SlideShare una empresa de Scribd logo
1 de 17
Disaster Recovery
   Business & Technology

         AITP Charleston
          July 19, 2012

           Andrew Miller
    Senior Technical Consultant
t: @andriven w: www.thinkmeta.net
              Varrow
One Big Reason to Do This



Expectations for Disaster
       Recovery
                            ≠       IT Capabilities
                                for Disaster Recovery
What is a Disaster?
• Disaster: An event that affects a service or system such
  that significant effort is required to restore the original
  performance level.
               » IT Service Management Forum


                                   But what does that look like IN
                                    OUR ENVIRONMENT?
                                   What disaster and recovery
                                    scenarios should we plan for?
                                   Where do we begin?
                                   How do we do it?
Example of a Disaster
Disaster Recovery vs. Operational Recovery
• Disaster Recovery
   – To cope with & recover from an IT crisis that moves work to an
     alternative system in a non-routine way.
   – A real “disaster” is large in scope and impact
   – DR typically implies failure of the primary data center and recovery to an
     alternate site
• Operational Recovery
   – Addresses more “routine” types of failures (server, network, storage,
     etc.)
   – Events are smaller in scope and impact than a full “disaster”
   – Typically implies recovering to alternate equipment within the primary
     data center
• Business expectations for recovery timeframe is typically
  shorter for “operational recovery” issues than a true “disaster”
• Each should have its own clearly defined objectives
Risks, Threats and Vulnerabilities

Risk is a function of the likelihood of a given threat
acting upon a particular potential vulnerability,
and the resulting impact of that adverse event on
the organization.
Some threats that can cause Disasters…
• Human Error
• Localized IT systems /
  network failure
• Extended power outage
• Telecommunications outage
• Storm / Weather damage
• Earthquake / Volcano
• Fire in the facility
• Facility flooding
• Local evacuation
• Cyber attack
• Sabotage
(Varrow) Disaster Recovery Approach
• Interviews with key personnel to understand Business Process priorities
  and establish Business Impact Analysis (BIA).
• Review existing IT production infrastructure, including applications,
  servers, storage, network, and external connectivity. Identify Risks and
  Gaps.
• Establish Disaster Impact Scenarios and Disaster Recovery strategies to
  meet requirements.
• Recommend Roadmap for establishing recovery capabilities and
  documenting plans.
• Implement required recovery capabilities.
• Develop framework and content for IT DR Plan.
• Develop maintenance and test procedures for IT DR Plan.
• Address Business Continuity requirements and planning as appropriate.
What is the Business Impact Analysis?
• A conversation between IT and key stakeholders to
  understand:
   – What are the most time-critical and information-critical
     business processes?
   – How does the business REALLY rely upon IT Service and
     Application availability?
   – What are the Student, Financial, Regulatory, Reputational,
     and other impacts of IT Service and Application
     unavailability?
   – What availability or recoverability capabilities are justifiable
     based on these requirements, potential impact, and costs?
Disaster Recovery: Key Measures

          Recovery Point Objectives Recovery Time Objectives
                            (RPO) (RTO)




                  5      6      7      8      9     10     11     12      1      2      3      4      5      6      7
                a.m.   a.m.   a.m.   a.m.   a.m.   a.m.   a.m.   a.m.   p.m.   p.m.   p.m.   p.m.   p.m.   p.m.   p.m.


RPO: Amount of data lost from                 DECLARE             RTO: Targeted amount of time
failure, measured as the amount               DISASTER            to restart a business service
                                               10 a.m.
of time from a disaster event                                     after a disaster event
Disaster Recovery: Key Measures
• Recovery Time Objective (RTO)
   Maximum duration of disruption of service
• Recovery Point Objective (RPO)
   Point in time to which application data is recovered / Maximum data loss


         Weeks   Days   Hours   Minutes   Seconds     Seconds    Minutes   Hours   Days   Weeks




            Recovery Point                                      Recovery Time

                                               Real Time


                                            Cost
BIA - Example Priority Tiers
     Priority Tier                                           Description
Priority 1               Services whose unavailability more than a brief period can have a severe impact on
High Availability /      customers or time-critical business operations.
Immediate Recovery
Priority 2               Services whose unavailability significantly impacts customers or business
1-2 day recovery         operations.
Priority 3               Services which can tolerate up to five days of disruption in a disaster.
3-5 day recovery
Priority 4               Services which can tolerate up to ten days of disruption in a disaster.
6-10 day recovery
                         Priority 3 and 4 systems may be restored in less time, depending on the situation.
                         However, higher priority functions will be restored first.
Priority 5               Non-critical services which can tolerate two weeks or more of disruption in a
“Best effort” recovery   disaster. These systems will be restored on a best-effort basis, after other more
                         critical systems have been restored and ongoing operations have resumed.

                         Priority 5 systems may be restored in less time, depending on the situation.
                         However, higher priority functions will be restored first. In some cases, systems
                         deemed to not be required for continued operations may not be restored.
What does it take to RECOVER
                 from an IT Disaster?
•   Data Protection
     – Backups, Replication
•   Recovery Facility
     – Location to rebuild IT infrastructure or provision services
•   Data Recovery & Storage
     – Get Data into a form that is usable
•   Servers / Compute Capacity
     – Sufficient servers or virtual compute capacity to actually run the applications
•   Network, Voice, and Data Communications
     –   Connect servers, storage and workers
     –   Connect the recovery site to work sites
     –   Communicate with customers
     –   Includes network, telecom, demarcation equipment; cabling; telecom provisioning
•   DR Plan
     – Documented and tested procedures for what to do, and how to do it
•   People
Example Disaster Recovery Strategies
    Priority          Disaster Recovery Strategy                     Data Protection Approach

Priority 1       Establish hot site for systems and data in a     Replicate / remote mirror / short
4 hour RTO or        secondary data center at a remote               interval remote disk-to-disk
    less             location that is unlikely to be impacted        backup
                     by a local or regional event.


Priority 2       Maintain sufficient remote physical or virtual   Remote disk-to-disk backup
24-48 hour RTO       infrastructure for restoration. Ensure
                     sufficient space/power in recovery
                     facility.
Priority 3       Ensure ability to quickly acquire                Tape (with sufficient off-site rotation)
72 hour RTO         infrastructure for restoration. Ensure            or remote disk-to-disk backup
                    sufficient space/power in recovery
                    facility.
Priority 4       Ensure ability to quickly acquire                Tape (with sufficient off-site rotation)
1-2 week RTO        infrastructure for restoration. Ensure            or remote disk-to-disk backup
                    sufficient space/power in recovery
                    facility.
Storage Arrays + Replication
               PRODUCTION SITE                                         OPTIONAL DISASTER RECOVERY SITE


Application                        Local      RecoverPoint bi-directional   Remote                   Standby
 servers                           copy          replication/recovery        copy                    servers
                 RecoverPoint                                                         RecoverPoint
                  appliance                                                            appliance
                                             Production and
                                             local journals

                                    Prod             Fibre   Remote
                          SAN       LUN           Channel/WAN journal                 SAN
                                     s

                                   Storage                                  Storage
   Host-based write splitter        arrays                                   arrays
   Fabric-based write splitter
   Symmetrix VMAXe, VNX-, and
   CLARiiON-based write splitter
Site A (Primary)                                            Site B (Recovery)
                      Site                                                          Site
vCenter Server      Recovery                                 vCenter Server       Recovery
                    Manager                                                       Manager




          vSphere                                                      vSphere
                                      vSphere
                                     Replication



                                    Storage-based
                                      replication
   vSphere Replication
   Simple, cost-efficient replication for Tier 2 applications and smaller sites

   Storage-based Replication
   High-performance replication for business-critical applications in larger sites
Discussion / Q&A

Más contenido relacionado

La actualidad más candente

Disaster Recovery Planning
Disaster Recovery Planning   Disaster Recovery Planning
Disaster Recovery Planning Keystone IT
 
Data backup and disaster recovery
Data backup and disaster recoveryData backup and disaster recovery
Data backup and disaster recoverycatacutanjcsantos
 
Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IThhuihhui
 
Backup And Recovery
Backup And RecoveryBackup And Recovery
Backup And RecoveryWynthorpe
 
Backup policy template julie bozzi oregon
Backup policy template   julie bozzi oregonBackup policy template   julie bozzi oregon
Backup policy template julie bozzi oregonJulie Bozzi, PfPM, PMP
 
Backup & restore in windows
Backup & restore in windowsBackup & restore in windows
Backup & restore in windowsJab Vtl
 
Recovery Time Objective and Recovery Point Objective
Recovery Time Objective and Recovery Point ObjectiveRecovery Time Objective and Recovery Point Objective
Recovery Time Objective and Recovery Point ObjectiveYankee Maharjan
 
Data center disaster recovery.ppt
Data center disaster recovery.ppt Data center disaster recovery.ppt
Data center disaster recovery.ppt omalreda
 
03 backup-and-recovery
03 backup-and-recovery03 backup-and-recovery
03 backup-and-recoveryhunny garg
 
Membangun Data Recovery Center / Disaster Recovery Center
Membangun Data Recovery Center / Disaster Recovery CenterMembangun Data Recovery Center / Disaster Recovery Center
Membangun Data Recovery Center / Disaster Recovery CenterFanky Christian
 
Disaster Recovery Planning: Best Practices, Templates, and Tools
Disaster Recovery Planning: Best Practices, Templates, and ToolsDisaster Recovery Planning: Best Practices, Templates, and Tools
Disaster Recovery Planning: Best Practices, Templates, and ToolsZetta Inc
 
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recoverydhawal mehta
 
Basic principles of backup policies by Andrea Mauro, Backup Academy
Basic principles of backup policies by Andrea Mauro, Backup AcademyBasic principles of backup policies by Andrea Mauro, Backup Academy
Basic principles of backup policies by Andrea Mauro, Backup AcademyVeeam Software
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloudxKinAnx
 
Fast Back Sales Enablement V1 2
Fast Back Sales Enablement V1 2Fast Back Sales Enablement V1 2
Fast Back Sales Enablement V1 2petchpaitoon
 
Disaster Recovery: Is Your iSeries Recoverable?
Disaster Recovery: Is Your iSeries Recoverable?Disaster Recovery: Is Your iSeries Recoverable?
Disaster Recovery: Is Your iSeries Recoverable?WTS
 

La actualidad más candente (20)

Disaster Recovery Planning
Disaster Recovery Planning   Disaster Recovery Planning
Disaster Recovery Planning
 
Data backup and disaster recovery
Data backup and disaster recoveryData backup and disaster recovery
Data backup and disaster recovery
 
Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IT
 
Backup And Recovery
Backup And RecoveryBackup And Recovery
Backup And Recovery
 
Backup policy template julie bozzi oregon
Backup policy template   julie bozzi oregonBackup policy template   julie bozzi oregon
Backup policy template julie bozzi oregon
 
Backup & restore in windows
Backup & restore in windowsBackup & restore in windows
Backup & restore in windows
 
Recovery Time Objective and Recovery Point Objective
Recovery Time Objective and Recovery Point ObjectiveRecovery Time Objective and Recovery Point Objective
Recovery Time Objective and Recovery Point Objective
 
Data center disaster recovery.ppt
Data center disaster recovery.ppt Data center disaster recovery.ppt
Data center disaster recovery.ppt
 
Backup strategy
Backup strategyBackup strategy
Backup strategy
 
03 backup-and-recovery
03 backup-and-recovery03 backup-and-recovery
03 backup-and-recovery
 
Membangun Data Recovery Center / Disaster Recovery Center
Membangun Data Recovery Center / Disaster Recovery CenterMembangun Data Recovery Center / Disaster Recovery Center
Membangun Data Recovery Center / Disaster Recovery Center
 
Construction of a Disaster Recovery Plan with Business Only Broadband
Construction of a Disaster Recovery Plan with Business Only BroadbandConstruction of a Disaster Recovery Plan with Business Only Broadband
Construction of a Disaster Recovery Plan with Business Only Broadband
 
Disaster Recovery Planning: Best Practices, Templates, and Tools
Disaster Recovery Planning: Best Practices, Templates, and ToolsDisaster Recovery Planning: Best Practices, Templates, and Tools
Disaster Recovery Planning: Best Practices, Templates, and Tools
 
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recovery
 
Basic principles of backup policies by Andrea Mauro, Backup Academy
Basic principles of backup policies by Andrea Mauro, Backup AcademyBasic principles of backup policies by Andrea Mauro, Backup Academy
Basic principles of backup policies by Andrea Mauro, Backup Academy
 
Backup Exec 21
Backup Exec 21Backup Exec 21
Backup Exec 21
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloud
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
 
Fast Back Sales Enablement V1 2
Fast Back Sales Enablement V1 2Fast Back Sales Enablement V1 2
Fast Back Sales Enablement V1 2
 
Disaster Recovery: Is Your iSeries Recoverable?
Disaster Recovery: Is Your iSeries Recoverable?Disaster Recovery: Is Your iSeries Recoverable?
Disaster Recovery: Is Your iSeries Recoverable?
 

Destacado

Интернет - портфолио Гизатулиной О.И
 Интернет - портфолио Гизатулиной О.И Интернет - портфолио Гизатулиной О.И
Интернет - портфолио Гизатулиной О.ИOlga Gizatulina
 
Gestion de crise et continuité d'activité : Les motivations
Gestion de crise et continuité d'activité : Les motivationsGestion de crise et continuité d'activité : Les motivations
Gestion de crise et continuité d'activité : Les motivationsBRIVA
 
AWS and Disaster Recovery - Bixler
AWS and Disaster Recovery - BixlerAWS and Disaster Recovery - Bixler
AWS and Disaster Recovery - BixlerAmazon Web Services
 
Disaster Recovery Presentation
Disaster Recovery PresentationDisaster Recovery Presentation
Disaster Recovery PresentationTimSchaefer
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Narudom Roongsiriwong, CISSP
 
PRA et PCA : plans de reprise et de continuité d'activité
 PRA et PCA : plans de reprise et de continuité d'activité PRA et PCA : plans de reprise et de continuité d'activité
PRA et PCA : plans de reprise et de continuité d'activitéChristophe Casalegno
 
Guide AFNOR Mettre en place un Plan de Continuité d’Activité (PCA) dans les P...
Guide AFNOR Mettre en place un Plan de Continuité d’Activité (PCA) dans les P...Guide AFNOR Mettre en place un Plan de Continuité d’Activité (PCA) dans les P...
Guide AFNOR Mettre en place un Plan de Continuité d’Activité (PCA) dans les P...polenumerique33
 
Plan de continuité des activités: le vrai enjeu stratégique
Plan de continuité des activités: le vrai enjeu stratégiquePlan de continuité des activités: le vrai enjeu stratégique
Plan de continuité des activités: le vrai enjeu stratégiqueDigicomp Academy Suisse Romande SA
 
Plan de Reprise d'Activité
Plan de Reprise d'ActivitéPlan de Reprise d'Activité
Plan de Reprise d'ActivitéitSMF France
 

Destacado (10)

Интернет - портфолио Гизатулиной О.И
 Интернет - портфолио Гизатулиной О.И Интернет - портфолио Гизатулиной О.И
Интернет - портфолио Гизатулиной О.И
 
Gestion de crise et continuité d'activité : Les motivations
Gestion de crise et continuité d'activité : Les motivationsGestion de crise et continuité d'activité : Les motivations
Gestion de crise et continuité d'activité : Les motivations
 
AWS and Disaster Recovery - Bixler
AWS and Disaster Recovery - BixlerAWS and Disaster Recovery - Bixler
AWS and Disaster Recovery - Bixler
 
BCP Awareness
BCP Awareness BCP Awareness
BCP Awareness
 
Disaster Recovery Presentation
Disaster Recovery PresentationDisaster Recovery Presentation
Disaster Recovery Presentation
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
 
PRA et PCA : plans de reprise et de continuité d'activité
 PRA et PCA : plans de reprise et de continuité d'activité PRA et PCA : plans de reprise et de continuité d'activité
PRA et PCA : plans de reprise et de continuité d'activité
 
Guide AFNOR Mettre en place un Plan de Continuité d’Activité (PCA) dans les P...
Guide AFNOR Mettre en place un Plan de Continuité d’Activité (PCA) dans les P...Guide AFNOR Mettre en place un Plan de Continuité d’Activité (PCA) dans les P...
Guide AFNOR Mettre en place un Plan de Continuité d’Activité (PCA) dans les P...
 
Plan de continuité des activités: le vrai enjeu stratégique
Plan de continuité des activités: le vrai enjeu stratégiquePlan de continuité des activités: le vrai enjeu stratégique
Plan de continuité des activités: le vrai enjeu stratégique
 
Plan de Reprise d'Activité
Plan de Reprise d'ActivitéPlan de Reprise d'Activité
Plan de Reprise d'Activité
 

Similar a AITP July 2012 Presentation - Disaster Recovery - Business + Technology

Disaster Recovery - Business & Technology
Disaster Recovery - Business & Technology Disaster Recovery - Business & Technology
Disaster Recovery - Business & Technology Andrew Miller
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationAndrew Miller
 
STN Event 12.8.09 - Chris Vain Powerpoint Presentation
STN Event 12.8.09 - Chris Vain Powerpoint PresentationSTN Event 12.8.09 - Chris Vain Powerpoint Presentation
STN Event 12.8.09 - Chris Vain Powerpoint Presentationmcini
 
Plate Spin Disaster Recovery Solution
Plate Spin Disaster Recovery SolutionPlate Spin Disaster Recovery Solution
Plate Spin Disaster Recovery Solutionmuralis3
 
WI_Symposium_Conference_2014
WI_Symposium_Conference_2014WI_Symposium_Conference_2014
WI_Symposium_Conference_2014Kevin McDaniel
 
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseNovember 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseRapidScale
 
VMworld 2013: DR to The Cloud with VMware Site Recovery Manager and Rackspace...
VMworld 2013: DR to The Cloud with VMware Site Recovery Manager and Rackspace...VMworld 2013: DR to The Cloud with VMware Site Recovery Manager and Rackspace...
VMworld 2013: DR to The Cloud with VMware Site Recovery Manager and Rackspace...VMworld
 
Zerto for dr migration to cloud overview
Zerto for dr migration to cloud overviewZerto for dr migration to cloud overview
Zerto for dr migration to cloud overviewMorgan Davidson
 
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017Andrew Miller
 
BACK FROM THE EDGE: INFRASTRUCTURE PROTECTION THROUGH PLATESPIN
BACK FROM THE EDGE: INFRASTRUCTURE PROTECTION THROUGH PLATESPINBACK FROM THE EDGE: INFRASTRUCTURE PROTECTION THROUGH PLATESPIN
BACK FROM THE EDGE: INFRASTRUCTURE PROTECTION THROUGH PLATESPINMicro Focus
 
EVault Technical DRaaS Guide_Final
EVault Technical DRaaS Guide_FinalEVault Technical DRaaS Guide_Final
EVault Technical DRaaS Guide_FinalJamie Evans
 
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...CloudSmartz
 
Disaster Recovery & Business Continuity Overview
Disaster Recovery & Business Continuity Overview Disaster Recovery & Business Continuity Overview
Disaster Recovery & Business Continuity Overview Aventis Systems, Inc.
 
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best PracticesThe Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best Practicesiland Cloud
 
Journey Through the AWS Cloud; Disaster Recovery
 Journey Through the AWS Cloud; Disaster Recovery Journey Through the AWS Cloud; Disaster Recovery
Journey Through the AWS Cloud; Disaster RecoveryAmazon Web Services
 
Disaster recovery - What, Why, and How
Disaster recovery - What, Why, and HowDisaster recovery - What, Why, and How
Disaster recovery - What, Why, and HowManish Pandit
 
Data Protection And Disaster Recovery Overview Wine Mixer
Data Protection And Disaster Recovery Overview Wine MixerData Protection And Disaster Recovery Overview Wine Mixer
Data Protection And Disaster Recovery Overview Wine Mixermcini
 
Backing up your virtual environment best practices
Backing up your virtual environment   best practicesBacking up your virtual environment   best practices
Backing up your virtual environment best practicesInterop
 

Similar a AITP July 2012 Presentation - Disaster Recovery - Business + Technology (20)

Disaster Recovery - Business & Technology
Disaster Recovery - Business & Technology Disaster Recovery - Business & Technology
Disaster Recovery - Business & Technology
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR Presentation
 
CS_10_DR_CFD
CS_10_DR_CFDCS_10_DR_CFD
CS_10_DR_CFD
 
STN Event 12.8.09 - Chris Vain Powerpoint Presentation
STN Event 12.8.09 - Chris Vain Powerpoint PresentationSTN Event 12.8.09 - Chris Vain Powerpoint Presentation
STN Event 12.8.09 - Chris Vain Powerpoint Presentation
 
Plate Spin Disaster Recovery Solution
Plate Spin Disaster Recovery SolutionPlate Spin Disaster Recovery Solution
Plate Spin Disaster Recovery Solution
 
WI_Symposium_Conference_2014
WI_Symposium_Conference_2014WI_Symposium_Conference_2014
WI_Symposium_Conference_2014
 
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseNovember 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
 
VMworld 2013: DR to The Cloud with VMware Site Recovery Manager and Rackspace...
VMworld 2013: DR to The Cloud with VMware Site Recovery Manager and Rackspace...VMworld 2013: DR to The Cloud with VMware Site Recovery Manager and Rackspace...
VMworld 2013: DR to The Cloud with VMware Site Recovery Manager and Rackspace...
 
Zerto for dr migration to cloud overview
Zerto for dr migration to cloud overviewZerto for dr migration to cloud overview
Zerto for dr migration to cloud overview
 
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
 
BACK FROM THE EDGE: INFRASTRUCTURE PROTECTION THROUGH PLATESPIN
BACK FROM THE EDGE: INFRASTRUCTURE PROTECTION THROUGH PLATESPINBACK FROM THE EDGE: INFRASTRUCTURE PROTECTION THROUGH PLATESPIN
BACK FROM THE EDGE: INFRASTRUCTURE PROTECTION THROUGH PLATESPIN
 
EVault Technical DRaaS Guide_Final
EVault Technical DRaaS Guide_FinalEVault Technical DRaaS Guide_Final
EVault Technical DRaaS Guide_Final
 
IBM PROTECTIER: FROM BACKUP TO RECOVERY
IBM PROTECTIER: FROM BACKUP TO RECOVERYIBM PROTECTIER: FROM BACKUP TO RECOVERY
IBM PROTECTIER: FROM BACKUP TO RECOVERY
 
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
 
Disaster Recovery & Business Continuity Overview
Disaster Recovery & Business Continuity Overview Disaster Recovery & Business Continuity Overview
Disaster Recovery & Business Continuity Overview
 
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best PracticesThe Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
 
Journey Through the AWS Cloud; Disaster Recovery
 Journey Through the AWS Cloud; Disaster Recovery Journey Through the AWS Cloud; Disaster Recovery
Journey Through the AWS Cloud; Disaster Recovery
 
Disaster recovery - What, Why, and How
Disaster recovery - What, Why, and HowDisaster recovery - What, Why, and How
Disaster recovery - What, Why, and How
 
Data Protection And Disaster Recovery Overview Wine Mixer
Data Protection And Disaster Recovery Overview Wine MixerData Protection And Disaster Recovery Overview Wine Mixer
Data Protection And Disaster Recovery Overview Wine Mixer
 
Backing up your virtual environment best practices
Backing up your virtual environment   best practicesBacking up your virtual environment   best practices
Backing up your virtual environment best practices
 

Más de Andrew Miller

Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnAndrew Miller
 
Q2 Sirius Lunch & Learn - vSphere 6 & Windows 2003 EoL
Q2 Sirius Lunch & Learn - vSphere 6 & Windows 2003 EoLQ2 Sirius Lunch & Learn - vSphere 6 & Windows 2003 EoL
Q2 Sirius Lunch & Learn - vSphere 6 & Windows 2003 EoLAndrew Miller
 
Varrow Madness Sneak Peek
Varrow Madness Sneak PeekVarrow Madness Sneak Peek
Varrow Madness Sneak PeekAndrew Miller
 
Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...
Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...
Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...Andrew Miller
 
Virtualizing Tier One Applications - Varrow
Virtualizing Tier One Applications - VarrowVirtualizing Tier One Applications - Varrow
Virtualizing Tier One Applications - VarrowAndrew Miller
 

Más de Andrew Miller (6)

The Golden Hammer
The Golden HammerThe Golden Hammer
The Golden Hammer
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & Learn
 
Q2 Sirius Lunch & Learn - vSphere 6 & Windows 2003 EoL
Q2 Sirius Lunch & Learn - vSphere 6 & Windows 2003 EoLQ2 Sirius Lunch & Learn - vSphere 6 & Windows 2003 EoL
Q2 Sirius Lunch & Learn - vSphere 6 & Windows 2003 EoL
 
Varrow Madness Sneak Peek
Varrow Madness Sneak PeekVarrow Madness Sneak Peek
Varrow Madness Sneak Peek
 
Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...
Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...
Varrow Q4 Lunch & Learn Presentation - Virtualizing Business Critical Applica...
 
Virtualizing Tier One Applications - Varrow
Virtualizing Tier One Applications - VarrowVirtualizing Tier One Applications - Varrow
Virtualizing Tier One Applications - Varrow
 

Último

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Último (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

AITP July 2012 Presentation - Disaster Recovery - Business + Technology

  • 1. Disaster Recovery Business & Technology AITP Charleston July 19, 2012 Andrew Miller Senior Technical Consultant t: @andriven w: www.thinkmeta.net Varrow
  • 2. One Big Reason to Do This Expectations for Disaster Recovery ≠ IT Capabilities for Disaster Recovery
  • 3. What is a Disaster? • Disaster: An event that affects a service or system such that significant effort is required to restore the original performance level. » IT Service Management Forum  But what does that look like IN OUR ENVIRONMENT?  What disaster and recovery scenarios should we plan for?  Where do we begin?  How do we do it?
  • 4. Example of a Disaster
  • 5. Disaster Recovery vs. Operational Recovery • Disaster Recovery – To cope with & recover from an IT crisis that moves work to an alternative system in a non-routine way. – A real “disaster” is large in scope and impact – DR typically implies failure of the primary data center and recovery to an alternate site • Operational Recovery – Addresses more “routine” types of failures (server, network, storage, etc.) – Events are smaller in scope and impact than a full “disaster” – Typically implies recovering to alternate equipment within the primary data center • Business expectations for recovery timeframe is typically shorter for “operational recovery” issues than a true “disaster” • Each should have its own clearly defined objectives
  • 6. Risks, Threats and Vulnerabilities Risk is a function of the likelihood of a given threat acting upon a particular potential vulnerability, and the resulting impact of that adverse event on the organization.
  • 7. Some threats that can cause Disasters… • Human Error • Localized IT systems / network failure • Extended power outage • Telecommunications outage • Storm / Weather damage • Earthquake / Volcano • Fire in the facility • Facility flooding • Local evacuation • Cyber attack • Sabotage
  • 8. (Varrow) Disaster Recovery Approach • Interviews with key personnel to understand Business Process priorities and establish Business Impact Analysis (BIA). • Review existing IT production infrastructure, including applications, servers, storage, network, and external connectivity. Identify Risks and Gaps. • Establish Disaster Impact Scenarios and Disaster Recovery strategies to meet requirements. • Recommend Roadmap for establishing recovery capabilities and documenting plans. • Implement required recovery capabilities. • Develop framework and content for IT DR Plan. • Develop maintenance and test procedures for IT DR Plan. • Address Business Continuity requirements and planning as appropriate.
  • 9. What is the Business Impact Analysis? • A conversation between IT and key stakeholders to understand: – What are the most time-critical and information-critical business processes? – How does the business REALLY rely upon IT Service and Application availability? – What are the Student, Financial, Regulatory, Reputational, and other impacts of IT Service and Application unavailability? – What availability or recoverability capabilities are justifiable based on these requirements, potential impact, and costs?
  • 10. Disaster Recovery: Key Measures Recovery Point Objectives Recovery Time Objectives (RPO) (RTO) 5 6 7 8 9 10 11 12 1 2 3 4 5 6 7 a.m. a.m. a.m. a.m. a.m. a.m. a.m. a.m. p.m. p.m. p.m. p.m. p.m. p.m. p.m. RPO: Amount of data lost from DECLARE RTO: Targeted amount of time failure, measured as the amount DISASTER to restart a business service 10 a.m. of time from a disaster event after a disaster event
  • 11. Disaster Recovery: Key Measures • Recovery Time Objective (RTO) Maximum duration of disruption of service • Recovery Point Objective (RPO) Point in time to which application data is recovered / Maximum data loss Weeks Days Hours Minutes Seconds Seconds Minutes Hours Days Weeks Recovery Point Recovery Time Real Time Cost
  • 12. BIA - Example Priority Tiers Priority Tier Description Priority 1 Services whose unavailability more than a brief period can have a severe impact on High Availability / customers or time-critical business operations. Immediate Recovery Priority 2 Services whose unavailability significantly impacts customers or business 1-2 day recovery operations. Priority 3 Services which can tolerate up to five days of disruption in a disaster. 3-5 day recovery Priority 4 Services which can tolerate up to ten days of disruption in a disaster. 6-10 day recovery Priority 3 and 4 systems may be restored in less time, depending on the situation. However, higher priority functions will be restored first. Priority 5 Non-critical services which can tolerate two weeks or more of disruption in a “Best effort” recovery disaster. These systems will be restored on a best-effort basis, after other more critical systems have been restored and ongoing operations have resumed. Priority 5 systems may be restored in less time, depending on the situation. However, higher priority functions will be restored first. In some cases, systems deemed to not be required for continued operations may not be restored.
  • 13. What does it take to RECOVER from an IT Disaster? • Data Protection – Backups, Replication • Recovery Facility – Location to rebuild IT infrastructure or provision services • Data Recovery & Storage – Get Data into a form that is usable • Servers / Compute Capacity – Sufficient servers or virtual compute capacity to actually run the applications • Network, Voice, and Data Communications – Connect servers, storage and workers – Connect the recovery site to work sites – Communicate with customers – Includes network, telecom, demarcation equipment; cabling; telecom provisioning • DR Plan – Documented and tested procedures for what to do, and how to do it • People
  • 14. Example Disaster Recovery Strategies Priority Disaster Recovery Strategy Data Protection Approach Priority 1 Establish hot site for systems and data in a Replicate / remote mirror / short 4 hour RTO or secondary data center at a remote interval remote disk-to-disk less location that is unlikely to be impacted backup by a local or regional event. Priority 2 Maintain sufficient remote physical or virtual Remote disk-to-disk backup 24-48 hour RTO infrastructure for restoration. Ensure sufficient space/power in recovery facility. Priority 3 Ensure ability to quickly acquire Tape (with sufficient off-site rotation) 72 hour RTO infrastructure for restoration. Ensure or remote disk-to-disk backup sufficient space/power in recovery facility. Priority 4 Ensure ability to quickly acquire Tape (with sufficient off-site rotation) 1-2 week RTO infrastructure for restoration. Ensure or remote disk-to-disk backup sufficient space/power in recovery facility.
  • 15. Storage Arrays + Replication PRODUCTION SITE OPTIONAL DISASTER RECOVERY SITE Application Local RecoverPoint bi-directional Remote Standby servers copy replication/recovery copy servers RecoverPoint RecoverPoint appliance appliance Production and local journals Prod Fibre Remote SAN LUN Channel/WAN journal SAN s Storage Storage Host-based write splitter arrays arrays Fabric-based write splitter Symmetrix VMAXe, VNX-, and CLARiiON-based write splitter
  • 16. Site A (Primary) Site B (Recovery) Site Site vCenter Server Recovery vCenter Server Recovery Manager Manager vSphere vSphere vSphere Replication Storage-based replication vSphere Replication Simple, cost-efficient replication for Tier 2 applications and smaller sites Storage-based Replication High-performance replication for business-critical applications in larger sites

Notas del editor

  1. Note to Presenter: View in Slide Show mode for animation. When EMC or its partners talk about remote replication, they usually mean between storage at two locations. The source and target are physically separated to reduce the risks associated with co-location. Remote replicated systems could be across a campus, across a town, or across the globe. Their physical distance and technology selected can affect how quickly you recover from a disruption and how much data is lost.Organizations normally set requirements for how much lost data and how much time to come back online is acceptable. The recovery point objective (RPO) is the amount of data that can be lost, measured in terms of time without being catastrophic to the business. The recovery time objective (RTO) is the amount of time that it takes to recover the data and restart your business services from the recovered data. Remote replication provides much lower RPOs (at or close to zero) and very small RTOs, depending on implementation. The bottom line is that replication is appropriate for all types of data, and the RPO and RTO you target are going to affect your implementation.For multiple RPOs and for remote replication with either zero or low RPO—and near-instant to instant recovery with DVR-like technology, EMC offers the RecoverPoint family.