Planning for Application Recovery

Slides:



Advertisements
Similar presentations
Information Technology Disaster Recovery Awareness Program.
Advertisements

Creating a Data Disaster Recovery Plan. What is a DR Plan? Is your best solution to: Continuous business services Prompt and smooth recovery Prepare for.
Building the business case for Business Continuity Justin Davey Senior Consultant CA.
BCM and Security ROGSI/DMS Präsentation ROGSI/DMS Suite for Corporate Survival ROGSI/Business Impact Analysis TOP 7 Best Practices for Business Continuity.
Maximizing Uptime and Your Firm's Bottom Line: Understanding risk and budget when evaluating business continuity & disaster recovery protocols Michael.
© 2009 EMC Corporation. All rights reserved. Introduction to Business Continuity Module 3.1.
1 Storage Today Victor Hatridge – CIO Nashville Electric Service (615)
© 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Data protection and disaster recovery.
1 Disk Based Disaster Recovery & Data Replication Solutions Gavin Cole Storage Consultant SEE.
Mainframe Replication and Disaster Recovery Services.
Barracuda Backup Service Data Backup and Disaster Recovery.
Disaster Protection and Recovery By: Michael Morrell Ross Ashenfelter Teresa Furnish Karla Maddox.
SAPbiz Disaster Recovery Update Bil Huxley – IS&T Administrative Computing 14-September-2005.
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
November 2009 Network Disaster Recovery October 2014.
Business Continuity & Disaster Recovery Daniel Griggs Solutions Architect Ohio Valley September 30, 2008.
© Novell, Inc. All rights reserved. 1 PlateSpin Protect Virtualize your Disaster Recovery.
Data Management Services AssuredSnap. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection  Data.
Chapter 18: Windows Server 2008 R2 and Active Directory Backup and Maintenance BAI617.
DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection.
David N. Wozei Systems Administrator, IT Auditor.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
Disaster Recovery and Business Continuity Planning.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
BACKUP/MASTER: Strategies for Archiving Dianne McAdam Senior Analyst and Partner Data Mobility Group.
20/12/20151 Data Structures Backing up and Archiving Data.
Presented by, MySQL & O’Reilly Media, Inc. Top considerations for backup of MySQL Dmitri Joukovski, Zmanda.
Microsoft and Symantec
Disaster Recovery: Can Your Business Survive Data Loss? DR Strategies for Today and Tomorrow.
2006 Infrastructure Projects Four Themes: Storage – room to grow Security – reacting to threats Virtual Systems – increased efficiency Service Management.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
DISASTER RECOVERY PLAN By: Matthew Morrow. WHAT HAPPENS WHEN A DISASTER OCCURS  What happens to a business during a disaster?  What steps does a business.
Disaster Unpreparedness June 3, 2013 Underwritten by:
Disaster Recovery Prepared by Mark Lomas Mark Lomas IT Infrastructure Consultant Storage & Servers.
CDP Technology Comparison CONFIDENTIAL DO NOT REDISTRIBUTE.
A Technical View of Risk Assessment Methods for Backup Systems Bradley Wong Life Sciences Consulting Tustin, CA – USA DIA/All Hands: 12 February 2015.
Backup and Disaster Dr Stuart Petch CeG IT/IS Manager
Basic Guide to Computer Backups Eric Moore Computer Users Group of Greeley September 13, 2008.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
Disaster Recovery Scenarios René Romo González DBA at Intel Second Meetup DBA100.
THINK DIFFERENT. THINK SUCCESS.
Local Area Networks, 3rd Edition David A. Stamper
Database recovery contd…
Basic Guide to Computer Backups
Integrating Disk into Backup for Faster Restores
Secure Data – a safe place in an unsafe world!
Cloud Computing Q&A Presented by:
CompTIA Security+ Study Guide (SY0-401)
Providing Application High Availability
Server Upgrade HA/DR Integration
Backup, Archive & Recovery
Security on the Move & In the Clouds
Agenda Backup Storage Choices Backup Rule
Uptime All The Time: Doing Business In The Cloud
Alabede, Collura, Walden, Zimmerman
2018 Huawei H Real Questions Killtest
Storage & Digital Asset Management CIO Council Update
Microsoft Azure P wer Lunch
Quick Sales Guide Acronis Backup Cloud Powered by Acronis – local and cloud backup and recovery service to solve your customers’ data protection challenges.
RPO, RTO & SLA: 3 Letter Words for When the SHT hits the FAN
Backup and restoration of data, redundancy
Data Backup Strategies
data backup & system report
Guidance: This sales script is designed to be used. after
Using the Cloud for Backup, Archiving & Disaster Recovery
Presentation transcript:

Planning for Application Recovery ALFISIG – September 25, 2013 Presenter - David Birdsong

Application Recovery As Project Managers we plan many aspects of the project that has been assigned to our care. One area that is often overlooked is the planning for how the Application will be recovered. This is an area of Risk Management that is receiving more attention as our critical dependencies expand.

The Threat (Just to name a few) Loss of the Data Center (DR) Corruption of the Data Patches and Upgrades Human Error Malicious Harm

Protection Measures Just having backups of the data is no longer enough. Most backup and recovery planning is performed based on data and servers and may miss critical needs of the Application. The focus of Recovery planning must be directed towards the application or the whole system. It is often left up to Technology to provide the planning, but who knows the actual Application requirements ? The Line of Business believes that the plan for recovery of their application is ready and can be executed within a couple of hours. Technology believes that the data can be recovered and Hardware can be replaced but they are not sure how long it will take.

Protection Measures The best way to ensure adequate protection and recovery capabilities is to plan and implement them with the Application deployment. As the Project Manager identifies Project Risks and corresponding mitigation plans, Data Protection and Application Recovery should also be included. Include the DR and backup teams in your planning. Your Business Partners will not think about this unless you bring this aspect of the plan to them. You can help your Business Partners by asking the right questions.

What Do I need to Know? What is the Recovery Time Objective (RTO)? How long can the Application be down for recovery? What is the Recovery Point Objective (RPO)? At what point will the Application be recovered to? What is the Application’s Recovery Tiering? What is the impact to the customer when the application is not available? What is the financial impact to the bank when the application is not available? Are there regulatory requirements that must be met? Are there other applications that have dependencies on this one?

What Do I Need to Know? What are my available Backup Windows? When can the backup run with the least impact to business function while also capturing the data correctly? Does the application require Operational Recovery capabilities only? How will my Data Archive requirements be met? It is not a good practice to use a backup as an application’s archive. The data is at a higher level risk if it is the only copy. Application releases change and may not be compatible with the archived data. Backup systems upgrade and may not be compatible with the old backup format. The media itself is subject to failure or loss It is a better practice to have an application archive that is backed up or protected on a regular basis.

What Do I Need to Know? What is my off-site recovery capability? Define Hardware needs and plan for providing it Storage of data at an off-site location How will data move from off-site storage to the recovery site? What is my Tier rating for prioritization of the recovery effort? What is my on-site recovery capability? How quickly can data be restored on-site? Do tapes have to called from an off-site location?

Data Replication vs. Backups If the application has data replication, do I really need backups? Data Replication Data Replication is a good plan for Disaster Recovery. The recovery point is usually within minutes of the failure. Data Recovery at an off site location is very quick. Replicated disk can be expensive so it is often based on the application tier If you do not have dedicated hardware at the recovery site then the replicated data may be of little value. Deletions, errors and data corruption are also replicated to the site within minutes. Backups Point in time recovery, usually previous day’s files. Can recover an application’s data to previous day’s file for the past 30 days or beyond. Servers system state, and all local drives can be backed up and recovered. Deleted or corrupted data can be restored from previous backups. Off site recovery times can vary widely depending on the location of the off-site storage and the media being used.

Am I protected? Ask what the application tier is and what it means. Ask for a list of what backups are being performed. Ask how the data will be recovered in a DR event. Ask what the off-site hardware plan is for the application. Ask where the data is stored off site and how it will be recovered. Ask what data is actually being backed up. Ask what the retention periods are for the data.

Summary Planning for Application Recovery is best when performed during implementation. Application Recovery and Data Protection are often seen as technology responsibilities but they are not. The Line of Business is actually the key player in establishing the right level of recovery and protection. Project Managers should address this during their planning phase. Include your company’s DR and Backup resources in your projects.

Questions and Comments?

Thank You!