® 000000_1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Slides:



Advertisements
Similar presentations
Case Study: Business Continuity Planning for Site- Level Disaster Kimberley A. Pyles Northrop Grumman Corporation
Advertisements

Steve Pearce Chief Operating Officer. Managed Services Industry Hype or a real solution to key business continuity issues ? (Developing trend or latest.
GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.
© 2009 EMC Corporation. All rights reserved. Introduction to Business Continuity Module 3.1.
Building a Business Case for Disaster Recovery Planning - State and Local Government Chris Turnley
© 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Data protection and disaster recovery.
1 Disk Based Disaster Recovery & Data Replication Solutions Gavin Cole Storage Consultant SEE.
Information Means The World.. Enhanced Data Recovery Agenda EDR defined Backup to Disk (DDT) Tape Emulation (Tape Virtualization) Point-in-time Copy Replication.
Disaster Protection and Recovery By: Michael Morrell Ross Ashenfelter Teresa Furnish Karla Maddox.
IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2004.
Disaster Prevention and Recovery Presented By: Sean Snodgrass and Theodore Smith.
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
1 Choosing Disaster Recovery Solution for Database Systems EECS711 : Security Management and Audit Spring 2010 Presenter : Amit Dandekar Instructor : Dr.
1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Realise.
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
000000_1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
Business Crisis and Continuity Management (BCCM) Class Session
November 2009 Network Disaster Recovery October 2014.
DTS Disaster Recovery Service Fact and Fallacy By Marianne Chick, CBCP DTS Disaster Recovery Planner.
Welcome to iDOC Corp. DocHost Solution Online Document Management DocHost 14 Day Free Trial
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
Discovery Planning steps (1)
CHAPTER FIVE Enterprise Architectures. Enterprise Architecture (Introduction) An enterprise-wide plan for managing and implementing corporate data assets.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Ingram.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
IT Business Continuity Briefing March 3,  Incident Overview  Improving the power posture of the Primary Data Center  STAGEnet Redundancy  Telephone.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
110130_1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
2015 Risky Business Week Welcome to the 2015 Risky Business Week presentation regarding disaster recovery Risky Business Week.
David N. Wozei Systems Administrator, IT Auditor.
100709_1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
120204_ 1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
 FFC backs up all of its data each day. It stores its most recent daily backup once a week at a company owned offsite location. FFC also stores the most.
Co-location Sites for Business Continuity and Disaster Recovery Peter Lesser (212) Peter Lesser (212) Kraft.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
Information Assurance Policy Tim Shimeall
Microsoft ® System Center Data Protection Manager 2007 with Service Pack 1 Infrastructure Planning and Design Published: January 2009 Updated: July 2010.
Business Continuity Management For Project Managers.
Module 13 Implementing Business Continuity. Module Overview Protecting and Recovering Content Working with Backup and Restore for Disaster Recovery Implementing.
000000_1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
120130_ 1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
110709_1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Success.
1 IBM TIVOLI Business Continuance Seminar Training Document.
Module 1 Introduction to Designing a Microsoft® Exchange Server 2010 Deployment.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
Disaster Recovery: Can Your Business Survive Data Loss? DR Strategies for Today and Tomorrow.
Luminex Virtual Tape Storage System Brian Sullivan Director of Computer Operations Broward County Public Schools 1.
Protecting your Managed Services Practice: Are you at Risk?
TRUE CANADIAN CLOUD Cloud Experts since The ORION Nebula Ecosystem.
가상화 기반의 Workload 관리솔루션 : FORGE PlateSpin Virtualization and Workload Management 나영관 한국노벨 /
Disaster Recovery Planning (DRP) DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Enron Corp. Disaster Recovery/Business Continuity Options June, 2000.
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. © Ingram Micro Inc. 1.
Enterprise Architectures
CompTIA Security+ Study Guide (SY0-401)
DTS Disaster Recovery Service Fact and Fallacy
Disaster Recovery AITR Meeting Aug 25, 2009.
Planning High Availability and Disaster Recovery
Disaster Recovery AITR Meeting Aug 25, 2009.
Disaster recovery.
Using the Cloud for Backup, Archiving & Disaster Recovery
Presentation transcript:

® _1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 1Introduction Michael Gunzelmann  15 years in the IT industry  Dedicated IBM partner consultant  Focused on partner enablement  Custom implementations of IBM software

® _2 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 2 Data and its Importance  Data is the life blood of businesses  If data is lost the effects can be enormous  Disruption in business processes can be devastating  You need to be prepared and plan ahead

® _3 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 3 Business Continuity  Evaluating the physical risks your business faces – Consider all possibilities – Determine which are the most likely  Develop a plan to address these threats – Classify all business processes – Involve all functional groups – Create a comprehensive solution – An evolving process

® _4 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 4 Disaster Recovery  Part of the Business Continuity Plan  Contains all the necessary details for recovering lost systems and their data  Designed as a staged solution – Critical resources recovered in minutes or seconds – Primary components available in hours – Secondary items online in days

® _5 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 5 Recovery Scenarios  Mission Critical – Hot site with clustered systems with synchronized data volumes – Cost is directly related to complexity of the environment – Expensive is proportionate to the business risk  Primary Systems – Warm site with a functional infrastructure – Data can be staged to this location – Can be a subset of the hot site

® _6 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 6 Recovery Scenarios con’t  Secondary components – Recovered for raw systems – Typically done from offsite backup media – Tends to be corporate records and file and print data – Mal also be a portion of a hot or warm site

® _7 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 7 Keep in Mind that…  Business Continuity is an insurance policy  The plan will require a great deal of discussion and evaluation with the customer  Once a plan is in place, a Disaster Recovery solution must be created  The DR plan must reflect the business and the risks it faces