SlideShare a Scribd company logo
1 of 24
Download to read offline
Automating Disaster Recovery for Faultless
Service Delivery
Tony Beeston
AUT55T
AUTOMATION
Principal Product Marketing Manager
CA Technologies
2 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
© 2017 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2017 presentation is intended for informational purposes only and does not form any type
of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.
For Informational Purposes Only
Terms of this Presentation
4 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Agenda
DISASTER RECOVER PLANNING (DRP) TODAY
DISASTER RECOVERY (DR) PLAN EXECUTION CHALLENGES
DRP SOLUTION
RESULTS OF AUTOMATING DRP
1
2
3
4
5 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Disaster Recovery Strategy
▪ How efficient is your DR Plan?
▪ Many are not prepared: 42% are not adequately armed with modern disaster
recovery solutions
▪ How many outages do you encounter?
▪ Outages are not rare: 42% experience at least one data outage per year, with an
average of 34 instances across enterprises of all sizes
▪ Is your DR Strategy fully relying on Human Factors?
▪ Manual is still the norm: 65% use manual disaster recovery processes
▪ When did you last test your Disaster Recovery Strategy?
▪ Testing isn't common: 72% test their disaster recovery plans annually
▪ What are the RTOs acceptable by the business?
▪ Four hours is too long: 53% think an outage of more than four hours is unacceptable
6 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Disaster Recovery Strategy
▪ How efficient is your DR Plan?
▪ Many are not prepared: 42% are not adequately armed with modern disaster recovery
solutions
▪ How many outages do you encounter?
▪ Outages are not rare: 42% experience at least one data outage per year, with an
average of 34 instances across enterprises of all sizes
▪ Is your DR Strategy fully relying on Human Factors?
▪ Manual is still the norm: 65% use manual disaster recovery processes
▪ When did you last test your Disaster Recovery Strategy?
▪ Testing isn't common: 72% test their disaster recovery plans annually
▪ What are the RTOs acceptable by the business?
▪ Four hours is too long: 53% think an outage of more than four hours is unacceptable
It is Human Nature Not to Be Worried
About Disaster Recovery
Until a Real Disaster Happens
7 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Primary Site Failover SitePeople Process Tools
Storage
Admin
Runbooks
Process Manuals
Scripts
Post-it Notes
Storage
Management &
Deployment
Network
Management
Tools
Server
Configuration &
ManagementNetwork
Switches
Load Balancers
Routers
Firewalls
Application
Web Server
App Server
Mail Server
Storage
IP SAN
Diskless Storage
N/w Attached Storage
Database Database Server
IP SAN
Diskless Storage
N/w Attached Storage
Switches
Load Balancers
Routers
Firewalls
Web Server
App Server
Mail Server
Database Server
Security
Team
DBA
App
Admin
Windows
Admin
Unix
Admin
Network
Engineers
Handoffs and coordination
between cross-IT domains
and silos
Disparate and disconnected
management tools
Maintenance of
failover site
Challenges With Disaster Recovery Today
8 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Business and the Disaster Recovery Plan
▪ Minimize business disruption
▪ Maintain the critical business processes during a disaster
▪ Identify and assess the potential that the loss of business functions and
processes could have on the operation of the business
▪ Ensure the key metrics for the RTOs /RPOs are defined and maintained for
critical business services
▪ Enforce operational, security and regulatory compliance
▪ Protect the brand
9 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
IT and Disaster Recovery Plan
▪ Ensure processes are issued at the right time, in the right order with the
right prerequisites
▪ Ensure all DR steps are following the latest configurations
▪ Providing accurate information about recovery times, and how much data
will be lost
▪ Executing all time-consuming manual recovery tasks without surprises
▪ Having enough resources to carry out DR drills
10 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Inbound Sources:
▪ CA Automic Monitoring
Adapters
▪ System Monitoring Tools
▪ Replication
▪ Service Desk
Respond Systems:
▪ CA Automic Request
▪ Service Desk
▪ Email / SMS
▪ Enterprise
Dashboard
Actions:
▪ Execute a DR failover/failback workflow in CA Automic
▪ Push real-time analytics to CA Automic dashboard
▪ Open/update/close/reassign Service Desk tickets
Closed-Loop Control Mechanism
Customers Logistics Production Systems
ERP SystemsBI/ DWHApplication &
Middleware
Infrastructure
Monitoring
Event Service
Event Service
Event Service
Event Adapter
Event Adapter
Event Adapter
Event Service
Event Service
(…)
Event Service
Event Service
(…)
Hub
Response
Service
Response
Service
Response
Service
Sense Interpret Analyze RespondDecide
Hub
11 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Automation Engine
Web Interface
PRODUCTION SITE DISASTER RECOVERY SITE
High-Level Architecture – Data Center Up
Application Nodes Database Nodes Application NodesDatabase Nodes
Automation Engine
Sync
12 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Web Interface
PRODUCTION SITE DISASTER RECOVERY SITE
High-Level Architecture – Data Center Down
Application Nodes Database Nodes Application NodesDatabase Nodes
Sync
Automation Engine Automation Engine
13 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Closed-Loop Control Mechanism
14 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Manage Service Failover in One Place
Dependencies, Timeline and Status for Each Business Service
15 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Manage Service Failover in One Place
Dependencies, Timeline and Status for Each Business Service
16 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
List of Services
Failover
process
completion RTO
Failback
duration
RPO
Replication
status
Last drill
performed
DR Readiness:
Server availability,
synchronization
DRP Automation and Monitoring Dashboard
17 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
DRP Automation and Monitoring Dashboard
18 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Benefits for Customers of
CA’s Automation Solutions
▪ Streamlined DRP task initiation & minimized human dependency
▪ Faster IT and Business services recovery
▪ Validation of complex recovery for multi-application environments
▪ DR solution meeting recovery SLAs
▪ Providing real-time stats on application data loss and recovery time
▪ Auditable DRP test results
▪ Ability to drill DR procedures more frequently
▪ In-Detail Analytics and Reports on DRP process executions
19 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Figure Explanation
37 Number of critical business applications
93 %
Percentage of automated tasks over all tasks for
switchover
110 Number of IT personnel who attended DR testing
60 Number of Business people who attended DR testing
24 hours Hours spent in DRC after switchover
88 minutes Time elapsed- switchover to DRC
40 minutes Time elapsed- switchback to main DC
Prior to automation the switchover to DRC took almost 6 hours
ING Bank Turkey Key Figures of DR Test
20 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
ING Bank Turkey Today
“The results of the DR testing process
have been dramatic. ING Bank Turkey has
shrunk the MTTR and delivered an almost
error free DR process.“
Emrah Baysal
Head of Systems Management,
ING Bank Turkey
“Now we can be safe and comfortable in
a disaster because we know we can
deal with the challenge.
With CA Automic* we have a living
system that’s use is continually evolving
within our business. This is critical to us,
especially for our DR strategy.”
*Automic is now CA’s Automation Business Unit
21 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Recommended Sessions
SESSION # TITLE DATE/TIME
AUT32T
Mayday@ Using CA Workload Automation ESP
Concepts to Prepare for Disaster Recovery
11/15/2017 at 4:15 pm
AUT04S
From Zero to 100 with CA Automation in Days
(84.51)
11/15/2016 at 2:30 pm
AUT06SA
To Infinity and Beyond! Automation Portfolio Long-
term Vision and Strategy
11/15/2017 at 12:45 pm
22 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Must See Demos
Automate
the
DevOps
Tool Chain
712
Automation
Automate
Test Data
Mgmt &
Drive Agility
709
Automation
Automate for
Continuous
Operations &
Data Delivery
717
Automation
Continuous
Service
Empowers
Self-Service
705
Automation
CA’s
Automation
Marketplace
706
Automation
23 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Questions?
24 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Stay connected at communities.ca.com
Thank you.
25 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Automation
For more information on Automation,
please visit: http://cainc.to/CAW17-Automation

More Related Content

What's hot

Design process and concepts
Design process and conceptsDesign process and concepts
Design process and conceptsSlideshare
 
Erp introduction
Erp introductionErp introduction
Erp introductionGoa App
 
ABD317_Building Your First Big Data Application on AWS - ABD317
ABD317_Building Your First Big Data Application on AWS - ABD317ABD317_Building Your First Big Data Application on AWS - ABD317
ABD317_Building Your First Big Data Application on AWS - ABD317Amazon Web Services
 
Predictive Maintenance In HVAC Industry
Predictive Maintenance In HVAC IndustryPredictive Maintenance In HVAC Industry
Predictive Maintenance In HVAC IndustryArnab Biswas
 
AWS Webcast - Migrating to RDS Oracle
AWS Webcast - Migrating to RDS OracleAWS Webcast - Migrating to RDS Oracle
AWS Webcast - Migrating to RDS OracleAmazon Web Services
 
Spm ap-network model-
Spm ap-network model-Spm ap-network model-
Spm ap-network model-Kanchana Devi
 
Oracle Integration Cloud Service (ICS) best practices learned from the field
Oracle Integration Cloud Service (ICS) best practices learned from the fieldOracle Integration Cloud Service (ICS) best practices learned from the field
Oracle Integration Cloud Service (ICS) best practices learned from the fieldRobert van Mölken
 
Tuning and Debugging in Apache Spark
Tuning and Debugging in Apache SparkTuning and Debugging in Apache Spark
Tuning and Debugging in Apache SparkDatabricks
 
IaaS, PaaS, SaaS and the Evolution of Oracle EPM
IaaS, PaaS, SaaS and the Evolution of Oracle EPMIaaS, PaaS, SaaS and the Evolution of Oracle EPM
IaaS, PaaS, SaaS and the Evolution of Oracle EPMGuillaume Slee
 
Non-Functional Requirements
Non-Functional RequirementsNon-Functional Requirements
Non-Functional RequirementsYuriy Guts
 
Shift-Left SRE: Self-Healing with AWS Lambda Functions (DEV313-S) - AWS re:In...
Shift-Left SRE: Self-Healing with AWS Lambda Functions (DEV313-S) - AWS re:In...Shift-Left SRE: Self-Healing with AWS Lambda Functions (DEV313-S) - AWS re:In...
Shift-Left SRE: Self-Healing with AWS Lambda Functions (DEV313-S) - AWS re:In...Amazon Web Services
 
The benefits of software reuse
The benefits of software reuseThe benefits of software reuse
The benefits of software reuseEntando
 
HADOOP TECHNOLOGY ppt
HADOOP  TECHNOLOGY pptHADOOP  TECHNOLOGY ppt
HADOOP TECHNOLOGY pptsravya raju
 
Predictive Maintenance vs Preventive Maintenance
Predictive Maintenance vs Preventive MaintenancePredictive Maintenance vs Preventive Maintenance
Predictive Maintenance vs Preventive MaintenanceMobility Work
 
Disaster Recovery Strategies - AWS Siklab 2022.pptx
Disaster Recovery Strategies - AWS Siklab 2022.pptxDisaster Recovery Strategies - AWS Siklab 2022.pptx
Disaster Recovery Strategies - AWS Siklab 2022.pptxJohn Louis Garcia
 
Ebook Guide To Data Centers
Ebook Guide To Data CentersEbook Guide To Data Centers
Ebook Guide To Data Centersrobgross144
 

What's hot (20)

Design process and concepts
Design process and conceptsDesign process and concepts
Design process and concepts
 
Erp introduction
Erp introductionErp introduction
Erp introduction
 
ABD317_Building Your First Big Data Application on AWS - ABD317
ABD317_Building Your First Big Data Application on AWS - ABD317ABD317_Building Your First Big Data Application on AWS - ABD317
ABD317_Building Your First Big Data Application on AWS - ABD317
 
Predictive Maintenance In HVAC Industry
Predictive Maintenance In HVAC IndustryPredictive Maintenance In HVAC Industry
Predictive Maintenance In HVAC Industry
 
AWS Webcast - Migrating to RDS Oracle
AWS Webcast - Migrating to RDS OracleAWS Webcast - Migrating to RDS Oracle
AWS Webcast - Migrating to RDS Oracle
 
Spm ap-network model-
Spm ap-network model-Spm ap-network model-
Spm ap-network model-
 
Oracle Integration Cloud Service (ICS) best practices learned from the field
Oracle Integration Cloud Service (ICS) best practices learned from the fieldOracle Integration Cloud Service (ICS) best practices learned from the field
Oracle Integration Cloud Service (ICS) best practices learned from the field
 
Team up
Team upTeam up
Team up
 
Cutover Plan V2
Cutover Plan V2Cutover Plan V2
Cutover Plan V2
 
Plant Maintenance
Plant MaintenancePlant Maintenance
Plant Maintenance
 
Tuning and Debugging in Apache Spark
Tuning and Debugging in Apache SparkTuning and Debugging in Apache Spark
Tuning and Debugging in Apache Spark
 
IaaS, PaaS, SaaS and the Evolution of Oracle EPM
IaaS, PaaS, SaaS and the Evolution of Oracle EPMIaaS, PaaS, SaaS and the Evolution of Oracle EPM
IaaS, PaaS, SaaS and the Evolution of Oracle EPM
 
Non-Functional Requirements
Non-Functional RequirementsNon-Functional Requirements
Non-Functional Requirements
 
Shift-Left SRE: Self-Healing with AWS Lambda Functions (DEV313-S) - AWS re:In...
Shift-Left SRE: Self-Healing with AWS Lambda Functions (DEV313-S) - AWS re:In...Shift-Left SRE: Self-Healing with AWS Lambda Functions (DEV313-S) - AWS re:In...
Shift-Left SRE: Self-Healing with AWS Lambda Functions (DEV313-S) - AWS re:In...
 
The benefits of software reuse
The benefits of software reuseThe benefits of software reuse
The benefits of software reuse
 
TCO
TCO TCO
TCO
 
HADOOP TECHNOLOGY ppt
HADOOP  TECHNOLOGY pptHADOOP  TECHNOLOGY ppt
HADOOP TECHNOLOGY ppt
 
Predictive Maintenance vs Preventive Maintenance
Predictive Maintenance vs Preventive MaintenancePredictive Maintenance vs Preventive Maintenance
Predictive Maintenance vs Preventive Maintenance
 
Disaster Recovery Strategies - AWS Siklab 2022.pptx
Disaster Recovery Strategies - AWS Siklab 2022.pptxDisaster Recovery Strategies - AWS Siklab 2022.pptx
Disaster Recovery Strategies - AWS Siklab 2022.pptx
 
Ebook Guide To Data Centers
Ebook Guide To Data CentersEbook Guide To Data Centers
Ebook Guide To Data Centers
 

Similar to Automating Disaster Recovery for Faultless Service Delivery

Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Closed Loop Remediation with CA Automic Service Orchestration
Closed Loop Remediation with CA Automic Service OrchestrationClosed Loop Remediation with CA Automic Service Orchestration
Closed Loop Remediation with CA Automic Service OrchestrationCA Technologies
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentBrian Anderson
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentEagle Technologies
 
Avoiding disaster recovery disasters
Avoiding disaster recovery disastersAvoiding disaster recovery disasters
Avoiding disaster recovery disastersAlexandra Matthiesen
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
Case Study: Modernizing the PMO with CA PPM 15
Case Study: Modernizing the PMO with CA PPM 15Case Study: Modernizing the PMO with CA PPM 15
Case Study: Modernizing the PMO with CA PPM 15CA Technologies
 
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.CA Technologies
 
Le soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuityLe soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuityJürgen Ambrosi
 
Business Continuity Considerations for a More Reliable Postgres Environment
Business Continuity Considerations for a More Reliable Postgres EnvironmentBusiness Continuity Considerations for a More Reliable Postgres Environment
Business Continuity Considerations for a More Reliable Postgres EnvironmentEDB
 
Velocity 2014 Tool Chain Choices
Velocity 2014 Tool Chain ChoicesVelocity 2014 Tool Chain Choices
Velocity 2014 Tool Chain ChoicesMark Sigler
 
Case Study: Vivo Automated IT Capacity Management to Optimize Usage of its Cr...
Case Study: Vivo Automated IT Capacity Management to Optimize Usage of its Cr...Case Study: Vivo Automated IT Capacity Management to Optimize Usage of its Cr...
Case Study: Vivo Automated IT Capacity Management to Optimize Usage of its Cr...CA Technologies
 
10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...
10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...
10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...Jesse Andrew
 
Can your business survive the next disaster?
Can your business survive the next disaster?Can your business survive the next disaster?
Can your business survive the next disaster?Ashish Patel
 
Automating the Modern Software Factory
Automating the Modern Software FactoryAutomating the Modern Software Factory
Automating the Modern Software FactoryCA Technologies
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankDonna Perlstein
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankCloudEndure
 

Similar to Automating Disaster Recovery for Faultless Service Delivery (20)

Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Closed Loop Remediation with CA Automic Service Orchestration
Closed Loop Remediation with CA Automic Service OrchestrationClosed Loop Remediation with CA Automic Service Orchestration
Closed Loop Remediation with CA Automic Service Orchestration
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery Environment
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery Environment
 
Avoiding disaster recovery disasters
Avoiding disaster recovery disastersAvoiding disaster recovery disasters
Avoiding disaster recovery disasters
 
Avoiding disaster recovery disasters
Avoiding disaster recovery disastersAvoiding disaster recovery disasters
Avoiding disaster recovery disasters
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
Case Study: Modernizing the PMO with CA PPM 15
Case Study: Modernizing the PMO with CA PPM 15Case Study: Modernizing the PMO with CA PPM 15
Case Study: Modernizing the PMO with CA PPM 15
 
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
 
Le soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuityLe soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuity
 
Business Continuity Considerations for a More Reliable Postgres Environment
Business Continuity Considerations for a More Reliable Postgres EnvironmentBusiness Continuity Considerations for a More Reliable Postgres Environment
Business Continuity Considerations for a More Reliable Postgres Environment
 
Velocity 2014 Tool Chain Choices
Velocity 2014 Tool Chain ChoicesVelocity 2014 Tool Chain Choices
Velocity 2014 Tool Chain Choices
 
Case Study: Vivo Automated IT Capacity Management to Optimize Usage of its Cr...
Case Study: Vivo Automated IT Capacity Management to Optimize Usage of its Cr...Case Study: Vivo Automated IT Capacity Management to Optimize Usage of its Cr...
Case Study: Vivo Automated IT Capacity Management to Optimize Usage of its Cr...
 
10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...
10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...
10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...
 
Can your business survive the next disaster?
Can your business survive the next disaster?Can your business survive the next disaster?
Can your business survive the next disaster?
 
Automating the Modern Software Factory
Automating the Modern Software FactoryAutomating the Modern Software Factory
Automating the Modern Software Factory
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and RiskCA Technologies
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...CA Technologies
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...CA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and Risk
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
 

Recently uploaded

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Recently uploaded (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Automating Disaster Recovery for Faultless Service Delivery

  • 1. Automating Disaster Recovery for Faultless Service Delivery Tony Beeston AUT55T AUTOMATION Principal Product Marketing Manager CA Technologies
  • 2. 2 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS © 2017 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2017 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
  • 3. 4 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Agenda DISASTER RECOVER PLANNING (DRP) TODAY DISASTER RECOVERY (DR) PLAN EXECUTION CHALLENGES DRP SOLUTION RESULTS OF AUTOMATING DRP 1 2 3 4
  • 4. 5 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Disaster Recovery Strategy ▪ How efficient is your DR Plan? ▪ Many are not prepared: 42% are not adequately armed with modern disaster recovery solutions ▪ How many outages do you encounter? ▪ Outages are not rare: 42% experience at least one data outage per year, with an average of 34 instances across enterprises of all sizes ▪ Is your DR Strategy fully relying on Human Factors? ▪ Manual is still the norm: 65% use manual disaster recovery processes ▪ When did you last test your Disaster Recovery Strategy? ▪ Testing isn't common: 72% test their disaster recovery plans annually ▪ What are the RTOs acceptable by the business? ▪ Four hours is too long: 53% think an outage of more than four hours is unacceptable
  • 5. 6 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Disaster Recovery Strategy ▪ How efficient is your DR Plan? ▪ Many are not prepared: 42% are not adequately armed with modern disaster recovery solutions ▪ How many outages do you encounter? ▪ Outages are not rare: 42% experience at least one data outage per year, with an average of 34 instances across enterprises of all sizes ▪ Is your DR Strategy fully relying on Human Factors? ▪ Manual is still the norm: 65% use manual disaster recovery processes ▪ When did you last test your Disaster Recovery Strategy? ▪ Testing isn't common: 72% test their disaster recovery plans annually ▪ What are the RTOs acceptable by the business? ▪ Four hours is too long: 53% think an outage of more than four hours is unacceptable It is Human Nature Not to Be Worried About Disaster Recovery Until a Real Disaster Happens
  • 6. 7 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Primary Site Failover SitePeople Process Tools Storage Admin Runbooks Process Manuals Scripts Post-it Notes Storage Management & Deployment Network Management Tools Server Configuration & ManagementNetwork Switches Load Balancers Routers Firewalls Application Web Server App Server Mail Server Storage IP SAN Diskless Storage N/w Attached Storage Database Database Server IP SAN Diskless Storage N/w Attached Storage Switches Load Balancers Routers Firewalls Web Server App Server Mail Server Database Server Security Team DBA App Admin Windows Admin Unix Admin Network Engineers Handoffs and coordination between cross-IT domains and silos Disparate and disconnected management tools Maintenance of failover site Challenges With Disaster Recovery Today
  • 7. 8 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Business and the Disaster Recovery Plan ▪ Minimize business disruption ▪ Maintain the critical business processes during a disaster ▪ Identify and assess the potential that the loss of business functions and processes could have on the operation of the business ▪ Ensure the key metrics for the RTOs /RPOs are defined and maintained for critical business services ▪ Enforce operational, security and regulatory compliance ▪ Protect the brand
  • 8. 9 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS IT and Disaster Recovery Plan ▪ Ensure processes are issued at the right time, in the right order with the right prerequisites ▪ Ensure all DR steps are following the latest configurations ▪ Providing accurate information about recovery times, and how much data will be lost ▪ Executing all time-consuming manual recovery tasks without surprises ▪ Having enough resources to carry out DR drills
  • 9. 10 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Inbound Sources: ▪ CA Automic Monitoring Adapters ▪ System Monitoring Tools ▪ Replication ▪ Service Desk Respond Systems: ▪ CA Automic Request ▪ Service Desk ▪ Email / SMS ▪ Enterprise Dashboard Actions: ▪ Execute a DR failover/failback workflow in CA Automic ▪ Push real-time analytics to CA Automic dashboard ▪ Open/update/close/reassign Service Desk tickets Closed-Loop Control Mechanism Customers Logistics Production Systems ERP SystemsBI/ DWHApplication & Middleware Infrastructure Monitoring Event Service Event Service Event Service Event Adapter Event Adapter Event Adapter Event Service Event Service (…) Event Service Event Service (…) Hub Response Service Response Service Response Service Sense Interpret Analyze RespondDecide Hub
  • 10. 11 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Automation Engine Web Interface PRODUCTION SITE DISASTER RECOVERY SITE High-Level Architecture – Data Center Up Application Nodes Database Nodes Application NodesDatabase Nodes Automation Engine Sync
  • 11. 12 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Web Interface PRODUCTION SITE DISASTER RECOVERY SITE High-Level Architecture – Data Center Down Application Nodes Database Nodes Application NodesDatabase Nodes Sync Automation Engine Automation Engine
  • 12. 13 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Closed-Loop Control Mechanism
  • 13. 14 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Manage Service Failover in One Place Dependencies, Timeline and Status for Each Business Service
  • 14. 15 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Manage Service Failover in One Place Dependencies, Timeline and Status for Each Business Service
  • 15. 16 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS List of Services Failover process completion RTO Failback duration RPO Replication status Last drill performed DR Readiness: Server availability, synchronization DRP Automation and Monitoring Dashboard
  • 16. 17 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS DRP Automation and Monitoring Dashboard
  • 17. 18 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Benefits for Customers of CA’s Automation Solutions ▪ Streamlined DRP task initiation & minimized human dependency ▪ Faster IT and Business services recovery ▪ Validation of complex recovery for multi-application environments ▪ DR solution meeting recovery SLAs ▪ Providing real-time stats on application data loss and recovery time ▪ Auditable DRP test results ▪ Ability to drill DR procedures more frequently ▪ In-Detail Analytics and Reports on DRP process executions
  • 18. 19 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Figure Explanation 37 Number of critical business applications 93 % Percentage of automated tasks over all tasks for switchover 110 Number of IT personnel who attended DR testing 60 Number of Business people who attended DR testing 24 hours Hours spent in DRC after switchover 88 minutes Time elapsed- switchover to DRC 40 minutes Time elapsed- switchback to main DC Prior to automation the switchover to DRC took almost 6 hours ING Bank Turkey Key Figures of DR Test
  • 19. 20 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS ING Bank Turkey Today “The results of the DR testing process have been dramatic. ING Bank Turkey has shrunk the MTTR and delivered an almost error free DR process.“ Emrah Baysal Head of Systems Management, ING Bank Turkey “Now we can be safe and comfortable in a disaster because we know we can deal with the challenge. With CA Automic* we have a living system that’s use is continually evolving within our business. This is critical to us, especially for our DR strategy.” *Automic is now CA’s Automation Business Unit
  • 20. 21 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Recommended Sessions SESSION # TITLE DATE/TIME AUT32T Mayday@ Using CA Workload Automation ESP Concepts to Prepare for Disaster Recovery 11/15/2017 at 4:15 pm AUT04S From Zero to 100 with CA Automation in Days (84.51) 11/15/2016 at 2:30 pm AUT06SA To Infinity and Beyond! Automation Portfolio Long- term Vision and Strategy 11/15/2017 at 12:45 pm
  • 21. 22 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Must See Demos Automate the DevOps Tool Chain 712 Automation Automate Test Data Mgmt & Drive Agility 709 Automation Automate for Continuous Operations & Data Delivery 717 Automation Continuous Service Empowers Self-Service 705 Automation CA’s Automation Marketplace 706 Automation
  • 22. 23 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Questions?
  • 23. 24 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Stay connected at communities.ca.com Thank you.
  • 24. 25 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Automation For more information on Automation, please visit: http://cainc.to/CAW17-Automation