Planning Assumptions: What are they and why do we need them?
Realistic planning assumptions are an important element in a business continuity program. Why? They enable the planning team to identify the parameters they’re expecting to encounter following a disaster. They aren’t “pie-in-the-sky” wish lists but rather they’re the planner’s best guess about the conditions that will exist. Smart assumptions are usually unfavorable conditions, such as the lack of electric power or the unavailability of key people. Not-so-smart planning assumptions rely on best-case conditions that are probably not realistic.
RecordedJul 23 201519 mins
Your place is confirmed, we'll send you email reminders
Join us for this 45 minute webinar on 7th June at 10am UK that will ensure that your Business is Seamlessly Up and Running in Minutes. Understand how Ultimate Damage Limitation for Cyber-Attacks is Achieved through Business Continuity within Software-Defined Storage.
Reasons to attend:
Severity of cyber-attacks are judged by the length of time critical systems, data and applications are down. The ability to have a Business Continuity and Disaster Recovery enabled infrastructure mitigates the risk, offering zero downtime, zero Recovery Point Objective, and seamless rollback in time to the point before the attack hits.
Joining the webinar equips you with 3 essential skills for damage limitation:
Learn how to:
* Implement multi layered protection that offers
* Achieve additional resiliency with disaster recovery to the Cloud and 3rd Site
* Rollback to the point immediately before the attack
Your host for the meeting, Garry Carpenter has immersed himself in all things business continuity for the past few decades and is one of the leading UK authorities in the field.
Greg McSorley, SNIA Technical Council (non-voting); Rick Kutcipal, President, STA; Don Jeanette of TRENDFOCUS
You won’t want to miss the opportunity to hear leading data storage experts provide their insights on prominent technologies that are shaping the market. With the exponential rise in demand for high capacity and secured storage systems, it’s critical to understand the key factors influencing adoption and where the highest growth is expected. From SSDs and HDDs to storage interfaces and NAND devices, get the latest information you need to shape key strategic directions and remain competitive.
Rupin Mohan, Director R&D, SAN Chief Technologist, HPE, Mark Detrick, Director, Extension Principal Architect, Brocade
Businesses today rely heavily on their data. Disaster may strike anywhere and occurs in many shapes and sizes. Transporting data over significant distance beyond the reach of a threatening event preserves data so organizations can rapidly recover in the event of a site going down.
This makes deploying a disaster recovery infrastructure between data centers with fast, continuous, and easy replication of mission-critical data to anywhere in the world essential.
Fibre Channel over IP (FCIP), often referred to as “Extension,” is used to connect SANs across distance using IP networks. FCIP is commonly used for Remote Data Replication (RDR) between Enterprise Storage Arrays and Remote Tape applications, for the purpose of Business Continuance via Disaster Recovery (BC/DR).
Join storage technology and industry experts as they discuss their experience and deployment knowledge in:
•Best known methods for deployment with extension architectures, extension in routed topologies, and performance optimization for remote replication
•Industry best practices: topologies to achieve high-availability goals, advantages in trunking, encryption, etc…
•Customer examples and use cases of a variety of critical production environments ranging from SMBs to the largest most demanding enterprises and government institutions
After you watch the webcast, check out our Q&A blog: http://fibrechannel.org/fcip-extension-questions-and-their-answers/
Join this interactive webinar to see how you can leverage the concept of secure content management to support privacy and information security transparently within your information governance program. You will also learn how the need for security, business continuity and data protection be balanced with collaboration and productivity expectations to successfully deliver the desired business outcomes for your stakeholders and customers. There will be opportunity throughout the session to share your thoughts, experiences and answer any questions.
It’s critical to know what is going on inside your network, what technology is being snuck into your firm, and how to educate employees about security precautions. IT management has a clear responsibility to protect, defend and remain vigilant over all systems and it doesn’t stop at antivirus on the desktop and a firewall to the Internet.
Join this webcast to learn:
•Why SMB’s are a prime target
•How to help prevent your employees from being your biggest security threat
•Proper asset inventory – you cannot protect what you do not know about
•Protection and planning to prevent and/or mitigate a breach
Under pressure from demanding applications, increased virtualization and a proliferation of mobile devices, IT organizations are looking for a highly-available, resilient and performant data protection environment that ensures business resiliency and efficiency. However, sourcing products from multiple vendors is costly and can create management complexity that will deter you from deriving maximum value from your infrastructure. Instead, consider a single stack, integrated software and hardware backup solution.
Join HPE data protection experts to learn why more organizations are moving away from fragmented point based solutions to HPE’s unified data protection solutions, and how HPE Data Protector, through native integrations with HPE StoreOnce Systems, HPE 3PAR StoreServ, and HPE StoreEver (Tape) offerings, can provide you with advanced capabilities that accelerate the backup process in a cost-efficient, scalable way.
Demand for data storage is growing exponentially, but the capacity of existing storage media is not keeping up. Using DNA to archive data is an attractive possibility because it is extremely dense, with a raw limit of 1 exabyte/mm3 (10^9 GB/mm3), and long-lasting, with observed half-life of over 500 years.
This work presents an architecture for a DNA-based archival storage system. It is structured as a key-value store, and leverages common biochemical techniques to provide random access. We also propose a new encoding scheme that offers controllable redundancy, trading off reliability for density. We demonstrate feasibility, random access, and robustness of the proposed encoding with wet lab experiments. Finally, we highlight trends in biotechnology that indicate the impending practicality of DNA storage.
Melinda Rahe, Business Continuity Program Manager Dell, Inc.
Outsourcing shifts the burden to mitigate risk to the vendor. But, it does not shift the impact of the risk. Your company’s reputation and its’ customers can be negatively impacted when your vendor experiences failure.
This presentation discusses how to formulate a vendor resiliency strategy. And, will equip participants with practical solutions for effectively, as well as efficiently, assessing the business continuity risk exposures introduced by outsourcing business functions
Lilac Schoenbeck, VP of Product Management & Marketing and Dante Orsini, SVP of Business Development
Whether your nemesis is a malicious attack, a hurricane or (more likely) human error, have you collected all the tools you need to triumph and save the day?
There are a host of technologies available to those prepping for potential business disruptions: backups on-premise, backups in the cloud, on-premise failovers, Disaster Recovery as a Service, and, of course, delivering an offering of cable and silicon to your mainframe every Tuesday at noon.
Obviously, you don’t need all of these options – but which do you need? And why would you choose one over the other? Join this webinar to learn:
- What has changed since your tried-and-true backup plan was hatched in 2010
- How to evaluate on-premise vs. cloud-based options
- How to marry different technologies to create a complete solution
- What to consider when selecting a technology or cloud partner
With 10 years of experience leading the DRaaS and Backup market around the world, we’ve seen a lot of technologies come and go – and have some strong opinions and solid guidance for our customers on how best to evaluate options.
Traditionally, when people talk about data protection, they’re talking about some form of backup. However, if those backups effectively end up in a “write-only memory”, they’re not much good. So really, the bottom line is recovery is what people are most concerned about when they talk about data protection. With the degree to which today’s technologies have been refined and the plethora of data protection platforms available, users should maintain a baseline set of simple expectations to be met no matter who or what they choose for the job. In this presentation, Taneja Group and Dave LeClair of Unitrends will discuss the “New Rules for Recovery” that everyone’s solution should adhere to.
Nick Serrecchia, Systems Engineer at Veeam and Terry Grulke, Sr. Technical Advisor at Quantum
With the average company experiencing unplanned downtime 13 times a year, the costs associated with continuing to invest in a legacy backup solution can be extensive. For this reason, more customers are switching to Veeam® and Quantum than ever before. Update to a modern data center and achieve Availability for the Always-On Enterprise™ with Veeam coupled with Quantum’s tiered storage that increases performance, reduces bandwidth requirements and executes a best practices for data protection.
Jose Ruiz, VP Engineering Operations, Compass Datacenters
As has often been reported, human error is one of the largest factors in data center outages. Since estimates of the average cost of an outage now exceed $740,000, the ability to reduce or eliminate man-caused outages can make a substantial impact on the organization’s bottom line. In this presentation, Jose Ruiz, VP of Engineering Operations for Compass Datacenters, will present a case study on how the introduction of wearable technology has enhanced one customer’s operational performance substantially.
Mike Tyson famously observed “Everybody has a plan until they get punched in the mouth.” The question is, will your Disaster Recovery plan survive that punch and save the day? In this presentation, Jim Whalen of Taneja Group and Dave LeClair of Unitrends will discuss cloud-based Disaster Recovery, how Recovery Assurance is an absolutely crucial component of any DR plan and why choosing a DRaaS provider needs to be on everyone’s short list of options when developing their Disaster Recovery plans.
Do you want to learn about new disaster recovery options from Microsoft experts? Have you been putting off trying new technology due to time pressures or not knowing where to start? Do you think your disaster recovery strategy would benefit from a refresh?
If you answered yes to any of these questions, you need to register for this webcast. You will learn:
•How to replicate any workloads to Microsoft's global datacenters
•How to back up data and protect workloads with nearly infinite scalability
•How to implement a hybrid replication using both cloud and on-premises solutions
•How to create a backup without needing to buy more tape
•How to back up your Windows clients (including Windows 10) to remote storage
Register now to watch live or receive notification when this program is available on-demand.
Eric Bassier, Senior Director of Datacenter Products
Learn how to protect your business against localized disaster, eliminate capital expense, and answer the cloud mandate with Quantum’s newest cloud offering – Q-Cloud Protect for AWS. This webinar will demonstrate how to use the cloud for disaster recovery, as well as archiving and cold storage with Q-Cloud Vault and Q-Cloud Archive. Find out how to leverage the public cloud for data recovery with a solution that plugs into your existing backup environment.
Liz Townsend, Director of Business Development, Townsend Security
Your encrypted data is only as secure as your encryption keys. A strong encryption key management strategy is essential for a comprehensive security policy, as well as meeting compliance requirements. Attendees of this presentation will learn:
- Principles and best practices for encryption key management including key management, key storage, secure key retrieval, key escrow, key mirroring, industry standards, compliance guidelines, and system audit
- Why certifications are important for meeting compliance regulations such as PCI-DSS and HIPAA/HITECH
- How key management systems work and how to evaluate vendor solutions.
This is a non-technical session but will be of value to developers and implementers. Attendees will learn the core principles of effective and secure encryption key management. These principles can be used in developing in-house key management solutions or in evaluating vendor solutions.
What you'll learn:
- What is encryption key management and why is it important?
- Principles of industry-standard key management
- Industry must-haves for effective key management
- Challenges of home grown key management solutions
- Important certifications for meeting compliance and evaluation vendors
Fred Pinkett, Sr.Director Product Marketing at Nasuni
Traditional backup solutions are painfully complex, expensive and prone to failure at the worst possible time. Nasuni Cloud NAS integrates data protection into primary file storage, building a system that eliminates the need for separate backup. Join us to see how Nasuni can help you breakup with your backup and replace it with file storage that integrates data protection that is more cost-effective, easier to manage and far more reliable.
Craig Rayome, Practice Director for Cloud Infrastructure Solutions at 10th Magnitude
Over the past year Microsoft has introduced major new disaster recovery capabilities in Azure. Services like Azure Site Recovery and Azure Backup make it easy to replicate on-premises workloads to the cloud and implement a true hybrid cloud solution.
Join Craig Rayome, Practice Director for Cloud Infrastructure Solutions at 10th Magnitude and learn how your organization can use Azure to extend your datacenter, quickly recover from failures and easily scale to meet user demand. You will learn:
• Azure’s DR capabilities, cost, and offerings for on premise workloads to cloud and hybrid workloads
• The key DR services in Azure and how they work, delivering availability on demand
• Azure DR use cases—where have other companies achieved success?
• Tips for a successful Azure implementation
Fred Pinkett, Senior Director of Product Marketing
File storage is an ever growing costly, complex problem. Files sprawl is out of control forcing organizations to build storage environments with file servers or NAS, backup servers and media, disaster recovery sites, WAN optimization, replication, remote storage, and mobile solutions. Adding insult to injury, these solutions run out of capacity and need expensive upgrades and painful migrations.
Cloud NAS does away with all of this by providing local NAS controllers which cache active files from a cloud based file system. This maintains the same user experience and performance, adds collaboration and mobile access, while securely eliminating separate backup, DR and remote data access solutions. Learn how cloud enables file storage with unlimited scale that saves company’s 40-60% of their storage costs and eliminates refreshes and migrations forever.
Jason Leiva, Solutions Architect & Eric Bassier, Sr Director, Datacenter Products
Boost VM performance and reduce backup costs with Veeam 9 and Quantum tiered backup storage. From deduplication, to hybrid storage, to tape, to cloud, learn how Quantum’s portfolio of tiered backup storage works with Veeam 9 to boost VM performance while reducing backup costs.
Keep your data safe on-premise, off-premise and in the cloud
Maintaining a copy of your data in case of disaster is paramount to the continuity of your business. Subscribe to this channel to learn all the best practices, solutions and approaches to making sure you're recoverable when disaster strikes.