VERITAS Confidential
Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other VERITAS product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation in the US and/or other countries. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies.
VERITAS Confidential
High Availability
Leveraging Technology for Business Continuity and Corporate Security
VERITAS Confidential
Benefits
• Best Practice for Business Continuity
• Lowers Costs
• Reduces Security Risk
VERITAS Confidential
Customer Facing and Revenue Generating
• Just replicating the database is not enough• Can’t have a crippled website, customers need full
access• Manual restores ATOD no longer feasible for 24/7
“Even 99-percent uptime may still not be enough because customers expect around-the-clock access to systems and applications. With competition just a click away, businesses must ensure the continuous availability of their internal and customer-facing systems to succeed in today’s business world.”
Nigel Stokes, CEO, DataMirror
VERITAS Confidential
High Availability Essential for BC• Protects mission critical data and applications
• Reduces system downtime – Full restore = between 48 and 72 hours and several sys admin resources – High-availability solution = a switch-over and successful failover within 30
minutes.
• Effectively complies with mandated government regulations:– Basel II– Sarbanes-Oxley Act
• Minimize downtime and costs of planned and unplanned outages.– High-availability solutions allow IT staff to conduct scheduled maintenance
when required by performing a switchover that allows all internal and external-facing systems and applications to be temporarily housed on a backup server - end-users continue using the systems and applications they need and companies maintain business-as-usual operations
VERITAS Confidential
Manual Environments
Source: IDC 2002 Microsoft Primary Quantitative Research. 400 surveys, IT professionals in data centers, 25 or more serversSource: IDC 2002 Microsoft Primary Quantitative Research. 400 surveys, IT professionals in data centers, 25 or more servers
53%53% 24%24% 23%23%
54%54% 17%17% 29%29%
56%56% 17%17% 28%28%
58%58% 18%18% 24%24%
60%60% 16%16% 24%24%
62%62% 14%14% 25%25%
0%0% 10%10% 20%20% 30%30% 40%40% 50%50% 60%60% 70%70% 80%80% 90%90% 100%100%
Percent of ReponsesPercent of Reponses
Security MgmtSecurity Mgmt
NetworkNetwork
Event Event
Performance Performance
Storage Storage
Change/ConfigChange/Config
Degree of AutomationDegree of Automation
ManualManual ScriptsScripts Automated ToolsAutomated Tools
VERITAS Confidential
Highest Costs: Staff and Downtime
00
1010
2020
3030
4040
5050
6060
7070
Staff CostsStaff Costs DowntimeDowntime TrainingTraining SoftwareSoftware HardwareHardware
Source: IDC 2002 Microsoft Primary Quantitative Research. 400 surveys, IT professionals in data centers, 25 or more serversSource: IDC 2002 Microsoft Primary Quantitative Research. 400 surveys, IT professionals in data centers, 25 or more servers
VERITAS Confidential
HA Best Practice Lowers Costs• Least Manual Method = Most Protection
– Decreasing these costs is biggest impact to your bottom line• 60% of 5 year total cost of ownership for IT systems are staff costs • Soft ‘costs savings’ of re-deploying staff to revenue generating
activities– HA architecture provides savings comprised of a 30% improvement in
server administration & 50% improvement in hardware costs– Large companies realize average cost savings of $30,000 an hour by
avoiding planned and unplanned downtime, using HA solutions• Clustered = Best Practice
• Incorporate previous equipment investments in storage and networks• Most cases a 20% - 30% reduction in annual total cost of IT operations
by consolidating servers, decreasing administration costs• Ability to rollout repeatable HA environments quickly and effectively,
improving service levels, reducing support and implementation costs• Standard methods for monitoring the health and status of the clusters• Integrated set of management tools and guidance equal improved
network and application up-time.Source: IDC 2003Source: IDC 2003
VERITAS Confidential
Security Risks
• Lack of coordination leads to wasted effort, miscommunication and ultimately environment gaps
• Not planning architecture at front end leaves you open to ad-hoc add-ons that pose inherent security risk
• Manual restore is reactive vs. proactive• Greater margin/opportunities for error
VERITAS Confidential
Standards = Resilience
Increase Operational Efficiency• Implementation strategy that does not impact production • Concurrent project plan for roll-out at Primary and DR
Data Centers
Enhance Change Management Mechanisms• DR Repository framework with ITIL and SDLC tie-ins to
the plan management process for updating your architecture and changes to production as you go through your development cycle
VERITAS Confidential
Recommended Reading
“Defeating Downtime in the 24/7 Business World”,
Nigel Stokes, DataMirror, Continuity Insights May/June 2004
“Never Failover on a Monday: Overcoming The Five Fatal Flaws of Traditional Replication Solutions”, MessageOne, Inc. White Paper 2005
“Managing the Impact of Downtime”, Dan Kusnetzky, IDC Study VERITAS Solutions 2005
VERITAS Confidential
Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other VERITAS product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation in the US and/or other countries. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies.