© 2013 ibm corporation ibm systems and technology planning for it business continuity in a...

66
© 2013 IBM Corporation IBM Systems and Technology Planning for IT Business Continuity in a Heterogeneous World John Sing Senior Consultant IBM Systems and Technology Group [email protected]

Upload: brook-hunt

Post on 26-Dec-2015

216 views

Category:

Documents


2 download

TRANSCRIPT

© 2013 IBM Corporation

IBM Systems and Technology

Planning for IT BusinessContinuity in a Heterogeneous World

John Sing Senior ConsultantIBM Systems and Technology [email protected]

© 2013 IBM Corporation2

IBM Systems and Technology Group

2

John Sing 31 years of experience with IBM in high end servers, storage, and

software– 2009 - Present: IBM Executive Strategy Consultant: IT Strategy and Planning, Enterprise Large

Scale Storage, Internet Scale Workloads and Data Center Design, Big Data Analytics, HA/DR/BC– 2002-2008: IBM IT Data Center Strategy, Large Scale Systems, Business Continuity, HA/DR/BC,

IBM Storage– 1998-2001: IBM Storage Subsystems Group - Enterprise Storage Server Marketing Manager,

Planner for ESS Copy Services (FlashCopy, PPRC, XRC, Metro Mirror, Global Mirror) – 1994-1998: IBM Hong Kong, IBM China Marketing Specialist for High-End Storage– 1989-1994: IBM USA Systems Center Specialist for High-End S/390 processors– 1982-1989: IBM USA Marketing Specialist for S/370, S/390 customers (including VSE and

VSE/ESA)

[email protected]

IBM colleagues may access my intranet webpage:

– http://snjgsa.ibm.com/~singj/

You may follow my daily IT research blog

– http://www.delicious.com/atsf_arizona

You may follow me on Slideshare.net:

– http://www.slideshare.net/johnsing1

My LinkedIn:

– http://www.linkedin.com/in/johnsing

© 2013 IBM Corporation3

IBM Systems and Technology Group

Explain the process for planning effective, consistent, reliable IT BC/DR in today's highly diverse IT environments by:

– Describe best practices for Justifying IT Business Continuity to the Business

– Describing the six key steps in the customer BC/DR Planning process

Illustrate this Planning process to a client by:

– Outlining a pragmatic step by step, fill-in-the-blanks template, cookbook methodology for implementing these six key steps

– Describing a real-life example IT BC/DR project overview and summary

– Describe key guidelines and rules of thumb for when to choose outsourced D/R and when to choose in-house

Goal: get you started Now! in your customer

– So you can do build the BC proposal that will win!

Session Objectives

At the conclusion of this activity, participants should be able to :

© 2013 IBM Corporation4

IBM Systems and Technology Group

SettingLecture Expectations:

We will give guidelines and generate better understanding

In 75 minutes, not possible to provide answers that can fit all IT Business

Continuity marketing situations

© 2013 IBM Corporation5

IBM Systems and Technology Group

Justifying Business Continuity to the Business

© 2013 IBM Corporation6

IBM Systems and Technology Group

Application 1Application 3Analytics

report

managementreports

http://xyz.xml

decisionpoint

MQseries

WebSphere

Application 2

SQL

db2

Businessprocess A

Businessprocess B

Businessprocess C

Businessprocess D

Businessprocess E

Businessprocess F

Businessprocess G

Tech

nic

al

Ap

plicati

on

Bu

sin

ess

1. An error occurs on a storage device that correspondingly corrupts a database

2. The error impacts the ability of two or more applications to share critical data

3. The loss of both applications affects two distinctly different business processes

IT Business Continuity focus has shifted to business processrecovery

Complexity: the Business Process has become the IT Recoverable Unit

© 2013 IBM Corporation7

IBM Systems and Technology Group

The business needs to balance Risk vs. Impact vs. Cost

Risk – What is the probability of a particular type

of disaster happening? Fire / Flood / Power Failure / Natural disaster• High: only a matter of time.• Medium: 50% - 50% - a flip of a coin.• Low: unlikely within (say) ten years.

Impact – What is the effect on the business if a particular disaster

occurred?• High / Catastrophic: Complete business failure.• Medium / High: Loss of revenue.• Low: Minimal loss of revenue however some recovery actions are

required.

Cost – What must be done to avoid or recover from

particular disaster?• High: significant impact to the organization’s budgets and

earnings.• Medium: significant but manageable within normal operating

expenses.• Low: containable within one or several departmental budgets.

Risk

Impa

ct

Cost

© 2013 IBM Corporation8

IBM Systems and Technology Group

Integration into IT ManageBusiness Prioritization

StrategyDesign

riskassessment

businessimpactanalysis

Risks,

Vulnerabilities

and Threats

programassessment

Impacts

of

Outage

RTO/RPO

•Maturity Model

•Measure ROI

•Roadmap for Program

ProgramDesign

Current

Capability

Implement programvalidation

Estimated

Recovery Tim

e

ResilienceProgram

Management

Awareness, Regular Validation, Change Management, Quarterly Management Briefings

Business processes drive strategies and they are integral to the Continuity of Business Operations. A company cannot be resilient without having strategies for alternate workspace, staff members, call centers and communications channels.

crisis team

businessresumption

disasterrecovery

highavailability

1. People2. Processes3. Plans4. Strategies5. Networks6. Platforms7. Facilities

Database andSoftware design

High Availability Servers

Data Replication

high availabilitydesign

Source: IBM Global Services

Quantifying Risk vs. Impact vs. Cost in a “perfect” world: ”Ideal” IT Business Resiliency Process

© 2013 IBM Corporation9

IBM Systems and Technology Group

Why is IT Business Continuity often too “low” on the priority list?

Perceptions and reasons why BC Planning is often behind:

– “Difficult, complex, time consuming”

– Budget, cost, time, resources constraint

– Lack of skills

– Lack of support from Line of Business

– Undefined ownership

– Lack of prioritization

– Lack of knowledge business processes, interdependencies

– BC has “too wide of a span” for IT to control

– Don’t know where to start

– Needed information hard to come by

– Difficult to get consensus on the right directions

© 2013 IBM Corporation10

IBM Systems and Technology Group

So how do we solve?

What will work in today’s Heterogeneous IT World?

Answer:

Must integrate IT BC/DR into IT Simplification

© 2013 IBM Corporation11

IBM Systems and Technology Group

TrueCluster

UFSSun Cluster

PolyServe

MSCS

PPRC

ASMZFS

SecurePath

InstantImage

MPxIO

JFS

LVM

TrueCopy

JFS2

HDLM

SVM Ext3

MPIO

LDM

PowerPath

TimeFinderShadowCopy

SAM FS

QFSSDS

MirrorDisk-UX

SnapView

MirrorView

SRDF

OCFSSAN-FS

ReiserFSGPFS

Snap RepliStor

ServiceGuard

Data Replication Manager

EVM

SVC

FlashCopy

HACMP

GeoSpan

SAN Copy

DLM

ShadowImage

SnapShotDoubleTake

ClusterFrame

SNDR

QFSTOOLS

SHOWN:

0102030405060708091011121314151617181920212223242526272829303132333435363738394041424344454647484950+

Start by getting buy-in that IT BC/DR starts with ……

IT Consolidation and Simplification

© 2013 IBM Corporation12

IBM Systems and Technology Group

Placeholder for ‘cables’ chart

© 2013 IBM Corporation13

IBM Systems and Technology Group

Start with Strategic Infrastructure

Simplification / Consolidation

Provides Compelling IT Value to address Strategic Business Issues

Solve the Enterprise Business Issues and IT issues at the same time

Fewer Components to Recover

Percentage of Savings

Invest in more robust Business Continuance

Standardize and optimize IT and Business Resiliency solution design:

Load Balancing

Solution architecture

IT Business Continuity is an intended byproduct of IT Simplification

This is best practice for IT Business Continuity justification to the Business

Up-level existing IT Simplification to produce IT BC as intended by-product

Improve Business Continuity

© 2013 IBM Corporation14

IBM Systems and Technology Group

1. SimplifiedNew Economics

2. SharedRapid Deployment

3. DynamicBusiness Goal Driven

Physical consolidation and optimization

Virtualization of individual systems

Systems, network and energy management

Start with lower BC Tiers, build upwards

Highly virtualized resource pools – “ensembles”

Integrated IT service management

Move to more advanced replication

Virtualization of IT service

Business-driven automated service management

Service oriented delivery of IT

Stages of Adoption for IT Business Resiliency

© 2013 IBM Corporation15

IBM Systems and Technology Group

The Six key steps to IT Business Continuity

in today’s iPod / Blackberry world

………………………………………..……Swoosh!!!!

© 2013 IBM Corporation16

IBM Systems and Technology Group

Here’s how to handle: use the six key IT Business Continuity Planning Steps

For today’s real world environment

Integration into IT ManageBusiness Prioritization

StrategyDesign

riskassessment

businessimpactanalysis

Risks,

Vulnerabilities

and Threats

programassessment

Impacts

of

Outage

RTO/RPO

• Maturity Model

• Measure ROI

• Roadmap for Program

ProgramDesign

Current

Capability

Implement programvalidation

Estimated

Recovery Tim

e

ResilienceProgram

Management

Awareness, Regular Validation, Change Management, Quarterly Management Briefings

crisis team

businessresumption

disasterrecovery

highavailability

1. People2. Processes3. Plans4. Strategies5. Networks6. Platforms7. Facilities

Database andSoftware design

High Availability Servers

Data Replication

high availabilitydesign

i.e. how to streamline this “ideal” process?1. Collect information for prioritization

2. Vulnerability, risk assessment, scope

3. Define BC targets based on scope

4. Solution option design and evaluation

5. Recommend solutions and products

6. Recommend strategy and roadmap

4. Solution option design and evaluation

5. Recommend solutions and products

6. Recommend strategy and roadmap

Most IT personnel

can do this, If given proper

requirements

We’llFocushere

We’llFocushere

© 2013 IBM Corporation17

IBM Systems and Technology Group

Key Workshop Step 1

1. Collect information for prioritization

2. Vulnerability, risk assessment, scope

3. Define BC targets based on scope

4. Solution option design and evaluation

5. Recommended solutions and products

6. Recommended strategy and roadmap

© 2013 IBM Corporation18

IBM Systems and Technology Group

Key IT Business Continuity Requirements Questions (in proper order):

1. What applications or databases to recover?

2. What platform? (z, p, i, x and Windows, Linux, heterogeneous open, heterogeneous z+Open)

3. What is desired Recovery Time Objective (RTO)?

4. What is distance between the sites? (if there are 2 sites)

5. What is the connectivity, infrastructure, and bandwidth between sites?

7. What is the Level of Recovery?- Planned Outage- Unplanned Outage- Transaction Integrity

8. What is the Recovery Point Objective?

9. What is the amount of data to be recovered (in GB or TB)?

10. Who will design the solution?

11. Who will implement the solution?

12. Remaining solutions are valid choices to give to detailed DR evaluation team

6. What are the specific h/w equipment(s) that needs to be recovered?

Tier 4Tier 3

Tier 2

Tier 7Tier 6

Tier 5

Tier 1

© 2013 IBM Corporation19

IBM Systems and Technology Group

First step: inventory of applications:

1) Identify priority applications

2) Hi-level segment at this stage OK.

• Use scope that is achievable

• Example: 1 day recovery, 3 day recovery

Start by collecting what applications need to be recovered

Step 1: Collect Info for

Prioritization

© 2013 IBM Corporation20

IBM Systems and Technology Group

Example application list (extract)

© 2013 IBM Corporation21

IBM Systems and Technology Group

Inventory of environment information to be collected:

1) Identify priority applications

2) Hi-level segment at this stage OK. Use scope that is achievable

– Example: 1 day recovery, 3 day recovery

Map the applications to their associated IT components:

1) Data and data management pools

2) Databases

3) Hardware infrastructure (server, storage)

4) Network (LAN, WAN)

5) Procedures and tools

6) People

7) Facilities and locations

8) If known, Estimated cost of outage, per hour

9) If known, document priority vulnerabilities

Component Inventory information to be collected, mapped by business process

Step 1: Collect Info for

Prioritization

© 2013 IBM Corporation22

IBM Systems and Technology Group

Scope – IT Resources and Business Processes

Component Business process 1 Business process 2 Business process 3

Applications

Data and data management policies

Databases

Servers

Storage

Network (LAN, WAN)

Procedures and tools

People

Facilities and physical location

Known vulnerabilities

Estimated cost of outage , per hour

Business Impact

Ranking

Step 1: Collect info for prioritization

© 2013 IBM Corporation23

IBM Systems and Technology Group

Scope – IT Resources and Business Processes

Component Patient Records Radiology E-mail

Applications PR1 EPIC1, PR1 MSE1, MSE2

Data and data management policies

Backup daily at night by TSM

Backup daily by Veritas Backup daily by MSM

Databases DB2 Oracle, DB2 MSSQL1

Servers Mainframe1 UNIX1, Mainframe1 MS222, MS223, MS224

Storage 33801, 33802 SUN101 MSS1, MSS2

Network (LAN, WAN) SLAN1 and SLAN2 SLAN2 and SLAN3 LAN2, LAN3

Procedures and tools Data Center M1 Data Center M1, M2 Data Center M3

People J1, J2 M1, J1 K1, K2

Facilities and physical location

DC1 DC1 DC1

Known vulnerabilities Flood Flood Flood, servers

Estimated cost of outage , per hour

$200K* $150K* $20K*

Business Impact High High Medium

Ranking 1 2 3

Case Study Example

© 2013 IBM Corporation24

IBM Systems and Technology Group

Key Workshop Step 2

1. Collect information for prioritization

2. Vulnerability, risk assessment, scope

3. Define BC targets based on scope

4. Solution option design and evaluation

5. Recommended solutions and products

6. Recommended strategy and roadmap

© 2013 IBM Corporation25

IBM Systems and Technology Group

Key: Must define scope of Business Continuity project tightly in order to be successful

Frequency ofOccurrences

Per Year

Consequences (Single Occurrence Loss) in Dollars per Occurrence

1,000

100

10

1

1/10

1/100

1/1,000

1/10,000

1/100,000

Virus

WormsDisk Failure

Component Failure

Power Failure

frequent

infr

equent

lower higher

Natural Disaster

Application Outage

Data Corruption

Network Problem

Building Fire

Terrorism/Civil Unrest

availability-related

recovery-related

Defining Scope is

everything

2. Vulnerability,Risk Assessment,Scope

© 2013 IBM Corporation26

IBM Systems and Technology Group

Define Vulnerabilities (high-level)

NATURE impact Likelihood ranking

PEOPLE impact Likelihood ranking

EQUIP impact Likelihood ranking

Fire Human error….

Applications

Weather, severe storms

Malicious….

Servers

Earthquake

Procedure….

Storage

Water/flood

Network…..

Step 2: Vulnerability, risk

assessment, scope

© 2013 IBM Corporation27

IBM Systems and Technology Group

Define Vulnerabilities (example)

NATURE Impact Likelihood ranking

PEOPLE Impact Likelihood ranking

EQUIP Impact Likelihood ranking

Fire High Low Human error….

Medium High Applications

High Low

Weather, severe storms

High High Malicious….

Medium Low Servers High Low

Earthquake

High Low Procedure….

Medium High Storage High Low

Water/flood

High High Network…..

High Low

Step 2:Vulnerabilities, Risk

Assessment Example

© 2013 IBM Corporation28

IBM Systems and Technology Group

Define scope based on prioritized vulnerabilitiesSet expectation for phased implementation

Example chart at left shows Vulnerability / Risk Assessment:

– Define what will be on the chart

– This defines the scope of the Business Continuity

solution

Divide Scope into implementation phases– Do not try to solve all vulnerabilities at once

– Instead, focus on delivering tangible visible value in each project step

– Portray that scope expands as project progresses

– This matches expenditure with increasing probability over time

riskrisk

risk

risk

6 months12 months18 months

Total Scope

Likelihood

Imp

act risk

risk

risk

riskriskrisk

risk

Risk Assessment

2. Vulnerability,Risk Assessment,Scope

© 2013 IBM Corporation29

IBM Systems and Technology Group

Key Workshop Step 3

1. Collect information for prioritization

2. Vulnerability and risk assessment

3. Define BC targets based on scope

4. Solution Option Design and evaluation

5. Recommended IBM Solutions and Products

6. Recommended strategy and roadmap

© 2013 IBM Corporation30

IBM Systems and Technology Group

Identifying customer’s varying recovery, budget requirements

(near) Continuous Availability, end to end automation

– RTO = near continuous, RPO = small as possible (BC Tier 7)

– Priority = uptime, with high value justification

Mission Critical

Low cost

Rapid Data Recovery– RTO = minutes, to (approx. range): 2 to 6 hours

– BC Tiers 6, 4

– Balanced priorities = Uptime and cost/value

Backup/Restore – (Everyone else)

– 8 hour, 12 hour, 16 hour, 24+ hour recovery

– These are the lower BC Tiers

– Priority = cost

Approximation: numbers of IT shops

© 2013 IBM Corporation31

IBM Systems and Technology Group

Recovery Time Objective (guidelines only)

15 Min. 1-4 Hr.. 4 -8 Hr.. 8-12 Hr.. 12-16 Hr.. 24 Hr.. Days

Co

st

/ Va

lue

BC Tier 4 – Point in Time replication for Backup/Restore

BC Tier 3 – Tape Libraries, Electronic Vaulting

BC Tier 2 - Hot Site, Restore from Tape

BC Tier 7 – Server or Storage replication with end-to-end automated server recovery

BC Tier 6 – Real-time continuous data replication, server or storage

BC Tier 1 – Restore from Tape

Recovery from a disk image Recovery from tape copy

Positioning Recovery Technology by Business Continuity Tiers

Balancing recovery time objective with cost / value

Client objective: balance recovery time and cost justification

BC Tier 5 – Application/database level replication and integration

Remember: In tiers 6 and 7, network costs can be >50% of TCO over 3 years.

© 2013 IBM Corporation32

IBM Systems and Technology Group

Define Business Continuity targets

Business Process

Current Recovery Time:

Success rate %

Budget spent to achieve this

Cost of outage / hour (total $cost avoided)

Target desired Recover Time

Desired success rate %

Projected cost avoidance:

Projected budget

BP1

BP2

BP2

Step 3: Define BC

Targets based on scope

© 2013 IBM Corporation33

IBM Systems and Technology Group

Define BC target example

Business Process

Current Recovery Time:

Success rate %

Budget spent to achieve this

Cost of outage / hour (total $cost avoided)

Target desired Recover Time

Desired success rate %

Projected cost avoidance:

Projected budget

Patient Records

4 hours ??? $100K $200K 30 min 100% ??? ???

Radiology 8 hours ??? $40K $150K 1 hour 100% ??? ???

E-mail 30 min good $10K $20K 15 min 100% ??? ???

Case Study Example

© 2013 IBM Corporation34

IBM Systems and Technology Group

Key Workshop Step 6

1. Collect information for prioritization

2. Vulnerability, risk assessment, scope

3. Define BC targets based on scope

4. Solution option design and evaluation

5. Recommended solutions and products

6. Recommended strategy and roadmap example

© 2013 IBM Corporation35

IBM Systems and Technology Group

Recovery Time Objective

Co

st

Build the Business Resiliency solution “ensembles” Step by Step

SAN SAN

Storage mirroring

Storage mirroring

End to end automated site failover servers, storage, applications (Tier 7)Consolidate and implement real time data mirroring (Tier 6)

Adapt applications, database for replication and automation (Tier 5)Consolidate Point-in-time Copy, disk to disk for backup/restore (Tier 4)

Disk Low-cost Automated

Consolidate electronic vaulting, automation, tape lib (Tier 3)Consolidate and automate tape backup (Tier 2, 1)

ApplicationMirroring

ApplicationMirroring

End to endAutomatedFailover:Server

StorageApplications

Storage mirroring

Storage mirroring Simplified

Shared

Dynamic

Disk AutomatedDisk Automated

5. RecommendSolution

© 2013 IBM Corporation36

IBM Systems and Technology Group

Decision Criteria (suggestions shown)

Protect current investment

Support and integrate with data center strategy

Best meets long term Business Continuity targets

Must be able to do step by step

Economies of scale

– Must apply consolidation, business process segmentation, virtualization, ILM, tiered storage and servers …

– To reduce costs, amount of backup equipment

Satisfy usual criteria

– Budget, timeframe, scalability, performance …..

© 2013 IBM Corporation37

IBM Systems and Technology Group

Actual Project Example

© 2013 IBM Corporation38

IBM Systems and Technology Group

Real Life example of this methodology

1. Collect information for prioritization

2. Vulnerability, risk assessment, scope

3. Define BC targets based on scope

4. Solution option design and evaluation

5. Recommend solutions and products

6. Recommend strategy and roadmap

© 2013 IBM Corporation39

IBM Systems and Technology Group

Project Timeline

Aug 3 Aug 20 Aug 27 Sep 4 Sep 10 Sep 18 Board

Presentation

Step 1: Collect Info for Prioritization

Step 2: Vulner/Risk/Scope

Step 3: DefineBC (IT D/R targets)

Step 4: IT D/R Arch. Options / Evaluation

Step 5: Discussion on recommendationsBaseline IT D/R Architecture

Step 6: RecommendStrategy and Roadmap

High-level client IT Application and IT Technology Map has been built

High-level client IT Application and IT Technology Map has been built

Business and

IT team

inputs

Data Center strategy will

be applied

Checkpoint

meeting

Checkpoint

meeting

(Sept 18 Task Force meeting)

Next Steps:

D/R Option Cost

Estimation

Next Steps:

D/R Option Cost

Estimation

© 2013 IBM Corporation40

IBM Systems and Technology Group

Strategic Timeline: Today and Ahead

Sep 10 Sep 18 Board Presentation

November

Step 4: IT D/R Arch. Options / Evaluation

Step 5: Recommendations Baseline IT D/R Architecture

Step 6: RecommendStrategy and Roadmap

(Sept 28 Task Force meeting)

Business and

IT team

inputs

Data Center strategy will

be applied

High-level client IT Application and IT Tech Map built

High-level client IT Application and IT Tech Map built

9/18-27/07:

D/R Option Cost Estimation

9/18-27/07:

D/R Option Cost Estimation

Sep 28 Oct 1-15 Oct 16-30

9/28/07:

Discuss D/R Options high level Cost

Estimation (1,3, 7 days)

9/28/07:

Discuss D/R Options high level Cost

Estimation (1,3, 7 days)

10/1-15/07:

Refine, review

Create Board recommendation and presentation

10/1-15/07:

Refine, review

Create Board recommendation and presentation

Sep 21

© 2013 IBM Corporation41

IBM Systems and Technology Group

Recovery Time is a Step by Step journey

Total Elapsed Time (Recovery Time Objective)

15 Min. 1-4 Hr.. 4 -8 Hr.. 8-12 Hr.. 12-16 Hr.. 24 Hr.. 72 hours

Va

lue,

In

ves

tme

nt

DR Tier 4 - Point in Time copies forwarded to remote site

DR Tier 3 - Electronic Vaulting

DR Tier 2 - Hot Site, Restore from Tape

DR Tier 7 – Server and storage mirroring, automated end to end recovery

DR Tier 6 – Real time replication

DR Tier 5 –Transaction integrity, database mirroring

DR Tier 1 – Cold Site, restore from Tape

Recovery from a disk image Recovery from tape copyRecovery Times are rough estimations only

Subject to validation

Definition of successful recovery: All applications within a given BC Tier of recovery are up and running

© 2013 IBM Corporation42

IBM Systems and Technology Group

BC Tier 4

8-12 Hr.. 12-16 Hr.. 24 Hr.. 72 hours

BC Tier 3, hot site, tape restore, full electronic vaulting

BC Tier 2, Hot site, tape restore, some vaulting

BC Tier 1, Cold site, tape restore

Backup

Restore

Definition of successful recovery: all applications within a given BC Tier are up and running

Applied Biosystems — Advancing Science

Three and seven day recovery

Three and seven day recoveryOne day recoveryOne day recovery

Starting Point: must build basic site-wide Disaster Recovery upon a consolidated IT foundation

Recovery Times are rough estimations only

Subject to validation

© 2013 IBM Corporation43

IBM Systems and Technology Group

Costs: In-house vs.Outsourced

TBD Recovery sites ….

Framingham

Foster City

Alameda Pleasan

ton

Austin

Houston

Atlanta

Rockville

Norwalk

Network map is conceptual only

Internal Approach:

1) Facility Build-out (Alternate Data Center Preparation)

- Adequate floor-space, power, cooling, security

2) Redundant Connectivity (primary and alternate sites)

3) Redundant Equipment (Alternate site)

4) Data Replication (From Primary to Alternate site)

5) Additional Staffing (Support Alternate site, testing, etc.)

Vended Approach:

1) Subscription Contract

- Monthly cost / length of contract

2) Redundant Connectivity (Primary and alternate sites)

3) Data Replication (From Primary to alternate site)

Internal Approach:

1) Facility Build-out (Alternate Data Center Preparation)

- Adequate floor-space, power, cooling, security

2) Redundant Connectivity (primary and alternate sites)

3) Redundant Equipment (Alternate site)

4) Data Replication (From Primary to Alternate site)

5) Additional Staffing (Support Alternate site, testing, etc.)

Vended Approach:

1) Subscription Contract

- Monthly cost / length of contract

2) Redundant Connectivity (Primary and alternate sites)

3) Data Replication (From Primary to alternate site)

At 3,7 days: higher cost for same value

At 3,7 days: lower cost for same value

ROT: Internal recovery usually justified

For very fast recoveries (< 1 day)

© 2013 IBM Corporation44

IBM Systems and Technology Group

IT D/R Cost Model validates these projections.Estimated IT D/R monthly run rate:

© 2013 IBM Corporation45

IBM Systems and Technology Group

Recommendation

Board Presentation

Step 6: Recommend D/RStrategy and Roadmap

Oct 11

ReviewRecommendations

ReviewRecommendations

(Oct 11 D/R Task Force mtg)

Data Center Strategy work effort starting

2008 2009

Determine number and locations of sites, workloads, telecom. Integrate with business strategy

Input Disaster Recoveryconsiderations

CalendarYE 2007

BoardPresentation

BoardPresentation

Phase out tactical

IT D/R options

Implement strategicData Center

Consolidation+ D/R Strategy

Data Center Strategy

confirmed

Begin IT D/R project:

1. Begin accelerated IT consolidation now

2. Input requirements to Data Center strategy

3. Select tactical D/R

Oct 16-30

Aware of relationship between D/R and Data Center strategy

3. Recommendation

Implement tactical

IT D/R

© 2013 IBM Corporation46

IBM Systems and Technology Group

IBM continues to provide the most comprehensive suite of IT Business Resiliency solutions to meet customer requirements

IBM is the WW leader in knowledge, expertise, scalability, and implementation of proven Systems and Storage High Availability solutions

IBM provides one stop worldwide support for server, storage, software, networking, services

– Using technology innovations invented at IBM

IBM continues to invest in Server and Storage High Availability and Resiliency

– Providing a world-class complete end to end IBM business continuity solution set that includes:

– IBM Servers– IBM System Storage disk and tape– IBM System Storage tape– IBM Software and middleware– IBM and IBM Business Partner Services

© 2013 IBM Corporation47

IBM Systems and Technology Group

Thank YouThank You

Merci

Grazie

GraciasObrigado

Danke

Japanese

Hebrew

English

French

Russian

German

Italian

Spanish

Brazilian Portuguese

Arabic

Traditional Chinese

Simplified Chinese

Hindi

Tamil Korean

Thai

TesekkurlerTurkish

© 2013 IBM Corporation48

IBM Systems and Technology Group

© 2013 IBM Corporation49

IBM Systems and Technology Group

Your Next Steps for IT Business Continuity

Integrate IT Business Continuity into your IT Data Simplification Strategy….

– Infrastructure Simplification is the pre-requisite and co-requisite

– To enable the change to happen and be justified

Integrate and sell Infrastructure Simplification with IT Business Continuity a intended by-product

Build Business Continuity Targets and Scope

riskrisk

risk

risk

6 months12 months18 months

Total Scope

Likelihood

Imp

act risk

risk

risk

riskriskrisk

risk

Risk Assessment

© 2013 IBM Corporation50

IBM Systems and Technology Group

Architect an end-to-end IT Business Continuity solution design

– However, do not try to do it all at once

Plan for step-by-step incremental IT Business Continuity project

– Start with where you are today and build upward

– Incrementally build towards the final objective

– Each phase builds necessary foundation for the next step

IT Business Continuity is intended by-product of IT Simplification

Backup /Restore

RapidData

Recovery

ContinuousAvailability

Foundation:SAN and server

consolidationInfrastructure Simplification

Your Next Steps for IT Business Continuity

© 2013 IBM Corporation51

IBM Systems and Technology Group

For more IBM Business Resiliency solution help:

Your local geography System Architects

Your local geography brand specialists with a specialty in IT High Availability

IBM Business Partners with a specialty in IT High Availability

IBM Global Services – Business Continuity and Recovery Services

WW Technical Marketing Support – Pete Potosky team

– http://snjgsa.ibm.com/~singj

© 2013 IBM Corporation52

IBM Systems and Technology Group

The optimum Business Resiliency sales approach for today’s IT world is:– Up-level existing:

• IT Data Center Strategy and IT Infrastructure Simplification – To produce IT Business Resiliency as an intended by-product

The recoverable unit is the Business Process– Not just the server, storage, or network

Learning Points

Application 1

Application 3Analytics

report

managementreports

http://xyz.xml

decisionpoint

MQseries

WebSphere

Application 2

SQL

db2

Businessprocess A

Businessprocess B

Businessprocess C

Businessprocess D

Businessprocess E

Businessprocess F

Businessprocess G

Tech

nic

al

Ap

pli

cati

on

Bu

sin

ess

1. An error occurs on a storage device that correspondingly corrupts a database

2. The error impacts the ability of two or more applications to share critical data

3. The loss of both applications affects two distinctly different business processes

IT Business Continuity focus has shifted to business processrecovery

© 2013 IBM Corporation53

IBM Systems and Technology Group

Recovery Time Objective is:

– How long can I afford to be without my systems and business-critical applications?

Recovery Point Objective is:

– How much data can I afford to recreate (or lose)?

• Denotes the time interval between outage and when last good copy of data was made

• Applications may be down until some/all of data recreated.

Network Recovery Objective is:

– How long does it take me to switch over my network?

Learning Points

Sync.Replication

Async.Replication

Tape Backup

Tape Restore

Clustering

OnlineRestore

Remote Replication

SecsMinsHrsDays Wks Secs Mins Hrs Days Wks

Recovery PointRecovery Point Recovery TimeRecovery Time

RPO RTO NRO

© 2013 IBM Corporation54

IBM Systems and Technology Group

The Business Objectives for BC/DR are to create an optimal balance between: – Risk: What is the probability of a particular type of disaster

happening?– Impact: What is the effect on the business if a particular

disaster occurred?– Cost: What must be done to avoid or recover from

particular disaster?

The real obstacles to selling IT Business Resiliency solutions are:– Customer has too many other pain points that are more

certain to happen. Compounded by: • Lack of skills, lack of support from Line of Business, undefined

ownership• Lack of prioritization, lack of knowledge business processes,

interdependencies• Business Resiliency has “too wide of a span” for IT to control• Difficult to get consensus on the right directions• Don’t know where to start

Learning Points

Risk

Imp

act

Cost

© 2013 IBM Corporation55

IBM Systems and Technology Group

Learning Points

Divide IT Business Resiliency project’s scope into implementation phases

– Do not try to solve all vulnerabilities at once

– Scope can expand as phases progress

– Matches expenditure with increasing probability over time

Three ranges of customer recovery / budget – (Near) Continuous Availability, end to end automation

• Priority = uptime, with high value justification– Rapid Data Recovery

• Balanced priorities = Uptime and cost/value– Backup/Restore

• Priority = cost

riskrisk

risk

risk

6 months12 months18 months

Total Scope

© 2013 IBM Corporation56

IBM Systems and Technology Group

Learning Points

The six streamlined IT Business Resiliency Planning steps are:

1. Collect information for prioritization

2. Vulnerability, risk assessment, scope

3. Define BC targets based on scope

4. Solution option design and evaluation

5. Recommend solutions and products

6. Recommend strategy and roadmap

These are the essence of the “ideal” Business Resiliency planning cycle.

© 2013 IBM Corporation57

IBM Systems and Technology Group

Learning Points

Build the solution Step by Step:

– The Backup/Restore tier is a foundation for all that follows

– Step by step approach provides ability to deliver tangible IT Business Resiliency value immediately, and at every step of the project

– Provides a customer expectation and a roadmap that is easily understood

SAN SAN

Storage mirroring

Storage mirroring

Disk Low-cost Automated

ApplicationMirroring

ApplicationMirroring

End to endAutomatedFailover:Server

StorageApplications

Storage mirroring

Storage mirroring

Simplified

Shared

Dynamic

Disk AutomatedDisk Automated

© 2013 IBM Corporation58

IBM Systems and Technology Group

Learning PointsThe IBM and IBM Business Partner Value Proposition for Business Continuity is:

IBM and IBM Business Partners provides • Services and solutions to help you identify and fill gaps in your current continuity strategy and

to design, develop, and manage a program aligned to your risk tolerance and business needs. • Solutions to help you assess and prioritize your data in light of business and regulatory

requirements and then can develop and implement a plan and infrastructure based on your priorities

• Solutions that help you assess, plan for, create, and run an infrastructure that supports the ongoing availability and performance objectives of your business.

• Solutions to help you address common gaps in your disaster/crisis planning and respond more effectively to disruptive events.

That deliver the following benefits: • A comprehensive business continuity plan aligned to your risk tolerance and business

objectives.• Build business value through improved levels of service availability to eco-system • Minimize the cost of downtime and recovery• Credibility and trust that you can transfer to your customers, partners and shareholders • Disciplined, tested methodologies that address all aspects of your business• Unparalleled brand protection

© 2013 IBM Corporation59

IBM Systems and Technology Group

59 Apr 19, 2023

TrademarksThe following are trademarks of the International Business Machines Corporation in the United States, other countries, or both.

The following are trademarks or registered trademarks of other companies.

* All other products may be trademarks or registered trademarks of their respective companies.

Notes: Performance is in Internal Throughput Rate (ITR) ratio based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput improvements equivalent to the performance ratios stated here. IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply.All customer examples cited or described in this presentation are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics will vary depending on individual customer configurations and conditions.This publication was produced in the United States. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to change without notice. Consult your local IBM business contact for information on the product or services available in your area.All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.Information about non-IBM products is obtained from the manufacturers of those products or their published announcements. IBM has not tested those products and cannot confirm the performance, compatibility, or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.Prices subject to change without notice. Contact your IBM representative or Business Partner for the most current pricing in your geography.

Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries.Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license therefrom. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.UNIX is a registered trademark of The Open Group in the United States and other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. ITIL is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office.IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency, which is now part of the Office of Government Commerce.

For a complete list of IBM Trademarks, see www.ibm.com/legal/copytrade.shtml:

*, AS/400®, e business(logo)®, DBE, ESCO, eServer, FICON, IBM®, IBM (logo)®, iSeries®, MVS, OS/390®, pSeries®, RS/6000®, S/30, VM/ESA®, VSE/ESA, WebSphere®, xSeries®, z/OS®, zSeries®, z/VM®, System i, System i5, System p, System p5, System x, System z, System z9®, BladeCenter®

Not all common law marks used by IBM are listed on this page. Failure of a mark to appear does not mean that IBM does not use the mark nor does it mean that the product is not actively marketed or is not significant within its relevant market.

Those trademarks followed by ® are registered trademarks of IBM in the United States; all others are trademarks or common law marks of IBM in the United States.

© 2013 IBM Corporation60

IBM Systems and Technology Group

IBM System Storage & ServicesIntelligent Management. Protected Information. Smarter Insights.

60

Business Continuity Productivity Center for Replication Basic Hyperswap for System z Advanced copy services Tivoli Storage Manager (TSM) family Tivoli Continuous Data Protection (CDP) Tape cluster grids and Peer-to-Peer GDOC, GDPS

Lifecycle and Retention DR550 archive and compliance storage Grid Access Manager, GMAS TSM Space Management for Unix/Windows GPFS, DFSMS, SOFS N series with SnapLock™ WORM tape support

Infrastructure Management TotalStorage Productivity Center SAN Fabric Management software Tivoli Provisioning Manager Tivoli Storage Process Manager IBM Systems Director family

Disk Systems SAN Volume Controller DS family N series

Tape Systems TS family of drives,

libraries and virtualization

Storage Networking

Switches Directors Routers

Storage Services Consulting Assessments Design Deployment Outsourcing Hosting

For more information: http://www.ibm.com/systems/storage

© 2013 IBM Corporation61

IBM Systems and Technology Group

Products supported with standardized storage implementation services

61

Highlights

- Fixed-price and fixed-scope implementation and migration services for key IBM storage products

- Includes services for disk and tape systems, storage software and Network Attached Storage systems

- Applies expert-level skills, methods, guidance and project management techniques to improve the quality of client implementation or migration

- Helps organizations more quickly realize value and ROI from their storage products by speeding the implementation or migration

- Basic skills instructions included with implementation services for designated client personnel

- …can help Customers plan, implement, configure and test or migrate to storage-related hardware or software…..

IBM Storage and Data Product Implementation Services IBM Implementation Services for disk systems

- IBM Implementation Services for disk systems - DS4000/DS6000/DS8000- IBM Implementation Services for disk systems – IBM System Storage – DR550

IBM Implementation Services for storage software - IBM Implementation Services for storage software – TPC SE- IBM Implementation Services for storage software – TPC for Replication- IBM Implementation Services for storage software - copy function for Global

Mirror/Metro Mirror- IBM Implementation Services for storage software - copy function for Flashcopy- IBM Implementation Services for storage software – San Volume Controller- IBM Implementation Services for storage software – San Volume Controller Global

Mirror- IBM Implementation Services for storage software – SAN Fabric Components- IBM Implementation Services for storage software - Tivoli Storage Manager - IBM Implementation Services for storage software - Tivoli Storage Manager

Extended Edition- IBM Implementation Services for storage software - Tivoli Storage Manager for

Databases- IBM Implementation Services for storage software - Tivoli Storage Manager for

Advanced Copy Services- IBM Implementation Services for storage software - Tivoli Storage Manager for Mail- IBM Implementation Services for storage software – Tivoli Storage Manager for

Storage Area Networks (SAN)

© 2013 IBM Corporation62

IBM Systems and Technology Group

Products supported with standardized storage implementation or migration services

62

Highlights

- Fixed-price and fixed-scope implementation and migration services for key IBM storage products

- Includes services for disk and tape systems, storage software and Network Attached Storage systems

- Applies expert-level skills, methods, guidance and project management techniques to improve the quality of client implementation or migration

- Helps organizations more quickly realize value and ROI from their storage products by speeding the implementation or migration

- Basic skills instructions included with implementation services for designated client personnel

- …can help Customers plan, implement, configure and test or migrate to storage-related hardware or software…..

IBM Storage and Data Product Implementation Services IBM Implementation Services for tape systems

- IBM Implementation Services for tape – tape encryption and key management- IBM Implementation Services for tape – IBM Virtualization Engine TS7500 - IBM Implementation Services for tape – IBM Virtualization Engine TS7700- IBM Implementation Services for tape – for TS3500 Tape Library- IBM Implementation Services for tape - 3583 Ultrium Scalable Tape Library- IBM Implementation Services for tape - for Virtual Tape Server peer-to-peer- IBM Implementation Services for tape - LTO Tape - IBM Implementation Services for tape - virtual tape server advanced policy Mgmt

IBM Implementation Services for Network Attached Storage - Implementation Services for System Storage N series – N3000/N5000/N7000 - Implementation Services for System Storage N series – N5000/N7000 gateway

(front-end and backend)

IBM Migration Services for data - IBM Migration Services for data - system z data- IBM Migration Services for open systems attached IBM storage servers

IBM Migration Services for Network Attached Storage - IBM Migration Services for Network Attached Storage – N series

IBM Migration Services for tape systems - IBM Migration Services for tape – Bxx and TS77xx data migration- IBM Migration Services for tape - Virtual Tape Server for Static Data

© 2013 IBM Corporation63

IBM Systems and Technology Group

IBM Global Services Business Continuity and Recovery Services worldwide: 154 recovery centers in 55 countries

413 instances of open-systems support

(IBM, Sun, Cisco, HP and more)

76,972 enterprise server MIPS

716 enterprise server terabytes

441 IBM System p™ servers

352 IBM System i™ servers

2,063 SP2 nodes and Wintel servers

5,000,000 square feet of equipped floor space for workplace replacement

40,000 seats

© 2013 IBM Corporation64

IBM Systems and Technology Group

Done?

?

Timeline of an IT Recovery ====>

Production ☺ Network Staff

Operations StaffOperations Staff

Data

Operating System

Physical Facilities

Telecom Network

Management Control

Execute hardware, operating system, and data integrity recovery

AssessRPO

Application transactionintegrity recovery

Applications

Now we're done!

Applications Staff

Recovery Time Objective (RTO)of transaction integrity

Recovery Time Objective (RTO)of hardware data integrity

Recovery Point Objective

(RPO)

How much datamust be

recreated?

Outage!

RPO

Network Recovery Objective:How long before network

Is operational?

Server or storage mirroring provides a point in time, data consistent copy of data at the remote site.

© 2013 IBM Corporation65

IBM Systems and Technology Group

In-house Data Center - Before

IBM System z

Current coreapplications.

HP Alpha ES47, HP/UX, IDX, PACS, interface engines, Cardiology, CCA lab, pharmacy, radiology, etc

pSeriesEPIC

Wintel – 110 servers and

growing

LAN/WAN

ATM, Ethernet

EMC 85302TB usable

1.5 TB, .5 TB, 2 TB, 2 TB, 4 TB, 3 TB, 24 TB ..Various softwares including Veritas Volume Manager, TSM, LTO,

IBM Tape Library, DLT, ArcServe, etc.

MS Exchange, Oracle, web servers, Etc.

…….

© 2013 IBM Corporation66

IBM Systems and Technology Group

New IT Simplified configuration – provides <1 day recovery

IBM System z:

Current core

applic

IBM DS80002TB usable

pSeriesEPIC

1.5 TB, .5 TB, 2 TB, 2 TB, 4 TB, 3 TB, 24 TB ..Consolidation: Veritas Volume Manager, TSM, LTO,

IBM Tape Library, etc.

VMWARE for MS Exchange, Oracle, web servers, Etc.

…….

Storage for MS Exchange, Oracle, web servers, etc.

SANCONSOLIDATE: SAN Volume Controller(s)

HP Alpha ES47, HP/UX, IDX, PACS, interface engines, Cardiology, CCA lab, pharmacy, radiology, etc

ATM, Ethernet

LAN/WAN

IBM DS60002TB usable

Primary data center

pSeriesEPIC

1.5 TB, .5 TB, 2 TB, 2 TB, 4 TB, 3 TB, 24 TB ..Consolidation: Veritas Volume Manager, TSM,

LTO, IBM Tape Library, etc.

VMWARE for MS Exchange, Oracle, web servers, Etc.

Consolidated storage for MS Exchange, Oracle, web servers, etc.

SAN

SAN Volume Controller(s)

Consolidation: HP Alpha ES47, HP/UX, IDX, PACS, interface engines, Cardiology, CCA lab, pharmacy, radiology, etc

ATM, Ethernet

LAN/WAN

Secondary data center