Business Continuity / Disaster Recovery

Community information
The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
  • Learn about the powerful, new Arcserve Cloud which is a fully-integrated, cloud data protection solution for backup, disaster recovery and long-term retention. It’s offered as a service extension to Arcserve’s Unified Data Protection (UDP) appliance. Also discover technical details of Arcserve UDP, a next-generation data protection solution that leverages global deduplication, encryption, compression, and WAN-optimized replication.
  • Learn From Two Deduplication Veterans: George Crump, Founder Storage Switzerland and Tom Cook, CEO Permabit

    Are All Deduplication Methods the Same?

    Why is Dedupe so Valuable in the All-Flash Use Case?

    What Can Go Wrong Deduplication?

    Ask your deduplication questions to the dedupe panel
  • Realistic planning assumptions are an important element in a business continuity program. Why? They enable the planning team to identify the parameters they’re expecting to encounter following a disaster. They aren’t “pie-in-the-sky” wish lists but rather they’re the planner’s best guess about the conditions that will exist. Smart assumptions are usually unfavorable conditions, such as the lack of electric power or the unavailability of key people. Not-so-smart planning assumptions rely on best-case conditions that are probably not realistic.
  • Enterprise Hadoop applications require continuous operation in the face of complete data center failure. To address this, businesses have taken a multi-data center, global approach to Hadoop.

    In addition, organizations have begun to utilize multi-directional data sharing between clusters to get more out of their existing infrastructure.

    In this webinar, we'll examine storage and compute challenges in operating Hadoop over a WAN, and lay out the blueprint for an ideal solution.
  • As corporate information technology infrastructure increases in size and complexity, corporations are recognizing the need for a better mechanism for assessing IT's role and alignment to the key corporate initiatives. What began as a series of best practices has evolved into the field known as IT governance.

    IT governance is no longer just a theoretical concept, it is a fundamental business necessity, and an iterative process which requires senior management commitment over the long term in order to see results. By implementing a business risk approach to IT governance corporations can deliver immediate benefits to the entire organization.

    Join Eric Kavanagh, the Bloor Group; Paul Quanrud, TCS; Keith Breidt, BAH; and Yo Delmar, MetricStream; for this educational session as they address some of the key concepts and challenges with IT governance. They will answer as many questions as we can fit in to the 45 minute Q&A, and will provide research materials for you to takeaway.

    If you would like to attend please confirm your position below.
  • Data unavailability results in lost revenue, customers or business failure. Of the companies experiencing disasters, 43 percent never reopen and 29 percent close within two years.

    Join Gianluca Mariani and other members of the SNIA Italy committee as they discuss the best disaster recovery replication strategies, focusing on defining SLAs, choosing the right architecture, choosing the ingredients, and how cloud can play a part in DR.
  • How confident are you that your business will bounce back and be resilient in case of a major outage? This can be even more challenging today with dispersed data centers that are a mix of physical, virtual, and cloud based.

    Join Fernando as he explains how you can confidently meet IT business continuity compliance requirements, ensure business agility while maintaining existing IT investment, and predictably meet service level agreements (SLAs) at all times.
  • Ensuring Business continuity and managing risks is becoming more and more crucial for companies heavily relying on technical infrastructure to run their business such as CRM, ERP, CMS, accounting, big data and more.

    Todays's economy cannot be conceived without the use of such systems, more and more connected and presumably accessible from everywhere.

    Data is now the key asset of any company, and needs to be protected the same way as everyone protects their assets.

    But the reality is far from this. So many companies are "saving" money by using non-redundant infrastructures, networks or servers, and often have to experience the worst scenario to start digging into Disaster Recovery, but it's already too late.

    So join Eric Sansonny as he looks at Disaster Recovery as a Service and Cloud Backups to see if the solution lies there.
  • The vast majority of applications today are under protected – or completely unprotected – making enterprises vulnerable to data loss or downtime during disasters. Legacy data protection and DR solutions, while still relevant to certain classes of workloads, have failed to adapt to the needs of modern virtualized applications and infrastructure.

    Join Wim Vandebroeck as he explains how to use local, remote, and cloud-based backups to achieve high-levels of availability and resiliency in the event of component failure, node failure, rack failure, or an entire datacenter outage.
  • The new Microsoft Windows 10 platform is an exciting step forward from both a functionality and a security perspective. Senior Product Marketing Manager, Stephen Rose covers the new features of this operating system and what they mean to you as a way of adding additional security to your organization.
  • The next disaster is right around the corner. Whether in the form of a hurricane, flood, tornado, or over-eager cable cutter, events outside your control can impact your business. Planning ahead now will minimize any negative effects and keep your business protected. Join this session to hear practical advice to keep your business running when disaster strikes.
  • Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.

    Key takeaways:
    •How Hacking Team’s mistakes mirrored those made by Sony
    •How employees’ weak passwords helped facilitate the breach
    •How transparency would have helped Hacking Team’s credibility
    •Why every company must review what might be exposed in a breach
  • Business Continuity! Disaster Recovery! We’ve all heard these terms, often used interchangeably. It seems there are more and more so-called “experts” out there… and more and more ‘noise’. This critical topic does not have to be complicated or confusing. Come share the perspectives of a pragmatic global thought leader who’s not just talked about it but who’s owned a global program, and whose plans have been proven in actual events. There is value for the experienced practitioner as well as the non-expert executive or manager who has to understand the concepts in plain English. Concepts covered include:

    •How Business Continuity, Disaster Recovery, Crisis Management and related topics are all part of holistic Business Resiliency – the ability of an organization to withstand stress from impact – and how they are interrelated
    •A brief history lesson of where it’s been and where it’s going, to chart the trajectory from the current path
    •What it is, and more importantly, what it is not, for example it’s not ‘Insurance’ and it’s not ‘The Big “Code Red” Binder’ (in fact, it’s not a binder at all!)
    •How to understand and communicate the value in business terms not ‘scary-speak’
    •The essential parts of a comprehensive program and what “Good” looks like for all of them
    •Some best practices that even experienced planners sometimes ignore
    •What does the future look like?
  • Let's talk about Neverquest - the global malware campaign targeting businesses around the world!

    Join Sam Curry, Arbor's Chief Technology & Security Officer, and Kirk Soluk of Arbor’s Security Engineering & Response Team, for an insightful discussion on the economics of cybercrime, a detailed analysis of the Neverquest malware family, as well as insight into Arbor’s reversing techniques that unravel and monitor this stealthy and rapidly evolving malware.

    Join this webcast to learn:

    -What motivates the attackers?
    - Why Neverquest is such a potent and persistent malware family
    -How ASERT'S research continues serves as a leading source of information on emerging threats, malware families and global cyber attacks
  • Many organizations have complex BC/DR plans consisting of several products, requiring multiple people to be present to execute the recovery, should disaster strike. This was the case at Long Term Care Group. They were using an orchestration tool with storage-based replication. Executing a DR test was becoming more and more difficult and confidence in their plan was fading.

    Zerto Virtual Replication provides continuous block-level replication and fully automated and orchestrated failover, recovery, failback and DR testing. Mike Gelhar, Systems Engineer at Long Term Care Group knew they had found the solution they needed to deliver robust BC/DR while greatly reducing risk.

    - Reduce risk with an automated solution that anyone can execute
    - DR Testing ensures recovery through reports and provides the opportunity to make adjustments in the plan
    - Maximize the investment with a solution that can simplify migrations and maintenance of the environment
    - Installation is complete in one hour with no configuration changes so the carefully architected production environment is not changed, further reducing risk
  • Continuity planning is simply the good business practice of ensuring the execution of essential functions through all circumstances, and it is a fundamental responsibility of public institutions and private entities responsible to their stakeholders. Continuity planning should not be a separate and compartmentalized function performed by independent cells of a few planners in each organization. Organizations must fully integrate continuity into all aspects of an organization’s daily operations, thus creating a “culture of continuity.”

    The COOP presentation will:

    1. Provide an understanding of Continuity Planning and Risk Management,
    2. Explain the importance of a viable Continuity capability,
    3. Emphasize the need for a viable Continuity capability in all organizations that enable organizations to continue their essential functions across a broad spectrum of emergencies.

    In addition to providing an overview of Continuity of Operations, the COOP presentation will also:

     Educate Federal, State, territorial, tribal, local government jurisdictions, private sector organizations, and emergency management practitioners on the importance of integrating Continuity into daily operations, functions, plans, and mission areas.
     Emphasize the Federal Government’s Policy requiring Federal agencies to be prepared for unpredictable threats such as earthquakes, accidents, sabotage, and terrorism. 
     Discuss the importance for State, territorial, tribal, local government jurisdictions, private sector organizations to be prepared for unpredictable disruption of business operations. 
     Provide States, territories, tribes, local government jurisdictions, private sector organizations, and businesses with assistance, guidance, knowledge, networking, resources, and tools needed to succeed.