Presentation is loading. Please wait.

Presentation is loading. Please wait.

VERITAS Confidential Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other VERITAS.

Similar presentations


Presentation on theme: "VERITAS Confidential Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other VERITAS."— Presentation transcript:

1 VERITAS Confidential Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other VERITAS product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation in the US and/or other countries. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies.

2 VERITAS Confidential High Availability Leveraging Technology for Business Continuity and Corporate Security

3 VERITAS Confidential Benefits Best Practice for Business Continuity Lowers Costs Reduces Security Risk

4 VERITAS Confidential Customer Facing and Revenue Generating Just replicating the database is not enough Can’t have a crippled website, customers need full access Manual restores ATOD no longer feasible for 24/7 “Even 99-percent uptime may still not be enough because customers expect around-the-clock access to systems and applications. With competition just a click away, businesses must ensure the continuous availability of their internal and customer-facing systems to succeed in today’s business world.” Nigel Stokes, CEO, DataMirror

5 VERITAS Confidential High Availability Essential for BC Protects mission critical data and applications Reduces system downtime –Full restore = between 48 and 72 hours and several sys admin resources –High-availability solution = a switch-over and successful failover within 30 minutes. Effectively complies with mandated government regulations: –Basel II –Sarbanes-Oxley Act Minimize downtime and costs of planned and unplanned outages. –High-availability solutions allow IT staff to conduct scheduled maintenance when required by performing a switchover that allows all internal and external-facing systems and applications to be temporarily housed on a backup server - end-users continue using the systems and applications they need and companies maintain business-as-usual operations

6 VERITAS Confidential Manual Environments Source: IDC 2002 Microsoft Primary Quantitative Research. 400 surveys, IT professionals in data centers, 25 or more servers 53%24%23% 54% 17%29% 56% 17%28% 58% 18%24% 60% 16%24% 62%14%25% 0%10%20%30%40%50%60%70%80%90%100% Percent of Reponses Security Mgmt Network Event Performance Storage Change/Config Degree of Automation ManualScripts Automated Tools

7 VERITAS Confidential Highest Costs: Staff and Downtime 0 10 20 30 40 50 6070 Staff Costs DowntimeTrainingSoftwareHardware Source: IDC 2002 Microsoft Primary Quantitative Research. 400 surveys, IT professionals in data centers, 25 or more servers

8 VERITAS Confidential HA Best Practice Lowers Costs Least Manual Method = Most Protection –Decreasing these costs is biggest impact to your bottom line 60% of 5 year total cost of ownership for IT systems are staff costs Soft ‘costs savings’ of re-deploying staff to revenue generating activities –HA architecture provides savings comprised of a 30% improvement in server administration & 50% improvement in hardware costs –Large companies realize average cost savings of $30,000 an hour by avoiding planned and unplanned downtime, using HA solutions Clustered = Best Practice Incorporate previous equipment investments in storage and networks Most cases a 20% - 30% reduction in annual total cost of IT operations by consolidating servers, decreasing administration costs Ability to rollout repeatable HA environments quickly and effectively, improving service levels, reducing support and implementation costs Standard methods for monitoring the health and status of the clusters Integrated set of management tools and guidance equal improved network and application up-time. Source: IDC 2003

9 VERITAS Confidential Security Risks

10 VERITAS Confidential Security Risks Lack of coordination leads to wasted effort, miscommunication and ultimately environment gaps Not planning architecture at front end leaves you open to ad-hoc add-ons that pose inherent security risk Manual restore is reactive vs. proactive Greater margin/opportunities for error

11 VERITAS Confidential Standards = Resilience Increase Operational Efficiency Implementation strategy that does not impact production Concurrent project plan for roll-out at Primary and DR Data Centers Enhance Change Management Mechanisms DR Repository framework with ITIL and SDLC tie-ins to the plan management process for updating your architecture and changes to production as you go through your development cycle

12 VERITAS Confidential Recommended Reading “Defeating Downtime in the 24/7 Business World”, Nigel Stokes, DataMirror, Continuity Insights May/June 2004 “Never Failover on a Monday: Overcoming The Five Fatal Flaws of Traditional Replication Solutions”, MessageOne, Inc. White Paper 2005 “Managing the Impact of Downtime”, Dan Kusnetzky, IDC Study VERITAS Solutions 2005

13 VERITAS Confidential Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other VERITAS product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation in the US and/or other countries. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies.


Download ppt "VERITAS Confidential Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other VERITAS."

Similar presentations


Ads by Google