SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
Business Continuity
and Today’s “Always On” Business Environment




xo.com
Business Continuity & Today’s “Always-On” Business Environment                                 www.xo.com




XO Communications




2                                                            Services: VoIP ▪ Voice ▪ Network ▪ Internet & Hosted IT
www.xo.com                                                                                          XO Communications




BUSINESS CONTINUITY
& TODAY’S “ALWAYS-ON”
BUSINESS ENVIRONMENT
                                                                  Table of Contents
                                                                  Crisis Management & Business Continuity	               4

                                                                       Business Continuity Management (BCM)	             4

                                                                       Types of Risk to Business Continuity	             4

                                                                       Elements of Business Continuity Planning	         5

                                                                       Effective Business Continuity Planning Strategies	 5

                                                                  XO Business Continuity Services	                       6

                                                                       XO Network Protection Services	                   6

                                                                           Voice Network Resiliency Services	            7

                                                                           Data Network Resiliency Services	             7

                                                                       XO Information Protection Services	               8

                                                                       XO Disaster Mitigation Services	                  9

                                                                  “Always- On” Business Environments 	                   9
                                                                  Require Strong Business Continuity Partners	

                                                                  References	10




Copyright 2012. XO Communications, LLC. All rights reserved.
XO, the XO design logo, and all related marks are registered trademarks of XO Communications, LLC.                       3
Business Continuity & Today’s “Always-On” Business Environment                                            www.xo.com




Crisis Management                                                 The success of many companies’ ongoing operations
& Business Continuity                                             depends on continuous access to key IT assets, which are
                                                                  usually accessed via network resources. Additionally, the
As the floods along the Red River in North Dakota and             ongoing functionality of important business operations, like
                                                                  call centers, can greatly depend upon both highly available
Manitoba receded in the spring of 2009, officials began to
                                                                  IT and network infrastructures. To help meet these needs,
estimate the costs of clean up, and the costs of lost revenue     XO Communications offers a broad portfolio of business
to local businesses. Several cities were endangered, includ-      continuity services. They include network protection, data
ing Winnipeg, Grand Forks, and Fargo. One early tally             and information protection, applications protection, and
estimated lost business revenue just in Fargo, a city with less   disaster mitigation services – all of which will be discussed
                                                                  in a later part of this white paper.
than 91,000 residents, at more than $100million.1

As terrible, destructive and costly as natural disasters like     TYPES OF RISK TO BUSINESS CONTINUITY
floods, hurricanes, tornados, earthquakes and wildfires are,      Three main types of threat that can impede the continuity
they are relatively infrequent occurrences. But disruptions       of business operations include those that inhibit the use of
to daily living and business operations occur every day.          key company buildings and facilities, risks that that limit
Typically, disruptions are due to carelessness or accident, but   the ability of employees to work at those facilities, and
                                                                  threats that hamper the usefulness of key IT and network
some are deliberate. Although it’s impossible to ensure that
                                                                  resources. Without adequate preparation, each of these
natural or man-made disruptions will never impact a par-          critical company resources is vulnerable to natural and
ticular person or business, there are a number of actions that    man-made disasters:
can be taken to reduce the risk level and provide a means
                                                                  Facilities
of rapid recovery. This is the objective of sound business        The impact of natural events, like fire, floods and hurricanes
continuity management practices.                                  can make it impossible to access a building for a prolonged
                                                                  period of time. Man-made events can also impede access to
BUSINESS CONTINUITY MANAGEMENT (BCM)                              the worksite. In 2009, for more than a day, protests in Lon-
                                                                  don essentially closed the financial district, even to people
Fundamentally, business continuity management is a set of         who work there.2
coordinated plans and actions that mitigate and/or negate
the adverse effects natural and man-made events have on           Workforce
key business operations.                                          Consider these scenarios—in recent years, terrorists dis-
                                                                  rupted train, subway and bus routes schedules in major
Most companies already engage in business continuity              cities, making it impossible for commuters to travel to work.
management practices to some degree. For instance, in the         Of broader and longer lasting impact is a pandemic—to
U.S., occupants of large buildings are required by law to         minimize casualties, the government could prohibit the
practice fire drills at regular intervals. These drills help to   congregation of people (at places of work and elsewhere) for
protect employees who work inside the building, and can           extended periods of time.
also help to protect the building and its contents. Good
business continuity management practices are necessary to         IT Infrastructure
reduce the impact of a wide range of threats. They focus          Security breaches or the unavailability of key IT and
on protecting and preserving employees, facilities, and key       network managers can diminish the usefulness of critical
resources, including essential company information housed         business information located in data and network hubs.
in storage arrays, servers and personal computers.                Without sufficient backup power, brownouts and blackouts
                                                                  in the electrical grid can crash servers, LAN and WAN
                                                                  connectivity. Natural and man-made events can damage




4                                                                    Services: VoIP ▪ Voice ▪ Network ▪ Internet & Hosted IT
www.xo.com                                                                                             XO Communications




key facilities, and thus render IT and network infrastruc-        II Accord and the Graham-Leach-Bliley Act each contain
ture inoperable. When considering the underlying causes of        requirements designed to assure the continuation of key
business interruptions, only 3 out of 100 are caused by acts      business operations in particular industries.
of nature. In contrast, 32% of the business interruptions
are caused by human error, and 65% are caused by mal-             ELEMENTS OF BUSINESS CONTINUITY PLANNING
functions in IT and communications hardware, software
or services. Approximately 11% of IT and network-related          Key components of a business continuity plan include
malfunctions are directly caused by computer viruses.3            documentation of the business operations that are included
                                                                  in the continuity strategy, their threats and regulatory
Regulation                                                        requirements, and mediation and remediation activities.
Some regulations, like Sarbanes- Oxley, have broad scope          The plan identifies the resources and personnel which
and far-reaching impact on business continuity and disaster       compose the business continuity team. These can be inter-
recovery planning. Among other provisions, it mandates            nal resources and personnel, and/or external ones. It also
that publicly-held companies engage in certain business           contains information on the ROI of each business
continuity practices, particularly pertaining to data stor-       continuity action. If certain internal or external com-
age and archival. In some industries, possible risks to their     pany locations are designated to act as alternate locations
business operations are so great, and their potential impact      for some business continuity activities, this must also be
so pervasive that specific regulations have been enacted to       documented. Finally, to ensure continuity in the planning
minimize their existence and effect. For instance the Health      process over time, some companies may elect to include
Insurance Portability and Accountability Act (HIPAA),             an appendix that lists business operations that were
Federal Energy Regulatory Commission (FERC), Federal              excluded from the continuity plan, and the reason for
Information Security Management Act (FISMA), Payment              their exclusion. Figure 1 shows the Business Continuity
Card Industry Data Security Standard (PCI DSS), the Basel         Life Cycle that businesses can use to conceptualize their
                                                                  approach to business continuity planning.

                                                                  EFFECTIVE BUSINESS CONTINUITY
                         ure                 I de                 PLANNING STRATEGIES
                     s
                  ea                                nt
              M                                                   Effective business continuity strategies rank the potential
                                                     ify




                 Test &                  Risk
                                                                  effects of various threats to ongoing business operations.
               Maintenance            Assessment
                                                                  They also employ both proscriptive and prescriptive remedi-
                                                                  ation techniques, and use business case framework to assess
                                                                  and compare risk and remediation costs:
                               Business
                               Continuity                         Rank Risk
              Plan,                         Business              Each organization should identify its key business activi-
                               Life Cycle
   Exec




             Develop,                        Impact               ties and determine how long they can be forgone without
             Execute                        Analysis
                                                           sis




                                                                  adversely impacting the company or its customers. In
       ute




                                                           aly




                                                                  addition to ranking these events by time, they also must be
                                People.
                                                         An




                                                                  ranked by their financial impact. When combined, com-
                               Processes,
                                                                  panies use these two factors to assess high-medium-low
                                Systems
                                                                  risks. For instance, an event that has immediate impact but
                                                                  is financially small poses low risk and thus also has a low
                                 Design
                                                                  recovery objective.

                                                                  Employ Both Risk Avoidance and Remediation Tactics
                                                                  To optimize the effectiveness of a business continuity plan,
Figure 1: Business Continuity Life Cycle
                                                                  effective strategies typically contain both proscriptive and


Copyright 2012. XO Communications, LLC. All rights reserved.
XO, the XO design logo, and all related marks are registered trademarks of XO Communications, LLC.                               5
Business Continuity & Today’s “Always-On” Business Environment                                               www.xo.com



prescriptive elements.                                             Training
                                                                   Key internal and external personnel and their alternates
•	   Proscriptive. To maximize agent productivity, it’s            must be trained on the business continuity strategy and
     fairly common for companies with large call cen-              plan, and their roles in fulfilling its objectives. This includes
     ter operations to deploy them in diverse geographic           key executives. The company should conduct drills to
     regions, and to use IT and network technology to route        familiarize personnel with plan enactment, and to identify,
     or transfer calls between the centers. Proscriptively, if     remediate and re-test any weaknesses in the plan.
     employees can’t get to their normal workplace dur-
     ing a blizzard, agents in other centers can handle their
     calls. This essentially brunts virtually all of the adverse   XO Business Continuity Services
     impact to customers.
                                                                   To help companies assure that key business operations that
•	   Prescriptive. Companies that employ just- in- time            depend on highly available IT and network resources aren’t
     inventory practices can be vulnerable to disruptions          impacted by natural and man-made crises, XO Communi-
     experienced by primary shippers. Some of these busi-          cations offers a broad range of services that can help protect
     nesses have made advanced arrangements to obtain              IT applications, company data and networks.
     critical inventory via alternate shippers. A delay in
     receiving inventory will occur, but it won’t be as disrup-    XO NETWORK PROTECTION SERVICES
     tive as if no plans had been made.
                                                                   When considering business continuity management
•	   Proscriptive and Prescriptive. Many organizations             practices, most companies assume the focus of their IT
     back up critical IT data and processes, often in more         infrastructure protection efforts will be on data network
     than one location. Such a strategy contains both risk         preservation and restoration. And for small, medium and
     avoidance and business recovery elements.                     large companies across diverse industries, this often is the
                                                                   case. However, some companies’ key business operations
Understand Total BCM Return on Investment (ROI)                    also depend upon the continuous availability of voice ser-
Companies will develop and execute plans based on the              vices. Companies with contact centers that support inbound
level of risk to ongoing business operations, recovery             or outbound sales, or customer service, are clear examples. It
objectives, and their avoidance and mitigation costs. In           won’t take very long for a company to begin to lose revenue
the inventory example above, the company implemented               if its customers can’t communicate with contact center
processes to reduce, not eliminate, the impact of disruptions      representatives during normal business hours. In addition,
with primary shippers who supply critical inventory. In            employee access to internal resources, like IT help desk
theory, the company could employ other methods to reduce           or HR, can also depend on voice services. Particularly in
the risk of running out of inventory, including stocking           emergencies like hurricanes or tornados, these can be vital
large reserves on premises. But it has calculated that the         resources for affected employees, and thus for the ongoing
costs involved in such possible solutions outweigh the risk        operation of the business.
and costs of its preferred approach
                                                                   Many smaller businesses, or those with one primary loca-
Key Stakeholders                                                   tion, may assume that network protection services are only
The plan lists by name and function each member of the             needed by medium and large companies—that it’s unlikely
business continuity team, their contact information and            that a single site won’t have access to the network for any
alternates. The plan also contains information on their per-       lengthy period of time. But if a backhoe mistakenly takes
formance metrics. Without the involvement of key execu-            out the main electrical or communications links into a
tives, a business continuity strategy runs the risk of being       building, that business location will be off the grid for at
nothing more than a document that gathers dust. Good               least several hours, and probably much longer. And just
contingency plans assume that key executives won’t be able         like some man-made threats, many natural events, like
to fulfill their normal duties during a crisis, and designates     fire, tornado and flood, can render a site unusable for days,
and trains alternates.                                             weeks or months. Thus in some cases, companies with only



6                                                                     Services: VoIP ▪ Voice ▪ Network ▪ Internet & Hosted IT
www.xo.com                                                                                               XO Communications




one main business location are more vulnerable to business         companies, even in the same industry, may have different
continuity threats than are larger companies with several          cost/risk profiles. To meet a wide range of needs, XO offers
main business sites.                                               a broad array of data network protection services:

Companies who are interested in assuring network                  Fixed Wireless Access Diversity
continuity will find that XO has a very broad portfolio of        To ensure the ultimate in access diversity and availability,
services designed to protect both voice and data networks.        XO’s Nextlink broadband fixed wireless access service can
And since these networks connect to IT resources through          be used to backup any type of dedicated access that is con-
network access and premises equipment like routers, XO            nected to either voice or data services, or both.
offers a range of services to protect these assets as well.
They include:                                                     Landline Access Diversity
                                                                  At a customer’s request, XO will deploy diversely routed
Voice Network Resiliency Services                                 landline access from its point of origin at the customer
                                                                  premises to its network node and beyond. To ensure the
XO offers a range of services to support inbound and out-         highest levels of continuity of key data-oriented business
bound calling requirements:                                       applications, customers may employ either landline or fixed
                                                                  wireless access diversity in conjunction with IP or MPLS
Inbound Call Re-Routing                                           load sharing or multi-homing networks.
XO offers several different automatic call re-routing features
designed to protect important inbound calls and contact           Multi-Homing Networks
center applications. In addition, some companies make             Companies who are interested in ensuring uninterrupted
extensive use of Interactive Voice Response (IVR) applica-        data network connectivity between select sites can use
tions for use internally, or for use by customers, suppliers      techniques like load sharing or multi-homing on both XO’s
and key partners. XO provides hosted voice XML services           MPLS IP-VPN and dedicated Internet access services.
that can be deployed on a dedicated server in XO’s host-
ing center. For customers who are interested in minimizing        High-Bandwidth Network Transport Solutions
costs, XO also offers hosted voice XML service on a shared        Companies with very large file transfer requirements, or
platform. To assure availability, XO’s resources are housed       who are in heavily regulated industries like healthcare
in multiple data centers deployed across the U.S.                 or financial services, will be interested in using high-
                                                                  bandwidth dedicated private line services to construct fully
Outbound Call Re-Routing                                          redundant, geographically diverse networks between large
For some companies, their business continuity requirements        data centers. XO’s private line services use a variety of state-
dictate the preservation of both incoming and outgoing            of –the-art WAN technologies, including Ethernet and
call connectivity. XO provides features to support this—for       wavelength services.
both traditional PSTN calls and VoIP calls.
                                                                  Collocation
Administration                                                    XO makes its highly secure, carrier grade environment with
XO provides customers with a broad range of tools to              redundant power supplies available to customers for colloca-
administer and manage their voice protection services as          tion. Although some companies use co-location as a backup
they need to, on a round the clock basis. These self-service      to premises-based web and applications servers, others who
tools include basic touch tone access and web-based access.       want to totally eliminate the threat posed by access unavail-
                                                                  ability will co-locate key servers in XO’s data centers.
Data Network Resiliency Services
                                                                  Applications Performance Management
Good business continuity practices attempt to balance the         These begin with XO’s three tiers of application perfor-
costs of implementing data network continuity practices           mance management tools, which customers can use to spot
against the importance of the activity to continuing opera-       and remediate potential problems in their MPLS-based
tions, and the likelihood a problem will occur. Different         networks before they do any damage.



Copyright 2012. XO Communications, LLC. All rights reserved.
XO, the XO design logo, and all related marks are registered trademarks of XO Communications, LLC.                                7
Business Continuity & Today’s “Always-On” Business Environment                                                          www.xo.com



Remote VPN                                                                             ity threats. XO offers both premises-based managed services
Companies who want to ensure that employees can access                                 and hosted services to help protect your organization’s
important computing resources without interruption will                                information. They include:
employ Internet VPN backup services, which are available
on a broadband or dial-up basis.                                                       Managed Backup
                                                                                       XO’s state of the art remote backup service combines WAN
Figure 2 summarizes the different types of data network                                and remote access resources with the resources of XO’s
and CPE diversity and the levels of protection they provide.                           cloud computing platform to deliver a round the clock,
Figure 3 outlines the risks and costs trade-off for certain                            highly automated, efficient, cost-effective and scalable
types of data network protection.                                                      service that protects data housed in popular software like
                                                                                       Oracle databases and Microsoft Exchange, and across a
Capability
                                         Medium        High           Very High        wide variety of operating systems commonly deployed in
                                         Protection    Protection     Protection
                                                                                       servers, desktop PCs and notebooks. By employing 128-bit
Wireless Access as Backup                                                  
                                                                                       AES encryption, the service is highly secure. Finally, it pro-
Full Access Diversity                                                                 vides easy to use web-based tools for customers to manage
Redundant Access, Single Router                                                       and retrieve stored data.
Redundant Access, and
Multiple Routers                                           
Redundant Access with Diverse                                                          Email Filter and Authentication
                                                                           
Network Gateways
                                                                                       For customers that house email in their own servers, XO
Diverse Carriers                                                                      offers a Perimeter email Protection (PEP) service that stops
Collocation Only                                                                      spam and filters viruses before they arrive at the server. It
Collocation with Access Diversity                                                     also prevents other types of malicious behavior, including
Collocation with Hardware
                                                                                      phishing, DDOS, secondary attacks, and directory har-
and Access Diversity
                                                                                       vesting. This service, developed by XO, is identical to the
                                                                                       one employed in XO’s hosted Exchange and web hosting
Figure 2: Protecting Access and CPE Levels of Protection                               services, and works with all major brands of email software.
                                                                                       Critical to any business continuity strategy is planning for
                                                                                       email server unavailability. Should the server be unable
High




                                                                                       to receive email for a period of time, PEP will store up to
                                                                    Diverse Carriers
                                                                                       5 days of incoming email at no charge, and deliver it to
                                                                                       the customer’s email server as soon as it has been restored.
                                                                                       Introduced in 2006, XO’s PEP service includes companies
 Cost $$$




                                                           Multi-Homing                in IT, professional services and retail industries.

                                              VPN Remote Back-Up                       Managed Security Solutions
                                                                                       In addition to email filtering and authentication, XO offers
                                Applications Preformance
                                Management
                                                                                       a very scalable, managed security solution which includes
                                                                                       an Internet firewall service that can be located either on
Low




                                                                                       the customer’s premises or in the XO network. The latter
                               Level of Protection
            Low                                                     High               approach can be cost effective because it assures that access
                                                                                       trunks are utilized only for authorized applications and
Figure 3: Risk/Cost Trade-Off for Data Protection Options                              users, and don’t experience congestion caused by security
                                                                                       breaches. XO’s Cisco-certified managed firewall service was
                                                                                       introduced more than ten years ago and is used by many
XO INFORMATION PROTECTION SERVICES                                                     industries, including finance, healthcare and retail. XO also
                                                                                       offers a service that bundles managed firewall with man-
Irrespective of where they are housed, key IT and network
                                                                                       aged VPN services.
resources must be protected against security and survivabil-



8                                                                                         Services: VoIP ▪ Voice ▪ Network ▪ Internet & Hosted IT
www.xo.com                                                                                             XO Communications




Dedicated Web Hosting                                             “Always- On” Business
Companies with mission-critical web applications, includ-          Environments Require Strong
ing e-commerce, are very interested in assuring their high
survivability and availability. To support this, XO devel-
                                                                   Business Continuity Partners
oped its own patented clustered web hosting platform.             In today’s “always-on” business environment, creating and
Types of industries that use XO’s hosted e-commerce service       implementing a business continuity and disaster recovery
include IT services, professional services and retail.            plan is critical in order to:

XO DISASTER MITIGATION SERVICES                                   •	   Protect revenue, ensure employee productivity and
                                                                       protect your company’s ability to serve its customers
Since it’s not possible to prevent all crises from affecting           without interruption.
business operations, XO also offers a range of services to
mitigate their ill effect and help ensure organizations can       •	   Ensure compliance with government mandated
maintain communications with employees, customers and                  regulations and industry guidelines that require your
partners during a disaster. These include:                             company to implement and maintain business continu-
                                                                       ity plans; and
Teleworking Services
These include tools to support both voice and data appli-         •	   Proactively protect your company’s IT infrastructure
cations, enabling employees to work virtually from any                 against many types of events that can negatively impact
location. To protect against the unavailability of key IT and          your business. Given their increasing frequency, these
network resources housed in particular facilities, XO offers           safeguards extend to protecting your company from
network-based web conferencing, audio conferencing, voice-             security threats to IT and network resources.
mail and email services. In addition, by using XO Any-
                                                                  XO Communications has one of the nation’s largest and
where service, employees can turn any phone into their XO
                                                                  most technologically advanced nationwide networks. Its
office phone line because the service operates independently
                                                                  architecture provides a unique balance between cost effec-
of PBXs or key systems (these can be unavailable in the
                                                                  tiveness and requirements to maximize performance and
event of a facilities-related emergency). XO’s VPN remote
                                                                  availability With XO Communications as your business
access service, discussed in an earlier section, can be used
                                                                  continuity partner, you can have solutions that deliver bot-
to connect remote employees to a particular location to still
                                                                  tom line benefits to help you:
access its computing resources.
                                                                  •	   Protect Your Network
Multi-Media and Outbound Notification Services
Employees who are part of the business continuity team            •	   Protect Your Information & Data
must be able to communicate with each other, and with
other employees, as soon as an emergency occurs. Organiza-        •	   Mitigate Disruption
tions may also need to communicate with people in other
companies, with customers, or with key emergency services
personnel. XO Connect, a multimedia notification service,
supports the broadcast of messages across a variety of media,
including text messages, email and voice calls. XO’s Inter-
active Voice Response (IVR) services can also be used to
support a company’s employee notification requirements.




Copyright 2012. XO Communications, LLC. All rights reserved.
XO, the XO design logo, and all related marks are registered trademarks of XO Communications, LLC.                               9
Business Continuity & Today’s “Always-On” Business Environment                                          www.xo.com




 Objective                 XO Service                          Benefit
 Protect My                Wireless Network Resiliency         Provides back-up connection via high-speed broadband
 Network                                                       wireless connections
                           Dedicated Internet Access           Ensure availability of applications and access with back-
                           Redundancy and Re-Routing           up or shared IP ports when primary IP port is unavailable
                           MPLS IP-VPN                         High-performance private wide area network solution
                                                               for primary or as “always-on” back-up network
                           High-Bandwidth Network Transport    Provides additional layer of network resiliency with
                                                               Ethernet and wavelength services for connecting locations
                                                               and data centers
                           Collocation                         Provides secure back-up facilities for data
                                                               center operations
                           Applications Performance            Proactive monitoring of applications and network
                           Management                          performance so issues can be better anticipated
                           Voice Re-Routing and Redundancy     Ability to re-route inbound large call volumes to alternate
                           Services                            locations or phone numbers
 Protect My                MPLS IP-VPN                         Ensures data traffic transmitted across network does
 Information                                                   not touch the public Internet
                           Managed Security                    Protection for data against outages from hacking
                                                               and viruses
                           Managed Backup                      Data back-up to remote location with full restore back
                                                               to primary data center
                           Perimeter Email Protection          Filters and scans email to reduce spam and viruses and
                                                               backs up email after an outage
                           Web Hosting                         Facilitates ongoing web operations during an outage
                                                               because server is hosted by XO
 Mitigate                  Teleworking                         Allow employees to work anywhere with unified
 Disruption                                                    communications, conferencing, remote VPN and
                                                               hosted email services
                           Notification Services               Provides voice and multi-media communication tools for
                                                               notifying employees, customers and partners in the event
                                                               of an outage

Services may not be available in all areas.

References
1.	 “Bill Rolls in for Red River Flooding”, Minnesota Public Radio, April 6, 2009
2.	 “G20 Protests: Riot Police Clash with Demonstrators”, the Guardian, April 1, 2009.
3.	 “Techniques, Tips and Technologies for Business Continuity Planning”, Computer Associates webinar, 2004.



10                                                               Services: VoIP ▪ Voice ▪ Network ▪ Internet & Hosted IT
www.xo.com                                                                                          XO Communications




Copyright 2012. XO Communications, LLC. All rights reserved.
XO, the XO design logo, and all related marks are registered trademarks of XO Communications, LLC.                  11
About XO Communications
XO Communications is a leading nationwide provider of advanced broadband communica-
tions services and solutions for businesses, enterprises, government, carriers and service
providers. Its customers include more than half of the Fortune 500, in addition to leading cable
companies, carriers, content providers and mobile network operators. Utilizing its unique
combination of high-capacity nationwide and metro networks and broadband wireless capa-
bilities, XO Communications offers customers a broad range of managed voice, data and IP
services with proven performance, scalability and value in more than 85 metropolitan markets
across the United States. For more information, visit www.xo.com.

For XO updates, follow us on: Twitter | Facebook | Linkedin | SlideShare | YouTube | Flickr




© Copyright 2012. XO Communications, LLC. All rights reserved.
XO, the XO design logo, and all related marks are trademarks of XO Communications, LLC.

Mais conteúdo relacionado

Mais de XO Communications

2016 The Year of the Zettabyte
2016 The Year of the Zettabyte2016 The Year of the Zettabyte
2016 The Year of the ZettabyteXO Communications
 
Forces Disrupting the Network
Forces Disrupting the Network Forces Disrupting the Network
Forces Disrupting the Network XO Communications
 
From the Network to Multi-Cloud: How to Chart an Integrated Strategy
From the Network to Multi-Cloud: How to Chart an Integrated StrategyFrom the Network to Multi-Cloud: How to Chart an Integrated Strategy
From the Network to Multi-Cloud: How to Chart an Integrated StrategyXO Communications
 
Forces Disrupting the Network
Forces Disrupting the NetworkForces Disrupting the Network
Forces Disrupting the NetworkXO Communications
 
The ROI of Application Performance Management Build a Business Case for Your ...
The ROI of Application Performance Management Build a Business Case for Your ...The ROI of Application Performance Management Build a Business Case for Your ...
The ROI of Application Performance Management Build a Business Case for Your ...XO Communications
 
Key Considerations for MPLS IP-VPN Success
Key Considerations for  MPLS IP-VPN SuccessKey Considerations for  MPLS IP-VPN Success
Key Considerations for MPLS IP-VPN SuccessXO Communications
 
Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?
Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?
Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?XO Communications
 
Avoid Three Common Pitfalls With VoIP Readiness Assessments
Avoid Three Common Pitfalls With VoIP Readiness AssessmentsAvoid Three Common Pitfalls With VoIP Readiness Assessments
Avoid Three Common Pitfalls With VoIP Readiness AssessmentsXO Communications
 
MPLS IP VPNs: Are You Ready to Migrate?
MPLS IP VPNs: Are You Ready to Migrate?MPLS IP VPNs: Are You Ready to Migrate?
MPLS IP VPNs: Are You Ready to Migrate?XO Communications
 
WAN Services Planning Checklist
WAN Services Planning ChecklistWAN Services Planning Checklist
WAN Services Planning ChecklistXO Communications
 
Cloud Communications: Top 5 Advantages for Your Enterprise
Cloud Communications: Top 5 Advantages for Your EnterpriseCloud Communications: Top 5 Advantages for Your Enterprise
Cloud Communications: Top 5 Advantages for Your EnterpriseXO Communications
 
Implementing SIP Trunking: Keys to Ensuring Interoperability
Implementing SIP Trunking: Keys to Ensuring InteroperabilityImplementing SIP Trunking: Keys to Ensuring Interoperability
Implementing SIP Trunking: Keys to Ensuring InteroperabilityXO Communications
 
Level 3 Global Crossing Merger Not in Public Interest
Level 3 Global Crossing Merger Not in Public InterestLevel 3 Global Crossing Merger Not in Public Interest
Level 3 Global Crossing Merger Not in Public InterestXO Communications
 
WAN Cloud Communication Optimization
WAN Cloud Communication OptimizationWAN Cloud Communication Optimization
WAN Cloud Communication OptimizationXO Communications
 
Meet XO Communications - 2011
Meet XO Communications - 2011Meet XO Communications - 2011
Meet XO Communications - 2011XO Communications
 
Commendation from the New York Public Service Commission for Excellent Qualit...
Commendation from the New York Public Service Commission for Excellent Qualit...Commendation from the New York Public Service Commission for Excellent Qualit...
Commendation from the New York Public Service Commission for Excellent Qualit...XO Communications
 
Why SIP Makes Sense: Enabling the Evolution to Unified Communications
Why SIP Makes Sense: Enabling the Evolution to Unified CommunicationsWhy SIP Makes Sense: Enabling the Evolution to Unified Communications
Why SIP Makes Sense: Enabling the Evolution to Unified CommunicationsXO Communications
 

Mais de XO Communications (20)

2016 The Year of the Zettabyte
2016 The Year of the Zettabyte2016 The Year of the Zettabyte
2016 The Year of the Zettabyte
 
Forces Disrupting the Network
Forces Disrupting the Network Forces Disrupting the Network
Forces Disrupting the Network
 
From the Network to Multi-Cloud: How to Chart an Integrated Strategy
From the Network to Multi-Cloud: How to Chart an Integrated StrategyFrom the Network to Multi-Cloud: How to Chart an Integrated Strategy
From the Network to Multi-Cloud: How to Chart an Integrated Strategy
 
Forces Disrupting the Network
Forces Disrupting the NetworkForces Disrupting the Network
Forces Disrupting the Network
 
The ROI of Application Performance Management Build a Business Case for Your ...
The ROI of Application Performance Management Build a Business Case for Your ...The ROI of Application Performance Management Build a Business Case for Your ...
The ROI of Application Performance Management Build a Business Case for Your ...
 
Key Considerations for MPLS IP-VPN Success
Key Considerations for  MPLS IP-VPN SuccessKey Considerations for  MPLS IP-VPN Success
Key Considerations for MPLS IP-VPN Success
 
SIP for the Enterprise
SIP for the Enterprise SIP for the Enterprise
SIP for the Enterprise
 
Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?
Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?
Intro to Voice over Internet Protocol: What does VoIP Mean for My Business?
 
Avoid Three Common Pitfalls With VoIP Readiness Assessments
Avoid Three Common Pitfalls With VoIP Readiness AssessmentsAvoid Three Common Pitfalls With VoIP Readiness Assessments
Avoid Three Common Pitfalls With VoIP Readiness Assessments
 
MPLS IP VPNs: Are You Ready to Migrate?
MPLS IP VPNs: Are You Ready to Migrate?MPLS IP VPNs: Are You Ready to Migrate?
MPLS IP VPNs: Are You Ready to Migrate?
 
Wan and VPN Solutions
Wan and VPN SolutionsWan and VPN Solutions
Wan and VPN Solutions
 
WAN Services Planning Checklist
WAN Services Planning ChecklistWAN Services Planning Checklist
WAN Services Planning Checklist
 
Cloud Communications: Top 5 Advantages for Your Enterprise
Cloud Communications: Top 5 Advantages for Your EnterpriseCloud Communications: Top 5 Advantages for Your Enterprise
Cloud Communications: Top 5 Advantages for Your Enterprise
 
Implementing SIP Trunking: Keys to Ensuring Interoperability
Implementing SIP Trunking: Keys to Ensuring InteroperabilityImplementing SIP Trunking: Keys to Ensuring Interoperability
Implementing SIP Trunking: Keys to Ensuring Interoperability
 
Level 3 Global Crossing Merger Not in Public Interest
Level 3 Global Crossing Merger Not in Public InterestLevel 3 Global Crossing Merger Not in Public Interest
Level 3 Global Crossing Merger Not in Public Interest
 
WAN Cloud Communication Optimization
WAN Cloud Communication OptimizationWAN Cloud Communication Optimization
WAN Cloud Communication Optimization
 
Meet XO Communications - 2011
Meet XO Communications - 2011Meet XO Communications - 2011
Meet XO Communications - 2011
 
Commendation from the New York Public Service Commission for Excellent Qualit...
Commendation from the New York Public Service Commission for Excellent Qualit...Commendation from the New York Public Service Commission for Excellent Qualit...
Commendation from the New York Public Service Commission for Excellent Qualit...
 
Meet XO Communications
Meet XO CommunicationsMeet XO Communications
Meet XO Communications
 
Why SIP Makes Sense: Enabling the Evolution to Unified Communications
Why SIP Makes Sense: Enabling the Evolution to Unified CommunicationsWhy SIP Makes Sense: Enabling the Evolution to Unified Communications
Why SIP Makes Sense: Enabling the Evolution to Unified Communications
 

Último

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Último (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Business Continuity in Today's "Always On" Environment

  • 1. Business Continuity and Today’s “Always On” Business Environment xo.com
  • 2. Business Continuity & Today’s “Always-On” Business Environment www.xo.com XO Communications 2 Services: VoIP ▪ Voice ▪ Network ▪ Internet & Hosted IT
  • 3. www.xo.com XO Communications BUSINESS CONTINUITY & TODAY’S “ALWAYS-ON” BUSINESS ENVIRONMENT Table of Contents Crisis Management & Business Continuity 4 Business Continuity Management (BCM) 4 Types of Risk to Business Continuity 4 Elements of Business Continuity Planning 5 Effective Business Continuity Planning Strategies 5 XO Business Continuity Services 6 XO Network Protection Services 6 Voice Network Resiliency Services 7 Data Network Resiliency Services 7 XO Information Protection Services 8 XO Disaster Mitigation Services 9 “Always- On” Business Environments 9 Require Strong Business Continuity Partners References 10 Copyright 2012. XO Communications, LLC. All rights reserved. XO, the XO design logo, and all related marks are registered trademarks of XO Communications, LLC. 3
  • 4. Business Continuity & Today’s “Always-On” Business Environment www.xo.com Crisis Management The success of many companies’ ongoing operations & Business Continuity depends on continuous access to key IT assets, which are usually accessed via network resources. Additionally, the As the floods along the Red River in North Dakota and ongoing functionality of important business operations, like call centers, can greatly depend upon both highly available Manitoba receded in the spring of 2009, officials began to IT and network infrastructures. To help meet these needs, estimate the costs of clean up, and the costs of lost revenue XO Communications offers a broad portfolio of business to local businesses. Several cities were endangered, includ- continuity services. They include network protection, data ing Winnipeg, Grand Forks, and Fargo. One early tally and information protection, applications protection, and estimated lost business revenue just in Fargo, a city with less disaster mitigation services – all of which will be discussed in a later part of this white paper. than 91,000 residents, at more than $100million.1 As terrible, destructive and costly as natural disasters like TYPES OF RISK TO BUSINESS CONTINUITY floods, hurricanes, tornados, earthquakes and wildfires are, Three main types of threat that can impede the continuity they are relatively infrequent occurrences. But disruptions of business operations include those that inhibit the use of to daily living and business operations occur every day. key company buildings and facilities, risks that that limit Typically, disruptions are due to carelessness or accident, but the ability of employees to work at those facilities, and threats that hamper the usefulness of key IT and network some are deliberate. Although it’s impossible to ensure that resources. Without adequate preparation, each of these natural or man-made disruptions will never impact a par- critical company resources is vulnerable to natural and ticular person or business, there are a number of actions that man-made disasters: can be taken to reduce the risk level and provide a means Facilities of rapid recovery. This is the objective of sound business The impact of natural events, like fire, floods and hurricanes continuity management practices. can make it impossible to access a building for a prolonged period of time. Man-made events can also impede access to BUSINESS CONTINUITY MANAGEMENT (BCM) the worksite. In 2009, for more than a day, protests in Lon- don essentially closed the financial district, even to people Fundamentally, business continuity management is a set of who work there.2 coordinated plans and actions that mitigate and/or negate the adverse effects natural and man-made events have on Workforce key business operations. Consider these scenarios—in recent years, terrorists dis- rupted train, subway and bus routes schedules in major Most companies already engage in business continuity cities, making it impossible for commuters to travel to work. management practices to some degree. For instance, in the Of broader and longer lasting impact is a pandemic—to U.S., occupants of large buildings are required by law to minimize casualties, the government could prohibit the practice fire drills at regular intervals. These drills help to congregation of people (at places of work and elsewhere) for protect employees who work inside the building, and can extended periods of time. also help to protect the building and its contents. Good business continuity management practices are necessary to IT Infrastructure reduce the impact of a wide range of threats. They focus Security breaches or the unavailability of key IT and on protecting and preserving employees, facilities, and key network managers can diminish the usefulness of critical resources, including essential company information housed business information located in data and network hubs. in storage arrays, servers and personal computers. Without sufficient backup power, brownouts and blackouts in the electrical grid can crash servers, LAN and WAN connectivity. Natural and man-made events can damage 4 Services: VoIP ▪ Voice ▪ Network ▪ Internet & Hosted IT
  • 5. www.xo.com XO Communications key facilities, and thus render IT and network infrastruc- II Accord and the Graham-Leach-Bliley Act each contain ture inoperable. When considering the underlying causes of requirements designed to assure the continuation of key business interruptions, only 3 out of 100 are caused by acts business operations in particular industries. of nature. In contrast, 32% of the business interruptions are caused by human error, and 65% are caused by mal- ELEMENTS OF BUSINESS CONTINUITY PLANNING functions in IT and communications hardware, software or services. Approximately 11% of IT and network-related Key components of a business continuity plan include malfunctions are directly caused by computer viruses.3 documentation of the business operations that are included in the continuity strategy, their threats and regulatory Regulation requirements, and mediation and remediation activities. Some regulations, like Sarbanes- Oxley, have broad scope The plan identifies the resources and personnel which and far-reaching impact on business continuity and disaster compose the business continuity team. These can be inter- recovery planning. Among other provisions, it mandates nal resources and personnel, and/or external ones. It also that publicly-held companies engage in certain business contains information on the ROI of each business continuity practices, particularly pertaining to data stor- continuity action. If certain internal or external com- age and archival. In some industries, possible risks to their pany locations are designated to act as alternate locations business operations are so great, and their potential impact for some business continuity activities, this must also be so pervasive that specific regulations have been enacted to documented. Finally, to ensure continuity in the planning minimize their existence and effect. For instance the Health process over time, some companies may elect to include Insurance Portability and Accountability Act (HIPAA), an appendix that lists business operations that were Federal Energy Regulatory Commission (FERC), Federal excluded from the continuity plan, and the reason for Information Security Management Act (FISMA), Payment their exclusion. Figure 1 shows the Business Continuity Card Industry Data Security Standard (PCI DSS), the Basel Life Cycle that businesses can use to conceptualize their approach to business continuity planning. EFFECTIVE BUSINESS CONTINUITY ure I de PLANNING STRATEGIES s ea nt M Effective business continuity strategies rank the potential ify Test & Risk effects of various threats to ongoing business operations. Maintenance Assessment They also employ both proscriptive and prescriptive remedi- ation techniques, and use business case framework to assess and compare risk and remediation costs: Business Continuity Rank Risk Plan, Business Each organization should identify its key business activi- Life Cycle Exec Develop, Impact ties and determine how long they can be forgone without Execute Analysis sis adversely impacting the company or its customers. In ute aly addition to ranking these events by time, they also must be People. An ranked by their financial impact. When combined, com- Processes, panies use these two factors to assess high-medium-low Systems risks. For instance, an event that has immediate impact but is financially small poses low risk and thus also has a low Design recovery objective. Employ Both Risk Avoidance and Remediation Tactics To optimize the effectiveness of a business continuity plan, Figure 1: Business Continuity Life Cycle effective strategies typically contain both proscriptive and Copyright 2012. XO Communications, LLC. All rights reserved. XO, the XO design logo, and all related marks are registered trademarks of XO Communications, LLC. 5
  • 6. Business Continuity & Today’s “Always-On” Business Environment www.xo.com prescriptive elements. Training Key internal and external personnel and their alternates • Proscriptive. To maximize agent productivity, it’s must be trained on the business continuity strategy and fairly common for companies with large call cen- plan, and their roles in fulfilling its objectives. This includes ter operations to deploy them in diverse geographic key executives. The company should conduct drills to regions, and to use IT and network technology to route familiarize personnel with plan enactment, and to identify, or transfer calls between the centers. Proscriptively, if remediate and re-test any weaknesses in the plan. employees can’t get to their normal workplace dur- ing a blizzard, agents in other centers can handle their calls. This essentially brunts virtually all of the adverse XO Business Continuity Services impact to customers. To help companies assure that key business operations that • Prescriptive. Companies that employ just- in- time depend on highly available IT and network resources aren’t inventory practices can be vulnerable to disruptions impacted by natural and man-made crises, XO Communi- experienced by primary shippers. Some of these busi- cations offers a broad range of services that can help protect nesses have made advanced arrangements to obtain IT applications, company data and networks. critical inventory via alternate shippers. A delay in receiving inventory will occur, but it won’t be as disrup- XO NETWORK PROTECTION SERVICES tive as if no plans had been made. When considering business continuity management • Proscriptive and Prescriptive. Many organizations practices, most companies assume the focus of their IT back up critical IT data and processes, often in more infrastructure protection efforts will be on data network than one location. Such a strategy contains both risk preservation and restoration. And for small, medium and avoidance and business recovery elements. large companies across diverse industries, this often is the case. However, some companies’ key business operations Understand Total BCM Return on Investment (ROI) also depend upon the continuous availability of voice ser- Companies will develop and execute plans based on the vices. Companies with contact centers that support inbound level of risk to ongoing business operations, recovery or outbound sales, or customer service, are clear examples. It objectives, and their avoidance and mitigation costs. In won’t take very long for a company to begin to lose revenue the inventory example above, the company implemented if its customers can’t communicate with contact center processes to reduce, not eliminate, the impact of disruptions representatives during normal business hours. In addition, with primary shippers who supply critical inventory. In employee access to internal resources, like IT help desk theory, the company could employ other methods to reduce or HR, can also depend on voice services. Particularly in the risk of running out of inventory, including stocking emergencies like hurricanes or tornados, these can be vital large reserves on premises. But it has calculated that the resources for affected employees, and thus for the ongoing costs involved in such possible solutions outweigh the risk operation of the business. and costs of its preferred approach Many smaller businesses, or those with one primary loca- Key Stakeholders tion, may assume that network protection services are only The plan lists by name and function each member of the needed by medium and large companies—that it’s unlikely business continuity team, their contact information and that a single site won’t have access to the network for any alternates. The plan also contains information on their per- lengthy period of time. But if a backhoe mistakenly takes formance metrics. Without the involvement of key execu- out the main electrical or communications links into a tives, a business continuity strategy runs the risk of being building, that business location will be off the grid for at nothing more than a document that gathers dust. Good least several hours, and probably much longer. And just contingency plans assume that key executives won’t be able like some man-made threats, many natural events, like to fulfill their normal duties during a crisis, and designates fire, tornado and flood, can render a site unusable for days, and trains alternates. weeks or months. Thus in some cases, companies with only 6 Services: VoIP ▪ Voice ▪ Network ▪ Internet & Hosted IT
  • 7. www.xo.com XO Communications one main business location are more vulnerable to business companies, even in the same industry, may have different continuity threats than are larger companies with several cost/risk profiles. To meet a wide range of needs, XO offers main business sites. a broad array of data network protection services: Companies who are interested in assuring network Fixed Wireless Access Diversity continuity will find that XO has a very broad portfolio of To ensure the ultimate in access diversity and availability, services designed to protect both voice and data networks. XO’s Nextlink broadband fixed wireless access service can And since these networks connect to IT resources through be used to backup any type of dedicated access that is con- network access and premises equipment like routers, XO nected to either voice or data services, or both. offers a range of services to protect these assets as well. They include: Landline Access Diversity At a customer’s request, XO will deploy diversely routed Voice Network Resiliency Services landline access from its point of origin at the customer premises to its network node and beyond. To ensure the XO offers a range of services to support inbound and out- highest levels of continuity of key data-oriented business bound calling requirements: applications, customers may employ either landline or fixed wireless access diversity in conjunction with IP or MPLS Inbound Call Re-Routing load sharing or multi-homing networks. XO offers several different automatic call re-routing features designed to protect important inbound calls and contact Multi-Homing Networks center applications. In addition, some companies make Companies who are interested in ensuring uninterrupted extensive use of Interactive Voice Response (IVR) applica- data network connectivity between select sites can use tions for use internally, or for use by customers, suppliers techniques like load sharing or multi-homing on both XO’s and key partners. XO provides hosted voice XML services MPLS IP-VPN and dedicated Internet access services. that can be deployed on a dedicated server in XO’s host- ing center. For customers who are interested in minimizing High-Bandwidth Network Transport Solutions costs, XO also offers hosted voice XML service on a shared Companies with very large file transfer requirements, or platform. To assure availability, XO’s resources are housed who are in heavily regulated industries like healthcare in multiple data centers deployed across the U.S. or financial services, will be interested in using high- bandwidth dedicated private line services to construct fully Outbound Call Re-Routing redundant, geographically diverse networks between large For some companies, their business continuity requirements data centers. XO’s private line services use a variety of state- dictate the preservation of both incoming and outgoing of –the-art WAN technologies, including Ethernet and call connectivity. XO provides features to support this—for wavelength services. both traditional PSTN calls and VoIP calls. Collocation Administration XO makes its highly secure, carrier grade environment with XO provides customers with a broad range of tools to redundant power supplies available to customers for colloca- administer and manage their voice protection services as tion. Although some companies use co-location as a backup they need to, on a round the clock basis. These self-service to premises-based web and applications servers, others who tools include basic touch tone access and web-based access. want to totally eliminate the threat posed by access unavail- ability will co-locate key servers in XO’s data centers. Data Network Resiliency Services Applications Performance Management Good business continuity practices attempt to balance the These begin with XO’s three tiers of application perfor- costs of implementing data network continuity practices mance management tools, which customers can use to spot against the importance of the activity to continuing opera- and remediate potential problems in their MPLS-based tions, and the likelihood a problem will occur. Different networks before they do any damage. Copyright 2012. XO Communications, LLC. All rights reserved. XO, the XO design logo, and all related marks are registered trademarks of XO Communications, LLC. 7
  • 8. Business Continuity & Today’s “Always-On” Business Environment www.xo.com Remote VPN ity threats. XO offers both premises-based managed services Companies who want to ensure that employees can access and hosted services to help protect your organization’s important computing resources without interruption will information. They include: employ Internet VPN backup services, which are available on a broadband or dial-up basis. Managed Backup XO’s state of the art remote backup service combines WAN Figure 2 summarizes the different types of data network and remote access resources with the resources of XO’s and CPE diversity and the levels of protection they provide. cloud computing platform to deliver a round the clock, Figure 3 outlines the risks and costs trade-off for certain highly automated, efficient, cost-effective and scalable types of data network protection. service that protects data housed in popular software like Oracle databases and Microsoft Exchange, and across a Capability Medium High Very High wide variety of operating systems commonly deployed in Protection Protection Protection servers, desktop PCs and notebooks. By employing 128-bit Wireless Access as Backup  AES encryption, the service is highly secure. Finally, it pro- Full Access Diversity  vides easy to use web-based tools for customers to manage Redundant Access, Single Router  and retrieve stored data. Redundant Access, and Multiple Routers  Redundant Access with Diverse Email Filter and Authentication  Network Gateways For customers that house email in their own servers, XO Diverse Carriers  offers a Perimeter email Protection (PEP) service that stops Collocation Only  spam and filters viruses before they arrive at the server. It Collocation with Access Diversity  also prevents other types of malicious behavior, including Collocation with Hardware  phishing, DDOS, secondary attacks, and directory har- and Access Diversity vesting. This service, developed by XO, is identical to the one employed in XO’s hosted Exchange and web hosting Figure 2: Protecting Access and CPE Levels of Protection services, and works with all major brands of email software. Critical to any business continuity strategy is planning for email server unavailability. Should the server be unable High to receive email for a period of time, PEP will store up to Diverse Carriers 5 days of incoming email at no charge, and deliver it to the customer’s email server as soon as it has been restored. Introduced in 2006, XO’s PEP service includes companies Cost $$$ Multi-Homing in IT, professional services and retail industries. VPN Remote Back-Up Managed Security Solutions In addition to email filtering and authentication, XO offers Applications Preformance Management a very scalable, managed security solution which includes an Internet firewall service that can be located either on Low the customer’s premises or in the XO network. The latter Level of Protection Low High approach can be cost effective because it assures that access trunks are utilized only for authorized applications and Figure 3: Risk/Cost Trade-Off for Data Protection Options users, and don’t experience congestion caused by security breaches. XO’s Cisco-certified managed firewall service was introduced more than ten years ago and is used by many XO INFORMATION PROTECTION SERVICES industries, including finance, healthcare and retail. XO also offers a service that bundles managed firewall with man- Irrespective of where they are housed, key IT and network aged VPN services. resources must be protected against security and survivabil- 8 Services: VoIP ▪ Voice ▪ Network ▪ Internet & Hosted IT
  • 9. www.xo.com XO Communications Dedicated Web Hosting “Always- On” Business Companies with mission-critical web applications, includ- Environments Require Strong ing e-commerce, are very interested in assuring their high survivability and availability. To support this, XO devel- Business Continuity Partners oped its own patented clustered web hosting platform. In today’s “always-on” business environment, creating and Types of industries that use XO’s hosted e-commerce service implementing a business continuity and disaster recovery include IT services, professional services and retail. plan is critical in order to: XO DISASTER MITIGATION SERVICES • Protect revenue, ensure employee productivity and protect your company’s ability to serve its customers Since it’s not possible to prevent all crises from affecting without interruption. business operations, XO also offers a range of services to mitigate their ill effect and help ensure organizations can • Ensure compliance with government mandated maintain communications with employees, customers and regulations and industry guidelines that require your partners during a disaster. These include: company to implement and maintain business continu- ity plans; and Teleworking Services These include tools to support both voice and data appli- • Proactively protect your company’s IT infrastructure cations, enabling employees to work virtually from any against many types of events that can negatively impact location. To protect against the unavailability of key IT and your business. Given their increasing frequency, these network resources housed in particular facilities, XO offers safeguards extend to protecting your company from network-based web conferencing, audio conferencing, voice- security threats to IT and network resources. mail and email services. In addition, by using XO Any- XO Communications has one of the nation’s largest and where service, employees can turn any phone into their XO most technologically advanced nationwide networks. Its office phone line because the service operates independently architecture provides a unique balance between cost effec- of PBXs or key systems (these can be unavailable in the tiveness and requirements to maximize performance and event of a facilities-related emergency). XO’s VPN remote availability With XO Communications as your business access service, discussed in an earlier section, can be used continuity partner, you can have solutions that deliver bot- to connect remote employees to a particular location to still tom line benefits to help you: access its computing resources. • Protect Your Network Multi-Media and Outbound Notification Services Employees who are part of the business continuity team • Protect Your Information & Data must be able to communicate with each other, and with other employees, as soon as an emergency occurs. Organiza- • Mitigate Disruption tions may also need to communicate with people in other companies, with customers, or with key emergency services personnel. XO Connect, a multimedia notification service, supports the broadcast of messages across a variety of media, including text messages, email and voice calls. XO’s Inter- active Voice Response (IVR) services can also be used to support a company’s employee notification requirements. Copyright 2012. XO Communications, LLC. All rights reserved. XO, the XO design logo, and all related marks are registered trademarks of XO Communications, LLC. 9
  • 10. Business Continuity & Today’s “Always-On” Business Environment www.xo.com Objective XO Service Benefit Protect My Wireless Network Resiliency Provides back-up connection via high-speed broadband Network wireless connections Dedicated Internet Access Ensure availability of applications and access with back- Redundancy and Re-Routing up or shared IP ports when primary IP port is unavailable MPLS IP-VPN High-performance private wide area network solution for primary or as “always-on” back-up network High-Bandwidth Network Transport Provides additional layer of network resiliency with Ethernet and wavelength services for connecting locations and data centers Collocation Provides secure back-up facilities for data center operations Applications Performance Proactive monitoring of applications and network Management performance so issues can be better anticipated Voice Re-Routing and Redundancy Ability to re-route inbound large call volumes to alternate Services locations or phone numbers Protect My MPLS IP-VPN Ensures data traffic transmitted across network does Information not touch the public Internet Managed Security Protection for data against outages from hacking and viruses Managed Backup Data back-up to remote location with full restore back to primary data center Perimeter Email Protection Filters and scans email to reduce spam and viruses and backs up email after an outage Web Hosting Facilitates ongoing web operations during an outage because server is hosted by XO Mitigate Teleworking Allow employees to work anywhere with unified Disruption communications, conferencing, remote VPN and hosted email services Notification Services Provides voice and multi-media communication tools for notifying employees, customers and partners in the event of an outage Services may not be available in all areas. References 1. “Bill Rolls in for Red River Flooding”, Minnesota Public Radio, April 6, 2009 2. “G20 Protests: Riot Police Clash with Demonstrators”, the Guardian, April 1, 2009. 3. “Techniques, Tips and Technologies for Business Continuity Planning”, Computer Associates webinar, 2004. 10 Services: VoIP ▪ Voice ▪ Network ▪ Internet & Hosted IT
  • 11. www.xo.com XO Communications Copyright 2012. XO Communications, LLC. All rights reserved. XO, the XO design logo, and all related marks are registered trademarks of XO Communications, LLC. 11
  • 12. About XO Communications XO Communications is a leading nationwide provider of advanced broadband communica- tions services and solutions for businesses, enterprises, government, carriers and service providers. Its customers include more than half of the Fortune 500, in addition to leading cable companies, carriers, content providers and mobile network operators. Utilizing its unique combination of high-capacity nationwide and metro networks and broadband wireless capa- bilities, XO Communications offers customers a broad range of managed voice, data and IP services with proven performance, scalability and value in more than 85 metropolitan markets across the United States. For more information, visit www.xo.com. For XO updates, follow us on: Twitter | Facebook | Linkedin | SlideShare | YouTube | Flickr © Copyright 2012. XO Communications, LLC. All rights reserved. XO, the XO design logo, and all related marks are trademarks of XO Communications, LLC.