《Business COntinuity.ppt》由会员分享,可在线阅读,更多相关《Business COntinuity.ppt(55页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。
1、Novell Solutions for Business ContinuityHerndon, VARamesh PattniAVP/Senior StrategistRamesh.PAre You Ready for This?IT Problems Shrinking Budgets Reduced Headcount Greater DemandsAccording to Gartner Two out of five enterprises that experience a disaster will go out of business within five years. Wh
2、ile 85% of Global 2000 enterprises have a disaster recovery plan covering core technology and infrastructure, only 15% have a full-fledged business continuity plan.Source: “What is Crisis Management?”Gartner Research, September 2001Cost of DowntimeBusiness OperationAverage Cost per Hour$6.5 millionB
3、rokerage Operations$2.6 millionCredit Card/Sales Authorization$1.1 millionPay-per-View Television$113.0 thousandHome Shopping (TV)$90.0 thousandHome Catalog Sales$89.5 thousandAirline ReservationsThe ProblemLevel of Executive concern for disaster recovery and business continuityIT budget allocation
4、Rapid Technology Rationalization (RTR)InnovateERP applicationsEnhance/MaintainCompetitive EdgeIT infrastructure“Keep the trains running well”RTR identified short term savingsRelatively low-risk investments needed to promote steady growthHigher-risk but strategic investmentsInvestLeverageAlignment wi
5、th business objectivesRTR Savings$Novell Solutions for Business ContinuityYear 1Year 2Year 30 25% 50% 75%Novell offers reliable solutionswith recovery and business continuitycapabilities built right in!Source: CIO November 2001CIOs October 2001 survey of 320 IT professionals showed that companies wi
6、ll increase their investment in IT contingency and disaster recovery plansAfter 9/11 IT Priorities Have Shifted54% will increase spending on DRP46% will keep DRP costs the same34% will increase spending in off-site redundant systems31% will increase spending in off-site data and application backups2
7、5% will increase spending in backup facility for employees24% will increase spending in replacement equipment23% will increase spending in remote access23% will increase spending on virus detectionBusiness Continuity must coverPeopleProcessInformation technology ConnectivitySupply chainCall CentersF
8、acilitiesIts not just the data center!Business Continuity Life CycleBusiness ImpactAssessmentStrategy ImplementationAndTestingMaintenanceAnd yearlyupdatesBusiness ContinuityStrategiesBegin with a Business Impact Assessment Objective To clearly and impartially demonstrate the bottom line impact of sy
9、stems and other disruptions on specific functional areas within your enterpriseGoals To quantify the level of Business Continuity Planning needed to ensure rapid restoration of key business processes and resumption of technology based operations in the event of a disruption. To meet the requirements
10、 set forth by customers, suppliers and employeesWhy is the Business Impact Assessment ImportantWhich processes and functions are critical, necessary, or optional for business survival In what order and how fast these functions need to be recovered What the interdependencies of these functions areWha
11、t the financial exposures areThe impact on revenue, investor confidence, customer service, goodwill, competitive edge, market share, etc. if critical functions cant be performed Specialized Products and ServicesBusiness Continuity physical and technical infrastructureReduced Business ContinuityTechn
12、ical InfrastructureNetwork Redundant CoolingBattery Backup UPSPower GenerationIncreasing CostsHigher Business ContinuityApplication ArchitecturePower from multiple stations SecurityServer Clustering & BladesSAN and NAS storageOff-Site data & app. backupsOff-site redundant systems Follow-the-sun NOC
13、Help desk Backup facilities for employeesPhysical l InfrastructurePreventing a Crisis with Strong Integrated SecurityEstablish a robust and integrated security infrastructure that is cost-effective tomanage and easy to useKey Building BlocksAccess and SecurityPortalIdentity ManagementNovell Secure A
14、ccess AdvantagesReduce security risk to a minimum Reduce time and costsPassword management Web infrastructure managementWeb application developmentDeliver dramatic ROI to day-to-day operationsCentrally manage all security pointsControl application security costsNovell Secure Access SuiteNovell eDire
15、ctory Novell Account Management andSecureLoginNovell iChain Novell BorderManagerNovell Modular Authentication Services (NMAS)Authentication Services Restoring CommunicationsFacilitate crisis management and work flow with an automatically-maintained emergency contact list and Web and e-mail access to
16、 any location or deviceGroupWise 6:Secure, Dynamic CommunicationFlexible access to e-mail communication Across the network Any Internet-connected device, wired or wirelessWorkflow capabilities to continue business processes“Chunking” data and clustering capabilities for redundancyCaching mode to wor
17、k offlineROI and accelerated corporate productivity The only bundled wireless solution in the industry Decrease server requests by up to 90% Decrease server overhead by more than 50% Reduced overall networking costsRestoring Critical CommunicationsLess than one hour downtime per year when these serv
18、ices are used in conjunctionSupport for secure protocols (SSL, S/MIME)Clustering promotes redundancy across the server cluster in event of an outageEstablish a Communication Command CentereGuide Access latest contact and organizational data from backed-up network and HR directories Conduct browser-b
19、ased searches for employee information across LDAP-enabled directories Improve daily productivityNovell Portal Services Portal capabilities allow a virtual command center that can be accessed from any device Communicate customized updates and instructions via the web Personalize portal content and s
20、ervices to each user Lower cost of ownership for portal infrastructure Recovering Data and Restoring AccessAutomatically back up or mirror localand network mission-critical dataand user identities with integratedWeb and VPN servicesLevels of Data RecoveryTape backupTape backup offsiteMirrorMirror fa
21、iloverCost/data importanceFunctionRecover Data and Restore AccessAutomatically back up or mirror local and network mission-critical data and user identities with integrated services to immediately restore access to that data via VPN or even the webNovell NetWare 6 Supports all leading backup solutio
22、ns Offers automated and cost-effective options for backing up data locally, remotely, and in real-time Allows instant access to data files, even if network connection becomes unavailable Offers remote management benefitsNetWare 6 Data RedundancyNovell Cluster Services Free cluster software for up to
23、 two systems in NetWare 6 Up to 32 NetWare servers in a cluster Mirror data within a geographically distributed cluster for redundancy Eliminate single point of failure Transparent failoveruninterrupted access FAN-OUT FAILOVER for load balancing on failover Cluster enable any applications running on
24、 NetWareone NetData centerHigh availability, reduce management costs and consolidate resourcesUsersBack up valuable local files and enhance productivityCreate, share,find, store,organize Branch OfficeReduce storage, connectivity and management costsThree Areas of Storage to ProtectSAN Architecture f
25、or Redundancy(Data Center)Windows, Mac, UNIX, and Novell clientsDisasterrecoverysiteCorporatedatacenterMobile access Novell solutions: NetWare, Cluster Services, Native File Access, Novell Storage Services (NSS) File System, iFolder Partner hardware/software Professional services Disaster recovery H
26、igh availability 24 X 7 backup Scalability Native access Simplified managementHow Does Novell Compare?ExcellentPoorApplication failover/recoveryShared storage/data failoverCascading failoverFile-level client reconnectGrey data preservationAutomatic failbackResource prioritization schemeCluster volum
27、e managerManage multiple clusters centrallySplit brain detectionGeographically separate serversVolume repair and remount timeDynamic node additionAvailabilityScalabilityOverallNovellMicrosoftVeritasBased on IDC Clustering Report and Novell ResearchIntegrated Services for Recovery and Access (Users)N
28、ovell iFolder“We needed a central point of storage for local files, something other than a normal Home Directory that would be available should another disaster occur. We needed something that would back up the users local data automatically because they will never do it themselves. iFolder to the r
29、escue! We have our pilot group syncing their files to a server off-site automatically. It takes no time at all seeing that iFolder only writes the delta rather than the whole darn file like some other similar products.”Steven Beyer, Consultant PC/LAN Support Securities Industry Automation Corporatio
30、n Where is your corporate data?Gartner Group, IDC, and Meta Group state that up to 80% of a companys business critical data resides on PCs (Desktops & Laptops)Up to 96% of all business PCs are not being backed up (Strategic Research Corporation )According to IDC, the mobile work force in the U.S., W
31、estern Europe and Latin America is expected to grow from 34.7 million in 2001 to 60.8 million in 2004. 35% of PCs sold into business organizations are laptops (IDC)What the analysts are sayingAccording to John Girard, a vice president and research director at Gartner, Enterprises can realize substan
32、tial support savings and productivity gains by selecting appropriate remote backup and restore tools for their nomadic users. Avoiding just a few disasters may justify the entire value of the investment. Problems of Data AvailabilityYour data is everywhere and yet, frequently not where you need itYo
33、ur data is difficult to access from the InternetIf your computer experiences a system crash or is stolen, your data is lost no disaster recoveryYou dont dare store sensitive data on the networkYou dont want to change the way you access your dataHomeMobileAirOfficeCyber CafeHotelPDAWhat the Organizat
34、ion Needs Critical corporate data on laptops and desktops needs to be backed up to the network automaticallyLocal files should be safe when they are sent to the server and should remain secure on the network encryption should be automaticAnywhere file access that increases the productivity of all us
35、ersAbility to consolidate the storage and simplify the management associated with network “home directories”Novell iFolder Product OverviewNovell iFolder lets your files follow youeverywhere.No matter where you are, your files are always with youAutomatically backs up your local data Simplifies the
36、way files are used across the NetFiles are always safe, secure, and up-to-dateSecures and protects corporate digital assetsAccelerates the productivity of todays mobile professionalsNovell iFolder BenefitsAutomatically SECURES and protects your files Your files are automatically backed up on the net
37、work and multiple workstations, protecting your organizations critical dataFiles are encrypted during delivery and on the server, so no one but you can access themNovell iFolder BenefitsIt SIMPLIFIES the way you use your files Your files follow you everywhere Your files are automatically updated acr
38、oss the machines your regularly use (Work, Laptop, Home) Your files are in a local directory so you use them the same way you always have If you are on the road you can access your files anywhere using a Web browserNo need to remember complex login procedures Lengthy VPN logins are no longer require
39、dThe view of data is the same on all machines Novell iFolder BenefitsIt makes mobile professionals more PRODUCTIVEThe latest version of your files are always available Make a change at work and the changes show up at home iFolder recognizes the changes you make to files and only sends the changes in
40、 a file, not the whole file Especially important when working with a slow connection from home or in a hotelUses Internet standards so you arent stuck to a LAN-only solution It becomes part of the organizations eBusiness strategyiFolder ArchitectureiFolder ServersJeffs iFolderUser AuthenticationStor
41、ageJeffs iFolder through a browserJeffs iFolderJeffs iFolderJeffs iFolderMatts iFolderOfficeMobileHomeKioskPDAData Recovery and AccessDistributes local data to ensure availability in the event of a disasterConfigurations can be managed more effectively; also, content can be pushed (e.g. virus update
42、s)Automates and pushes security policies, such as termination resultsRecovering WorkspaceProvide automated, identity-based configuration and delivery of applicationsand content across desktops, the Web,and mobile devicesChallenges of Distributed OfficesCustomers want to: Reduce $ to support branch o
43、ffices Consolidate servers, storage, and applications Have directory services for central management at an affordable price when spanning the WAN Reduce costs of backups and administration Reduce the need for IT staff in the field Have disaster tolerance for the rural parts of their network without
44、breaking the bank Reduce costs of low bandwidth private WAN links and leverage the Internet Improve services to users on the outskirts of the networkNovell Nterprise Branch Office Nterprise Branch Office drives the cost out of branch office infrastructure in a distributed enterprise byAutomatically
45、provisioning stationary, mobile, and visiting users in the rural parts of the customer networkAccelerating IT service deployment and access in thebranch officeEliminating the data backup challenges in remote officesSecurely leveraging the Internet for WAN connectivity between central offices and bra
46、nch officesSimplifying directory services for distributed environmentsEnabling server, storage, and application consolidationNterprise Branch Office Key FeaturesSoft applianceNAS-style file servicePortal Services for web-based user accessiPrintData replication for backup (Rsync)Integrates with ZFS f
47、or content distributionDisaster tolerant architectureUser Access ProvisionerNterprise Branch Office ArchitectureBarcelonaBranch OfficeChicagoBranch OfficeHelsinkiBranch OfficeLondonUsersBOMAVOL2BOMAVOL1Visiting User Local Service Cache for File, Print, Directory NAS-Style File Service iPrint Print S
48、ervice Replication for Backup User Access Provisioner for user caching and provisioning Regional data center acts as master of the services and fail-over siteBOMAVOL1BOMAVOL2BOMAVOL3BOMAVOL2iPrint AgentLoginHTTPCIFSNCPNFSAFPFTPiPrint AgentiPrint AgentiPrint AgentRecover Productive Work SpaceQuickly
49、provide new, temporary, or alternate work environmentsAutomated, self-service configuration and delivery of applications and content Delivered across desktops, the web, or mobile device Based on each employees identityProviding a Unified Work EnvironmentLeverage the day-to-day benefits of ZENworks S
50、ynergythe only solution that can deliver All three kinds of applications: web, thin-client, and 32-bit Manage across your network operating systems, including Windows NT/2000 and NetWareRecovering Work SpaceAppropriate content pushed server to server and then desktops (rapid deployment)Mobilizes wor