SlideShare une entreprise Scribd logo
1  sur  24
Planning Ahead:
    Disaster Recovery / Business Continuity
        & Application/Service Availability

              A 360-Degree Approach




1
Outages Happen

                                            San Diego
                                            Thursday, September 8, 2011




Photo Credits: San Diego Union Tribune




2
Common Causes of Downtime
                                                                                                                     Source: Forester Research, Inc. 2007

 Risk/Cause of Disaster                                                % of Respondents who declared disasters
                             Power failure                                                                                                    42%
                      IT hardware failure                                                                                         31%

                           Network failure                                                               21%
                       IT software failure                                                16%
                              Human error                                                 16%

                                      Flood                                         12%

                                 Hurricane                                    10%

                                        Fire                        7%
                                                                  6%
                              Winter storm
                                  Terrorism                  4%

                               Earthquake                   3%

                                   Tornado             2%

                            Chemical spill       1%
          Have not declared a disaster                                                                         24%


                                                                                                                  Infrastructure               ManMade
 27% of respondents declared at least one disaster in the past five years                                       IT Specific- HW               Natural
                                                                                                                  IT Specific - SW             None
 42% of respondents indicated that a power failure was the cause of their most significant disruption
Reasons for Planning Ahead…
           High Expectations for High Availability
• Customers expect supplies and
  services will continue or resume
  rapidly in ALL situations
• Shareholders expect
  management control to remain
  operational throughout a crisis
• Suppliers expect revenue
  streams to continue
• Regulatory Agencies expect
  requirements to be met,
  regardless of circumstance
• Insurance Companies expect
  due care to be exercised

4
Benefits for Planning Ahead
           Protect
         Reputation &                      Reduce Cost
          Financial                          & Legal
         Performance                        Exposure

    Competitive           Protect Client
     Edge By              Relationships          Achieve
     Operating                 and              Regulatory
       24x7                Consumer             Compliance
                           Confidence


             Agility,                        Protect
          Flexibility &                     Revenue &
          Availability                     Market Share


5
Approaching the
    Disaster Recovery / Business Continuity
    & Application/Service Availability Problem




6
360 Protection – Five Essentials
Every business should have a plan that implements
all five to some degree.




7
360 Protection – Mapped Out




8
Physical Diversity
          Don't put all your eggs in one basket…
• Two (or more) physically separate locations
    – Far enough apart so a natural disaster doesn't
      affect all locations.




9
Network Availability
     Accessibility with routing alternatives…




10
Network Availability
        Accessibility with routing alternatives…
• Ideally your Internet traffic and IP addresses
  will be routed through the best paths, and in
  an emergency you will be able to terminate
  nonfunctional routes.




11
Network Availability
       Prepare for other hazards like DDoS attacks…
• Can be mitigated through
  proper planning and the
  use of Border Gateway
  Protocol (BGP) technology
  and communities.
     – These can tell the Internet
       where to route your traffic
       and can even help you take
       action against inbound
       attacks.

12
Data Archiving
               Get your data out of Dodge…

• Making sure your data is available offsite to
  help you resume operations
     – Traditional Approach: Backup Tapes
     – Alternate Approach: Leverage the Cloud




                        Restoring from Internet takes less time.




13
Data Replication
               Keeping data current…




• Private, long-haul optical links and MPLS
  backbone network provides high-performance,
  redundant connectivity between data centers.


  14
Application Failover
           Rapid, automatic and seamless…
• Ensuring that user sessions can be
  efficiently directed to a secondary site with
  minimal interruption.




15
Application Failover

• e-High Availability
     – Customized
       failure detection
     – Traffic redirection
       across two or
       more locations


• Global Load Balancers
     – Ensure no perceived down time


16
The 360 Approach
     The Payoff: Sleep easier at night…




17
How AIS Can Help…

• Disaster Recovery Quick Start Package
• Disaster Recover/Business Continuity
  Toolbox
• AIS ProServices Consultation Sessions




18
AIS DR/BC Quick Start Package




19
AIS DR/BC Quick Start Package
           Quickly establish remote site…
• 1/3 private rack (14ru) in the AIS Van Buren
  (Phoenix) data center
• Redundant (A+B) power circuits with dedicated
  power distribution units (PDU)
• Automatic Transfer Switch for single-powered
  devices
• 1 Mbps of premium bandwidth with eight IP
  addresses
• Initial AIS ProServices consultation session
• Remote hands technical assistance

20
AIS DR/BC Toolbox

•    Geographic Diversity
•    Critical Systems Infrastructure
•    Private Optical Network
•    HA/BC Infrastructure
•    Technical Expertise




21
AIS DR/BC Methodology
     This approach ensures consistency and effectiveness.




22
About American Internet Services (AIS)

• We are enterprise-class data center and connectivity
  company with premium footprints in three geographic
  locations: Los Angeles, San Diego and Phoenix.
   – We provide colocation, managed, and network
     services.
   – 24x7: Resources are always available when you
     need them.
   – We are privately held, backed by Seaport Capital,
     Viridian Investments, and DuPont Capital
     Management.


23
We are a call or click away…

• www.americanis.net
• 866-971-2656




24

Contenu connexe

Tendances

All clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equalAll clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equal
Nicholas Cramer
 
Attackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the EquilibriumAttackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the Equilibrium
Radware
 

Tendances (20)

First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
 
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
Hastily Formed Networks (HFN) at the Waldo Canyon FireHastily Formed Networks (HFN) at the Waldo Canyon Fire
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
 
Malicious Software Prevention for NERC CIP-007 Compliance:
Malicious Software Prevention for NERC CIP-007 Compliance:Malicious Software Prevention for NERC CIP-007 Compliance:
Malicious Software Prevention for NERC CIP-007 Compliance:
 
Feldman-Encari: Malicious Software Prevention For NERC CIP-007 Compliance
Feldman-Encari: Malicious Software Prevention For NERC CIP-007 ComplianceFeldman-Encari: Malicious Software Prevention For NERC CIP-007 Compliance
Feldman-Encari: Malicious Software Prevention For NERC CIP-007 Compliance
 
Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
All clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equalAll clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equal
 
Stream 2 - Don't Risk IT
Stream 2 - Don't Risk ITStream 2 - Don't Risk IT
Stream 2 - Don't Risk IT
 
Howe Brand, smart security grid risks
Howe Brand, smart security grid risksHowe Brand, smart security grid risks
Howe Brand, smart security grid risks
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
 
Securing Humanitarian Connectivity
Securing Humanitarian ConnectivitySecuring Humanitarian Connectivity
Securing Humanitarian Connectivity
 
Cybersecurity infographic
Cybersecurity infographicCybersecurity infographic
Cybersecurity infographic
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Retail Loss Prevention Summit V1.0
Retail Loss Prevention Summit V1.0Retail Loss Prevention Summit V1.0
Retail Loss Prevention Summit V1.0
 
Attackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the EquilibriumAttackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the Equilibrium
 
World-Class Incident Response Management
World-Class Incident Response ManagementWorld-Class Incident Response Management
World-Class Incident Response Management
 
Why Government & Corporate Cyber Programmes are Failing
Why Government & Corporate Cyber Programmes are Failing Why Government & Corporate Cyber Programmes are Failing
Why Government & Corporate Cyber Programmes are Failing
 

En vedette

En vedette (6)

Firstcomm construction of a DR plan
Firstcomm construction of a DR planFirstcomm construction of a DR plan
Firstcomm construction of a DR plan
 
Construction of a Disaster Recovery Plan with Business Only Broadband
Construction of a Disaster Recovery Plan with Business Only BroadbandConstruction of a Disaster Recovery Plan with Business Only Broadband
Construction of a Disaster Recovery Plan with Business Only Broadband
 
John Bibby
John BibbyJohn Bibby
John Bibby
 
Disaster Recovery Planning
Disaster Recovery Planning   Disaster Recovery Planning
Disaster Recovery Planning
 
Cloudnition dr plan template fillable form
Cloudnition dr plan template fillable formCloudnition dr plan template fillable form
Cloudnition dr plan template fillable form
 
Document the drp now
Document the drp nowDocument the drp now
Document the drp now
 

Similaire à 360-Degree Approach to DR / BC

Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
HKISPA
 
Data growth-protection-trends-research-results
Data growth-protection-trends-research-resultsData growth-protection-trends-research-results
Data growth-protection-trends-research-results
Accenture
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
Carahsoft
 
Avr_presentation
Avr_presentationAvr_presentation
Avr_presentation
Pakky .
 
Virtualization and Workforce Continuity 10-12-12
Virtualization and Workforce Continuity 10-12-12Virtualization and Workforce Continuity 10-12-12
Virtualization and Workforce Continuity 10-12-12
mjamesvoyss
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYOD
stefriche0199
 

Similaire à 360-Degree Approach to DR / BC (20)

Rethinking Disaster Prepardness THEITS12
Rethinking Disaster Prepardness THEITS12Rethinking Disaster Prepardness THEITS12
Rethinking Disaster Prepardness THEITS12
 
Business Meets IT presentation: Business Continuity
Business Meets IT presentation: Business ContinuityBusiness Meets IT presentation: Business Continuity
Business Meets IT presentation: Business Continuity
 
Symantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery StudySymantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery Study
 
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
Data center 2.0: Uptime assurance for data centre or cloud computing by Mr. J...
 
Effecientip DNS security.pdf
Effecientip DNS security.pdfEffecientip DNS security.pdf
Effecientip DNS security.pdf
 
Data growth-protection-trends-research-results
Data growth-protection-trends-research-resultsData growth-protection-trends-research-results
Data growth-protection-trends-research-results
 
We present Bugscout
We present BugscoutWe present Bugscout
We present Bugscout
 
Business Continuity Vulnerability Index
Business Continuity Vulnerability IndexBusiness Continuity Vulnerability Index
Business Continuity Vulnerability Index
 
ZENDAL BACKUP
ZENDAL BACKUPZENDAL BACKUP
ZENDAL BACKUP
 
What makes the large enterprise network management, large
What makes the large enterprise network management, largeWhat makes the large enterprise network management, large
What makes the large enterprise network management, large
 
After the Catastrophe: IP Resiliency In the Post-Disaster Environment
After the Catastrophe: IP Resiliency In the Post-Disaster Environment After the Catastrophe: IP Resiliency In the Post-Disaster Environment
After the Catastrophe: IP Resiliency In the Post-Disaster Environment
 
ClinicalGradeMobileHealth mHIseminar.Beaulieu
ClinicalGradeMobileHealth mHIseminar.BeaulieuClinicalGradeMobileHealth mHIseminar.Beaulieu
ClinicalGradeMobileHealth mHIseminar.Beaulieu
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
Avr presentation
Avr   presentationAvr   presentation
Avr presentation
 
Avr_presentation
Avr_presentationAvr_presentation
Avr_presentation
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud Security
 
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
Mobile Web and Apps World New Orleans Session 6 the device, mobile applicatio...
 
Virtualization and Workforce Continuity 10-12-12
Virtualization and Workforce Continuity 10-12-12Virtualization and Workforce Continuity 10-12-12
Virtualization and Workforce Continuity 10-12-12
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYOD
 

Plus de AISDC

AIS Client Portal Overview
AIS Client Portal OverviewAIS Client Portal Overview
AIS Client Portal Overview
AISDC
 
AIS Company Overview
AIS Company OverviewAIS Company Overview
AIS Company Overview
AISDC
 
AIS DIsaster Recovery & Business Continuity
AIS DIsaster Recovery & Business ContinuityAIS DIsaster Recovery & Business Continuity
AIS DIsaster Recovery & Business Continuity
AISDC
 
Overview of AIS e-ManagedSecurity
Overview of AIS e-ManagedSecurityOverview of AIS e-ManagedSecurity
Overview of AIS e-ManagedSecurity
AISDC
 

Plus de AISDC (10)

AIS Client Portal Overview
AIS Client Portal OverviewAIS Client Portal Overview
AIS Client Portal Overview
 
Moss Adams SSAE 16 SOC Audits
Moss Adams SSAE 16 SOC AuditsMoss Adams SSAE 16 SOC Audits
Moss Adams SSAE 16 SOC Audits
 
AIS Company Overview
AIS Company OverviewAIS Company Overview
AIS Company Overview
 
Introducing AIS BusinessCloud1
Introducing AIS BusinessCloud1Introducing AIS BusinessCloud1
Introducing AIS BusinessCloud1
 
7 Essentials of AIS BusinessCloud1
7 Essentials of AIS BusinessCloud17 Essentials of AIS BusinessCloud1
7 Essentials of AIS BusinessCloud1
 
The 7 Essential Features of AIS vCloudOne
The 7 Essential Features of AIS vCloudOneThe 7 Essential Features of AIS vCloudOne
The 7 Essential Features of AIS vCloudOne
 
The 7 Essentials of AIS CloudOne
The 7 Essentials of AIS CloudOneThe 7 Essentials of AIS CloudOne
The 7 Essentials of AIS CloudOne
 
AIS e-High Availability (e-HA)
AIS e-High Availability (e-HA)AIS e-High Availability (e-HA)
AIS e-High Availability (e-HA)
 
AIS DIsaster Recovery & Business Continuity
AIS DIsaster Recovery & Business ContinuityAIS DIsaster Recovery & Business Continuity
AIS DIsaster Recovery & Business Continuity
 
Overview of AIS e-ManagedSecurity
Overview of AIS e-ManagedSecurityOverview of AIS e-ManagedSecurity
Overview of AIS e-ManagedSecurity
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

360-Degree Approach to DR / BC

  • 1. Planning Ahead: Disaster Recovery / Business Continuity & Application/Service Availability A 360-Degree Approach 1
  • 2. Outages Happen San Diego Thursday, September 8, 2011 Photo Credits: San Diego Union Tribune 2
  • 3. Common Causes of Downtime Source: Forester Research, Inc. 2007 Risk/Cause of Disaster % of Respondents who declared disasters Power failure 42% IT hardware failure 31% Network failure 21% IT software failure 16% Human error 16% Flood 12% Hurricane 10% Fire 7% 6% Winter storm Terrorism 4% Earthquake 3% Tornado 2% Chemical spill 1% Have not declared a disaster 24% Infrastructure ManMade  27% of respondents declared at least one disaster in the past five years IT Specific- HW Natural IT Specific - SW None  42% of respondents indicated that a power failure was the cause of their most significant disruption
  • 4. Reasons for Planning Ahead… High Expectations for High Availability • Customers expect supplies and services will continue or resume rapidly in ALL situations • Shareholders expect management control to remain operational throughout a crisis • Suppliers expect revenue streams to continue • Regulatory Agencies expect requirements to be met, regardless of circumstance • Insurance Companies expect due care to be exercised 4
  • 5. Benefits for Planning Ahead Protect Reputation & Reduce Cost Financial & Legal Performance Exposure Competitive Protect Client Edge By Relationships Achieve Operating and Regulatory 24x7 Consumer Compliance Confidence Agility, Protect Flexibility & Revenue & Availability Market Share 5
  • 6. Approaching the Disaster Recovery / Business Continuity & Application/Service Availability Problem 6
  • 7. 360 Protection – Five Essentials Every business should have a plan that implements all five to some degree. 7
  • 8. 360 Protection – Mapped Out 8
  • 9. Physical Diversity Don't put all your eggs in one basket… • Two (or more) physically separate locations – Far enough apart so a natural disaster doesn't affect all locations. 9
  • 10. Network Availability Accessibility with routing alternatives… 10
  • 11. Network Availability Accessibility with routing alternatives… • Ideally your Internet traffic and IP addresses will be routed through the best paths, and in an emergency you will be able to terminate nonfunctional routes. 11
  • 12. Network Availability Prepare for other hazards like DDoS attacks… • Can be mitigated through proper planning and the use of Border Gateway Protocol (BGP) technology and communities. – These can tell the Internet where to route your traffic and can even help you take action against inbound attacks. 12
  • 13. Data Archiving Get your data out of Dodge… • Making sure your data is available offsite to help you resume operations – Traditional Approach: Backup Tapes – Alternate Approach: Leverage the Cloud Restoring from Internet takes less time. 13
  • 14. Data Replication Keeping data current… • Private, long-haul optical links and MPLS backbone network provides high-performance, redundant connectivity between data centers. 14
  • 15. Application Failover Rapid, automatic and seamless… • Ensuring that user sessions can be efficiently directed to a secondary site with minimal interruption. 15
  • 16. Application Failover • e-High Availability – Customized failure detection – Traffic redirection across two or more locations • Global Load Balancers – Ensure no perceived down time 16
  • 17. The 360 Approach The Payoff: Sleep easier at night… 17
  • 18. How AIS Can Help… • Disaster Recovery Quick Start Package • Disaster Recover/Business Continuity Toolbox • AIS ProServices Consultation Sessions 18
  • 19. AIS DR/BC Quick Start Package 19
  • 20. AIS DR/BC Quick Start Package Quickly establish remote site… • 1/3 private rack (14ru) in the AIS Van Buren (Phoenix) data center • Redundant (A+B) power circuits with dedicated power distribution units (PDU) • Automatic Transfer Switch for single-powered devices • 1 Mbps of premium bandwidth with eight IP addresses • Initial AIS ProServices consultation session • Remote hands technical assistance 20
  • 21. AIS DR/BC Toolbox • Geographic Diversity • Critical Systems Infrastructure • Private Optical Network • HA/BC Infrastructure • Technical Expertise 21
  • 22. AIS DR/BC Methodology This approach ensures consistency and effectiveness. 22
  • 23. About American Internet Services (AIS) • We are enterprise-class data center and connectivity company with premium footprints in three geographic locations: Los Angeles, San Diego and Phoenix. – We provide colocation, managed, and network services. – 24x7: Resources are always available when you need them. – We are privately held, backed by Seaport Capital, Viridian Investments, and DuPont Capital Management. 23
  • 24. We are a call or click away… • www.americanis.net • 866-971-2656 24

Notes de l'éditeur

  1. Not every business needs to invest in top-of-the-line systems for each of the five principles; the level of protection needed will vary depending on the needs of each individual business, but every business needs to have a plan that implements all five to some degree.
  2. White boarded out – this is how it looks.
  3. Don't put all your eggs in one basket.
  4. We're sorry, but all circuits are busy... Do you have a plan for your IP addresses?
  5. Get your data out of Dodge: You need a plan for ensuring that your data is available offsite to help you resume operations. For a faster response, there are a number of offsite data archiving services that leverage the cloud to create secure, online repositories for large amounts of data. They may even allow you to store your data in multiple locations around the globe and include data integrity checking. In the event of a disaster, you can restore your data directly from the Internet to your alternative data center in less time than the traditional method of shipping physical back-ups.
  6. They can't get us all: You need to continuously replicate data between facilities to keep your data as current as possible.
  7. Don't drop the baton.
  8. e-High Availability capabilities, which provide customized failure detection and traffic redirection across two or more physical locations. Each of our global load balancers is located in a separate, fully autonomous data center and is continually checking the health of the customer application to ensure the end-user perceives no downtime and only minimal delays. Our e-High Availability devices direct traffic to the appropriate web servers by using enhanced DNS, directing traffic to the "appropriate" we server.
  9. Don't put all your eggs in one basket.
  10. Don't put all your eggs in one basket.
  11. Don't put all your eggs in one basket.
  12. Don't put all your eggs in one basket.