Table of contents. Maintaining Continuity of Operations with a Disaster Tolerance Strategy

Similar documents
HP Data Protector software Zero Downtime Backup and Instant Recovery. Data sheet

HP Data Protector software Zero Downtime Backup and Instant Recovery

Business Continuity Planning in IT

Table of contents. Performance testing in Agile environments. Deliver quality software in less time. Business white paper

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Four

Bringing the edge to the data center a data protection strategy for small and midsize companies with remote offices. Business white paper

Why cloud backup? Top 10 reasons

Success or Failure? Your Keys to Business Continuity Planning. An Ingenuity Whitepaper

HP Data Protection. Business challenge: Resulting pain points: HP technology solutions:

Table of contents. Providing continuity for your key business processes. A white paper on HP s Business Continuity and Availability Solutions

Improving business continuity/disaster recovery, security, and operational efficiency with ERP and CRM systems

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments

HP StorageWorks Data Protection Strategy brief

Business Continuity Plan

HP Business Continuity Services. Is your business agile enough to respond to whatever comes your way?

HP Business Continuity and Availability with VMware. Create a resilient IT foundation for better business outcomes.

Desktop Scenario Self Assessment Exercise Page 1

Why Should Companies Take a Closer Look at Business Continuity Planning?

Brochure. Data Protector 9: Nine reasons to upgrade

Integrated Data Protection for VMware infrastructure

Top 7. Best Practices for Business Continuity

With 57% of small to medium-sized businesses (SMBs) having no formal disaster

Business Continuity and Disaster Recovery Planning from an Information Technology Perspective

DOWNTIME AND DATA LOSS? THE NTT COMMUNICATIONS DISASTER RECOVERY & BUSINESS CONTINUITY READINESS SURVEY

DISASTER RECOVERY PLANNING GUIDE

All Clouds Are Not Created Equal THE NEED FOR HIGH AVAILABILITY AND UPTIME

Synchronous Data Replication

University of Michigan Disaster Recovery / Business Continuity Administrative Information Systems 4/6/2004 1

Temple university. Auditing a business continuity management BCM. November, 2015

Cloud Computing: Myths and Realities. Viewpoint paper. the real value of Cloud to your organization

The Difference Between Disaster Recovery and Business Continuance

Business Continuity Management

Shankar Gawade VP IT INFRASTRUCTURE ENAM SECURITIES PVT. LTD.

Data Loss in a Virtual Environment An Emerging Problem

IBM PROTECTIER: FROM BACKUP TO RECOVERY

Business Continuity: Choosing the Right Technology Solution

Managing business risk

Virtualizing disaster recovery using cloud computing

Executive Brief Infor Cloverleaf High Availability. Downtime is not an option

Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it

Four Steps to Disaster Recovery and Business Continuity using iscsi

The case for cloud-based disaster recovery

Creating a Business Continuity Plan for your Health Center

GETTING STARTED WITH DISASTER RECOVERY PLANNING

EMC RECOVERPOINT: BUSINESS CONTINUITY FOR SAP ENVIRONMENTS ACROSS DISTANCE

IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity

Principles for BCM requirements for the Dutch financial sector and its providers.

Top 7 Best Practices for IT Service Continuity

Five Secrets to SQL Server Availability

Business Continuity Management

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Three

Business Continuity Planning Guide

the limits of your infrastructure. How to get the most out of virtualization

Disaster Recovery Strategies

Disaster Recovery and Business Continuity What Every Executive Needs to Know

Business Continuity Planning. Presentation and. Direction

Ensure Absolute Protection with Our Backup and Data Recovery Services. ds-inc.com (609)

High Availability is not a Luxury.

Business Continuity Management Governance. Frank Higgins Abu Dhabi March 2015

Federal Financial Institutions Examination Council FFIEC. Business Continuity Planning BCP MARCH 2003 MARCH 2008 IT EXAMINATION

better broadband Redundancy White Paper

Business Continuity Planning

Top 10 Disaster Recovery Pitfalls

HP Security Solutions for Microsoft

Unit Guide to Business Continuity/Resumption Planning

Chapter 1: An Overview of Emergency Preparedness and Business Continuity

Proactive Performance Management for Enterprise Databases

CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT

Everything You Need to Know About Network Failover

Best practices for fully automated disaster recovery of Microsoft SQL Server 2008 using HP Continuous Access EVA with Cluster Extension EVA

Boost your cloud success

HP Service Manager software

HP 3PAR storage technologies for desktop virtualization

Federal Financial Institutions Examination Council FFIEC BCP. Business Continuity Planning FEBRUARY 2015 IT EXAMINATION H ANDBOOK

Protecting your Enterprise

Disaster Recovery Planning

White Paper: Backup vs. Business Continuity. Backup vs. Business Continuity: Using RTO to Better Plan for Your Business

Beyond Disaster Recovery: Why Your Backup Plan Won t Work

Backup vs. Business Continuity: Using RTO to Better Plan for Your Business

Enable unified data protection

Audit of the Disaster Recovery Plan

NCUA LETTER TO CREDIT UNIONS

DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES

Solution brief. HP solutions for IT service management. Integration, automation, and the power of self-service IT

EMERGENCY PREPAREDNESS PLAN Business Continuity Plan

Optimize Application Performance and Enhance the Customer Experience

Total Business Continuity with Cyberoam High Availability

Table of Contents... 1

The Eight Dimensions of Customer Experience for Financial Services

Business white paper. Rethinking backup and recovery in the modern data center

BRIDGE. the gaps between IT, cloud service providers, and the business. IT service management for the cloud. Business white paper

Disaster Recovery Plan The Business Imperatives

Business Continuity and. Information Technology

FlyntGroup.com. Enterprise Risk Management and Business Impact Analysis: Understanding, Treating and Monitoring Risk

The One Essential Guide to Disaster Recovery: How to Ensure IT and Business Continuity

WHITE PAPER. The Double-Edged Sword of Virtualization:

Table of contents. Matching server virtualization with advanced storage virtualization

Maintaining Business Continuity with Disk-Based Backup and Recovery Solutions

IBM Software Information Management. Scaling strategies for mission-critical discovery and navigation applications

Transcription:

Maintaining Continuity of Operations with a Disaster Tolerance Strategy IT risks must now be considered as serious as any other significant business risk. Business white paper Table of contents Executive overview... 2 How much business risk can you afford?... 2 The cost of an IT outage... 3 The case for disaster-tolerant systems... 4 Benefits of disaster-tolerant systems... 4 Which services are at greatest risk?... 5 Implementing disaster-tolerant systems typical use cases... 6 Match your business recovery to your business risk... 8 For more information... 8

Executive overview Increasingly, business and IT risks are intertwined. In today s global 24x7 economy, organizations find themselves less tolerant of interruptions. Today, even a few hours of downtime constitutes a business disaster for some organizations. Conventional disaster recovery solutions do not work under these circumstances. Instead, many companies seek disaster-tolerant solutions to mitigate the business impact and business costs of such significant events. Companies implement disaster-tolerant solutions to keep business processes running right through a disruption and immediately after it. Companies practice disaster-tolerant solutions to continue business processes without any delay after a disruption. They want continuity of operations, and they achieve this by utilizing IT solutions that keep IT services running with secondary systems. These systems assume responsibility for the business, if the primary site is interrupted. Not all IT services need disaster tolerance. By assessing the business requirements, the cost of downtime for each application, and the business impact of its loss, executives can determine which applications have critical RTO and RPO objectives near zero (recovery time and recovery points), and hence need disaster tolerance solutions. How much business risk can you afford? Critical system disruptions are quite common. Very few of them are caused by natural disasters. Many are caused by internal IT failures or by common external events such as loss of power, fire, or flooding. In March 2007, both US Airways and Canada Revenue Agency experienced system disruptions. In June 2008, Amazon.com experienced an unplanned site outage. The direct users of the website faced system interruptions; however, international website and other service sites were not affected. The lesson is clear: system interruptions that significantly impact operations can happen to any organization at any time. Today, you cannot operate for long without access to your critical IT services and applications. As a result, business risks that impact IT directly and IT risks themselves must now be considered and treated like any significant business risk. Managing in this demanding environment forces organizations to become less tolerant of interruptions that once were acceptable. Today, for example, the loss of a customer call center for a few hours would constitute a disaster for many businesses. Today, IT system are critical for every organization not just for large global financial or telecommunications firms. As the industry analyst firm Enterprise Strategy Group (ESG) states: Companies are becoming increasingly dependent on a global economy. Many have established key technology in follow-the-sun modes that require 24x7 availability. In response, managers are turning to disaster-tolerant systems to mitigate IT business risk, when the business impact of site outages and business costs of downtime are large. 2

Figure 1. Average cost of downtime The loss of a critical system for even a few hours can cost thousands, even millions, of dollars. Average cost per hour of downtime ATM Fees Shipping Tele-ticketing Airline Catalog sales Home shopping IT downtime is business downtime. Up to 10 percent of business costs are IT downtime. The impact of downtime can be devastating. PPV Credit card Brokerage USD $1K $10K $100K $1,000K $10,000K Source: Contingency Planning Research, Inc.; a division of Eagle Rock Alliance, Ltd.; West Orange, NJ. The cost of an IT outage All business interruptions cost money. When a critical system is interrupted, the costs can mount fast. For example, downtime of a catalog e-commerce system could cost up to $100,000 USD an hour in lost sales; if the system processes credit card transactions, lost sales could exceed $1 million USD per hour (see Figure 1). Interruptions like these were the concern for a large Midwest healthcare provider, operating a network of almost two dozen healthcare facilities and affiliates and a primary care physician network with several hundred practitioners. One of its centralized systems provides online access for care providers at multiple facilities to patient care orders, medication information, dietary needs, and more. Given its tornado-alley location, this system clearly was at risk of being disrupted. In the event of a tornado, care providers would not be able to maintain the level of care required for their patients. Although disruptions related to tornadoes and other events are rare, management insisted on a disaster-tolerant system to make certain that it could continue to deliver the care its patients counted on. In the case of the Midwest healthcare organization, the risk was loss of life. For other businesses that do not face life-and-death scenarios, the major risks are no less real and critically important to the survival of the organization. Loss of revenue due to the inability to process transactions, for example, often is great, but there are other costs to consider as well. These include disruptions to internal systems that can have significant productivity impacts and costs relating to employees and partners. Performance penalties may be incurred due to service interruptions that impact service-level commitments. There is the potential loss of customers goodwill and negative publicity, which can impact brand and corporate reputation. There may be associated liabilities and financial penalties. And, for some organizations, even lives could be at stake. Costs of business interruptions vary by industry and by company. It also varies by system. If payroll goes down, the organization needs to recover within the cycle of its pay period. However, should key production systems go down, the revenue stream may stop immediately and not resume until the system is restored. Not only is the organization itself impacted, but suppliers, partners, regulators, customers, and other stakeholders may also be affected. Risks to systems such as these take many forms and managers need to assess and prioritize all of them. Not all business and IT risks are equal in the likelihood of their taking place or in their impact on the business. Hence, it is imperative to assess risks realistically, prioritizing around those with the highest probability of occurrence and those with the highest business impact. Then, you must allocate resources, based on what is at stake. By doing so, you can determine which systems need to be made disaster-tolerant and which systems can be protected through traditional recovery solutions. 3

The case for disaster-tolerant systems Market research shows that most, but not all, organizations practice some form of disaster recovery (DR). At a minimum, DR employs data protection and recovery solutions, often tape-based. In practice, DR for most organizations is more complicated than that. Most must be concerned not only with how quickly the data can be restored, but from where they can acquire the IT infrastructure to restore services. Not only is access to the backup data necessary, but also access to a site (owned or third party) with compatible IT infrastructure with which to resume IT services. DR is necessary and must be part of every organization s plans. Many organizations, however, augment conventional DR for mission-critical services with disaster-tolerant solutions. Disaster-tolerant systems differ from DR in that they allow the organization to continue functioning despite an interruption of its primary systems, thereby enabling continuity of business operations even while the disaster is taking place. They do so by turning over operational responsibilities to systems at the secondary site. These systems provide for more than the protection of data loss. You need to protect your ability to continue to deliver IT services despite and during a disaster or disruption. Disaster-tolerant systems continuously capture and save data from these primary systems for use by a backup system. The backup system continues delivering IT services in the event of a disruption. It does not matter if this results from a natural disaster, a major catastrophe such as a fire, an earthquake, or a terrorist attack, or a local event such as an extended power loss, an accident, or a human error. Where once only a small handful of global enterprises considered such disaster tolerance important, now, according to the ESG, Many more organizations of all sizes, in all industries, and located across the globe require applications to be running and data to be always available. The needs of these organizations go far beyond simple disaster recovery, requiring an environment that maintains business continuity during and immediately after a disaster. To make it more interesting, the number and types of applications that require this level of protection is very diverse. Which organizations need disaster-tolerant systems? Overall, the following types of organizations would need disaster-tolerant systems: Where the business costs of downtime are large Where the business impact of a site outage is large Where the investments in disaster-tolerant solutions are clearly smaller than the perceived business and IT risks Benefits of disaster-tolerant systems Disaster-tolerant systems reduce the business risk resulting from application downtime. This translates into financial savings and costs not incurred, because significant downtime and data loss is prevented. The decision to opt for disaster-tolerant systems comes down to a straightforward benefit assessment: the likelihood of risks taking place multiplied by the business costs should that risk occur, compared with the costs of investing in an appropriate recovery or disaster-tolerant solution. Given the declining costs of IT infrastructure, disaster-tolerant solutions can be justified easily for customers of all sizes and in all industries. Using Figure 2 (Balance risks and costs), managers can identify and prioritize the risks their organizations face. Then, using Figure 1 (Average cost of downtime) as a guide, they can estimate the amount of value at risk should an incident or event result in system or application downtime. Disaster-tolerant systems produce both direct and indirect benefits. Direct benefits, which can be translated into hard dollars, can quickly offset the cost of a disaster-tolerant system for many business-critical systems. Such benefits include: Mitigation of business risks relating to IT system interruption and data loss helping access to applications and data continue as normal through the interruption Reduction of any financial impact from business disruption enabling the continuity of revenuegenerating capabilities Maintenance of acceptable levels of productivity for production continuity Maintenance of expected and committed levels of service for customer business continuity, customer satisfaction, and compliance with service-level obligations 4

Figure 2. Balance risks and costs C O S T Acceptable downtime L O S S Spend more, lose less Money Maximum cost of control Spend less, lose more Time to recover (slow or fast) Data loss (high or low) Maintenance of supply chain continuity and consistency for avoiding disruptions in the supply chain Avoidance of legal, regulatory, and contractual compliance exposure Continuation of customer experience to prevent degradation of customer loyalty Protection of corporate reputation and brand integrity The indirect benefits may not be as dramatic, but they too can have long-term business impact, which also can be translated into hard dollars. These benefits include the ability to preserve the brand and company image, to avoid bad press and publicity, and to maintain the confidence of partners, suppliers, and other stakeholders. Which services are at greatest risk? Not every application requires disaster-tolerant systems. Managers must assess each application on the basis of the following business cost factors: Revenue risk loss of current or future revenue due to downtime or data loss Customer risk loss of customers or degradation of customer experience during a period of downtime or data loss Operational/Productivity risk loss of worker productivity and operational efficiency (automation) during a period of downtime or data loss Regulatory/Compliance risk inability to meet regulatory and compliance obligations due to data loss or during a period of downtime Legal and contractual risks inability to meet legal and contractual obligations during a period of downtime Clearly, businesses are at risk when IT is not operational. According to a 2007 ESG poll, 14 percent of enterprise businesses reported that they cannot tolerate any application downtime. More than 58 percent cannot tolerate even four hours of application downtime. Overall, more than 80 percent of enterprise-class and mid-tier respondents reported that they cannot tolerate more than 24 hours of application unavailability. Interestingly, ESG notes that survey respondents reporting low tolerance for downtime were not just from the financial sector, as might be expected, but were also from government, manufacturing, retail, and healthcare (including pharmaceutical) sectors. ESG looked at the level of tolerance for system downtime in various vertical industry segments and found the following: Retail The critical applications that handle pointof-sale data and enable inventory and distribution require applications that are always on. Being able to react quickly to changing conditions can mean the difference between profitability and loss. Online shopping and the customer s experience are also very important to retailers, making downtime unacceptable. Online commerce Similarly, B2B and B2C commerce requires 24x7 availability. As online commerce represents a larger proportion of a company s revenue, the need for disaster-tolerant commerce systems increases. System interruptions reduce revenue flow, reduce customer satisfaction, and risk driving customers to competitors who are just a click away. 5

Healthcare With the digitization of medical images and patient records, ensuring availability of these applications and files goes beyond mission-critical. Especially when you consider the pervasive use of technology in delivering critical patient care, disaster-tolerance can actually be driven by the need to save lives, not just save money. Manufacturing Competitive pressures drive companies to run as efficiently as possible. In particular, just-in-time (JIT) manufacturing processes that coordinate shipments from suppliers around the world demand 24x7 availability. Interruption of critical applications can throw off the precisely orchestrated timing of order/production/delivery with serious bottom-line ramifications. A number of factors are increasing the business risks relating to system downtime and driving the need for disaster-tolerant systems. Customer-touching services delivered through the call center or website rely completely on the availability of systems and data. If those systems are down or if data is unavailable, customer satisfaction is impacted and customers may move to competitors. The heightened business risks associated with system interruptions, according to industry analyst ESG, have made business continuity a boardroom-level concern. In many cases, it is the CEO who mandates that the business be fully protected. Even worse than an outage itself is the fallout from negative press, loss of customer confidence, and, for public companies, potential impact on stock prices. Implementing disaster-tolerant systems typical use cases Table 1 summarizes use cases that illustrate the role of disaster-tolerant systems in a business continuity and availability strategy. Developing a risk management plan that includes the right level of disaster tolerance for various applications is not a complicated challenge. You must understand the risks that matter to the business and the business impact (costs) of those risks. These may or may not include regional, city, or site-level risks, or may be limited to risks that only impact a specific data center. Following a risk assessment, a business impact analysis project determines your costs. Given your risks and costs, you can match business continuity and availability solutions to your specific requirements. 6

Table 1. Disaster-tolerant systems typical use cases Situation Challenge Disaster tolerance strategy Large manufacturing company Multiple locations SAP is core system Runs wide array of systems and applications to support other business functions Online commerce company Global B2B and B2C operation Centralized North American data center Major telecommunications company Maintains telephone call centers on three continents Major healthcare provider with centralized data center Delivers urgent and comprehensive healthcare services Supports a large network of physician practices and health centers Global operation precisely orchestrated 24x7 supply, production, business financials, and business intelligence Need for continuous access to SAP applications and data Maintain 24x7 e-commerce operations, 365 days a year for B2B and B2C operations Maintain 24x7 online support operation for B2B and B2C operations To enable 24x7 support Balance call center workload across all call centers at peak times Enable one call center to back up the other Make sure all customer data is available to all call center agents To make sure all systems that impact the delivery of urgent, critical care do not go down Reduce duration of interruptions for non-urgent and non-critical applications and systems Deploy SAP on primary and secondary disaster-tolerant systems at two locations Capture data on primary system and copy it concurrently to secondary system In the event of failure at primary site, failover immediately to secondary site Implement conventional DR strategy for other systems and applications Deploy B2B and B2C e-commerce systems on primary and secondary disaster-tolerant systems Establish a remote facility for the secondary data center site In the event of a failure at the central data center, immediately fail-over to the secondary site to enable non-interrupted commerce Deploy call center systems and master customer data at all three locations on disaster-tolerant systems Continuously replicate data between systems Monitor and rebalance the workload in the event any call center is overloaded or down Establish a secondary data center to provide an alternative to the primary data center Deploy all urgent and critical applications on disaster-tolerant systems to reduce downtime For other systems, deploy DR systems with fast recovery point and recovery time objectives to reduce disruptions 7

Match your business recovery to your business risk When the business risk is great when seconds, minutes, and hours count conventional DR systems are simply not fast enough. In the time it takes to recover, revenue and customers can be lost, critical supply chains disrupted, contractual and regulatory obligations jeopardized, and even lives put at risk. Therefore, some business risks require foolproof systems systems that can almost instantly transfer services to the secondary site without missing a beat, even if they are instantaneously disrupted without warning. This was exactly the disaster tolerance scenario HP recently set up in a test observed by ESG. In this test, HP dramatically engineered a true disaster by physically blowing up a primary data center (simulating a natural gas explosion), which interrupted operations instantly a worst-case scenario for IT operations. Yet, the HP disaster-tolerant solution worked flawlessly, without loss of data or services. For more information about this disaster simulation, go to www.hp.com/go/disasterproof Not every application needs this level of disaster tolerance, but you might. When was the last time you truly assessed your business risks or the business impact of those risk events and then matched your current recovery time to costs to determine if your business was adequately protected or not? You might be surprised, and you might discover a need to build disaster tolerance into your plans. Business risks of system downtime Lost revenue Unanticipated costs Lost customers Reduced levels of customer satisfaction Negative impact on brand and reputation Reduced employee productivity Penalty clauses in customer agreements Exposure to legal risks Going out of business Potential threat to human health and safety To determine your needs and requirements, call HP and let us work with you to conduct a business risk and business impact analysis. Or, if you already know you need more protection than you currently have, we can help make your current environment more resilient and even disaster-tolerant, if that is what you need. We can help you align your IT environment to your business needs today and into the future. For more information To learn more, please visit www.hp.com/go/continuityandavailability Share with colleagues Get connected www.hp.com/go/getconnected Get the insider view on tech trends, alerts, and HP solutions for better business outcomes Copyright 2007, 2009 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. 4AA1-6439ENW, Created November 2007; Updated July 2010, Rev. 2