SlideShare a Scribd company logo
1 of 24
Download to read offline
Automating Disaster Recovery for Faultless
Service Delivery
Tony Beeston
AUT55T
AUTOMATION
Principal Product Marketing Manager
CA Technologies
2 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
© 2017 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2017 presentation is intended for informational purposes only and does not form any type
of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.
For Informational Purposes Only
Terms of this Presentation
4 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Agenda
DISASTER RECOVER PLANNING (DRP) TODAY
DISASTER RECOVERY (DR) PLAN EXECUTION CHALLENGES
DRP SOLUTION
RESULTS OF AUTOMATING DRP
1
2
3
4
5 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Disaster Recovery Strategy
▪ How efficient is your DR Plan?
▪ Many are not prepared: 42% are not adequately armed with modern disaster
recovery solutions
▪ How many outages do you encounter?
▪ Outages are not rare: 42% experience at least one data outage per year, with an
average of 34 instances across enterprises of all sizes
▪ Is your DR Strategy fully relying on Human Factors?
▪ Manual is still the norm: 65% use manual disaster recovery processes
▪ When did you last test your Disaster Recovery Strategy?
▪ Testing isn't common: 72% test their disaster recovery plans annually
▪ What are the RTOs acceptable by the business?
▪ Four hours is too long: 53% think an outage of more than four hours is unacceptable
6 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Disaster Recovery Strategy
▪ How efficient is your DR Plan?
▪ Many are not prepared: 42% are not adequately armed with modern disaster recovery
solutions
▪ How many outages do you encounter?
▪ Outages are not rare: 42% experience at least one data outage per year, with an
average of 34 instances across enterprises of all sizes
▪ Is your DR Strategy fully relying on Human Factors?
▪ Manual is still the norm: 65% use manual disaster recovery processes
▪ When did you last test your Disaster Recovery Strategy?
▪ Testing isn't common: 72% test their disaster recovery plans annually
▪ What are the RTOs acceptable by the business?
▪ Four hours is too long: 53% think an outage of more than four hours is unacceptable
It is Human Nature Not to Be Worried
About Disaster Recovery
Until a Real Disaster Happens
7 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Primary Site Failover SitePeople Process Tools
Storage
Admin
Runbooks
Process Manuals
Scripts
Post-it Notes
Storage
Management &
Deployment
Network
Management
Tools
Server
Configuration &
ManagementNetwork
Switches
Load Balancers
Routers
Firewalls
Application
Web Server
App Server
Mail Server
Storage
IP SAN
Diskless Storage
N/w Attached Storage
Database Database Server
IP SAN
Diskless Storage
N/w Attached Storage
Switches
Load Balancers
Routers
Firewalls
Web Server
App Server
Mail Server
Database Server
Security
Team
DBA
App
Admin
Windows
Admin
Unix
Admin
Network
Engineers
Handoffs and coordination
between cross-IT domains
and silos
Disparate and disconnected
management tools
Maintenance of
failover site
Challenges With Disaster Recovery Today
8 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Business and the Disaster Recovery Plan
▪ Minimize business disruption
▪ Maintain the critical business processes during a disaster
▪ Identify and assess the potential that the loss of business functions and
processes could have on the operation of the business
▪ Ensure the key metrics for the RTOs /RPOs are defined and maintained for
critical business services
▪ Enforce operational, security and regulatory compliance
▪ Protect the brand
9 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
IT and Disaster Recovery Plan
▪ Ensure processes are issued at the right time, in the right order with the
right prerequisites
▪ Ensure all DR steps are following the latest configurations
▪ Providing accurate information about recovery times, and how much data
will be lost
▪ Executing all time-consuming manual recovery tasks without surprises
▪ Having enough resources to carry out DR drills
10 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Inbound Sources:
▪ CA Automic Monitoring
Adapters
▪ System Monitoring Tools
▪ Replication
▪ Service Desk
Respond Systems:
▪ CA Automic Request
▪ Service Desk
▪ Email / SMS
▪ Enterprise
Dashboard
Actions:
▪ Execute a DR failover/failback workflow in CA Automic
▪ Push real-time analytics to CA Automic dashboard
▪ Open/update/close/reassign Service Desk tickets
Closed-Loop Control Mechanism
Customers Logistics Production Systems
ERP SystemsBI/ DWHApplication &
Middleware
Infrastructure
Monitoring
Event Service
Event Service
Event Service
Event Adapter
Event Adapter
Event Adapter
Event Service
Event Service
(…)
Event Service
Event Service
(…)
Hub
Response
Service
Response
Service
Response
Service
Sense Interpret Analyze RespondDecide
Hub
11 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Automation Engine
Web Interface
PRODUCTION SITE DISASTER RECOVERY SITE
High-Level Architecture – Data Center Up
Application Nodes Database Nodes Application NodesDatabase Nodes
Automation Engine
Sync
12 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Web Interface
PRODUCTION SITE DISASTER RECOVERY SITE
High-Level Architecture – Data Center Down
Application Nodes Database Nodes Application NodesDatabase Nodes
Sync
Automation Engine Automation Engine
13 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Closed-Loop Control Mechanism
14 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Manage Service Failover in One Place
Dependencies, Timeline and Status for Each Business Service
15 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Manage Service Failover in One Place
Dependencies, Timeline and Status for Each Business Service
16 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
List of Services
Failover
process
completion RTO
Failback
duration
RPO
Replication
status
Last drill
performed
DR Readiness:
Server availability,
synchronization
DRP Automation and Monitoring Dashboard
17 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
DRP Automation and Monitoring Dashboard
18 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Benefits for Customers of
CA’s Automation Solutions
▪ Streamlined DRP task initiation & minimized human dependency
▪ Faster IT and Business services recovery
▪ Validation of complex recovery for multi-application environments
▪ DR solution meeting recovery SLAs
▪ Providing real-time stats on application data loss and recovery time
▪ Auditable DRP test results
▪ Ability to drill DR procedures more frequently
▪ In-Detail Analytics and Reports on DRP process executions
19 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Figure Explanation
37 Number of critical business applications
93 %
Percentage of automated tasks over all tasks for
switchover
110 Number of IT personnel who attended DR testing
60 Number of Business people who attended DR testing
24 hours Hours spent in DRC after switchover
88 minutes Time elapsed- switchover to DRC
40 minutes Time elapsed- switchback to main DC
Prior to automation the switchover to DRC took almost 6 hours
ING Bank Turkey Key Figures of DR Test
20 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
ING Bank Turkey Today
“The results of the DR testing process
have been dramatic. ING Bank Turkey has
shrunk the MTTR and delivered an almost
error free DR process.“
Emrah Baysal
Head of Systems Management,
ING Bank Turkey
“Now we can be safe and comfortable in
a disaster because we know we can
deal with the challenge.
With CA Automic* we have a living
system that’s use is continually evolving
within our business. This is critical to us,
especially for our DR strategy.”
*Automic is now CA’s Automation Business Unit
21 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Recommended Sessions
SESSION # TITLE DATE/TIME
AUT32T
Mayday@ Using CA Workload Automation ESP
Concepts to Prepare for Disaster Recovery
11/15/2017 at 4:15 pm
AUT04S
From Zero to 100 with CA Automation in Days
(84.51)
11/15/2016 at 2:30 pm
AUT06SA
To Infinity and Beyond! Automation Portfolio Long-
term Vision and Strategy
11/15/2017 at 12:45 pm
22 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Must See Demos
Automate
the
DevOps
Tool Chain
712
Automation
Automate
Test Data
Mgmt &
Drive Agility
709
Automation
Automate for
Continuous
Operations &
Data Delivery
717
Automation
Continuous
Service
Empowers
Self-Service
705
Automation
CA’s
Automation
Marketplace
706
Automation
23 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Questions?
24 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Stay connected at communities.ca.com
Thank you.
25 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Automation
For more information on Automation,
please visit: http://cainc.to/CAW17-Automation

More Related Content

What's hot

Business Continuity and Disaster Recovery Strategy
Business Continuity and Disaster Recovery Strategy Business Continuity and Disaster Recovery Strategy
Business Continuity and Disaster Recovery Strategy Chandrak Trivedi
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recoveryKrutiShah114
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Narudom Roongsiriwong, CISSP
 
Delivering the Composable Enterprise
Delivering the Composable EnterpriseDelivering the Composable Enterprise
Delivering the Composable EnterpriseSaul Caganoff
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Goutama Bachtiar
 
The A to Z Guide to Business Continuity and Disaster Recovery
The A to Z Guide to Business Continuity and Disaster RecoveryThe A to Z Guide to Business Continuity and Disaster Recovery
The A to Z Guide to Business Continuity and Disaster RecoverySirius
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks
 
Membangun Data Recovery Center / Disaster Recovery Center
Membangun Data Recovery Center / Disaster Recovery CenterMembangun Data Recovery Center / Disaster Recovery Center
Membangun Data Recovery Center / Disaster Recovery CenterFanky Christian
 
IT Disaster Recovery Readiness (Maturity Assessement)
IT Disaster Recovery Readiness (Maturity Assessement) IT Disaster Recovery Readiness (Maturity Assessement)
IT Disaster Recovery Readiness (Maturity Assessement) Bashar Alkhatib
 
PT203: SOS! NUTANIX TROUBLESHOOTING
PT203: SOS! NUTANIX TROUBLESHOOTINGPT203: SOS! NUTANIX TROUBLESHOOTING
PT203: SOS! NUTANIX TROUBLESHOOTINGNEXTtour
 
Recovery Time Objective and Recovery Point Objective
Recovery Time Objective and Recovery Point ObjectiveRecovery Time Objective and Recovery Point Objective
Recovery Time Objective and Recovery Point ObjectiveYankee Maharjan
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Business Continuity Planning Seminar
Business Continuity Planning SeminarBusiness Continuity Planning Seminar
Business Continuity Planning Seminarcmckinney
 
How to write an IT DR plan
How to write an IT DR planHow to write an IT DR plan
How to write an IT DR planDatabarracks
 
SOC-2 Compliance Status Report sample v10.0
SOC-2 Compliance Status Report   sample v10.0SOC-2 Compliance Status Report   sample v10.0
SOC-2 Compliance Status Report sample v10.0Mark S. Mahre
 
Disaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity PlanDisaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity PlanMarcelo Silva
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recoverymadunix
 
SAP S/4 HANA Disaster Recovery Confidence
SAP S/4 HANA Disaster Recovery ConfidenceSAP S/4 HANA Disaster Recovery Confidence
SAP S/4 HANA Disaster Recovery ConfidenceDirk Oppenkowski
 
Server refresh program
Server refresh programServer refresh program
Server refresh programTal Aviv
 

What's hot (20)

Business Continuity and Disaster Recovery Strategy
Business Continuity and Disaster Recovery Strategy Business Continuity and Disaster Recovery Strategy
Business Continuity and Disaster Recovery Strategy
 
Bcp
BcpBcp
Bcp
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recovery
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
 
Delivering the Composable Enterprise
Delivering the Composable EnterpriseDelivering the Composable Enterprise
Delivering the Composable Enterprise
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)
 
The A to Z Guide to Business Continuity and Disaster Recovery
The A to Z Guide to Business Continuity and Disaster RecoveryThe A to Z Guide to Business Continuity and Disaster Recovery
The A to Z Guide to Business Continuity and Disaster Recovery
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
Membangun Data Recovery Center / Disaster Recovery Center
Membangun Data Recovery Center / Disaster Recovery CenterMembangun Data Recovery Center / Disaster Recovery Center
Membangun Data Recovery Center / Disaster Recovery Center
 
IT Disaster Recovery Readiness (Maturity Assessement)
IT Disaster Recovery Readiness (Maturity Assessement) IT Disaster Recovery Readiness (Maturity Assessement)
IT Disaster Recovery Readiness (Maturity Assessement)
 
PT203: SOS! NUTANIX TROUBLESHOOTING
PT203: SOS! NUTANIX TROUBLESHOOTINGPT203: SOS! NUTANIX TROUBLESHOOTING
PT203: SOS! NUTANIX TROUBLESHOOTING
 
Recovery Time Objective and Recovery Point Objective
Recovery Time Objective and Recovery Point ObjectiveRecovery Time Objective and Recovery Point Objective
Recovery Time Objective and Recovery Point Objective
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Business Continuity Planning Seminar
Business Continuity Planning SeminarBusiness Continuity Planning Seminar
Business Continuity Planning Seminar
 
How to write an IT DR plan
How to write an IT DR planHow to write an IT DR plan
How to write an IT DR plan
 
SOC-2 Compliance Status Report sample v10.0
SOC-2 Compliance Status Report   sample v10.0SOC-2 Compliance Status Report   sample v10.0
SOC-2 Compliance Status Report sample v10.0
 
Disaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity PlanDisaster Recovery Plan / Enterprise Continuity Plan
Disaster Recovery Plan / Enterprise Continuity Plan
 
Business continuity planning and disaster recovery
Business continuity planning and disaster recoveryBusiness continuity planning and disaster recovery
Business continuity planning and disaster recovery
 
SAP S/4 HANA Disaster Recovery Confidence
SAP S/4 HANA Disaster Recovery ConfidenceSAP S/4 HANA Disaster Recovery Confidence
SAP S/4 HANA Disaster Recovery Confidence
 
Server refresh program
Server refresh programServer refresh program
Server refresh program
 

Similar to Automating Disaster Recovery for Faultless Service Delivery

Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Closed Loop Remediation with CA Automic Service Orchestration
Closed Loop Remediation with CA Automic Service OrchestrationClosed Loop Remediation with CA Automic Service Orchestration
Closed Loop Remediation with CA Automic Service OrchestrationCA Technologies
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentBrian Anderson
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentEagle Technologies
 
Avoiding disaster recovery disasters
Avoiding disaster recovery disastersAvoiding disaster recovery disasters
Avoiding disaster recovery disastersAlexandra Matthiesen
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
Case Study: Modernizing the PMO with CA PPM 15
Case Study: Modernizing the PMO with CA PPM 15Case Study: Modernizing the PMO with CA PPM 15
Case Study: Modernizing the PMO with CA PPM 15CA Technologies
 
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.CA Technologies
 
Le soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuityLe soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuityJürgen Ambrosi
 
Business Continuity Considerations for a More Reliable Postgres Environment
Business Continuity Considerations for a More Reliable Postgres EnvironmentBusiness Continuity Considerations for a More Reliable Postgres Environment
Business Continuity Considerations for a More Reliable Postgres EnvironmentEDB
 
Velocity 2014 Tool Chain Choices
Velocity 2014 Tool Chain ChoicesVelocity 2014 Tool Chain Choices
Velocity 2014 Tool Chain ChoicesMark Sigler
 
Case Study: Vivo Automated IT Capacity Management to Optimize Usage of its Cr...
Case Study: Vivo Automated IT Capacity Management to Optimize Usage of its Cr...Case Study: Vivo Automated IT Capacity Management to Optimize Usage of its Cr...
Case Study: Vivo Automated IT Capacity Management to Optimize Usage of its Cr...CA Technologies
 
10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...
10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...
10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...Jesse Andrew
 
Can your business survive the next disaster?
Can your business survive the next disaster?Can your business survive the next disaster?
Can your business survive the next disaster?Ashish Patel
 
Automating the Modern Software Factory
Automating the Modern Software FactoryAutomating the Modern Software Factory
Automating the Modern Software FactoryCA Technologies
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankDonna Perlstein
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankCloudEndure
 

Similar to Automating Disaster Recovery for Faultless Service Delivery (20)

Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Closed Loop Remediation with CA Automic Service Orchestration
Closed Loop Remediation with CA Automic Service OrchestrationClosed Loop Remediation with CA Automic Service Orchestration
Closed Loop Remediation with CA Automic Service Orchestration
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery Environment
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery Environment
 
Avoiding disaster recovery disasters
Avoiding disaster recovery disastersAvoiding disaster recovery disasters
Avoiding disaster recovery disasters
 
Avoiding disaster recovery disasters
Avoiding disaster recovery disastersAvoiding disaster recovery disasters
Avoiding disaster recovery disasters
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
Case Study: Modernizing the PMO with CA PPM 15
Case Study: Modernizing the PMO with CA PPM 15Case Study: Modernizing the PMO with CA PPM 15
Case Study: Modernizing the PMO with CA PPM 15
 
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
 
Le soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuityLe soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuity
 
Business Continuity Considerations for a More Reliable Postgres Environment
Business Continuity Considerations for a More Reliable Postgres EnvironmentBusiness Continuity Considerations for a More Reliable Postgres Environment
Business Continuity Considerations for a More Reliable Postgres Environment
 
Velocity 2014 Tool Chain Choices
Velocity 2014 Tool Chain ChoicesVelocity 2014 Tool Chain Choices
Velocity 2014 Tool Chain Choices
 
Case Study: Vivo Automated IT Capacity Management to Optimize Usage of its Cr...
Case Study: Vivo Automated IT Capacity Management to Optimize Usage of its Cr...Case Study: Vivo Automated IT Capacity Management to Optimize Usage of its Cr...
Case Study: Vivo Automated IT Capacity Management to Optimize Usage of its Cr...
 
10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...
10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...
10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...
 
Can your business survive the next disaster?
Can your business survive the next disaster?Can your business survive the next disaster?
Can your business survive the next disaster?
 
Automating the Modern Software Factory
Automating the Modern Software FactoryAutomating the Modern Software Factory
Automating the Modern Software Factory
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and RiskCA Technologies
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...CA Technologies
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...CA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and Risk
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
 

Recently uploaded

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Recently uploaded (20)

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Automating Disaster Recovery for Faultless Service Delivery

  • 1. Automating Disaster Recovery for Faultless Service Delivery Tony Beeston AUT55T AUTOMATION Principal Product Marketing Manager CA Technologies
  • 2. 2 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS © 2017 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2017 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
  • 3. 4 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Agenda DISASTER RECOVER PLANNING (DRP) TODAY DISASTER RECOVERY (DR) PLAN EXECUTION CHALLENGES DRP SOLUTION RESULTS OF AUTOMATING DRP 1 2 3 4
  • 4. 5 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Disaster Recovery Strategy ▪ How efficient is your DR Plan? ▪ Many are not prepared: 42% are not adequately armed with modern disaster recovery solutions ▪ How many outages do you encounter? ▪ Outages are not rare: 42% experience at least one data outage per year, with an average of 34 instances across enterprises of all sizes ▪ Is your DR Strategy fully relying on Human Factors? ▪ Manual is still the norm: 65% use manual disaster recovery processes ▪ When did you last test your Disaster Recovery Strategy? ▪ Testing isn't common: 72% test their disaster recovery plans annually ▪ What are the RTOs acceptable by the business? ▪ Four hours is too long: 53% think an outage of more than four hours is unacceptable
  • 5. 6 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Disaster Recovery Strategy ▪ How efficient is your DR Plan? ▪ Many are not prepared: 42% are not adequately armed with modern disaster recovery solutions ▪ How many outages do you encounter? ▪ Outages are not rare: 42% experience at least one data outage per year, with an average of 34 instances across enterprises of all sizes ▪ Is your DR Strategy fully relying on Human Factors? ▪ Manual is still the norm: 65% use manual disaster recovery processes ▪ When did you last test your Disaster Recovery Strategy? ▪ Testing isn't common: 72% test their disaster recovery plans annually ▪ What are the RTOs acceptable by the business? ▪ Four hours is too long: 53% think an outage of more than four hours is unacceptable It is Human Nature Not to Be Worried About Disaster Recovery Until a Real Disaster Happens
  • 6. 7 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Primary Site Failover SitePeople Process Tools Storage Admin Runbooks Process Manuals Scripts Post-it Notes Storage Management & Deployment Network Management Tools Server Configuration & ManagementNetwork Switches Load Balancers Routers Firewalls Application Web Server App Server Mail Server Storage IP SAN Diskless Storage N/w Attached Storage Database Database Server IP SAN Diskless Storage N/w Attached Storage Switches Load Balancers Routers Firewalls Web Server App Server Mail Server Database Server Security Team DBA App Admin Windows Admin Unix Admin Network Engineers Handoffs and coordination between cross-IT domains and silos Disparate and disconnected management tools Maintenance of failover site Challenges With Disaster Recovery Today
  • 7. 8 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Business and the Disaster Recovery Plan ▪ Minimize business disruption ▪ Maintain the critical business processes during a disaster ▪ Identify and assess the potential that the loss of business functions and processes could have on the operation of the business ▪ Ensure the key metrics for the RTOs /RPOs are defined and maintained for critical business services ▪ Enforce operational, security and regulatory compliance ▪ Protect the brand
  • 8. 9 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS IT and Disaster Recovery Plan ▪ Ensure processes are issued at the right time, in the right order with the right prerequisites ▪ Ensure all DR steps are following the latest configurations ▪ Providing accurate information about recovery times, and how much data will be lost ▪ Executing all time-consuming manual recovery tasks without surprises ▪ Having enough resources to carry out DR drills
  • 9. 10 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Inbound Sources: ▪ CA Automic Monitoring Adapters ▪ System Monitoring Tools ▪ Replication ▪ Service Desk Respond Systems: ▪ CA Automic Request ▪ Service Desk ▪ Email / SMS ▪ Enterprise Dashboard Actions: ▪ Execute a DR failover/failback workflow in CA Automic ▪ Push real-time analytics to CA Automic dashboard ▪ Open/update/close/reassign Service Desk tickets Closed-Loop Control Mechanism Customers Logistics Production Systems ERP SystemsBI/ DWHApplication & Middleware Infrastructure Monitoring Event Service Event Service Event Service Event Adapter Event Adapter Event Adapter Event Service Event Service (…) Event Service Event Service (…) Hub Response Service Response Service Response Service Sense Interpret Analyze RespondDecide Hub
  • 10. 11 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Automation Engine Web Interface PRODUCTION SITE DISASTER RECOVERY SITE High-Level Architecture – Data Center Up Application Nodes Database Nodes Application NodesDatabase Nodes Automation Engine Sync
  • 11. 12 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Web Interface PRODUCTION SITE DISASTER RECOVERY SITE High-Level Architecture – Data Center Down Application Nodes Database Nodes Application NodesDatabase Nodes Sync Automation Engine Automation Engine
  • 12. 13 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Closed-Loop Control Mechanism
  • 13. 14 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Manage Service Failover in One Place Dependencies, Timeline and Status for Each Business Service
  • 14. 15 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Manage Service Failover in One Place Dependencies, Timeline and Status for Each Business Service
  • 15. 16 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS List of Services Failover process completion RTO Failback duration RPO Replication status Last drill performed DR Readiness: Server availability, synchronization DRP Automation and Monitoring Dashboard
  • 16. 17 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS DRP Automation and Monitoring Dashboard
  • 17. 18 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Benefits for Customers of CA’s Automation Solutions ▪ Streamlined DRP task initiation & minimized human dependency ▪ Faster IT and Business services recovery ▪ Validation of complex recovery for multi-application environments ▪ DR solution meeting recovery SLAs ▪ Providing real-time stats on application data loss and recovery time ▪ Auditable DRP test results ▪ Ability to drill DR procedures more frequently ▪ In-Detail Analytics and Reports on DRP process executions
  • 18. 19 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Figure Explanation 37 Number of critical business applications 93 % Percentage of automated tasks over all tasks for switchover 110 Number of IT personnel who attended DR testing 60 Number of Business people who attended DR testing 24 hours Hours spent in DRC after switchover 88 minutes Time elapsed- switchover to DRC 40 minutes Time elapsed- switchback to main DC Prior to automation the switchover to DRC took almost 6 hours ING Bank Turkey Key Figures of DR Test
  • 19. 20 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS ING Bank Turkey Today “The results of the DR testing process have been dramatic. ING Bank Turkey has shrunk the MTTR and delivered an almost error free DR process.“ Emrah Baysal Head of Systems Management, ING Bank Turkey “Now we can be safe and comfortable in a disaster because we know we can deal with the challenge. With CA Automic* we have a living system that’s use is continually evolving within our business. This is critical to us, especially for our DR strategy.” *Automic is now CA’s Automation Business Unit
  • 20. 21 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Recommended Sessions SESSION # TITLE DATE/TIME AUT32T Mayday@ Using CA Workload Automation ESP Concepts to Prepare for Disaster Recovery 11/15/2017 at 4:15 pm AUT04S From Zero to 100 with CA Automation in Days (84.51) 11/15/2016 at 2:30 pm AUT06SA To Infinity and Beyond! Automation Portfolio Long- term Vision and Strategy 11/15/2017 at 12:45 pm
  • 21. 22 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Must See Demos Automate the DevOps Tool Chain 712 Automation Automate Test Data Mgmt & Drive Agility 709 Automation Automate for Continuous Operations & Data Delivery 717 Automation Continuous Service Empowers Self-Service 705 Automation CA’s Automation Marketplace 706 Automation
  • 22. 23 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Questions?
  • 23. 24 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Stay connected at communities.ca.com Thank you.
  • 24. 25 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Automation For more information on Automation, please visit: http://cainc.to/CAW17-Automation