White Paper. Augmenting Remote Access for Company-Wide Business Continuity Array Business Continuity Planning

Similar documents
Deployment Guide Sept-2014 rev. a. Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2

Deployment Guide Mar-2016 rev. a. Integrating the Array Standalone Client with RSA Token Automation

DesktopDirect. White Paper. Tablet Access to Business Applications

Acceleration Performance Tests for IBM Rational ClearTeam Explorer

Deployment Guide July-2014 rev. a. Deploying Array Networks APV Series Application Delivery Controllers with Oracle WebLogic 12c

Deployment Guide Sept-2014 rev. a. Load Balancing Windows Terminal Server with Session Directory Using Array APV Series ADCs

Array Networks & Microsoft Exchange Server 2010

Get Control of Your Data Center. Application Delivery Controllers

Cloud Agility with Performance

Deployment Guide July-2014 rev. a. Deploying Array Networks APV Series Application Delivery Controllers for Microsoft Lync Server 2013

white paper Using Cloud for Data Storage and Backup By Aaron Goldberg Principal Analyst, Content4IT

Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its

Moving to the Cloud: What Every CIO Should Know

Deployment Guide May-2015 rev. a. APV Oracle PeopleSoft Enterprise 9 Deployment Guide

Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace

Global Server Load Balancing

BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS. Disasters happen. Don t wait until it s too late.

Disaster Recovery Strategies: Business Continuity through Remote Backup Replication

Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution

Application Delivery as an Infrastructure Service Guaranteed Performance in Shared Environments

Mobile Data Security Essentials for Your Changing, Growing Workforce

Secure Virtual Assist/ Access/Meeting

Cloud computing is a way of delivering IT services to users without the need to buy, install or manage any infrastructure.

How To Get Cloud Computing For A Fraction Of The Cost

Intacore Managed IT Services

Market Application Delivery Networking. Products ADC, WAN Optimization, Secure Access

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments

KEEPING PEOPLE CONNECTED AND PRODUCTIVE ANYTIME, ANYWHERE, ON ANY DEVICE

Meeting the Challenges of Remote Data Protection: Requirements and Best Practices

SA Series SSL VPN Virtual Appliances

Moving beyond tape backup.

How would lost data impact your business? What you don t know could hurt you. NETWORK ATTACHED STORAGE FOR SMALL BUSINESS

VoIP Deployment Options

How To Use Mitel Micollab

How can I deploy a comprehensive business continuity and disaster recovery solution in under 24 hours without incurring any capital costs?

Top 10 Reasons for Using Disk-based Online Server Backup and Recovery

SAAS VS. ON-PREMISE SECURITY. Why Software-as-a-Service Is a Better Choice for and Web Threat Management

2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business

The Remote Access Imperative in Disaster Recovery

Reducing Total Cost of Ownership through Outsourced Hosted Virtual Desktops

MITEL MiCOLLAB KEEPING PEOPLE CONNECTED AND PRODUCTIVE ANYTIME, ANYWHERE, ON ANY DEVICE KEY BENEFITS

Collaboration solutions for midsized businesses Buyer s guide

White Paper. SSL vs. IPSec. Streamlining Site-to-Site VPN Deployments

WhitePaper. Private Cloud Computing Essentials

How to Select the Right Remote Support Tool

Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems

Make technology your business advantage

Why Consider Cloud-Based Applications?

Desktop virtualization for all

Remote Infrastructure Management Emergence of the Cloud-based Helpdesk

How To Use Windows Small Business Server 2011 Essentials

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Navigating The Cloud: A Primer For Understanding Cloud Computing. White Paper: 2012

Giving Voice to the Virtual Desktop. A Mitel and VMware White Paper

Proven LANDesk Solutions

Server-Hosted Virtual Desktop Infrastructure (VDI)

Hitachi Cloud Services for Private File Tiering. Low Risk Cloud at Your Own Pace. The Hitachi Vision on Cloud

SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery

Datosphere Platform Product Brief

MERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable

Is your business still wasting time and money on PCs and Servers?

Preemptive security solutions for healthcare

Top 10 Reasons Enterprises are Moving Security to the Cloud

White Paper FASTFILE / Page 1

Reasons Enterprises. Prefer Juniper Wireless

Deployment Guide Jan-2016 rev. a. Deploying Array Networks APV Series Application Delivery Controllers with Oracle WebLogic 12c

Cloud Backup and Recovery for Endpoint Devices

How to Select the Right Remote Support Tool:

LOW RISK ADOPTION OF CLOUD INFRA- STRUCTURE FOR ENTERPRISES

Deployment Guide July-2015 rev. A. Deploying Array Networks APV Series Application Delivery Controllers with VMware Horizon View

How to Turn the Promise of the Cloud into an Operational Reality

Breaking the Storage Array Lifecycle with Cloud Storage

Supply Chain Management Build Connections

Windows 10 Impact on IT departments and how to eliminate costly migration issues for Enterprises

Removable Media Best Practices

RSA Solution Brief. RSA & Juniper Networks Securing Remote Access with SSL VPNs and Strong Authentication. RSA Solution Brief

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise. Introduction.

PRODUCTS & TECHNOLOGY

Disaster Recovery for Small Businesses

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

The Power Of Managed Services. Features

Why cloud backup? Top 10 reasons

Barracuda Backup for Managed Services Providers Barracuda makes it easy and profitable. White Paper

Beyond Mobile Device Security: Why Comprehensive Endpoint Security and Management is a Must-Have for Small and Medium Enterprises

10 Tips. to Safeguard and Protect Business Continuity. Weatherize Your Business for the Elements

Desktop virtualization for all

10 steps to the Cloud for SMBs Introduction to Cloud computing. Ask the Experts. Making Business Work Better Online

The Changing Dynamics of Mobility in the Workplace

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

SEVEN REASONS TO CONSIDER ERP IN THE CLOUD SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND

UBISTOR WHITE PAPER: NAVIGATING THE ROAD TO THE CLOUD

The Business Benefits of Logging

MAXIMUM PROTECTION, MINIMUM DOWNTIME

BACKUP IS DEAD: Introducing the Data Protection Lifecycle, a new paradigm for data protection and recovery WHITE PAPER

Let s Build a Better Backup

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Transcription:

Augmenting Remote Access for Company-Wide Business Continuity Array Business Continuity Planning

Table of Contents White Paper Contents Introduction 3 Considering the Risks 3 Maintaining Compliance 4 Competitive Pressure 4 The Enterprise Workforce 4 Remote Access Options for Non-Mobile Workers 5 Remote Desktop Access for Non-Mobile Workers 6 Zero Service Interruption 6 Meeting BCP Challenges with Array Networks 7 Security 7 Cost 7 Productivity 8 Return on Investment 8 Meeting BCP Challenges with Array Networks 8 Conclusion 9 About Array Networks 10 2

Introduction Unexpected business disruptions take many shapes and forms, spanning minor events to extreme disasters. Inclement weather, labor actions, cyberattacks, or public health issues no matter the nature of disruptions, they all have potential to prevent employees from getting to their places of work. Dealing with such disruptions requires proper Business Continuity Planning, or BCP, to avoid losses to productivity or revenue. Proper BCP must include detailed remote access plans. Traditional VPN solutions provide business continuity for the mobile workforce (road warriors and home office employees), but there is not always time or budget to scale existing remote access solutions for the nonmobile workforce (in-office employees). More significantly, existing remote access solutions are not necessarily the right answer for the nonmobile workforce, who make up the bulk of the corporate employee base. Traditional VPNs, designed and built to support mobile employees, do not provide the same level of security, cost-effectiveness, and productivity gains for non-mobile employees. In order to understand why traditional VPNs are not an ideal BCP remote access augmentation strategy for non-mobile employees, we must consider the nature of disruptive events themselves, the enterprise workforce as a whole and its constituents, and the critical deployment criteria that should be examined when evaluating a solution. The most critical success factor to any business continuity plan is a fast re-establishment of business processes, according to Gartner analyst John Girard s paper 1, Ten Remote-Access Failures Your Company Could Avoid in Emergency. However, if your disaster recovery plans do not include remoteaccess coordination steps, no amount of cool technology will save your operations. Considering the Risks By the time disruptive events occur, it s too late to implement a business continuity solution. The end result is lost productivity and revenue. For example, during the two week-long strikes by Bay Area Rapid Transit workers in 2013, the Bay Area Council estimated economic costs 2 to the San Francisco Bay Area were conservatively $73 million a day. A few years prior, the Great Eastern Japan Earthquake and subsequent tsunami was another significant case of extreme disruption, death and devastation, displacing thousands of businesses throughout the entire area for months and causing undetermined amounts of lost revenue and productive time throughout the country. Another potentially major threat to business continuity is the H1N1 flu virus, more commonly referred to as Swine Flu. While the pandemic of 2009-2010 was declared ended by the World Health Organization, four separate, relatively localized outbreaks have occurred since then. Minor disruptive events also have the potential to prevent employees from getting to their workplace. These include snowstorms, electrical storms and power outages, flooding, wildfires, health alerts, and transit strikes, among others. During the transit strikes of London in 2009, Singapore in 2012, Paraguay 3

in 2013, and Rio de Janeiro in 2014, hundreds of thousands of business commuters lost access to buses and trains for days, causing unrecoverable business disruption to respective local economies. A great percentage of these losses could have been avoided with proper BCP implementations that account for the possibility that the employees throughout the entire company might need to work remotely. Even a cursory look at such negative impact on the bottom line makes it clear that BCP must be dealt with proactively, and not in a reactionary manner without a protective measure in place, businesses will inevitably lose countless hours of productivity and significant revenue. Maintaining Compliance Regulatory compliance and government mandates require many companies to have secure, auditable access to key information, even during unanticipated events. Requirements like Sarbanes-Oxley, HIPAA and others still apply, even if an organization is working under less than ideal conditions. Consider a health insurance provider that suffers a business disruption that forces key employees to work from home. Should any of those employees access sensitive data that falls under HIPAA regulations, the company must be able to prove those employees were authorized to do so, and demonstrate that data leakage prevention mechanisms exist. While such audit trails and safeguards may be in place at the headquarters office, companies also need to ensure they apply to employees who access the data remotely. Compliance is one reason government agencies are mandating that the private sector organizations with whom they do business be able to demonstrate they have credible BCP implementations. Competitive Pressure No company can afford to let inclement weather inhibit its ability to respond to customers, suppliers and other partners. For example, if a sudden snowstorm should rage on for days, unaffected competitors will likely capitalize on the affected company s lost momentum. Without a BCP implementation that automatically, securely, and cost-effectively accommodates surges in usage, companies may find themselves expending unnecessary cycles and resources to play mere catch-up. The greatest challenge when an unexpected event occurs is to find a trustworthy, proven BCP augmentation solution that not only enables remote productivity while satisfying the full set of requirements for the employee base, IT, and the corporation as a larger entity; but to also find a solution that addresses sudden usage bursts in a way that cost-effectively leverages existing hardware investments, and requires no additional effort to implement. The Enterprise Workforce The corporate body consists of two main types of employees. The first type is the mobile worker, for whom traditional VPN technology solutions were developed. Mobile workers, also referred to as road warriors or remote employees, typically have corporate-issued laptops or PCs, and are accustomed to WAN speeds. Additionally, mobile workers typically access company resources from remote locations on a regular, daily basis. Mobile workers, however, typically only make up a small fraction of the 4

corporate employee base. For the mobile workforce, existing VPN solutions already provide an adequate solution for ensuring business continuity during disruptive events. The second type of employee is the non-mobile worker. Non-mobile workers are situated in the office during the workday, and sit at their desktop PCs. When non-mobile workers are away from the office, they use non-corporate PCs, and when using office applications, they are accustomed to the quality of user experience provided by the corporate network they are used to LAN speeds. Because nonmobile workers do not have VPN accounts for remote access, they have no experience with remotely accessing corporate resources. Thus, non-mobile workers have very different remote access requirements than mobile workers, especially in the areas of security/compliance, quality of user experience, and training needs. Remote Access Options for Non-Mobile Workers The two most seemingly straightforward options for remotely connecting non-mobile workers both involve traditional VPN solutions. Option 1 involves enabling the non-mobile workforce to connect to traditional VPN solutions from their personal devices. However, this opens up a host of problems associated with security/compliance, application availability, quality of experience, and ease of use all areas that are critical for the remote user to be productive. For example, non-mobile workers attempting to connect via VPN could add security risks to the network. Thus, non-corporate PCs are unlikely to comply to corporate policies and may not gain network access. There are other issues with using non-corporate PCs. Non-corporate PCs won t always have the right desktop applications, and getting these applications installed remotely would cost significantly in licenses and helpdesk support. From a quality of experience perspective, non-mobile workers accustomed to LAN speeds could get frustrated and give up trying to work remotely over the WAN. Additionally, non-mobile workers lack of experience with VPN solutions would require significant training and support to overcome login and navigation problems. Option 2 involves traditional VPN connectivity from corporate-issued laptops. However, the security risks and costs associated with laptop deployment and support are significant. First and foremost, there is the unnecessary increase in risk of theft or leakage of sensitive employee or financial data that results from laptop deployment. On average, 10,000 laptops per week 3 are lost in US airports, and the annual average cost of data leakage in the United States in 2013 was $5.4 million per organization 4. 5

In addition to the added security risks of laptops, there are the same quality of experience issues as in Option 1, the high TCO per laptop user, and much higher training and support costs associated with traditional VPN deployment. Furthermore, because non-mobile workers make up the bulk of the employee user base, IT must be highly conscientious about the scaling impact when evaluating remote access augmentation strategies for company-wide business continuity. Remote Desktop Access for Non-Mobile Workers A 3rd option for non-mobile workers involves innovative use of standard Remote Desktop Control (RDC) technologies. This concept, known as Remote Desktop Access (RDA), is ideal for non-mobile workers from all critical perspectives -- security, cost, and productivity. RDA provides effortless extension of the compliance already established on remote desktops, and data sources are maintained in corporate offices, eliminating security risks. RDA is implemented with existing technologies, no additional laptops or licenses are needed, and RDA eliminates the need for IT to support multiple application environments per user. From a productivity perspective, RDA enables non-mobile users to work from anywhere, as if in the office, and provides immediate productivity without the need to duplicate application environments. In reality, there are challenges associated with RDA. The huge number of non-mobile workers, who are typically non-technical, demands centralized control, scalability, the need for easy deployment, and an extremely intuitive solution to avoid significantly higher training and support levels. There is also a need to avoid data leakage risk, which is amplified by the large scale of users, and since RDA accesses desktop PCs, there is a need to ensure all users can access their PCs even when they are shut down. Thus, it s a balancing act security, cost, and productivity. The ideal RDA solution will not require any compromises between these three areas. Zero Service Interruption In addition to an ideal RDA component, a proper BCP solution must be able to work without IT help of any kind. That means the business continuity plan will not rely on employees being able to reach the IT department when a disruptive event occurs. And the plan will not assume that workers or IT will be able to add any additional hardware that may be required. To be truly effective, the business continuity plan must provide the capacity and performance required with no IT intervention, and no downtime. 6

Meeting BCP Challenges with Array Networks DesktopDirect from Array Networks is the only complete BCP remote access solution for nonmobile workers. DesktopDirect provides simple, secure access to Microsoft desktop environments. DesktopDirect s ease of use and straightforward, premise-based architecture make it an ideal BCP solution for the non-mobile workforce. DesktopDirect alone meets all BCP requirements without compromises: Security DesktopDirect features enterprise-class security capabilities that make it ideal for BCP. These include industry-standard 256-bit AES encryption, FIPS compliance, integration with existing AAA architectures, real-time session control, and data leakage protection. DesktopDirect fully extends desktop compliance. DesktopDirect is an on-premise hardware appliance with administrator-configurable data leakage protection, which enables administrators to provide business continuity for every nonmobile worker, without introducing new attack opportunities. Cost DesktopDirect is the most cost-effective BCP solution available today, as it relies mostly on existing infrastructure (existing desktop PCs), and uniquely provides power management capabilities to conserve power consumption and deliver benefits in an eco-friendly manner. DesktopDirect s streamlined architecture and intuitive user experience makes it painless to deploy and easy to support, eliminating costly setup time and high training costs. Packaged as a hardware appliance, DesktopDirect delivers ROI in under a year, and enables a highly scalable architecture for the entire global non-mobile workforce, supporting up to 64,000 concurrent users on a single platform. 7

Productivity DesktopDirect Power Management boots up even powered-down desktop PCs, enabling non-mobile workers to access their familiar office desktop PC environment without having to remember to leave their PCs on at the end of the day. This is critical for BCP, as there is often no way to predict when the next snowstorm or other disruptive event will suddenly occur. DesktopDirect delivers full application transparency in a highly available clustered hardware platform, providing the industry s most consistently high quality of experience available today. DesktopDirect s extremely intuitive click and work login process with Single Sign-On (SSO) eliminates the need for training, even for the most non-technical user. Return on Investment Return on Investment is a key measure of success for any IT investment, and with DesktopDirect, return on investment can be seen in as little as six months. During a recent snowstorm in the Northeast, a global top-7 financial services company used DesktopDirect to provide secure remote access to 12,000 non-mobile employees. At an average productivity of $2,400 per employee per day our customer prevented the loss of over $10 million dollars of productivity with no disruption to client services. Meeting BCP Challenges with Array Networks The Array Business Continuity (ABC) Pre-Paid License means customers always benefit from zero service interruption in the event of an emergency. The ABC Pre-Paid License enables additional users, beyond those covered under the day-to-day concurrent user license, to log in as needed, in some cases without any phone calls or other actions on the part of IT. Each ABC Pre-Paid License provides ten non-consecutive days of bursting capability. Customers predetermine the number of additional concurrent workers they will need to support in an emergency, and purchase an ABC Pre-Paid License that enables the DesktopDirect device to allow bursting, up to that pre-determined number of workers. In the event of an emergency, users log on seamlessly, immediately access their office desktop PCs, and get to work. For each day that bursting occurs, the remaining balance on the ABC Pre-Paid License decreases by one day. Because the ABC Pre-Paid License is loaded on the DesktopDirect hardware at the time of purchase or via upgrade, bursting is automatic when needed, without any IT intervention required. 8

Conclusion Coupled with the ABC Pre-Paid License, Array DesktopDirect delivers the industry s only comprehensive BCP solution for augmenting existing VPN remote access. DesktopDirect is the only Remote Desktop Access solution that enables non-mobile workers to immediately get to work during disruptive events, without forcing compromises on IT or the corporation as a whole. DesktopDirect s security capabilities protect data, users, and corporate resources, ensuring that providing BCP for the entire organization will not cause any new security risks. DesktopDirect s cost-effectiveness makes it the ideal BCP solution for organizations that have concerns with remaining eco-friendly and easily maintaining a complete BCP architecture for the entire organization as it scales. DesktopDirect s extremely intuitive click and work login process ensures immediate productivity for everyone in the entire organization, regardless of location or technical expertise. Array Business Continuity eliminates the need to react to disruptive events, delivering a smooth transition into and out of emergency situations so there are minimal losses in productivity or revenue. Sources 1. Girard, John; Ten Remote-Access Failures Your Company Could Avoid in Emergency, Gartner. 2. Bay Area Council Economic Institute Puts Economic Cost of BART Strike at $73 Million A Day, Bay Area Council, July, 2013 3. AirportLostAndFound.com 4. Ponemon Institute 9

About Array Networks Array Networks is a global leader in application delivery networking with over 5000 worldwide customer deployments. Powered by award-winning SpeedCore software, Array application delivery, WAN optimization and secure access solutions are recognized by leading enterprise, service provider and public sector organizations for unmatched performance and total value of ownership. Array is headquartered in Silicon Valley, is backed by over 300 employees worldwide and is a profitable company with strong investors, management and revenue growth. Poised to capitalize on explosive growth in the areas of mobile and cloud computing, analysts and thought leaders including Deloitte, IDC and Frost & Sullivan have recognized Array Networks for its technical innovation, operational excellence and market opportunity. Corporate Headquarters info@arraynetworks.com 408-240-8700 1 866 MY-ARRAY www.arraynetworks.com EMEA rschmit@arraynetworks.com +32 2 6336382 China support@ arraynetworks.com.cn +010-84446688 France and North Africa infosfrance@ arraynetworks.com +33 (6) 07 511 868 India isales@arraynetworks.com +91-080-41329296 Japan sales-japan@ arraynetworks.com +81-45-664-6116 To purchase Array Networks Solutions, please contact your Array Networks representative at 1-866 MY-ARRAY (692-7729) or authorized reseller. May-2014 rev. a 2014 Array Networks, Inc. All rights reserved. Array Networks, the Array Networks logo and DesktopDirect are all trademarks of Array Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Array Networks assumes no responsibility for any inaccuracies in this document. Array Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. 10