VERITAS Confidential Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other VERITAS.

Slides:



Advertisements
Similar presentations
Tag line, tag line Protection Manager 4.0 Customer Strategic Presentation March 2010.
Advertisements

1 The process of analyzing all core business functions and establishing an optimized timetable for recovery. Provides baseline for:  Justification for.
1 Vladimir Knežević Microsoft Software d.o.o.. 80% Održavanje 80% Održavanje 20% New Cost Reduction Keep Business Up & Running End User Productivity End.
1 Disaster Recovery “Protecting City Data” Ron Bergman First Deputy Commissioner Gregory Neuhaus Assistant Commissioner THE CITY OF NEW YORK.
VERITAS Software Corp. BUSINESS WITHOUT INTERRUPTION Fredy Nick SE Manager.
Copyright ©2003 Digitask Consultants Inc., All rights reserved Storage Area Networks Digitask Seminar April 2000 Digitask Consultants, Inc.
Empowering Business in Real Time. © Copyright 2009, OSIsoft Inc. All rights Reserved. Virtualization and HA PI Systems: Three strategies to keep your PI.
Backup Modernization with NetBackup Appliances
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS PRIMERGY Servers and Windows Server® 2008 R2 Benefit from an efficient, high performance and flexible platform.
Leveraging ITIL Challenges and Successes Greg Charles, Ph.D. Area Principal Consultant February 2006.
Disaster Prevention and Recovery Presented By: Sean Snodgrass and Theodore Smith.
1© Copyright 2014 EMC Corporation. All rights reserved. CUSTOMER REFERENCES.
VIRTUALIZATION AND YOUR BUSINESS November 18, 2010 | Worksighted.
Content Management and Process Automation Presented by Mark Chambers SE Regional Manager Document Imaging Solutions, Inc.
© 2006, Cognizant Technology Solutions. All Rights Reserved. The information contained herein is subject to change without notice. Automation – How to.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
1 © Copyright 2010 EMC Corporation. All rights reserved. EMC RecoverPoint One way to protect everything you have…better.
Security and Infrastructure Optimisation Security Considerations NameBarry Hughes TitleSenior Consultant - MCS Microsoft Corporation.
© 2013 VCE Company, LLC. All rights reserved. CDCA SBIOI April 18, 2013 VCE: A FOUNDATION FOR IT TRANSFORMATION.
Windows Server 2008 R2 and IT Challenges Windows Server Solution Accelerators Microsoft Assessment and Planning Toolkit 4.0 Next.
Consultancy.
Copyright © 2002 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS logo, and all other VERITAS product names and slogans are trademarks.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Data Center Solutions Marketing Data Center Business Advantage Customer Proof.
Bring Consolidation Into Focus The Value of Compaq AlphaServer and Storage Consolidation Solutions Joseph Batista Director Enterprise & Internet Initiatives.
© 2006 Avaya Inc. All rights reserved. Avaya Services Michael Dundon Business Development Manager.
SOLUTIONS FOR THE EFFICIENT ENTERPRISE Sameer Garde Country GM,India.
2004 Piper Jaffray Technology Conference Mark Bregman Executive Vice President, Product Operations.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Your Data Any Place, Any Time Online Transaction Processing.
Co-location Sites for Business Continuity and Disaster Recovery Peter Lesser (212) Peter Lesser (212) Kraft.
Partner Logo Overcoming Buyer Objections Q
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Hosted by Why You Need a Storage Management Organization Ray Paquet Vice President & Research Director Gartner.
1 © 2008 DataCore Software Corp. — All rights reserved © 2009 DataCore Software Corp DataCore Company Private Information Subject to change without notice.
Virtualization for Disaster Recovery Panel Discussion May 19, 2010 Ed Walsh EMC vSpecialist EMC Corporation Cell Chris Fox.
Systems Management Server 2.0: Backup and Recovery Overview SMS Recovery Web Site location: Updated.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
1 IBM TIVOLI Business Continuance Seminar Training Document.
Application Center 2000 at Microsoft A solution for managing high availability Web applications built on Windows 2000 Published April 2002.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
1© Copyright 2015 EMC Corporation. All rights reserved. FEDERATION ENTERPRISE HYBRID CLOUD OPERATION SERVICES FULL RANGE OF SERVICES TO ASSIST YOUR STAFF.
Steven Adler Enterprise Technology Strategist Microsoft EMEA.
The VERSO Product Returns Portal Incorporates Office 365 Outlook and Excel Add-Ins to Create Seamless Workflow for All Participating Users OFFICE 365 APP.
©2011 Quest Software, Inc. All rights reserved. Quick, Scalable Restore of Granular Objects Recovery Manager for Active Directory.
Solving Today’s Data Protection Challenges with NSB 1.
ITIL and Remedy ITSM Implementation Overview
Copyright 2006 Intelligent Enterprise, Inc. 1 5 Easy Ways to Save $$$ With Technology -or- How to Immediately Improve Your Bottom Line.
© 2013 VCE Company, LLC. All rights reserved. Nigel Moulton : Office of the CTO EMEA Focus on Business not infrastructure.
Consolidating Your Database Infrastructure
Dev and Test Solution reference architecture.
Azure Site Recovery For Hyper-V, VMware, and Physical Environments
Data Platform and Analytics Foundational Training
Dev and Test Solution reference architecture.
Dev and Test Solution reference architecture.
DISASTER RECOVERY INSTITUTE INTERNATIONAL
Dev and Test Solution reference architecture.
Dev and Test Solution reference architecture.
CCNET Managed Services
How to prepare for the End of License of Windows Server 2012/R2
Required 9s and data protection: introduction to sql server 2012 alwayson, new high availability solution Santosh Balasubramanian Senior Program Manager.
Microsoft Azure P wer Lunch
Protect | Transform | Innovate
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Microsoft Virtual Academy
Dev and Test Solution reference architecture.
Microsoft Virtual Academy
Business Continuity Program Overview
Presentation transcript:

VERITAS Confidential Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other VERITAS product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation in the US and/or other countries. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies.

VERITAS Confidential High Availability Leveraging Technology for Business Continuity and Corporate Security

VERITAS Confidential Benefits Best Practice for Business Continuity Lowers Costs Reduces Security Risk

VERITAS Confidential Customer Facing and Revenue Generating Just replicating the database is not enough Can’t have a crippled website, customers need full access Manual restores ATOD no longer feasible for 24/7 “Even 99-percent uptime may still not be enough because customers expect around-the-clock access to systems and applications. With competition just a click away, businesses must ensure the continuous availability of their internal and customer-facing systems to succeed in today’s business world.” Nigel Stokes, CEO, DataMirror

VERITAS Confidential High Availability Essential for BC Protects mission critical data and applications Reduces system downtime –Full restore = between 48 and 72 hours and several sys admin resources –High-availability solution = a switch-over and successful failover within 30 minutes. Effectively complies with mandated government regulations: –Basel II –Sarbanes-Oxley Act Minimize downtime and costs of planned and unplanned outages. –High-availability solutions allow IT staff to conduct scheduled maintenance when required by performing a switchover that allows all internal and external-facing systems and applications to be temporarily housed on a backup server - end-users continue using the systems and applications they need and companies maintain business-as-usual operations

VERITAS Confidential Manual Environments Source: IDC 2002 Microsoft Primary Quantitative Research. 400 surveys, IT professionals in data centers, 25 or more servers 53%24%23% 54% 17%29% 56% 17%28% 58% 18%24% 60% 16%24% 62%14%25% 0%10%20%30%40%50%60%70%80%90%100% Percent of Reponses Security Mgmt Network Event Performance Storage Change/Config Degree of Automation ManualScripts Automated Tools

VERITAS Confidential Highest Costs: Staff and Downtime Staff Costs DowntimeTrainingSoftwareHardware Source: IDC 2002 Microsoft Primary Quantitative Research. 400 surveys, IT professionals in data centers, 25 or more servers

VERITAS Confidential HA Best Practice Lowers Costs Least Manual Method = Most Protection –Decreasing these costs is biggest impact to your bottom line 60% of 5 year total cost of ownership for IT systems are staff costs Soft ‘costs savings’ of re-deploying staff to revenue generating activities –HA architecture provides savings comprised of a 30% improvement in server administration & 50% improvement in hardware costs –Large companies realize average cost savings of $30,000 an hour by avoiding planned and unplanned downtime, using HA solutions Clustered = Best Practice Incorporate previous equipment investments in storage and networks Most cases a 20% - 30% reduction in annual total cost of IT operations by consolidating servers, decreasing administration costs Ability to rollout repeatable HA environments quickly and effectively, improving service levels, reducing support and implementation costs Standard methods for monitoring the health and status of the clusters Integrated set of management tools and guidance equal improved network and application up-time. Source: IDC 2003

VERITAS Confidential Security Risks

VERITAS Confidential Security Risks Lack of coordination leads to wasted effort, miscommunication and ultimately environment gaps Not planning architecture at front end leaves you open to ad-hoc add-ons that pose inherent security risk Manual restore is reactive vs. proactive Greater margin/opportunities for error

VERITAS Confidential Standards = Resilience Increase Operational Efficiency Implementation strategy that does not impact production Concurrent project plan for roll-out at Primary and DR Data Centers Enhance Change Management Mechanisms DR Repository framework with ITIL and SDLC tie-ins to the plan management process for updating your architecture and changes to production as you go through your development cycle

VERITAS Confidential Recommended Reading “Defeating Downtime in the 24/7 Business World”, Nigel Stokes, DataMirror, Continuity Insights May/June 2004 “Never Failover on a Monday: Overcoming The Five Fatal Flaws of Traditional Replication Solutions”, MessageOne, Inc. White Paper 2005 “Managing the Impact of Downtime”, Dan Kusnetzky, IDC Study VERITAS Solutions 2005

VERITAS Confidential Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other VERITAS product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation in the US and/or other countries. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies.