John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.

Slides:



Advertisements
Similar presentations
Information Technology Disaster Recovery Awareness Program.
Advertisements

Business Plug-In B4 MIS Infrastructures.
1 The process of analyzing all core business functions and establishing an optimized timetable for recovery. Provides baseline for:  Justification for.
Maximizing Uptime and Your Firm's Bottom Line: Understanding risk and budget when evaluating business continuity & disaster recovery protocols Michael.
Business Continuity Section 3(chapter 8) BC:ISMDR:BEIT:VIII:chap8:Madhu N PIIT1.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
1 Disaster Recovery “Protecting City Data” Ron Bergman First Deputy Commissioner Gregory Neuhaus Assistant Commissioner THE CITY OF NEW YORK.
GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.
© 2009 EMC Corporation. All rights reserved. Introduction to Business Continuity Module 3.1.
1 Disk Based Disaster Recovery & Data Replication Solutions Gavin Cole Storage Consultant SEE.
Business Continuity Planning and Disaster Recovery Planning
Lesson 11 – NETWORK DISASTER RECOVERY Disaster recovery plans Network backup and restoration OVERVIEW.
Disaster Prevention and Recovery Presented By: Sean Snodgrass and Theodore Smith.
Processing Integrity and Availability Controls
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES CHAPTER.
Disaster Recovery and Business Continuity Ensuring Member Service in Times of Crisis.
1 Figure 10-9: Business Continuity Planning Business Continuity Planning  A business continuity plan specifies how a company plans to restore core business.
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Mohammed Alqahtani. What is the disaster?  A disaster is An event suddenly and unpredictably happened and caused huge damage, loss or destruction in.
CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE
Business Crisis and Continuity Management (BCCM) Class Session
Services Tailored Around You® Business Contingency Planning Overview July 2013.
November 2009 Network Disaster Recovery October 2014.
Business Continuity & Disaster Recovery Daniel Griggs Solutions Architect Ohio Valley September 30, 2008.
Presented By: MICHAEL HOFFMAN President & CEO - Bolt Data Systems June 16, 2010 Data Backup for the Shared Platform.
Security+ All-In-One Edition Chapter 16 – Disaster Recovery and Business Continuity Brian E. Brzezicki.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Disaster Recovery, Business Continuity, and Organizational Policies.
IT Business Continuity Briefing March 3,  Incident Overview  Improving the power posture of the Primary Data Center  STAGEnet Redundancy  Telephone.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES
Disaster Recovery Strategies & criteria for evaluation of information management strategies.
HBCU National Workshop June 24, 2011 Disaster Recovery Reggie Brinson Assoc. VP/Chief Information Officer Clark Atlanta University.
ISA 562 Internet Security Theory & Practice
DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection.
IT Infrastructure Chap 1: Definition
Chapter 2: Non functional Attributes.  It infrastructure provides services to applications  Many of these services can be defined as functions such.
David N. Wozei Systems Administrator, IT Auditor.
Business Continuity & Disaster recovery
Improving QAD Availability Through Virtualization Spring 2014 QAD Midwest User Group Meeting March 24, 2014 Itasca, IL Kirk Patten – Strategic Information.
1 Availability Policy (slides from Clement Chen and Craig Lewis)
Co-location Sites for Business Continuity and Disaster Recovery Peter Lesser (212) Peter Lesser (212) Kraft.
By Srosh Abdali.  Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Business Continuity and Disaster Recovery Planning.
IT Disaster Recovery CAUBO 2008 Information Systems and Technology.
1 Nassau Community CollegeProf. Vincent Costa Session 7 Infrastructures Sustainable Technologies CMP 117 Business Computing: Concepts &Applications.
Disaster Recovery and Business Continuity Planning.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Business Continuity. Business continuity... “Drive thy business or it will drive thee.” —Benjamin Franklin ( ), American entrepreneur, statesman,
High Availability in DB2 Nishant Sinha
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Disaster Recovery: Can Your Business Survive Data Loss? DR Strategies for Today and Tomorrow.
A2 LEVEL ICT 13.6 LEGAL ASPECTS DISASTER RECOVERY.
Introduction to Business continuity Planning 6/9/2016 Business Continuity Planning 1.
Disaster Recovery Planning (DRP) DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation.
AUDITING BUSINESS CONTINUITY PROGRAMS AND PLANS What to Look For Presented by: Tommye White, CBCP, DRP Chuck Walts, CBCP, CRP.
Information Security Crisis Management Daryl Goodwin.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Chapter 14: System Administration Mark Milan. System Administration Acquiring new IS resources Maintaining existing IS resources Designing and implementing.
Information Systems Security
Planning for Application Recovery
CompTIA Security+ Study Guide (SY0-401)
Server Upgrade HA/DR Integration
CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE
Business Contingency Planning
1 2 Please stand by! The webinar will begin shortly.
Disaster Recovery at UNC
Using the Cloud for Backup, Archiving & Disaster Recovery
Presentation transcript:

John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland OH

Menu Statistics Definitions Example high level tasks Questions

Shocking Statistics 43% of companies experiencing disasters never re-open. 29% close within two years. Source - McGladrey and Pullen

More Statistics 93% of businesses that lost their data center for 10 days went bankrupt within one year. Source - National Archives & Records Administration

Shocking Statistics 40% of all companies that experience a major disaster will go out of business if they cannot gain access to their data within 24 hours. Source - Gartner

Definitions Business Continuity Disaster Recovery Business Recovery High Availability Redundancy ColdSite WarmSite HotSite Mission Critical RPO RTO

Business Continuity (BC): Planning to ensure the continuity of business critical functions in the event of a major unplanned service failure or disaster Includes key aspects such as personnel, facilities, crisis communication, project management and change control. A BC strategy includes a Disaster Recovery Plan (DRP) for IT related infrastructure recovery. An all encompassing term covering both disaster recovery planning and business resumption planning

Disaster Recovery (DR): Part of a larger Business Continuity plan that includes processes and solutions to restore business critical applications, data, hardware, communications (such as networking) and other IT infrastructure. Can also include measures to protect against other unplanned events such as the failure of an individual server or shorter service interruptions

Business Recovery The common critical path that all companies follow during a recovery effort. There are major nodes along the path which are followed regardless of the organization. The process includes: – Immediate response, – Environmental restoration or relocation – Functional restoration – Data recovery and synchronization – Restore business functions – Return to normal

High Availability (HA): A system or component that is continuously operational for a desirably long length of time. Usually includes redundant local systems

Redundancy Systematically using multiple sources, devices or connections to eliminate single points of failure that could completely stop the flow of information.

Mission Critical Systems Systems or applications that are essential to the functioning of your business and its processes.

Recovery Point Objective (RPO): The age of files that must be recovered for normal operations to resume if a system goes down as a result of a failure.

Recovery Time Objective (RTO): The maximum tolerable length of time that a computer, system, network or application can be down after a failure or disaster occurs.

Coldsite An alternate facility that is void of any resources or equipment except air- conditioning, raised flooring and power. Equipment and resources must be installed in such a facility to duplicate the critical business functions of an organization.

Warmsite An alternate processing site which is only partially equipped As compared to Hot Site which is fully equipped

Hotsite A DR facility fully equipped with the equipment, network connections and environmental conditions necessary for restoring your data and getting your systems up and running instantly. unlike coldsites and warmsites, which are not ready to go in an instant

Availability vs. DR There's a huge difference between disaster prevention (Availability) and disaster recovery. Both are necessary. But the former only mitigates the risk of downtime. The latter ensures quick recovery in the event of downtime.

High Availability DATA CENTER LEVEL Utility Power and UPS Generator Core Networking Security HVAC Fire Prevention Monitoring CONFIGURATION LEVEL Power Network Devices Security Devices Server Clustering Storage Encryption & Policies

DISASTER RECOVERY Backup & Retention Data Replication Application Recovery Server Recovery DR Assessment DR Plan Testing

High Level Tasks Perform Needs Analysis/Discovery Identify Requirements Based on Analysis Identify Recovery Time Objectives Identify Recovery Point Objectives Perform Initial Design Review Initial Design Implement Design Test Plan

Identify Requirements Based on Analysis Facilities Hardware System / Applications

Identify Recovery Time Objectives Per System / Application

Identify Recovery Point Objectives Per System / Application

Example RTO/RPO Analysis Mission Critical Systems ApplicationPreferred RTOPreferred RPOCompromised RTO Compromised RPO QAD408Last Backup Gentran408Last Backup Active Directory 408Last Backup Exchange408Last Backup

Initial Design Identify disaster recovery project members Perform Risk Analysis Define high-level recovery strategy Define costs associated with strategy

Review Initial Design Justify costs to risk analysis

Detailed Design Architect systems & recovery. Create detailed project plan.

Implement Design Procure facilities, equipment, and software. Build recovery site.

Test Plan

Summary Potential ramifications of a disaster without a plan Definitions of a few important terms Key tasks to develop and implement a plan

Questions