If there’s one word that strikes fear in the heart of every CIO, it’s this: downtime. IT budgets may shrink, headcount may be reduced, and you may be asked to support an ever-growing list of users and services. But these “problems” pale in comparison to the possibility of a major business-disrupting event.
… A result that can help you avoid becoming a statistic—like the two out of five enterprises that will experience a disaster and go out of business within five years, according to recent Gartner estimates. In some cases, the cost of recovery will simply be too great. In others, the disruption of normal business operations will cause customers to lose confidence in the enterprise’s viability. In fact, the September 2001 attack on the World Trade Center in New York City tested enterprise contingency plans to an unprecedented degree. But companies that had continuity plans and recovery services in place were able to continue business at alternate sites with minimal loss of data and downtime. To be clear, however, a basic disaster recovery plan is not enough. Gartner estimates that 85% of Global 2000 enterprises have established a disaster recovery plan to address core technology and infrastructure, but only 15% have a full-fledged business continuity plan covering all stages of the business lifecycle. Chances are that your organization is one of the 85% still struggling to get business continuity covered.
And if you’ve watched the news over the last year, you know that virtually anything can come your way. Energy shortages, hardware and communication failures, natural disasters, accidents, even terrorist violence—they’re all part of our collective conscience, and they’ve all helped to put disaster recovery squarely at the center of the international IT agenda. In fact, did you know that 72% of mission-critical applications experience nine hours of downtime each year? It may not sound like a lot, but if you’re a brokerage operation, each and every hour will cost you a $6.5 million. With every organization’s core capabilities more IT-dependent than ever, disaster recovery has become nothing short of a business imperative. And disaster prevention is even more so. That’s why Novell net services software includes disaster recovery and business continuity capabilities right out of the box. These capabilities provide a solid, cost-effective foundation that can be easily maintained through day-to-day operations. In fact, our “one Net” vision provides an optimal starting point. When you manage your enterprise as one net—when your data, storage, security, management, and user identity services are tightly integrated and fed by the same directory—business continuity is an inherent result… Source: Standish Group Research
That’s the reality, and it should come as no surprise to all of you. Fortunately, it’s a reality that Novell both recognizes and respects. In fact, you may know Novell for its ability to get networks up and running quickly and effectively; no one in the industry can match the reliability of a Novell-powered network. But what you may not know is that many of the key recovery and continuity capabilities you need to protect your business are built right into your existing Novell solutions at no additional cost . Add to that the consulting and support services we offer in conjunction with our partners, and it’s clear that—even in the face of limited budget and resources—Novell can help you prepare for whatever might come your way.
That’s why Novell and its partners offer specialized products and services to establish a cost-effective business continuity and disaster recovery foundation. This foundation is based on an integrated approach that includes the following capabilities: Planning to be Prepared, Preventing a Crisis with Integrated Security, Restoring Communications, Recovering Data and Restoring Access, Recovering Workspace, and Recovering IT Skills and Expertise.
So planning is key, but as we all know, an ounce of prevention is worth a pound of cure. Preventing a crisis from impacting core functions to begin with should be your primary objective. That’s why Novell offers the Novell Secure Access Suite to reduce your risk and deliver dramatic ROI to your day-to-day operations. In a nutshell, this suite helps you close the security holes that might otherwise cause—or be the unfortunate result of—a crisis. Did you know, for example, that hackers and data thieves often strike after a crisis has occurred, knowing that a company’s systems will often be open and unguarded during these times? It’s the high-tech equivalent of looting, and it’s something you can prevent. For example, think about the vulnerability that results when users have so many passwords to remember that they resort to sharing or prominently displaying them. Think about the way enterprise security is compromised when inadequate safeguards turn web-based systems into a backdoor for hackers. And think of the risk you take when you have to extend remote access to business-critical systems. With Novell, you can allay these fears with a directory-based solution that allows you to create central security policies once and then enforce them across the entire system. Every identity, access right, and authentication is controlled by a single set of security policies that operate across multiple platforms and systems. That’s precisely what Novell’s Secure Access Suite delivers— plus added benefits such as reduced password management costs and the elimination of the custom development that would otherwise be necessary to ensure web security.
But let’s say the worst happens, and you find yourself in the midst of a crisis…The first thing you’ll need to think about is restoring communications. Communication is vital to your ability to instruct employees and reassure customers and partners. In a crisis situation, no news is bad news, but well-timed communication can help you establish control and ensure that everyone is proceeding according to the same instruction set. To begin with, you’ll need to quickly make contact with your employees—wherever they may be. The problem is that most companies don’t have an efficient way of maintaining current employee contact information, let alone accessing it securely in the event of an emergency. With Novell’s recovery and continuity solutions, however, you can conduct secure, browser-based searches for employee data based on your backed up network and Human Resource directories. And because much of this personal data is sensitive, you can restrict access to appropriate personnel with strong authentication tools. Once initial contacts have been made and baseline instructions have been given, you’ll want to utilize a secure portal as a virtual command center. This capability is strongly recommended by business continuity experts for emergency situations, because portal environments can be accessed from any device and can help you communicate instructions quickly and easily via the web. And with Novell, these instructions—like all content in the portal—can be automatically customized for specific groups, communities, or even individuals. The bottom line is that any disaster recovery solution should allow you to use the Internet as a secure lifeline for business communications—one that may continue to function even when others fail. So you’ve made initial contact with your employees, and you’ve set up a secure portal for distributing more detailed updates and instructions. What’s next? Restoring access to e-mail and workflow processes through various means. Novell messaging solutions allow e-mail access from any Internet-connected device—wired or wireless—so employees have a variety of ways to communicate with each other, customers, and business partners. In addition, Novell solutions allow messaging domains to communicate with one another for redundancy without the usual issues of timing out. If one domain goes down, messaging and collaboration among the other domains is uninterrupted. You can even replicate message stores to local hard drives so users can continue to work during temporary outages.
How does this solution facilitate business objectives? Less than one hour downtime per year when these services are used in conjunction Support for secure protocols (SSL, S/MIME) Clustering promotes redundancy across the server cluster in event of an outage
The next step in addressing a crisis is recovering data and restoring access. The ability to communicate may be key in the immediate aftermath of a crisis, but the need to share business-critical data is not far behind. And the key to recovering data after a crisis is backing up or mirroring that data before the crisis occurs. These backups must be automated, cost effective, and non-disruptive to enterprise functions. That’s why Novell provides strong clustering services and the ability to inexpensively mirror data within a cluster at a remote geographical location. Furthermore, these capabilities allow you to shift access from one location to the other without IT intervention and without disruption to the user. With Novell solutions, you can enable key network functions like printing to be performed over the web, with automated setup for remote or temporary worksites. Finally, Novell enables your IT staff to perform remote server management from any location—a critical need in many emergency situations. But protecting network data is only half of the equation. The reality is that the data residing on local user devices is critical, time-sensitive, and often in the greatest demand during a crisis situation. So you must also ensure that local data files are synchronized across multiple locations. This not only protects the data itself, it makes local knowledge available to employees who may be covering responsibilities in a crisis. And what about the content your servers distribute? Are you distributing it across multiple servers to establish redundancy? Do you have a solid foundation with which to distribute software if your disaster takes the form of a debilitating virus? Do you have a backup solution for your branch offices and remote storage appliances? And do you have a way to synchronize identity data with second- and third-tier applications if you make changes to the authoritative data source after a disaster occurs? Having cost-effective solutions to complex issues like these is key to recovering from any disaster—and with Novell solutions like NetWare, ZENworks, and eDirectory, they’re built right in.
From these numbers, you can see that most of a company’s critical business data resides on local machines. The workforce is also becoming more mobile.
You have several computers which can author, edit, and share the info. You have documents all over, but it is sometimes hared to find the most recent version. To try and maintain the latest version on all your machines you email the file to yourself. You probably don’t have a personal disaster recovery in place. If you system crashes or your laptop is stolen, chances are you may not get your files back. All the data you have locally is just that, it’s local. You probably can’t get to your local files on your hard drive though the Internet. You must have your computer in hand wherever you are if you want your files. If you have sensitive files, chances are you are not willing to save them to the network. You keep them close to you on your hard drive or on a disk. You don’t want to have to learn a new process or change the way you work with, and access your files.
Encrypted data is secure data. Also, data that’s stored in more than one place simultaneously is secure data--if a laptop gets stolen, all is not lost; the files are still readily available on the network. And something that network managers are always striving for: greater control of data assets. After all, they’re the ones who are held accountable for corporate data loss--they’re the ones who get the phone call when something goes wrong. They need better tools to secure data via centralized control.
Novell iFolder is a revolutionary new product from the leader in Net services software. It’s revolutionary in its simplicity--the kind of product you’ll see in action and wonder why somebody didn’t think of it years ago.
Novell iFolder gives you security by encrypting your files to prevent others from viewing them. Your data is also now backed up and your corporate data assets on those local machines are now protected.
You can see that Novell iFolder has a variety of benefits. Novell iFolder lets your files follow you anywhere. It automatically updates your data across multiple machines – you don’t’ have to remember to synchronize your files to multiple locations. It also lets you work with your files through the normal methods you use now--just go to your My Documents directory – you don’t have to learn any new procedures. You can also access your data from any Web browser and any computer--you are now truly mobile. Your productivity is also increased because you don’t have to search for that latest file; you always have a current copy of your files.
Novell iFolder is a standards-based, Internet solution. It uses HTTP to make file access and management just another efficient e-Business process. It keeps bandwidth usage to a minimum by only sending changes in files, not entire files. And it automatically updates data in the iFolder file when the user accesses the network, so only the most current information is on any machine at any given time.
From this architecture diagram, you can see that you can have your iFolder data on multiple machines. You can be out of the office, outside the firewall, working on a home machine, laptop or kiosk and still be able to access the iFolder server because iFolder uses HTTP over TCP/IP on port 80 so it acts just like a Web server. You can also be inside the firewall to access the server. iFolder uses LDAP for user authentication. LDAP is the new standard for user authentication, Novell’s eDirectory is the leading LDAP Directory today. The iFolder server also has disk storage attached to it and has multiple users’ iFolders on it.
And what about workspace? If you ask many of the companies that survived, they’ll probably tell you that configuring productive workspaces in the most unlikely of places was paramount to their success. Whether your employees need to work from a temporary office space, home, an Internet kiosk, or a borrowed machine, they need automated configuration and delivery of content and applications across web, mobile, and desktop devices. That’s why Novell ZENworks enables you to configure multiple desktops with the right applications in a single operation. How? By using the profiles and policies stored in eDirectory. Novell also allows you to base desktop restoration and management on the user profile instead of the device, so even if a user is transitioning from a desktop computer to a borrowed PDA, the new device can quickly be tuned to the user’s individual work and productivity needs.
Drive the cost out of branch office infrastructure.
This redundant architecture allows for a high level of disaster tolerance.
Finally, you need to worry about recovering IT skills and expertise. If your enterprise is built on a Novell net services foundation, you have a distinct advantage here. Because Novell solutions have been specifically designed to reduce administration headaches in the first place. Processes are easily automated, and centralized policies, user identities, and access rights replace many manual tasks. Even so, restoring certain core functions will require the time and attention of experienced IT staff. And with more than 600,000 certified Novell professionals worldwide, you can supplement your staff with a broad pool of Novell expertise in any emergency. Furthermore, Novell’s support services are ranked among the best in the industry, with dedicated support contacts and powerful tools and education. With Novell Premium Support, you enjoy 24x7 access to experts via phone, web, or email and an unlimited number of incidents. Priority response options include everything from dial-in directory restoration and repair to onsite deployment of personnel to a list of contract vendors who can provide staff expertise within 12 to 24 hours.
This expertise proved its value during the September 11 crisis, when ten Novell support engineers training in New York City were instantly redeployed to assist key government agencies and financial customers with onsite recovery work. In fact, Novell contacted all Premium Support customers in the New York and Washington, D.C. areas in the immediate aftermath of the attacks to ensure that they were able to continue operations as quickly as possible. Assisted customers included the New York Department of Transportation, the New York Office of Real Properties, the Port Authority of New York/New Jersey, Bank of New York, the EPA, and the FBI.
Even in the absence of a full-fledged crisis, Novell solutions deliver peace of mind and significant ROI. The Queensland Health corporate office, serving 38 health service districts in Brisbane, Australia, for example, deployed a Novell Storage Area Network, Cluster Services, and High Availability Server Software solution with impressive results. Since its implementation in January of 2001, they’ve experienced 100% uptime on the new network. Nightly backup is completed three times faster than before and requires far fewer tapes. But one of the most concrete benefits was realized when a recent incident took the system offline for 32 minutes. “After the initial period of fault diagnosis, it took only two minutes to bring the cluster back online,” says Graham Stocks, Manager of the Brisbane City Information Services Unit. “Previously, this would have taken almost three hours. This single event represents a productivity improvement of $77,000.”
It's a complex process but Novell / Cambridge provides a total solution, through our focus and experience. We add value by assisting your organization to come to terms with the many variables and options, so that you have more control in extracting value from your IT investments Our experience helps drive complexity out of process, and increases the potential benefits that can be achieved.
Novell Solutions for Business Continuity Herndon, VA Ramesh Pattni AVP/Senior Strategist [email_address]
Two out of five enterprises that experience a disaster will go out of business within five years.
While 85% of Global 2000 enterprises have a disaster recovery plan covering core technology and infrastructure, only 15% have a full-fledged business continuity plan.
Source: “What is Crisis Management?” Gartner Research, September 2001
Cost of Downtime Business Operation Average Cost per Hour $6.5 million Brokerage Operations … $2.6 million Credit Card/Sales Authorization … $1.1 million Pay-per-View Television … $113.0 thousand Home Shopping (TV) … $90.0 thousand Home Catalog Sales … $89.5 thousand Airline Reservations …
The Problem Level of Executive concern for disaster recovery and business continuity IT budget allocation
Rapid Technology Rationalization (RTR) Innovate ERP applications Enhance/Maintain Competitive Edge IT infrastructure “ Keep the trains running well” RTR identified short term savings Relatively low-risk investments needed to promote steady growth Higher-risk but strategic investments Invest Leverage Alignment with business objectives RTR Savings $ $
Novell Solutions for Business Continuity Cost Year 1 Year 2 Year 3 0 25% 50% 75% Novell offers reliable solutions with recovery and business continuity capabilities built right in! $
After 9/11 IT Priorities Have Shifted Source: CIO November 2001 CIO 's October 2001 survey of 320 IT professionals showed that companies will increase their investment in IT contingency and disaster recovery plans 54% will increase spending on DRP 46% will keep DRP costs the same 34% will increase spending in off-site redundant systems 31% will increase spending in off-site data and application backups 25% will increase spending in backup facility for employees 24% will increase spending in replacement equipment 23% will increase spending in remote access 23% will increase spending on virus detection
Business Continuity – physical and technical infrastructure Reduced Business Continuity Technical Infrastructure Network Redundant Cooling Battery Backup UPS Power Generation Increasing Costs Higher Business Continuity Application Architecture Power from multiple stations Security Server Clustering & Blades SAN and NAS storage Off-Site data & app. backups Off-site redundant systems Follow-the-sun NOC Help desk Backup facilities for employees Physical l Infrastructure
Preventing a Crisis with Strong Integrated Security
Establish a robust and integrated security infrastructure that is cost-effective to manage and easy to use
Key Building Blocks Access and Security Portal Identity Management
High availability, reduce management costs and consolidate resources
Three Areas of Storage to Protect one Net Users Back up valuable local files and enhance productivity Create, share, find, store, organize Branch Office Reduce storage, connectivity and management costs
SAN Architecture for Redundancy (Data Center) Windows, Mac, UNIX, and Novell clients Disaster recovery site Corporate data center Mobile access
How Does Novell Compare? Excellent Poor Based on IDC Clustering Report and Novell Research Application failover/recovery Shared storage/data failover Cascading failover File-level client reconnect Grey data preservation Automatic failback Resource prioritization scheme Cluster volume manager Manage multiple clusters centrally Split brain detection Geographically separate servers Volume repair and remount time Dynamic node addition Availability Scalability Overall Novell Microsoft Veritas
Integrated Services for Recovery and Access (Users)
“ W e needed a central point of storage for local files, something other than a normal ‘Home Directory’ that would be available should another disaster occur . We needed something that would ‘ back up’ the user's local data automatically because they will never do it themselves. iFolder to the rescue! We have our pilot group syncing their files to a server off-site automatically. It takes no time at all seeing that iFolder only writes the delta rather than the whole darn file like some ‘ other’ similar products. ” Steven Beyer, Consultant PC/LAN Support Securities Industry Automation Corporation
According to John Girard, a vice president and research director at Gartner, "Enterprises can realize substantial support savings and productivity gains by selecting appropriate remote backup and restore tools for their nomadic users. Avoiding just a few disasters may justify the entire value of the investment."
The latest version of your files are always available
Make a change at work and the changes show up at home
iFolder recognizes the changes you make to files and o nly sends the changes in a file, not the whole file
Especially important when working with a slow connection from home or in a hotel
Uses I nternet standards so you aren’t stuck to a LAN-only solution
It becomes part of the organization’s eBusiness strategy
iFolder Architecture Novell eDirectory iFolder Servers Jeff’s i Folder User Authentication Storage Jeff’s i Folder through a browser Jeff’s i Folder Jeff’s i Folder Jeff’s i Folder Matt’s i Folder Office Mobile Home Kiosk PDA
Have directory services for central management at an affordable price when spanning the WAN
Reduce costs of backups and administration
Reduce the need for IT staff in the field
Have disaster tolerance for the rural parts of their network without breaking the bank
Reduce costs of low bandwidth private WAN links – and leverage the Internet
Improve services to users on the outskirts of the network
Novell Nterprise Branch Office Nterprise Branch Office drives the cost out of branch office infrastructure in a distributed enterprise by Automatically provisioning stationary, mobile, and visiting users in the rural parts of the customer network Accelerating IT service deployment and access in the branch office Eliminating the data backup challenges in remote offices Securely leveraging the Internet for WAN connectivity between central offices and branch offices Simplifying directory services for distributed environments Enabling server, storage, and application consolidation
Leverage the day-to-day benefits of ZENworks Synergy™—the only solution that can deliver…
All three kinds of applications: web, thin-client, and 32-bit
Manage across your network operating systems, including Windows NT/2000 and NetWare
Recovering Work Space Appropriate content pushed server to server and then desktops (rapid deployment) Mobilizes workforce in the event workspace is destroyed In the event of disaster, home computers can receive pushed content
Direct, single point of contact for deployment Pooled resource catalog for appropriate skill set Global organization with mobile workforce Virtual consulting assistance is available Technical delivery automation capabilities
“ A recent unexpected incident meant we were off line for 32 minutes. After the initial period of fault diagnosis, it took only two minutes to bring the cluster back online. Previously, this would have taken almost three hours. This single event represents a productivity improvement of $77,000.”
— Graham Stocks, Manager Brisbane City Information Services Unit