secure Agent Secure Enterprise Solutions Remote Recovery from a Data Center Outage SecureAgent Software www.secureagent.com



Similar documents
The IDG 9074 Remote Access Controller

secure Agent Secure Enterprise Solutions

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

Database Backup and Recovery Guide

Mastering Disaster Recovery: Business Continuity and Virtualization Best Practices W H I T E P A P E R

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them

The LCO Group. Backup & Disaster Recovery. Protect your data. Protect your business.

What you need to know about cloud backup: your guide to cost, security and flexibility.

IBM i Version 7.2. Systems management Advanced job scheduler

Backup Tab. User Guide

MAXPRO. Cloud CLOUD HOSTED VIDEO SERVICES TO PROTECT YOUR BUSINESS. Video Anytime, Anywhere

No more nuisance phone calls! Internet Control Panel & Weblink Guide

Backup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases

Implementing and Supporting Windows Intune

User s Guide for Polycom CX7000 Systems

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments

F Cross-system event-driven scheduling. F Central console for managing your enterprise. F Automation for UNIX, Linux, and Windows servers

Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution

Windows Server Update Services 3.0 SP2 Step By Step Guide

Read this guide and you ll discover:

Remote control/problem resolution

Remote Control/Problem Resolution

LifeCyclePlus Version 1

THE. solution. STORe it. SHARE it.

Telephone Users Guide

White Paper FASTFILE / Page 1

ASF: Standards-based Systems Management. Providing remote access and manageability in OS-absent environments

Technical Brief High Availability Policy Server

Benefits of a Modern SCADA Protocol DNP3 vs Modbus

Top 10 Reasons for Using Disk-based Online Server Backup and Recovery

Windows Server 2003 migration: Your three-phase action plan to reach the finish line

Troubleshooting: 2 Solutions to Common Problems

Modern Manufacturing in the Cloud

Symantec Backup Exec.cloud

Universal Backup Device with

Windows BitLocker Drive Encryption Step-by-Step Guide

Trend Micro Hosted Security. Best Practice Guide

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA

The disaster recovery procedures started immediately. Services to IBM users were restored within 48 hours.

Could a Managed Services Agreement Save Your Company Tens of Thousands of Dollars Each Year?

Packaged Unified Communications Solution. The all-in-one integrated collaboration solution that s simple, scalable and affordable.

Our 24/7 Network Monitoring Services Keep Your Business Up & Running

How can I use the internet to make free calls?

IP Office: Simple, Powerful Communications for Small and Medium Size Businesses

The Smart Disaster Recovery Strategy for Your Workforce: Cloud-Hosted Desktops WHITE PAPER

User Guide. SafeNet MobilePASS for Windows Phone

Optimizing Your Database Performance the Easy Way

Simplify SSL Certificate Management Across the Enterprise

Online Backup Solution Features

Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution

Perforce Backup Strategy & Disaster Recovery at National Instruments

Welcome Guide for MP-1 Token for Microsoft Windows

Users Guide. FTP/400 File Transfer API and Remote Command Server Version By RJS Software Systems, Inc.

Unisys Internet Remote Support

The EVault Portfolio

PaperCut Payment Gateway Module - RBS WorldPay Quick Start Guide

Cloud Failover Appliance

Operations Manager Comprehensive, secure remote monitoring and management of your entire digital signage network infrastructure

Backups and Maintenance

W H I T E P A P E R. Reducing Server Total Cost of Ownership with VMware Virtualization Software

INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists

SUBARU STARLINK YOUR SUBARU CONNECTED Safety & Security OWNER S MANUAL. Love. It s what makes a Subaru, a Subaru. MY16StarlinkS&S_OMportrait.

Set Up Omni-Channel. Salesforce, Winter

Fault Tolerant Servers: The Choice for Continuous Availability

MAXPRO. Cloud CLOUD HOSTED VIDEO SERVICES TO PROTECT YOUR BUSINESS. Video Anytime, Anywhere

E-Series. NetApp E-Series Storage Systems Mirroring Feature Guide. NetApp, Inc. 495 East Java Drive Sunnyvale, CA U.S.

What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility

PCLaw Scheduled Backup

EVault Software. Course 361 Protecting Linux and UNIX with EVault

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

HOW SAFE IS YOUR DATA??

BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS. Disasters happen. Don t wait until it s too late.

Licensing for BarTender s Automation Editions. Understanding Printer-Based Licensing WHITE PAPER

Don't Wait Until It's Too Late: Choose Next-Generation Backup to Protect Your Business from Disaster

Providing a quality IT Support & Consultancy service in the South East

Printer Maestro. True Enterprise Print Management for Windows WHITE PAPER

Data Center Colocation - SLA

Transcription:

secure Agent Secure Enterprise Solutions SecureAgent Software Disaster Recovery Remote Recovery from a Data Center Outage SecureAgent Software 2448 E. 81 st St., Ste. 2000 Tulsa OK 74137-4271 USA Tel: 918.971.1600 Fax: 918.971.1623 www.secureagent.com

2008 by SecureAgent Software. All rights reserved. Printed in the United States of America The IDG 9074 Secure Communications Controller is protected by United States Patent number 6,578,146. SuperVision is protected by United States Patents numbered 5,592,657; 5,689,637; 6,275,855; and by others pending. SecureAgent, IDG 9074, and Secure Communications Controller are registered trademarks and may be used only with prior permission of SecureAgent Software. All other products, names, and services are trademarks, registered trademarks, or service marks of their respective companies. Companies, names, and data used in examples herein are fictitious unless otherwise noted. SecureAgent Software 2448 East 81 st Street, Suite 2000 Tulsa OK 74137-4271 USA Voice: 1.918.971.1600 Fax: 1.918.971.1623 Toll-Free: 888.746.7735 www.secureagent.com

Downtime Now More Expensive than Ever! Managing a data center has never been more challenging. Today s data center manager is tasked with being more productive with fewer resources, and the data center is often viewed as a cost center rather than as a profit source. So, it must offer efficient operations to the rest of the organization. In such a business environment, a traditional response to downtime leads to reduced productivity and staggering financial costs. Direct costs and lost revenue opportunities mount. Published statistics for various industries bear this out. Industry Sector Energy Telecommunications Manufacturing Financial Institutions Information Technology Insurance Retail Average Revenue Loss per Hour of Downtime $2.8 million $2.0 million $1.6 million $1.4 million $1.3 million $1.2 million $1.1 million Banking $996,000 Source: Meta Group (Gartner Inc.) This represents an average of over $1.25 million in lost revenue per hour of downtime for the industries listed nearly $21,000 per minute! With such losses, no company can afford to have its data center down for long. Downtime equals burning money! The Traditional Way By tradition, when unplanned downtime occurs, data center operators try to correct the problem. If that isn t possible, system support analysts are called. Even if they are on-site, they might not be brought in immediately. If they 2008 by SecureAgent Software 1

are off-site, further delays occur due to travel time. Meanwhile, those minutes keep ticking and money keeps burning. A Better Solution At an average of almost $21,000 of lost revenue per minute of downtime, it won t be long before upper management becomes concerned. There has to be a better way. That way incorporates hardware and software that help you recover from unexpected downtime more efficiently than with traditional practices. SecureAgent Software offers that better solution. Our family of patented IDG 9074 Secure Communications Controller hardware and SuperVision software offers features that help minimize or even prevent downtime, including: Secure Remote Access from anywhere in the world at any time. All data is encrypted and compressed. Our unique user authentication method ensures that passwords are never transmitted over the network. Easy remote configuration and diagnostics, including the ability to restrict individual users at the command level. Instant Replay View screen-by-screen playback of connected sessions, from local or remote locations. Automatic Network Recovery If a loss of network connectivity is detected, a switch is made immediately to an alternate network path. Automatic monitoring of host sessions and automated response to user-defined events and messages, as well as automatic notification of operations staff (including automated voice page). Easily customized through SecureAgent s extensions to the REXX language with the included Automation Rules Editor. 2008 by SecureAgent Software 2

A Scenario The figure below reflects a typical IDG 9074 installation for our customers. The following scenario is one that many of our customers have told us they ve experienced; it s told by the off-site support analyst on call. Imagine that this is happening at your data center: Time SecureAgent Solution IDG 9074 Family Traditional Solution IBM 3174 3:01 a.m. The phone rang me out of a sound sleep. The automated voice on the other end of the line (automatically generated as SuperVision scanned messages from the mainframe) said we had a problem. 3:04 a.m. Trying not to wake my spouse, I went into the room I use as a home office and sat down at the PC. The on-site operator notices a problem, and begins trying to determine its cause, but does not notify anyone. The on-site operator is still trying to determine what the problem is and its cause. 2008 by SecureAgent Software 3

Time SecureAgent Solution IDG 9074 Family Traditional Solution IBM 3174 I brought up SuperVision, which allowed me to see the on-site operator s terminal just as if I was in the data center, and connected to PROD1. While waiting for the connection to open, I called the Data Center and asked for the PROD1 operator. After logging in to PROD 1, I opened the Instant Replay window. It showed, line-by-line, what had been displayed on and been typed into the operator s console. As we talked, we could both look back through the events since midnight, when the on-site operator s shift had started. 3:10 a.m. And there it was the on-site operator a new employee had shut down JES accidentally, to be sure, but still shut it down. Not bad it had only taken six minutes to discover the problem. 3:20 a.m. As I talked to the operator about why shutting down JES was not a good thing to do, especially in the middle of the night, I also sent the senior data center personnel and our data center administrator an e-mail requesting that the new operator be restricted from shutting down JES. 3:25 a.m. From my laptop at home, I restarted JES, and looked at my watch. I said goodnight to a very embarrassed new operator, and went back to bed. The on-site operator decides to contact the off-site support analyst on call for assistance. The off-site support analyst decides that trying to figure out over the phone what the operator did is not working. He is going to have to go in to the data center. The off-site support analyst begins driving to the data center. 2008 by SecureAgent Software 4

Time SecureAgent Solution IDG 9074 Family Traditional Solution IBM 3174 4:05 a.m. Off-site support analyst is asleep The off-site support analyst arrives at the data center complex after 30 minutes (by itself equivalent to $630,000 in lost revenue). 4:10 a.m. Off-site support analyst is asleep The support analyst and the on-site operator begin working to solve the problem. 4:25 a.m. Off-site support analyst is asleep After discussing the on-site operator s actions, the support analyst guesses JES was accidentally shut down (though the operator won t admit it). 4:30 a.m. Off-site support analyst is asleep The support analyst then restarts JES. 5:10 a.m. Off-site support analyst is asleep The support analyst leaves the data center and arrives back home. 6:15 a.m. Off-site support analyst gets up to go back to work. 2:00 p.m. At the staff conference later that day, we looked at the various log files and discussed exactly what happened. We all agreed that Secure Remote Access and Instant Replay were critical to our prompt recovery. From now on, our policy is that new operators will not have access to commands that shut down JES. The support analyst gets ready to go back to work. Upper management calls a meeting to determine why the outage occurred, why it lasted so long, and who is responsible. Elapsed Time 24 minutes 1 hour, 29 minutes Average Cost (in lost revenue) $504,000 $1,869,000 2008 by SecureAgent Software 5

The Cost of Peace of Mind Secure Remote Access and Instant Replay are features needed for rapid offsite recovery. The cost of SecureAgent hardware and software depends on the features you need, but typically the initial cost is equivalent to between 1 and 5 minutes of downtime. What About Recovering from a Major Disaster? The scenario presented above describes a relatively common sort of problem, one that was easily resolved in a reasonably short time with limited resources. But what about more extensive problems such as natural disasters or terrorist attacks where the data center is completely disrupted or not accessible? One of SecureAgent s customers is a major financial services company. On September 11, 2001, they lost communication lines, had to evacuate their New York office, and were unable to get back into their data center. In less than an hour, they had moved to a temporary location, remotely connected to their mainframe using SecureAgent products, and were up and running again in minutes instead of hours or even days. Most of their clients never even knew a disruption had taken place. For Further Information We would be happy to discuss the details and advantages of SecureAgent solutions in light of your specific requirements. Please contact your SecureAgent representative at: SecureAgent Software 2448 East 81 st Street, Suite 2000 Tulsa OK 74137-4271 Voice: 918.971.1600 Fax: 918.971.1623 Toll-Free: 888.746.7735 www.secureagent.com 2008 by SecureAgent Software 6