SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
IBM Global Technology Services                                  May 2011
Thought Leadership White Paper




Proactive technical support:
The overlooked essential in
business resilience
Combine hardware and software technical support with business
continuity and disaster recovery plans
2    Proactive technical support: The overlooked essential in business resilience




Contents                                                                            In fact, in light of the risks associated with business disruptions
                                                                                    in today’s climate, responses to the IBM Global IT Risk Study—
    2 Introduction                                                                  a comprehensive online survey of 556 IT managers and others
    4 Addressing risk driven by business, events and data                           primarily involved in their business’s IT functions—uncovered a
                                                                                    surprising paradox. Fifty-four percent of respondents said their
    5 Redefining the requisite elements of business resilience                       overall approach to mitigating IT risk was good. However, only
                                                                                    23 percent of respondents believed their organizations were well
    6 Foundational business continuity for today’s
                                                                                    prepared for hardware and software system failures. And when
      infrastructures
                                                                                    asked to list the kinds of risk issues they had dealt with in the
    8 Beyond foundational resiliency: transferring risk                             previous 12 months, respondents ranked systems failures second
                                                                                    only to security breaches.1
10 Essential characteristics of a business resilience vendor
                                                                                    As the respondents’ experiences would indicate, hardware and
11 IBM’s business resilience capabilities
                                                                                    software support are critical to an effective business resilience
12 For more information                                                             strategy. Yet organizations often spend their time focusing on
                                                                                    other, albeit equally important, elements of business continuity,
                                                                                    including a range of provisions to avert interruptions—from
Introduction                                                                        normal business events to unforeseen catastrophes. These provi-
Today’s business environments are at their most complex.
                                                                                    sions include backup servers, data mirroring, data backups,
Enterprises continue to undergo rapid change while facing the
                                                                                    offsite data storage and disaster recovery. While all of these ele-
heightened impact of business disruptions and coping with a
                                                                                    ments are critical, they can fall short of meeting daily needs for
volatile financial and regulatory landscape. The possibility for
                                                                                    system availability. Without hardware and software viability,
business disruptions has increased exponentially, and so have the
                                                                                    organizations are only as strong as their weakest link.
ramifications. Yet when planning for business continuity, many
organizations overlook the importance of technical support.
                                                                                    For example, one of the basic tenets of business resilience is
Hardware and software failures are often perceived as routine
                                                                                    maintaining data and service availability, both of which are
occurrences, but without a proactive management approach,
                                                                                    directly threatened when software and hardware failures occur.
they can quickly evolve into full-blown disasters with significant
                                                                                    Unplanned outages can create far-reaching consequences that
financial and reputational consequences. For this reason, success-
                                                                                    impact long-term revenue streams, brand reputation and sur-
ful organizations reinforce their business resilience strategy with
                                                                                    vival. The potential impact may be more prevalent than previ-
proactive hardware and software technical support. As shown in
                                                                                    ously thought. In fact, a March 2011 report on UK businesses
responses to the 2010 IBM Global IT Risk Study, many others
                                                                                    revealed that more than 80 percent of business interruptions in
still do not.
                                                                                    2010 were due to hardware failures. The report also revealed
                                                                                    that more than 50 percent of hardware failures were a result
                                                                                    of inadequate maintenance in place to protect equipment
                                                                                    against failures.2
IBM Global Technology Services   3




Software errors can be equally damaging. In late 2009, a major       What are the provisions for releasing fixes and updates for
online reseller saw its site crash, just in time for holiday shop-   microcode and business-critical applications, and for ensuring
ping, due to a software error that collided with a surge in web      that these are applied at every endpoint where the applications
site traffic.3 In January 2009, Google’s search engine erroneously   are in use? Security patches can require distribution in near real
notified users that every web site worldwide was potentially          time. Is the organization prepared to do so?
malicious, including its own. A programmer’s misplaced forward
slash (/) was to blame.4 In another case, a software problem con-    What is the plan to prevent servers that house customer-
tributed to a rail car fire in a major underground metro system       facing web services from crashing?
in 2007 when software designed to monitor performance did not
detect overheating.5 The 2003 North America blackout was trig-       This white paper will discuss the foundational elements of a
gered by a local outage that went undetected due to a flaw in the     strong business resilience plan, which must holistically include
monitoring software.6                                                not only the generally established capabilities for business
                                                                     continuity and disaster recovery but also hardware and
Even with these numerous occurrences, effective hardware             software support.
and software support—while often addressed within the
organization—are often not included as part of a comprehensive
business resiliency plan; in many cases business continuity is
                                                                     In a recent survey of 200 disaster recovery
managed in one silo, and hardware and software support in            decision makers and influencers conducted
another, hindering cross-infrastructure visibility and leaving the
                                                                     jointly by Forrester and the Disaster Recov-
business exposed to risk.
                                                                     ery Journal (see Figure 1), when asked,
Organizations must be able to answer questions like:                 “What was the cause(s) of your most recent
What would happen if a Microsoft Exchange server on
                                                                     disaster declaration(s) or major business dis-
which corporate emails are stored were to crash? Are there pro-      ruption?”, twenty-four percent of respondents
visions for server technical support and maintenance, in addition    cited IT hardware failure, second only behind
to backup servers?
                                                                     power failure. Eleven percent of respondents
How long, if at all, would business operations continue if an        cited software failure as the culprit.7
email server became unavailable?
4   Proactive technical support: The overlooked essential in business resilience




                                             “What is the cause(s) of your most significant disaster declaration(s)
                                                                or major business disruption?”

                                                                     Power failure                                               44%

                                                              IT hardware failure                                24%

                                                                  Network failure                          15%

                                                                     Winter storm                      14%

                                                                     Human error                      13%

                                                                               Flood                  13%

                                                               IT software failure                   11%

                                                                                   Fire         6%

                                                                               Other           5%

                                                                         Hurricane             4%

                                                                           Tornado        2%

                                                                      Earthquake          1%

                                                               Terrorism                  1%
                                       We have not declared a disaster or
                                                                                                                          36%
                                         had a major business disruption

                                      Base: 200 disaster recovery decision makers and influencers at business globally (multiple responses accepted)
                                      Source: Forrester/Disaster Recovery Journal November 2010 Global Disaster Recovery Preparedness Online



Figure 1: A 2010 Forrester/Disaster Recovery Journal survey revealed hardware failures were ranked second only to power failures as the most common source
of a recent disaster or business disruption.



Addressing risk driven by business, events                                                            Most business resilience strategies address business-driven
and data                                                                                              events, such as audits, new product rollouts, future marketing
A comprehensive, successful business resilience strategy includes                                     promotions, or failure to meet industry standards. They also
provisions for ensuring continuous business operations and                                            address event-driven risks, such as natural disasters, regional
around-the-clock global service delivery, providing the ability                                       power outages, acts of war or economic downturns. In fact,
to act with speed and agility when an unforeseen event strikes.                                       organizations today may be the best prepared to manage the lat-
To accomplish this, organizations must address all potential chal-                                    ter, understanding the need to quickly react to revenue shortfalls
lenges to business resilience, which can be divided into three                                        and drastic shifts in business goals.
categories: business-, event- and data-driven events.
IBM Global Technology Services   5




The missing piece for many business resilience strategies is in      Redefining the requisite elements of business resilience
effectively and proactively addressing the possibility of data-      Most business resilience plans have mainly focused on business
driven events, such as data corruption, disk failure, application    continuity and disaster recovery, including provisions for backup
outages and network problems—which can sometimes be traced           servers, data mirroring and failover to protect data after failures
to software or hardware system failures. The reality is that if      occur, but in order to prevent failures, organizations must take a
organizations have a strong business continuity program that         more holistic approach by incorporating hardware and software
includes network, application and data security but inadequate       maintenance and support into the overall business resilience
levels of technical support, they are putting the business at risk   plan. Both prevention and remediation are critical, yet often the
on a day-to-day basis. An operating system without the latest        two are addressed by separate IT teams. This makes it difficult
patches and fixes installed can spread a virus to backup servers,     to provide a cohesive approach to business resilience that can
for example. Likewise, an older version of microcode on a server     cover enterprise and work area risk, IT stability, recoverability of
can cause failures when new applications are installed.              the IT infrastructure, data backup and disaster recovery—as well
                                                                     as availability of critical data and business applications. It is these
                                                                     last two, data and application availability, that require a compre-
                                                                     hensive hardware and software support strategy that can meet
Indian bank speeds time to market by combining disaster
                                                                     the demands of enterprises facing rapid change and a volatile,
recovery with IT infrastructure maintenance
                                                                     highly regulated marketplace—a marketplace that depends on
A regional bank in India wanted to provide “anywhere bank-           the secure and continuous flow of information. Uninterrupted
ing” services to customers to secure competitive advantage,          business operations, and even ongoing business strategy, hinge
yet its small IT team was unable to manage the undertaking           on the ability of hardware and software to enable the transforma-
alone. The bank engaged IBM to build a comprehensive
                                                                     tion of data into that information. Addressed separately, technol-
business resilience plan that combined disaster recovery—
                                                                     ogy, software and hardware, and even the data they contain,
including procedure documentation and drill support—and
                                                                     become useless. Integrating the layers of business resilience, and
IT infrastructure maintenance, including 24×7 comprehensive
monitoring and management services for servers, storage,             addressing hardware and software support within those layers
networks, security, backup and databases. The combined               (see Figure 2), is essential.
disaster recovery and infrastructure maintenance strategy
reduced the bank’s upfront capital expenditure for web-
facing systems. It also eliminated the need for multivendor
coordination, enabling the bank to better use existing IT
staff and ultimately increase time to market for new service
delivery. Total cost of ownership went down while ROI
increased.
6      Proactive technical support: The overlooked essential in business resilience




                                   Risk mitigation strategies                                  Freight railroad increases efficiency and flexibility with
                                                                                               new business resilience plan
                                                 Business             Data            Event
                                                  driven             driven           driven   A North American freight railroad that services 23 states
                                                                                               and two Canadian provinces relies heavily on 24×7 applica-
                                                                                               tion availability but lacked a disaster recovery facility. The
                          Strategy and vision                                                  company worked with IBM to establish data mirroring
                                                                                               capabilities that would help them achieve near real-time
                                Organization                                                   recovery point objectives, as well as hardware and software
                                                                                               maintenance and support across multiple vendors.
                                  Processes
                                                                                               Afterward, the railroad incorporated all its equipment and
    Technical support




                                                                                               applications, from IBM and other vendors, into a comprehen-
                                                                                               sive business resilience plan. The transition was so seamless
                        Applications and data                                                  that customers and supply chain partners requested that
                                                                                               additional applications be included in the plan. By adding
                                  Technology                                                   new technologies like virtualization into their data center, the
                                                                                               railroad established data center portability, self-healing and
                                    Facilities                                                 greater flexibility during business recovery.


                                                      Business resilience
                                                                                               Foundational business continuity for
Figure 2: To maintain the continuous flow of information required to support                    today’s infrastructures
uninterrupted business operations, each layer shown above must be inte-                        Best-in-class companies take a holistic approach that combines
grated within a comprehensive business resilience framework that provides
for business-, event- and data-driven events. Hardware and software support
                                                                                               planning, prevention and remediation to help solidify ongoing
should be addressed within the technology, applications and data, and                          business operations. Yet this may be easier to accomplish in the-
processes layers.                                                                              ory than in practice. The challenge is that today’s data center is a
                                                                                               mixture of vendor products and platforms, and is more difficult
                                                                                               to support in a coherent way. Faced with staffing and budget
                                                                                               limitations, few organizations can maintain a stable of experts on
                                                                                               every platform and product on which they do business. This
                                                                                               adds complexity to maintaining not only data availability, but
                                                                                               also security and consistent resilience policy enforcement.
IBM Global Technology Services   7




With this in mind, a comprehensive business resilience strategy                     ●   Appropriate system redundancy, ranging from onsite backup
built for the needs of today’s IT infrastructures should include:                       servers and storage to offsite mirrored systems with automatic
                                                                                        failover
●   A tested and proven business resilience program and plan that                   ●   Security, privacy and data protection to guard against internal
    addresses business continuity, disaster recovery and hardware                       threats (such as data theft) and external threats (such as viruses)
    and software support                                                            ●   Technical processes, including change management and appli-
●   Support for regulatory compliance and governance                                    cation testing, that help prevent system failures
    requirements                                                                    ●   Hardware maintenance and support for multivendor
●   Consistent policy enforcement across departments, corporate                         environments
    divisions and global locations                                                  ●   Software maintenance and support that provides fast access to
●   Offsite data center and work area recovery capabilities,                            deeply skilled expertise
    including alternate employee workspaces                                         ●   Remote support capabilities (including execution of fixes and
●   A tested and proven data backup and archiving system with                           patches) and web self-service to provide access to technical
    offsite storage                                                                     expertise, help prevent failures and speed problem
                                                                                        determination and resolution.



                                            IBM’s Modular Support Services Are Designed to Optimize Your
                                                            Support Today and Tomorrow


                                                                Support Continuum                    Integrated infrastructure
                                                                                                     availability management
                                                                                                     Single point of accountability
                                                                                                     Adaptive service levels
                                                                     Integrated hardware and
                                                                                                     Multi-vendor support
                                                                     software support
                                                                                                     Contract and inventory
                                                                     Preventative hardware and
                                                                                                     management
                                                                     software support
                             Client value




                                                                                                     Customized support
                                                                     System monitoring and
                                                                     automated services

                                             Hardware support                                     Managed support
                                             Software support
                                             Remote Support
                                             Web self-service                            Enhanced support


                                                                             Support

                                                  Foundation                Proactive                       Preventive


Figure 3: Hardware and software support is a foundational component of business resilience. Organizations can further enhance business continuity by adding
capabilities such as system monitoring and integrated infrastructure availability management.
8   Proactive technical support: The overlooked essential in business resilience




                                                                                   Beyond foundational resiliency:
IT services provider leverages single contact for disaster                         transferring risk
recovery                                                                           No matter the approach to developing a business resilience strat-
A company that provides a passenger service system and                             egy, every organization must first understand its risks and then
data center services for one of the largest airlines in                            take action to mitigate those risks. For risk mitigation, it is
Indonesia had a local backup system in place but no disaster                       sometimes more cost-effective and strategic to transfer the risk
recovery solution, which the company needed to implement                           to a skilled vendor rather than invest in the skills training and
prior to their initial public offering. The company engaged                        capital outlays that may be required to maintain consistent and
IBM to create a comprehensive disaster recovery solution                           high-functioning business operations in the face of a business-,
with ongoing disaster recovery support, including a data                           event- or data-driven event. In this case, managed support (see
center and disaster recovery center facility, 24×7 managed                         Figure 3) can help organizations achieve enhanced IT availability
services, and mainframe maintenance. Today, the company
                                                                                   to support the continuous availability of business operations.
has a single point of contact for hardware and a majority of
its software and operating systems, services and communi-
cations; a comprehensive disaster recovery solution; and a                         Organizations seeking advanced capabilities for business conti-
secure environment for its IT equipment.                                           nuity and disaster recovery may require:

                                                                                   Event-driven managed services to meet recovery time and
                                                                                   recovery point objectives after a business disruption, including
Japanese business achieves one-day disaster recovery
                                                                                   fast backups, restores and critical data archiving, to help mitigate
and critical hardware support
                                                                                   business impact. Other capabilities that may be required include
Previously, the largest publication distributor in Japan                           workload balancing, limiting data loss via email recovery and
managed the recovery of its bookstores’ operating systems                          supporting workforce resiliency through emergency
and applications in-house—a time-consuming, resource-                              notifications.
intensive process. The company needed to accelerate the
recovery of mission-critical files and applications during fre-
                                                                                   Outsourced recovery of IT and business infrastructures, includ-
quent unplanned outages. Today, IBM provides file recovery
support and disaster recovery services for the company’s                           ing work areas, from disruptions to help reduce costs and time-
applications, operating systems and hardware within one                            frames related to lost employee productivity. Capabilities for
business day. IBM also provides ongoing maintenance and                            maintaining continuity of critical systems, protecting against loss
software troubleshooting services. The company has                                 of key business data and employee productivity, and meeting
improved service levels, and outsourcing enables the distrib-                      regulatory compliance mandates can help prevent business
utor’s IT team to focus on core competencies while reducing                        disruptions.
recovery costs.
IBM Global Technology Services   9




Security-rich, automated protection of critical business data          failures and remove complexity. As new solutions are added to
through onsite and offsite cloud-based services to reduce the          the infrastructure, they create additional points of failure. Proper
need for infrastructure build-out to protect and store massive         change orchestration across hardware and software updates and
amounts of data.                                                       maintenance is crucial.

Auditable compliance with general and industry-specific regula-         A single point of accountability across vendors based on consis-
tory requirements to help track data access and prove data pro-        tently agreed upon and continuously monitored service levels,
tection to avoid violations. Unproven security policies and            which can significantly improve availability management and
procedures for widely distributed data can open the door to            speed time to resolution by avoiding finger pointing during
public disclosure requirements.                                        problem isolation.

Holistic support focused on application availability for the end       Proactive monitoring to minimize or eliminate the business
user rather than isolated server and storage availability. A view      impact of technical problems by continually tracking the health
into how hardware availability affects software availability, which,   of the IT infrastructure via real-time dashboards, which can help
in turn, greatly impacts business continuity, is critical.             anticipate future problems and notify IT to take preventive
                                                                       action.
Deep technology expertise, including an understanding of the
inter-relation between applications and infrastructure compo-          Contract and inventory management capabilities, which are
nents, especially in complex environments such as virtualization.      essential to maintaining compliance and controlling IT asset
Today, services and resources are distributed across what had          costs. License compliance and inventories can be tracked auto-
been isolated domains—which means older management tools               matically, removing manual, inaccurate oversight while avoiding
may be ineffective. Deep expertise and insight can prevent             over-purchasing and under-licensing.
hardware and software failures from impacting business-critical
services.                                                              Customized support, which is especially relevant for multivendor,
                                                                       multidomain environments where complex dependencies can
Integrated hardware and software capabilities, including cross-        wreak havoc on administrators who do not have the insight or
platform and multivendor technical support and proactive               time to manage this type of infrastructure.
microcode and release management, which can help prevent
10 Proactive technical support: The overlooked essential in business resilience




                                                                                  ●   Globally consistent services, from simple break-fix to compre-
Data storage company transfers risk to improve service                                hensive, end-to-end support capabilities, so that every location
delivery                                                                              can access immediate expertise to resolve events
                                                                                  ●   The ability to anticipate problems and provide proactive guid-
A data storage company that provides hardware devices
                                                                                      ance to meet required service level agreements
and data management software to customers in virtually
every industry had previously provided ongoing product
                                                                                  ●   Proof of potential cost savings via outsourced support that may
support via internal resources and a network of seven indi-                           include remote support tools and staff as well as management
vidual third-party maintainers (TPMs) in the United States                            of contracts, warranties and asset inventories
and dozens of TPMs worldwide. Product support was poor,                           ●   Understanding of global business needs and IT strategies, an
and the business suffered. The company integrated its cus-                            essential characteristic for organizations focused on maintain-
tomer relationship management system with IBM’s, allowing                             ing competitive advantage
IBM service representatives and engineers to respond to                           ●   Remote and automated tools, which can help control the
technical support calls and requests for on-site support.                             labor costs of maintaining the IT infrastructure and also speed
Providing customers with a single point-of-contact and a sin-                         problem resolution
gle workflow for all calls reduces the number of interactions                      ●   Proactive monitoring and event notifications to prevent busi-
while improving service quality. The cost savings for the first
                                                                                      ness disruptions
year was approximately US$8 million, with a possible cost
                                                                                  ●   Parts replacement capabilities, on time, at the right locations
savings over five years of more than US$40 million.



                                                                                  Assessing risk
Essential characteristics of a business
                                                                                  An effective business resilience plan must begin with a
resilience vendor                                                                 thorough risk analysis:
Organizations looking to solidify business resilience should care-
fully consider the capabilities of the vendor(s) with whom they                   ●   Rank threats based on past occurrences, the amount of
choose to work. A business resilience vendor should be able to                        potential revenue loss, damage to the brand, compliance
provide:                                                                              risks and single points of failure
                                                                                  ●   Prioritize safeguards, including provisions for hardware
                                                                                      and software support, business continuity and disaster
●   Global leadership in technical expertise, including broad infra-
                                                                                      recovery
    structure competence and deep, multiplatform technology                       ●   Conduct a cost-benefit analysis for a quantitative risk
    skills                                                                            assessment
●   Highly responsive, international support for the full scope of                ●   Determine next steps based on threat severity, selected
    IT infrastructure operations, both current operations and                         safeguards, and the cost and ease of implementation.
    operations scoped for near-term and long-term expansion
                                                                                  Take the IBM risk self-assessment
IBM Global Technology Services 11




IBM’s business resilience capabilities                               For technical support, IBM provides nearly 15,000 technicians
Through IBM, organizations can obtain all the foundational           and support personnel, 400 parts distribution centers and more
capabilities needed for a solid business resilience strategy         than 80 support centers located worldwide, so that organizations
, including business continuity, disaster recovery and hardware      can expect responsiveness no matter where they are located,
and software technical support, that can fully address business-,    including 24×7 service logistics network availability. For business
event- and data-driven risks to the business. In addition,           continuity support, organizations can look to IBM’s extensive
IBM can provide proof of potential cost savings of between           infrastructure investments; more than 1,800 dedicated business
5 and 40 percent, depending on the current state of the support      continuity professionals; more than 150 business resilience cen-
environment and how much support is out-tasked.8 IBM’s depth         ters located worldwide; and the depth of knowledge drawn from
of expertise—across multiple vendor platforms—and breadth of         more than 50 years of business resilience and disaster recovery
resilience capabilities are designed to support today’s complex IT   experience with more than 12,000 disaster recovery clients—all
infrastructures.                                                     of which has led respected industry analysts to recognize IBM as
                                                                     a leader in business continuity and resilience.
For more information
To learn more about building a foundational business resilience
strategy, please contact your IBM marketing representative or
IBM Business Partner, or visit the following websites:
●   ibm.com/services/continuity
●   ibm.com/services/maintenance                                      © Copyright IBM Corporation 2011

                                                                      IBM Corporation
                                                                      Software Group
About the authors                                                     Route 100
Richard Cocchiara                                                     Somers, NY 10589
Distinguished Engineer                                                U.S.A.
Business Continuity & Resiliency Services                             Produced in the United States of America
Global Technology Services                                            May 2011
                                                                      All Rights Reserved

Patrick Corcoran                                                      IBM, the IBM logo and ibm.com are trademarks of International Business
Global Client Solution Executive                                      Machines Corporation in the United States, other countries or both. If these
                                                                      and other IBM trademarked terms are marked on their first occurrence in
Business Continuity & Resiliency Services                             this information with a trademark symbol (® or ™), these symbols indicate
Global Technology Services                                            U.S. registered or common law trademarks owned by IBM at the time this
                                                                      information was published. Such trademarks may also be registered or
                                                                      common law trademarks in other countries. A current list of IBM trademarks
Kevin Crowley                                                         is available on the web at “Copyright and trademark information” at
Global Sr. Market Segment Manager                                     ibm.com/legal/copytrade.shtml
Maintenance & Technical Support                                       Microsoft is a trademark of Microsoft Corporation in the United States,
IBM Global Technology Services                                        other countries, or both.

                                                                      Other company, product or service names may be trademarks or service
                                                                      marks of others.

                                                                      References in this publication to IBM products or services do not imply that
                                                                      IBM intends to make them available in all countries in which IBM operates.
                                                                  1
                                                                      2010 IBM Global IT Risk Study, IBM Institute for Business Value in
                                                                      partnership with the Economist Intelligence Unit.
                                                                  2
                                                                      “IT Failure And Power Challenge UK Business Continuity,” eWEEK Europe,
                                                                      March 7, 2011.
                                                                  3
                                                                      “eBay Giving Out Coupons and Other Compensation after Website Crash,”
                                                                      MaximumPC, November 24, 2009.
                                                                  4
                                                                      “Google Mistakes Entire Web for Malware,” The Register, January 31, 2009.
                                                                  5
                                                                      “Surge Caused Fire in Rail Car,” The Washington Times, April 2, 2007.
                                                                  6
                                                                      “Software Bug Contributed to Blackout,” SecurityFocus, February 11, 2004.
                                                                  7
                                                                      Disaster Recovery Journal and Forrester Research have jointly conducted
                                                                      industry studies for four years. The surveys track changes, trends and future
                                                                      development. Information from the 2011 survey is reprinted in this article
                                                                      with permission.
                                                                  8
                                                                      Savings based on IBM Maintenance and Technology Services customer
                                                                      implementations.


                                                                               Please Recycle




                                                                                                                           MTW03008-USEN-01

Weitere ähnliche Inhalte

Was ist angesagt?

Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Redspin, Inc.
 
Business Continuity for Mission Critical Applications
Business Continuity for Mission Critical ApplicationsBusiness Continuity for Mission Critical Applications
Business Continuity for Mission Critical ApplicationsDataCore Software
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...UBM_Design_Central
 
Whitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructureWhitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructureJake Weaver
 
ITFM Business Brief
ITFM Business BriefITFM Business Brief
ITFM Business Briefwdjohnson1
 
Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Iron Mountain
 
How to Close the SecOps Gap
How to Close the SecOps GapHow to Close the SecOps Gap
How to Close the SecOps GapBMC Software
 
PMCD Fall 2015 Newsletter
PMCD Fall 2015 NewsletterPMCD Fall 2015 Newsletter
PMCD Fall 2015 NewsletterSandeep Raju
 
Tutorial joaopascoalfaria-2confcmmiportugal-v1-3-split
Tutorial joaopascoalfaria-2confcmmiportugal-v1-3-splitTutorial joaopascoalfaria-2confcmmiportugal-v1-3-split
Tutorial joaopascoalfaria-2confcmmiportugal-v1-3-splitisabelmargarido
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data BackupsGFI Software
 
All clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equalAll clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equalNicholas Cramer
 
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...Energy Network marcus evans
 
Business Resiliency
Business ResiliencyBusiness Resiliency
Business ResiliencyRackspace
 
Module 4 disaster recovery student slides ver 1.0
Module 4 disaster recovery   student slides ver 1.0Module 4 disaster recovery   student slides ver 1.0
Module 4 disaster recovery student slides ver 1.0Aladdin Dandis
 

Was ist angesagt? (20)

Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011
 
Business Continuity for Mission Critical Applications
Business Continuity for Mission Critical ApplicationsBusiness Continuity for Mission Critical Applications
Business Continuity for Mission Critical Applications
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
 
Whitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructureWhitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructure
 
ITFM Business Brief
ITFM Business BriefITFM Business Brief
ITFM Business Brief
 
Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?
 
Security Feature Cover Story
Security Feature Cover StorySecurity Feature Cover Story
Security Feature Cover Story
 
Avoiding Data Breaches in 2016: What You Need to Kow
Avoiding Data Breaches in 2016: What You Need to Kow Avoiding Data Breaches in 2016: What You Need to Kow
Avoiding Data Breaches in 2016: What You Need to Kow
 
How to Close the SecOps Gap
How to Close the SecOps GapHow to Close the SecOps Gap
How to Close the SecOps Gap
 
PMCD Fall 2015 Newsletter
PMCD Fall 2015 NewsletterPMCD Fall 2015 Newsletter
PMCD Fall 2015 Newsletter
 
Tutorial joaopascoalfaria-2confcmmiportugal-v1-3-split
Tutorial joaopascoalfaria-2confcmmiportugal-v1-3-splitTutorial joaopascoalfaria-2confcmmiportugal-v1-3-split
Tutorial joaopascoalfaria-2confcmmiportugal-v1-3-split
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data Backups
 
All clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equalAll clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equal
 
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
 
Business Resiliency
Business ResiliencyBusiness Resiliency
Business Resiliency
 
Avoiding Data Breaches in 2016: What You Need to Know
Avoiding Data Breaches in 2016: What You Need to Know Avoiding Data Breaches in 2016: What You Need to Know
Avoiding Data Breaches in 2016: What You Need to Know
 
Effective Communications in Business Continuity Planning
Effective Communications in Business Continuity PlanningEffective Communications in Business Continuity Planning
Effective Communications in Business Continuity Planning
 
Insights on it risk bcm
Insights on it risk bcmInsights on it risk bcm
Insights on it risk bcm
 
Module 4 disaster recovery student slides ver 1.0
Module 4 disaster recovery   student slides ver 1.0Module 4 disaster recovery   student slides ver 1.0
Module 4 disaster recovery student slides ver 1.0
 
Patch Management
Patch ManagementPatch Management
Patch Management
 

Ähnlich wie Mtw03008 usen

Business Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your BusinessBusiness Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your Businessat MicroFocus Italy ❖✔
 
P r o t e c t i n g y o u r b u s i n e s s
P r o t e c t i n g y o u r b u s i n e s sP r o t e c t i n g y o u r b u s i n e s s
P r o t e c t i n g y o u r b u s i n e s smatele41
 
IBM XIV® Storage System: Engineered for Business Continuity
IBM XIV® Storage System: Engineered for Business ContinuityIBM XIV® Storage System: Engineered for Business Continuity
IBM XIV® Storage System: Engineered for Business ContinuityIBM India Smarter Computing
 
Business horizonsweston
Business horizonswestonBusiness horizonsweston
Business horizonswestonIkram KASSOU
 
2012 security services clientprex
2012 security services clientprex2012 security services clientprex
2012 security services clientprexKim Aarenstrup
 
Virtualization for Midsize Businesses: Keep Your Foot on the Accelerator
Virtualization for Midsize Businesses: Keep Your Foot on the AcceleratorVirtualization for Midsize Businesses: Keep Your Foot on the Accelerator
Virtualization for Midsize Businesses: Keep Your Foot on the AcceleratorIBM India Smarter Computing
 
Gaining efficiency and business value through effective management of your IT...
Gaining efficiency and business value through effective management of your IT...Gaining efficiency and business value through effective management of your IT...
Gaining efficiency and business value through effective management of your IT...IBM India Smarter Computing
 
Business continuity management and the extended enterprise
Business continuity management and the extended enterpriseBusiness continuity management and the extended enterprise
Business continuity management and the extended enterpriseGeorge Coutsoumbidis
 
WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]Jeremiah Grossman
 
My Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David BustinMy Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David BustinDavid Bustin
 
Strategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationStrategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationBooz Allen Hamilton
 
Mesabi Group paper: Rethink Data Protection and Retention Now Merchandising
Mesabi Group paper: Rethink Data Protection and Retention Now Merchandising Mesabi Group paper: Rethink Data Protection and Retention Now Merchandising
Mesabi Group paper: Rethink Data Protection and Retention Now Merchandising IBM India Smarter Computing
 
End of life Windows/SQL 2008 migration to Azure
End of life Windows/SQL 2008 migration to AzureEnd of life Windows/SQL 2008 migration to Azure
End of life Windows/SQL 2008 migration to AzureNovaQuantum
 
GLOBAL ASSET, INC. (GAI) Global Asset, Inc. (GAI) is a fin.docx
GLOBAL ASSET, INC. (GAI) Global Asset, Inc. (GAI) is a fin.docxGLOBAL ASSET, INC. (GAI) Global Asset, Inc. (GAI) is a fin.docx
GLOBAL ASSET, INC. (GAI) Global Asset, Inc. (GAI) is a fin.docxbudbarber38650
 
Taming the data demons: leveraging information in the age of risk white paper
Taming the data demons: leveraging information in the age of risk white paperTaming the data demons: leveraging information in the age of risk white paper
Taming the data demons: leveraging information in the age of risk white paperIBM India Smarter Computing
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recoveryVMware_EMEA
 

Ähnlich wie Mtw03008 usen (20)

Business Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your BusinessBusiness Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your Business
 
P r o t e c t i n g y o u r b u s i n e s s
P r o t e c t i n g y o u r b u s i n e s sP r o t e c t i n g y o u r b u s i n e s s
P r o t e c t i n g y o u r b u s i n e s s
 
IBM XIV® Storage System: Engineered for Business Continuity
IBM XIV® Storage System: Engineered for Business ContinuityIBM XIV® Storage System: Engineered for Business Continuity
IBM XIV® Storage System: Engineered for Business Continuity
 
Business horizonsweston
Business horizonswestonBusiness horizonsweston
Business horizonsweston
 
2012 security services clientprex
2012 security services clientprex2012 security services clientprex
2012 security services clientprex
 
Virtualization for Midsize Businesses: Keep Your Foot on the Accelerator
Virtualization for Midsize Businesses: Keep Your Foot on the AcceleratorVirtualization for Midsize Businesses: Keep Your Foot on the Accelerator
Virtualization for Midsize Businesses: Keep Your Foot on the Accelerator
 
Prevent & Protect
Prevent & ProtectPrevent & Protect
Prevent & Protect
 
It Budget Tips
It Budget TipsIt Budget Tips
It Budget Tips
 
Gaining efficiency and business value through effective management of your IT...
Gaining efficiency and business value through effective management of your IT...Gaining efficiency and business value through effective management of your IT...
Gaining efficiency and business value through effective management of your IT...
 
Ssw03005 usen1
Ssw03005 usen1Ssw03005 usen1
Ssw03005 usen1
 
White Paper: Mobile Security
White Paper: Mobile SecurityWhite Paper: Mobile Security
White Paper: Mobile Security
 
Business continuity management and the extended enterprise
Business continuity management and the extended enterpriseBusiness continuity management and the extended enterprise
Business continuity management and the extended enterprise
 
WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]
 
My Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David BustinMy Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David Bustin
 
Strategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationStrategic Information Management Through Data Classification
Strategic Information Management Through Data Classification
 
Mesabi Group paper: Rethink Data Protection and Retention Now Merchandising
Mesabi Group paper: Rethink Data Protection and Retention Now Merchandising Mesabi Group paper: Rethink Data Protection and Retention Now Merchandising
Mesabi Group paper: Rethink Data Protection and Retention Now Merchandising
 
End of life Windows/SQL 2008 migration to Azure
End of life Windows/SQL 2008 migration to AzureEnd of life Windows/SQL 2008 migration to Azure
End of life Windows/SQL 2008 migration to Azure
 
GLOBAL ASSET, INC. (GAI) Global Asset, Inc. (GAI) is a fin.docx
GLOBAL ASSET, INC. (GAI) Global Asset, Inc. (GAI) is a fin.docxGLOBAL ASSET, INC. (GAI) Global Asset, Inc. (GAI) is a fin.docx
GLOBAL ASSET, INC. (GAI) Global Asset, Inc. (GAI) is a fin.docx
 
Taming the data demons: leveraging information in the age of risk white paper
Taming the data demons: leveraging information in the age of risk white paperTaming the data demons: leveraging information in the age of risk white paper
Taming the data demons: leveraging information in the age of risk white paper
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recovery
 

Kürzlich hochgeladen

Darshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdfDarshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdfShashank Mehta
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
Fundamentals Welcome and Inclusive DEIB
Fundamentals Welcome and  Inclusive DEIBFundamentals Welcome and  Inclusive DEIB
Fundamentals Welcome and Inclusive DEIBGregory DeShields
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Jiastral oracle
 
Neha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and CareerNeha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and Careerr98588472
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
71368-80-4.pdf Fast delivery good quality
71368-80-4.pdf Fast delivery  good quality71368-80-4.pdf Fast delivery  good quality
71368-80-4.pdf Fast delivery good qualitycathy664059
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
Customizable Contents Restoration Training
Customizable Contents Restoration TrainingCustomizable Contents Restoration Training
Customizable Contents Restoration TrainingCalvinarnold843
 
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfTypes of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfASGITConsulting
 
MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024Chandresh Chudasama
 

Kürzlich hochgeladen (20)

Darshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdfDarshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdf
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
Fundamentals Welcome and Inclusive DEIB
Fundamentals Welcome and  Inclusive DEIBFundamentals Welcome and  Inclusive DEIB
Fundamentals Welcome and Inclusive DEIB
 
Authentically Social - presented by Corey Perlman
Authentically Social - presented by Corey PerlmanAuthentically Social - presented by Corey Perlman
Authentically Social - presented by Corey Perlman
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
 
Neha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and CareerNeha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and Career
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
71368-80-4.pdf Fast delivery good quality
71368-80-4.pdf Fast delivery  good quality71368-80-4.pdf Fast delivery  good quality
71368-80-4.pdf Fast delivery good quality
 
Toyota and Seven Parts Storage Techniques
Toyota and Seven Parts Storage TechniquesToyota and Seven Parts Storage Techniques
Toyota and Seven Parts Storage Techniques
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
Customizable Contents Restoration Training
Customizable Contents Restoration TrainingCustomizable Contents Restoration Training
Customizable Contents Restoration Training
 
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfTypes of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdf
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024
 

Mtw03008 usen

  • 1. IBM Global Technology Services May 2011 Thought Leadership White Paper Proactive technical support: The overlooked essential in business resilience Combine hardware and software technical support with business continuity and disaster recovery plans
  • 2. 2 Proactive technical support: The overlooked essential in business resilience Contents In fact, in light of the risks associated with business disruptions in today’s climate, responses to the IBM Global IT Risk Study— 2 Introduction a comprehensive online survey of 556 IT managers and others 4 Addressing risk driven by business, events and data primarily involved in their business’s IT functions—uncovered a surprising paradox. Fifty-four percent of respondents said their 5 Redefining the requisite elements of business resilience overall approach to mitigating IT risk was good. However, only 23 percent of respondents believed their organizations were well 6 Foundational business continuity for today’s prepared for hardware and software system failures. And when infrastructures asked to list the kinds of risk issues they had dealt with in the 8 Beyond foundational resiliency: transferring risk previous 12 months, respondents ranked systems failures second only to security breaches.1 10 Essential characteristics of a business resilience vendor As the respondents’ experiences would indicate, hardware and 11 IBM’s business resilience capabilities software support are critical to an effective business resilience 12 For more information strategy. Yet organizations often spend their time focusing on other, albeit equally important, elements of business continuity, including a range of provisions to avert interruptions—from Introduction normal business events to unforeseen catastrophes. These provi- Today’s business environments are at their most complex. sions include backup servers, data mirroring, data backups, Enterprises continue to undergo rapid change while facing the offsite data storage and disaster recovery. While all of these ele- heightened impact of business disruptions and coping with a ments are critical, they can fall short of meeting daily needs for volatile financial and regulatory landscape. The possibility for system availability. Without hardware and software viability, business disruptions has increased exponentially, and so have the organizations are only as strong as their weakest link. ramifications. Yet when planning for business continuity, many organizations overlook the importance of technical support. For example, one of the basic tenets of business resilience is Hardware and software failures are often perceived as routine maintaining data and service availability, both of which are occurrences, but without a proactive management approach, directly threatened when software and hardware failures occur. they can quickly evolve into full-blown disasters with significant Unplanned outages can create far-reaching consequences that financial and reputational consequences. For this reason, success- impact long-term revenue streams, brand reputation and sur- ful organizations reinforce their business resilience strategy with vival. The potential impact may be more prevalent than previ- proactive hardware and software technical support. As shown in ously thought. In fact, a March 2011 report on UK businesses responses to the 2010 IBM Global IT Risk Study, many others revealed that more than 80 percent of business interruptions in still do not. 2010 were due to hardware failures. The report also revealed that more than 50 percent of hardware failures were a result of inadequate maintenance in place to protect equipment against failures.2
  • 3. IBM Global Technology Services 3 Software errors can be equally damaging. In late 2009, a major What are the provisions for releasing fixes and updates for online reseller saw its site crash, just in time for holiday shop- microcode and business-critical applications, and for ensuring ping, due to a software error that collided with a surge in web that these are applied at every endpoint where the applications site traffic.3 In January 2009, Google’s search engine erroneously are in use? Security patches can require distribution in near real notified users that every web site worldwide was potentially time. Is the organization prepared to do so? malicious, including its own. A programmer’s misplaced forward slash (/) was to blame.4 In another case, a software problem con- What is the plan to prevent servers that house customer- tributed to a rail car fire in a major underground metro system facing web services from crashing? in 2007 when software designed to monitor performance did not detect overheating.5 The 2003 North America blackout was trig- This white paper will discuss the foundational elements of a gered by a local outage that went undetected due to a flaw in the strong business resilience plan, which must holistically include monitoring software.6 not only the generally established capabilities for business continuity and disaster recovery but also hardware and Even with these numerous occurrences, effective hardware software support. and software support—while often addressed within the organization—are often not included as part of a comprehensive business resiliency plan; in many cases business continuity is In a recent survey of 200 disaster recovery managed in one silo, and hardware and software support in decision makers and influencers conducted another, hindering cross-infrastructure visibility and leaving the jointly by Forrester and the Disaster Recov- business exposed to risk. ery Journal (see Figure 1), when asked, Organizations must be able to answer questions like: “What was the cause(s) of your most recent What would happen if a Microsoft Exchange server on disaster declaration(s) or major business dis- which corporate emails are stored were to crash? Are there pro- ruption?”, twenty-four percent of respondents visions for server technical support and maintenance, in addition cited IT hardware failure, second only behind to backup servers? power failure. Eleven percent of respondents How long, if at all, would business operations continue if an cited software failure as the culprit.7 email server became unavailable?
  • 4. 4 Proactive technical support: The overlooked essential in business resilience “What is the cause(s) of your most significant disaster declaration(s) or major business disruption?” Power failure 44% IT hardware failure 24% Network failure 15% Winter storm 14% Human error 13% Flood 13% IT software failure 11% Fire 6% Other 5% Hurricane 4% Tornado 2% Earthquake 1% Terrorism 1% We have not declared a disaster or 36% had a major business disruption Base: 200 disaster recovery decision makers and influencers at business globally (multiple responses accepted) Source: Forrester/Disaster Recovery Journal November 2010 Global Disaster Recovery Preparedness Online Figure 1: A 2010 Forrester/Disaster Recovery Journal survey revealed hardware failures were ranked second only to power failures as the most common source of a recent disaster or business disruption. Addressing risk driven by business, events Most business resilience strategies address business-driven and data events, such as audits, new product rollouts, future marketing A comprehensive, successful business resilience strategy includes promotions, or failure to meet industry standards. They also provisions for ensuring continuous business operations and address event-driven risks, such as natural disasters, regional around-the-clock global service delivery, providing the ability power outages, acts of war or economic downturns. In fact, to act with speed and agility when an unforeseen event strikes. organizations today may be the best prepared to manage the lat- To accomplish this, organizations must address all potential chal- ter, understanding the need to quickly react to revenue shortfalls lenges to business resilience, which can be divided into three and drastic shifts in business goals. categories: business-, event- and data-driven events.
  • 5. IBM Global Technology Services 5 The missing piece for many business resilience strategies is in Redefining the requisite elements of business resilience effectively and proactively addressing the possibility of data- Most business resilience plans have mainly focused on business driven events, such as data corruption, disk failure, application continuity and disaster recovery, including provisions for backup outages and network problems—which can sometimes be traced servers, data mirroring and failover to protect data after failures to software or hardware system failures. The reality is that if occur, but in order to prevent failures, organizations must take a organizations have a strong business continuity program that more holistic approach by incorporating hardware and software includes network, application and data security but inadequate maintenance and support into the overall business resilience levels of technical support, they are putting the business at risk plan. Both prevention and remediation are critical, yet often the on a day-to-day basis. An operating system without the latest two are addressed by separate IT teams. This makes it difficult patches and fixes installed can spread a virus to backup servers, to provide a cohesive approach to business resilience that can for example. Likewise, an older version of microcode on a server cover enterprise and work area risk, IT stability, recoverability of can cause failures when new applications are installed. the IT infrastructure, data backup and disaster recovery—as well as availability of critical data and business applications. It is these last two, data and application availability, that require a compre- hensive hardware and software support strategy that can meet Indian bank speeds time to market by combining disaster the demands of enterprises facing rapid change and a volatile, recovery with IT infrastructure maintenance highly regulated marketplace—a marketplace that depends on A regional bank in India wanted to provide “anywhere bank- the secure and continuous flow of information. Uninterrupted ing” services to customers to secure competitive advantage, business operations, and even ongoing business strategy, hinge yet its small IT team was unable to manage the undertaking on the ability of hardware and software to enable the transforma- alone. The bank engaged IBM to build a comprehensive tion of data into that information. Addressed separately, technol- business resilience plan that combined disaster recovery— ogy, software and hardware, and even the data they contain, including procedure documentation and drill support—and become useless. Integrating the layers of business resilience, and IT infrastructure maintenance, including 24×7 comprehensive monitoring and management services for servers, storage, addressing hardware and software support within those layers networks, security, backup and databases. The combined (see Figure 2), is essential. disaster recovery and infrastructure maintenance strategy reduced the bank’s upfront capital expenditure for web- facing systems. It also eliminated the need for multivendor coordination, enabling the bank to better use existing IT staff and ultimately increase time to market for new service delivery. Total cost of ownership went down while ROI increased.
  • 6. 6 Proactive technical support: The overlooked essential in business resilience Risk mitigation strategies Freight railroad increases efficiency and flexibility with new business resilience plan Business Data Event driven driven driven A North American freight railroad that services 23 states and two Canadian provinces relies heavily on 24×7 applica- tion availability but lacked a disaster recovery facility. The Strategy and vision company worked with IBM to establish data mirroring capabilities that would help them achieve near real-time Organization recovery point objectives, as well as hardware and software maintenance and support across multiple vendors. Processes Afterward, the railroad incorporated all its equipment and Technical support applications, from IBM and other vendors, into a comprehen- sive business resilience plan. The transition was so seamless Applications and data that customers and supply chain partners requested that additional applications be included in the plan. By adding Technology new technologies like virtualization into their data center, the railroad established data center portability, self-healing and Facilities greater flexibility during business recovery. Business resilience Foundational business continuity for Figure 2: To maintain the continuous flow of information required to support today’s infrastructures uninterrupted business operations, each layer shown above must be inte- Best-in-class companies take a holistic approach that combines grated within a comprehensive business resilience framework that provides for business-, event- and data-driven events. Hardware and software support planning, prevention and remediation to help solidify ongoing should be addressed within the technology, applications and data, and business operations. Yet this may be easier to accomplish in the- processes layers. ory than in practice. The challenge is that today’s data center is a mixture of vendor products and platforms, and is more difficult to support in a coherent way. Faced with staffing and budget limitations, few organizations can maintain a stable of experts on every platform and product on which they do business. This adds complexity to maintaining not only data availability, but also security and consistent resilience policy enforcement.
  • 7. IBM Global Technology Services 7 With this in mind, a comprehensive business resilience strategy ● Appropriate system redundancy, ranging from onsite backup built for the needs of today’s IT infrastructures should include: servers and storage to offsite mirrored systems with automatic failover ● A tested and proven business resilience program and plan that ● Security, privacy and data protection to guard against internal addresses business continuity, disaster recovery and hardware threats (such as data theft) and external threats (such as viruses) and software support ● Technical processes, including change management and appli- ● Support for regulatory compliance and governance cation testing, that help prevent system failures requirements ● Hardware maintenance and support for multivendor ● Consistent policy enforcement across departments, corporate environments divisions and global locations ● Software maintenance and support that provides fast access to ● Offsite data center and work area recovery capabilities, deeply skilled expertise including alternate employee workspaces ● Remote support capabilities (including execution of fixes and ● A tested and proven data backup and archiving system with patches) and web self-service to provide access to technical offsite storage expertise, help prevent failures and speed problem determination and resolution. IBM’s Modular Support Services Are Designed to Optimize Your Support Today and Tomorrow Support Continuum Integrated infrastructure availability management Single point of accountability Adaptive service levels Integrated hardware and Multi-vendor support software support Contract and inventory Preventative hardware and management software support Client value Customized support System monitoring and automated services Hardware support Managed support Software support Remote Support Web self-service Enhanced support Support Foundation Proactive Preventive Figure 3: Hardware and software support is a foundational component of business resilience. Organizations can further enhance business continuity by adding capabilities such as system monitoring and integrated infrastructure availability management.
  • 8. 8 Proactive technical support: The overlooked essential in business resilience Beyond foundational resiliency: IT services provider leverages single contact for disaster transferring risk recovery No matter the approach to developing a business resilience strat- A company that provides a passenger service system and egy, every organization must first understand its risks and then data center services for one of the largest airlines in take action to mitigate those risks. For risk mitigation, it is Indonesia had a local backup system in place but no disaster sometimes more cost-effective and strategic to transfer the risk recovery solution, which the company needed to implement to a skilled vendor rather than invest in the skills training and prior to their initial public offering. The company engaged capital outlays that may be required to maintain consistent and IBM to create a comprehensive disaster recovery solution high-functioning business operations in the face of a business-, with ongoing disaster recovery support, including a data event- or data-driven event. In this case, managed support (see center and disaster recovery center facility, 24×7 managed Figure 3) can help organizations achieve enhanced IT availability services, and mainframe maintenance. Today, the company to support the continuous availability of business operations. has a single point of contact for hardware and a majority of its software and operating systems, services and communi- cations; a comprehensive disaster recovery solution; and a Organizations seeking advanced capabilities for business conti- secure environment for its IT equipment. nuity and disaster recovery may require: Event-driven managed services to meet recovery time and recovery point objectives after a business disruption, including Japanese business achieves one-day disaster recovery fast backups, restores and critical data archiving, to help mitigate and critical hardware support business impact. Other capabilities that may be required include Previously, the largest publication distributor in Japan workload balancing, limiting data loss via email recovery and managed the recovery of its bookstores’ operating systems supporting workforce resiliency through emergency and applications in-house—a time-consuming, resource- notifications. intensive process. The company needed to accelerate the recovery of mission-critical files and applications during fre- Outsourced recovery of IT and business infrastructures, includ- quent unplanned outages. Today, IBM provides file recovery support and disaster recovery services for the company’s ing work areas, from disruptions to help reduce costs and time- applications, operating systems and hardware within one frames related to lost employee productivity. Capabilities for business day. IBM also provides ongoing maintenance and maintaining continuity of critical systems, protecting against loss software troubleshooting services. The company has of key business data and employee productivity, and meeting improved service levels, and outsourcing enables the distrib- regulatory compliance mandates can help prevent business utor’s IT team to focus on core competencies while reducing disruptions. recovery costs.
  • 9. IBM Global Technology Services 9 Security-rich, automated protection of critical business data failures and remove complexity. As new solutions are added to through onsite and offsite cloud-based services to reduce the the infrastructure, they create additional points of failure. Proper need for infrastructure build-out to protect and store massive change orchestration across hardware and software updates and amounts of data. maintenance is crucial. Auditable compliance with general and industry-specific regula- A single point of accountability across vendors based on consis- tory requirements to help track data access and prove data pro- tently agreed upon and continuously monitored service levels, tection to avoid violations. Unproven security policies and which can significantly improve availability management and procedures for widely distributed data can open the door to speed time to resolution by avoiding finger pointing during public disclosure requirements. problem isolation. Holistic support focused on application availability for the end Proactive monitoring to minimize or eliminate the business user rather than isolated server and storage availability. A view impact of technical problems by continually tracking the health into how hardware availability affects software availability, which, of the IT infrastructure via real-time dashboards, which can help in turn, greatly impacts business continuity, is critical. anticipate future problems and notify IT to take preventive action. Deep technology expertise, including an understanding of the inter-relation between applications and infrastructure compo- Contract and inventory management capabilities, which are nents, especially in complex environments such as virtualization. essential to maintaining compliance and controlling IT asset Today, services and resources are distributed across what had costs. License compliance and inventories can be tracked auto- been isolated domains—which means older management tools matically, removing manual, inaccurate oversight while avoiding may be ineffective. Deep expertise and insight can prevent over-purchasing and under-licensing. hardware and software failures from impacting business-critical services. Customized support, which is especially relevant for multivendor, multidomain environments where complex dependencies can Integrated hardware and software capabilities, including cross- wreak havoc on administrators who do not have the insight or platform and multivendor technical support and proactive time to manage this type of infrastructure. microcode and release management, which can help prevent
  • 10. 10 Proactive technical support: The overlooked essential in business resilience ● Globally consistent services, from simple break-fix to compre- Data storage company transfers risk to improve service hensive, end-to-end support capabilities, so that every location delivery can access immediate expertise to resolve events ● The ability to anticipate problems and provide proactive guid- A data storage company that provides hardware devices ance to meet required service level agreements and data management software to customers in virtually every industry had previously provided ongoing product ● Proof of potential cost savings via outsourced support that may support via internal resources and a network of seven indi- include remote support tools and staff as well as management vidual third-party maintainers (TPMs) in the United States of contracts, warranties and asset inventories and dozens of TPMs worldwide. Product support was poor, ● Understanding of global business needs and IT strategies, an and the business suffered. The company integrated its cus- essential characteristic for organizations focused on maintain- tomer relationship management system with IBM’s, allowing ing competitive advantage IBM service representatives and engineers to respond to ● Remote and automated tools, which can help control the technical support calls and requests for on-site support. labor costs of maintaining the IT infrastructure and also speed Providing customers with a single point-of-contact and a sin- problem resolution gle workflow for all calls reduces the number of interactions ● Proactive monitoring and event notifications to prevent busi- while improving service quality. The cost savings for the first ness disruptions year was approximately US$8 million, with a possible cost ● Parts replacement capabilities, on time, at the right locations savings over five years of more than US$40 million. Assessing risk Essential characteristics of a business An effective business resilience plan must begin with a resilience vendor thorough risk analysis: Organizations looking to solidify business resilience should care- fully consider the capabilities of the vendor(s) with whom they ● Rank threats based on past occurrences, the amount of choose to work. A business resilience vendor should be able to potential revenue loss, damage to the brand, compliance provide: risks and single points of failure ● Prioritize safeguards, including provisions for hardware and software support, business continuity and disaster ● Global leadership in technical expertise, including broad infra- recovery structure competence and deep, multiplatform technology ● Conduct a cost-benefit analysis for a quantitative risk skills assessment ● Highly responsive, international support for the full scope of ● Determine next steps based on threat severity, selected IT infrastructure operations, both current operations and safeguards, and the cost and ease of implementation. operations scoped for near-term and long-term expansion Take the IBM risk self-assessment
  • 11. IBM Global Technology Services 11 IBM’s business resilience capabilities For technical support, IBM provides nearly 15,000 technicians Through IBM, organizations can obtain all the foundational and support personnel, 400 parts distribution centers and more capabilities needed for a solid business resilience strategy than 80 support centers located worldwide, so that organizations , including business continuity, disaster recovery and hardware can expect responsiveness no matter where they are located, and software technical support, that can fully address business-, including 24×7 service logistics network availability. For business event- and data-driven risks to the business. In addition, continuity support, organizations can look to IBM’s extensive IBM can provide proof of potential cost savings of between infrastructure investments; more than 1,800 dedicated business 5 and 40 percent, depending on the current state of the support continuity professionals; more than 150 business resilience cen- environment and how much support is out-tasked.8 IBM’s depth ters located worldwide; and the depth of knowledge drawn from of expertise—across multiple vendor platforms—and breadth of more than 50 years of business resilience and disaster recovery resilience capabilities are designed to support today’s complex IT experience with more than 12,000 disaster recovery clients—all infrastructures. of which has led respected industry analysts to recognize IBM as a leader in business continuity and resilience.
  • 12. For more information To learn more about building a foundational business resilience strategy, please contact your IBM marketing representative or IBM Business Partner, or visit the following websites: ● ibm.com/services/continuity ● ibm.com/services/maintenance © Copyright IBM Corporation 2011 IBM Corporation Software Group About the authors Route 100 Richard Cocchiara Somers, NY 10589 Distinguished Engineer U.S.A. Business Continuity & Resiliency Services Produced in the United States of America Global Technology Services May 2011 All Rights Reserved Patrick Corcoran IBM, the IBM logo and ibm.com are trademarks of International Business Global Client Solution Executive Machines Corporation in the United States, other countries or both. If these and other IBM trademarked terms are marked on their first occurrence in Business Continuity & Resiliency Services this information with a trademark symbol (® or ™), these symbols indicate Global Technology Services U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks Kevin Crowley is available on the web at “Copyright and trademark information” at Global Sr. Market Segment Manager ibm.com/legal/copytrade.shtml Maintenance & Technical Support Microsoft is a trademark of Microsoft Corporation in the United States, IBM Global Technology Services other countries, or both. Other company, product or service names may be trademarks or service marks of others. References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM operates. 1 2010 IBM Global IT Risk Study, IBM Institute for Business Value in partnership with the Economist Intelligence Unit. 2 “IT Failure And Power Challenge UK Business Continuity,” eWEEK Europe, March 7, 2011. 3 “eBay Giving Out Coupons and Other Compensation after Website Crash,” MaximumPC, November 24, 2009. 4 “Google Mistakes Entire Web for Malware,” The Register, January 31, 2009. 5 “Surge Caused Fire in Rail Car,” The Washington Times, April 2, 2007. 6 “Software Bug Contributed to Blackout,” SecurityFocus, February 11, 2004. 7 Disaster Recovery Journal and Forrester Research have jointly conducted industry studies for four years. The surveys track changes, trends and future development. Information from the 2011 survey is reprinted in this article with permission. 8 Savings based on IBM Maintenance and Technology Services customer implementations. Please Recycle MTW03008-USEN-01