Business Resiliency, Business Continuity and Disaster Recovery Management
Assuming your environment has implemented a business resiliency (BR) strategy and plan that includes business continuance (BC) and disaster recovery (DR), how are you managing those? Are the tasks and activities involved with support BR, BC and DR integrated as part of your normal processes, procedures, best practices, or are they after the fact or done when needed? One of the ways to reduce the cost of BR, BC and DR is too remove complexity which can be tied back to various processes and activities that range from maintaining and making updates to plans as well as testing. For example if you are practicing BC and BR functionalities as part of the every-day course of doing business you may already be removing costs. On the other hand, if you are spending time and money preparing to pass quarterly or annual audits and BC, BR and DR readiness, you may be incurring additional costs. This webinar looks at streamlining your BC, BC and DR management including making sure you have proper coverage of applications, data, systems and settings.
•Everything is not the same in the data center or information factory
•Are you using one approach to protect all systems, applications, data and tools
•Have you revisited how BC, BR and DR are part of your every-day processes
•Where, when, how and who should be focused on BC, DR, and BR management
•What data protection management tools are available to help provide insight and awareness
•Do you know who well your applications are protected, to what level and cost?
RecordedMar 19 20148 mins
Your place is confirmed, we'll send you email reminders
Rupin Mohan, Director R&D, SAN Chief Technologist, HPE, Mark Detrick, Director, Extension Principal Architect, Brocade
Businesses today rely heavily on their data. Disaster may strike anywhere and occurs in many shapes and sizes. Transporting data over significant distance beyond the reach of a threatening event preserves data so organizations can rapidly recover in the event of a site going down.
This makes deploying a disaster recovery infrastructure between data centers with fast, continuous, and easy replication of mission-critical data to anywhere in the world essential.
Fibre Channel over IP (FCIP), often referred to as “Extension,” is used to connect SANs across distance using IP networks. FCIP is commonly used for Remote Data Replication (RDR) between Enterprise Storage Arrays and Remote Tape applications, for the purpose of Business Continuance via Disaster Recovery (BC/DR).
Join storage technology and industry experts as they discuss their experience and deployment knowledge in:
•Best known methods for deployment with extension architectures, extension in routed topologies, and performance optimization for remote replication
•Industry best practices: topologies to achieve high-availability goals, advantages in trunking, encryption, etc…
•Customer examples and use cases of a variety of critical production environments ranging from SMBs to the largest most demanding enterprises and government institutions
After you watch the webcast, check out our Q&A blog: http://fibrechannel.org/fcip-extension-questions-and-their-answers/
Joseph George (Sungard Availability Services), Mark Weatherford (vArmour), Inigo Merino (Cienaga Systems)
The devastating impact of Hurricanes Harvey and Irma across Texas and Florida will continue to live long after the waters have receded. How are enterprises, small businesses, government agencies and non-profit organizations prepared for the disruption caused by Harvey and Irma?
If anything, these hurricanes are a stark reminder that all organizations need to have a disaster preparedness and business continuity plans in place to help with recovery from major natural catastrophes.
Join this interactive panel as we discuss:
- The aftermath of Hurricanes Harvey and Irma
- Impact on cybersecurity and how to avoid falling for a Harvey or Irma cyber scam
- Need for business continuity and disaster recovery planning
- Recommendations for crafting the right BCDR strategy and enabling recovery following a disaster
- Joseph George, Vice President Product Management at Sungard Availability Services
- Mark Weatherford, Chief Cybersecurity Strategist at vArmour
- Inigo Merino, Founder & CEO at Cienaga Systems
James Chillingworth, Founder of The Consulting Practice
Is your security architecture up to date and able to defend against the latest cyber attacks? Every technology vendor will likely tell you that they have the most solid infrastructure, and that their roadmap is the one to follow. You may want to consider a fault-tolerant approach with security, as it can be more comprehensive than selecting one particular vendor for a specific requirement.
Fault-Tolerance means that you assume that a particular solution will fail, but are theoretically protected as another solution can be there if this failure happens.
Join this presentation and learn how fault tolerance can be deployed against breach scenarios and how it helps improve cybersecurity in 2017.
Brenda Piazza, Director of Cybersecurity Management at CBIZ MHM, LLC
In light of recent data breaches and the increasing cost of a breach, it is clear why good IT and cybersecurity management is key to your business, especially when it comes to Business Continuity and Disaster Recovery planning. Join this presentation and learn about the human error in breaches, as well as what managers should know about their IT environment. Learn the steps you need to take today to ensure the right BCDR plans are in place before a disaster strikes.
Jim Hannan, Principal Architect & Chris Vacanti, Senior Consultant, House of Brick Technologies
Come prepared to look at disaster recovery planning with a 360 degree view for the enterprise and SMB space, and walk away with technical ideas you can begin to implement immediately. During this presentation, we will discuss disaster recovery planning considerations and partnerships. We will also walk through technical solutions that provide a way to use virtualization and storage strategies for an approachable DR solution.
James Chillingworth, Founder (CEO), The Consulting Practice Inc.
Learn how your organization can achieve better data protection through leveraging fault-tolerant technology. Cybersecurity expert James Chillingworth will review how applying hardware architecture concepts, in addition to other abstractions can form the framework for developing software that becomes more robust, reliable, expandable and secure. By implementing this, organizations can better protect their applications, data, databases, and improve security, operability, code quality and redundancy.
Tim Vogel, Co-Founder and CEO, Xtium & Kevin Lancaster, CEO ID Agent
With the healthcare industry experiencing a dramatic increase in the volume of successful ransomware attacks, it is critical that organizations upgrade their security policies and approach.
This means understanding the evolving cyberattack landscape and developing effective strategies to protect the integrity of systems, applications, and data. A critical aspect of that strategy is proactively identifying employee email credentials that have been compromised. In our 2016 benchmark study of healthcare firms, Xtium and ID Agent recently found that 65% of firms analyzed have employees with visibly compromised accounts. These findings illustrate the need for ongoing monitoring as well as 100% reliable and responsive business continuity solutions.
The urgency stems from the fact that stolen health records are worth more than 10 times the value of stolen credit card numbers. The FBI recommends combating these cyber-threats by establishing a solid business continuity plan which includes the regular creation of secure, isolated data backups.
This presentation will a) explore the common misperceptions and security holes that can lead to ransomware vulnerability, b) discuss the study results and the measurable ongoing threat represented by compromised email accounts, c) compare the various alternatives for responding to cyberattacks, d) explain the pros and cons of cloud-based security and backup strategies, and e) provide real-world case study examples of how recent ransomware attacks have been quickly and successfully resolved.
Kong Yang, Head Geek of Virtualization & Cloud Practice, SolarWinds
Data is the new currency. It is the gold waiting to be mined, the oil waiting to be refined, and the resource waiting to be taken for ransom or stolen for its intellectual property. Wait, that last piece didn’t rhyme. And that lack of rhythm and rhyme is why data recovery is evolving from naturally occurring events i.e. system failures and natural disasters to unleashed beasts such as social-engineered phishing attacks and schemes designed to take your data hostage.
In this session, we’ll discuss how to monitor with discipline in order to protect your data protocol with effective and efficient process management.
· What is monitoring with discipline?
· How do I optimize my backup and recovery process?
· How can I extend my current data recovery protocol to encompass ransomware protection?
Dustin Mackie, Managing Consultant at Avalution Consulting
Although most organizations have been performing elements of IT disaster recovery for years to decades, it’s still common for organizations to struggle to ensure alignment between IT capabilities and business application recovery needs. Even if IT exercises run flawlessly and meet planned recovery capabilities, there often remains gaps between the business requests and IT committed capabilities. This can inhibit organizations from having effective (yet reasonable) strategies in place that meet all stakeholder expectations.
This presentation will explore potential methods organizations can execute to help all groups in the disaster recovery process understand each other’s intent, priorities, dependencies, needs, and considerations, as well as the impacts of system downtime. These methods seek to truly synchronize business continuity and IT disaster recovery by enabling ongoing discussion, understanding and insight, continued coordination, and communication. Taking such measures will ensure an effective IT disaster recovery program that meets the expectations of all stakeholders.
Jim Whalen, Taneja Group; Patrick Rogers, Cohesity; Jesse St Laurent, SimpliVity; Joe Noonan, Unitrends; Rick Vanover, Veeam
Hyperconvergence is a rapidly growing and evolving force in the IT infrastructure space. Emerging from the factory pre-configured racking programs of the big IT equipment suppliers, it quickly morphed into a variety of VM-centric architectures where compute, storage and networking (and more) are all integrated below the hypervisor and provide a unified platform to run virtual workloads on. The questions surrounding Data Protection are many: Is a DP mechanism even needed in a distributed cluster architecture that hyperconverged platforms typically drive? What’s the role of traditional backup software and appliances? Is physical server backup still important? What’s the optimum solution for backing up a hyperconverged platform? Is there an optimum solution?
In this presentation, some of today’s leading vendors will give their take on what the intersection of Hyperconvergence and Data Protection means for the end user.
* Cohesity - Patrick Rogers, VP Marketing & Product Management
* SimpliVity - Jesse St Laurent, VP of Product Strategy
* Unitrends - Joe Noonan, Director, Software Product Management
* Veeam - Rick Vanover, Director of Technical Product Marketing
Manjot Singh, Data & Infrastructure Architect at Percona
In the case of a failure, do you know how long it will take to restore your database? Do you know how old the backup will be? In this presentation, we will cover the basics of best practices for backup, restoration and business continuity. Don’t put your company on the line due to bad data retention and backup policies.
Peter Gossin, Digital Transformation Manager, Microsoft
Digital transformation is the process of using today’s technology to modernize outdated processes and meet the most pressing needs of your business.
Thanks to recent advances in lower cost tablet technology and Microsoft’s suite of cloud and productivity services, complete digital transformation is more accessible now than ever before. A new class of affordable devices is revolutionizing the way businesses and their employees work and interact with customers.
Sign up now to:
•Engage your customers
•Empower your employees
•Optimize your operations
•Transform your products
It’s critical to know what is going on inside your network, what technology is being snuck into your firm, and how to educate employees about security precautions. IT management has a clear responsibility to protect, defend and remain vigilant over all systems and it doesn’t stop at antivirus on the desktop and a firewall to the Internet.
Join this webcast to learn:
•Why SMB’s are a prime target
•How to help prevent your employees from being your biggest security threat
•Proper asset inventory – you cannot protect what you do not know about
•Protection and planning to prevent and/or mitigate a breach
Melinda Rahe, Business Continuity Program Manager Dell, Inc.
Outsourcing shifts the burden to mitigate risk to the vendor. But, it does not shift the impact of the risk. Your company’s reputation and its’ customers can be negatively impacted when your vendor experiences failure.
This presentation discusses how to formulate a vendor resiliency strategy. And, will equip participants with practical solutions for effectively, as well as efficiently, assessing the business continuity risk exposures introduced by outsourcing business functions
Lilac Schoenbeck, VP of Product Management & Marketing and Dante Orsini, SVP of Business Development
Whether your nemesis is a malicious attack, a hurricane or (more likely) human error, have you collected all the tools you need to triumph and save the day?
There are a host of technologies available to those prepping for potential business disruptions: backups on-premise, backups in the cloud, on-premise failovers, Disaster Recovery as a Service, and, of course, delivering an offering of cable and silicon to your mainframe every Tuesday at noon.
Obviously, you don’t need all of these options – but which do you need? And why would you choose one over the other? Join this webinar to learn:
- What has changed since your tried-and-true backup plan was hatched in 2010
- How to evaluate on-premise vs. cloud-based options
- How to marry different technologies to create a complete solution
- What to consider when selecting a technology or cloud partner
With 10 years of experience leading the DRaaS and Backup market around the world, we’ve seen a lot of technologies come and go – and have some strong opinions and solid guidance for our customers on how best to evaluate options.
Traditionally, when people talk about data protection, they’re talking about some form of backup. However, if those backups effectively end up in a “write-only memory”, they’re not much good. So really, the bottom line is recovery is what people are most concerned about when they talk about data protection. With the degree to which today’s technologies have been refined and the plethora of data protection platforms available, users should maintain a baseline set of simple expectations to be met no matter who or what they choose for the job. In this presentation, Taneja Group and Dave LeClair of Unitrends will discuss the “New Rules for Recovery” that everyone’s solution should adhere to.
Nick Serrecchia, Systems Engineer at Veeam and Terry Grulke, Sr. Technical Advisor at Quantum
With the average company experiencing unplanned downtime 13 times a year, the costs associated with continuing to invest in a legacy backup solution can be extensive. For this reason, more customers are switching to Veeam® and Quantum than ever before. Update to a modern data center and achieve Availability for the Always-On Enterprise™ with Veeam coupled with Quantum’s tiered storage that increases performance, reduces bandwidth requirements and executes a best practices for data protection.
Jose Ruiz, VP Engineering Operations, Compass Datacenters
As has often been reported, human error is one of the largest factors in data center outages. Since estimates of the average cost of an outage now exceed $740,000, the ability to reduce or eliminate man-caused outages can make a substantial impact on the organization’s bottom line. In this presentation, Jose Ruiz, VP of Engineering Operations for Compass Datacenters, will present a case study on how the introduction of wearable technology has enhanced one customer’s operational performance substantially.
Mike Tyson famously observed “Everybody has a plan until they get punched in the mouth.” The question is, will your Disaster Recovery plan survive that punch and save the day? In this presentation, Jim Whalen of Taneja Group and Dave LeClair of Unitrends will discuss cloud-based Disaster Recovery, how Recovery Assurance is an absolutely crucial component of any DR plan and why choosing a DRaaS provider needs to be on everyone’s short list of options when developing their Disaster Recovery plans.
tactical solutions to help with your BCDR strategy
With the unexpected nature of natural disasters and other disruptive events, preparation is key when it comes to disaster recovery and business continuity processes. Join this channel for live and recorded presentations featuring thought leaders in the field discussing current topics that will help you with tactical solutions to all your BCDR issues.