SlideShare a Scribd company logo
Manuel Daza
Cloud Platform Sales Specialist Europe
Disaster Recovery
solutions
January 2017
Agenda
• security and infrastructure
• cloud: a game changer
• and the disaster came
• disaster recovery plans
2
security and infrastructure
• Infrastructure must be conceived
from the security
• Data integrity is all
• There’s no 100% security
3
Cloud: a game changer
4
World
OfficeMobile Phone
5
New technologies introduce new risks…
mobile devices
IBM X-Force Threat Intelligence Quarterly 1Q 2015,
11.6M
Mobile malware is affecting
of security executives have
cloud and mobile concerns
2013 IBM CISO Survey
70%
“36% of IT leaders noted security as their
top concern. Remarkably, just four years
ago, security was listed as the ninth area of
concern. 24% of IT leaders indicated that skills
shortages were the top concern”
2017 Society For Information Management (SIM) Trend Analysis
Hello, I’m the disaster
6
Disaster recovery plans
• Copies and Backups
• Same DC recovery plan
• Multi DC recovery plan
• VMware recovery plan
7
Copies and Backups
Backups are necessary, BUT:
• Backup software can also fail (longevity
concerns)
• You Have to Back Up with Recovery in Mind
• Data Backup is Only the First Chapter
Data backup and disaster recovery are not the same
8
Same DC recovery plan
Secure Highly Available Scaling Cloud
SoftLayer Environment
The SoftLayer Environment
Private Cloud
Customer Private Cloud
London
London
Physical Location within
SoftLayer Environment
Our customer
Auto-Scaling Group
AppWeb
AppWeb
On-Demand Virtual Server
Public Traffic Flows
Private Traffic Flows
Firewall
Global Load Balancer
Load Balancer
Internal Router
Customers Private Secure
Network
Routing &
Load
Routing &
Load
Customers Public (Internet
facing) Network
Virtual Server
Proxies
Proxies
9
IBM Cloud has data centres and network points of presence (POP) across the globe
 Over 40 global cloud centers
 Open, secure, and scalable
 Secure, high-speed network
 Expert services and tools
 Secure integration to on-premise
North America Regions
• US East
• US Central
• US West
• Canada
• Mexico
European Regions
• United Kingdom
• Netherlands
• Germany
• France
• Italy
Asia Pacific Regions
• Japan
• Australia
• Singapore
• Hong Kong
• India
10
Secure Highly Available Scaling Cloud
SoftLayer Environment
The SoftLayer Environment
Private Cloud
Customer Private Cloud
London
Amsterdam
Physical Location within
SoftLayer Environment
Our customer
Auto-Scaling Group
AppWeb
AppWeb
On-Demand Virtual Server
Public Traffic Flows
Private Traffic Flows
Firewall
Global Load Balancer
Load Balancer
Internal Router
Customers Private Secure
Network
Routing &
Load
Routing &
Load
Customers Public (Internet
facing) Network
Virtual Server
Proxies
Proxies
Multi DC recovery plan
11
VMware DR Today (simple view)
10.0.10/24 10.0.20/24
10.0.10.21 10.0.20.21 Major
RTO
Impact
Change IP Address
Reconfig Security4
Primary Site Recovery Site
Recover
the VM
3
Replicate
VM & Storage
2Physical Network Infrastructure Physical Network Infrastructure
SAN
1
Snapshot VM
SAN
Step 1&2
(e.g VMware SRM)
12
VMware DR with NSX Network Virtualization
(simple view)
SAN SAN
10.0.30.21 10.0.30.21
Virtual Network
10.0.30/24
80%
RTONSX Controller NSX Controller
Snapshot
Network &
Security
2b
Primary Site Recovery Site
1
Snapshot VM Network & Security
already exists
Recover
the VM
3
Physical Network Infrastructure Physical Network Infrastructure2a
Replicate
VM & Storage
10.0.10/24 10.0.20/24
Step 1&2
(e.g VMware SRM)
Virtual Network
10.0.30/24
13
Challenges of Realizing a True Hybrid Cloud
IaaS
Diverse Set of Standards Incompatible Platform
Inelastic consumption
Heterogeneous tools
Complex networking
No common authentication
No common governance
No common security model
Data Center Options
Custom
Hosting
Managed
Service
Co-Location
Service
Customer’s
Data Center
Bluemix Infrastructure
Diverse Set of Platforms and Incompatibility, Raise Costs and Complexity
14
Unified Hybrid Cloud
Data Center Options
Elastic Consumption Model
Common Management
Seamless Networking
Common Authentication
Common Governance, Billing
Common Security Model
Common Platform
Custom
Hosting
Managed
Service
Co-Location
Service
Customer’s
Data Center
VMware VMware
Bluemix Infrastructure
Leverage the Economics of IaaS. Run Your Data Center Like an IaaS.
15
Thank you
Questions?
16
17
Manuel Daza
- Cloud Platform Sales Specialist Europe –
manuel.daza@ie.ibm.com
@dabarsm
https://ie.linkedin.com/in/manueldaza

More Related Content

What's hot

Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG EffitasAcronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
Acronis
 
Outpost24 webinar: Risk-based approach to security assessments
Outpost24 webinar: Risk-based approach to security assessmentsOutpost24 webinar: Risk-based approach to security assessments
Outpost24 webinar: Risk-based approach to security assessments
Outpost24
 
Extensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud PortfolioExtensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud Portfolio
Dell World
 
Jump start your recovery, with Muhammad Tahir
Jump start your recovery, with Muhammad TahirJump start your recovery, with Muhammad Tahir
Jump start your recovery, with Muhammad Tahir
Veritas Technologies LLC
 
MT30 Best practices for data lake adoption
MT30 Best practices for data lake adoptionMT30 Best practices for data lake adoption
MT30 Best practices for data lake adoption
Dell EMC World
 
Cloud computing
Cloud computingCloud computing
Cloud computing
David Martin
 
Migrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal AgenciesMigrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal Agencies
VMware
 
The do's and dont's of cloud computing - StatPro Cloud Summit 2012
The do's and dont's of cloud computing - StatPro Cloud Summit 2012The do's and dont's of cloud computing - StatPro Cloud Summit 2012
The do's and dont's of cloud computing - StatPro Cloud Summit 2012
StatPro Group
 
Uncovering the Cloud: Is it Right for You? - Marco
Uncovering the Cloud: Is it Right for You? - MarcoUncovering the Cloud: Is it Right for You? - Marco
Uncovering the Cloud: Is it Right for You? - Marco
MarcoTechnologies
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Citrix
 
AMER Webcast: VMware Horizon - What's New?
AMER Webcast: VMware Horizon - What's New?AMER Webcast: VMware Horizon - What's New?
AMER Webcast: VMware Horizon - What's New?
VMware
 
Romi tech cloud workspace overview
Romi tech   cloud workspace overviewRomi tech   cloud workspace overview
Romi tech cloud workspace overview
romitech
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Rashmi Agale
 
Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerations
Mike Kavis
 
VMWare NSX Ecosystem Overview
VMWare NSX Ecosystem OverviewVMWare NSX Ecosystem Overview
VMWare NSX Ecosystem Overview
Scott Clinton
 
Gov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_finalGov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_final
GovCloud Network
 
CloudDesktop Slick
CloudDesktop SlickCloudDesktop Slick
CloudDesktop Slick
RapidScale
 
MT49 Dell EMC XtremIO: Product Overview and New Use Cases
MT49 Dell EMC XtremIO: Product Overview and New Use CasesMT49 Dell EMC XtremIO: Product Overview and New Use Cases
MT49 Dell EMC XtremIO: Product Overview and New Use Cases
Dell EMC World
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
Dell World
 
Deploying Unified Communications with Lync on the easiest, most secure platform
Deploying Unified Communications with Lync on the easiest, most secure platformDeploying Unified Communications with Lync on the easiest, most secure platform
Deploying Unified Communications with Lync on the easiest, most secure platform
Dell World
 

What's hot (20)

Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG EffitasAcronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
 
Outpost24 webinar: Risk-based approach to security assessments
Outpost24 webinar: Risk-based approach to security assessmentsOutpost24 webinar: Risk-based approach to security assessments
Outpost24 webinar: Risk-based approach to security assessments
 
Extensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud PortfolioExtensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud Portfolio
 
Jump start your recovery, with Muhammad Tahir
Jump start your recovery, with Muhammad TahirJump start your recovery, with Muhammad Tahir
Jump start your recovery, with Muhammad Tahir
 
MT30 Best practices for data lake adoption
MT30 Best practices for data lake adoptionMT30 Best practices for data lake adoption
MT30 Best practices for data lake adoption
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Migrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal AgenciesMigrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal Agencies
 
The do's and dont's of cloud computing - StatPro Cloud Summit 2012
The do's and dont's of cloud computing - StatPro Cloud Summit 2012The do's and dont's of cloud computing - StatPro Cloud Summit 2012
The do's and dont's of cloud computing - StatPro Cloud Summit 2012
 
Uncovering the Cloud: Is it Right for You? - Marco
Uncovering the Cloud: Is it Right for You? - MarcoUncovering the Cloud: Is it Right for You? - Marco
Uncovering the Cloud: Is it Right for You? - Marco
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
 
AMER Webcast: VMware Horizon - What's New?
AMER Webcast: VMware Horizon - What's New?AMER Webcast: VMware Horizon - What's New?
AMER Webcast: VMware Horizon - What's New?
 
Romi tech cloud workspace overview
Romi tech   cloud workspace overviewRomi tech   cloud workspace overview
Romi tech cloud workspace overview
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerations
 
VMWare NSX Ecosystem Overview
VMWare NSX Ecosystem OverviewVMWare NSX Ecosystem Overview
VMWare NSX Ecosystem Overview
 
Gov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_finalGov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_final
 
CloudDesktop Slick
CloudDesktop SlickCloudDesktop Slick
CloudDesktop Slick
 
MT49 Dell EMC XtremIO: Product Overview and New Use Cases
MT49 Dell EMC XtremIO: Product Overview and New Use CasesMT49 Dell EMC XtremIO: Product Overview and New Use Cases
MT49 Dell EMC XtremIO: Product Overview and New Use Cases
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
 
Deploying Unified Communications with Lync on the easiest, most secure platform
Deploying Unified Communications with Lync on the easiest, most secure platformDeploying Unified Communications with Lync on the easiest, most secure platform
Deploying Unified Communications with Lync on the easiest, most secure platform
 

Similar to Disaster Recovery Solutions

A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public Cloud
Rochester Security Summit
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
Mediehuset Ingeniøren Live
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
Venkatesh Chary
 
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...
actualtechmedia
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
solarisyourep
 
Zenith Infotech Mirror Cloud Presentation. 112211
Zenith Infotech    Mirror Cloud Presentation. 112211Zenith Infotech    Mirror Cloud Presentation. 112211
Zenith Infotech Mirror Cloud Presentation. 112211
hdmchughgmailcom
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
Devyani Vaidya
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
Devyani Vaidya
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Devyani Vaidya
 
HCI ECOCAST
HCI ECOCAST HCI ECOCAST
HCI ECOCAST
Melina Black
 
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Jürgen Ambrosi
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
VMUG IT
 
Disaster recovery solutions and datacentre replacements
Disaster recovery solutions and datacentre replacementsDisaster recovery solutions and datacentre replacements
Disaster recovery solutions and datacentre replacements
OVHcloud
 
CDW Presents the Future of IT - Software-Defined Enterprise
CDW Presents the Future of IT - Software-Defined EnterpriseCDW Presents the Future of IT - Software-Defined Enterprise
CDW Presents the Future of IT - Software-Defined Enterprise
CDW
 
Going Beyond the Cloud to Modernize Your Banking Infrastructure
Going Beyond the Cloud to Modernize Your Banking InfrastructureGoing Beyond the Cloud to Modernize Your Banking Infrastructure
Going Beyond the Cloud to Modernize Your Banking Infrastructure
Cloudflare
 
Webinar: Overcoming the Top Challenges of Recovery to the Cloud (EMEA)
Webinar: Overcoming the Top Challenges of Recovery to the Cloud (EMEA)Webinar: Overcoming the Top Challenges of Recovery to the Cloud (EMEA)
Webinar: Overcoming the Top Challenges of Recovery to the Cloud (EMEA)
iland Cloud
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
UnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Donna Perlstein
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
CloudEndure
 

Similar to Disaster Recovery Solutions (20)

A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public Cloud
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
Zenith Infotech Mirror Cloud Presentation. 112211
Zenith Infotech    Mirror Cloud Presentation. 112211Zenith Infotech    Mirror Cloud Presentation. 112211
Zenith Infotech Mirror Cloud Presentation. 112211
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
HCI ECOCAST
HCI ECOCAST HCI ECOCAST
HCI ECOCAST
 
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
Disaster recovery solutions and datacentre replacements
Disaster recovery solutions and datacentre replacementsDisaster recovery solutions and datacentre replacements
Disaster recovery solutions and datacentre replacements
 
CDW Presents the Future of IT - Software-Defined Enterprise
CDW Presents the Future of IT - Software-Defined EnterpriseCDW Presents the Future of IT - Software-Defined Enterprise
CDW Presents the Future of IT - Software-Defined Enterprise
 
Going Beyond the Cloud to Modernize Your Banking Infrastructure
Going Beyond the Cloud to Modernize Your Banking InfrastructureGoing Beyond the Cloud to Modernize Your Banking Infrastructure
Going Beyond the Cloud to Modernize Your Banking Infrastructure
 
Webinar: Overcoming the Top Challenges of Recovery to the Cloud (EMEA)
Webinar: Overcoming the Top Challenges of Recovery to the Cloud (EMEA)Webinar: Overcoming the Top Challenges of Recovery to the Cloud (EMEA)
Webinar: Overcoming the Top Challenges of Recovery to the Cloud (EMEA)
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 

More from Manuel Daza

Personal Brand and Online Reputation
Personal Brand and Online ReputationPersonal Brand and Online Reputation
Personal Brand and Online Reputation
Manuel Daza
 
¿Todavía tienes servidores físicos en tu empresa? Da el salto al Cloud
¿Todavía tienes servidores físicos en tu empresa? Da el salto al Cloud¿Todavía tienes servidores físicos en tu empresa? Da el salto al Cloud
¿Todavía tienes servidores físicos en tu empresa? Da el salto al Cloud
Manuel Daza
 
20160114 The softlayer advantage
20160114   The softlayer advantage20160114   The softlayer advantage
20160114 The softlayer advantage
Manuel Daza
 
Cloud for Service Providers - A Winning Combination
Cloud for Service Providers - A Winning CombinationCloud for Service Providers - A Winning Combination
Cloud for Service Providers - A Winning Combination
Manuel Daza
 
Foster your business with the cloud - Webinar for MSPs
Foster your business with the cloud - Webinar for MSPsFoster your business with the cloud - Webinar for MSPs
Foster your business with the cloud - Webinar for MSPs
Manuel Daza
 
Softlayer en Español (Webinar 20150122)
Softlayer en Español (Webinar 20150122)Softlayer en Español (Webinar 20150122)
Softlayer en Español (Webinar 20150122)
Manuel Daza
 
IBM Softlayer Webinar - 20141002 - Especial Seguridad
IBM Softlayer Webinar - 20141002 - Especial SeguridadIBM Softlayer Webinar - 20141002 - Especial Seguridad
IBM Softlayer Webinar - 20141002 - Especial Seguridad
Manuel Daza
 
Smart Cloud Webinar 2014-02-13 Introduction to Softlayer IaaS MDB
Smart Cloud Webinar 2014-02-13 Introduction to Softlayer IaaS MDBSmart Cloud Webinar 2014-02-13 Introduction to Softlayer IaaS MDB
Smart Cloud Webinar 2014-02-13 Introduction to Softlayer IaaS MDB
Manuel Daza
 
Presentacion app movil Baquia
Presentacion app movil BaquiaPresentacion app movil Baquia
Presentacion app movil Baquia
Manuel Daza
 

More from Manuel Daza (9)

Personal Brand and Online Reputation
Personal Brand and Online ReputationPersonal Brand and Online Reputation
Personal Brand and Online Reputation
 
¿Todavía tienes servidores físicos en tu empresa? Da el salto al Cloud
¿Todavía tienes servidores físicos en tu empresa? Da el salto al Cloud¿Todavía tienes servidores físicos en tu empresa? Da el salto al Cloud
¿Todavía tienes servidores físicos en tu empresa? Da el salto al Cloud
 
20160114 The softlayer advantage
20160114   The softlayer advantage20160114   The softlayer advantage
20160114 The softlayer advantage
 
Cloud for Service Providers - A Winning Combination
Cloud for Service Providers - A Winning CombinationCloud for Service Providers - A Winning Combination
Cloud for Service Providers - A Winning Combination
 
Foster your business with the cloud - Webinar for MSPs
Foster your business with the cloud - Webinar for MSPsFoster your business with the cloud - Webinar for MSPs
Foster your business with the cloud - Webinar for MSPs
 
Softlayer en Español (Webinar 20150122)
Softlayer en Español (Webinar 20150122)Softlayer en Español (Webinar 20150122)
Softlayer en Español (Webinar 20150122)
 
IBM Softlayer Webinar - 20141002 - Especial Seguridad
IBM Softlayer Webinar - 20141002 - Especial SeguridadIBM Softlayer Webinar - 20141002 - Especial Seguridad
IBM Softlayer Webinar - 20141002 - Especial Seguridad
 
Smart Cloud Webinar 2014-02-13 Introduction to Softlayer IaaS MDB
Smart Cloud Webinar 2014-02-13 Introduction to Softlayer IaaS MDBSmart Cloud Webinar 2014-02-13 Introduction to Softlayer IaaS MDB
Smart Cloud Webinar 2014-02-13 Introduction to Softlayer IaaS MDB
 
Presentacion app movil Baquia
Presentacion app movil BaquiaPresentacion app movil Baquia
Presentacion app movil Baquia
 

Recently uploaded

Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 

Recently uploaded (20)

Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 

Disaster Recovery Solutions

  • 1. Manuel Daza Cloud Platform Sales Specialist Europe Disaster Recovery solutions January 2017
  • 2. Agenda • security and infrastructure • cloud: a game changer • and the disaster came • disaster recovery plans 2
  • 3. security and infrastructure • Infrastructure must be conceived from the security • Data integrity is all • There’s no 100% security 3
  • 4. Cloud: a game changer 4 World OfficeMobile Phone
  • 5. 5 New technologies introduce new risks… mobile devices IBM X-Force Threat Intelligence Quarterly 1Q 2015, 11.6M Mobile malware is affecting of security executives have cloud and mobile concerns 2013 IBM CISO Survey 70% “36% of IT leaders noted security as their top concern. Remarkably, just four years ago, security was listed as the ninth area of concern. 24% of IT leaders indicated that skills shortages were the top concern” 2017 Society For Information Management (SIM) Trend Analysis
  • 6. Hello, I’m the disaster 6
  • 7. Disaster recovery plans • Copies and Backups • Same DC recovery plan • Multi DC recovery plan • VMware recovery plan 7
  • 8. Copies and Backups Backups are necessary, BUT: • Backup software can also fail (longevity concerns) • You Have to Back Up with Recovery in Mind • Data Backup is Only the First Chapter Data backup and disaster recovery are not the same 8
  • 9. Same DC recovery plan Secure Highly Available Scaling Cloud SoftLayer Environment The SoftLayer Environment Private Cloud Customer Private Cloud London London Physical Location within SoftLayer Environment Our customer Auto-Scaling Group AppWeb AppWeb On-Demand Virtual Server Public Traffic Flows Private Traffic Flows Firewall Global Load Balancer Load Balancer Internal Router Customers Private Secure Network Routing & Load Routing & Load Customers Public (Internet facing) Network Virtual Server Proxies Proxies 9
  • 10. IBM Cloud has data centres and network points of presence (POP) across the globe  Over 40 global cloud centers  Open, secure, and scalable  Secure, high-speed network  Expert services and tools  Secure integration to on-premise North America Regions • US East • US Central • US West • Canada • Mexico European Regions • United Kingdom • Netherlands • Germany • France • Italy Asia Pacific Regions • Japan • Australia • Singapore • Hong Kong • India 10
  • 11. Secure Highly Available Scaling Cloud SoftLayer Environment The SoftLayer Environment Private Cloud Customer Private Cloud London Amsterdam Physical Location within SoftLayer Environment Our customer Auto-Scaling Group AppWeb AppWeb On-Demand Virtual Server Public Traffic Flows Private Traffic Flows Firewall Global Load Balancer Load Balancer Internal Router Customers Private Secure Network Routing & Load Routing & Load Customers Public (Internet facing) Network Virtual Server Proxies Proxies Multi DC recovery plan 11
  • 12. VMware DR Today (simple view) 10.0.10/24 10.0.20/24 10.0.10.21 10.0.20.21 Major RTO Impact Change IP Address Reconfig Security4 Primary Site Recovery Site Recover the VM 3 Replicate VM & Storage 2Physical Network Infrastructure Physical Network Infrastructure SAN 1 Snapshot VM SAN Step 1&2 (e.g VMware SRM) 12
  • 13. VMware DR with NSX Network Virtualization (simple view) SAN SAN 10.0.30.21 10.0.30.21 Virtual Network 10.0.30/24 80% RTONSX Controller NSX Controller Snapshot Network & Security 2b Primary Site Recovery Site 1 Snapshot VM Network & Security already exists Recover the VM 3 Physical Network Infrastructure Physical Network Infrastructure2a Replicate VM & Storage 10.0.10/24 10.0.20/24 Step 1&2 (e.g VMware SRM) Virtual Network 10.0.30/24 13
  • 14. Challenges of Realizing a True Hybrid Cloud IaaS Diverse Set of Standards Incompatible Platform Inelastic consumption Heterogeneous tools Complex networking No common authentication No common governance No common security model Data Center Options Custom Hosting Managed Service Co-Location Service Customer’s Data Center Bluemix Infrastructure Diverse Set of Platforms and Incompatibility, Raise Costs and Complexity 14
  • 15. Unified Hybrid Cloud Data Center Options Elastic Consumption Model Common Management Seamless Networking Common Authentication Common Governance, Billing Common Security Model Common Platform Custom Hosting Managed Service Co-Location Service Customer’s Data Center VMware VMware Bluemix Infrastructure Leverage the Economics of IaaS. Run Your Data Center Like an IaaS. 15
  • 17. 17 Manuel Daza - Cloud Platform Sales Specialist Europe – manuel.daza@ie.ibm.com @dabarsm https://ie.linkedin.com/in/manueldaza