1 / 52

Mastering Application Availability and Disaster Recovery A Business Continuity IT Primer

Mastering Application Availability and Disaster Recovery A Business Continuity IT Primer. Market Indicators Show Attention to Business Continuity is Rising*. 59% of CIOs surveyed have increased spending for and focus on Business Continuity Initiatives

Download Presentation

Mastering Application Availability and Disaster Recovery A Business Continuity IT Primer

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mastering Application Availability and Disaster Recovery A Business Continuity IT Primer

  2. Market Indicators Show Attention to Business Continuity is Rising* • 59% of CIOs surveyed have increased spending for and focus on Business Continuity Initiatives • In 1H 2005, finance and manufacturing organizations lost 16% and 9% respectively of annual revenues due to downtime • Only 26% of all organizations have calculated the cost of downtime • 66% of enterprises don’t test their disaster recovery plan yearly • 70% of firms who could not access their data within 3-5 days after the SF earthquake & NY WT went out of business • Current practice focuses only on compliance with Disaster Recovery requirements *Based on Financial Times paper, “Business Continuity and Disaster Recovery”, June 2005, Symantec customer research, EMS reports

  3. Industry Terms • Disaster – any unplanned event that significantly impacts business functions • Significant Impact – i.e. Risk of Bankruptcy • Loss of market share • Exposure to litigation / legal action • Revenue loss • Disaster Recovery – Activities and programs designed to return the compute power of an organization to an acceptable condition. 1) The ability to respond to an interruption in services by implementing a disaster recovery plan to restore an organization's critical business applications

  4. Industry Terms • Business Continuity Management – A holistic management process that identifies potential impacts that threaten an organization and provides a framework for building resilience with the capability for an effective response that safeguards the interests of its key stakeholders, reputation, brand and value creating activities

  5. Industry Terms • Risk Assessment • Business Impact Analysis • Recovery Point Objective (RPO) • Data Loss Management, or how old can the data be before there is significant impact to the business? • Measured from time of interruption going back in time • Recovery Time Objective (RTO) • Recovery Time Management, or how long can end users wait to get data and applications back before there is significant impact to the business? • Measured from time of interruption to resumption of service

  6. List of IT Risks That Create Business Outages is Growing Business Risk Business Risk • Market risk • Credit risk • Interest rate risk • Currency risk Operational Risks Other Risks • Business process • People and talent • Environment • Physical infrastructure Non-IT Risks IT Risks Security Risk Availability Risk Performance Risk Scalability Risk Recoverability Risk Compliance Risk • Computer crimes • Internal breaches • Cyber terrorism • Configuration changes • Lack ofredundancyin architectures • Human errors • Distributed architectures • Peak demand • Heterogeneity inthe IT landscape • Business growth • Provisioning bottlenecks • Silo-edarchitectures • Hardware and/or software failures • External threatssuch as security • Natural disasters • Government regulations • Corporate governance guidelines • Internal policy Business Continuity Elements Disaster Recovery Elements

  7. Company X Business Continuity vs. Disaster Recovery Leadership Procurement Communication Administration Marketing Dept. Legal HR Operations Manufacturing IT Finance

  8. Company X Business Continuity Management • Health & safety • Evacuation procedures • Business relocation Business Continuity vs. Disaster Recovery

  9. Company X Business Continuity Management • Health & safety • Evacuation procedures • Business relocation Business Continuity vs. Disaster Recovery IT Leadership Procurement Communication Administration Servers Applications Security Web DBA

  10. Company X Business Continuity Management • Health & safety • Evacuation procedures • Business relocation Business Continuity vs. Disaster Recovery Disaster Recovery IT • People • Processes • Facilities • Technology

  11. Company X Business Continuity vs. Disaster Recovery Leadership Procurement Communication Administration Marketing Dept. Legal HR Operations Manufacturing IT Finance IT Leadership Procurement Communication Administration Servers Applications Security Web DBA

  12. RecoveryObjectives Events CapabilitiesAssessment Testing ChangeManagement StrategyDevelopment Education PlanDevelopment ArchitectureDesign TechnologyImplementation Business Continuity Management Program ChangeManagement

  13. RecoveryObjectives RecoveryObjectives Events CapabilitiesAssessment Testing ChangeManagement StrategyDevelopment Education PlanDevelopment ArchitectureDesign TechnologyImplementation Business Continuity Management Program ChangeManagement

  14. Sound Familiar? This is how much it will cost… How much time and data can you afford to lose? Guess I don’t need it that fast! Needs vs. Wants

  15. The Balancing Act

  16. Dialing in Availability SECONDS MINUTES HOURS DAYS RECOVERY TIME RECOVERY POINT Manually rebuild servers Automated server provisioning (Provisioning Manager) Wide-area clustering (Cluster Server) application Tape backup (NetBackup) Asynchronous replication (Volume Replicator) Synchronous replication (Storage Foundation or Volume Replicator) data

  17. DR Site Local Datacenter HA/DR Problems 2001-2006 Duplication is Very Expensive Hardware Failure Data Loss

  18. DR Site Local Datacenter HA/DR Solutions Circa 2001-2006 Proliferation of Two Node Clusters Data Replication Tape Backup Maturation of Company’s Disaster Recover Strategies

  19. DR Site Local Datacenter HA/DR Solutions Circa 2001-2006 Proliferation of Two Node Clusters Data Replication Tape Backup Low RPO and RTO Tapes were difficult to recover Maturation of Company’s Disaster Recover Strategies

  20. DR Site Local Datacenter HA/DR Solutions Circa 2001-2006 Proliferation of Two Node Clusters Data Replication Tape Backup Poor Server Utilization Complicated Management Low RPO and RTO Tapes were difficult to recover Maturation of Company’s Disaster Recover Strategies

  21. DR Site Local Datacenter HA/DR Solutions Circa 2001-2006 Proliferation of Two Node Clusters Data Replication Tape Backup Poor Server Utilization Complicated Management Low RPO and RTO Tapes were difficult to recover Data at DR site, but application still down Maturation of Company’s Disaster Recover Strategies

  22. Changes in IT and Impact on HA/DR Everything is Mission Critical Scale of IT (Larger Data Centers) Human Impact

  23. Changes in IT and Impact on HA/DR Everything is Mission Critical Scale of IT (Larger Data Centers) Human Impact

  24. Databases Middleware Applications Network Storage Servers Virtual Machines Data Center Complexity 90 91 92 93 97 95 96 89 94 87 83 85 84 98 82 81 54 79 88 99 100+ 86 78 77 76 80 67 68 69 70 73 66 74 71 65 61 72 62 75 60 59 58 57 56 55 63 64 TOOLS REQUIRED 44 43 42 41 40 36 38 37 45 35 25 31 48 46 27 28 29 30 39 52 51 50 49 53 34 47 26 32 24 33 22 21 20 19 18 16 15 14 13 12 11 17 9 8 7 6 5 4 10 3 2 1 0 23 Data Protection Storage Management Server Management Application Performance NetWorker Galaxy ArcServe Media Mirror DiskXtender EmailXtender TSM SAM-FS Data Migrator RSS NearStore BrightStor Mobile Backup ECC AppIQ Creekpath HiCommand TPM SAN Copy MirrorView RepliStor TrueCopy DoubleTake PPRC SRDF MPIO Sun SRM ReiserFS SAN Navigator Aperi ShadowImage InstantImage SnapView Shadow Copy FlashCopy TimeFinder Ext3 SANFS PowerPath ServiceGuard Sun Cluster MSCS HA-CMP TrueCluster IBM TPM / TIO BMC HP OpenView CA Jumpstart Opsware Bladelogic Tivoli Data Protector EDM NT Backup OnTap NetVault LiveVault SyncSort Retrospect Ultrabac Tapeware DLM DLM LVM SVM ASM MDUX SVC LDM OCFS DFM UFS ZFS JFS GPFS Altiris ClusterFrame Polyserve GeoSpan Qlusters SteelEye Kickstart N1 Grid HP UDC ADS, SMS Marimba AppManager OEM Patrol Foglight DBArtisan DGI Topaz CCMS PAC Optane Silk TheGuard eHealth Vantage PathFinder Introscope JProbe Sitraka MOM Performasure Tivoli Patrol Corefirst Appsight

  25. Manage Data Center Complexity Built in management tools: Location, Platform, Physical or Virtual Same tools across every platform Centralized Management Powerful Reporting

  26. HA/DR for Virtualization Increased need for Production Level HA/DR for business critical applications Taking Virtualization to another level: Mixed Physical and Virtual Environments Management of Physical and Virtual Data Centers

  27. Virtualization Means Even More Platforms • vPars • nPars • Virtual Machines • Secure Resource Partitions • Zones • Containers • LPARs • Micro-Partitions Application Availability, Disaster Recovery, Server Provisioning, Config Management Storage Management

  28. Symantec Solutions for Server Virtualization • vPars • nPars • Virtual Machines • Secure Resource Partitions • Zones • Containers • LPARs • Micro-Partitions Veritas HA/DR Solutions Application Availability, Disaster Recovery, Server Provisioning Storage Management

  29. Changes in IT and Impact on HA/DR Everything is Mission Critical Scale of IT (Larger Data Centers) Human Impact

  30. Interdependent web of applications, databases, services Changes to one application impacts another Configuration drift in clustered environments preventing proper failover The Human Impact “80% of mission critical application downtime is caused by people and process issues (versus technology issues).” Leading IT Analyst

  31. Proactive HA/DR through Configuration Management • Identifying problems • Proactively determine the impact of a change • Tracking changes over time AUTOMATIC DISCOVERY DEPENDENCY MAPPING CHANGE CONTROL • Comprehensive discovery • Detect custom apps “out-of-the box” • Event-driven data collection • Builds maps automatically • Applications, files, & servers • Tie Apps to business services • Real-time change tracking • Proactive impact analysis • Notification of changes

  32. Prod SG FD SG Non Disruptive Testing Secondary Site Primary Site Never Tested DR Plan 78% Testing Impacts Production Testing is Inconvenient Snapshot

  33. Changes in IT and Impact on HA/DR Everything is Mission Critical Scale of IT (Larger Data Centers) Human Impact

  34. Everything is Mission Critical Government Regulations End User Expectations Importance of IT in the Business Expectations are no downtime or data loss, however be mindful of costs!

  35. + HA/DR VERITAS Cluster Server VERITAS Storage Foundation + Volume Replicator or 3rd party Replication VCS Supports All Architectures Local Clustering Metropolitan Disaster Recovery Wide Area Disaster Recovery Remote Mirroring Replication Remote Mirror, SAN Attached, Fibre Replication, IP, DWDM, Escon VERITAS Cluster Server

  36. Making HA/DR Work and Affordable Backup for All Employees Larger Clusters Increase Server Utilization Remote Office Data Center Server and Storage Tiering Zero Data Loss That’s Affordable Tier Two Tier One Tier One

  37. Primary Site Bunker Site Secondary Site Traditional approach • 5X storage requirement • Storage hardware lock in • Cascaded (more dependencies) • Heavy-weight bandwidth reqs Veritas Bunker Replication approach • Reduces storage requirements • Reduced bandwidth requirements • Zero RPO over any distance • Little or no application impact Bunker Replication: RPO of Zero over any Distance

  38. Dual Use DR Sites Production Site Test/Dev Site LOCAL CLUSTER WIDE-AREA CLUSTER -Site Outage- Test/Dev Servers Reprovisioned • Architecture graphic? • Intuit example? MIRRORING REPLICATION

  39. Business Continuity Solutions from Symantec Plan Design and implement Business Continuity and Disaster Recovery Requirements and Strategies Protect Protect against security threats and avoid outages by proactively monitoring configurations and doing regular testing Business Continuity Respond Ensure that service delivery objectives are met through data protection, replication, clustering, and data recovery

  40. Business Continuity Solutions from Symantec Plan Business Continuity Management Services Data Center Foundation Services Protect Protect against security threats and avoid outages by proactively monitoring configurations and doing regular testing Business Continuity Respond Ensure that service delivery objectives are met through data protection, replication, clustering, and data recovery

  41. Business Continuity Solutions from Symantec Plan Business Continuity Management Services Data Center Foundation Services Protect Symantec Enterprise Security Products Configuration Manager Veritas Cluster Server – Fire Drill Testing Business Continuity Respond Ensure that service delivery objectives are met through data protection, replication, clustering, and data recovery

  42. Business Continuity Solutions from Symantec Plan Business Continuity Management Services Data Center Foundation Services Protect Symantec Enterprise Security Products Configuration Manager Veritas Cluster Server – Fire Drill Testing Business Continuity Respond Data Protection: Net Backup, Backup Exec Clustering: Veritas Cluster Server Replication: Veritas Volume Replicator Provisioning: Veritas Provisioning Manager

  43. CHALLENGES SERVICES • High availability clustering • Data replication • Replicated data clusters for global disaster recovery • Failover simulation and testing • Process optimization • Keep your applications and data center up and running worldwide • Simplify deployment andoperations of heterogeneous clustering solutions • Automate and simplify failover • Reduce data loss and frequency, duration, and cost of IT downtime High Availability Achieve the highest level of data and application availability

  44. CHALLENGES SERVICES • Protect your organization’s staff, facilities, processes, IT infrastructure, clients, brand, and reputation against planned and unplanned outages • Meet insurance, legal, contractual regulatory requirements • Optimize your business and technology recovery time • Current state assessment • Business continuity planning • IT continuity planning (IT disaster recovery planning) • Crisis management • Incident management • Application availability • Workshops Business Continuity Management Help mitigate the business impact of planned and unplanned outages

  45. Storage Foundation and Server Foundation 5.0 New Service Details • Storage and Availability Standardization Assessment • Storage Foundation and High Availability • ROI analysis • Storage and Availability Residency Services Program • Solution Services • Centralized Storage Management Deployment • Tiered Storage Deployment • Centralized Cluster Management Deployment • Configuration Management Deployment • Cluster and Application Integration Service (update) Seven new/updated Storage/Server Foundation 5.0 related services now available.

  46. Centralized Cluster Management Deployment Service Overview • Value Proposition: Enables customers to centralize the management of their clustered application environments to reduce operational costs and improve efficiency • Service Details • Provide a detailed configuration plan • Install and configure Cluster Management Console software • Including database, web server and authentication broker components • Included with Veritas Cluster Server • Functional testing and operational handover to verify software is correctly installed and configured

  47. Configuration Management Deployment ServiceService Overview • Value Proposition: Enables IT operations to increase visibility and configuration management, maintaining business critical application availability while reducing risk and costs • Service Details • Detailed configuration plan • Veritas Configuration Manager installation and configuration with database repository • Agent software deployment on managed hosts • Model and tune the discovery, change tracking and dependency mappings • Functional testing and operational handover to verify software is correctly installed and configured

  48. Cluster and Application Integration ServiceService Overview • Value Proposition: Extends the capabilities of Veritas Cluster Server (VCS) to provide HA and disaster tolerance for business critical applications. • Service Details • Create functional specification for custom application agents • Create agent in the required operating system format • Install and configure the agent at the client’s site • Functional testing to verify software is correctly installed and configured • Builds upon existing Veritas Cluster Server agent development services

  49. Why Invest in Education? With training from Symantec Education you benefit from: • Unrivaled product training expertise with the most up-to-date content available • Certified instructors with real-world experience • Flexible delivery options • Faster, more successful product implementation • Better return on security, data protection, and system availability investment

  50. High Availability/Disaster Recovery Courses • VERITAS Cluster Server 5.x for HP-UX (Suite) (Virtual Academy) • VERITAS Cluster Server 5.x for Solaris (Classroom and Virtual Academy) • HA Design & Customization w/VCS for UNIX & NT (Virtual Academy) • High Availability Design & Customization Using VCS for UNIX & Windows (Web-based) • VERITAS Cluster Server 3.5 for HP-UX (Virtual Academy) • VERITAS Cluster Server 4.x for HP-UX (Suite) (Virtual Academy) • VERITAS Cluster Server 4.x for Solaris (Classroom and Virtual Academy) • VERITAS Cluster Server 4.x for Windows (Classroom and Virtual Academy) • Disaster Recovery Using VVR 4.x and Global Cluster Option (VCS 4.x) for Solaris ot Windows (Classroom) • VERITAS Volume Replicator 4.x for Solaris or Windows (Classroom) For full details of these courses, visit http://www.symantec.com/education

More Related