The #1 guide to protecting and recovering your key digital assets--now fully updated.*Disaster recovery strategies after 9/11*Up-to-the-minute coverage: DR analysis, planning, strategy, testing, and emergency decision-making*Solutions for centralized and decentralized environments, network and end-user recovery*Advanced storage technologies and "time to data" metrics*Implications of Web services and next-generation outsourcing*Now more than ever, crucial information for every IT manager, sysadmin, and consultant!Disaster Recovery Planning, Third Edition is a start-to-finish update to the #1 guide to disaster recovery planning and implementation. Thoroughly revised to reflect the latest strategies and technologies, it also presents the disaster recovery lessons taught by 9/11, the California energy crisis, and the anthrax scare. In this book, Toigo offers focused, hands-on blueprints for disaster recovery in every environment, centralized and decentralized--with detailed coverage of building DR systems that address networks and encompass end-users who still maintain crucial enterprise data on local PCs and notebooks.
Coverage includes: *How to create a successful disaster recovery plan-with or without consultants*Analyzing both technical and physical risks, including facility protection*Choosing the right mainframe backup strategies*Preventive and proactive techniques for backing up distributed, network-based systems*New technologies and strategies for end-user recovery*Emergency decision-making and recovery project teams*Testing your plan and updating it to reflect organizational and technical change
Table of Contents
Foreword by Michael Shannon. Foreword by Gregory Ferris. Author's Preface to the Third Edition. Preface to the Second Edition. Acknowledgments. 1. Introduction. What Is Disaster Recovery Planning? Purpose of This Book. A Working Definition of Disaster. The Time Factor in Disaster Recovery. The Need for Disaster Recovery Planning. The Auditor's View. An Imperfect Legal Mandate. Building Management Consensus for Disaster Recovery Planning. Who Should Write the Plan? A Straightforward, Project-Oriented Approach. A Note on Methodology. Endnotes. 2. Analyzing the Risk. The Purpose of Risk Analysis. Identifying and Prioritizing Assets and Functions. Collecting Input from End Users. A Criticality Spectrum. Collecting Data on Outage Costs. Identifying Threats to Assets and Functions. The Problem with Probability. A Few Compelling Statistics. Developing Plan Objectives. Endnotes. 3. Facility Protection. Water Detection. Fire Suppression. Contamination Reduction. Precombustion Detection. Power Failure. Physical Access Control. Endnotes. 4. Data Recovery Planning. The Primacy of Data. Planning for Data Recovery. Identifying the Information Asset. Classifying Criticality: Inputs and Outputs. Setting a Policy on Data Asset Identification, Classification, and Backup. Policy-based Management of Electronic Data via Software. Storage Consolidation. Tape Backup. Designing a storage Recovery Plan. Electronic Vaulting. Remote Mirroring. Mirroring Not a Panacea. Options for Records Storage. Selecting an Off-site Storage Vendor. Cost-Justify Off-site Storage. Implementing the Data Recovery Plan. Final Observations About Data Recovery Planning. Endnotes. PERSPECTIVE: EMC. PERSPECTIVE: LEGATO. PERSPECTIVE: IRON MOUNTAIN. PERSPECTIVE: NETWORK APPLIANCE. PERSPECTIVE: QUANTUM. PERSPECTIVE: STORABILITY. PERSPECTIVE: STORAGETEK. PERSPECTIVE: TEK-TOOLS. 5. Strategies for Centralized System Recovery. Developing Centralized System Backup Strategies. Cautions and Caveats. Mainframe Backup Strategies. Which Strategy Is Preferred? Selecting a Hot Site. The Bottom Line on Centralized System Recovery. Endnotes. PERSPECTIVE: HP BRS. PERSPECTIVE: SUNGARD AVAILABILITY SERVICE. 6. Strategies for Decentralized System Recovery. Distributed Client/Server Computing: The Achilles Heel of Disaster Recovery Planning. A Brief Overview of Distributed Computing. Contemporary Client/Server Applications. Preventive Measures. Proactive Measures. Planning for Recovery. Endnotes. 7. Strategies for End User Recovery. Developing an End User Recovery Strategy. Options for End User Recovery. Emerging Technology: Harnessing Remote Access Capabilities. Types of Remote Access. Considerations Regarding the Use of Remote Access for End User Recovery. Other Issues in End User Recovery. Final Thoughts on End User Recovery Strategies. Endnotes. 8. Strategies for Networking Backup. What Is Involved in Formulating a Network Recovery Strategy? Analyzing Networks: A Layered Approach. Preliminary Activities in Network Recovery Planning. Formulating Strategies for Internal Network Recovery. Backup Strategies for the Local Loop and Wide Area Network Services. Planning for the Restoral of Wide Area Voice and Data Network Links Following a User or Systems Relocation. Endnotes. PERSPECTIVE: CNT. PERSPECTIVE: SITESAFE. PERSPECTIVE: ZEROWAIT. 9 Emergency Decision Making. Designating Teams. Common Evacuation Project Functions and Teams. Common Recovery Project Functions and Teams. Relocation and Reentry Project Functions. Staffing Teams. Developing a Notification Directory. Creating the Emergency Management Flowchart. Emergency Response. Situation Assessment. Emergency Operations Center Activation. The Recovery Phase. The Relocation/Reentry Phase. Final Thoughts on Emergency Management Decision Making. Endnotes. 10. The Recovery Management Improvement. Researching Literature. Interviews and Tours. Professional DR Organizations. Professional Associations. The "Friction" of Disaster. Endnotes. 11. Plan Maintenance and Testing. Team Education. Plan Maintenance. Change Management . Managing the Results. Endnotes. 12. Conclusion. Preparing For the Unthinkable: Control The Damage. Endnotes. Glossary. Index.
JON WILLIAM TOIGO is Managing Partner of Toigo Productions, a consulting firm whose clients have included AT&T, Compaq, Cisco, EMC, and Hewlett-Packard. He has developed over 60 disaster recovery plans for commercial and governmental clients and supported the recovery of clients from disasters ranging from hurricanes, earthquakes, and floods to terrorist attacks post 9/11. He has held senior IT management positions with several leading financial institutions and consulting organizations and has written over 1,000 articles covering storage, infrastructure, and business automation for publications ranging from Computerworld to Scientific American. His Prentice Hall PTR books include The Holy Grail of Data Storage Management and The Essential Guide to Application Service Providers. Forewords by Michael Shannon, The Port Authority of New York and New Jersey, and Gregory Ferris, Executive Director of Global Business Continuity Planning (Institutional Securities), Morgan Stanley