Why and What are Data Movement Solutions for Continuous Business Roselinda R. Schulman, CBCP Worldwide Sales Storage Support.

Slides:



Advertisements
Similar presentations
1 The Basics of Business Continuity Presented by Mary F. Sandy, CBCP Business Continuity/Disaster Recovery Class DePaul University ©Mary F. Sandy, 2006.
Advertisements

Building the business case for Business Continuity Justin Davey Senior Consultant CA.
© 2014 Vicom Infinity Storage System High-Availability & Disaster Recovery Overview [638] John Wolfgang Enterprise Storage Architecture & Services
Case Study: Business Continuity Planning for Site- Level Disaster Kimberley A. Pyles Northrop Grumman Corporation
SQL Server Disaster Recovery Chris Shaw Sr. SQL Server DBA, Xtivia Inc.
Maximizing Uptime and Your Firm's Bottom Line: Understanding risk and budget when evaluating business continuity & disaster recovery protocols Michael.
Module – 9 Introduction to Business continuity
Business Continuity Section 3(chapter 8) BC:ISMDR:BEIT:VIII:chap8:Madhu N PIIT1.
VERITAS Confidential Disaster Recovery – Beyond Backup Jason Phippen – Director Product and Solutions Marketing, EMEA.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
Revision from last week  Assumptions are potential failure points in a project. They need to be monitored and managed. At the start of the project they.
1 Disaster Recovery “Protecting City Data” Ron Bergman First Deputy Commissioner Gregory Neuhaus Assistant Commissioner THE CITY OF NEW YORK.
JOELLE QUIAPO FOLA OYEDIRAN GREG SWENSON SUKHI BEDI CHENYU GONG Disaster Recovery and Business Continuity Planning: Testing an Organization’s Plans What.
© 2009 EMC Corporation. All rights reserved. Introduction to Business Continuity Module 3.1.
High Availability Group 08: Võ Đức Vĩnh Nguyễn Quang Vũ
Business Continuity The Business of Keeping A Business Running John Dooly Senior Analyst CEMA Region Prague, Czech Republic.
© 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Data protection and disaster recovery.
1 Disk Based Disaster Recovery & Data Replication Solutions Gavin Cole Storage Consultant SEE.
Oracle Data Guard Ensuring Disaster Recovery for Enterprise Data
Disaster Recovery in IT David Irakiza CSC 585-High Availability and Performance Computing 2012.
FlareCo Ltd ALTER DATABASE AdventureWorks SET PARTNER FORCE_SERVICE_ALLOW_DATA_LOSS Slide 1.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Determining BC/DR Methods Recovery Time Objective – (RTO) Time needed to recover from a disaster How long can you afford to be without your systems Recovery.
Our Technology Comes with People Disaster Recovery Planning Glenn Lytle, Vice President Sales, Lumos Networks July 28,
1 © Copyright 2010 EMC Corporation. All rights reserved. EMC RecoverPoint/Cluster Enabler for Microsoft Failover Cluster.
SYSchange for z/OS By Pristine Software April 2009 Thomas Phillips April 2009 SYSchange Pristine Software.
Disaster Prevention and Recovery Presented By: Sean Snodgrass and Theodore Smith.
1© Copyright 2011 EMC Corporation. All rights reserved. EMC RECOVERPOINT/ CLUSTER ENABLER FOR MICROSOFT FAILOVER CLUSTER.
Saving Your Business from a Data Loss Randy Clark.
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
Gulf Coast Energy International Business Continuity / Disaster Recovery Planning and Design Proposal Prepared by Andrew Rolf, Felipe Torres, Pranay Jaiswal.
National Manager Database Services
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
IBM TotalStorage ® IBM logo must not be moved, added to, or altered in any way. © 2007 IBM Corporation Break through with IBM TotalStorage Business Continuity.
Disaster Recovery as a Cloud Service Chao Liu SUNY Buffalo Computer Science.
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
IT Business Continuity Briefing March 3,  Incident Overview  Improving the power posture of the Primary Data Center  STAGEnet Redundancy  Telephone.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
IS 380.  Provides detailed procedures to keep the business running and minimize loss of life and money  Identifies emergency response procedures  Identifies.
ISA 562 Internet Security Theory & Practice
DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection.
David N. Wozei Systems Administrator, IT Auditor.
CREATE THE DIFFERENCE Back ups and Recovery Janet Francis/Geoff Leese January 2010.
Business Continuity & Disaster recovery
Wayne Hogan National Storage Manager Sun Microsystems of Canada, Inc.
1 Availability Policy (slides from Clement Chen and Craig Lewis)
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Co-location Sites for Business Continuity and Disaster Recovery Peter Lesser (212) Peter Lesser (212) Kraft.
Protect and Recover Presented by:Toby Bishop, Senior UK Account Manager Date:Friday, 09 October 2015Friday, 09 October 2015Friday, 09.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Storage 101: Bringing Up SAN Garry Moreau Senior Staff Alliance Consultant Ciena Communications (763)
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
Introduction Journal Analysis and Optimization Journaling Uses and Benefits Understanding Costs and Implications Ongoing Management and Administration.
Your business runs even when your server doesn’t DR Recommendation November 2011.
Phases of BCP The BCP process can be divided into the following life cycle phases: Creation of a business continuity and disaster recovery policy. Business.
Remote Data Mirroring Solutions for High Availability David Arrigo EMC Corporation
DISASTER RECOVERY PLAN By: Matthew Morrow. WHAT HAPPENS WHEN A DISASTER OCCURS  What happens to a business during a disaster?  What steps does a business.
가상화 기반의 Workload 관리솔루션 : FORGE PlateSpin Virtualization and Workload Management 나영관 한국노벨 /
Database recovery contd…
Planning for Application Recovery
CompTIA Security+ Study Guide (SY0-401)
Providing Application High Availability
Determining BC/DR Methods
Maximum Availability Architecture Enterprise Technology Centre.
Processing Integrity and Availability Controls
Disaster Recovery Services
Using the Cloud for Backup, Archiving & Disaster Recovery
Presentation transcript:

Why and What are Data Movement Solutions for Continuous Business Roselinda R. Schulman, CBCP Worldwide Sales Storage Support

What is Business Continuity? Continuous Business = Staying in Business –Business Continuity Planning is what companies do to ensure that they can continue operations in the face of planned and unplanned ‘events’. –Provisions for business continuity are driven by an understanding of… Business impact: assessing the impact of ensuring continuous business Business processes/risks: assessing the frequency and/or likelihood of planned and unplanned events Data/availability protection is only one part of business continuity (don’t forget about business- critical processes, logistics, recovery execution plans, etc)

The DR Dynamics of Change The early 1990s the best companies expected to recover their business operations in three days to within 24hrs of the disaster Between 1997 and 2000 the best companies expected to recover within 24hrs with minimal loss of data at the point of disaster The internet driven world has changed all this.. The best companies need to have near zero recovery times with no data loss….

WTC Bombing Fact - When the world Trade Centre was bombed in 1993 with relatively minor damage 150 companies went out of business….

What is expected from your business If your business does not meet these expectations… –Financial loss will occur - $100K minimum per hour –Potential Asset loss - Information –Liability - Suppliers, Customers and Regulators –Customer Loss –Brand Name or Reputation damage –Investor/Stock Market confidence loss…. Not all these can be measured financially but all will have an effect on the companies bottom line….

Cost of Downtime by Industry Sector Source: Meta Group, 10/2000

Other Considerations Its not just Incidents on the scale of September 11th that can impact your business…. –ASX - Australian Stock Exchange - Failed Software Upgrade - 2 Hrs –Virus Attacks Yahoo eBay CCN AOL –London Stock Exchange - Human Error - Online trading system down all day

Your critical data needs to be protected from: Human error or sabotage –Feb ‘00 - DDoS attacks against eBay, Amazon and Yahoo Data corruption Hardware failures –Sept 00’- Power Outage at an airlines main operations centre played havoc with computers that control air traffic, delaying or affecting flights across the US. Software glitches Advanced Notice (Planned) Outages Sudden (Rolling) Disasters Lingering (Duration) Outages

Terminology Risk Analysis –Identification of threats Business Impact Analysis –Establish Value, identify critical resources, establish priority Recovery Time Objective –Time within which Business Functions or Applications must be restored. Includes time before disaster declared and time to perform tasks Recovery Point Objective –The Point in time to which data must be restored to successfully resume processing –Often thought off as time between last backup and when outage occurred

Where Are You Today Have you recently conducted –BIA, Risk Analysis, Critical records analysis Correlate Cost vs. Risk –Cost Cost of Re-Creating data and transactions Cost of Technologies - storage, network, platforms Re-engineering costs associated with infrastructure refresh –Risk Likelihood of event Cost of downtime ( monetary and reputation) regulatory/legal penalties for non-compliance Competitive (dis)advantages

Some Considerations to Start Solution must meet your goals and objectives –Realistic Expectations need to be set The Business need will be defined by things like the BIA and Risk Analysis Subject expertise What groups/departments are involved –Network, Auditing, Business line Look at educating different groups within your organization so they better understand some of the issues

Traditional Disaster Recovery Timeline Activate Recovery Site Restore Network IPL and synchronize operating systems Load On-Line Databases Begin Staging Applications for First Day Forward recover On-Line Files with Transaction Journals Batch Cycle-Load Application batch files Start On-Lines Hours- Applications start and continue processing integrated cycles until batch cycles with calendar Date

Advanced Disaster Recovery Electronic Vaulting Files transmitted on a regular basis Remote Journaling Remote Mirroring –Real-Time Remote Copy Hot Standby Site Active/Active Sites (Clustering, GDPS)

Some More terminology Real Time Copy –Refers to the mirroring of data, –Should provide an IO consistent copy of that data. –Every Update is Replicated Point-in-Time Copy (PiT) –refers to a copy of data that that is taken at a specific point in time. Ideally this copy should be IO consistent. –PiT copies are used in many ways including backups and checkpoints. –More recently PiT copies are used as part of architected disaster recovery solutions. NanoCopy

Disaster Recovery Tiers: Definitions Tape Back-Up – A Point-in-Time back-up is made to tape and sent off- site. Available System – System must be available at time of incident Remote Logging – Either to Tape or Disk Active System – System is available and software is loaded, ready to run and is often required to run software such as HXRC Recovery Time Objective (RTO)– Time to resume operation at secondary IT facility… this is the duration of the service interruption. Recovery Point Objective(RPO) – Worst case time between last back- up and interruption time.

Diversity in Data Protection Requirements Different Types of Data Require Different Levels of Protection Data Audit Required to Assess Business Criticality, and Cost to Recover Completely Duplicated/ Interconnected hot-site Remote Disk Mirroring Disk Mirroring Shared Disk Single Disk Copy Electronic Vaulting Tape On-site Tape Back-up Off-site (trucks) Disk Consolidation More Less Delayed Immediate More Less Amount of Data Recovery Time Importance of Data

Recovery Tiers – What is the right one There is no wrong one More important is meeting the objectives Have you other options other than Real-Time replication –If you have a 24 hour RPO you may not need it The higher the tier, typically the greater the cost and complexity Combinations or hybrids may be appropriate

Considerations when Architecting Continuous Business Solutions Planning, Planning Planning Document, Document, Document Solutions must accommodate multiple environments and Businesses What is the right solution –software, hardware, real-time, PiT, multiple Careful analysis is required –Application types, amount of data –Performance requirements, remote site location –Transmission capability/cost –What are the future requirements

Solution Design Detailed Assessment Typically Required –Questionnaire/Interviews –Planning Session –Performance data –Data Analysis How Much, Where, Placement Current Infrastructure Will need to match goals and objectives along the the cost Customers may have to consider reengineering of applications or placement of data May take a couple of iterations and customer feedback before final design

Real-Time Mirroring Technologies Options for Consideration –Synchronous Remote Copy –Asynchronous Remote Copy –Hardware based –Software Based –Log Replication –Application Level Copy All are Viable –Depends on Many Factors Performance, Cost, type of data, platform etc.

And it doesn't end there Make sure you have a Baseline Change control is critical –Impact must be carefully considered –Procedures need to be up to date Ongoing monitoring of environment –Network –Subsystem response time Disaster Recovery Testing –Frequency –Document and fix

“A 22-hour Blackout … Cost Ebay up to $5 Million in Forgone Revenue and a $4 Billion Slide in Market Value, and” Two Weeks Later “Not Yet Fully Recovered.” Forbes, July Ebay’s eProfile: Over 2 Million Items Tracked 300,000 Additions a Day 1 Million Visitors a Day 600 Bids a Minute The June 10th Crash Damaged Ebay’s Reputation and Caused a 26% Plunge in Stock Price by June 14th. It’s Only Swapping Beanie Babys & Fiesta Ware More Real World

Thank You Questions?