LuminrDRPresentation_AITP_October2014.pptx

Presented by Abdiel Louis and Tim Krupinski
LUMINR
Business Continuity and
Disaster Readiness
Abdiel Louis
Co-Founder at Luminr and a Senior IT
Architect in the payment industries,
where he leads and designs Private
Cloud and Identity Management
solutions between cross functional
platforms safeguarding global clients.
He has over ten years of experience
integrating and delivering technology
solutions.
Solution Architect with SageLogix
and Co-Founder at Luminr,
specializing in platform migrations
and operational efficiency
improvement. He has worked on
platforms in the Financial,
Healthcare, Enterprise Support and
Government industries since 2005.
About.(Luminr)
Tim Krupinski
Business Drivers
• How: Storage
• What: Disaster Recovery
• Why: Data Protection
• When: Disaster Recovery
• Challenges and Special Considerations
• Business Continuity and Disaster Readiness Steps
What is Disaster Recovery?
Disaster recovery (DR) : set of policies and procedures to
enable the recovery or continuation of critical business and it
supporting technological infrastructure following a disaster.
• Some Popular Culprits
• Natural Disasters
• Fire or Earthquake
• Terrorist Attacks
• Not-So-Popular Culprits
• Junior Admins
• “Accidental” loss of data
A Look at the Data
In a 2012 study, Enterprises reported that
• Nearly 50% of system downtime was caused by Human Error or
Unexpected Updates & Patching
• Only 5% of downtime caused by an actual disaster
2011 Acronis Study of 6,000 IT Organizations
• 86% of companies experienced downtime in the previous 12 months
• 60% caused by human error
• Average downtime was over 2 days
• Average cost of downtime was $366,000 per year
Why is Data Protection Important?
Data Accessibility
• Anywhere
Encryption
• In-transit
• At rest
Encryption Mechanism
• AES 256
Security boundaries
• Logical
• Physical
How to Manage and Allocate Storage?
Sizing Critial Data
• 1:4 (1GB of data requires 4GB capacity)
Identifying the Cost and Probability of Downtime
• Fitting into your existing infrastructure
• Third party
Cloud Storage
• Azure
• Amazon
• Iron Mountain, and more…
When is Disaster Recover Appropriate?
• Business Directive dependent
• Backup ALONE is NOT Disaster Recovery
• Network
• Access
• Bandwidth
• Data Categories/Sets
• Be Strategic; Not Reactionary
• Rentention
• Finanacial institutions - 7 years
Challenges and Special Considerations
• Rules, regulations, and restrictions
• Data Security/Location Requirements
• Off Site Requirements
• Recovery Time Objectives (RTO)
• Infrastructure Compatibility
Recover Time Objective
Critical Business Activities Availability
* Labor cost association + Revenue impact
Business Continuity and Disaster Readiness
1. Identify and list critical business activities that satisfy
your business operations
2. Identify the critical business information needed for
these activities to complete successfully
3. Create a checklist of your core system processes
• Functional area
• Sequential approach to come back online
• Disaster recovery test
4. Following your checklist, can you recover post
disaster/impact, smoothly without affect your
bottom-line?
Questions?
Thank You!
Contact info:
Abdiel Louis | Abdiel@luminr.com
Tim Krupinski | Tim@luminr.com
1 von 12

Recomendados

Winning the war against data- Strategies to beat your arch nemesis: files - G... von
Winning the war against data- Strategies to beat your arch nemesis: files - G...Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...Spiceworks
1K views37 Folien
Business in the cloud von
Business in the cloudBusiness in the cloud
Business in the cloudDestiny Chilton
705 views10 Folien
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011) von
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)Danny Miller
249 views28 Folien
IDERA Live | Databases Don't Build and Populate Themselves von
IDERA Live | Databases Don't Build and Populate ThemselvesIDERA Live | Databases Don't Build and Populate Themselves
IDERA Live | Databases Don't Build and Populate ThemselvesIDERA Software
96 views33 Folien
Single Realm Multi-Cloud Security Management with Palo Alto Networks von
Single Realm Multi-Cloud Security Management with Palo Alto NetworksSingle Realm Multi-Cloud Security Management with Palo Alto Networks
Single Realm Multi-Cloud Security Management with Palo Alto Networks2nd Watch
140 views13 Folien
True Services Portfolio Overview von
True Services Portfolio OverviewTrue Services Portfolio Overview
True Services Portfolio OverviewNathaniel "Lee" Wade
52 views3 Folien

Más contenido relacionado

Was ist angesagt?

Future Proofing Your Mission - Samuel Gordy von
Future Proofing Your Mission - Samuel GordyFuture Proofing Your Mission - Samuel Gordy
Future Proofing Your Mission - Samuel Gordyscoopnewsgroup
709 views13 Folien
5 Applications of Cloud Computing von
5 Applications of Cloud Computing5 Applications of Cloud Computing
5 Applications of Cloud ComputingCentriLogic
479 views1 Folie
IT Series: Cloud Computing Done Right CISOA 2011 von
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011Donald E. Hester
660 views27 Folien
Taming Your Hybrid Cloud - Doug Bourgeois von
Taming Your Hybrid Cloud - Doug BourgeoisTaming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug Bourgeoisscoopnewsgroup
665 views7 Folien
Romi tech cloud workspace overview von
Romi tech   cloud workspace overviewRomi tech   cloud workspace overview
Romi tech cloud workspace overviewromitech
389 views12 Folien
Optimize operations von
Optimize operationsOptimize operations
Optimize operationsYounes Boukamher
178 views11 Folien

Was ist angesagt?(20)

Future Proofing Your Mission - Samuel Gordy von scoopnewsgroup
Future Proofing Your Mission - Samuel GordyFuture Proofing Your Mission - Samuel Gordy
Future Proofing Your Mission - Samuel Gordy
scoopnewsgroup709 views
5 Applications of Cloud Computing von CentriLogic
5 Applications of Cloud Computing5 Applications of Cloud Computing
5 Applications of Cloud Computing
CentriLogic479 views
IT Series: Cloud Computing Done Right CISOA 2011 von Donald E. Hester
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011
Donald E. Hester660 views
Taming Your Hybrid Cloud - Doug Bourgeois von scoopnewsgroup
Taming Your Hybrid Cloud - Doug BourgeoisTaming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug Bourgeois
scoopnewsgroup665 views
Romi tech cloud workspace overview von romitech
Romi tech   cloud workspace overviewRomi tech   cloud workspace overview
Romi tech cloud workspace overview
romitech389 views
Integration of Technology & Compliance Presented by John Heintz, CPS Energy von stacybre
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
stacybre237 views
Farfield systems caoabilities feb 2013 von John Secondari
Farfield systems caoabilities feb 2013Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013
John Secondari304 views
Data Movement, Management and Governance In The Cloud: DocuSign Case Study von Dell World
Data Movement, Management and Governance In The Cloud: DocuSign Case StudyData Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
Dell World1.2K views
Embedding GDPR Within Your Information and Library Service von CILIPScotland
Embedding GDPR Within Your Information and Library ServiceEmbedding GDPR Within Your Information and Library Service
Embedding GDPR Within Your Information and Library Service
CILIPScotland83 views
UDT - Government and Healthcare von Tina Dominguez
UDT - Government and HealthcareUDT - Government and Healthcare
UDT - Government and Healthcare
Tina Dominguez110 views
Cloud computing | Cloud Tally Services In Pune | PrismIT von PrismITsolutions
Cloud computing | Cloud Tally Services In Pune | PrismITCloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismIT
PrismITsolutions31 views
Smarter Computing_Sebastian Krause_IBM Symp13 von IBM Switzerland
Smarter Computing_Sebastian Krause_IBM Symp13Smarter Computing_Sebastian Krause_IBM Symp13
Smarter Computing_Sebastian Krause_IBM Symp13
IBM Switzerland856 views
I365 presentation von MCS621
I365 presentationI365 presentation
I365 presentation
MCS621273 views
5 Key Benefits of a Unified Data Center von ePlus
5 Key Benefits of a Unified Data Center5 Key Benefits of a Unified Data Center
5 Key Benefits of a Unified Data Center
ePlus4.5K views

Destacado

Ocfs2 storage von
Ocfs2 storageOcfs2 storage
Ocfs2 storageTimothy Krupinski
304 views16 Folien
Introduction to Oracle Infrastructure as a Service von
Introduction to Oracle Infrastructure as a ServiceIntroduction to Oracle Infrastructure as a Service
Introduction to Oracle Infrastructure as a ServiceTimothy Krupinski
415 views23 Folien
DevOps in your Oracle Stack von
DevOps in your Oracle StackDevOps in your Oracle Stack
DevOps in your Oracle StackTimothy Krupinski
509 views32 Folien
Permanent hiring consultancy von
Permanent hiring consultancyPermanent hiring consultancy
Permanent hiring consultancyNeuhiring
364 views9 Folien
цдг космонавт коледна работилница von
цдг космонавт коледна работилницацдг космонавт коледна работилница
цдг космонавт коледна работилницаmegikatq
462 views14 Folien
Good practices to build good software von
Good practices to build good softwareGood practices to build good software
Good practices to build good softwareTIDChile
1K views69 Folien

Destacado(16)

Introduction to Oracle Infrastructure as a Service von Timothy Krupinski
Introduction to Oracle Infrastructure as a ServiceIntroduction to Oracle Infrastructure as a Service
Introduction to Oracle Infrastructure as a Service
Timothy Krupinski415 views
Permanent hiring consultancy von Neuhiring
Permanent hiring consultancyPermanent hiring consultancy
Permanent hiring consultancy
Neuhiring364 views
цдг космонавт коледна работилница von megikatq
цдг космонавт коледна работилницацдг космонавт коледна работилница
цдг космонавт коледна работилница
megikatq462 views
Good practices to build good software von TIDChile
Good practices to build good softwareGood practices to build good software
Good practices to build good software
TIDChile1K views
Developmental stability of grape leaf morphometrics: allometry, heteroblasty,... von DanChitwood
Developmental stability of grape leaf morphometrics: allometry, heteroblasty,...Developmental stability of grape leaf morphometrics: allometry, heteroblasty,...
Developmental stability of grape leaf morphometrics: allometry, heteroblasty,...
DanChitwood1K views
ден на христ.сем во-8 зала von megikatq
ден на христ.сем во-8 заладен на христ.сем во-8 зала
ден на христ.сем во-8 зала
megikatq1.2K views
Venezuela, una tragedia latinoamericana von Carlos Turdera
Venezuela, una tragedia latinoamericanaVenezuela, una tragedia latinoamericana
Venezuela, una tragedia latinoamericana
Carlos Turdera140 views
международен учителски форум von megikatq
международен учителски форуммеждународен учителски форум
международен учителски форум
megikatq1.1K views
eCommercePresentation von Chris Fry
eCommercePresentationeCommercePresentation
eCommercePresentation
Chris Fry156 views
игри белгия von megikatq
игри  белгияигри  белгия
игри белгия
megikatq250 views
Evaluating tests von cwhms
Evaluating testsEvaluating tests
Evaluating tests
cwhms742 views
คู่มือการใช้ถึงหมักก๊าชชีวภาพ von mantanwa22
คู่มือการใช้ถึงหมักก๊าชชีวภาพคู่มือการใช้ถึงหมักก๊าชชีวภาพ
คู่มือการใช้ถึงหมักก๊าชชีวภาพ
mantanwa221.3K views

Similar a LuminrDRPresentation_AITP_October2014.pptx

Top Trends and Challenges in the Cloud von
Top Trends and Challenges in the CloudTop Trends and Challenges in the Cloud
Top Trends and Challenges in the CloudPrecisely
16 views38 Folien
How to Secure Access Control in Office 365 Environments von
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsQuest
741 views26 Folien
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat... von
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...Janine Anthony Bowen, Esq.
896 views30 Folien
Rethinking Data Availability and Governance in a Mobile World von
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldInside Analysis
412 views36 Folien
Rethinking Data Availability and Governance in a Mobile World von
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
135 views36 Folien
Improve IT Security and Compliance with Mainframe Data in Splunk von
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkPrecisely
203 views31 Folien

Similar a LuminrDRPresentation_AITP_October2014.pptx(20)

Top Trends and Challenges in the Cloud von Precisely
Top Trends and Challenges in the CloudTop Trends and Challenges in the Cloud
Top Trends and Challenges in the Cloud
Precisely16 views
How to Secure Access Control in Office 365 Environments von Quest
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 Environments
Quest741 views
Rethinking Data Availability and Governance in a Mobile World von Inside Analysis
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
Inside Analysis412 views
Rethinking Data Availability and Governance in a Mobile World von Hao Tran
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
Hao Tran135 views
Improve IT Security and Compliance with Mainframe Data in Splunk von Precisely
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
Precisely203 views
Microsoft Cloud GDPR Compliance Options (SUGUK) von Andy Talbot
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
Andy Talbot220 views
Cloud is not an option, but is security? von Jody Keyser
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
Jody Keyser715 views
How Vulnerable is Your Critical Data? von IBM Security
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
IBM Security2K views
Cloud Security: A New Perspective von Wen-Pai Lu
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
Wen-Pai Lu1.5K views
Get ready for_an_autonomous_data_driven_future_ext von Oracle Developers
Get ready for_an_autonomous_data_driven_future_extGet ready for_an_autonomous_data_driven_future_ext
Get ready for_an_autonomous_data_driven_future_ext
Oracle Developers358 views
Cloud_Computing_IIMC_v1 von Steve Markey
Cloud_Computing_IIMC_v1Cloud_Computing_IIMC_v1
Cloud_Computing_IIMC_v1
Steve Markey342 views
May 2013 Federal Cloud Computing Summit Keynote by David Cearly von Tim Harvey
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
Tim Harvey3K views
Cloud Security: A Business-Centric Approach in 12 Steps von Omar Khawaja
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
Omar Khawaja800 views
O365Engage17 - Black belting office 365 security with secure score von NCCOMMS
O365Engage17 - Black belting office 365 security with secure scoreO365Engage17 - Black belting office 365 security with secure score
O365Engage17 - Black belting office 365 security with secure score
NCCOMMS327 views
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017 von Andrew Miller
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
Andrew Miller1.3K views

LuminrDRPresentation_AITP_October2014.pptx

  • 1. Presented by Abdiel Louis and Tim Krupinski LUMINR Business Continuity and Disaster Readiness
  • 2. Abdiel Louis Co-Founder at Luminr and a Senior IT Architect in the payment industries, where he leads and designs Private Cloud and Identity Management solutions between cross functional platforms safeguarding global clients. He has over ten years of experience integrating and delivering technology solutions. Solution Architect with SageLogix and Co-Founder at Luminr, specializing in platform migrations and operational efficiency improvement. He has worked on platforms in the Financial, Healthcare, Enterprise Support and Government industries since 2005. About.(Luminr) Tim Krupinski
  • 3. Business Drivers • How: Storage • What: Disaster Recovery • Why: Data Protection • When: Disaster Recovery • Challenges and Special Considerations • Business Continuity and Disaster Readiness Steps
  • 4. What is Disaster Recovery? Disaster recovery (DR) : set of policies and procedures to enable the recovery or continuation of critical business and it supporting technological infrastructure following a disaster. • Some Popular Culprits • Natural Disasters • Fire or Earthquake • Terrorist Attacks • Not-So-Popular Culprits • Junior Admins • “Accidental” loss of data
  • 5. A Look at the Data In a 2012 study, Enterprises reported that • Nearly 50% of system downtime was caused by Human Error or Unexpected Updates & Patching • Only 5% of downtime caused by an actual disaster 2011 Acronis Study of 6,000 IT Organizations • 86% of companies experienced downtime in the previous 12 months • 60% caused by human error • Average downtime was over 2 days • Average cost of downtime was $366,000 per year
  • 6. Why is Data Protection Important? Data Accessibility • Anywhere Encryption • In-transit • At rest Encryption Mechanism • AES 256 Security boundaries • Logical • Physical
  • 7. How to Manage and Allocate Storage? Sizing Critial Data • 1:4 (1GB of data requires 4GB capacity) Identifying the Cost and Probability of Downtime • Fitting into your existing infrastructure • Third party Cloud Storage • Azure • Amazon • Iron Mountain, and more…
  • 8. When is Disaster Recover Appropriate? • Business Directive dependent • Backup ALONE is NOT Disaster Recovery • Network • Access • Bandwidth • Data Categories/Sets • Be Strategic; Not Reactionary • Rentention • Finanacial institutions - 7 years
  • 9. Challenges and Special Considerations • Rules, regulations, and restrictions • Data Security/Location Requirements • Off Site Requirements • Recovery Time Objectives (RTO) • Infrastructure Compatibility
  • 10. Recover Time Objective Critical Business Activities Availability * Labor cost association + Revenue impact
  • 11. Business Continuity and Disaster Readiness 1. Identify and list critical business activities that satisfy your business operations 2. Identify the critical business information needed for these activities to complete successfully 3. Create a checklist of your core system processes • Functional area • Sequential approach to come back online • Disaster recovery test 4. Following your checklist, can you recover post disaster/impact, smoothly without affect your bottom-line?
  • 12. Questions? Thank You! Contact info: Abdiel Louis | Abdiel@luminr.com Tim Krupinski | Tim@luminr.com