© 2013 ibm corporation ibm systems and technology planning for it business continuity in a...
TRANSCRIPT
© 2013 IBM Corporation
IBM Systems and Technology
Planning for IT BusinessContinuity in a Heterogeneous World
John Sing Senior ConsultantIBM Systems and Technology [email protected]
© 2013 IBM Corporation2
IBM Systems and Technology Group
2
John Sing 31 years of experience with IBM in high end servers, storage, and
software– 2009 - Present: IBM Executive Strategy Consultant: IT Strategy and Planning, Enterprise Large
Scale Storage, Internet Scale Workloads and Data Center Design, Big Data Analytics, HA/DR/BC– 2002-2008: IBM IT Data Center Strategy, Large Scale Systems, Business Continuity, HA/DR/BC,
IBM Storage– 1998-2001: IBM Storage Subsystems Group - Enterprise Storage Server Marketing Manager,
Planner for ESS Copy Services (FlashCopy, PPRC, XRC, Metro Mirror, Global Mirror) – 1994-1998: IBM Hong Kong, IBM China Marketing Specialist for High-End Storage– 1989-1994: IBM USA Systems Center Specialist for High-End S/390 processors– 1982-1989: IBM USA Marketing Specialist for S/370, S/390 customers (including VSE and
VSE/ESA)
IBM colleagues may access my intranet webpage:
– http://snjgsa.ibm.com/~singj/
You may follow my daily IT research blog
– http://www.delicious.com/atsf_arizona
You may follow me on Slideshare.net:
– http://www.slideshare.net/johnsing1
My LinkedIn:
– http://www.linkedin.com/in/johnsing
© 2013 IBM Corporation3
IBM Systems and Technology Group
Explain the process for planning effective, consistent, reliable IT BC/DR in today's highly diverse IT environments by:
– Describe best practices for Justifying IT Business Continuity to the Business
– Describing the six key steps in the customer BC/DR Planning process
Illustrate this Planning process to a client by:
– Outlining a pragmatic step by step, fill-in-the-blanks template, cookbook methodology for implementing these six key steps
– Describing a real-life example IT BC/DR project overview and summary
– Describe key guidelines and rules of thumb for when to choose outsourced D/R and when to choose in-house
Goal: get you started Now! in your customer
– So you can do build the BC proposal that will win!
Session Objectives
At the conclusion of this activity, participants should be able to :
© 2013 IBM Corporation4
IBM Systems and Technology Group
SettingLecture Expectations:
We will give guidelines and generate better understanding
In 75 minutes, not possible to provide answers that can fit all IT Business
Continuity marketing situations
© 2013 IBM Corporation5
IBM Systems and Technology Group
Justifying Business Continuity to the Business
© 2013 IBM Corporation6
IBM Systems and Technology Group
Application 1Application 3Analytics
report
managementreports
http://xyz.xml
decisionpoint
MQseries
WebSphere
Application 2
SQL
db2
Businessprocess A
Businessprocess B
Businessprocess C
Businessprocess D
Businessprocess E
Businessprocess F
Businessprocess G
Tech
nic
al
Ap
plicati
on
Bu
sin
ess
1. An error occurs on a storage device that correspondingly corrupts a database
2. The error impacts the ability of two or more applications to share critical data
3. The loss of both applications affects two distinctly different business processes
IT Business Continuity focus has shifted to business processrecovery
Complexity: the Business Process has become the IT Recoverable Unit
© 2013 IBM Corporation7
IBM Systems and Technology Group
The business needs to balance Risk vs. Impact vs. Cost
Risk – What is the probability of a particular type
of disaster happening? Fire / Flood / Power Failure / Natural disaster• High: only a matter of time.• Medium: 50% - 50% - a flip of a coin.• Low: unlikely within (say) ten years.
Impact – What is the effect on the business if a particular disaster
occurred?• High / Catastrophic: Complete business failure.• Medium / High: Loss of revenue.• Low: Minimal loss of revenue however some recovery actions are
required.
Cost – What must be done to avoid or recover from
particular disaster?• High: significant impact to the organization’s budgets and
earnings.• Medium: significant but manageable within normal operating
expenses.• Low: containable within one or several departmental budgets.
Risk
Impa
ct
Cost
© 2013 IBM Corporation8
IBM Systems and Technology Group
Integration into IT ManageBusiness Prioritization
StrategyDesign
riskassessment
businessimpactanalysis
Risks,
Vulnerabilities
and Threats
programassessment
Impacts
of
Outage
RTO/RPO
•Maturity Model
•Measure ROI
•Roadmap for Program
ProgramDesign
Current
Capability
Implement programvalidation
Estimated
Recovery Tim
e
ResilienceProgram
Management
Awareness, Regular Validation, Change Management, Quarterly Management Briefings
Business processes drive strategies and they are integral to the Continuity of Business Operations. A company cannot be resilient without having strategies for alternate workspace, staff members, call centers and communications channels.
crisis team
businessresumption
disasterrecovery
highavailability
1. People2. Processes3. Plans4. Strategies5. Networks6. Platforms7. Facilities
Database andSoftware design
High Availability Servers
Data Replication
high availabilitydesign
Source: IBM Global Services
Quantifying Risk vs. Impact vs. Cost in a “perfect” world: ”Ideal” IT Business Resiliency Process
© 2013 IBM Corporation9
IBM Systems and Technology Group
Why is IT Business Continuity often too “low” on the priority list?
Perceptions and reasons why BC Planning is often behind:
– “Difficult, complex, time consuming”
– Budget, cost, time, resources constraint
– Lack of skills
– Lack of support from Line of Business
– Undefined ownership
– Lack of prioritization
– Lack of knowledge business processes, interdependencies
– BC has “too wide of a span” for IT to control
– Don’t know where to start
– Needed information hard to come by
– Difficult to get consensus on the right directions
© 2013 IBM Corporation10
IBM Systems and Technology Group
So how do we solve?
What will work in today’s Heterogeneous IT World?
Answer:
Must integrate IT BC/DR into IT Simplification
© 2013 IBM Corporation11
IBM Systems and Technology Group
TrueCluster
UFSSun Cluster
PolyServe
MSCS
PPRC
ASMZFS
SecurePath
InstantImage
MPxIO
JFS
LVM
TrueCopy
JFS2
HDLM
SVM Ext3
MPIO
LDM
PowerPath
TimeFinderShadowCopy
SAM FS
QFSSDS
MirrorDisk-UX
SnapView
MirrorView
SRDF
OCFSSAN-FS
ReiserFSGPFS
Snap RepliStor
ServiceGuard
Data Replication Manager
EVM
SVC
FlashCopy
HACMP
GeoSpan
SAN Copy
DLM
ShadowImage
SnapShotDoubleTake
ClusterFrame
SNDR
QFSTOOLS
SHOWN:
0102030405060708091011121314151617181920212223242526272829303132333435363738394041424344454647484950+
Start by getting buy-in that IT BC/DR starts with ……
IT Consolidation and Simplification
© 2013 IBM Corporation13
IBM Systems and Technology Group
Start with Strategic Infrastructure
Simplification / Consolidation
Provides Compelling IT Value to address Strategic Business Issues
Solve the Enterprise Business Issues and IT issues at the same time
Fewer Components to Recover
Percentage of Savings
Invest in more robust Business Continuance
Standardize and optimize IT and Business Resiliency solution design:
Load Balancing
Solution architecture
IT Business Continuity is an intended byproduct of IT Simplification
This is best practice for IT Business Continuity justification to the Business
Up-level existing IT Simplification to produce IT BC as intended by-product
Improve Business Continuity
© 2013 IBM Corporation14
IBM Systems and Technology Group
1. SimplifiedNew Economics
2. SharedRapid Deployment
3. DynamicBusiness Goal Driven
Physical consolidation and optimization
Virtualization of individual systems
Systems, network and energy management
Start with lower BC Tiers, build upwards
Highly virtualized resource pools – “ensembles”
Integrated IT service management
Move to more advanced replication
Virtualization of IT service
Business-driven automated service management
Service oriented delivery of IT
Stages of Adoption for IT Business Resiliency
© 2013 IBM Corporation15
IBM Systems and Technology Group
The Six key steps to IT Business Continuity
in today’s iPod / Blackberry world
………………………………………..……Swoosh!!!!
© 2013 IBM Corporation16
IBM Systems and Technology Group
Here’s how to handle: use the six key IT Business Continuity Planning Steps
For today’s real world environment
Integration into IT ManageBusiness Prioritization
StrategyDesign
riskassessment
businessimpactanalysis
Risks,
Vulnerabilities
and Threats
programassessment
Impacts
of
Outage
RTO/RPO
• Maturity Model
• Measure ROI
• Roadmap for Program
ProgramDesign
Current
Capability
Implement programvalidation
Estimated
Recovery Tim
e
ResilienceProgram
Management
Awareness, Regular Validation, Change Management, Quarterly Management Briefings
crisis team
businessresumption
disasterrecovery
highavailability
1. People2. Processes3. Plans4. Strategies5. Networks6. Platforms7. Facilities
Database andSoftware design
High Availability Servers
Data Replication
high availabilitydesign
i.e. how to streamline this “ideal” process?1. Collect information for prioritization
2. Vulnerability, risk assessment, scope
3. Define BC targets based on scope
4. Solution option design and evaluation
5. Recommend solutions and products
6. Recommend strategy and roadmap
4. Solution option design and evaluation
5. Recommend solutions and products
6. Recommend strategy and roadmap
Most IT personnel
can do this, If given proper
requirements
We’llFocushere
We’llFocushere
© 2013 IBM Corporation17
IBM Systems and Technology Group
Key Workshop Step 1
1. Collect information for prioritization
2. Vulnerability, risk assessment, scope
3. Define BC targets based on scope
4. Solution option design and evaluation
5. Recommended solutions and products
6. Recommended strategy and roadmap
© 2013 IBM Corporation18
IBM Systems and Technology Group
Key IT Business Continuity Requirements Questions (in proper order):
1. What applications or databases to recover?
2. What platform? (z, p, i, x and Windows, Linux, heterogeneous open, heterogeneous z+Open)
3. What is desired Recovery Time Objective (RTO)?
4. What is distance between the sites? (if there are 2 sites)
5. What is the connectivity, infrastructure, and bandwidth between sites?
7. What is the Level of Recovery?- Planned Outage- Unplanned Outage- Transaction Integrity
8. What is the Recovery Point Objective?
9. What is the amount of data to be recovered (in GB or TB)?
10. Who will design the solution?
11. Who will implement the solution?
12. Remaining solutions are valid choices to give to detailed DR evaluation team
6. What are the specific h/w equipment(s) that needs to be recovered?
Tier 4Tier 3
Tier 2
Tier 7Tier 6
Tier 5
Tier 1
© 2013 IBM Corporation19
IBM Systems and Technology Group
First step: inventory of applications:
1) Identify priority applications
2) Hi-level segment at this stage OK.
• Use scope that is achievable
• Example: 1 day recovery, 3 day recovery
Start by collecting what applications need to be recovered
Step 1: Collect Info for
Prioritization
© 2013 IBM Corporation21
IBM Systems and Technology Group
Inventory of environment information to be collected:
1) Identify priority applications
2) Hi-level segment at this stage OK. Use scope that is achievable
– Example: 1 day recovery, 3 day recovery
Map the applications to their associated IT components:
1) Data and data management pools
2) Databases
3) Hardware infrastructure (server, storage)
4) Network (LAN, WAN)
5) Procedures and tools
6) People
7) Facilities and locations
8) If known, Estimated cost of outage, per hour
9) If known, document priority vulnerabilities
Component Inventory information to be collected, mapped by business process
Step 1: Collect Info for
Prioritization
© 2013 IBM Corporation22
IBM Systems and Technology Group
Scope – IT Resources and Business Processes
Component Business process 1 Business process 2 Business process 3
Applications
Data and data management policies
Databases
Servers
Storage
Network (LAN, WAN)
Procedures and tools
People
Facilities and physical location
Known vulnerabilities
Estimated cost of outage , per hour
Business Impact
Ranking
Step 1: Collect info for prioritization
© 2013 IBM Corporation23
IBM Systems and Technology Group
Scope – IT Resources and Business Processes
Component Patient Records Radiology E-mail
Applications PR1 EPIC1, PR1 MSE1, MSE2
Data and data management policies
Backup daily at night by TSM
Backup daily by Veritas Backup daily by MSM
Databases DB2 Oracle, DB2 MSSQL1
Servers Mainframe1 UNIX1, Mainframe1 MS222, MS223, MS224
Storage 33801, 33802 SUN101 MSS1, MSS2
Network (LAN, WAN) SLAN1 and SLAN2 SLAN2 and SLAN3 LAN2, LAN3
Procedures and tools Data Center M1 Data Center M1, M2 Data Center M3
People J1, J2 M1, J1 K1, K2
Facilities and physical location
DC1 DC1 DC1
Known vulnerabilities Flood Flood Flood, servers
Estimated cost of outage , per hour
$200K* $150K* $20K*
Business Impact High High Medium
Ranking 1 2 3
Case Study Example
© 2013 IBM Corporation24
IBM Systems and Technology Group
Key Workshop Step 2
1. Collect information for prioritization
2. Vulnerability, risk assessment, scope
3. Define BC targets based on scope
4. Solution option design and evaluation
5. Recommended solutions and products
6. Recommended strategy and roadmap
© 2013 IBM Corporation25
IBM Systems and Technology Group
Key: Must define scope of Business Continuity project tightly in order to be successful
Frequency ofOccurrences
Per Year
Consequences (Single Occurrence Loss) in Dollars per Occurrence
1,000
100
10
1
1/10
1/100
1/1,000
1/10,000
1/100,000
Virus
WormsDisk Failure
Component Failure
Power Failure
frequent
infr
equent
lower higher
Natural Disaster
Application Outage
Data Corruption
Network Problem
Building Fire
Terrorism/Civil Unrest
availability-related
recovery-related
Defining Scope is
everything
2. Vulnerability,Risk Assessment,Scope
© 2013 IBM Corporation26
IBM Systems and Technology Group
Define Vulnerabilities (high-level)
NATURE impact Likelihood ranking
PEOPLE impact Likelihood ranking
EQUIP impact Likelihood ranking
Fire Human error….
Applications
Weather, severe storms
Malicious….
Servers
Earthquake
Procedure….
Storage
Water/flood
Network…..
Step 2: Vulnerability, risk
assessment, scope
© 2013 IBM Corporation27
IBM Systems and Technology Group
Define Vulnerabilities (example)
NATURE Impact Likelihood ranking
PEOPLE Impact Likelihood ranking
EQUIP Impact Likelihood ranking
Fire High Low Human error….
Medium High Applications
High Low
Weather, severe storms
High High Malicious….
Medium Low Servers High Low
Earthquake
High Low Procedure….
Medium High Storage High Low
Water/flood
High High Network…..
High Low
Step 2:Vulnerabilities, Risk
Assessment Example
© 2013 IBM Corporation28
IBM Systems and Technology Group
Define scope based on prioritized vulnerabilitiesSet expectation for phased implementation
Example chart at left shows Vulnerability / Risk Assessment:
– Define what will be on the chart
– This defines the scope of the Business Continuity
solution
Divide Scope into implementation phases– Do not try to solve all vulnerabilities at once
– Instead, focus on delivering tangible visible value in each project step
– Portray that scope expands as project progresses
– This matches expenditure with increasing probability over time
riskrisk
risk
risk
6 months12 months18 months
Total Scope
Likelihood
Imp
act risk
risk
risk
riskriskrisk
risk
Risk Assessment
2. Vulnerability,Risk Assessment,Scope
© 2013 IBM Corporation29
IBM Systems and Technology Group
Key Workshop Step 3
1. Collect information for prioritization
2. Vulnerability and risk assessment
3. Define BC targets based on scope
4. Solution Option Design and evaluation
5. Recommended IBM Solutions and Products
6. Recommended strategy and roadmap
© 2013 IBM Corporation30
IBM Systems and Technology Group
Identifying customer’s varying recovery, budget requirements
(near) Continuous Availability, end to end automation
– RTO = near continuous, RPO = small as possible (BC Tier 7)
– Priority = uptime, with high value justification
Mission Critical
Low cost
Rapid Data Recovery– RTO = minutes, to (approx. range): 2 to 6 hours
– BC Tiers 6, 4
– Balanced priorities = Uptime and cost/value
Backup/Restore – (Everyone else)
– 8 hour, 12 hour, 16 hour, 24+ hour recovery
– These are the lower BC Tiers
– Priority = cost
Approximation: numbers of IT shops
© 2013 IBM Corporation31
IBM Systems and Technology Group
Recovery Time Objective (guidelines only)
15 Min. 1-4 Hr.. 4 -8 Hr.. 8-12 Hr.. 12-16 Hr.. 24 Hr.. Days
Co
st
/ Va
lue
BC Tier 4 – Point in Time replication for Backup/Restore
BC Tier 3 – Tape Libraries, Electronic Vaulting
BC Tier 2 - Hot Site, Restore from Tape
BC Tier 7 – Server or Storage replication with end-to-end automated server recovery
BC Tier 6 – Real-time continuous data replication, server or storage
BC Tier 1 – Restore from Tape
Recovery from a disk image Recovery from tape copy
Positioning Recovery Technology by Business Continuity Tiers
Balancing recovery time objective with cost / value
Client objective: balance recovery time and cost justification
BC Tier 5 – Application/database level replication and integration
Remember: In tiers 6 and 7, network costs can be >50% of TCO over 3 years.
© 2013 IBM Corporation32
IBM Systems and Technology Group
Define Business Continuity targets
Business Process
Current Recovery Time:
Success rate %
Budget spent to achieve this
Cost of outage / hour (total $cost avoided)
Target desired Recover Time
Desired success rate %
Projected cost avoidance:
Projected budget
BP1
BP2
BP2
Step 3: Define BC
Targets based on scope
© 2013 IBM Corporation33
IBM Systems and Technology Group
Define BC target example
Business Process
Current Recovery Time:
Success rate %
Budget spent to achieve this
Cost of outage / hour (total $cost avoided)
Target desired Recover Time
Desired success rate %
Projected cost avoidance:
Projected budget
Patient Records
4 hours ??? $100K $200K 30 min 100% ??? ???
Radiology 8 hours ??? $40K $150K 1 hour 100% ??? ???
E-mail 30 min good $10K $20K 15 min 100% ??? ???
Case Study Example
© 2013 IBM Corporation34
IBM Systems and Technology Group
Key Workshop Step 6
1. Collect information for prioritization
2. Vulnerability, risk assessment, scope
3. Define BC targets based on scope
4. Solution option design and evaluation
5. Recommended solutions and products
6. Recommended strategy and roadmap example
© 2013 IBM Corporation35
IBM Systems and Technology Group
Recovery Time Objective
Co
st
Build the Business Resiliency solution “ensembles” Step by Step
SAN SAN
Storage mirroring
Storage mirroring
End to end automated site failover servers, storage, applications (Tier 7)Consolidate and implement real time data mirroring (Tier 6)
Adapt applications, database for replication and automation (Tier 5)Consolidate Point-in-time Copy, disk to disk for backup/restore (Tier 4)
Disk Low-cost Automated
Consolidate electronic vaulting, automation, tape lib (Tier 3)Consolidate and automate tape backup (Tier 2, 1)
ApplicationMirroring
ApplicationMirroring
End to endAutomatedFailover:Server
StorageApplications
Storage mirroring
Storage mirroring Simplified
Shared
Dynamic
Disk AutomatedDisk Automated
5. RecommendSolution
© 2013 IBM Corporation36
IBM Systems and Technology Group
Decision Criteria (suggestions shown)
Protect current investment
Support and integrate with data center strategy
Best meets long term Business Continuity targets
Must be able to do step by step
Economies of scale
– Must apply consolidation, business process segmentation, virtualization, ILM, tiered storage and servers …
– To reduce costs, amount of backup equipment
Satisfy usual criteria
– Budget, timeframe, scalability, performance …..
© 2013 IBM Corporation38
IBM Systems and Technology Group
Real Life example of this methodology
1. Collect information for prioritization
2. Vulnerability, risk assessment, scope
3. Define BC targets based on scope
4. Solution option design and evaluation
5. Recommend solutions and products
6. Recommend strategy and roadmap
© 2013 IBM Corporation39
IBM Systems and Technology Group
Project Timeline
Aug 3 Aug 20 Aug 27 Sep 4 Sep 10 Sep 18 Board
Presentation
Step 1: Collect Info for Prioritization
Step 2: Vulner/Risk/Scope
Step 3: DefineBC (IT D/R targets)
Step 4: IT D/R Arch. Options / Evaluation
Step 5: Discussion on recommendationsBaseline IT D/R Architecture
Step 6: RecommendStrategy and Roadmap
High-level client IT Application and IT Technology Map has been built
High-level client IT Application and IT Technology Map has been built
Business and
IT team
inputs
Data Center strategy will
be applied
Checkpoint
meeting
Checkpoint
meeting
(Sept 18 Task Force meeting)
Next Steps:
D/R Option Cost
Estimation
Next Steps:
D/R Option Cost
Estimation
© 2013 IBM Corporation40
IBM Systems and Technology Group
Strategic Timeline: Today and Ahead
Sep 10 Sep 18 Board Presentation
November
Step 4: IT D/R Arch. Options / Evaluation
Step 5: Recommendations Baseline IT D/R Architecture
Step 6: RecommendStrategy and Roadmap
(Sept 28 Task Force meeting)
Business and
IT team
inputs
Data Center strategy will
be applied
High-level client IT Application and IT Tech Map built
High-level client IT Application and IT Tech Map built
9/18-27/07:
D/R Option Cost Estimation
9/18-27/07:
D/R Option Cost Estimation
Sep 28 Oct 1-15 Oct 16-30
9/28/07:
Discuss D/R Options high level Cost
Estimation (1,3, 7 days)
9/28/07:
Discuss D/R Options high level Cost
Estimation (1,3, 7 days)
10/1-15/07:
Refine, review
Create Board recommendation and presentation
10/1-15/07:
Refine, review
Create Board recommendation and presentation
Sep 21
© 2013 IBM Corporation41
IBM Systems and Technology Group
Recovery Time is a Step by Step journey
Total Elapsed Time (Recovery Time Objective)
15 Min. 1-4 Hr.. 4 -8 Hr.. 8-12 Hr.. 12-16 Hr.. 24 Hr.. 72 hours
Va
lue,
In
ves
tme
nt
DR Tier 4 - Point in Time copies forwarded to remote site
DR Tier 3 - Electronic Vaulting
DR Tier 2 - Hot Site, Restore from Tape
DR Tier 7 – Server and storage mirroring, automated end to end recovery
DR Tier 6 – Real time replication
DR Tier 5 –Transaction integrity, database mirroring
DR Tier 1 – Cold Site, restore from Tape
Recovery from a disk image Recovery from tape copyRecovery Times are rough estimations only
Subject to validation
Definition of successful recovery: All applications within a given BC Tier of recovery are up and running
© 2013 IBM Corporation42
IBM Systems and Technology Group
BC Tier 4
8-12 Hr.. 12-16 Hr.. 24 Hr.. 72 hours
BC Tier 3, hot site, tape restore, full electronic vaulting
BC Tier 2, Hot site, tape restore, some vaulting
BC Tier 1, Cold site, tape restore
Backup
Restore
Definition of successful recovery: all applications within a given BC Tier are up and running
Applied Biosystems — Advancing Science
Three and seven day recovery
Three and seven day recoveryOne day recoveryOne day recovery
Starting Point: must build basic site-wide Disaster Recovery upon a consolidated IT foundation
Recovery Times are rough estimations only
Subject to validation
© 2013 IBM Corporation43
IBM Systems and Technology Group
Costs: In-house vs.Outsourced
TBD Recovery sites ….
Framingham
Foster City
Alameda Pleasan
ton
Austin
Houston
Atlanta
Rockville
Norwalk
Network map is conceptual only
Internal Approach:
1) Facility Build-out (Alternate Data Center Preparation)
- Adequate floor-space, power, cooling, security
2) Redundant Connectivity (primary and alternate sites)
3) Redundant Equipment (Alternate site)
4) Data Replication (From Primary to Alternate site)
5) Additional Staffing (Support Alternate site, testing, etc.)
Vended Approach:
1) Subscription Contract
- Monthly cost / length of contract
2) Redundant Connectivity (Primary and alternate sites)
3) Data Replication (From Primary to alternate site)
Internal Approach:
1) Facility Build-out (Alternate Data Center Preparation)
- Adequate floor-space, power, cooling, security
2) Redundant Connectivity (primary and alternate sites)
3) Redundant Equipment (Alternate site)
4) Data Replication (From Primary to Alternate site)
5) Additional Staffing (Support Alternate site, testing, etc.)
Vended Approach:
1) Subscription Contract
- Monthly cost / length of contract
2) Redundant Connectivity (Primary and alternate sites)
3) Data Replication (From Primary to alternate site)
At 3,7 days: higher cost for same value
At 3,7 days: lower cost for same value
ROT: Internal recovery usually justified
For very fast recoveries (< 1 day)
© 2013 IBM Corporation44
IBM Systems and Technology Group
IT D/R Cost Model validates these projections.Estimated IT D/R monthly run rate:
© 2013 IBM Corporation45
IBM Systems and Technology Group
Recommendation
Board Presentation
Step 6: Recommend D/RStrategy and Roadmap
Oct 11
ReviewRecommendations
ReviewRecommendations
(Oct 11 D/R Task Force mtg)
Data Center Strategy work effort starting
2008 2009
Determine number and locations of sites, workloads, telecom. Integrate with business strategy
Input Disaster Recoveryconsiderations
CalendarYE 2007
BoardPresentation
BoardPresentation
Phase out tactical
IT D/R options
Implement strategicData Center
Consolidation+ D/R Strategy
Data Center Strategy
confirmed
Begin IT D/R project:
1. Begin accelerated IT consolidation now
2. Input requirements to Data Center strategy
3. Select tactical D/R
Oct 16-30
Aware of relationship between D/R and Data Center strategy
3. Recommendation
Implement tactical
IT D/R
© 2013 IBM Corporation46
IBM Systems and Technology Group
IBM continues to provide the most comprehensive suite of IT Business Resiliency solutions to meet customer requirements
IBM is the WW leader in knowledge, expertise, scalability, and implementation of proven Systems and Storage High Availability solutions
IBM provides one stop worldwide support for server, storage, software, networking, services
– Using technology innovations invented at IBM
IBM continues to invest in Server and Storage High Availability and Resiliency
– Providing a world-class complete end to end IBM business continuity solution set that includes:
– IBM Servers– IBM System Storage disk and tape– IBM System Storage tape– IBM Software and middleware– IBM and IBM Business Partner Services
© 2013 IBM Corporation47
IBM Systems and Technology Group
Thank YouThank You
Merci
Grazie
GraciasObrigado
Danke
Japanese
Hebrew
English
French
Russian
German
Italian
Spanish
Brazilian Portuguese
Arabic
Traditional Chinese
Simplified Chinese
Hindi
Tamil Korean
Thai
TesekkurlerTurkish
© 2013 IBM Corporation49
IBM Systems and Technology Group
Your Next Steps for IT Business Continuity
Integrate IT Business Continuity into your IT Data Simplification Strategy….
– Infrastructure Simplification is the pre-requisite and co-requisite
– To enable the change to happen and be justified
Integrate and sell Infrastructure Simplification with IT Business Continuity a intended by-product
Build Business Continuity Targets and Scope
riskrisk
risk
risk
6 months12 months18 months
Total Scope
Likelihood
Imp
act risk
risk
risk
riskriskrisk
risk
Risk Assessment
© 2013 IBM Corporation50
IBM Systems and Technology Group
Architect an end-to-end IT Business Continuity solution design
– However, do not try to do it all at once
Plan for step-by-step incremental IT Business Continuity project
– Start with where you are today and build upward
– Incrementally build towards the final objective
– Each phase builds necessary foundation for the next step
IT Business Continuity is intended by-product of IT Simplification
Backup /Restore
RapidData
Recovery
ContinuousAvailability
Foundation:SAN and server
consolidationInfrastructure Simplification
Your Next Steps for IT Business Continuity
© 2013 IBM Corporation51
IBM Systems and Technology Group
For more IBM Business Resiliency solution help:
Your local geography System Architects
Your local geography brand specialists with a specialty in IT High Availability
IBM Business Partners with a specialty in IT High Availability
IBM Global Services – Business Continuity and Recovery Services
WW Technical Marketing Support – Pete Potosky team
– http://snjgsa.ibm.com/~singj
© 2013 IBM Corporation52
IBM Systems and Technology Group
The optimum Business Resiliency sales approach for today’s IT world is:– Up-level existing:
• IT Data Center Strategy and IT Infrastructure Simplification – To produce IT Business Resiliency as an intended by-product
The recoverable unit is the Business Process– Not just the server, storage, or network
Learning Points
Application 1
Application 3Analytics
report
managementreports
http://xyz.xml
decisionpoint
MQseries
WebSphere
Application 2
SQL
db2
Businessprocess A
Businessprocess B
Businessprocess C
Businessprocess D
Businessprocess E
Businessprocess F
Businessprocess G
Tech
nic
al
Ap
pli
cati
on
Bu
sin
ess
1. An error occurs on a storage device that correspondingly corrupts a database
2. The error impacts the ability of two or more applications to share critical data
3. The loss of both applications affects two distinctly different business processes
IT Business Continuity focus has shifted to business processrecovery
© 2013 IBM Corporation53
IBM Systems and Technology Group
Recovery Time Objective is:
– How long can I afford to be without my systems and business-critical applications?
Recovery Point Objective is:
– How much data can I afford to recreate (or lose)?
• Denotes the time interval between outage and when last good copy of data was made
• Applications may be down until some/all of data recreated.
Network Recovery Objective is:
– How long does it take me to switch over my network?
Learning Points
Sync.Replication
Async.Replication
Tape Backup
Tape Restore
Clustering
OnlineRestore
Remote Replication
SecsMinsHrsDays Wks Secs Mins Hrs Days Wks
Recovery PointRecovery Point Recovery TimeRecovery Time
RPO RTO NRO
© 2013 IBM Corporation54
IBM Systems and Technology Group
The Business Objectives for BC/DR are to create an optimal balance between: – Risk: What is the probability of a particular type of disaster
happening?– Impact: What is the effect on the business if a particular
disaster occurred?– Cost: What must be done to avoid or recover from
particular disaster?
The real obstacles to selling IT Business Resiliency solutions are:– Customer has too many other pain points that are more
certain to happen. Compounded by: • Lack of skills, lack of support from Line of Business, undefined
ownership• Lack of prioritization, lack of knowledge business processes,
interdependencies• Business Resiliency has “too wide of a span” for IT to control• Difficult to get consensus on the right directions• Don’t know where to start
Learning Points
Risk
Imp
act
Cost
© 2013 IBM Corporation55
IBM Systems and Technology Group
Learning Points
Divide IT Business Resiliency project’s scope into implementation phases
– Do not try to solve all vulnerabilities at once
– Scope can expand as phases progress
– Matches expenditure with increasing probability over time
Three ranges of customer recovery / budget – (Near) Continuous Availability, end to end automation
• Priority = uptime, with high value justification– Rapid Data Recovery
• Balanced priorities = Uptime and cost/value– Backup/Restore
• Priority = cost
riskrisk
risk
risk
6 months12 months18 months
Total Scope
© 2013 IBM Corporation56
IBM Systems and Technology Group
Learning Points
The six streamlined IT Business Resiliency Planning steps are:
1. Collect information for prioritization
2. Vulnerability, risk assessment, scope
3. Define BC targets based on scope
4. Solution option design and evaluation
5. Recommend solutions and products
6. Recommend strategy and roadmap
These are the essence of the “ideal” Business Resiliency planning cycle.
© 2013 IBM Corporation57
IBM Systems and Technology Group
Learning Points
Build the solution Step by Step:
– The Backup/Restore tier is a foundation for all that follows
– Step by step approach provides ability to deliver tangible IT Business Resiliency value immediately, and at every step of the project
– Provides a customer expectation and a roadmap that is easily understood
SAN SAN
Storage mirroring
Storage mirroring
Disk Low-cost Automated
ApplicationMirroring
ApplicationMirroring
End to endAutomatedFailover:Server
StorageApplications
Storage mirroring
Storage mirroring
Simplified
Shared
Dynamic
Disk AutomatedDisk Automated
© 2013 IBM Corporation58
IBM Systems and Technology Group
Learning PointsThe IBM and IBM Business Partner Value Proposition for Business Continuity is:
IBM and IBM Business Partners provides • Services and solutions to help you identify and fill gaps in your current continuity strategy and
to design, develop, and manage a program aligned to your risk tolerance and business needs. • Solutions to help you assess and prioritize your data in light of business and regulatory
requirements and then can develop and implement a plan and infrastructure based on your priorities
• Solutions that help you assess, plan for, create, and run an infrastructure that supports the ongoing availability and performance objectives of your business.
• Solutions to help you address common gaps in your disaster/crisis planning and respond more effectively to disruptive events.
That deliver the following benefits: • A comprehensive business continuity plan aligned to your risk tolerance and business
objectives.• Build business value through improved levels of service availability to eco-system • Minimize the cost of downtime and recovery• Credibility and trust that you can transfer to your customers, partners and shareholders • Disciplined, tested methodologies that address all aspects of your business• Unparalleled brand protection
© 2013 IBM Corporation59
IBM Systems and Technology Group
59 Apr 19, 2023
TrademarksThe following are trademarks of the International Business Machines Corporation in the United States, other countries, or both.
The following are trademarks or registered trademarks of other companies.
* All other products may be trademarks or registered trademarks of their respective companies.
Notes: Performance is in Internal Throughput Rate (ITR) ratio based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput improvements equivalent to the performance ratios stated here. IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply.All customer examples cited or described in this presentation are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics will vary depending on individual customer configurations and conditions.This publication was produced in the United States. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to change without notice. Consult your local IBM business contact for information on the product or services available in your area.All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.Information about non-IBM products is obtained from the manufacturers of those products or their published announcements. IBM has not tested those products and cannot confirm the performance, compatibility, or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.Prices subject to change without notice. Contact your IBM representative or Business Partner for the most current pricing in your geography.
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries.Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license therefrom. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.UNIX is a registered trademark of The Open Group in the United States and other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. ITIL is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office.IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency, which is now part of the Office of Government Commerce.
For a complete list of IBM Trademarks, see www.ibm.com/legal/copytrade.shtml:
*, AS/400®, e business(logo)®, DBE, ESCO, eServer, FICON, IBM®, IBM (logo)®, iSeries®, MVS, OS/390®, pSeries®, RS/6000®, S/30, VM/ESA®, VSE/ESA, WebSphere®, xSeries®, z/OS®, zSeries®, z/VM®, System i, System i5, System p, System p5, System x, System z, System z9®, BladeCenter®
Not all common law marks used by IBM are listed on this page. Failure of a mark to appear does not mean that IBM does not use the mark nor does it mean that the product is not actively marketed or is not significant within its relevant market.
Those trademarks followed by ® are registered trademarks of IBM in the United States; all others are trademarks or common law marks of IBM in the United States.
© 2013 IBM Corporation60
IBM Systems and Technology Group
IBM System Storage & ServicesIntelligent Management. Protected Information. Smarter Insights.
60
Business Continuity Productivity Center for Replication Basic Hyperswap for System z Advanced copy services Tivoli Storage Manager (TSM) family Tivoli Continuous Data Protection (CDP) Tape cluster grids and Peer-to-Peer GDOC, GDPS
Lifecycle and Retention DR550 archive and compliance storage Grid Access Manager, GMAS TSM Space Management for Unix/Windows GPFS, DFSMS, SOFS N series with SnapLock™ WORM tape support
Infrastructure Management TotalStorage Productivity Center SAN Fabric Management software Tivoli Provisioning Manager Tivoli Storage Process Manager IBM Systems Director family
Disk Systems SAN Volume Controller DS family N series
Tape Systems TS family of drives,
libraries and virtualization
Storage Networking
Switches Directors Routers
Storage Services Consulting Assessments Design Deployment Outsourcing Hosting
For more information: http://www.ibm.com/systems/storage
© 2013 IBM Corporation61
IBM Systems and Technology Group
Products supported with standardized storage implementation services
61
Highlights
- Fixed-price and fixed-scope implementation and migration services for key IBM storage products
- Includes services for disk and tape systems, storage software and Network Attached Storage systems
- Applies expert-level skills, methods, guidance and project management techniques to improve the quality of client implementation or migration
- Helps organizations more quickly realize value and ROI from their storage products by speeding the implementation or migration
- Basic skills instructions included with implementation services for designated client personnel
- …can help Customers plan, implement, configure and test or migrate to storage-related hardware or software…..
IBM Storage and Data Product Implementation Services IBM Implementation Services for disk systems
- IBM Implementation Services for disk systems - DS4000/DS6000/DS8000- IBM Implementation Services for disk systems – IBM System Storage – DR550
IBM Implementation Services for storage software - IBM Implementation Services for storage software – TPC SE- IBM Implementation Services for storage software – TPC for Replication- IBM Implementation Services for storage software - copy function for Global
Mirror/Metro Mirror- IBM Implementation Services for storage software - copy function for Flashcopy- IBM Implementation Services for storage software – San Volume Controller- IBM Implementation Services for storage software – San Volume Controller Global
Mirror- IBM Implementation Services for storage software – SAN Fabric Components- IBM Implementation Services for storage software - Tivoli Storage Manager - IBM Implementation Services for storage software - Tivoli Storage Manager
Extended Edition- IBM Implementation Services for storage software - Tivoli Storage Manager for
Databases- IBM Implementation Services for storage software - Tivoli Storage Manager for
Advanced Copy Services- IBM Implementation Services for storage software - Tivoli Storage Manager for Mail- IBM Implementation Services for storage software – Tivoli Storage Manager for
Storage Area Networks (SAN)
© 2013 IBM Corporation62
IBM Systems and Technology Group
Products supported with standardized storage implementation or migration services
62
Highlights
- Fixed-price and fixed-scope implementation and migration services for key IBM storage products
- Includes services for disk and tape systems, storage software and Network Attached Storage systems
- Applies expert-level skills, methods, guidance and project management techniques to improve the quality of client implementation or migration
- Helps organizations more quickly realize value and ROI from their storage products by speeding the implementation or migration
- Basic skills instructions included with implementation services for designated client personnel
- …can help Customers plan, implement, configure and test or migrate to storage-related hardware or software…..
IBM Storage and Data Product Implementation Services IBM Implementation Services for tape systems
- IBM Implementation Services for tape – tape encryption and key management- IBM Implementation Services for tape – IBM Virtualization Engine TS7500 - IBM Implementation Services for tape – IBM Virtualization Engine TS7700- IBM Implementation Services for tape – for TS3500 Tape Library- IBM Implementation Services for tape - 3583 Ultrium Scalable Tape Library- IBM Implementation Services for tape - for Virtual Tape Server peer-to-peer- IBM Implementation Services for tape - LTO Tape - IBM Implementation Services for tape - virtual tape server advanced policy Mgmt
IBM Implementation Services for Network Attached Storage - Implementation Services for System Storage N series – N3000/N5000/N7000 - Implementation Services for System Storage N series – N5000/N7000 gateway
(front-end and backend)
IBM Migration Services for data - IBM Migration Services for data - system z data- IBM Migration Services for open systems attached IBM storage servers
IBM Migration Services for Network Attached Storage - IBM Migration Services for Network Attached Storage – N series
IBM Migration Services for tape systems - IBM Migration Services for tape – Bxx and TS77xx data migration- IBM Migration Services for tape - Virtual Tape Server for Static Data
© 2013 IBM Corporation63
IBM Systems and Technology Group
IBM Global Services Business Continuity and Recovery Services worldwide: 154 recovery centers in 55 countries
413 instances of open-systems support
(IBM, Sun, Cisco, HP and more)
76,972 enterprise server MIPS
716 enterprise server terabytes
441 IBM System p™ servers
352 IBM System i™ servers
2,063 SP2 nodes and Wintel servers
5,000,000 square feet of equipped floor space for workplace replacement
40,000 seats
© 2013 IBM Corporation64
IBM Systems and Technology Group
Done?
?
Timeline of an IT Recovery ====>
Production ☺ Network Staff
Operations StaffOperations Staff
Data
Operating System
Physical Facilities
Telecom Network
Management Control
Execute hardware, operating system, and data integrity recovery
AssessRPO
Application transactionintegrity recovery
Applications
Now we're done!
Applications Staff
Recovery Time Objective (RTO)of transaction integrity
Recovery Time Objective (RTO)of hardware data integrity
Recovery Point Objective
(RPO)
How much datamust be
recreated?
Outage!
RPO
Network Recovery Objective:How long before network
Is operational?
Server or storage mirroring provides a point in time, data consistent copy of data at the remote site.
© 2013 IBM Corporation65
IBM Systems and Technology Group
In-house Data Center - Before
IBM System z
Current coreapplications.
HP Alpha ES47, HP/UX, IDX, PACS, interface engines, Cardiology, CCA lab, pharmacy, radiology, etc
pSeriesEPIC
Wintel – 110 servers and
growing
LAN/WAN
ATM, Ethernet
EMC 85302TB usable
1.5 TB, .5 TB, 2 TB, 2 TB, 4 TB, 3 TB, 24 TB ..Various softwares including Veritas Volume Manager, TSM, LTO,
IBM Tape Library, DLT, ArcServe, etc.
MS Exchange, Oracle, web servers, Etc.
…….
© 2013 IBM Corporation66
IBM Systems and Technology Group
New IT Simplified configuration – provides <1 day recovery
IBM System z:
Current core
applic
IBM DS80002TB usable
pSeriesEPIC
1.5 TB, .5 TB, 2 TB, 2 TB, 4 TB, 3 TB, 24 TB ..Consolidation: Veritas Volume Manager, TSM, LTO,
IBM Tape Library, etc.
VMWARE for MS Exchange, Oracle, web servers, Etc.
…….
Storage for MS Exchange, Oracle, web servers, etc.
SANCONSOLIDATE: SAN Volume Controller(s)
HP Alpha ES47, HP/UX, IDX, PACS, interface engines, Cardiology, CCA lab, pharmacy, radiology, etc
ATM, Ethernet
LAN/WAN
IBM DS60002TB usable
Primary data center
pSeriesEPIC
1.5 TB, .5 TB, 2 TB, 2 TB, 4 TB, 3 TB, 24 TB ..Consolidation: Veritas Volume Manager, TSM,
LTO, IBM Tape Library, etc.
VMWARE for MS Exchange, Oracle, web servers, Etc.
Consolidated storage for MS Exchange, Oracle, web servers, etc.
SAN
SAN Volume Controller(s)
Consolidation: HP Alpha ES47, HP/UX, IDX, PACS, interface engines, Cardiology, CCA lab, pharmacy, radiology, etc
ATM, Ethernet
LAN/WAN
Secondary data center