SlideShare une entreprise Scribd logo
1  sur  15
Disaster Recovery Best Practices 
Plan B Disaster Recovery Ltd 
11th September 2014
Agenda 
• Introduction 
• Do you need IT Disaster Recovery protection? 
• How best practice planning for IT disasters 
• Why testing is so important 
• Latest technologies 
• Case studies 
• Q&A 
• Close
About Plan B Disaster Recovery 
• Plan B is a specialist IT disaster recovery service provider. 
• We have a 100% recovery record and a 100% customer satisfaction record. 
• We guarantee instant recovery and availability of core business systems. 
• We are technical leaders in our field pioneering Pre-recovery. 
• Named Specialist Business Continuity Company of the year 2012 
• We understand security & service management 
• We protect large and small customers and simple and complex 
environments 
• We provide subcontract DR services to other service providers
Why have a robust disaster recovery provision? 
• Disasters do happen and particularly to IT systems! 
• IT disasters are unpredictable and can effect any 
business 
• Reliance on IT is so complete most businesses can’t 
operate without it and business and reputational 
damage quickly mount up 
• 80% of businesses affected by a major incident close within 18 
months* 
• 90% of businesses that lose data from a disaster close within 2 
years*
Why do plans and provisions often fail? 
• No one wants to pay for DR. 
• Tendency to be optimistic in DR planning – 
supported by some suppliers. Nothing will 
be as easy as was assumed. 
• DR plans become complicated, lots of 
manual requirements, difficult to build and 
maintain and ruinously costly to test 
properly – so they almost never are. 
Compared to the costs of a disaster a good DR provision will seem very cheap
What is the nature of an IT Disaster? 
• Like all catastrophes IT disasters usually are 
the result of multiple failures as much as one 
biblical event. 
• Loss of IT systems will rapidly affect and 
paralyse entire organisation. 
• Extent of problem may be very hard to assess 
and most information needed to recover will 
be out of date or unavailable. 
• The unexpected will happen. 
• Uncertainty will prevent decisive business decision making. 
• Many things will be harder than expected. 
• Issues can multiply and crisis can quickly turn to chaos.
Best Practice in preparing a DR Plan 
• Don’t start by assuming things will work. 
• Focus on ‘Return to service’. 
• Aim for as much certainty as possible – this will empower you 
and enable you to take back the initiative. 
• Keep your recovery plan as simple as possible – KISS 
• Automate as much of your plan as possible. 
• Aim for reasonable Speed of recovery – especially for 
communications systems, enabling you to be more decisive 
and effective. 
• Prioritise testing as a fundamental control. 
• Review and test as an on-going process
Testing – why is it so important? 
• The only way to guarantee things will work. Many fail – will yours? 
• Good testing will uncover un-known issues 
• Our first test recoveries generate tens to hundreds of errors which need 
manual intervention - this takes hours. If you haven’t carried out a full 
recovery exercise then you will have long recovery times. 
• High amount of change happening with IT systems so testing needs to 
be done regularly. 
• Tests should be full end to end recoveries, not just checking you can 
read your backup discs.
Recovery times 
Recovery times widely interpreted - ‘Time to respond’, ‘Time to get 
a bootable solution’, ‘Time to meet minimum recovery objectives’ 
etc. 
Focus on ‘Return to Service’ 
Clarify what recovery time means to you and set your own clear 
business driven objectives to be met by suppliers. 
Like all good SLAs the penalties for breaching should be meaningful. 
IT downtime costs can be calculated using our simple IT downtime 
calculator on our website. Is it cost effective to reduce your recovery 
time further?
Virtual / Cloud based recovery services 
• Virtualisation has made recovering to different hardware much 
easier and enabled automation of the process 
• Virtualisation has also made it practical to be able to syndicate 
use of hardware and services whilst delivering a very high service 
level. 
• Cloud platforms potentially cut costs. 
• Different offerings and different service levels 
• Most use replication techniques run by the customer 
• Testing still mostly manual 
Affordable DR solutions that work are now possible but don’t be fooled – 
easier doesn’t mean it will always work.
Pre-Recovery now provides a continually tested hot standby equivalent at a 
much lower cost
Benefits of Pre-recovery 
• Guaranteed recovery within minutes 
• Simplicity - set up, on-going protection, BCP Planning 
• Very cost effective 
• Minimum IT down-time - Minimum business disruption 
• Simple invocation process 
• Puts organisations back in control rapidly 
• Handle IT disaster rather than be subject to it 
• Protects from operational and reputational damage
Disasters do happen – SAN Failure 
20th December 2013 – Financial services customer had a degraded 
SAN that failed completely within 8 hours. Vendor was unable to fix 
within guaranteed time. 
Recovery systems available within 30 minutes. Users attached via 
VPN immediately. 
The customer ran on Plan B platform for 10 days. 
Despite vendor eventually fixing the SAN customer no longer trusted 
the HW and Plan B provided an ‘Export server’ solution as a 
temporary local fix. 
They were still running on the export server two months later. 
• Catastrophic Hardware and to a lesser degree Software failures are a common cause of IT 
disasters 
• Plan B solution worked quickly when everything else had failed empowering company to start 
solving the business issues. 
• Approach enabled strategic approach for return to live
Disasters do happen – Fire 
9pm, 15th April 2013 – Fire in Electrical riser caused 
extensive damage to the building, total loss of electrical 
infrastructure and smoke damage to IT equipment. 
Recovery systems available within 40 minutes & 200 users 
attached via VPNs next morning 
The business continued to service their core customers 
whilst IT staff started to recover live services. 
The customer ran on Plan B’s recovery platform for 9 
months. 
They believe fire had no impact on full year results 
• Pre-recovery worked quickly and easily providing all core communications and information systems 
within minutes empowering company to immediately start solving the business issues. 
• Many uncertainties and problems that would have made any form of ‘rebuild’ style of recovery too slow 
and difficult. 
• Approach enabled strategic approach for rebuild to live
Resources 
• Guide to cost vs performance 
• Pre-recovery whitepaper 
• Disaster Recovery Survey Results 
• DR Plan Template 
• IT Downtime Calculator 
www.planb.co.uk 
@PlanB_DR 
info@planb.co.uk

Contenu connexe

Tendances

Managing a Major Incident
Managing a Major IncidentManaging a Major Incident
Managing a Major IncidentNUS-ISS
 
CORPORATE presentation from DWM Consulting
CORPORATE presentation from DWM ConsultingCORPORATE presentation from DWM Consulting
CORPORATE presentation from DWM ConsultingGDPR SMEs
 
How to Build an Invincible Incident Management Plan
How to Build an Invincible Incident Management PlanHow to Build an Invincible Incident Management Plan
How to Build an Invincible Incident Management PlanDevOps.com
 
TIme and Attendance for Employers with a Distributed Workforce
TIme and Attendance for Employers with a Distributed WorkforceTIme and Attendance for Employers with a Distributed Workforce
TIme and Attendance for Employers with a Distributed WorkforceEPAY Systems
 
Continuant Map 011410
Continuant Map 011410Continuant Map 011410
Continuant Map 011410guest656088
 
Predictive maintenance
Predictive maintenancePredictive maintenance
Predictive maintenanceAdvisian
 
Managing software projects & teams effectively
Managing software projects & teams effectivelyManaging software projects & teams effectively
Managing software projects & teams effectivelyAshutosh Agarwal
 
Move Up to the Cloud or Stay Where You Are? 6 things to consider when reviewi...
Move Up to the Cloud or Stay Where You Are? 6 things to consider when reviewi...Move Up to the Cloud or Stay Where You Are? 6 things to consider when reviewi...
Move Up to the Cloud or Stay Where You Are? 6 things to consider when reviewi...InteractiveNEC
 
Compliance watcher A legal compliance tool
Compliance watcher A legal compliance toolCompliance watcher A legal compliance tool
Compliance watcher A legal compliance toolkarisma hirapara
 
Achieving Profitability Turnaround With A CMMS
Achieving Profitability Turnaround With A CMMSAchieving Profitability Turnaround With A CMMS
Achieving Profitability Turnaround With A CMMSeMaint Enterprises
 
Customer Case Study – Worcestershire Acute NHS
Customer Case Study – Worcestershire Acute NHS Customer Case Study – Worcestershire Acute NHS
Customer Case Study – Worcestershire Acute NHS Aden Maine
 
Bookkeeping and Accounting Services- Payroll Process
Bookkeeping and Accounting Services- Payroll ProcessBookkeeping and Accounting Services- Payroll Process
Bookkeeping and Accounting Services- Payroll ProcessVelan Bookkeeping
 

Tendances (15)

Managing a Major Incident
Managing a Major IncidentManaging a Major Incident
Managing a Major Incident
 
CORPORATE presentation from DWM Consulting
CORPORATE presentation from DWM ConsultingCORPORATE presentation from DWM Consulting
CORPORATE presentation from DWM Consulting
 
Final daimler (1)
Final daimler (1)Final daimler (1)
Final daimler (1)
 
How to Build an Invincible Incident Management Plan
How to Build an Invincible Incident Management PlanHow to Build an Invincible Incident Management Plan
How to Build an Invincible Incident Management Plan
 
TIme and Attendance for Employers with a Distributed Workforce
TIme and Attendance for Employers with a Distributed WorkforceTIme and Attendance for Employers with a Distributed Workforce
TIme and Attendance for Employers with a Distributed Workforce
 
Moving finance to the cloud
Moving finance to the cloudMoving finance to the cloud
Moving finance to the cloud
 
Continuant Map 011410
Continuant Map 011410Continuant Map 011410
Continuant Map 011410
 
Predictive maintenance
Predictive maintenancePredictive maintenance
Predictive maintenance
 
Managing software projects & teams effectively
Managing software projects & teams effectivelyManaging software projects & teams effectively
Managing software projects & teams effectively
 
Move Up to the Cloud or Stay Where You Are? 6 things to consider when reviewi...
Move Up to the Cloud or Stay Where You Are? 6 things to consider when reviewi...Move Up to the Cloud or Stay Where You Are? 6 things to consider when reviewi...
Move Up to the Cloud or Stay Where You Are? 6 things to consider when reviewi...
 
Compliance watcher A legal compliance tool
Compliance watcher A legal compliance toolCompliance watcher A legal compliance tool
Compliance watcher A legal compliance tool
 
Black Swans 3
Black Swans 3Black Swans 3
Black Swans 3
 
Achieving Profitability Turnaround With A CMMS
Achieving Profitability Turnaround With A CMMSAchieving Profitability Turnaround With A CMMS
Achieving Profitability Turnaround With A CMMS
 
Customer Case Study – Worcestershire Acute NHS
Customer Case Study – Worcestershire Acute NHS Customer Case Study – Worcestershire Acute NHS
Customer Case Study – Worcestershire Acute NHS
 
Bookkeeping and Accounting Services- Payroll Process
Bookkeeping and Accounting Services- Payroll ProcessBookkeeping and Accounting Services- Payroll Process
Bookkeeping and Accounting Services- Payroll Process
 

En vedette

02 Practical Strategies of Conducting BIA
02 Practical Strategies of Conducting BIA02 Practical Strategies of Conducting BIA
02 Practical Strategies of Conducting BIABCM Institute
 
Carta fedegan 131
Carta fedegan 131Carta fedegan 131
Carta fedegan 131Fedegan
 
Aihu structured solutions presentation 0214
Aihu structured solutions presentation 0214Aihu structured solutions presentation 0214
Aihu structured solutions presentation 0214Tang Long Consulting
 
Phingified ci and deployment strategies ipc 2012
Phingified ci and deployment strategies ipc 2012Phingified ci and deployment strategies ipc 2012
Phingified ci and deployment strategies ipc 2012TEQneers GmbH & Co. KG
 
Erp competence book_20141017
Erp competence book_20141017Erp competence book_20141017
Erp competence book_20141017Filipe Felix
 
Carmen Ramos Corrales_Actividad3_curso.doc”
Carmen  Ramos  Corrales_Actividad3_curso.doc”Carmen  Ramos  Corrales_Actividad3_curso.doc”
Carmen Ramos Corrales_Actividad3_curso.doc”Krmen Crc
 
Business Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationBusiness Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationPECB
 
Numbers not Napkins: Simple Startup Metrics
Numbers not Napkins: Simple Startup MetricsNumbers not Napkins: Simple Startup Metrics
Numbers not Napkins: Simple Startup MetricsDave McClure
 
Social Media Bootcamp by Wendy Maynard
Social Media Bootcamp by Wendy MaynardSocial Media Bootcamp by Wendy Maynard
Social Media Bootcamp by Wendy MaynardWendy Maynard
 
Cum pierd timpul angajatii tai
Cum pierd timpul angajatii taiCum pierd timpul angajatii tai
Cum pierd timpul angajatii taiRadu Popa
 
La confiance des Français dans le numérique - Baromètre ACSEL / CDC
La confiance des Français dans le numérique - Baromètre ACSEL / CDCLa confiance des Français dans le numérique - Baromètre ACSEL / CDC
La confiance des Français dans le numérique - Baromètre ACSEL / CDCLuc Mandret
 
Installation and Setup of Lotus Sametime 8.5 ”From Zero to Hero” in Just Two ...
Installation and Setup of Lotus Sametime 8.5 ”From Zero to Hero” in Just Two ...Installation and Setup of Lotus Sametime 8.5 ”From Zero to Hero” in Just Two ...
Installation and Setup of Lotus Sametime 8.5 ”From Zero to Hero” in Just Two ...jackdowning
 
Proyecto Academia Supera-T
Proyecto Academia Supera-TProyecto Academia Supera-T
Proyecto Academia Supera-TMaria Belen Pm
 
Presentacion villalba sostenible
Presentacion villalba sosteniblePresentacion villalba sostenible
Presentacion villalba sostenibleFernandoArribas
 
Instructivo para la presentacion de informe final del proyecto
Instructivo para la presentacion de informe final del proyectoInstructivo para la presentacion de informe final del proyecto
Instructivo para la presentacion de informe final del proyectokattybe
 
Papel actual del fonoaudiologo en educacion y familia
Papel actual del fonoaudiologo en educacion y familiaPapel actual del fonoaudiologo en educacion y familia
Papel actual del fonoaudiologo en educacion y familiaNestor Pardo
 
Guia de trabajos practicos
Guia de trabajos practicosGuia de trabajos practicos
Guia de trabajos practicosruthemartina
 
Revista
RevistaRevista
Revistaampa
 

En vedette (20)

02 Practical Strategies of Conducting BIA
02 Practical Strategies of Conducting BIA02 Practical Strategies of Conducting BIA
02 Practical Strategies of Conducting BIA
 
Carta fedegan 131
Carta fedegan 131Carta fedegan 131
Carta fedegan 131
 
Aihu structured solutions presentation 0214
Aihu structured solutions presentation 0214Aihu structured solutions presentation 0214
Aihu structured solutions presentation 0214
 
VENTA DE CABINA DE AUDIOMETRIA
VENTA DE CABINA DE AUDIOMETRIAVENTA DE CABINA DE AUDIOMETRIA
VENTA DE CABINA DE AUDIOMETRIA
 
Phingified ci and deployment strategies ipc 2012
Phingified ci and deployment strategies ipc 2012Phingified ci and deployment strategies ipc 2012
Phingified ci and deployment strategies ipc 2012
 
ngo profile12
ngo profile12ngo profile12
ngo profile12
 
Erp competence book_20141017
Erp competence book_20141017Erp competence book_20141017
Erp competence book_20141017
 
Carmen Ramos Corrales_Actividad3_curso.doc”
Carmen  Ramos  Corrales_Actividad3_curso.doc”Carmen  Ramos  Corrales_Actividad3_curso.doc”
Carmen Ramos Corrales_Actividad3_curso.doc”
 
Business Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationBusiness Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS Implementation
 
Numbers not Napkins: Simple Startup Metrics
Numbers not Napkins: Simple Startup MetricsNumbers not Napkins: Simple Startup Metrics
Numbers not Napkins: Simple Startup Metrics
 
Social Media Bootcamp by Wendy Maynard
Social Media Bootcamp by Wendy MaynardSocial Media Bootcamp by Wendy Maynard
Social Media Bootcamp by Wendy Maynard
 
Cum pierd timpul angajatii tai
Cum pierd timpul angajatii taiCum pierd timpul angajatii tai
Cum pierd timpul angajatii tai
 
La confiance des Français dans le numérique - Baromètre ACSEL / CDC
La confiance des Français dans le numérique - Baromètre ACSEL / CDCLa confiance des Français dans le numérique - Baromètre ACSEL / CDC
La confiance des Français dans le numérique - Baromètre ACSEL / CDC
 
Installation and Setup of Lotus Sametime 8.5 ”From Zero to Hero” in Just Two ...
Installation and Setup of Lotus Sametime 8.5 ”From Zero to Hero” in Just Two ...Installation and Setup of Lotus Sametime 8.5 ”From Zero to Hero” in Just Two ...
Installation and Setup of Lotus Sametime 8.5 ”From Zero to Hero” in Just Two ...
 
Proyecto Academia Supera-T
Proyecto Academia Supera-TProyecto Academia Supera-T
Proyecto Academia Supera-T
 
Presentacion villalba sostenible
Presentacion villalba sosteniblePresentacion villalba sostenible
Presentacion villalba sostenible
 
Instructivo para la presentacion de informe final del proyecto
Instructivo para la presentacion de informe final del proyectoInstructivo para la presentacion de informe final del proyecto
Instructivo para la presentacion de informe final del proyecto
 
Papel actual del fonoaudiologo en educacion y familia
Papel actual del fonoaudiologo en educacion y familiaPapel actual del fonoaudiologo en educacion y familia
Papel actual del fonoaudiologo en educacion y familia
 
Guia de trabajos practicos
Guia de trabajos practicosGuia de trabajos practicos
Guia de trabajos practicos
 
Revista
RevistaRevista
Revista
 

Similaire à Disaster Recovery Best Practices and Case Studies for Business Continuity

Disaster recovery shouldn’t run on late nights and coffee alone
Disaster recovery shouldn’t run on late nights and coffee aloneDisaster recovery shouldn’t run on late nights and coffee alone
Disaster recovery shouldn’t run on late nights and coffee aloneJosh Mazgelis
 
Managed IT Services: What It Is and Why It Matters
Managed IT Services: What It Is and Why It MattersManaged IT Services: What It Is and Why It Matters
Managed IT Services: What It Is and Why It MattersNet at Work
 
Warranty Master Breakout Session at IT Nation Connect 2019
Warranty Master Breakout Session at IT Nation Connect 2019Warranty Master Breakout Session at IT Nation Connect 2019
Warranty Master Breakout Session at IT Nation Connect 2019Allice Shandler
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentEagle Technologies
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentBrian Anderson
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationAndrew Miller
 
Bring Down Costs by Controlling Cloud Capacity
Bring Down Costs by Controlling Cloud Capacity Bring Down Costs by Controlling Cloud Capacity
Bring Down Costs by Controlling Cloud Capacity Precisely
 
Protecting Against Disaster: Plan for the Inevitable Before it Happens
Protecting Against Disaster: Plan for the Inevitable Before it HappensProtecting Against Disaster: Plan for the Inevitable Before it Happens
Protecting Against Disaster: Plan for the Inevitable Before it HappensHostway|HOSTING
 
Sdec10 lean package implementation
Sdec10 lean package implementationSdec10 lean package implementation
Sdec10 lean package implementationTerry Bunio
 
Curium - InsurTech Innovation Award 2022
Curium - InsurTech Innovation Award 2022Curium - InsurTech Innovation Award 2022
Curium - InsurTech Innovation Award 2022The Digital Insurer
 
Webinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessWebinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessManageEngine
 
Disaster Recovery vs. Business Continuity
Disaster Recovery vs. Business ContinuityDisaster Recovery vs. Business Continuity
Disaster Recovery vs. Business ContinuityRapidScale
 
Flatirons.NEXT - EMC Southern California User Group
Flatirons.NEXT - EMC Southern California User GroupFlatirons.NEXT - EMC Southern California User Group
Flatirons.NEXT - EMC Southern California User GroupFlatirons Solutions®
 
Day 201-20-201620-20-201705-20-20pearl-201-20-20deep-20kamal-20singh-13100801...
Day 201-20-201620-20-201705-20-20pearl-201-20-20deep-20kamal-20singh-13100801...Day 201-20-201620-20-201705-20-20pearl-201-20-20deep-20kamal-20singh-13100801...
Day 201-20-201620-20-201705-20-20pearl-201-20-20deep-20kamal-20singh-13100801...PMI_IREP_TP
 
Day 1 1620 - 1705 - pearl 1 - deep kamal singh
Day 1   1620 - 1705 - pearl 1 - deep kamal singhDay 1   1620 - 1705 - pearl 1 - deep kamal singh
Day 1 1620 - 1705 - pearl 1 - deep kamal singhPMI2011
 
Managed solutions Solution
Managed solutions SolutionManaged solutions Solution
Managed solutions SolutionLen Moncrieffe
 
Demystifying Cost and Implementation Challenges with Adaptive Insights
Demystifying Cost and Implementation Challenges with Adaptive InsightsDemystifying Cost and Implementation Challenges with Adaptive Insights
Demystifying Cost and Implementation Challenges with Adaptive InsightsAdaptive Insights
 

Similaire à Disaster Recovery Best Practices and Case Studies for Business Continuity (20)

Disaster Recovery best practices
Disaster Recovery best practicesDisaster Recovery best practices
Disaster Recovery best practices
 
Disaster recovery shouldn’t run on late nights and coffee alone
Disaster recovery shouldn’t run on late nights and coffee aloneDisaster recovery shouldn’t run on late nights and coffee alone
Disaster recovery shouldn’t run on late nights and coffee alone
 
Managed IT Services: What It Is and Why It Matters
Managed IT Services: What It Is and Why It MattersManaged IT Services: What It Is and Why It Matters
Managed IT Services: What It Is and Why It Matters
 
Warranty Master Breakout Session at IT Nation Connect 2019
Warranty Master Breakout Session at IT Nation Connect 2019Warranty Master Breakout Session at IT Nation Connect 2019
Warranty Master Breakout Session at IT Nation Connect 2019
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery Environment
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery Environment
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR Presentation
 
Bring Down Costs by Controlling Cloud Capacity
Bring Down Costs by Controlling Cloud Capacity Bring Down Costs by Controlling Cloud Capacity
Bring Down Costs by Controlling Cloud Capacity
 
Protecting Against Disaster: Plan for the Inevitable Before it Happens
Protecting Against Disaster: Plan for the Inevitable Before it HappensProtecting Against Disaster: Plan for the Inevitable Before it Happens
Protecting Against Disaster: Plan for the Inevitable Before it Happens
 
Sdec10 lean package implementation
Sdec10 lean package implementationSdec10 lean package implementation
Sdec10 lean package implementation
 
Curium - InsurTech Innovation Award 2022
Curium - InsurTech Innovation Award 2022Curium - InsurTech Innovation Award 2022
Curium - InsurTech Innovation Award 2022
 
Test 2
Test 2Test 2
Test 2
 
Webinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessWebinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your business
 
Disaster Recovery vs. Business Continuity
Disaster Recovery vs. Business ContinuityDisaster Recovery vs. Business Continuity
Disaster Recovery vs. Business Continuity
 
Flatirons.NEXT - EMC Southern California User Group
Flatirons.NEXT - EMC Southern California User GroupFlatirons.NEXT - EMC Southern California User Group
Flatirons.NEXT - EMC Southern California User Group
 
Day 201-20-201620-20-201705-20-20pearl-201-20-20deep-20kamal-20singh-13100801...
Day 201-20-201620-20-201705-20-20pearl-201-20-20deep-20kamal-20singh-13100801...Day 201-20-201620-20-201705-20-20pearl-201-20-20deep-20kamal-20singh-13100801...
Day 201-20-201620-20-201705-20-20pearl-201-20-20deep-20kamal-20singh-13100801...
 
Summer School Lesson 3
Summer School Lesson 3Summer School Lesson 3
Summer School Lesson 3
 
Day 1 1620 - 1705 - pearl 1 - deep kamal singh
Day 1   1620 - 1705 - pearl 1 - deep kamal singhDay 1   1620 - 1705 - pearl 1 - deep kamal singh
Day 1 1620 - 1705 - pearl 1 - deep kamal singh
 
Managed solutions Solution
Managed solutions SolutionManaged solutions Solution
Managed solutions Solution
 
Demystifying Cost and Implementation Challenges with Adaptive Insights
Demystifying Cost and Implementation Challenges with Adaptive InsightsDemystifying Cost and Implementation Challenges with Adaptive Insights
Demystifying Cost and Implementation Challenges with Adaptive Insights
 

Dernier

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Disaster Recovery Best Practices and Case Studies for Business Continuity

  • 1. Disaster Recovery Best Practices Plan B Disaster Recovery Ltd 11th September 2014
  • 2. Agenda • Introduction • Do you need IT Disaster Recovery protection? • How best practice planning for IT disasters • Why testing is so important • Latest technologies • Case studies • Q&A • Close
  • 3. About Plan B Disaster Recovery • Plan B is a specialist IT disaster recovery service provider. • We have a 100% recovery record and a 100% customer satisfaction record. • We guarantee instant recovery and availability of core business systems. • We are technical leaders in our field pioneering Pre-recovery. • Named Specialist Business Continuity Company of the year 2012 • We understand security & service management • We protect large and small customers and simple and complex environments • We provide subcontract DR services to other service providers
  • 4. Why have a robust disaster recovery provision? • Disasters do happen and particularly to IT systems! • IT disasters are unpredictable and can effect any business • Reliance on IT is so complete most businesses can’t operate without it and business and reputational damage quickly mount up • 80% of businesses affected by a major incident close within 18 months* • 90% of businesses that lose data from a disaster close within 2 years*
  • 5. Why do plans and provisions often fail? • No one wants to pay for DR. • Tendency to be optimistic in DR planning – supported by some suppliers. Nothing will be as easy as was assumed. • DR plans become complicated, lots of manual requirements, difficult to build and maintain and ruinously costly to test properly – so they almost never are. Compared to the costs of a disaster a good DR provision will seem very cheap
  • 6. What is the nature of an IT Disaster? • Like all catastrophes IT disasters usually are the result of multiple failures as much as one biblical event. • Loss of IT systems will rapidly affect and paralyse entire organisation. • Extent of problem may be very hard to assess and most information needed to recover will be out of date or unavailable. • The unexpected will happen. • Uncertainty will prevent decisive business decision making. • Many things will be harder than expected. • Issues can multiply and crisis can quickly turn to chaos.
  • 7. Best Practice in preparing a DR Plan • Don’t start by assuming things will work. • Focus on ‘Return to service’. • Aim for as much certainty as possible – this will empower you and enable you to take back the initiative. • Keep your recovery plan as simple as possible – KISS • Automate as much of your plan as possible. • Aim for reasonable Speed of recovery – especially for communications systems, enabling you to be more decisive and effective. • Prioritise testing as a fundamental control. • Review and test as an on-going process
  • 8. Testing – why is it so important? • The only way to guarantee things will work. Many fail – will yours? • Good testing will uncover un-known issues • Our first test recoveries generate tens to hundreds of errors which need manual intervention - this takes hours. If you haven’t carried out a full recovery exercise then you will have long recovery times. • High amount of change happening with IT systems so testing needs to be done regularly. • Tests should be full end to end recoveries, not just checking you can read your backup discs.
  • 9. Recovery times Recovery times widely interpreted - ‘Time to respond’, ‘Time to get a bootable solution’, ‘Time to meet minimum recovery objectives’ etc. Focus on ‘Return to Service’ Clarify what recovery time means to you and set your own clear business driven objectives to be met by suppliers. Like all good SLAs the penalties for breaching should be meaningful. IT downtime costs can be calculated using our simple IT downtime calculator on our website. Is it cost effective to reduce your recovery time further?
  • 10. Virtual / Cloud based recovery services • Virtualisation has made recovering to different hardware much easier and enabled automation of the process • Virtualisation has also made it practical to be able to syndicate use of hardware and services whilst delivering a very high service level. • Cloud platforms potentially cut costs. • Different offerings and different service levels • Most use replication techniques run by the customer • Testing still mostly manual Affordable DR solutions that work are now possible but don’t be fooled – easier doesn’t mean it will always work.
  • 11. Pre-Recovery now provides a continually tested hot standby equivalent at a much lower cost
  • 12. Benefits of Pre-recovery • Guaranteed recovery within minutes • Simplicity - set up, on-going protection, BCP Planning • Very cost effective • Minimum IT down-time - Minimum business disruption • Simple invocation process • Puts organisations back in control rapidly • Handle IT disaster rather than be subject to it • Protects from operational and reputational damage
  • 13. Disasters do happen – SAN Failure 20th December 2013 – Financial services customer had a degraded SAN that failed completely within 8 hours. Vendor was unable to fix within guaranteed time. Recovery systems available within 30 minutes. Users attached via VPN immediately. The customer ran on Plan B platform for 10 days. Despite vendor eventually fixing the SAN customer no longer trusted the HW and Plan B provided an ‘Export server’ solution as a temporary local fix. They were still running on the export server two months later. • Catastrophic Hardware and to a lesser degree Software failures are a common cause of IT disasters • Plan B solution worked quickly when everything else had failed empowering company to start solving the business issues. • Approach enabled strategic approach for return to live
  • 14. Disasters do happen – Fire 9pm, 15th April 2013 – Fire in Electrical riser caused extensive damage to the building, total loss of electrical infrastructure and smoke damage to IT equipment. Recovery systems available within 40 minutes & 200 users attached via VPNs next morning The business continued to service their core customers whilst IT staff started to recover live services. The customer ran on Plan B’s recovery platform for 9 months. They believe fire had no impact on full year results • Pre-recovery worked quickly and easily providing all core communications and information systems within minutes empowering company to immediately start solving the business issues. • Many uncertainties and problems that would have made any form of ‘rebuild’ style of recovery too slow and difficult. • Approach enabled strategic approach for rebuild to live
  • 15. Resources • Guide to cost vs performance • Pre-recovery whitepaper • Disaster Recovery Survey Results • DR Plan Template • IT Downtime Calculator www.planb.co.uk @PlanB_DR info@planb.co.uk