SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
Agenda
I. Overview

II. DR & BC Planning
III. Essentials For High Availability

IV. Hardware Solutions
V. Conclusion
Did You Know?
• 60% of companies that lose their data will shut down within 6 months
of the disaster.
• 93% of companies that lost their data center for 10 days or more due
to a disaster filed for bankruptcy within one year of the disaster. 50%
of businesses that found themselves without data management for
this same time period filed for bankruptcy immediately. (Source:
National Archives & Records Administration in Washington)

• Companies that aren’t able to resume operations within ten days (of a
disaster hit) are not likely to survive. (Strategic Research Institute)
Did You Know?
• 30% of small businesses admit they have no formal storage
procedures, or do not implement their procedures consistently.
(Imation’s Small Business Survey Special Report)
• 55% of small businesses rated themselves as “fair” or “poor” in terms
of having a documented disaster recovery plan, or do not have one at
all.
• Hardware or system failure accounts for 78% of all data loss - Human
error accounts for 11% of all data loss - Software corruption accounts
for 7% of all data loss - Natural disasters account for only 1% of all data
loss.
Types of Disasters
• Natural Disasters
– Power Outages, Floods, Hurricanes, Tornadoes, or
Earthquakes

• Human Disasters
– Hazardous Material Spills, Bio-terrorism, Human
Errors

• Hardware Failures
– Hard Drive Meltdowns, Internet Outages, Etc.
Business Continuity Cycle
Business
Continuity

High
Availability

Disaster
Recovery

Operational
Recovery
What Is Disaster Recovery?
• Disaster Recovery:
– the process related to preparing for recovery or planning critical
technology infrastructure before a natural or human disaster
occurs.
What Is Operational Recovery?
• Operational Recovery:
– Like disaster recovery, this practice focuses on the recovery of
applications and technology; however, in this case, the recovery is
within the primary processing location.
– Operational recovery contemplates the need to recover from a
service disruption that does not require a disaster declaration.
– Operational recoveries may be daily occurrences responding to
something that is not operating to plan and needs to be fixed, for
example, failure of a file server.
What Is High Availability?
• High Availability:
– In contrast to planning for recovery is planning for resiliency or uptime.
– Application clustering, hardware clustering, virtualization, and local replication
technologies are all used to keep an application resilient.
– Basic idea is to build an architecture that can continue to operate without
disruption even when one of its components fails. Resiliency is focused on “uptime”
rather than recovery time.
What Is Business Continuity?
• Business Continuity:
– In contrast to planning for recovery is planning for resiliency or uptime.
– Application clustering, hardware clustering, virtualization, and local replication
technologies are all used to keep an application resilient.
– Basic idea is to build an architecture that can continue to operate without
disruption even when one of its components fails. Resiliency is focused on “uptime”
rather than recovery time.
Disaster Recover Planning





Infrastructure Layer
Storage Layer
Server Layer
Application Layer
Disaster Recover Planning

Infrastructure Layer
 Needs to be architected in the most resilient fashion possible

 Must be built to 24 x 7 uptime
 Redundant components, secondary routes, and
redundant power
 Develop a site that is an extension of your primary site,
not a mirror or isolated copy
Disaster Recover Planning

Storage Layer
 Contains the vital data of your business
 Copies of the data for local processing, copies for local
restoration and local outages, & copies for disaster
recovery
Disaster Recover Planning

Server Layer
• The file servers and the strategy for keeping them
active and running
• Three common architectural approaches:
1.
2.
3.

Virtualizing the servers so the application sits on a virtual
container
Clustering the servers so that two or more servers are
working in unison supporting an application or process
Load balancing the servers to create two separate processing
domains that can work in conjunction with each other and
yet are maintained separately
Disaster Recover Planning Best Practices

• Create a strategic plan
– Identify and analyze disaster risks/threats
– Classify your disaster risks
– Build a risk assessment
– Determine the effects of a disaster
– Evaluate the mechanisms for recovery
– Implement your recovery phases
Disaster Recover Phases

1. Activation Phase
– Disaster effects are assessed

2. Execution Phase
–
–

Recovery procedures executed
Business operations are restored

3. Reconstitution Phase
–

Original system restored
Essentials For Ensuring Recovery & Minimum Downtime

1.
2.
3.
4.

System Configurations
Hardware Failover
Data Storage
Backups and Replication
Essentials For Ensuring Recovery & Minimum Downtime

Recommended Configurations
Essentials For Ensuring Recovery & Minimum Downtime

Basic Disaster Recovery

2 Servers, Identically Configured
Essentials For Ensuring Recovery & Minimum Downtime

Warm Standby Disaster Recovery

3 Servers, Identically Configured
2 Local & 1 Remote Site
Automated Replication
Essentials For Ensuring Recovery & Minimum Downtime

High Availability With Disaster Recovery

2 Clustered Servers & 1 Remote DR Site
2 Shared Storage Network With Replication
Essentials For Ensuring Recovery & Minimum Downtime

High Availability With Disaster Recovery

4 Clustered Servers With 2 In Remote DR Site
2 Shared Storage Network With Live Replication
Essentials For Ensuring Recovery & Minimum Downtime

Extreme High Availability With Disaster Recovery

4+ Clustered Servers With 2 In Remote DR Site
2 Shared Storage Network With Live Replication
No Data Loss
Questions?
Disaster Recovery & Business Continuity Overview

Mais conteúdo relacionado

Mais procurados

The Edge of Disaster Recovery - May Events Presentation FINAL
The Edge of Disaster Recovery - May Events Presentation FINALThe Edge of Disaster Recovery - May Events Presentation FINAL
The Edge of Disaster Recovery - May Events Presentation FINAL
John Baumgarten
 
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...
VAST
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery Plan
Rishu Mehra
 
Information system availibility control
Information system availibility controlInformation system availibility control
Information system availibility control
Shashwat Shriparv
 

Mais procurados (19)

Small Business Backup & Disaster Recovery
Small Business Backup & Disaster RecoverySmall Business Backup & Disaster Recovery
Small Business Backup & Disaster Recovery
 
Why Replication is Not Enough to Keep Your Business Running
Why Replication is Not Enough to Keep Your Business Running Why Replication is Not Enough to Keep Your Business Running
Why Replication is Not Enough to Keep Your Business Running
 
Business continuity overview
Business continuity overviewBusiness continuity overview
Business continuity overview
 
Disaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planningDisaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planning
 
Recovery Time Objective and Recovery Point Objective
Recovery Time Objective and Recovery Point ObjectiveRecovery Time Objective and Recovery Point Objective
Recovery Time Objective and Recovery Point Objective
 
How to write an IT DR plan
How to write an IT DR planHow to write an IT DR plan
How to write an IT DR plan
 
The Five Myths of Cloud-Based Disaster Recovery
The Five Myths of Cloud-Based Disaster Recovery The Five Myths of Cloud-Based Disaster Recovery
The Five Myths of Cloud-Based Disaster Recovery
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR Presentation
 
The Edge of Disaster Recovery - May Events Presentation FINAL
The Edge of Disaster Recovery - May Events Presentation FINALThe Edge of Disaster Recovery - May Events Presentation FINAL
The Edge of Disaster Recovery - May Events Presentation FINAL
 
Business Continuity & Disaster Recovery
Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery
Business Continuity & Disaster Recovery
 
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...
 
Fulcrum Group- Layer Your DR/BC
Fulcrum Group- Layer Your DR/BCFulcrum Group- Layer Your DR/BC
Fulcrum Group- Layer Your DR/BC
 
Pertemuan 15 disaster recovery plan
Pertemuan 15 disaster recovery planPertemuan 15 disaster recovery plan
Pertemuan 15 disaster recovery plan
 
9 Best Practices for Data Center Maintenance
9 Best Practices for Data Center Maintenance9 Best Practices for Data Center Maintenance
9 Best Practices for Data Center Maintenance
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery Plan
 
6 mis-availability
6 mis-availability6 mis-availability
6 mis-availability
 
Information system availibility control
Information system availibility controlInformation system availibility control
Information system availibility control
 
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie ApocalypseNovember 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
November 2014 Webinar - Disaster Recovery Worthy of a Zombie Apocalypse
 
Patch and Vulnerability Management
Patch and Vulnerability ManagementPatch and Vulnerability Management
Patch and Vulnerability Management
 

Destaque (6)

Business continuity & disaster recovery
Business continuity & disaster recoveryBusiness continuity & disaster recovery
Business continuity & disaster recovery
 
Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuity
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recovery
 
Business continuity and disaster recovery
Business continuity and disaster recoveryBusiness continuity and disaster recovery
Business continuity and disaster recovery
 
Disaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity PlanDisaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity Plan
 
Assignment on Performance management
Assignment on Performance managementAssignment on Performance management
Assignment on Performance management
 

Semelhante a Disaster Recovery & Business Continuity Overview

Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery Plan
Rishu Mehra
 
Backing up your virtual environment best practices
Backing up your virtual environment   best practicesBacking up your virtual environment   best practices
Backing up your virtual environment best practices
Interop
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backup
Rita Crawford
 
WI_Symposium_Conference_2014
WI_Symposium_Conference_2014WI_Symposium_Conference_2014
WI_Symposium_Conference_2014
Kevin McDaniel
 
Earthlink Business Cloud Disaster Recovery
Earthlink Business Cloud Disaster RecoveryEarthlink Business Cloud Disaster Recovery
Earthlink Business Cloud Disaster Recovery
Mike Ricca
 

Semelhante a Disaster Recovery & Business Continuity Overview (20)

The Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best PracticesThe Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
 
Business Continuity Knowledge Share
Business Continuity Knowledge ShareBusiness Continuity Knowledge Share
Business Continuity Knowledge Share
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity Capability
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery Plan
 
How to plan Disaster Recovery in a five simple steps
How to plan Disaster Recovery in a five simple stepsHow to plan Disaster Recovery in a five simple steps
How to plan Disaster Recovery in a five simple steps
 
Backing up your virtual environment best practices
Backing up your virtual environment   best practicesBacking up your virtual environment   best practices
Backing up your virtual environment best practices
 
Business Continuity for Mission Critical Applications
Business Continuity for Mission Critical ApplicationsBusiness Continuity for Mission Critical Applications
Business Continuity for Mission Critical Applications
 
Disaster Recovery
Disaster Recovery Disaster Recovery
Disaster Recovery
 
Maximizing Business Continuity Success
Maximizing Business Continuity SuccessMaximizing Business Continuity Success
Maximizing Business Continuity Success
 
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperWill You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
 
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backup
 
WI_Symposium_Conference_2014
WI_Symposium_Conference_2014WI_Symposium_Conference_2014
WI_Symposium_Conference_2014
 
DRP.ppt
DRP.pptDRP.ppt
DRP.ppt
 
PACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT, Security+2.8: Risk Management Best PracticesPACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT, Security+2.8: Risk Management Best Practices
 
Backups and Disaster Recovery for Nonprofits
Backups and Disaster Recovery for NonprofitsBackups and Disaster Recovery for Nonprofits
Backups and Disaster Recovery for Nonprofits
 
Webinar: How to Create a Disaster Recovery (DR) Plan that Actually Works
Webinar: How to Create a Disaster Recovery (DR) Plan that Actually WorksWebinar: How to Create a Disaster Recovery (DR) Plan that Actually Works
Webinar: How to Create a Disaster Recovery (DR) Plan that Actually Works
 
BACK FROM THE EDGE: INFRASTRUCTURE PROTECTION THROUGH PLATESPIN
BACK FROM THE EDGE: INFRASTRUCTURE PROTECTION THROUGH PLATESPINBACK FROM THE EDGE: INFRASTRUCTURE PROTECTION THROUGH PLATESPIN
BACK FROM THE EDGE: INFRASTRUCTURE PROTECTION THROUGH PLATESPIN
 
Ultan kinahan dr - minasi 2010
Ultan kinahan   dr - minasi 2010Ultan kinahan   dr - minasi 2010
Ultan kinahan dr - minasi 2010
 
Earthlink Business Cloud Disaster Recovery
Earthlink Business Cloud Disaster RecoveryEarthlink Business Cloud Disaster Recovery
Earthlink Business Cloud Disaster Recovery
 

Mais de Aventis Systems, Inc.

Mais de Aventis Systems, Inc. (20)

Remote Desktop Services - Who Needs It?
Remote Desktop Services - Who Needs It?Remote Desktop Services - Who Needs It?
Remote Desktop Services - Who Needs It?
 
The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14
 
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
 
Windows Server 2016 Licensing Tips
Windows Server 2016 Licensing TipsWindows Server 2016 Licensing Tips
Windows Server 2016 Licensing Tips
 
The Case for SSDs - Market Domination & Why You Need Them in Your Environment
The Case for SSDs - Market Domination & Why You Need Them in Your EnvironmentThe Case for SSDs - Market Domination & Why You Need Them in Your Environment
The Case for SSDs - Market Domination & Why You Need Them in Your Environment
 
Benefits of Upgrading to Windows 10 in the Government Sector
Benefits of Upgrading to Windows 10 in the Government SectorBenefits of Upgrading to Windows 10 in the Government Sector
Benefits of Upgrading to Windows 10 in the Government Sector
 
Why Government Agencies Should Consider Dell 13th Gen Servers
Why Government Agencies Should Consider Dell 13th Gen ServersWhy Government Agencies Should Consider Dell 13th Gen Servers
Why Government Agencies Should Consider Dell 13th Gen Servers
 
Tech Spec Roundup - All-in-One Desktop PCs
Tech Spec Roundup - All-in-One Desktop PCsTech Spec Roundup - All-in-One Desktop PCs
Tech Spec Roundup - All-in-One Desktop PCs
 
SMB Benefits of VPS Solutions - Availability, Security, and Support
SMB Benefits of VPS Solutions - Availability, Security, and SupportSMB Benefits of VPS Solutions - Availability, Security, and Support
SMB Benefits of VPS Solutions - Availability, Security, and Support
 
Attaching Storage to Blade Infrastructure
Attaching Storage to Blade InfrastructureAttaching Storage to Blade Infrastructure
Attaching Storage to Blade Infrastructure
 
Out-of-Band Management - Why Standard Doesn’t Cut It
Out-of-Band Management - Why Standard Doesn’t Cut ItOut-of-Band Management - Why Standard Doesn’t Cut It
Out-of-Band Management - Why Standard Doesn’t Cut It
 
Government IT Budgets: Spend Now to Save Later
Government IT Budgets: Spend Now to Save LaterGovernment IT Budgets: Spend Now to Save Later
Government IT Budgets: Spend Now to Save Later
 
Veeam Backup Essentials v9 Overview
Veeam Backup Essentials v9 OverviewVeeam Backup Essentials v9 Overview
Veeam Backup Essentials v9 Overview
 
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and DesktopsProduct Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
 
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
 
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
 
RIP SQL Server 2005 - Time to Move On!
RIP SQL Server 2005 - Time to Move On!RIP SQL Server 2005 - Time to Move On!
RIP SQL Server 2005 - Time to Move On!
 
What to Do with Your Used IT Hardware
What to Do with Your Used IT HardwareWhat to Do with Your Used IT Hardware
What to Do with Your Used IT Hardware
 
Networking Considerations for IT Labs
Networking Considerations for IT LabsNetworking Considerations for IT Labs
Networking Considerations for IT Labs
 
Don’t Get Caught by Phishing Emails!
Don’t Get Caught by Phishing Emails!Don’t Get Caught by Phishing Emails!
Don’t Get Caught by Phishing Emails!
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Disaster Recovery & Business Continuity Overview

  • 1.
  • 2. Agenda I. Overview II. DR & BC Planning III. Essentials For High Availability IV. Hardware Solutions V. Conclusion
  • 3. Did You Know? • 60% of companies that lose their data will shut down within 6 months of the disaster. • 93% of companies that lost their data center for 10 days or more due to a disaster filed for bankruptcy within one year of the disaster. 50% of businesses that found themselves without data management for this same time period filed for bankruptcy immediately. (Source: National Archives & Records Administration in Washington) • Companies that aren’t able to resume operations within ten days (of a disaster hit) are not likely to survive. (Strategic Research Institute)
  • 4. Did You Know? • 30% of small businesses admit they have no formal storage procedures, or do not implement their procedures consistently. (Imation’s Small Business Survey Special Report) • 55% of small businesses rated themselves as “fair” or “poor” in terms of having a documented disaster recovery plan, or do not have one at all. • Hardware or system failure accounts for 78% of all data loss - Human error accounts for 11% of all data loss - Software corruption accounts for 7% of all data loss - Natural disasters account for only 1% of all data loss.
  • 5. Types of Disasters • Natural Disasters – Power Outages, Floods, Hurricanes, Tornadoes, or Earthquakes • Human Disasters – Hazardous Material Spills, Bio-terrorism, Human Errors • Hardware Failures – Hard Drive Meltdowns, Internet Outages, Etc.
  • 7. What Is Disaster Recovery? • Disaster Recovery: – the process related to preparing for recovery or planning critical technology infrastructure before a natural or human disaster occurs.
  • 8. What Is Operational Recovery? • Operational Recovery: – Like disaster recovery, this practice focuses on the recovery of applications and technology; however, in this case, the recovery is within the primary processing location. – Operational recovery contemplates the need to recover from a service disruption that does not require a disaster declaration. – Operational recoveries may be daily occurrences responding to something that is not operating to plan and needs to be fixed, for example, failure of a file server.
  • 9. What Is High Availability? • High Availability: – In contrast to planning for recovery is planning for resiliency or uptime. – Application clustering, hardware clustering, virtualization, and local replication technologies are all used to keep an application resilient. – Basic idea is to build an architecture that can continue to operate without disruption even when one of its components fails. Resiliency is focused on “uptime” rather than recovery time.
  • 10. What Is Business Continuity? • Business Continuity: – In contrast to planning for recovery is planning for resiliency or uptime. – Application clustering, hardware clustering, virtualization, and local replication technologies are all used to keep an application resilient. – Basic idea is to build an architecture that can continue to operate without disruption even when one of its components fails. Resiliency is focused on “uptime” rather than recovery time.
  • 11. Disaster Recover Planning     Infrastructure Layer Storage Layer Server Layer Application Layer
  • 12. Disaster Recover Planning Infrastructure Layer  Needs to be architected in the most resilient fashion possible  Must be built to 24 x 7 uptime  Redundant components, secondary routes, and redundant power  Develop a site that is an extension of your primary site, not a mirror or isolated copy
  • 13. Disaster Recover Planning Storage Layer  Contains the vital data of your business  Copies of the data for local processing, copies for local restoration and local outages, & copies for disaster recovery
  • 14. Disaster Recover Planning Server Layer • The file servers and the strategy for keeping them active and running • Three common architectural approaches: 1. 2. 3. Virtualizing the servers so the application sits on a virtual container Clustering the servers so that two or more servers are working in unison supporting an application or process Load balancing the servers to create two separate processing domains that can work in conjunction with each other and yet are maintained separately
  • 15. Disaster Recover Planning Best Practices • Create a strategic plan – Identify and analyze disaster risks/threats – Classify your disaster risks – Build a risk assessment – Determine the effects of a disaster – Evaluate the mechanisms for recovery – Implement your recovery phases
  • 16. Disaster Recover Phases 1. Activation Phase – Disaster effects are assessed 2. Execution Phase – – Recovery procedures executed Business operations are restored 3. Reconstitution Phase – Original system restored
  • 17. Essentials For Ensuring Recovery & Minimum Downtime 1. 2. 3. 4. System Configurations Hardware Failover Data Storage Backups and Replication
  • 18. Essentials For Ensuring Recovery & Minimum Downtime Recommended Configurations
  • 19. Essentials For Ensuring Recovery & Minimum Downtime Basic Disaster Recovery 2 Servers, Identically Configured
  • 20. Essentials For Ensuring Recovery & Minimum Downtime Warm Standby Disaster Recovery 3 Servers, Identically Configured 2 Local & 1 Remote Site Automated Replication
  • 21. Essentials For Ensuring Recovery & Minimum Downtime High Availability With Disaster Recovery 2 Clustered Servers & 1 Remote DR Site 2 Shared Storage Network With Replication
  • 22. Essentials For Ensuring Recovery & Minimum Downtime High Availability With Disaster Recovery 4 Clustered Servers With 2 In Remote DR Site 2 Shared Storage Network With Live Replication
  • 23. Essentials For Ensuring Recovery & Minimum Downtime Extreme High Availability With Disaster Recovery 4+ Clustered Servers With 2 In Remote DR Site 2 Shared Storage Network With Live Replication No Data Loss