e-governance. Day 2. Session 5: Disaster Recovery Planning
Course: Information Security Management in e-governance Day 2 Session 5: Disaster Recovery Planning Agenda Introduction to Disaster Recovery Planning (DRP) Need for disaster recovery planning Approach
More informationDISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS
Appendix L DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS I. GETTING READY A. Obtain written commitment from top management of support for contingency planning objectives. B. Assemble
More informationThe Disaster Recovery Maturity Framework
The Disaster Recovery Maturity Framework A guide for understanding and improving your company s resiliency www.axcient.com Climbing The Recovery Maturity Curve Businesses are critically reliant upon IT
More information