SlideShare a Scribd company logo
Planning Ahead:
    Disaster Recovery / Business Continuity
        & Application/Service Availability

              A 360-Degree Approach




1
Outages Happen

                                            San Diego
                                            Thursday, September 8, 2011




Photo Credits: San Diego Union Tribune




2
Common Causes of Downtime
                                                                                                                     Source: Forester Research, Inc. 2007

 Risk/Cause of Disaster                                                % of Respondents who declared disasters
                             Power failure                                                                                                    42%
                      IT hardware failure                                                                                         31%

                           Network failure                                                               21%
                       IT software failure                                                16%
                              Human error                                                 16%

                                      Flood                                         12%

                                 Hurricane                                    10%

                                        Fire                        7%
                                                                  6%
                              Winter storm
                                  Terrorism                  4%

                               Earthquake                   3%

                                   Tornado             2%

                            Chemical spill       1%
          Have not declared a disaster                                                                         24%


                                                                                                                  Infrastructure               ManMade
 27% of respondents declared at least one disaster in the past five years                                       IT Specific- HW               Natural
                                                                                                                  IT Specific - SW             None
 42% of respondents indicated that a power failure was the cause of their most significant disruption
Reasons for Planning Ahead…
           High Expectations for High Availability
• Customers expect supplies and
  services will continue or resume
  rapidly in ALL situations
• Shareholders expect
  management control to remain
  operational throughout a crisis
• Suppliers expect revenue
  streams to continue
• Regulatory Agencies expect
  requirements to be met,
  regardless of circumstance
• Insurance Companies expect
  due care to be exercised

4
Benefits for Planning Ahead
           Protect
         Reputation &                      Reduce Cost
          Financial                          & Legal
         Performance                        Exposure

    Competitive           Protect Client
     Edge By              Relationships          Achieve
     Operating                 and              Regulatory
       24x7                Consumer             Compliance
                           Confidence


             Agility,                        Protect
          Flexibility &                     Revenue &
          Availability                     Market Share


5
Approaching the
    Disaster Recovery / Business Continuity
    & Application/Service Availability Problem




6
360 Protection – Five Essentials
Every business should have a plan that implements
all five to some degree.




7
360 Protection – Mapped Out




8
Physical Diversity
          Don't put all your eggs in one basket…
• Two (or more) physically separate locations
    – Far enough apart so a natural disaster doesn't
      affect all locations.




9
Network Availability
     Accessibility with routing alternatives…




10
Network Availability
        Accessibility with routing alternatives…
• Ideally your Internet traffic and IP addresses
  will be routed through the best paths, and in
  an emergency you will be able to terminate
  nonfunctional routes.




11
Network Availability
       Prepare for other hazards like DDoS attacks…
• Can be mitigated through
  proper planning and the
  use of Border Gateway
  Protocol (BGP) technology
  and communities.
     – These can tell the Internet
       where to route your traffic
       and can even help you take
       action against inbound
       attacks.

12
Data Archiving
               Get your data out of Dodge…

• Making sure your data is available offsite to
  help you resume operations
     – Traditional Approach: Backup Tapes
     – Alternate Approach: Leverage the Cloud




                        Restoring from Internet takes less time.




13
Data Replication
               Keeping data current…




• Private, long-haul optical links and MPLS
  backbone network provides high-performance,
  redundant connectivity between data centers.


  14
Application Failover
           Rapid, automatic and seamless…
• Ensuring that user sessions can be
  efficiently directed to a secondary site with
  minimal interruption.




15
Application Failover

• e-High Availability
     – Customized
       failure detection
     – Traffic redirection
       across two or
       more locations


• Global Load Balancers
     – Ensure no perceived down time


16
The 360 Approach
     The Payoff: Sleep easier at night…




17
How AIS Can Help…

• Disaster Recovery Quick Start Package
• Disaster Recover/Business Continuity
  Toolbox
• AIS ProServices Consultation Sessions




18
AIS DR/BC Quick Start Package




19
AIS DR/BC Quick Start Package
           Quickly establish remote site…
• 1/3 private rack (14ru) in the AIS Van Buren
  (Phoenix) data center
• Redundant (A+B) power circuits with dedicated
  power distribution units (PDU)
• Automatic Transfer Switch for single-powered
  devices
• 1 Mbps of premium bandwidth with eight IP
  addresses
• Initial AIS ProServices consultation session
• Remote hands technical assistance

20
AIS DR/BC Toolbox

•    Geographic Diversity
•    Critical Systems Infrastructure
•    Private Optical Network
•    HA/BC Infrastructure
•    Technical Expertise




21
AIS DR/BC Methodology
     This approach ensures consistency and effectiveness.




22
About American Internet Services (AIS)

• We are enterprise-class data center and connectivity
  company with premium footprints in three geographic
  locations: Los Angeles, San Diego and Phoenix.
   – We provide colocation, managed, and network
     services.
   – 24x7: Resources are always available when you
     need them.
   – We are privately held, backed by Seaport Capital,
     Viridian Investments, and DuPont Capital
     Management.


23
We are a call or click away…

• www.americanis.net
• 866-971-2656




24

More Related Content

What's hot

First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
Phil Huggins FBCS CITP
 
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
Hastily Formed Networks (HFN) at the Waldo Canyon FireHastily Formed Networks (HFN) at the Waldo Canyon Fire
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
Rakesh Bharania
 
Malicious Software Prevention for NERC CIP-007 Compliance:
Malicious Software Prevention for NERC CIP-007 Compliance:Malicious Software Prevention for NERC CIP-007 Compliance:
Malicious Software Prevention for NERC CIP-007 Compliance:
CoreTrace Corporation
 
Feldman-Encari: Malicious Software Prevention For NERC CIP-007 Compliance
Feldman-Encari: Malicious Software Prevention For NERC CIP-007 ComplianceFeldman-Encari: Malicious Software Prevention For NERC CIP-007 Compliance
Feldman-Encari: Malicious Software Prevention For NERC CIP-007 Compliance
CoreTrace Corporation
 
Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction
Dragos, Inc.
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec
 
All clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equalAll clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equal
Nicholas Cramer
 
Stream 2 - Don't Risk IT
Stream 2 - Don't Risk ITStream 2 - Don't Risk IT
Stream 2 - Don't Risk IT
IBM Business Insight
 
Howe Brand, smart security grid risks
Howe Brand, smart security grid risksHowe Brand, smart security grid risks
Howe Brand, smart security grid risks
Gavan Howe
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014
Ricardo Resnik
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
EnergySec
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
EnergySec
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
EnergySec
 
Securing Humanitarian Connectivity
Securing Humanitarian ConnectivitySecuring Humanitarian Connectivity
Securing Humanitarian Connectivity
Cisco Crisis Response
 
Cybersecurity infographic
Cybersecurity infographicCybersecurity infographic
Cybersecurity infographic
CSC Australia
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
EnergySec
 
Retail Loss Prevention Summit V1.0
Retail Loss Prevention Summit V1.0Retail Loss Prevention Summit V1.0
Retail Loss Prevention Summit V1.0
chris_carter_brennan01
 
Attackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the EquilibriumAttackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the Equilibrium
Radware
 
World-Class Incident Response Management
World-Class Incident Response ManagementWorld-Class Incident Response Management
World-Class Incident Response Management
Keith Smith
 
Why Government & Corporate Cyber Programmes are Failing
Why Government & Corporate Cyber Programmes are Failing Why Government & Corporate Cyber Programmes are Failing
Why Government & Corporate Cyber Programmes are Failing
c0c0n - International Cyber Security and Policing Conference
 

What's hot (20)

First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
 
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
Hastily Formed Networks (HFN) at the Waldo Canyon FireHastily Formed Networks (HFN) at the Waldo Canyon Fire
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
 
Malicious Software Prevention for NERC CIP-007 Compliance:
Malicious Software Prevention for NERC CIP-007 Compliance:Malicious Software Prevention for NERC CIP-007 Compliance:
Malicious Software Prevention for NERC CIP-007 Compliance:
 
Feldman-Encari: Malicious Software Prevention For NERC CIP-007 Compliance
Feldman-Encari: Malicious Software Prevention For NERC CIP-007 ComplianceFeldman-Encari: Malicious Software Prevention For NERC CIP-007 Compliance
Feldman-Encari: Malicious Software Prevention For NERC CIP-007 Compliance
 
Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
All clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equalAll clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equal
 
Stream 2 - Don't Risk IT
Stream 2 - Don't Risk ITStream 2 - Don't Risk IT
Stream 2 - Don't Risk IT
 
Howe Brand, smart security grid risks
Howe Brand, smart security grid risksHowe Brand, smart security grid risks
Howe Brand, smart security grid risks
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
 
Securing Humanitarian Connectivity
Securing Humanitarian ConnectivitySecuring Humanitarian Connectivity
Securing Humanitarian Connectivity
 
Cybersecurity infographic
Cybersecurity infographicCybersecurity infographic
Cybersecurity infographic
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Retail Loss Prevention Summit V1.0
Retail Loss Prevention Summit V1.0Retail Loss Prevention Summit V1.0
Retail Loss Prevention Summit V1.0
 
Attackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the EquilibriumAttackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the Equilibrium
 
World-Class Incident Response Management
World-Class Incident Response ManagementWorld-Class Incident Response Management
World-Class Incident Response Management
 
Why Government & Corporate Cyber Programmes are Failing
Why Government & Corporate Cyber Programmes are Failing Why Government & Corporate Cyber Programmes are Failing
Why Government & Corporate Cyber Programmes are Failing
 

Viewers also liked

Firstcomm construction of a DR plan
Firstcomm construction of a DR planFirstcomm construction of a DR plan
Firstcomm construction of a DR plan
Cloudnition Web Development & Online Marketing
 
Construction of a Disaster Recovery Plan with Business Only Broadband
Construction of a Disaster Recovery Plan with Business Only BroadbandConstruction of a Disaster Recovery Plan with Business Only Broadband
Construction of a Disaster Recovery Plan with Business Only Broadband
Cloudnition Web Development & Online Marketing
 
John Bibby
John BibbyJohn Bibby
John Bibby
HelenGraham
 
Disaster Recovery Planning
Disaster Recovery Planning   Disaster Recovery Planning
Disaster Recovery Planning
Keystone IT
 
Cloudnition dr plan template fillable form
Cloudnition dr plan template fillable formCloudnition dr plan template fillable form
Cloudnition dr plan template fillable form
Cloudnition Web Development & Online Marketing
 
Document the drp now
Document the drp nowDocument the drp now
Document the drp now
Info-Tech Research Group
 

Viewers also liked (6)

Firstcomm construction of a DR plan
Firstcomm construction of a DR planFirstcomm construction of a DR plan
Firstcomm construction of a DR plan
 
Construction of a Disaster Recovery Plan with Business Only Broadband
Construction of a Disaster Recovery Plan with Business Only BroadbandConstruction of a Disaster Recovery Plan with Business Only Broadband
Construction of a Disaster Recovery Plan with Business Only Broadband
 
John Bibby
John BibbyJohn Bibby
John Bibby
 
Disaster Recovery Planning
Disaster Recovery Planning   Disaster Recovery Planning
Disaster Recovery Planning
 
Cloudnition dr plan template fillable form
Cloudnition dr plan template fillable formCloudnition dr plan template fillable form
Cloudnition dr plan template fillable form
 
Document the drp now
Document the drp nowDocument the drp now
Document the drp now
 

Similar to 360-Degree Approach to DR / BC

Rethinking Disaster Prepardness THEITS12
Rethinking Disaster Prepardness THEITS12Rethinking Disaster Prepardness THEITS12
Rethinking Disaster Prepardness THEITS12
Thomas Danford
 
Business Meets IT presentation: Business Continuity
Business Meets IT presentation: Business ContinuityBusiness Meets IT presentation: Business Continuity
Business Meets IT presentation: Business Continuity
William Visterin
 
Symantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery StudySymantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery Study
Symantec
 
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
HKISPA
 
Effecientip DNS security.pdf
Effecientip DNS security.pdfEffecientip DNS security.pdf
Effecientip DNS security.pdf
neoalt
 
Data growth-protection-trends-research-results
Data growth-protection-trends-research-resultsData growth-protection-trends-research-results
Data growth-protection-trends-research-results
Accenture
 
Business Continuity Vulnerability Index
Business Continuity Vulnerability IndexBusiness Continuity Vulnerability Index
Business Continuity Vulnerability Index
continuity
 
ZENDAL BACKUP
ZENDAL BACKUPZENDAL BACKUP
What makes the large enterprise network management, large
What makes the large enterprise network management, largeWhat makes the large enterprise network management, large
What makes the large enterprise network management, large
ManageEngine, Zoho Corporation
 
After the Catastrophe: IP Resiliency In the Post-Disaster Environment
After the Catastrophe: IP Resiliency In the Post-Disaster Environment After the Catastrophe: IP Resiliency In the Post-Disaster Environment
After the Catastrophe: IP Resiliency In the Post-Disaster Environment
Cisco Crisis Response
 
ClinicalGradeMobileHealth mHIseminar.Beaulieu
ClinicalGradeMobileHealth mHIseminar.BeaulieuClinicalGradeMobileHealth mHIseminar.Beaulieu
ClinicalGradeMobileHealth mHIseminar.Beaulieu
mHealth Initiative
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
Carahsoft
 
Avr presentation
Avr   presentationAvr   presentation
Avr_presentation
Avr_presentationAvr_presentation
Avr_presentation
Pakky .
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud Security
InnoTech
 
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
NextVision Media
 
Virtualization and Workforce Continuity 10-12-12
Virtualization and Workforce Continuity 10-12-12Virtualization and Workforce Continuity 10-12-12
Virtualization and Workforce Continuity 10-12-12
mjamesvoyss
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
finance40
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYOD
stefriche0199
 

Similar to 360-Degree Approach to DR / BC (20)

Rethinking Disaster Prepardness THEITS12
Rethinking Disaster Prepardness THEITS12Rethinking Disaster Prepardness THEITS12
Rethinking Disaster Prepardness THEITS12
 
Business Meets IT presentation: Business Continuity
Business Meets IT presentation: Business ContinuityBusiness Meets IT presentation: Business Continuity
Business Meets IT presentation: Business Continuity
 
Symantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery StudySymantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery Study
 
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
 
Effecientip DNS security.pdf
Effecientip DNS security.pdfEffecientip DNS security.pdf
Effecientip DNS security.pdf
 
Data growth-protection-trends-research-results
Data growth-protection-trends-research-resultsData growth-protection-trends-research-results
Data growth-protection-trends-research-results
 
We present Bugscout
We present BugscoutWe present Bugscout
We present Bugscout
 
Business Continuity Vulnerability Index
Business Continuity Vulnerability IndexBusiness Continuity Vulnerability Index
Business Continuity Vulnerability Index
 
ZENDAL BACKUP
ZENDAL BACKUPZENDAL BACKUP
ZENDAL BACKUP
 
What makes the large enterprise network management, large
What makes the large enterprise network management, largeWhat makes the large enterprise network management, large
What makes the large enterprise network management, large
 
After the Catastrophe: IP Resiliency In the Post-Disaster Environment
After the Catastrophe: IP Resiliency In the Post-Disaster Environment After the Catastrophe: IP Resiliency In the Post-Disaster Environment
After the Catastrophe: IP Resiliency In the Post-Disaster Environment
 
ClinicalGradeMobileHealth mHIseminar.Beaulieu
ClinicalGradeMobileHealth mHIseminar.BeaulieuClinicalGradeMobileHealth mHIseminar.Beaulieu
ClinicalGradeMobileHealth mHIseminar.Beaulieu
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
Avr presentation
Avr   presentationAvr   presentation
Avr presentation
 
Avr_presentation
Avr_presentationAvr_presentation
Avr_presentation
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud Security
 
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
 
Virtualization and Workforce Continuity 10-12-12
Virtualization and Workforce Continuity 10-12-12Virtualization and Workforce Continuity 10-12-12
Virtualization and Workforce Continuity 10-12-12
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYOD
 

More from AISDC

AIS Client Portal Overview
AIS Client Portal OverviewAIS Client Portal Overview
AIS Client Portal Overview
AISDC
 
Moss Adams SSAE 16 SOC Audits
Moss Adams SSAE 16 SOC AuditsMoss Adams SSAE 16 SOC Audits
Moss Adams SSAE 16 SOC Audits
AISDC
 
AIS Company Overview
AIS Company OverviewAIS Company Overview
AIS Company Overview
AISDC
 
Introducing AIS BusinessCloud1
Introducing AIS BusinessCloud1Introducing AIS BusinessCloud1
Introducing AIS BusinessCloud1
AISDC
 
7 Essentials of AIS BusinessCloud1
7 Essentials of AIS BusinessCloud17 Essentials of AIS BusinessCloud1
7 Essentials of AIS BusinessCloud1
AISDC
 
The 7 Essential Features of AIS vCloudOne
The 7 Essential Features of AIS vCloudOneThe 7 Essential Features of AIS vCloudOne
The 7 Essential Features of AIS vCloudOne
AISDC
 
The 7 Essentials of AIS CloudOne
The 7 Essentials of AIS CloudOneThe 7 Essentials of AIS CloudOne
The 7 Essentials of AIS CloudOne
AISDC
 
AIS e-High Availability (e-HA)
AIS e-High Availability (e-HA)AIS e-High Availability (e-HA)
AIS e-High Availability (e-HA)
AISDC
 
AIS DIsaster Recovery & Business Continuity
AIS DIsaster Recovery & Business ContinuityAIS DIsaster Recovery & Business Continuity
AIS DIsaster Recovery & Business Continuity
AISDC
 
Overview of AIS e-ManagedSecurity
Overview of AIS e-ManagedSecurityOverview of AIS e-ManagedSecurity
Overview of AIS e-ManagedSecurity
AISDC
 

More from AISDC (10)

AIS Client Portal Overview
AIS Client Portal OverviewAIS Client Portal Overview
AIS Client Portal Overview
 
Moss Adams SSAE 16 SOC Audits
Moss Adams SSAE 16 SOC AuditsMoss Adams SSAE 16 SOC Audits
Moss Adams SSAE 16 SOC Audits
 
AIS Company Overview
AIS Company OverviewAIS Company Overview
AIS Company Overview
 
Introducing AIS BusinessCloud1
Introducing AIS BusinessCloud1Introducing AIS BusinessCloud1
Introducing AIS BusinessCloud1
 
7 Essentials of AIS BusinessCloud1
7 Essentials of AIS BusinessCloud17 Essentials of AIS BusinessCloud1
7 Essentials of AIS BusinessCloud1
 
The 7 Essential Features of AIS vCloudOne
The 7 Essential Features of AIS vCloudOneThe 7 Essential Features of AIS vCloudOne
The 7 Essential Features of AIS vCloudOne
 
The 7 Essentials of AIS CloudOne
The 7 Essentials of AIS CloudOneThe 7 Essentials of AIS CloudOne
The 7 Essentials of AIS CloudOne
 
AIS e-High Availability (e-HA)
AIS e-High Availability (e-HA)AIS e-High Availability (e-HA)
AIS e-High Availability (e-HA)
 
AIS DIsaster Recovery & Business Continuity
AIS DIsaster Recovery & Business ContinuityAIS DIsaster Recovery & Business Continuity
AIS DIsaster Recovery & Business Continuity
 
Overview of AIS e-ManagedSecurity
Overview of AIS e-ManagedSecurityOverview of AIS e-ManagedSecurity
Overview of AIS e-ManagedSecurity
 

Recently uploaded

Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

360-Degree Approach to DR / BC

  • 1. Planning Ahead: Disaster Recovery / Business Continuity & Application/Service Availability A 360-Degree Approach 1
  • 2. Outages Happen San Diego Thursday, September 8, 2011 Photo Credits: San Diego Union Tribune 2
  • 3. Common Causes of Downtime Source: Forester Research, Inc. 2007 Risk/Cause of Disaster % of Respondents who declared disasters Power failure 42% IT hardware failure 31% Network failure 21% IT software failure 16% Human error 16% Flood 12% Hurricane 10% Fire 7% 6% Winter storm Terrorism 4% Earthquake 3% Tornado 2% Chemical spill 1% Have not declared a disaster 24% Infrastructure ManMade  27% of respondents declared at least one disaster in the past five years IT Specific- HW Natural IT Specific - SW None  42% of respondents indicated that a power failure was the cause of their most significant disruption
  • 4. Reasons for Planning Ahead… High Expectations for High Availability • Customers expect supplies and services will continue or resume rapidly in ALL situations • Shareholders expect management control to remain operational throughout a crisis • Suppliers expect revenue streams to continue • Regulatory Agencies expect requirements to be met, regardless of circumstance • Insurance Companies expect due care to be exercised 4
  • 5. Benefits for Planning Ahead Protect Reputation & Reduce Cost Financial & Legal Performance Exposure Competitive Protect Client Edge By Relationships Achieve Operating and Regulatory 24x7 Consumer Compliance Confidence Agility, Protect Flexibility & Revenue & Availability Market Share 5
  • 6. Approaching the Disaster Recovery / Business Continuity & Application/Service Availability Problem 6
  • 7. 360 Protection – Five Essentials Every business should have a plan that implements all five to some degree. 7
  • 8. 360 Protection – Mapped Out 8
  • 9. Physical Diversity Don't put all your eggs in one basket… • Two (or more) physically separate locations – Far enough apart so a natural disaster doesn't affect all locations. 9
  • 10. Network Availability Accessibility with routing alternatives… 10
  • 11. Network Availability Accessibility with routing alternatives… • Ideally your Internet traffic and IP addresses will be routed through the best paths, and in an emergency you will be able to terminate nonfunctional routes. 11
  • 12. Network Availability Prepare for other hazards like DDoS attacks… • Can be mitigated through proper planning and the use of Border Gateway Protocol (BGP) technology and communities. – These can tell the Internet where to route your traffic and can even help you take action against inbound attacks. 12
  • 13. Data Archiving Get your data out of Dodge… • Making sure your data is available offsite to help you resume operations – Traditional Approach: Backup Tapes – Alternate Approach: Leverage the Cloud Restoring from Internet takes less time. 13
  • 14. Data Replication Keeping data current… • Private, long-haul optical links and MPLS backbone network provides high-performance, redundant connectivity between data centers. 14
  • 15. Application Failover Rapid, automatic and seamless… • Ensuring that user sessions can be efficiently directed to a secondary site with minimal interruption. 15
  • 16. Application Failover • e-High Availability – Customized failure detection – Traffic redirection across two or more locations • Global Load Balancers – Ensure no perceived down time 16
  • 17. The 360 Approach The Payoff: Sleep easier at night… 17
  • 18. How AIS Can Help… • Disaster Recovery Quick Start Package • Disaster Recover/Business Continuity Toolbox • AIS ProServices Consultation Sessions 18
  • 19. AIS DR/BC Quick Start Package 19
  • 20. AIS DR/BC Quick Start Package Quickly establish remote site… • 1/3 private rack (14ru) in the AIS Van Buren (Phoenix) data center • Redundant (A+B) power circuits with dedicated power distribution units (PDU) • Automatic Transfer Switch for single-powered devices • 1 Mbps of premium bandwidth with eight IP addresses • Initial AIS ProServices consultation session • Remote hands technical assistance 20
  • 21. AIS DR/BC Toolbox • Geographic Diversity • Critical Systems Infrastructure • Private Optical Network • HA/BC Infrastructure • Technical Expertise 21
  • 22. AIS DR/BC Methodology This approach ensures consistency and effectiveness. 22
  • 23. About American Internet Services (AIS) • We are enterprise-class data center and connectivity company with premium footprints in three geographic locations: Los Angeles, San Diego and Phoenix. – We provide colocation, managed, and network services. – 24x7: Resources are always available when you need them. – We are privately held, backed by Seaport Capital, Viridian Investments, and DuPont Capital Management. 23
  • 24. We are a call or click away… • www.americanis.net • 866-971-2656 24

Editor's Notes

  1. Not every business needs to invest in top-of-the-line systems for each of the five principles; the level of protection needed will vary depending on the needs of each individual business, but every business needs to have a plan that implements all five to some degree.
  2. White boarded out – this is how it looks.
  3. Don't put all your eggs in one basket.
  4. We're sorry, but all circuits are busy... Do you have a plan for your IP addresses?
  5. Get your data out of Dodge: You need a plan for ensuring that your data is available offsite to help you resume operations. For a faster response, there are a number of offsite data archiving services that leverage the cloud to create secure, online repositories for large amounts of data. They may even allow you to store your data in multiple locations around the globe and include data integrity checking. In the event of a disaster, you can restore your data directly from the Internet to your alternative data center in less time than the traditional method of shipping physical back-ups.
  6. They can't get us all: You need to continuously replicate data between facilities to keep your data as current as possible.
  7. Don't drop the baton.
  8. e-High Availability capabilities, which provide customized failure detection and traffic redirection across two or more physical locations. Each of our global load balancers is located in a separate, fully autonomous data center and is continually checking the health of the customer application to ensure the end-user perceives no downtime and only minimal delays. Our e-High Availability devices direct traffic to the appropriate web servers by using enhanced DNS, directing traffic to the "appropriate" we server.
  9. Don't put all your eggs in one basket.
  10. Don't put all your eggs in one basket.
  11. Don't put all your eggs in one basket.
  12. Don't put all your eggs in one basket.