SlideShare a Scribd company logo
1 of 17
Download to read offline
1
Bluelock’s Recovery Suite
a comprehensive guide to
2
The Key to Disaster Recovery
The key to a high-performing IT disaster recovery plan is having the right mix of
solutions to achieve your organization’s need for speedy recovery and maximum
value. Bluelock has architected a suite of Disaster Recovery-as-a-Service solutions
to help organizations achieve their ultimate goal of IT service availability and data
protection.
In addition to aligning your recovery objectives to the proper technological
capabilities, processes play a major role in an organization’s ability to recover
with confidence. That’s why Bluelock works with clients to set the most accurate
expectations for stakeholders, using a concept called True RTO™ and a plan that fac-
tors in people, process and technology dependencies called Recovery Waves™.
Inside This Guide:
How to Read This Guide....................................................................................................4
Bluelock Solutions................................................................................................................5
IaaS (Active/Active)...............................................................................................................6
DRaaS Run™ (Active/Passive).............................................................................................7
	 (Active/Passive with Scale Out)...............................................................................8
	 (Always-On Recovery)................................................................................................9
DRaaS Ready™ (Real-Time Replication).........................................................................10
DRaaS Restore™ (Backup-Based Replication)...............................................................11
Bluelock Solution Partners................................................................................................12
What is TrueRTO™?...............................................................................................................13
	 Two Interpretations of RTO.......................................................................................14
Recovery Waves....................................................................................................................15
	 Recovery Waves Diagram.........................................................................................16
4
Color Key The following colors, or temperatures, refer to
the relative speed of each recovery solution.
Fastest Slowest
Hot Warm Cold
5
Bluelock Solutions
Solutions can be architected for physical or virtual
machines in private or public cloud environments
6
IaaS (Active/Active)
Recovery Process
Traffic automatically swings
to another zone immediately
upon disruption
True RTO™: Zero
Fastest Slowest
50%
Zone 1
50%
Zone 2
Load balancing
0 RPO / 0 RTO
Sample use case: A company relies on uptime as its primary success metric for customers who need access to service at any
time, from anywhere. In order to deliver on this promise, the company leverages an active/active infrastructure which balances
their traffic load between two identical sites. In the event of a service disruption to either side, each site could handle the full
traffic if needed. This set-up also allows for maintenance to occur to either side when needed, so service to customers isn’t
disrupted and uptime is maintained.
7
Fastest Slowest
DRaaS Run™ (Active/Passive)
Recovery Process
Start application
True RTO™: Seconds to
minutes
Full Production
Source Site Target Site
App-aware or
native replication
0 RPO,
transaction-consistent
Sample use case: A company’s Active Directory (AD) server is a top priority in the event of a declaration because without a
connection to the AD server, their machines won’t boot and their Quality Assurance teams won’t have permission to validate
recovery. A fully provisioned, always-running replica provides the foundation for immediate failover and fast recovery for the rest
of the systems.
8
DRaaS Run™ (Active/Passive with Scale Out)
Recovery Process
Clone machines
Start application
Boot clones
Start application on clones
Fastest Slowest
True RTO™: Minutes,
dependent on cloning
process & machine size
Full Production
Source Site Target Site
Production
Replica for
Cloning
+ + + + + +
App-aware or
native replication
0 RPO,
transaction-consistent
Seconds RTO for
production replica
Sample use case: Without a consistent online presence, a web-based company cannot conduct business or gain revenue.
While it may run using between 5 and 10 web and application servers in production, the company wants more economical
protection for their site without giving up confidence. By maintaining a set of web and application servers at the recovery site
and replicating their database using native database replication, their environment can begin taking load immediately upon
primary site failure.
9
Fastest Slowest
DRaaS Run™ (Always-On Recovery)
Recovery Process
Transfer traffic to
headend
True RTO™: Seconds for
headend, recovery time for
full production is dependent
on recovery tier selected
Full Production
Source Site Target Site
Security &
Network
Headend
Security &
Network
Headend
App-aware or
native replication
0 RPO / seconds RTO
Target Site
for headend,
transaction-consistent
Sample use case: A company with large amounts of sensitive data needs its security and network headend applications at the
recovery site to be constantly synchronized with the production site in an always running state. This ensures its dependent
applications can return to service more quickly upon disruption. By leveraging Always-On Recovery, the business remains
protected from threats at both sites and removes the need to wait on updates and boot time for the most critical portion of its
recovery environment.
10
Fastest Slowest
DRaaS Ready™ (Real-Time Replication)
Recovery Process
Boot VMs
Start application
Swing traffic
True RTO™: 4 hours or
less for full environment
Full Production
Source Site Target Site
Replica in
Protection
Groups
Crash-consistent
Tune RPOs to seconds
RTO of minutes per
VM, hours or less for
full environment
Sample use case: A company must have a point-of-sale application running at all of their retail locations so that inventory, sales
and customer information is up to date. By protecting this customer information in the cloud with real-time replication, applications
can be restored in the cloud within minutes and full service is available within hours so that retail locations can continue to serve
customers without losing business.
11
Fastest Slowest
DRaaS Restore™ (Backup-Based Replication)
Recovery Process
Restore backup to
production storage
Boot VMs
Start application
True RTO™: 24 hours or
less for full environment
Full Production
Source Site
Target Site
Archive Storage
Point-in-time
backup-based
replication
RPO of hours,
based on frequency
of backup schedule
Can restore back to production site
Sample use case: A company has a collection of non-urgent, business-supporting applications and files that don’t warrant
immediate recovery, but still need to be protected nonetheless. As a low-cost alternative to more rapid recovery, the company
can secure point-in-time backups in the cloud for faster access to data than if tapes had to be recalled from a physical location.
Plus, the company can choose to restore their data within the cloud or back to their original site at the time of declaration.
12
Bluelock
Solution Partners
Bluelock leverages the following best-of-breed
technologies to deliver our solutions. We also
offer a unique process that allows our experts to
tailor and deliver our solutions.
13
What is True RTO™?
On a basic level, a recovery time objective (RTO) is the objective for the time it takes to re-
cover. Bluelock is dedicated to the complete recovery of IT systems and what that means not
just to an IT department, but to the rest of an organization and its constituents. For this reason,
we refer to recovery times in terms of True RTO™.
Two Interpretations of RTO
Technical RTO
In this case, RTO means the time it takes
for infrastructure to be running and
available for recovery.
True RTO™
In this case, RTO means the time it takes
for an application or system to become
available and begin serving end users.
14
Two Interpretations of RTO (cont.)
Security in
place
Validate
security in
place
App dependencies
are accurate
Machines
booted
App owners
confirm
readiness to
support end
users
Technical RTO
typically stops
here
True RTO™
recovery time
typically stops
here
Infrastructure
running &
available
Apps
started
Data checked
and accurate
User network
access available
15
Recovery Waves™
Recovery Waves™ emphasize people and process over technology. The technical part is faster
than the people part, so Recovery Waves™ are a way to tier applications within your recovery
tiers, taking into consideration dependencies and order of operations.
Demonstrate which applications need to wait on others before
returning to service.
Set expectations about when applications will come back.
Provide more detailed information on what will come back, and in what
order - even within the same tier.
Recovery Waves™ offer the following to the recovery process:
16
Network
Recovery Tier 12 hrs
Wave 1
Wave 2
True RTO 4 hrs
True RTO 8 hrs True RTO < 24 hrs True RTO 48+ hrs
Wave 3
Wave 4
24 hrs 36 hrs 48 hrs
Tier 1
Tier 3
Tier 2
Recovery Waves™ Sample Diagram
For more information on DRaaS Solutions, visit
bluelock.com/solutions

More Related Content

What's hot

Value Proposition for IBM PureFlex System Case for IBM PureFlex System for ...
Value Proposition for  IBM PureFlex System  Case for IBM PureFlex System for ...Value Proposition for  IBM PureFlex System  Case for IBM PureFlex System for ...
Value Proposition for IBM PureFlex System Case for IBM PureFlex System for ...IBM India Smarter Computing
 
Microsoft SQL Server - Benefits of Enterprise Edition Presentation
Microsoft SQL Server - Benefits of Enterprise Edition PresentationMicrosoft SQL Server - Benefits of Enterprise Edition Presentation
Microsoft SQL Server - Benefits of Enterprise Edition PresentationMicrosoft Private Cloud
 
Addressing the Top 3 Storage Challenges in Healthcare with Hanover Hospital
Addressing the Top 3 Storage Challenges in Healthcare with Hanover HospitalAddressing the Top 3 Storage Challenges in Healthcare with Hanover Hospital
Addressing the Top 3 Storage Challenges in Healthcare with Hanover HospitalDataCore Software
 
De voordelen van hypervisor en back-up integratie
De voordelen van hypervisor en back-up integratie De voordelen van hypervisor en back-up integratie
De voordelen van hypervisor en back-up integratie Proact Netherlands B.V.
 
White Paper: MoreVRP for EMC Greenplum
White Paper: MoreVRP for EMC Greenplum  White Paper: MoreVRP for EMC Greenplum
White Paper: MoreVRP for EMC Greenplum EMC
 
VMworld 2013: Health Care Applications Characterization in VMware Horizon View
VMworld 2013: Health Care Applications Characterization in VMware Horizon View VMworld 2013: Health Care Applications Characterization in VMware Horizon View
VMworld 2013: Health Care Applications Characterization in VMware Horizon View VMworld
 
Preserve user response time while ensuring data availability
Preserve user response time while ensuring data availabilityPreserve user response time while ensuring data availability
Preserve user response time while ensuring data availabilityPrincipled Technologies
 
Spend less time, effort, and money by choosing a Dell EMC server with pre-ins...
Spend less time, effort, and money by choosing a Dell EMC server with pre-ins...Spend less time, effort, and money by choosing a Dell EMC server with pre-ins...
Spend less time, effort, and money by choosing a Dell EMC server with pre-ins...Principled Technologies
 
What is Disaster Recovery as a Service?
What is Disaster Recovery as a Service?What is Disaster Recovery as a Service?
What is Disaster Recovery as a Service?Infrascale
 
Creating An Enterprise Storage Strategy for Healthcare
Creating An Enterprise Storage Strategy for Healthcare  Creating An Enterprise Storage Strategy for Healthcare
Creating An Enterprise Storage Strategy for Healthcare DataCore Software
 
Presentation automating failover with data guard in the cloud
Presentation   automating failover with data guard in the cloudPresentation   automating failover with data guard in the cloud
Presentation automating failover with data guard in the cloudxKinAnx
 
VirtualWisdom Brochure
VirtualWisdom BrochureVirtualWisdom Brochure
VirtualWisdom BrochureDarren Molloy
 
Virtualizing Business Critical Applications
Virtualizing Business Critical ApplicationsVirtualizing Business Critical Applications
Virtualizing Business Critical ApplicationsDataCore Software
 
Keep your data safe by moving from unsupported SQL Server 2008 to SQL Server ...
Keep your data safe by moving from unsupported SQL Server 2008 to SQL Server ...Keep your data safe by moving from unsupported SQL Server 2008 to SQL Server ...
Keep your data safe by moving from unsupported SQL Server 2008 to SQL Server ...Principled Technologies
 

What's hot (20)

Value Proposition for IBM PureFlex System Case for IBM PureFlex System for ...
Value Proposition for  IBM PureFlex System  Case for IBM PureFlex System for ...Value Proposition for  IBM PureFlex System  Case for IBM PureFlex System for ...
Value Proposition for IBM PureFlex System Case for IBM PureFlex System for ...
 
Microsoft SQL Server - Benefits of Enterprise Edition Presentation
Microsoft SQL Server - Benefits of Enterprise Edition PresentationMicrosoft SQL Server - Benefits of Enterprise Edition Presentation
Microsoft SQL Server - Benefits of Enterprise Edition Presentation
 
Addressing the Top 3 Storage Challenges in Healthcare with Hanover Hospital
Addressing the Top 3 Storage Challenges in Healthcare with Hanover HospitalAddressing the Top 3 Storage Challenges in Healthcare with Hanover Hospital
Addressing the Top 3 Storage Challenges in Healthcare with Hanover Hospital
 
De voordelen van hypervisor en back-up integratie
De voordelen van hypervisor en back-up integratie De voordelen van hypervisor en back-up integratie
De voordelen van hypervisor en back-up integratie
 
White Paper: MoreVRP for EMC Greenplum
White Paper: MoreVRP for EMC Greenplum  White Paper: MoreVRP for EMC Greenplum
White Paper: MoreVRP for EMC Greenplum
 
VMworld 2013: Health Care Applications Characterization in VMware Horizon View
VMworld 2013: Health Care Applications Characterization in VMware Horizon View VMworld 2013: Health Care Applications Characterization in VMware Horizon View
VMworld 2013: Health Care Applications Characterization in VMware Horizon View
 
Preserve user response time while ensuring data availability
Preserve user response time while ensuring data availabilityPreserve user response time while ensuring data availability
Preserve user response time while ensuring data availability
 
Spend less time, effort, and money by choosing a Dell EMC server with pre-ins...
Spend less time, effort, and money by choosing a Dell EMC server with pre-ins...Spend less time, effort, and money by choosing a Dell EMC server with pre-ins...
Spend less time, effort, and money by choosing a Dell EMC server with pre-ins...
 
Hot Disaster Recovery Using Zerto
Hot Disaster Recovery Using ZertoHot Disaster Recovery Using Zerto
Hot Disaster Recovery Using Zerto
 
Solution Brief HPE StoreOnce backup with Veeam
Solution Brief HPE StoreOnce backup with VeeamSolution Brief HPE StoreOnce backup with Veeam
Solution Brief HPE StoreOnce backup with Veeam
 
What is Disaster Recovery as a Service?
What is Disaster Recovery as a Service?What is Disaster Recovery as a Service?
What is Disaster Recovery as a Service?
 
Full practice exam
Full practice examFull practice exam
Full practice exam
 
Creating An Enterprise Storage Strategy for Healthcare
Creating An Enterprise Storage Strategy for Healthcare  Creating An Enterprise Storage Strategy for Healthcare
Creating An Enterprise Storage Strategy for Healthcare
 
Presentation automating failover with data guard in the cloud
Presentation   automating failover with data guard in the cloudPresentation   automating failover with data guard in the cloud
Presentation automating failover with data guard in the cloud
 
Delphix 4.0
Delphix 4.0Delphix 4.0
Delphix 4.0
 
VirtualWisdom Brochure
VirtualWisdom BrochureVirtualWisdom Brochure
VirtualWisdom Brochure
 
Landed cost
Landed costLanded cost
Landed cost
 
Virtualizing Business Critical Applications
Virtualizing Business Critical ApplicationsVirtualizing Business Critical Applications
Virtualizing Business Critical Applications
 
Keep your data safe by moving from unsupported SQL Server 2008 to SQL Server ...
Keep your data safe by moving from unsupported SQL Server 2008 to SQL Server ...Keep your data safe by moving from unsupported SQL Server 2008 to SQL Server ...
Keep your data safe by moving from unsupported SQL Server 2008 to SQL Server ...
 
Progression: Disaster Recovery as a Service
Progression: Disaster Recovery as a ServiceProgression: Disaster Recovery as a Service
Progression: Disaster Recovery as a Service
 

Similar to Bluelock's Comprehensive Guide to Disaster Recovery Solutions

Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankDonna Perlstein
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankCloudEndure
 
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | SysforeCloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | SysforeSysfore Technologies
 
ProfitBricks-white-paper-Disaster-Recovery-US
ProfitBricks-white-paper-Disaster-Recovery-USProfitBricks-white-paper-Disaster-Recovery-US
ProfitBricks-white-paper-Disaster-Recovery-USMudia Akpobome
 
Business Continuity Plan V5
Business Continuity Plan V5Business Continuity Plan V5
Business Continuity Plan V5Rick Percuoco
 
Deepak_ppt_ver1.0.pptx
Deepak_ppt_ver1.0.pptxDeepak_ppt_ver1.0.pptx
Deepak_ppt_ver1.0.pptxssuser20fcbe
 
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...MaryJWilliams2
 
Enterprise grade disaster recovery without breaking the bank
Enterprise grade disaster recovery without breaking the bankEnterprise grade disaster recovery without breaking the bank
Enterprise grade disaster recovery without breaking the bankactualtechmedia
 
Module 4 disaster recovery student slides ver 1.0
Module 4 disaster recovery   student slides ver 1.0Module 4 disaster recovery   student slides ver 1.0
Module 4 disaster recovery student slides ver 1.0Aladdin Dandis
 
7 Habits for High Effective Disaster Recovery Administrators
7 Habits for High Effective Disaster Recovery Administrators7 Habits for High Effective Disaster Recovery Administrators
7 Habits for High Effective Disaster Recovery AdministratorsQuorumLabs
 
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...Symantec
 
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery:  Understanding Trend, Methodology, Solution, and StandardDisaster Recovery:  Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery: Understanding Trend, Methodology, Solution, and StandardPT Datacomm Diangraha
 
EVault Technical DRaaS Guide_Final
EVault Technical DRaaS Guide_FinalEVault Technical DRaaS Guide_Final
EVault Technical DRaaS Guide_FinalJamie Evans
 
Disaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an EmergencyDisaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an Emergencysco813f8ko
 
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and ResilienceMastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and ResilienceMaryJWilliams2
 
Plate Spin Disaster Recovery Solution
Plate Spin Disaster Recovery SolutionPlate Spin Disaster Recovery Solution
Plate Spin Disaster Recovery Solutionmuralis3
 
Disaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the differenceDisaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the differencejeetendra mandal
 
DRaaS vs. On-Prem DR Appliance: Which is Right for You?
DRaaS vs. On-Prem DR Appliance: Which is Right for You?DRaaS vs. On-Prem DR Appliance: Which is Right for You?
DRaaS vs. On-Prem DR Appliance: Which is Right for You?MaryJWilliams2
 

Similar to Bluelock's Comprehensive Guide to Disaster Recovery Solutions (20)

Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | SysforeCloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
 
ProfitBricks-white-paper-Disaster-Recovery-US
ProfitBricks-white-paper-Disaster-Recovery-USProfitBricks-white-paper-Disaster-Recovery-US
ProfitBricks-white-paper-Disaster-Recovery-US
 
Business Continuity Plan V5
Business Continuity Plan V5Business Continuity Plan V5
Business Continuity Plan V5
 
Deepak_ppt_ver1.0.pptx
Deepak_ppt_ver1.0.pptxDeepak_ppt_ver1.0.pptx
Deepak_ppt_ver1.0.pptx
 
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
 
Enterprise grade disaster recovery without breaking the bank
Enterprise grade disaster recovery without breaking the bankEnterprise grade disaster recovery without breaking the bank
Enterprise grade disaster recovery without breaking the bank
 
CS_10_DR_CFD
CS_10_DR_CFDCS_10_DR_CFD
CS_10_DR_CFD
 
Module 4 disaster recovery student slides ver 1.0
Module 4 disaster recovery   student slides ver 1.0Module 4 disaster recovery   student slides ver 1.0
Module 4 disaster recovery student slides ver 1.0
 
7 Habits for High Effective Disaster Recovery Administrators
7 Habits for High Effective Disaster Recovery Administrators7 Habits for High Effective Disaster Recovery Administrators
7 Habits for High Effective Disaster Recovery Administrators
 
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...
 
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery:  Understanding Trend, Methodology, Solution, and StandardDisaster Recovery:  Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
 
EVault Technical DRaaS Guide_Final
EVault Technical DRaaS Guide_FinalEVault Technical DRaaS Guide_Final
EVault Technical DRaaS Guide_Final
 
Disaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an EmergencyDisaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an Emergency
 
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and ResilienceMastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
 
Plate Spin Disaster Recovery Solution
Plate Spin Disaster Recovery SolutionPlate Spin Disaster Recovery Solution
Plate Spin Disaster Recovery Solution
 
Disaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the differenceDisaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the difference
 
DRaaS vs. On-Prem DR Appliance: Which is Right for You?
DRaaS vs. On-Prem DR Appliance: Which is Right for You?DRaaS vs. On-Prem DR Appliance: Which is Right for You?
DRaaS vs. On-Prem DR Appliance: Which is Right for You?
 
IBM PROTECTIER: FROM BACKUP TO RECOVERY
IBM PROTECTIER: FROM BACKUP TO RECOVERYIBM PROTECTIER: FROM BACKUP TO RECOVERY
IBM PROTECTIER: FROM BACKUP TO RECOVERY
 

More from Bluelock

How to Establish and Maintain a Disaster Recovery Program
How to Establish and Maintain a Disaster Recovery ProgramHow to Establish and Maintain a Disaster Recovery Program
How to Establish and Maintain a Disaster Recovery ProgramBluelock
 
Biggest Security Breach Concerns
Biggest Security Breach ConcernsBiggest Security Breach Concerns
Biggest Security Breach ConcernsBluelock
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataBluelock
 
2014 July Webinar Modern DR Workshop
2014 July Webinar Modern DR Workshop2014 July Webinar Modern DR Workshop
2014 July Webinar Modern DR WorkshopBluelock
 
DECA Financial Services Reduces DR Costs by More Than 50%
DECA Financial Services Reduces DR Costs by More Than 50%DECA Financial Services Reduces DR Costs by More Than 50%
DECA Financial Services Reduces DR Costs by More Than 50%Bluelock
 
Recovery as a Service Technical Deep Dive
Recovery as a Service Technical Deep DiveRecovery as a Service Technical Deep Dive
Recovery as a Service Technical Deep DiveBluelock
 
How to Budget for Cloud-Based Disaster Recovery
How to Budget for Cloud-Based Disaster RecoveryHow to Budget for Cloud-Based Disaster Recovery
How to Budget for Cloud-Based Disaster RecoveryBluelock
 
Protect Your Data and Apps from Zombies and Other Disasters
Protect Your Data and Apps from Zombies and Other DisastersProtect Your Data and Apps from Zombies and Other Disasters
Protect Your Data and Apps from Zombies and Other DisastersBluelock
 
Benefits and Advantages of Cloud Infrastructure as a Service
Benefits and Advantages of Cloud Infrastructure as a ServiceBenefits and Advantages of Cloud Infrastructure as a Service
Benefits and Advantages of Cloud Infrastructure as a ServiceBluelock
 
Top 10 Recovery as-a-Service Questions Answered
Top 10 Recovery as-a-Service Questions AnsweredTop 10 Recovery as-a-Service Questions Answered
Top 10 Recovery as-a-Service Questions AnsweredBluelock
 
Deep Dive into Disaster Recovery in the Cloud
Deep Dive into Disaster Recovery in the CloudDeep Dive into Disaster Recovery in the Cloud
Deep Dive into Disaster Recovery in the CloudBluelock
 
How to Implement Disaster Recovery in the Cloud
How to Implement Disaster Recovery in the CloudHow to Implement Disaster Recovery in the Cloud
How to Implement Disaster Recovery in the CloudBluelock
 
How to Plan and Budget for 2013 with Cloud in Mind
How to Plan and Budget for 2013 with Cloud in MindHow to Plan and Budget for 2013 with Cloud in Mind
How to Plan and Budget for 2013 with Cloud in MindBluelock
 
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid CloudsDoes Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid CloudsBluelock
 

More from Bluelock (14)

How to Establish and Maintain a Disaster Recovery Program
How to Establish and Maintain a Disaster Recovery ProgramHow to Establish and Maintain a Disaster Recovery Program
How to Establish and Maintain a Disaster Recovery Program
 
Biggest Security Breach Concerns
Biggest Security Breach ConcernsBiggest Security Breach Concerns
Biggest Security Breach Concerns
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
 
2014 July Webinar Modern DR Workshop
2014 July Webinar Modern DR Workshop2014 July Webinar Modern DR Workshop
2014 July Webinar Modern DR Workshop
 
DECA Financial Services Reduces DR Costs by More Than 50%
DECA Financial Services Reduces DR Costs by More Than 50%DECA Financial Services Reduces DR Costs by More Than 50%
DECA Financial Services Reduces DR Costs by More Than 50%
 
Recovery as a Service Technical Deep Dive
Recovery as a Service Technical Deep DiveRecovery as a Service Technical Deep Dive
Recovery as a Service Technical Deep Dive
 
How to Budget for Cloud-Based Disaster Recovery
How to Budget for Cloud-Based Disaster RecoveryHow to Budget for Cloud-Based Disaster Recovery
How to Budget for Cloud-Based Disaster Recovery
 
Protect Your Data and Apps from Zombies and Other Disasters
Protect Your Data and Apps from Zombies and Other DisastersProtect Your Data and Apps from Zombies and Other Disasters
Protect Your Data and Apps from Zombies and Other Disasters
 
Benefits and Advantages of Cloud Infrastructure as a Service
Benefits and Advantages of Cloud Infrastructure as a ServiceBenefits and Advantages of Cloud Infrastructure as a Service
Benefits and Advantages of Cloud Infrastructure as a Service
 
Top 10 Recovery as-a-Service Questions Answered
Top 10 Recovery as-a-Service Questions AnsweredTop 10 Recovery as-a-Service Questions Answered
Top 10 Recovery as-a-Service Questions Answered
 
Deep Dive into Disaster Recovery in the Cloud
Deep Dive into Disaster Recovery in the CloudDeep Dive into Disaster Recovery in the Cloud
Deep Dive into Disaster Recovery in the Cloud
 
How to Implement Disaster Recovery in the Cloud
How to Implement Disaster Recovery in the CloudHow to Implement Disaster Recovery in the Cloud
How to Implement Disaster Recovery in the Cloud
 
How to Plan and Budget for 2013 with Cloud in Mind
How to Plan and Budget for 2013 with Cloud in MindHow to Plan and Budget for 2013 with Cloud in Mind
How to Plan and Budget for 2013 with Cloud in Mind
 
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid CloudsDoes Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
 

Recently uploaded

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Bluelock's Comprehensive Guide to Disaster Recovery Solutions

  • 1. 1 Bluelock’s Recovery Suite a comprehensive guide to
  • 2. 2 The Key to Disaster Recovery The key to a high-performing IT disaster recovery plan is having the right mix of solutions to achieve your organization’s need for speedy recovery and maximum value. Bluelock has architected a suite of Disaster Recovery-as-a-Service solutions to help organizations achieve their ultimate goal of IT service availability and data protection. In addition to aligning your recovery objectives to the proper technological capabilities, processes play a major role in an organization’s ability to recover with confidence. That’s why Bluelock works with clients to set the most accurate expectations for stakeholders, using a concept called True RTO™ and a plan that fac- tors in people, process and technology dependencies called Recovery Waves™.
  • 3. Inside This Guide: How to Read This Guide....................................................................................................4 Bluelock Solutions................................................................................................................5 IaaS (Active/Active)...............................................................................................................6 DRaaS Run™ (Active/Passive).............................................................................................7 (Active/Passive with Scale Out)...............................................................................8 (Always-On Recovery)................................................................................................9 DRaaS Ready™ (Real-Time Replication).........................................................................10 DRaaS Restore™ (Backup-Based Replication)...............................................................11 Bluelock Solution Partners................................................................................................12 What is TrueRTO™?...............................................................................................................13 Two Interpretations of RTO.......................................................................................14 Recovery Waves....................................................................................................................15 Recovery Waves Diagram.........................................................................................16
  • 4. 4 Color Key The following colors, or temperatures, refer to the relative speed of each recovery solution. Fastest Slowest Hot Warm Cold
  • 5. 5 Bluelock Solutions Solutions can be architected for physical or virtual machines in private or public cloud environments
  • 6. 6 IaaS (Active/Active) Recovery Process Traffic automatically swings to another zone immediately upon disruption True RTO™: Zero Fastest Slowest 50% Zone 1 50% Zone 2 Load balancing 0 RPO / 0 RTO Sample use case: A company relies on uptime as its primary success metric for customers who need access to service at any time, from anywhere. In order to deliver on this promise, the company leverages an active/active infrastructure which balances their traffic load between two identical sites. In the event of a service disruption to either side, each site could handle the full traffic if needed. This set-up also allows for maintenance to occur to either side when needed, so service to customers isn’t disrupted and uptime is maintained.
  • 7. 7 Fastest Slowest DRaaS Run™ (Active/Passive) Recovery Process Start application True RTO™: Seconds to minutes Full Production Source Site Target Site App-aware or native replication 0 RPO, transaction-consistent Sample use case: A company’s Active Directory (AD) server is a top priority in the event of a declaration because without a connection to the AD server, their machines won’t boot and their Quality Assurance teams won’t have permission to validate recovery. A fully provisioned, always-running replica provides the foundation for immediate failover and fast recovery for the rest of the systems.
  • 8. 8 DRaaS Run™ (Active/Passive with Scale Out) Recovery Process Clone machines Start application Boot clones Start application on clones Fastest Slowest True RTO™: Minutes, dependent on cloning process & machine size Full Production Source Site Target Site Production Replica for Cloning + + + + + + App-aware or native replication 0 RPO, transaction-consistent Seconds RTO for production replica Sample use case: Without a consistent online presence, a web-based company cannot conduct business or gain revenue. While it may run using between 5 and 10 web and application servers in production, the company wants more economical protection for their site without giving up confidence. By maintaining a set of web and application servers at the recovery site and replicating their database using native database replication, their environment can begin taking load immediately upon primary site failure.
  • 9. 9 Fastest Slowest DRaaS Run™ (Always-On Recovery) Recovery Process Transfer traffic to headend True RTO™: Seconds for headend, recovery time for full production is dependent on recovery tier selected Full Production Source Site Target Site Security & Network Headend Security & Network Headend App-aware or native replication 0 RPO / seconds RTO Target Site for headend, transaction-consistent Sample use case: A company with large amounts of sensitive data needs its security and network headend applications at the recovery site to be constantly synchronized with the production site in an always running state. This ensures its dependent applications can return to service more quickly upon disruption. By leveraging Always-On Recovery, the business remains protected from threats at both sites and removes the need to wait on updates and boot time for the most critical portion of its recovery environment.
  • 10. 10 Fastest Slowest DRaaS Ready™ (Real-Time Replication) Recovery Process Boot VMs Start application Swing traffic True RTO™: 4 hours or less for full environment Full Production Source Site Target Site Replica in Protection Groups Crash-consistent Tune RPOs to seconds RTO of minutes per VM, hours or less for full environment Sample use case: A company must have a point-of-sale application running at all of their retail locations so that inventory, sales and customer information is up to date. By protecting this customer information in the cloud with real-time replication, applications can be restored in the cloud within minutes and full service is available within hours so that retail locations can continue to serve customers without losing business.
  • 11. 11 Fastest Slowest DRaaS Restore™ (Backup-Based Replication) Recovery Process Restore backup to production storage Boot VMs Start application True RTO™: 24 hours or less for full environment Full Production Source Site Target Site Archive Storage Point-in-time backup-based replication RPO of hours, based on frequency of backup schedule Can restore back to production site Sample use case: A company has a collection of non-urgent, business-supporting applications and files that don’t warrant immediate recovery, but still need to be protected nonetheless. As a low-cost alternative to more rapid recovery, the company can secure point-in-time backups in the cloud for faster access to data than if tapes had to be recalled from a physical location. Plus, the company can choose to restore their data within the cloud or back to their original site at the time of declaration.
  • 12. 12 Bluelock Solution Partners Bluelock leverages the following best-of-breed technologies to deliver our solutions. We also offer a unique process that allows our experts to tailor and deliver our solutions.
  • 13. 13 What is True RTO™? On a basic level, a recovery time objective (RTO) is the objective for the time it takes to re- cover. Bluelock is dedicated to the complete recovery of IT systems and what that means not just to an IT department, but to the rest of an organization and its constituents. For this reason, we refer to recovery times in terms of True RTO™. Two Interpretations of RTO Technical RTO In this case, RTO means the time it takes for infrastructure to be running and available for recovery. True RTO™ In this case, RTO means the time it takes for an application or system to become available and begin serving end users.
  • 14. 14 Two Interpretations of RTO (cont.) Security in place Validate security in place App dependencies are accurate Machines booted App owners confirm readiness to support end users Technical RTO typically stops here True RTO™ recovery time typically stops here Infrastructure running & available Apps started Data checked and accurate User network access available
  • 15. 15 Recovery Waves™ Recovery Waves™ emphasize people and process over technology. The technical part is faster than the people part, so Recovery Waves™ are a way to tier applications within your recovery tiers, taking into consideration dependencies and order of operations. Demonstrate which applications need to wait on others before returning to service. Set expectations about when applications will come back. Provide more detailed information on what will come back, and in what order - even within the same tier. Recovery Waves™ offer the following to the recovery process:
  • 16. 16 Network Recovery Tier 12 hrs Wave 1 Wave 2 True RTO 4 hrs True RTO 8 hrs True RTO < 24 hrs True RTO 48+ hrs Wave 3 Wave 4 24 hrs 36 hrs 48 hrs Tier 1 Tier 3 Tier 2 Recovery Waves™ Sample Diagram
  • 17. For more information on DRaaS Solutions, visit bluelock.com/solutions