The Planning Method for Disaster Recovery Program of Digital Business Based on HSM-III Model

Size: px
Start display at page:

Download "The Planning Method for Disaster Recovery Program of Digital Business Based on HSM-III Model"

Transcription

1 Journal of Information & Computational Science 7: 12 (2010) Available at The Planning Method for Disaster Recovery Program of Digital Business Based on HSM-III Model Shenghui Zhao School of Information Management, Wuhan University, Wuhan , China Abstract In this paper, based on analysis of objectives, hierarchy and cost of disaster recovery system of digital business, the author proposes HSM-III model which referenced from Hierarchical Storage Management model HSM-I and HSIM-II. The main idea of HSM-III is hierarchical disaster recovery management, that is, different levels of business disaster recovery requirements and disaster recovery programs should matched properly in order to gain highest performance at the lowest cost of disaster recovery programs. A relevant example is also provided to demonstrate the application of this model. The model proposed in this paper can be used in various organizations to help strategic thinking for their digital business disaster recovery system. Keywords: Disaster Recovery Program; Hierarchical Storage Management; HSM-III 1 Introduction Digital business refers to a series of management activities or business processes within specific organization which must done by means of computers, networks and other modern information technologies. In the field of business continuity, the word disaster has special meaning. As defined by Disaster Recovery Journal (DRJ), disaster is the incidents which can lead to total or parts of the critical business functions of the organization can not provided at scheduled time [1]. Disaster recovery refers to the combination of technical means and management measures which can ensure specific data, information systems or business processes is restore after the occurrence of disaster as soon as possible.disaster recovery runs at the last layer of defense system which can maintain continuous operation of the digital business that supported by information systems through rapid business data or business system recovery. How to obtain the best outcome at the lowest cost of disaster recovery program, it is the issue that every organization should considered, which requires great deal of effort to plan business disaster recovery program at strategic level. Corresponding author. address: [email protected] (Shenghui Zhao) / Copyright 2010 Binary Information Press December 2010

2 2404 S. Zhao /Journal of Information & Computational Science 7: 12 (2010) Basic Principles of Digital Business Disaster Recovery Planning The objectives of disaster recovery system are used to be measured by two indicators [2]: RTO (Recovery Time Object), and RPO (Recovery Point Object). RTO refers to recovery time objective, it is the tolerated time from the stop point of business function to the recovery point (the speed requirement of recovery activity). RPO refers to recovery point objectives, it is requirements of time point that system must to be recoveried, it measures the tolerate volume of data loss after disaster (the requirement of recovery integrity). Based on the difference of business, RTO/RPO of them can be set at the levels such as seconds, minutes, hours, days, weeks, different levels are different in the way of realization [3]. According to international standard SHARE 78, the recovery ability of disaster recovery program can be divided into seven levels, they are [4] (Shown in Fig. 1): (1) Tier0 (no off-site data). (2) Tier1 (Pickup Truck Access Method). (3) Tier2 (PTAM+Hot Site). (4) Tier3 (Electronic Vaulting). (5) Tier4 (Active Secondary Site). (6) Tier5 (Two-Site, Two-Phase Commit). (7) Tier6 (Zero Data Loss). Cost Tier6 Tier5 Tier4 Tier3 Tier2 Tier1 Tier0 Tiers O T1T2T3 T4 T5 T6 T7 RTO/RPO Fig. 1: The relationship between disaster recovery programs and cost Digital business disaster recovery is a complex issue, the program with highest level of cost can not ensure best performance at most of time. Reasonable or scientific program must try to gain the balance point among disaster recovery objectives, technology choices, and overall cost (TCO). For specific organization, the best disaster recovery program is the intersection of cost curve and requirement curve (loss caused by business interruption), shown in Fig. 2.

3 S. Zhao /Journal of Information & Computational Science 7: 12 (2010) Value Recovery cost Recovery requirement O T m T k T n RTO/RPO Fig. 2: The balance of disaster recovery costs and requirements So, the basic principles of digital business disaster recovery planning is to analyze the characteristics of various types of digital businesses, for their disaster recovery requirements, select reasonable portfolio programs of disaster recovery level (Tiers), to achieve the objectives of business disaster recovery (RTO/RPO), at the lowest total cost of disaster recovery system [5] [6]. 3 Proposition and Principle of HSM-III Model 3.1 Proposition of HSM-III Model HSM, namely, hierarchical storage management, its basic idea is unified management of organizational storage resource, different levels of storage requirements can be satisfied by appropriate levels of storage resources, to achieve the best performance of overall system at the lowest cost. Related research to hierarchical storage management focused on two levels: the computer storage system level, mainly at the lowest cost of hardware to maximize computing performance [7]. Another lies on organizational business data storage, mainly according with the frequency of business data using, to planning storage programs among life cycle [8]. In order to distinguish them, the former is called HSM-I theory while the latter is named HSM-II theory. By the enlightenment of HSM-I and HSM-II, the ideas of hierarchical storage management is introduced into digital business disaster recovery study, to build a disaster recovery management model based on hierarchical management philosophy. That is, to achieve the highest effect of disaster recovery at the lowest cost, the core objective is to improve overall performance. For their consistency, hierarchical disaster recovery management theory is called HSM-III model in this paper. 3.2 Construction of HSM-III Model According to the idea of HSM-III, digital business is combined by a large number of sub-businesses, the characteristics of various types of business are different. In this paper, it can be classified from two dimensions: functional value and IT dependence (or manual substitutability).

4 2406 S. Zhao /Journal of Information & Computational Science 7: 12 (2010) Firstly, according to the core functions of business, it can be classified into follow categories: (1) Critical Business, refers to core business functions of organization.if they are interrupted, core values of the institution will not be able to play, resulting in great loss; (2) Major Business, refers to important functions of organization.their interruption will affect the realization of core values of institution business, and damage to the organization at certain extent; (3) General Business, refers to normal functioning of organization. Their interruption will leads to a modest effect on core functions of business running, can cause minor damage to organization [9]. Secondly, according to IT dependence, they may also be classified to three categories (shown in Fig. 3): (1) Can not be substituted by manual operations. Business under any circumstances can not be substituted by manual operation, unless business processes with same function to substitute the damaged original process can be found, otherwise business process functions can not be performed manually. Therefore, the type of business has very low tolerance for interruption. (2) Can be substituted by manual operation in a short term. Business in most cases can not be substituted by manual operation, but after the interruption, business operations can done manually within a short period of time, if system can not be recovery within the given period, disaster loss will continue to increase. (3) Can be substituted by manual operations. Operations in all cases can be substituted manually. During the occurrence of a digital disaster, business execution can be handled manually.howeverm, the efficiency and accuracy of manual processing is less than digital businesses, the organization would still have some kinds of loss. Loss Can not be substituted by manual operations Can be substituted by manual Operation in a short term Can be substituted by manual operations Time of interruption Fig. 3: Business classification based on IT dependence [4] Thirdly, according to the above two dimensions, it can be combined to form a more detailed business classification matrix, shown in Fig. 4. According to the classification matrix, business disaster recovery requirements can be divided into three different levels [10]: (1) Businesses must running continually. It includes the types of Critical Business with Can t Manual Substituted (I) and Major Business with Can t Manual Substituted (IV). This kinds of business is very weak in disasters tolerance, business interruption will cause great loss mostly.

5 S. Zhao /Journal of Information & Computational Science 7: 12 (2010) Critical Business I II III Major Business IV V VI General Business VII VIII IX Can t Manual Substituted Short-term Manual Substituted Can Manual Substituted Fig. 4: Classification matrix of digital business (2) Businesses require rapid recovery. It includes the types of Critical Business with Short-term Manual Substituted (II) and Major Business with Short-term Manual Substituted (V). Such businesses can be substituted by manual operation at certain period of time, but the loss would increase if time is over such period, thus, they require rapid recovery. (3) Businesses can tolerate interruption. It includes the types of Critical Business with Can Manual Substituted (III), Major Business with Can Manual Substituted (VI), General Business with Can t Manual Substituted (VII), General Business with Short-term Manual Substituted (VII), General Business with Can Manual Substituted (IX). The impact of disaster towards these businesses is relatively small, they have sufficient time for system recovery. However, the prerequisite is that they have the ability to recovery, such as the backup of necessary business data. 3.3 Principle of HSM-III Model As shown in Fig. 5, RTO and RPO are showing linear positive correlation in disaster recovery system, the higher of RTO is set, corresponding RPO should also set at a higher point. So, the recovery ability can be measured by one objective of them, usually is the RTO [10]. Reference to disaster recovery white paper issued by China Information Center of IBM, usual value of three levels in disaster recovery system as follows (Fig. 5): (1) The first level, businesses must to run continually. 0<RTO <1hour, tiers can achieve above requirements are Tier6, Tier5, Tier4; (2) The second level, businesses require rapid recovery. 0<RTO <24hour, tiers can achieve Cost Tier6 Tier5 Must running continually Tier4 Tier3 Require rapid recovery Tier2 O Interruption tolerance Tier1 Tier0 1hour 24hour 48hour RTO Fig. 5: The principle of HSM-III model [4]

6 2408 S. Zhao /Journal of Information & Computational Science 7: 12 (2010) above requirements are Tier3, Tier2; (3) The third level, businesses can tolerate interruption. 0<RTO<48hour, tiers can achieve above requirements are Tier1, Tier0. 4 Example of HSM-III Model Application Telecommunications services include traditional voice services, internet access services, corporate connectivity and remote access, and other data services. For effective management of varies telecommunications services, companies of telecom sector have developed appropriate information system to support these businesses relied on computers and networks [1]. Thus, once digital disaster occurs, the critical data of their business will facing the risk of losing, customer s communications services would not be guaranteed, this is bound to cause enormous economic loss and decline credibility.in accordance with principles of disaster recovery, digital business disaster recovery planning process based on HSM-III model as follows: Code Step 1. Digital businesses identification. Step 2. Business feature profiling. Main task of this phase is to evaluate businesses according their functional importance and IT dependence. Step 3. Disaster recovery requirement analysis. Reference from digital business classification matrix in Fig.4 to obtain various types of business disaster recovery requirements, such as shown in Table 1. Table 1: Telecom Digital Business Disaster Recovery Requirements Analysis Name of Business Business Functional Business IT Disaster Recovery importance independence Requirement T1 Billing Critical Business Can t Manual Substituted Must Running Continually T2 Accounting Treatment Critical Business Can t Manual Substituted Must Running Continually T3 Customer Services Critical Business Short-term Manual Substituted Require Rapid Recovery T4 Comprehensive Settlement Major Business Can t Manual Substituted Must Running Continually T5 Statistical Analysis General Business Short-term Manual Substituted Interruption Tolerance T6 Accounting Management Critical Business Can t Manual Substituted Must Running Continually T7 Credit Control Critical Business Can t Manual Substituted Must Running Continually T8 Systems Management Major Business Can t Manual Substituted Must Running Continually T9 Acquisition Critical Business Can t Manual Substituted Must Running Continually T10 Online Instruction Critical Business Can t Manual Substituted Must Running Continually T11 Scheduling General Business Can Manual Substituted Interruption Tolerance Step 4. The classification of disaster recovery requirement for telecom businesses. Reference to the conclusions drawn from the analysis in Table 1 and Fig. 4, telecom business could be divided into three groups, shown in Table 2. 5 Conclusion Essentially speaking, disaster recovery planning is to pursue greatest extent of possible balance between disaster recovery requirements with disaster recovery ability on the whole. The idea is,

7 S. Zhao /Journal of Information & Computational Science 7: 12 (2010) Table 2: Digital business disaster recovery program Level Name Business Codes Disaster Recovery Object Program S1 Must Running Continually T1, T2, T4, T6, Tier4 or Tier5 0<RTO <1 hour T7, T8, T9, T10 or Tier6 S2 Require Rapid Recovery T3 0<RTO <24hour Tier2 or Tier3 S3 Interruption Tolerance T5, T11 0<RTO <48hour Tier0 or Tier1 for specific business disaster recovery requirements, select reasonable level of disaster recovery portfolio (Tiers), to meet the RTO/RPO under premise of the lowest total cost (TCO). In this paper, based on principles of digital business disaster recovery, hierarchical disaster recovery management model (HSM-III) referenced from HSM-I and HSM-II is constructed. It s advantage lies in the perspective of digital business, bypassing the difficulty and uncertainty in disaster risk analysis, taken the relationship of total costs and disaster recovery requirement into account at same time to achieve optimal performance of the overall disaster recovery program. Acknowledgement This work is supported by Burg Information Technology Research Institute of Xi an Burg International Data Group Co. Ltd of China. References [1] LI Man etc.theory and application of information systems disaster survivability, People s Posts and Telecom Press, Beijing, 2007 [2] [America] John William Toigo, LIAN Yi-feng, PANG Nan translated, Disaster recovery planning, Electronic Industry Press, Beijing, 2004 [3] [America] Roopendra Jeet Sandhu, ZHANG Rui-ping translated, Information disaster recovery planning, Tsinghua University Press, Beijing, 2004 [4] IBM China Information Support Center, Disaster recovery white paper, Accessed at: 51cto.com/thread html, Agust 15, 2010 [5] LIU Hongfa, TANG Hong, Network storage and disaster recovery technology, Electronic Industry Press, Beijing, 2008 [6] State Council Information Office of China, Important Information Systems Disaster Recovery Guide, April, 2005 [7] ZHANG Jiwen, principles of computer composition, Tsinghua University Press, Beijing, 2004 [8] LIU Jiazhen, Electronic record management theory and practice, Science Press, Beijing, 2003 [9] [America] Michael Miller, JIANG Jinlei translated, Cloud computing, Mechanical Industry Press, Beijing, 2009 [10] LIN Xiaoming, Balance of RTO and RPO, China Information (Newspaper), May 23, 2009

A Study on Cloud Computing Disaster Recovery

A Study on Cloud Computing Disaster Recovery A Study on Cloud Computing Disaster Recovery Mr.A.Srinivas, Y.Seetha Ramayya, B.Venkatesh HOD and Associate Professor, Dept. Of CSE, Coastal Institute of Technology & Management, Vizianagaram, India Students

More information

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i. New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New

More information

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR ITALY

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR ITALY EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR ITALY 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 GLOBAL KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION

More information

CITY UNIVERSITY OF HONG KONG Business Continuity Management Standard

CITY UNIVERSITY OF HONG KONG Business Continuity Management Standard PUBLIC Version: 1.0 CITY UNIVERSITY OF HONG KONG Business Continuity Management Standard (Approved by the Information Strategy and Governance Committee in December 2013; revision 1.1 approved by Chief

More information

The Weill Cornell Medical College and Graduate School of Medical Sciences. Responsible Department: Information Technologies and Services (ITS)

The Weill Cornell Medical College and Graduate School of Medical Sciences. Responsible Department: Information Technologies and Services (ITS) Information Technology Disaster Recovery Policy Policy Statement This policy defines acceptable methods for disaster recovery planning, preparedness, management and mitigation of IT systems and services

More information

Research on Operation Management under the Environment of Cloud Computing Data Center

Research on Operation Management under the Environment of Cloud Computing Data Center , pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering

More information

Computer-Aided Disaster Recovery Planning Tools (CADRP)

Computer-Aided Disaster Recovery Planning Tools (CADRP) Computer-Aided Disaster Recovery Planning Tools (CADRP) Omar H. Alhazmi Department of Computer Science Taibah University Medina, Saudi Arabia [email protected] Abstract Information Technology Disaster

More information

Business Continuity and Disaster Recovery Planning from an Information Technology Perspective

Business Continuity and Disaster Recovery Planning from an Information Technology Perspective Business Continuity and Disaster Recovery Planning from an Information Technology Perspective Presenter: David Bird, Director of Sales, Business Technology Consultant phone: 215-672-7100 email: [email protected]

More information

Application / Hardware - Business Impact Analysis Template. MARC Configuration Requirements. Business Impact Analysis

Application / Hardware - Business Impact Analysis Template. MARC Configuration Requirements. Business Impact Analysis Application / Hardware - Business Impact Analysis Template The single most important thing we can do is help you understand the criticality of each application, supporting hardware/server/pc and the required

More information

Backup and Recovery 1

Backup and Recovery 1 Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup

More information

EMC GLOBAL DATA PROTECTION INDEX GLOBAL KEY RESULTS & FINDINGS

EMC GLOBAL DATA PROTECTION INDEX GLOBAL KEY RESULTS & FINDINGS EMC GLOBAL DATA PROTECTION INDEX GLOBAL KEY RESULTS & FINDINGS 1 THE DATA PROTECTION LANDSCAPE ARE YOU ON SOLID GROUND? 2 KEY FINDINGS GLOBALLY, ENTERPRISES ARE LOSING AS MUCH AS $1.7 TRILLION THROUGH

More information

Simplify Your Data Protection Strategies: Best Practices for Online Backup & Recovery

Simplify Your Data Protection Strategies: Best Practices for Online Backup & Recovery Simplify Your Data Protection Strategies: Best Practices for Online Backup & Recovery Souvik Choudhury, Senior Director, Product Management SunGard Availability Services DRAFT www.sungardas.com Agenda

More information

How To Choose A Business Continuity Solution

How To Choose A Business Continuity Solution A Business Continuity Solution Selection Methodology Ellis Holman IBM Corp. Tuesday, March 13, 2012 Session Number 10387 Disclaimer Copyright IBM Corporation 2010. All rights reserved. U.S. Government

More information

CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT

CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT JANUARY 2008 GUIDELINE ON BUSINESS CONTINUITY GUIDELINE CBK/PG/14

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine

More information

Things You Need to Know About Cloud Backup

Things You Need to Know About Cloud Backup Things You Need to Know About Cloud Backup Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective and reliable method of safeguarding the increasing

More information

RS Official Gazette, No 23/2013 and 113/2013

RS Official Gazette, No 23/2013 and 113/2013 RS Official Gazette, No 23/2013 and 113/2013 Pursuant to Article 15, paragraph 1 and Article 63, paragraph 2 of the Law on the National Bank of Serbia (RS Official Gazette, Nos 72/2003, 55/2004, 85/2005

More information

Huawei Business Continuity and Disaster Recovery Solution

Huawei Business Continuity and Disaster Recovery Solution Huawei Business Continuity and Disaster Recovery Solution Contents 01 Great Challenges to Business Continuity and Disaster Recovery 02 Huawei Business Continuity and Disaster Recovery Solution 02 Application

More information

Contents. Foreword. Acknowledgments

Contents. Foreword. Acknowledgments Foreword Preface Acknowledgments xv xvii xviii CHAPTER 1 Introduction 1 1.1 What Is Mission Critical? 1 1.2 Purpose of the Book 2 1.3 Network Continuity Versus Disaster Recovery 2 1.4 The Case for Mission-Critical

More information

PAPER-6 PART-5 OF 5 CA A.RAFEQ, FCA

PAPER-6 PART-5 OF 5 CA A.RAFEQ, FCA Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-5 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand

More information

Beyond Traditional Disaster Recovery Goals Augmenting the Recovery Consistency Characteristics

Beyond Traditional Disaster Recovery Goals Augmenting the Recovery Consistency Characteristics Beyond Traditional Disaster Recovery Goals Augmenting the Recovery Consistency Characteristics Octavian Paul ROTARU American Sentinel University [email protected] Abstract For most organizations

More information

Regulations on Information Systems Security. I. General Provisions

Regulations on Information Systems Security. I. General Provisions Riga, 7 July 2015 Regulations No 112 (Meeting of the Board of the Financial and Capital Market Commission Min. No 25; paragraph 2) Regulations on Information Systems Security Issued in accordance with

More information

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss

More information

DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES

DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES Dejan Živanović EMC Technology Solutions Group SEE Presales Manager [email protected] 1 The Business Maturity Model V Enabled Web

More information

Draft Information Technology Policy

Draft Information Technology Policy Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software

More information

SAFETY FIRST. Emerging Trends in IT Disaster Recovery. By Cindy LaChapelle, Principal Consultant. www.isg-one.com

SAFETY FIRST. Emerging Trends in IT Disaster Recovery. By Cindy LaChapelle, Principal Consultant. www.isg-one.com SAFETY FIRST Emerging Trends in IT Disaster Recovery By Cindy LaChapelle, Principal Consultant www.isg-one.com INTRODUCTION Against a backdrop of increasingly integrated and interdependent global service

More information

Business Continuity Management

Business Continuity Management Business Continuity Management cliftonlarsonallen.com Introductions Brian Pye CliftonLarsonAllen Senior Manager Business Risk Services group 15 years of experience with Business Continuity Megan Moore

More information

Research on Competitive Strategies of Telecom Operators in Post-3G Era Based on Industry Chain Value Stream

Research on Competitive Strategies of Telecom Operators in Post-3G Era Based on Industry Chain Value Stream Research on Competitive Strategies of Telecom Operators in Post-3G Era Based on Industry Chain Value Stream Zhong Wei 1, a, Wang Jianming 2, b and Zhang Yang 3, c 1 Beijing University of Posts and Telecommunications,

More information

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered Over the last decade, cloud backup, recovery and restore (BURR) options have emerged

More information

What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility

What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility Your Guide to Cost, Security, and Flexibility What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility 10 common questions answered Over the last decade, cloud backup, recovery

More information

Advent. Disaster Recovery: Options for Investment Managers. A White Paper from Advent Software and CyGem Ltd. Advent Software, Inc.

Advent. Disaster Recovery: Options for Investment Managers. A White Paper from Advent Software and CyGem Ltd. Advent Software, Inc. Advent Disaster Recovery: Options for Investment Managers A White Paper from Advent Software and CyGem Ltd. Advent Software, Inc. This communication is provided by Advent Software, Inc. for informational

More information

The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang

The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang Nanjing Communications

More information

The Shift Cloud Computing Brings to Disaster Recovery

The Shift Cloud Computing Brings to Disaster Recovery The Shift Cloud Computing Brings to Disaster Recovery Mike Klein President, Online Tech June 21, 2010 Disasters Happen WHY DISASTER RECOVERY? How Do You Recover All of Your Electronic Assets? Recover Your

More information

Reduce your data storage footprint and tame the information explosion

Reduce your data storage footprint and tame the information explosion IBM Software White paper December 2010 Reduce your data storage footprint and tame the information explosion 2 Reduce your data storage footprint and tame the information explosion Contents 2 Executive

More information

A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain

A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain International Journal of Security and Its Applications, pp.81-88 http://dx.doi.org/10.1257/ijsia.201.8.6.08 A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain Xin

More information

An introduction to disaster recovery. And how DrAAS from I.R.I.S. Ondit can help!

An introduction to disaster recovery. And how DrAAS from I.R.I.S. Ondit can help! An introduction to disaster recovery And how DrAAS from I.R.I.S. Ondit can help! Events That Impact Information Availability Events that require a data center move: Fewer than 1% of occurrences Natural

More information

Archiving, Backup, and Recovery for Complete the Promise of Virtualization

Archiving, Backup, and Recovery for Complete the Promise of Virtualization Archiving, Backup, and Recovery for Complete the Promise of Virtualization Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that

More information

AL RAFEE ENTERPRISES Solutions & Expertise.

AL RAFEE ENTERPRISES Solutions & Expertise. AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure

More information

Building a Disaster Recovery Program By: Stieven Weidner, Senior Manager

Building a Disaster Recovery Program By: Stieven Weidner, Senior Manager Building a Disaster Recovery Program By: Stieven Weidner, Senior Manager Part two of a two-part series. If you read my first article in this series, Building a Business Continuity Program, you know that

More information

Documentation. Disclaimer

Documentation. Disclaimer HOME UTORprotect DOCUMENTATION AMS/ROSI SERVICES CONTACT Documentation Disaster Recovery Planning Disaster Recovery Planning Disclaimer The following project outline is provided solely as a guide. It is

More information

Success or Failure? Your Keys to Business Continuity Planning. An Ingenuity Whitepaper

Success or Failure? Your Keys to Business Continuity Planning. An Ingenuity Whitepaper Success or Failure? Your Keys to Business Continuity Planning An Ingenuity Whitepaper May 2006 Overview With the level of uncertainty in our world regarding events that can disrupt the operation of an

More information

D2-02_01 Disaster Recovery in the modern EPU

D2-02_01 Disaster Recovery in the modern EPU CONSEIL INTERNATIONAL DES GRANDS RESEAUX ELECTRIQUES INTERNATIONAL COUNCIL ON LARGE ELECTRIC SYSTEMS http:d2cigre.org STUDY COMMITTEE D2 INFORMATION SYSTEMS AND TELECOMMUNICATION 2015 Colloquium October

More information

What you need to know about cloud backup: your guide to cost, security and flexibility.

What you need to know about cloud backup: your guide to cost, security and flexibility. What you need to know about cloud backup: your guide to cost, security and flexibility. Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective

More information

ASX SETTLEMENT OPERATING RULES Guidance Note 10

ASX SETTLEMENT OPERATING RULES Guidance Note 10 BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they

More information

Disaster Recovery in Cloud Computing

Disaster Recovery in Cloud Computing Disaster Recovery in Cloud Computing Mr.Akshay A. Gharat, Mr. Devendra E. Mhamunkar ASM INSTITUTE OF MANAGEMENT & COMPUTER STUDIES (IMCOST), THANE, MUMBAI University Of Mumbai Abstract: Nowadays, data

More information

Virtualizing disaster recovery using cloud computing

Virtualizing disaster recovery using cloud computing IBM Global Technology Services Thought Leadership White Paper January 2012 Virtualizing disaster recovery using cloud computing Transition your applications quickly to a resilient cloud 2 Virtualizing

More information

Study of Lightning Damage Risk Assessment Method for Power Grid

Study of Lightning Damage Risk Assessment Method for Power Grid Energy and Power Engineering, 2013, 5, 1478-1483 doi:10.4236/epe.2013.54b280 Published Online July 2013 (http://www.scirp.org/journal/epe) Study of Lightning Damage Risk Assessment Method for Power Grid

More information

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments Unified Information Management for Complex Windows Environments The Explosion of Unstructured Information It is estimated that email, documents, presentations, and other types of unstructured information

More information

COPYRIGHTED MATERIAL. Contents. Acknowledgments Introduction

COPYRIGHTED MATERIAL. Contents. Acknowledgments Introduction Contents Acknowledgments Introduction 1. Governance Overview How Do We Do It? What Do We 1 Get Out of It? 1.1 What Is It? 1 1.2 Back to Basics 2 1.3 Origins of Governance 3 1.4 Governance Definition 5

More information

15 Organisation/ICT/02/01/15 Back- up

15 Organisation/ICT/02/01/15 Back- up 15 Organisation/ICT/02/01/15 Back- up 15.1 Description Backup is a copy of a program or file that is stored separately from the original. These duplicated copies of data on different storage media or additional

More information

ILM: Tiered Services & The Need For Classification

ILM: Tiered Services & The Need For Classification ILM: Tiered Services & The Need For Classification Edgar StPierre, EMC 2 SNW San Diego April 2007 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

Information Archiving

Information Archiving Information Archiving Drinking from the firehose. Raymond Lambie Product Marketing Manager, HP Autonomy AP/J Archive or Backup What is the difference? Ctrl-X or Ctrl-C An archive is a primary copy of inactive

More information

ROI of IT DISASTER RECOVERY

ROI of IT DISASTER RECOVERY ROI of IT DISASTER RECOVERY Acronis 2002-2015 In light of recent U.S. disasters, such as Hurricane Sandy and Katrina, disaster recovery and business continuity are now important topics that are top of

More information

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be

More information

Backup, Recovery & Archiving. Choosing a data protection strategy that best suits your IT requirements and business needs.

Backup, Recovery & Archiving. Choosing a data protection strategy that best suits your IT requirements and business needs. A N AT L A N T I C - I T. N E T W H I T E PA P E R Choosing a data protection strategy that best suits your IT requirements and business needs. 2 EXECUTIVE SUMMARY Data protection has become the hydra

More information

Comparative analysis of regular and cloud disaster and recovery systems

Comparative analysis of regular and cloud disaster and recovery systems Page 224 of 344 Comparative analysis of regular and cloud disaster and recovery systems Jasmin Azemović Faculty of information technologies University Džemal Bijedić Mostar, Sjeverni logor bb, Bosnia and

More information

A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN

A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN Eman Al-Harbi [email protected] Soha S. Zaghloul [email protected] Faculty of Computer and Information

More information

THE CASE FOR ACTIVE DATA ARCHIVING

THE CASE FOR ACTIVE DATA ARCHIVING THE CASE FOR ACTIVE DATA ARCHIVING Written by Ray Quattromini 3 rd September 2007 Contact details Tel: 01256 782030 / 08704 286 186 Fax: 08704 286 187 Email: [email protected] Web: www.data-storage.co.uk

More information

CIS 523/423 Disaster Recovery Business Continuity

CIS 523/423 Disaster Recovery Business Continuity CIS 523/423 Disaster Recovery Business Continuity Course Description A study of disaster recovery and business continuity as related to the information technology function in organizations. Topics will

More information

OUTAGE MANAGEMENT SYSTEMS What, How, Why. Steven E Collier Director, Smart Grid Strategies MILSOFT Utility Solutions

OUTAGE MANAGEMENT SYSTEMS What, How, Why. Steven E Collier Director, Smart Grid Strategies MILSOFT Utility Solutions OUTAGE MANAGEMENT SYSTEMS What, How, Why Steven E Collier Director, Smart Grid Strategies MILSOFT Utility Solutions DETECT LOCATE assess analyze INFORM RESTORE INVESTIGATE IMPROVE WHAT IS OMS? Outage

More information

IT Service Desk Manager

IT Service Desk Manager IT Service Desk Manager Sangita Chandrakant Panmand [1], Sudarshan Ramakant Patil [2] Jainam Technology Pvt. Ltd, Bhaveshwar Complex, Patelwadi. Kurla, Mumbai, Maharashtra 400086. [email protected],

More information

China's Journey Towards Technology

China's Journey Towards Technology Jinzy Zhu China Cloud Rising China's Journey Towards Technology Supremacy ^ Springer Contents Part I The China Dream 1 Silk Road Revisited 3 2 Cloud Determinism 7 3 Connecting the Possibilities 11 3.1

More information

Business resilience: The best defense is a good offense

Business resilience: The best defense is a good offense IBM Business Continuity and Resiliency Services January 2009 Business resilience: The best defense is a good offense Develop a best practices strategy using a tiered approach Page 2 Contents 2 Introduction

More information

Business Continuity & Recovery Plan Summary

Business Continuity & Recovery Plan Summary Introduction An organization s ability to survive a significant business interruption is determined by the company s ability to develop, implement, and maintain viable recovery and business continuity

More information

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou 3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University

More information

Does it state the management commitment and set out the organizational approach to managing information security?

Does it state the management commitment and set out the organizational approach to managing information security? Risk Assessment Check List Information Security Policy 1. Information security policy document Does an Information security policy exist, which is approved by the management, published and communicated

More information

Disaster recovery strategic planning: How achievable will it be?

Disaster recovery strategic planning: How achievable will it be? Disaster recovery strategic planning: How achievable will it be? Amr Ahmed Ernst & Young Advisory Services, Executive Director [email protected] Christopher Rivera Ernst & Young Advisory Services, Manager

More information

Cloud Storage and Backup

Cloud Storage and Backup Cloud Storage and Backup Cloud Storage and Backup Cloud Storage and Backup services from iomartcloud have been designed to deliver the performance, capacity, security and flexibility needed to address

More information

ASX CLEAR (FUTURES) OPERATING RULES Guidance Note 10

ASX CLEAR (FUTURES) OPERATING RULES Guidance Note 10 BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they

More information

Method of Fault Detection in Cloud Computing Systems

Method of Fault Detection in Cloud Computing Systems , pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,

More information

Shankar Gawade VP IT INFRASTRUCTURE ENAM SECURITIES PVT. LTD.

Shankar Gawade VP IT INFRASTRUCTURE ENAM SECURITIES PVT. LTD. Business Continuity Management & Disaster Recovery Planning Presented by: Shankar Gawade VP IT INFRASTRUCTURE ENAM SECURITIES PVT. LTD. 1 What is Business Continuity Management? Is a holistic management

More information

Data Protection as Part of Your Cloud Journey

Data Protection as Part of Your Cloud Journey Data Protection as Part of Your Cloud Journey Jim Vanek DPAD Area Manager IL / WI EMC Data Protection & Availability Division October 23, 2014 Copyright 2014 EMC Corporation. All rights reserved. 1 Setting

More information

BME CLEARING s Business Continuity Policy

BME CLEARING s Business Continuity Policy BME CLEARING s Business Continuity Policy Contents 1. Introduction 1 2. General goals of the Continuity Policy 1 3. Scope of BME CLEARING s Business Continuity Policy 1 4. Recovery strategies 2 5. Distribution

More information

November 2007 Recommendations for Business Continuity Management (BCM)

November 2007 Recommendations for Business Continuity Management (BCM) November 2007 Recommendations for Business Continuity Management (BCM) Recommendations for Business Continuity Management (BCM) Contents 1. Background and objectives...2 2. Link with the BCP Swiss Financial

More information

Leverage the IBM Tivoli advantages in storage management

Leverage the IBM Tivoli advantages in storage management IBM Software December 2010 Leverage the IBM Tivoli advantages in storage management IBM Tivoli storage management solutions outperform the competition 2 Leverage the IBM Tivoli advantages in storage management

More information

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department

More information

GL ON THE MINIMUM LIST OF SERVICES AND FACILITIES EBA/GL/2015/06 06.08.2015. Guidelines

GL ON THE MINIMUM LIST OF SERVICES AND FACILITIES EBA/GL/2015/06 06.08.2015. Guidelines EBA/GL/2015/06 06.08.2015 Guidelines on the minimum list of services or facilities that are necessary to enable a recipient to operate a business transferred to it under Article 65(5) of Directive 2014/59/EU

More information

Cloud Storage Services. A Total Cost of Ownership Comparison. Sponsored by Fujifilm Copyright 2015 Brad Johns Consulting L.L.C.

Cloud Storage Services. A Total Cost of Ownership Comparison. Sponsored by Fujifilm Copyright 2015 Brad Johns Consulting L.L.C. Cloud Storage Services A Total Cost of Ownership Comparison Sponsored by Fujifilm Copyright 2015 Brad Johns Consulting L.L.C. STORAGE INDUSTRY TRENDS The amount of digital information organizations are

More information

AnyBackup Family. Product Overview

AnyBackup Family. Product Overview Overview of EISOO AnyBackup Appliance AnyBackup Family Adhering to the idea of "All-in-One Protection", EISOO creatively released AnyBackup Family which covers series of hardware and software products

More information

courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview f5 networks P

courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview f5 networks P courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview Business Continuity, Disaster Recovery and Data Center Consolidation IT managers today must be ready for the

More information

Analysis of Fire Statistics of China: Fire Frequency and Fatalities in Fires

Analysis of Fire Statistics of China: Fire Frequency and Fatalities in Fires Analysis of Fire Statistics of China: Fire Frequency and Fatalities in Fires FULIANG WANG, SHOUXIANG LU, and CHANGHAI LI State Key Laboratory of Fire Science University of Science and Technology of China

More information