c0e485e7e91d1d705d61e77276d5a0af.ppt
- Количество слайдов: 13
VERITAS Confidential Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other VERITAS product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation in the US and/or other countries. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies.
High Availability Leveraging Technology for Business Continuity and Corporate Security VERITAS Confidential
Benefits • Best Practice for Business Continuity • Lowers Costs • Reduces Security Risk VERITAS Confidential
Customer Facing and Revenue Generating • Just replicating the database is not enough • Can’t have a crippled website, customers need full access • Manual restores ATOD no longer feasible for 24/7 “Even 99 -percent uptime may still not be enough because customers expect around-the-clock access to systems and applications. With competition just a click away, businesses must ensure the continuous availability of their internal and customer-facing systems to succeed in today’s business world. ” Nigel Stokes, CEO, Data. Mirror VERITAS Confidential
High Availability Essential for BC • Protects mission critical data and applications • Reduces system downtime – Full restore = between 48 and 72 hours and several sys admin resources – High-availability solution = a switch-over and successful failover within 30 minutes. • Effectively complies with mandated government regulations: – Basel II – Sarbanes-Oxley Act • Minimize downtime and costs of planned and unplanned outages. – High-availability solutions allow IT staff to conduct scheduled maintenance when required by performing a switchover that allows all internal and external-facing systems and applications to be temporarily housed on a backup server - end-users continue using the systems and applications they need and companies maintain business-as-usual operations VERITAS Confidential
Manual Environments Degree of Automation Manual Scripts Automated Tools 62% Security Mgmt Network 58% 0% 10% 20% 30% 28% 17% 53% Change/Config 24% 17% 54% Storage 24% 18% 56% Performance 25% 16% 60% Event 14% 29% 24% 40% 50% 60% 23% 70% 80% 90% 100% Percent of Reponses VERITAS Confidential Source: IDC 2002 Microsoft Primary Quantitative Research. 400 surveys, IT professionals in data centers, 25 or more servers
Highest Costs: Staff and Downtime 70 60 50 40 30 20 10 0 Staff Costs VERITAS Confidential Downtime Training Software Hardware Source: IDC 2002 Microsoft Primary Quantitative Research. 400 surveys, IT professionals in data centers, 25 or more servers
HA Best Practice Lowers Costs • Least Manual Method = Most Protection – Decreasing these costs is biggest impact to your bottom line • 60% of 5 year total cost of ownership for IT systems are staff costs • Soft ‘costs savings’ of re-deploying staff to revenue generating activities – HA architecture provides savings comprised of a 30% improvement in server administration & 50% improvement in hardware costs – Large companies realize average cost savings of $30, 000 an hour by avoiding planned and unplanned downtime, using HA solutions • Clustered = Best Practice • Incorporate previous equipment investments in storage and networks • Most cases a 20% - 30% reduction in annual total cost of IT operations by consolidating servers, decreasing administration costs • Ability to rollout repeatable HA environments quickly and effectively, improving service levels, reducing support and implementation costs • Standard methods for monitoring the health and status of the clusters • Integrated set of management tools and guidance equal improved network and application up-time. VERITAS Confidential Source: IDC 2003
Security Risks VERITAS Confidential
Security Risks • Lack of coordination leads to wasted effort, miscommunication and ultimately environment gaps • Not planning architecture at front end leaves you open to ad-hoc add-ons that pose inherent security risk • Manual restore is reactive vs. proactive • Greater margin/opportunities for error VERITAS Confidential
Standards = Resilience Increase Operational Efficiency • Implementation strategy that does not impact production • Concurrent project plan for roll-out at Primary and DR Data Centers Enhance Change Management Mechanisms • DR Repository framework with ITIL and SDLC tie-ins to the plan management process for updating your architecture and changes to production as you go through your development cycle VERITAS Confidential
Recommended Reading “Defeating Downtime in the 24/7 Business World”, Nigel Stokes, Data. Mirror, Continuity Insights May/June 2004 “Never Failover on a Monday: Overcoming The Five Fatal Flaws of Traditional Replication Solutions”, Message. One, Inc. White Paper 2005 “Managing the Impact of Downtime”, Dan Kusnetzky, IDC Study VERITAS Solutions 2005 VERITAS Confidential
VERITAS Confidential Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other VERITAS product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation in the US and/or other countries. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies.


