1 / 32

VERITAS CommandCentral TM Service 4.0 Transforming IT to a Value Center

This solution preview provides an overview of VERITAS CommandCentral Service 4.0, enabling utility computing, centralized IT management, automated processes, standardized service delivery, and more. It highlights key features, customer testimonials, and contact information.

albury
Download Presentation

VERITAS CommandCentral TM Service 4.0 Transforming IT to a Value Center

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. VERITAS CommandCentralTM Service 4.0Transforming IT to a Value Center CustomerLogoHere Solution Preview for Date

  2. Agenda – CommandCentral Service 4.0 • Utility computing overview • Operational features – Business benefits • Key features • Sample software & agent configuration • Architecture • Customer testimonial • Contact information • Questions & answers

  3. Map Operational Feature to Business Benefit

  4. CommandCentral Service What is CommandCentral Service?Enablement of Utility Computing • Centralize IT management • Visibility enablement • Automate processes • Standardize service delivery • Continuous monitoring • Report generation • Proactive alerting • Define service levels • Minimize & allocate costs

  5. Availability Storage Service VERITAS CommandCentralTM Management Family VERITAS Cluster Server VERITAS NetBackup & Backup Exec VERITAS Storage Foundations Heterogeneous Hardware Layer 4Q2003 1H2004

  6. Key Features CommandCentral Service 4.0 • Integration with CommandCentral Storage • Common install, database, server & agents • Common web UI, log-in (VSS) • Cross linking between modules • Roll up of data from multiple CCSTOR instances • Integration with CommandCentral Availability • Server, cross-linking & reporting • Brand with company logo, colors

  7. Key Features CommandCentral Service 4.0 • Align service by business grouping (Business Views) • Filter service portal to audience (e.g., mgmt) • Measure storage allocation, utilization, backup/restore, delivery • Customized reporting and alerting

  8. Key Features CommandCentral Service 4.0 • Additional chargeback flexibility • By job type • By class of storage • By media usage • Per port • Define hierarchical cost centers and assign resources • Allocate costs based upon allocation and utilization of storage and backup/restore • Price by class of service (e.g. RAID level) and time period • Bill, export, email, forecast, trend

  9. Key FeaturesCommandCentral Service 4.0 • Highlights • View success/failure of backups in environment • Manage changes to environment • Explore media usage and allocation • Consolidate errors and skipped files for backups • Analyze drive usage over time • Capture best practices and documentation in knowledge base

  10. Key Features CommandCentral Service 4.0 • Embedded workflow engine • Visio-based workflow designer • Self service request portal • Status tracking • Notifications, escalations, approvals • Best practice storage and backup workflows

  11. Other Key FeaturesCommandCentral Service 4.0 • Highly customizable report wizard • Improved usability • Less complex than current “view, level, filter, …” • Very granular filtering • E.g., by job type, by status, by status code • Improved presentation • E.g., set size (MB, GB, …) • Export • Support for 3rd party backup applications – TSM, Legato • Generic agent • Collect arbitrary data (e.g., CPU utilization) • Tag objects with arbitrary information

  12. Accountability Usage / CostsService Levels IT App CRM IT App HR SharedComputing Delivering IT Shared Services InfrastructureService Portal Visibility Utilization / Perf.Trending / Planning Shared Storage ITManagement Shared Backup Shared Computing Shared Network ITInfrastructure SharedStorage Shared Hosting Shared Help Desk Delivery Standard Service LevelsDefined SLOs / TiersStandard Processes

  13. CommandCentral Service 4.0Sample Configuration Scenario: SAN and NBU Master Server Backup Environment CCSVC Management Server Tape Library SAN Agent requirements SAN – agents on all clients NBU – no agents required BE – agent required on clients TSM – no agents required Legato – agent required on clients

  14. CommandCentral ArchitectureIntegrated, Modular Solution Consumer Provider Management Secure Web-Access (SSL) Consolidated Mgmt. Server(Windows or Solaris) Highly-Available via VCS Java Architecture(built-in JRE) Unified Database(Embedded Sybase) Personalized Service Portal (Apache Tomcat) Unified Management License-able Modules Unified Security Model (Single Sign-On, Access Control, User Groups and Roles) Unified Data Warehouse Storage InterfacesArrays, switches, HBAs, hosts, volume managers, file systems, directories, files, databases, applications, users Backup/Recovery InterfacesVERITAS NetBackup, VERITAS BackupExec, Tivoli Storage Manager, Legato Networker, … UnifiedAgent-less andAgent-basedInterfaces

  15. CommandCentral ArchitectureOpen Solution 3rd-Party Framework(HP OpenView, etc.) SNMP Remedy Peregrine 3rd-PartyWorkflow(Remedy, etc.) 3rd-PartyAuthentication(Windows, etc.) VSS Vantive Workflow API / CLI ODBCOpen Schema Agent SDK XML Import Custom AgentDevelopment 3rd-Party Reporting Tool(Access, Crystal, etc.) 3rd-Party Asset DB(Peregrine, etc.)

  16. Unified Data Warehouse Data Store Data Store Data Store CommandCentral ArchitectureScalable Solution Provider PrimaryManagementServer Data Roll-UpBusiness/Cost AlignmentService Portal … Data Center 1 Data Center 2 Data Center n VERITAS Confidential

  17. CommandCentral ArchitectureSecure Solution • Give your users one login • Secure Web access (SSL) • VERITAS Security Service – across VERITAS products • Use existing log-ins (Windows, Unix, NIS, NIS+) • Toolkit to plug-in to other systems • Control who can do what • Select what to report against (views – e.g., hosts, f/s, departments, etc.) • Select which actions to perform (rights – e.g., zoning, binding, user admin, etc.) • Create user/department/data center/LOB/etc. “portals” • Workflow to ensure consistent, approved processes • Minimize administration hassles • Web-based user administration • Delegated access administration • Copy users / user profiles • Create groups of users • Know what happened • Audit trail of all actions and workflow steps VERITAS Confidential

  18. CommandCentral ArchitectureLeveraged Solution* • Volume Manager • VERITAS VM / DMP • IBM AIX LVM • File System • All FS’s on supported OS’s • Deeper LUN mapping with VxFS • Backup • VERITAS NetBackup** • VERITAS BackupExec • Tivoli Storage Manager** • Legato Networker • Management Server • Solaris, Windows • Host Operating Systems • Solaris, Windows, HP, AIX, Linux • Database • IBM DB2 • Oracle • Microsoft SQL Server • Sybase ASE • Cluster • VERITAS Cluster Server • Microsoft Cluster Server • Messaging • MS Exchange Check HCL for support OS’s for above applications VERITAS Confidential

  19. CommandCentral ArchitectureLeveraged Solution (cont’d) • Arrays • Discovery, LUN Binding, Multi-LUN Binding, LUN Masking, Multi-LUN Masking, Performance Monitoring, LUN to Disk Mapping, LUN Creation • HDS/SUN 9970/80, HPQ EVA (HSV), CLARiiON Cx600, EMC Symmetrix/DMX, HDS 9500, IBM ESS 800, IBM Fast-T CIM, HP XP 128/1024 CIM, IBM ESS F10/20, NetApp F825/FAS900/F87, NetApp Filers** • Switches • Discovery, Zoning, Performance Monitoring, Multi-vendor Interoperability, Multiple Zone Set Support, Trunking Support, GS4 FDMI, Switch Port Enable/Disable • Brocade, Cisco, McDATA (InRANGE/Qlogic) • HBAs • Discovery, correlation, asset, OS mapping, FDMI support • Emulex, Qlogic, JNI, HP, IBM, Sun VERITAS Confidential

  20. Customer Success Story: Dartmouth College

  21. Dartmouth IT EnvironmentDecentralized, Heterogeneous Infrastructure Dartmouth Machine Room • Heterogeneous IT environment – Windows, Solaris, AIX, HP-UX, Mac OS, etc. • Storage & Server Growth > 200% annually

  22. Utility Model RationaleImproved Records Management & Processes • Centralize IT • Standardize on backup policies and data recovery procedures (data protection service) • Provide expert assistance to departments • Improve efficiency • Enable process efficiencies for service requests • Improve data management, availability and performance • Transform IT from a cost center to a value center • Align IT with college needs and demonstrate value • Charge departments based on usage

  23. Service DefinitionCreating the initial offering • How defined? • How to obtain buy-in? • How supported?

  24. Utility Model ImplementationReporting & Cost Recuperation Model • Short-term: Offer service as a pilot & learn… • 500 users in select departments • Hardware leasing strategy to minimize CapEx • Usage-based cost allocation with monthly billing cycle automatically deducted • Accurate & timely usage reporting by department • Feedback drives increased deployment • Long-term: Create campus-wide offerings • All faculty, staff, students • Specific service levels / offerings • Flat-rate pricing tiers • Monthly billing automatic • Accurate & timely reporting • Expansion beyond data protection (storage, servers, etc.)

  25. Utility Model BenefitsCost Reduction, Service Improvement • Headcount savings & focus on core competencies • Physical resource savings • (Showcase) IT aligned with college goals/objectives • Service improvement for data recovery • Detailed ROI is underway

  26. ServiceDefinition ServiceCostAllocation ServiceRequest ServiceLevelReporting Service Delivery Management Service Level Management ServiceApprovals ServiceLevelMonitoring ServiceProvisioning Dartmouth Data Protection Utility Approach: IT Service Lifecycle ServicePlanning

  27. Lessons LearnedWhat we wish we’d known when we started • Improve computer literacy (nightly machine power down example) • Leverage consultant / help desk organization for education & first-level support • Increase interaction frequency – weekly rather than monthly (avoid sticker shock) • Understand this is an evolutionary process –understand usage to define proper service offerings & levels… make sure plan enough time to “get it right”

  28. CommandCentral Service What is CommandCentral Service?Enablement of Utility Computing • Operational Features • Centralize IT management • Visibility enablement • Automate processes • Standardize service delivery • Continuous monitoring • Report generation • Proactive alerting • Define service levels • Minimize & allocate costs • Business Benefits • Manage increased data w/ existing headcount • Activate existing resources – prolong capital expenditure • Allow IT to focus on core competency • Maximize data availability for business purposes • Inform IT and business decision makers • Align applications with appropriate cost of infrastructure • Enable chargeback to business line based on usage

  29. For More Information • VNET - http://prod.veritas.com/Products/vnet?c=product&refId=73 • Product Marketing Manager • Mike Reynolds • (650) 527-4325 • mike.reynolds@veritas.com • Product Manager • Nick Mehta • (650) 527-3780 • nick@veritas.com

  30. & QUESTIONS ANSWERS

More Related