Hi [[ session.user.profile.firstName ]]

Business Continuity and Disaster Recovery

  • Date
  • Rating
  • Views
  • FCIP (Extension): Data Protection and Business Continuity
    FCIP (Extension): Data Protection and Business Continuity Rupin Mohan, Director R&D, SAN Chief Technologist, HPE, Mark Detrick, Director, Extension Principal Architect, Brocade Recorded: Dec 7 2017 59 mins
    Businesses today rely heavily on their data. Disaster may strike anywhere and occurs in many shapes and sizes. Transporting data over significant distance beyond the reach of a threatening event preserves data so organizations can rapidly recover in the event of a site going down.

    This makes deploying a disaster recovery infrastructure between data centers with fast, continuous, and easy replication of mission-critical data to anywhere in the world essential.
    Fibre Channel over IP (FCIP), often referred to as “Extension,” is used to connect SANs across distance using IP networks. FCIP is commonly used for Remote Data Replication (RDR) between Enterprise Storage Arrays and Remote Tape applications, for the purpose of Business Continuance via Disaster Recovery (BC/DR).

    Join storage technology and industry experts as they discuss their experience and deployment knowledge in:

    •Best known methods for deployment with extension architectures, extension in routed topologies, and performance optimization for remote replication
    •Industry best practices: topologies to achieve high-availability goals, advantages in trunking, encryption, etc…
    •Customer examples and use cases of a variety of critical production environments ranging from SMBs to the largest most demanding enterprises and government institutions

    After you watch the webcast, check out our Q&A blog: http://fibrechannel.org/fcip-extension-questions-and-their-answers/
  • Cyber Threats and Disaster Recovery after Hurricane Harvey
    Cyber Threats and Disaster Recovery after Hurricane Harvey Joseph George (Sungard Availability Services), Mark Weatherford (vArmour), Inigo Merino (Cienaga Systems) Recorded: Sep 12 2017 58 mins
    The devastating impact of Hurricanes Harvey and Irma across Texas and Florida will continue to live long after the waters have receded. How are enterprises, small businesses, government agencies and non-profit organizations prepared for the disruption caused by Harvey and Irma?

    If anything, these hurricanes are a stark reminder that all organizations need to have a disaster preparedness and business continuity plans in place to help with recovery from major natural catastrophes.

    Join this interactive panel as we discuss:
    - The aftermath of Hurricanes Harvey and Irma
    - Impact on cybersecurity and how to avoid falling for a Harvey or Irma cyber scam
    - Need for business continuity and disaster recovery planning
    - Recommendations for crafting the right BCDR strategy and enabling recovery following a disaster

    - Joseph George, Vice President Product Management at Sungard Availability Services
    - Mark Weatherford, Chief Cybersecurity Strategist at vArmour
    - Inigo Merino, Founder & CEO at Cienaga Systems
  • Cyber Defense Through Fault-Tolerant Security Architecture
    Cyber Defense Through Fault-Tolerant Security Architecture James Chillingworth, Founder of The Consulting Practice Recorded: Nov 23 2016 28 mins
    Is your security architecture up to date and able to defend against the latest cyber attacks? Every technology vendor will likely tell you that they have the most solid infrastructure, and that their roadmap is the one to follow. You may want to consider a fault-tolerant approach with security, as it can be more comprehensive than selecting one particular vendor for a specific requirement.

    Fault-Tolerance means that you assume that a particular solution will fail, but are theoretically protected as another solution can be there if this failure happens.

    Join this presentation and learn how fault tolerance can be deployed against breach scenarios and how it helps improve cybersecurity in 2017.
  • Don't Be the Next Big Headline - Proactive Steps and BCDR Planning
    Don't Be the Next Big Headline - Proactive Steps and BCDR Planning Brenda Piazza, Director of Cybersecurity Management at CBIZ MHM, LLC Recorded: Nov 18 2016 40 mins
    In light of recent data breaches and the increasing cost of a breach, it is clear why good IT and cybersecurity management is key to your business, especially when it comes to Business Continuity and Disaster Recovery planning. Join this presentation and learn about the human error in breaches, as well as what managers should know about their IT environment. Learn the steps you need to take today to ensure the right BCDR plans are in place before a disaster strikes.
  • Virtualization: The Key to Approachable Disaster Recovery
    Virtualization: The Key to Approachable Disaster Recovery Jim Hannan, Principal Architect & Chris Vacanti, Senior Consultant, House of Brick Technologies Recorded: Oct 19 2016 58 mins
    Come prepared to look at disaster recovery planning with a 360 degree view for the enterprise and SMB space, and walk away with technical ideas you can begin to implement immediately. During this presentation, we will discuss disaster recovery planning considerations and partnerships. We will also walk through technical solutions that provide a way to use virtualization and storage strategies for an approachable DR solution.
  • Protect Your Applications and Data with Fault Tolerant Software
    Protect Your Applications and Data with Fault Tolerant Software James Chillingworth, Founder (CEO), The Consulting Practice Inc. Recorded: Aug 18 2016 27 mins
    Learn how your organization can achieve better data protection through leveraging fault-tolerant technology. Cybersecurity expert James Chillingworth will review how applying hardware architecture concepts, in addition to other abstractions can form the framework for developing software that becomes more robust, reliable, expandable and secure. By implementing this, organizations can better protect their applications, data, databases, and improve security, operability, code quality and redundancy.
  • Ransomware Realities for Healthcare: Cloud Backup and Security Answers
    Ransomware Realities for Healthcare: Cloud Backup and Security Answers Tim Vogel, Co-Founder and CEO, Xtium & Kevin Lancaster, CEO ID Agent Recorded: Aug 18 2016 49 mins
    With the healthcare industry experiencing a dramatic increase in the volume of successful ransomware attacks, it is critical that organizations upgrade their security policies and approach.

    This means understanding the evolving cyberattack landscape and developing effective strategies to protect the integrity of systems, applications, and data. A critical aspect of that strategy is proactively identifying employee email credentials that have been compromised. In our 2016 benchmark study of healthcare firms, Xtium and ID Agent recently found that 65% of firms analyzed have employees with visibly compromised accounts. These findings illustrate the need for ongoing monitoring as well as 100% reliable and responsive business continuity solutions.

    The urgency stems from the fact that stolen health records are worth more than 10 times the value of stolen credit card numbers. The FBI recommends combating these cyber-threats by establishing a solid business continuity plan which includes the regular creation of secure, isolated data backups. 

    This presentation will a) explore the common misperceptions and security holes that can lead to ransomware vulnerability, b) discuss the study results and the measurable ongoing threat represented by compromised email accounts, c) compare the various alternatives for responding to cyberattacks, d) explain the pros and cons of cloud-based security and backup strategies, and e) provide real-world case study examples of how recent ransomware attacks have been quickly and successfully resolved.
  • Redefinition of Business Continuity Strategies using Cloud Native Enterprise Arc
    Redefinition of Business Continuity Strategies using Cloud Native Enterprise Arc Frank Stienhans, CTO at Ocean9 Recorded: Aug 18 2016 49 mins
    Both production and non-production landscapes are massively effected by the rewritten laws of physics in the cloud.

    One opportunity of Cloud Native Enterprise Architectures is to redefine the approaches to Business Continuity and Disaster Recovery.

    Using SAP workloads on AWS as example we will show how and why enterprises run different than before and how Disaster Recovery needs accelerate all in migrations to the cloud.
  • Monitor with Discipline – Protect Your Data Protocol
    Monitor with Discipline – Protect Your Data Protocol Kong Yang, Head Geek of Virtualization & Cloud Practice, SolarWinds Recorded: Aug 18 2016 36 mins
    Data is the new currency. It is the gold waiting to be mined, the oil waiting to be refined, and the resource waiting to be taken for ransom or stolen for its intellectual property. Wait, that last piece didn’t rhyme. And that lack of rhythm and rhyme is why data recovery is evolving from naturally occurring events i.e. system failures and natural disasters to unleashed beasts such as social-engineered phishing attacks and schemes designed to take your data hostage.
    In this session, we’ll discuss how to monitor with discipline in order to protect your data protocol with effective and efficient process management.
    · What is monitoring with discipline?
    · How do I optimize my backup and recovery process?
    · How can I extend my current data recovery protocol to encompass ransomware protection?
  • Aligning IT Disaster Recovery with Business Requirements
    Aligning IT Disaster Recovery with Business Requirements Dustin Mackie, Managing Consultant at Avalution Consulting Recorded: Aug 17 2016 42 mins
    Although most organizations have been performing elements of IT disaster recovery for years to decades, it’s still common for organizations to struggle to ensure alignment between IT capabilities and business application recovery needs. Even if IT exercises run flawlessly and meet planned recovery capabilities, there often remains gaps between the business requests and IT committed capabilities. This can inhibit organizations from having effective (yet reasonable) strategies in place that meet all stakeholder expectations.

    This presentation will explore potential methods organizations can execute to help all groups in the disaster recovery process understand each other’s intent, priorities, dependencies, needs, and considerations, as well as the impacts of system downtime. These methods seek to truly synchronize business continuity and IT disaster recovery by enabling ongoing discussion, understanding and insight, continued coordination, and communication. Taking such measures will ensure an effective IT disaster recovery program that meets the expectations of all stakeholders.

Embed in website or blog