Скачать презентацию VERITAS Confidential Copyright 2002 VERITAS Software Corporation Скачать презентацию VERITAS Confidential Copyright 2002 VERITAS Software Corporation

c0e485e7e91d1d705d61e77276d5a0af.ppt

  • Количество слайдов: 13

VERITAS Confidential Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, VERITAS Confidential Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other VERITAS product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation in the US and/or other countries. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies.

High Availability Leveraging Technology for Business Continuity and Corporate Security VERITAS Confidential High Availability Leveraging Technology for Business Continuity and Corporate Security VERITAS Confidential

Benefits • Best Practice for Business Continuity • Lowers Costs • Reduces Security Risk Benefits • Best Practice for Business Continuity • Lowers Costs • Reduces Security Risk VERITAS Confidential

Customer Facing and Revenue Generating • Just replicating the database is not enough • Customer Facing and Revenue Generating • Just replicating the database is not enough • Can’t have a crippled website, customers need full access • Manual restores ATOD no longer feasible for 24/7 “Even 99 -percent uptime may still not be enough because customers expect around-the-clock access to systems and applications. With competition just a click away, businesses must ensure the continuous availability of their internal and customer-facing systems to succeed in today’s business world. ” Nigel Stokes, CEO, Data. Mirror VERITAS Confidential

High Availability Essential for BC • Protects mission critical data and applications • Reduces High Availability Essential for BC • Protects mission critical data and applications • Reduces system downtime – Full restore = between 48 and 72 hours and several sys admin resources – High-availability solution = a switch-over and successful failover within 30 minutes. • Effectively complies with mandated government regulations: – Basel II – Sarbanes-Oxley Act • Minimize downtime and costs of planned and unplanned outages. – High-availability solutions allow IT staff to conduct scheduled maintenance when required by performing a switchover that allows all internal and external-facing systems and applications to be temporarily housed on a backup server - end-users continue using the systems and applications they need and companies maintain business-as-usual operations VERITAS Confidential

Manual Environments Degree of Automation Manual Scripts Automated Tools 62% Security Mgmt Network 58% Manual Environments Degree of Automation Manual Scripts Automated Tools 62% Security Mgmt Network 58% 0% 10% 20% 30% 28% 17% 53% Change/Config 24% 17% 54% Storage 24% 18% 56% Performance 25% 16% 60% Event 14% 29% 24% 40% 50% 60% 23% 70% 80% 90% 100% Percent of Reponses VERITAS Confidential Source: IDC 2002 Microsoft Primary Quantitative Research. 400 surveys, IT professionals in data centers, 25 or more servers

Highest Costs: Staff and Downtime 70 60 50 40 30 20 10 0 Staff Highest Costs: Staff and Downtime 70 60 50 40 30 20 10 0 Staff Costs VERITAS Confidential Downtime Training Software Hardware Source: IDC 2002 Microsoft Primary Quantitative Research. 400 surveys, IT professionals in data centers, 25 or more servers

HA Best Practice Lowers Costs • Least Manual Method = Most Protection – Decreasing HA Best Practice Lowers Costs • Least Manual Method = Most Protection – Decreasing these costs is biggest impact to your bottom line • 60% of 5 year total cost of ownership for IT systems are staff costs • Soft ‘costs savings’ of re-deploying staff to revenue generating activities – HA architecture provides savings comprised of a 30% improvement in server administration & 50% improvement in hardware costs – Large companies realize average cost savings of $30, 000 an hour by avoiding planned and unplanned downtime, using HA solutions • Clustered = Best Practice • Incorporate previous equipment investments in storage and networks • Most cases a 20% - 30% reduction in annual total cost of IT operations by consolidating servers, decreasing administration costs • Ability to rollout repeatable HA environments quickly and effectively, improving service levels, reducing support and implementation costs • Standard methods for monitoring the health and status of the clusters • Integrated set of management tools and guidance equal improved network and application up-time. VERITAS Confidential Source: IDC 2003

Security Risks VERITAS Confidential Security Risks VERITAS Confidential

Security Risks • Lack of coordination leads to wasted effort, miscommunication and ultimately environment Security Risks • Lack of coordination leads to wasted effort, miscommunication and ultimately environment gaps • Not planning architecture at front end leaves you open to ad-hoc add-ons that pose inherent security risk • Manual restore is reactive vs. proactive • Greater margin/opportunities for error VERITAS Confidential

Standards = Resilience Increase Operational Efficiency • Implementation strategy that does not impact production Standards = Resilience Increase Operational Efficiency • Implementation strategy that does not impact production • Concurrent project plan for roll-out at Primary and DR Data Centers Enhance Change Management Mechanisms • DR Repository framework with ITIL and SDLC tie-ins to the plan management process for updating your architecture and changes to production as you go through your development cycle VERITAS Confidential

Recommended Reading “Defeating Downtime in the 24/7 Business World”, Nigel Stokes, Data. Mirror, Continuity Recommended Reading “Defeating Downtime in the 24/7 Business World”, Nigel Stokes, Data. Mirror, Continuity Insights May/June 2004 “Never Failover on a Monday: Overcoming The Five Fatal Flaws of Traditional Replication Solutions”, Message. One, Inc. White Paper 2005 “Managing the Impact of Downtime”, Dan Kusnetzky, IDC Study VERITAS Solutions 2005 VERITAS Confidential

VERITAS Confidential Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, VERITAS Confidential Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other VERITAS product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation in the US and/or other countries. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies.