1 / 33

Making your Business Unstoppable

Making your Business Unstoppable. e-Continuity. Angela Osorio HPS Solution Manager. Today’s business is about information availability. ‘00s. ‘80s. ‘90s. Business Focus. Traditional. Dot.com. e-Business. Requirements . Restore, Recover. High Availability. 24 x 7, Scalable.

azizi
Download Presentation

Making your Business Unstoppable

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Making your Business Unstoppable e-Continuity Angela Osorio HPS Solution Manager

  2. Today’s business is about information availability

  3. ‘00s ‘80s ‘90s Business Focus Traditional Dot.com e-Business Requirements Restore, Recover High Availability 24 x 7, Scalable Driven by Regulation e-Commerce Competition Magnified by Disaster Absence of“Bricks & Mortar” Dependence on Computers Recovery Expectation Hardware Days/Hours Hardware, Data Minutes/Seconds Hardware, Data, Applications Minutes/Seconds Decision Optional Mandatory Evolution of Business Continuity

  4. Quality • Availability • Accessibility Changing Concept of Business Continuity e-Continuity

  5. Today ASP ISP DIST Company Company MFG SSP SC Credit Customer Customer Drivers of Data and Information Flow Yesterday

  6. Regional Event Metropolitan Area Event Building Level Incident Administrative Intervention Component Risks to information availability Global Event The Failure Event Spectrum

  7. Causes ofDOWNTIME Planned maintenance Application failure Operator error Operating system failure Hardware failure Power outage Natural disaster 1 2 3 4 5 6 7 Source: Gartner Group

  8. Average cost per hour of downtime (US$) $ 7,840,000 $ 3,160,000 $ 183,000 $ 137,000 $ 109,000 $ 108,000 $ 83,000 $ 34,000 $ 18,000 Industry Financial Financial Media Retail Retail Transportation Entertainment Shipping Financial Application Brokerage operations Credit card sales Pay-per-view Home shopping (TV) Catalog sales Airline reservations Tele-ticket sales Package shipping ATM fees Financial cost of downtime is relative to who feels the pain Source: Contingency Planning Research, 2000

  9. Disasters are defined by you One person’s inconvenience may be another’s disaster • Which systems are critical to your business? • Those which are customer facing are usually more important • What happens if data becomes unavailable? • Is it merely inconvenient or aggravating? • Is it life or death?

  10. More disastrous results • Loss of customer service satisfaction • Cost and time of rebuilding lost data • Possible fines and penalties imposed by regulatory agencies • Idle time of employees • Fines and penalties imposed for not meeting contracted delivery times or SLAs • Movement of your customers to your competitor

  11. Disaster Tolerance tends to be: Data-centric Data integrity-focused Geographical Recovery point focused Longer time horizon High Availability tends to be: Transaction-centric Transaction integrity-focused Local Recovery time focused Very short time horizon High Availability and Disaster Tolerance

  12. Site goes down Shares down 30 pts. $4B in stock value lost Protect your business…Protect your informationThe stakes are high! “Nearly half the companies that lose their data through disaster, never re-open, and 90% are out of business within two years.” Source: University of Texas Center for Research on Information Systems

  13. What types of problems does/will your plan anticipate? Under $20M in Revenue Over $20M in Revenue Network failure Hardware component failure Natural disasters Operating system fault/failure Software viruses Application failure Malicious physical and computer security breaches (external) Malicious physical and computer security breaches (internal) Acts of man (war, terrorism, etc.) Service provider failure Accidental employee-initiated outages Attack on company Web site 86.9% 84.8 84.4 77.6 75.5 70.9 68.4 59.1 57.8 56.1 55.3 53.6 89.5 87.6 78.9 89.3 77.9 90.9 77.9 76 83.2 69.4 71.6 69.4 67.4 68.6 56.8 59.5 56.8 60.3 60 53.7 47.4 61.2 56.8 52.9 Anticipated problems driving need for High Availability and Disaster Tolerance CIO Insight study on Disaster Recovery – November 2001

  14. Power Outage Hardware Failure Fire Flood Earthquake Hurricane Software Error Bombing Snow/Wind Storm Network Failure Contamination Burst Pipe Forced Evacuation HVAC Failure Delayed Relocation Riot DR Testing went wrong Events that actually forced companies to declare a disaster Source: Disaster Recovery Journal

  15. High Availability & Disaster Tolerance It’s about data and keeping it availableWhat Is Your Specific Situation? • Questions to ask yourself • What is your business? • What is your application? • What is your environment (flood zone, earthquake)? • What risks are you willing to take? • What’s happened in the past? • What if your critical systems were lost?

  16. High Availability & Disaster Tolerance It’s about data and keeping it availableEvaluating RPO and RTO • Recovery point objective • How fresh is your data? • Not all data needs to be recovered to the same point • Recovery time objective • How soon after an event do you need to be running? • Not all applications need to come up at the same time The quicker your required recovery time and the more thorough and accurate your recovery point, the more robust a solution is required

  17. Defense Data Warehousing Emergency 911 Tech Pubs eCommerce Healthcare Discrete Mfg Financial Transactions Payroll Telecommunications Accounting Rules Of Thumb Environment Less Forgiving More Forgiving Backup and drive tape across town Campus-Wide Clusters Disaster Tolerance Methodology

  18. High Availability & Disaster Tolerant responses are a balance of three aspects • Technology • Services • Procedures and discipline

  19. Services Technology Procedures & Discipline Find the balance of three aspects

  20. Data Protection Remote Log Shipping Data Replication Manager Campus Wide Clusters Reliable Transaction Router Techniques to eliminate system downtime • Technology • Services • Procedures & Discipline • Data protection • Remote log shipping • Data Replication Manager • Campus-Wide Clusters • Reliable Transaction Router • Insurance • Assets Recovery • Cold-site, Mobile recovery • Stand-Alone systems • Business Protection Service • Distributed & Networked systems • Disaster recovery hot-site • Redundancy, Hot Swap components, RAID • Availability clusters • Data mirroring, SMART • Dual host/redundancy • Shared Data clusters • FDDI, ATM switching • Plan • Question • Exercise • Document procedures • Eliminate single points of failure • Rolling Upgrades • Provide shared, direct access to storage • Minimize environmental risks • Practice! Services Custom Systems

  21. Acceptable downtime C O S T L O S S Maximum cost of plan Nominal Justifiable Cost of Plan • Does cost of recovery exceed the losses? Money Time to recover

  22. Acceptable downtime Plan IV Plan III Maximum cost of plan Plan II Plan I Evaluate Alternatives • Does your plan make financial sense? Cost Loss reduction (savings)

  23. E-business…putting all of your “eggs-in-a-basket” Risk Level Dependency on Technology

  24. Tools to Make Your Business Unstoppable e-Continuity

  25. High Availability & Disaster Tolerance It’s about data and keeping it availableEvaluating RPO and RTO • Recovery point objective • How fresh is your data? • Not all data needs to be recovered to the same point • Recovery time objective • How soon after an event do you need to be running? • Not all applications need to come up at the same time The quicker your required recovery time and the more thorough and accurate your recovery point, the more robust a solution is required

  26. Defense Data Warehousing Emergency 911 Tech Pubs eCommerce Healthcare Discrete Mfg Financial Transactions Payroll Telecommunications Accounting Rules Of Thumb Environment Less Forgiving More Forgiving Backup and drive tape across town Campus-Wide Clusters Disaster Tolerance Methodology

  27. High Availability & Disaster Tolerant responses are a balance of three aspects • Technology • Services • Procedures and discipline

  28. Services Technology Procedures & Discipline Find the balance of three aspects

  29. Data Protection Remote Log Shipping Data Replication Manager Campus Wide Clusters Reliable Transaction Router Techniques to eliminate system downtime • Technology • Services • Procedures & Discipline • Data protection • Remote log shipping • Data Replication Manager • Campus-Wide Clusters • Reliable Transaction Router • Insurance • Assets Recovery • Cold-site, Mobile recovery • Stand-Alone systems • Business Protection Service • Distributed & Networked systems • Disaster recovery hot-site • Redundancy, Hot Swap components, RAID • Availability clusters • Data mirroring, SMART • Dual host/redundancy • Shared Data clusters • FDDI, ATM switching • Plan • Question • Exercise • Document procedures • Eliminate single points of failure • Rolling Upgrades • Provide shared, direct access to storage • Minimize environmental risks • Practice! Services Custom Systems

  30. Preventing a Disaster • You Need: • copy of applications • copy of application data • current: no, or predictable degree of, data loss • consistent: write ordering across related replicas • systems to restart and run applications • reestablished client communications • Spectrum of recovery techniques • trade off cost, recovery time, data currency

  31. AVAILABILITY…open all night long “ • High availability is as important to eCommerce as breathing is to humans.Our Compaq servers stayhighly available to customers, giving us an advantage for eCommerce. • Kal Raman • Chief Information OfficerDrugstore.com, Inc. Making online healthy and beautiful ”

  32. SECURITY… solving a devilish problem “ • At the Vatican... security was our first criterion in choosing a partner; our second critical factor was availability; another washigh performance. • Stefano Pasquini • IT PlannerInternet Office of the Holy See God knows what else you need… Professional Services ”

  33. Defense Data Warehousing Emergency 911 Tech Pubs eCommerce Healthcare Discrete Mfg Financial Transactions Payroll Telecommunications Accounting Business Continuity Methodologies Application Synchronous Asynchronous Reliable Transaction Router Simple Backup & Remote Storage Site Campus-Wide Clusters Data Protection Technologies SANworks Data Replication Manager Remote Log Shipping Technology

More Related