VEEAM Backup & Replication vs. StarWind Virtual SAN: Business Continuity and Disaster Recovery Run Entirely by RTO / RPO Numbers
Find out how to pick the right tools to meet the business continuity challenges and take full control of your RTO and RPO.
You are welcomed to watch the webcast based on this slide presentation: http://www.starwindsoftware.com/veeam-backup-and-replication-vs-starwind-virtual-san-video
When assessing backup software vendors, IT leaders must avoid being taken in by flashy new features. Backup software should really be called restore software as failure in backup is failure to meet recovery objectives. Always evaluate features in light of these objectives.
Use this research to:
•Understand new features and develop a strategy to meet new challenges to enterprise backup, such as ever-increasing backup sizes, backup of virtual infrastructures, and evolving backup architecture strategy.
•Evaluate eight different backup software vendors for best fit using Info-Tech’s Vendor Landscape.
•Use Info-Tech’s scenario analysis to shortlist vendors according to your current situation and submit an RFP to vendors, score their responses, and prepare a backup software demo script.
•Assess implementation pitfalls in light of overall data management, security, and compliance requirements.
Ensure that you make the best-fit backup software decisions for enterprise availability and restore requirements, from strategy to selection to implementation.
When planning for Disaster Recovery it is essential to have a clearly defined set of objectives that are based on your businesses needs .InTechnology's Product Director for Data & Cloud Services, Stefan Haase, provides tips for any business to consider when putting together their disaster recovery plan. http://www.intechnology.co.uk/resource-centre/webcast-disaster-recovery-planning.aspx
Recorded webinar presentation. E xigent Technologies of Mount Arlington, NJ / Manhattan, NY. "Managed Backup & Disaster Recovery service for Small Business".
PREVENT Webinar is hosted by Exigent Technologies President, Dan Haurey. March 3, 2009, 10:00AM.
VEEAM Backup & Replication vs. StarWind Virtual SAN: Business Continuity and Disaster Recovery Run Entirely by RTO / RPO Numbers
Find out how to pick the right tools to meet the business continuity challenges and take full control of your RTO and RPO.
You are welcomed to watch the webcast based on this slide presentation: http://www.starwindsoftware.com/veeam-backup-and-replication-vs-starwind-virtual-san-video
When assessing backup software vendors, IT leaders must avoid being taken in by flashy new features. Backup software should really be called restore software as failure in backup is failure to meet recovery objectives. Always evaluate features in light of these objectives.
Use this research to:
•Understand new features and develop a strategy to meet new challenges to enterprise backup, such as ever-increasing backup sizes, backup of virtual infrastructures, and evolving backup architecture strategy.
•Evaluate eight different backup software vendors for best fit using Info-Tech’s Vendor Landscape.
•Use Info-Tech’s scenario analysis to shortlist vendors according to your current situation and submit an RFP to vendors, score their responses, and prepare a backup software demo script.
•Assess implementation pitfalls in light of overall data management, security, and compliance requirements.
Ensure that you make the best-fit backup software decisions for enterprise availability and restore requirements, from strategy to selection to implementation.
When planning for Disaster Recovery it is essential to have a clearly defined set of objectives that are based on your businesses needs .InTechnology's Product Director for Data & Cloud Services, Stefan Haase, provides tips for any business to consider when putting together their disaster recovery plan. http://www.intechnology.co.uk/resource-centre/webcast-disaster-recovery-planning.aspx
Recorded webinar presentation. E xigent Technologies of Mount Arlington, NJ / Manhattan, NY. "Managed Backup & Disaster Recovery service for Small Business".
PREVENT Webinar is hosted by Exigent Technologies President, Dan Haurey. March 3, 2009, 10:00AM.
A closer quick understanding of different backup technologies and pros and cons backup & recovery,ntbackup,types of backups, windows backup path so far, differential backup, incremental backup, full backup, mirror backup. If you have have anyqueries please contact me at jabvtl@gmail.com
Great overview of how businesses can plan and be prepared for disasters so that they can minimize cost and downtime. This Powerpoint presentation covers how to build a DR team, set recovery goals and objectives, identifying gaps, selecting technologies, and implementing and maintaining Disaster Recovery Processes. This Presentation also discusses Best Practices that companies should be using to protect themselves and their customers.
Power point presentation on backup and recovery.
A good presentation cover all topics.
For any other type of ppt's or pdf's to be created on demand contact -dhawalm8@gmail.com
mob. no-7023419969
Basic principles of backup policies by Andrea Mauro, Backup AcademyVeeam Software
In this new Backup Academy video our new professor Andrea Mauro (vExpert) explains in details:
- What is a backup policy
- Design a backup plan
- What defines a backup policy
- Where do backups go
- How will backups be performed
For more sessions and certification exam please visit http://www.backupacademy.com
A closer quick understanding of different backup technologies and pros and cons backup & recovery,ntbackup,types of backups, windows backup path so far, differential backup, incremental backup, full backup, mirror backup. If you have have anyqueries please contact me at jabvtl@gmail.com
Great overview of how businesses can plan and be prepared for disasters so that they can minimize cost and downtime. This Powerpoint presentation covers how to build a DR team, set recovery goals and objectives, identifying gaps, selecting technologies, and implementing and maintaining Disaster Recovery Processes. This Presentation also discusses Best Practices that companies should be using to protect themselves and their customers.
Power point presentation on backup and recovery.
A good presentation cover all topics.
For any other type of ppt's or pdf's to be created on demand contact -dhawalm8@gmail.com
mob. no-7023419969
Basic principles of backup policies by Andrea Mauro, Backup AcademyVeeam Software
In this new Backup Academy video our new professor Andrea Mauro (vExpert) explains in details:
- What is a backup policy
- Design a backup plan
- What defines a backup policy
- Where do backups go
- How will backups be performed
For more sessions and certification exam please visit http://www.backupacademy.com
Business continuity and disaster recovery are not the same but complement each other. Planning on BCP and DRP is necessary for all business. This slide contains information on how to achieve and maintain them.
Durant cette soirée, Stéphane Perroud aura le plaisir de partager avec vous ses compétences de praticien sur les différents aspects des risques à identifier et à évaluer, et vous montrera comment trouver des solutions pour rendre le business plus résilient. Il ne faut pas oublier que le but d’un PCA (plan de continuité d’activité) est d'accroître la robustesse du business en renforçant les dispositifs de prévention et de protection.
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseRapidScale
80% of companies that do not recover from a data loss within one month are likely to go out of business in the immediate future (Bernstein Crisis Management). With Disaster Recovery and Business Continuity, a business is able to survive and thrive after a disaster has struck.
BACK FROM THE EDGE: INFRASTRUCTURE PROTECTION THROUGH PLATESPINMicro Focus
Stuff happens and every organization needs effective
disaster recovery plans for key IT infrastructure
components. Doing nothing is not an option, clustering
is not cost-effective for all workloads, and tape
backups just take too long to restore. So what are
your options? In this session we’ll take a look at how
virtualization technology can help fill the gap with costeffective
recovery of important server workloads.
When it comes to backup and recovery, backup performance numbers rule the roost. It’s understandable really: far more data gets backed up than ever gets restored, and backup length is one of most difficult problems facing administrators today. But a reliance on backup numbers alone is dangerous. Recovery may not happen as frequently as daily backup but recovery is the entire reason for backup. Backing up because everyone does it isn’t good enough.
In this presentation, CloudSmartz presented the Buffalo, NY Region of CIO and IT Executives recent trends on disaster recovery and business resilience.
This was great opportunity to learn and discuss new technologies on how you can maintain control of your data and have the flexibility you want over your environment:
• Defining critical applications for Disaster Recovery & Business Continuity
• Disaster Recovery approaches within the secure cloud environment
• Security, Control and Flexibility at your fingertips
• Reduce disaster recovery costs and gain continuous storage access
Business resilience is the ability an organization has to quickly adapt to disruptions while maintaining continuous business operations and safeguarding people, assets and overall brand equity.
Disaster Recovery: the process related to preparing for recovery or planning critical technology infrastructure before a natural or human disaster occurs.
The Great Disconnect of Data Protection: Perception, Reality and Best Practicesiland Cloud
iland and Veeam recently conducted a data protection survey of IT organizations worldwide. In this webinar, we summarize and analyze the survey responses so you canunderstand today’s data protection landscape. Then, we cover best practices that can help ensure thatyour organization, and its data,are properly protected
Watch the webinar on-demand: https://www.iland.com/wb-data-protection-report/
The first in our 'Journey' series of webinars, this complimentary presentation discusses the use of AWS as a Disaster Recovery environment and how the architectural approaches to DR in the AWS cloud make a perfect learning ground for more complex production application deployments.
In this webinar we introduce differing architectural patterns for using AWS as a disaster recovery platform and how AWS can make a cost effective part of your overall business continuity planning. By discussing a customer use-case end to end, we highlight key lessons learned to help you on your journey into the AWS cloud.
Ever heard that IT is constantly changing? Or that we all need to be constantly learning? Simple in theory, hard in practice even if like me that’s part of what you love about IT. What if you could hack your brain to learn faster? To understand data, situations, and people more quickly? We’ll briefly discuss some common mental models, illustrate them with IT stories, and let you know where you can learn more.
Note: there's very little text in this presentation - I presented it at South Florida VMUG Usercon for the VMUG Theater and likely will at other usercons.
Make sure to attend Varrow Madness - a one of a kind technology conference on March 20 at the Westin in Charlotte - http://madness.varrow.com for more details and to register.
Let me know on Twitter or via email (amiller @ varrow . com) if would like the file to send to people inside your organization.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4
AITP July 2012 Presentation - Disaster Recovery - Business + Technology
1. Disaster Recovery
Business & Technology
AITP Charleston
July 19, 2012
Andrew Miller
Senior Technical Consultant
t: @andriven w: www.thinkmeta.net
Varrow
2. One Big Reason to Do This
Expectations for Disaster
Recovery
≠ IT Capabilities
for Disaster Recovery
3. What is a Disaster?
• Disaster: An event that affects a service or system such
that significant effort is required to restore the original
performance level.
» IT Service Management Forum
But what does that look like IN
OUR ENVIRONMENT?
What disaster and recovery
scenarios should we plan for?
Where do we begin?
How do we do it?
5. Disaster Recovery vs. Operational Recovery
• Disaster Recovery
– To cope with & recover from an IT crisis that moves work to an
alternative system in a non-routine way.
– A real “disaster” is large in scope and impact
– DR typically implies failure of the primary data center and recovery to an
alternate site
• Operational Recovery
– Addresses more “routine” types of failures (server, network, storage,
etc.)
– Events are smaller in scope and impact than a full “disaster”
– Typically implies recovering to alternate equipment within the primary
data center
• Business expectations for recovery timeframe is typically
shorter for “operational recovery” issues than a true “disaster”
• Each should have its own clearly defined objectives
6. Risks, Threats and Vulnerabilities
Risk is a function of the likelihood of a given threat
acting upon a particular potential vulnerability,
and the resulting impact of that adverse event on
the organization.
7. Some threats that can cause Disasters…
• Human Error
• Localized IT systems /
network failure
• Extended power outage
• Telecommunications outage
• Storm / Weather damage
• Earthquake / Volcano
• Fire in the facility
• Facility flooding
• Local evacuation
• Cyber attack
• Sabotage
8. (Varrow) Disaster Recovery Approach
• Interviews with key personnel to understand Business Process priorities
and establish Business Impact Analysis (BIA).
• Review existing IT production infrastructure, including applications,
servers, storage, network, and external connectivity. Identify Risks and
Gaps.
• Establish Disaster Impact Scenarios and Disaster Recovery strategies to
meet requirements.
• Recommend Roadmap for establishing recovery capabilities and
documenting plans.
• Implement required recovery capabilities.
• Develop framework and content for IT DR Plan.
• Develop maintenance and test procedures for IT DR Plan.
• Address Business Continuity requirements and planning as appropriate.
9. What is the Business Impact Analysis?
• A conversation between IT and key stakeholders to
understand:
– What are the most time-critical and information-critical
business processes?
– How does the business REALLY rely upon IT Service and
Application availability?
– What are the Student, Financial, Regulatory, Reputational,
and other impacts of IT Service and Application
unavailability?
– What availability or recoverability capabilities are justifiable
based on these requirements, potential impact, and costs?
10. Disaster Recovery: Key Measures
Recovery Point Objectives Recovery Time Objectives
(RPO) (RTO)
5 6 7 8 9 10 11 12 1 2 3 4 5 6 7
a.m. a.m. a.m. a.m. a.m. a.m. a.m. a.m. p.m. p.m. p.m. p.m. p.m. p.m. p.m.
RPO: Amount of data lost from DECLARE RTO: Targeted amount of time
failure, measured as the amount DISASTER to restart a business service
10 a.m.
of time from a disaster event after a disaster event
11. Disaster Recovery: Key Measures
• Recovery Time Objective (RTO)
Maximum duration of disruption of service
• Recovery Point Objective (RPO)
Point in time to which application data is recovered / Maximum data loss
Weeks Days Hours Minutes Seconds Seconds Minutes Hours Days Weeks
Recovery Point Recovery Time
Real Time
Cost
12. BIA - Example Priority Tiers
Priority Tier Description
Priority 1 Services whose unavailability more than a brief period can have a severe impact on
High Availability / customers or time-critical business operations.
Immediate Recovery
Priority 2 Services whose unavailability significantly impacts customers or business
1-2 day recovery operations.
Priority 3 Services which can tolerate up to five days of disruption in a disaster.
3-5 day recovery
Priority 4 Services which can tolerate up to ten days of disruption in a disaster.
6-10 day recovery
Priority 3 and 4 systems may be restored in less time, depending on the situation.
However, higher priority functions will be restored first.
Priority 5 Non-critical services which can tolerate two weeks or more of disruption in a
“Best effort” recovery disaster. These systems will be restored on a best-effort basis, after other more
critical systems have been restored and ongoing operations have resumed.
Priority 5 systems may be restored in less time, depending on the situation.
However, higher priority functions will be restored first. In some cases, systems
deemed to not be required for continued operations may not be restored.
13. What does it take to RECOVER
from an IT Disaster?
• Data Protection
– Backups, Replication
• Recovery Facility
– Location to rebuild IT infrastructure or provision services
• Data Recovery & Storage
– Get Data into a form that is usable
• Servers / Compute Capacity
– Sufficient servers or virtual compute capacity to actually run the applications
• Network, Voice, and Data Communications
– Connect servers, storage and workers
– Connect the recovery site to work sites
– Communicate with customers
– Includes network, telecom, demarcation equipment; cabling; telecom provisioning
• DR Plan
– Documented and tested procedures for what to do, and how to do it
• People
14. Example Disaster Recovery Strategies
Priority Disaster Recovery Strategy Data Protection Approach
Priority 1 Establish hot site for systems and data in a Replicate / remote mirror / short
4 hour RTO or secondary data center at a remote interval remote disk-to-disk
less location that is unlikely to be impacted backup
by a local or regional event.
Priority 2 Maintain sufficient remote physical or virtual Remote disk-to-disk backup
24-48 hour RTO infrastructure for restoration. Ensure
sufficient space/power in recovery
facility.
Priority 3 Ensure ability to quickly acquire Tape (with sufficient off-site rotation)
72 hour RTO infrastructure for restoration. Ensure or remote disk-to-disk backup
sufficient space/power in recovery
facility.
Priority 4 Ensure ability to quickly acquire Tape (with sufficient off-site rotation)
1-2 week RTO infrastructure for restoration. Ensure or remote disk-to-disk backup
sufficient space/power in recovery
facility.
15. Storage Arrays + Replication
PRODUCTION SITE OPTIONAL DISASTER RECOVERY SITE
Application Local RecoverPoint bi-directional Remote Standby
servers copy replication/recovery copy servers
RecoverPoint RecoverPoint
appliance appliance
Production and
local journals
Prod Fibre Remote
SAN LUN Channel/WAN journal SAN
s
Storage Storage
Host-based write splitter arrays arrays
Fabric-based write splitter
Symmetrix VMAXe, VNX-, and
CLARiiON-based write splitter
16. Site A (Primary) Site B (Recovery)
Site Site
vCenter Server Recovery vCenter Server Recovery
Manager Manager
vSphere vSphere
vSphere
Replication
Storage-based
replication
vSphere Replication
Simple, cost-efficient replication for Tier 2 applications and smaller sites
Storage-based Replication
High-performance replication for business-critical applications in larger sites
Note to Presenter: View in Slide Show mode for animation. When EMC or its partners talk about remote replication, they usually mean between storage at two locations. The source and target are physically separated to reduce the risks associated with co-location. Remote replicated systems could be across a campus, across a town, or across the globe. Their physical distance and technology selected can affect how quickly you recover from a disruption and how much data is lost.Organizations normally set requirements for how much lost data and how much time to come back online is acceptable. The recovery point objective (RPO) is the amount of data that can be lost, measured in terms of time without being catastrophic to the business. The recovery time objective (RTO) is the amount of time that it takes to recover the data and restart your business services from the recovered data. Remote replication provides much lower RPOs (at or close to zero) and very small RTOs, depending on implementation. The bottom line is that replication is appropriate for all types of data, and the RPO and RTO you target are going to affect your implementation.For multiple RPOs and for remote replication with either zero or low RPO—and near-instant to instant recovery with DVR-like technology, EMC offers the RecoverPoint family.