If there’s one word that strikes fear in the heart of every CIO, it’s this: downtime. IT budgets may shrink, headcount may be reduced, and you may be asked to support an ever-growing list of users and services. But these “problems” pale in comparison to the possibility of a major business-disrupting event.
… A result that can help you avoid becoming a statistic—like the two out of five enterprises that will experience a disaster and go out of business within five years, according to recent Gartner estimates. In some cases, the cost of recovery will simply be too great. In others, the disruption of normal business operations will cause customers to lose confidence in the enterprise’s viability. In fact, the September 2001 attack on the World Trade Center in New York City tested enterprise contingency plans to an unprecedented degree. But companies that had continuity plans and recovery services in place were able to continue business at alternate sites with minimal loss of data and downtime. To be clear, however, a basic disaster recovery plan is not enough. Gartner estimates that 85% of Global 2000 enterprises have established a disaster recovery plan to address core technology and infrastructure, but only 15% have a full-fledged business continuity plan covering all stages of the business lifecycle. Chances are that your organization is one of the 85% still struggling to get business continuity covered.
And if you’ve watched the news over the last year, you know that virtually anything can come your way. Energy shortages, hardware and communication failures, natural disasters, accidents, even terrorist violence—they’re all part of our collective conscience, and they’ve all helped to put disaster recovery squarely at the center of the international IT agenda. In fact, did you know that 72% of mission-critical applications experience nine hours of downtime each year? It may not sound like a lot, but if you’re a brokerage operation, each and every hour will cost you a $6.5 million. With every organization’s core capabilities more IT-dependent than ever, disaster recovery has become nothing short of a business imperative. And disaster prevention is even more so. That’s why Novell net services software includes disaster recovery and business continuity capabilities right out of the box. These capabilities provide a solid, cost-effective foundation that can be easily maintained through day-to-day operations. In fact, our “one Net” vision provides an optimal starting point. When you manage your enterprise as one net—when your data, storage, security, management, and user identity services are tightly integrated and fed by the same directory—business continuity is an inherent result… Source: Standish Group Research
That’s the reality, and it should come as no surprise to all of you. Fortunately, it’s a reality that Novell both recognizes and respects. In fact, you may know Novell for its ability to get networks up and running quickly and effectively; no one in the industry can match the reliability of a Novell-powered network. But what you may not know is that many of the key recovery and continuity capabilities you need to protect your business are built right into your existing Novell solutions at no additional cost . Add to that the consulting and support services we offer in conjunction with our partners, and it’s clear that—even in the face of limited budget and resources—Novell can help you prepare for whatever might come your way.
That’s why Novell and its partners offer specialized products and services to establish a cost-effective business continuity and disaster recovery foundation. This foundation is based on an integrated approach that includes the following capabilities: Planning to be Prepared, Preventing a Crisis with Integrated Security, Restoring Communications, Recovering Data and Restoring Access, Recovering Workspace, and Recovering IT Skills and Expertise.
So planning is key, but as we all know, an ounce of prevention is worth a pound of cure. Preventing a crisis from impacting core functions to begin with should be your primary objective. That’s why Novell offers the Novell Secure Access Suite to reduce your risk and deliver dramatic ROI to your day-to-day operations. In a nutshell, this suite helps you close the security holes that might otherwise cause—or be the unfortunate result of—a crisis. Did you know, for example, that hackers and data thieves often strike after a crisis has occurred, knowing that a company’s systems will often be open and unguarded during these times? It’s the high-tech equivalent of looting, and it’s something you can prevent. For example, think about the vulnerability that results when users have so many passwords to remember that they resort to sharing or prominently displaying them. Think about the way enterprise security is compromised when inadequate safeguards turn web-based systems into a backdoor for hackers. And think of the risk you take when you have to extend remote access to business-critical systems. With Novell, you can allay these fears with a directory-based solution that allows you to create central security policies once and then enforce them across the entire system. Every identity, access right, and authentication is controlled by a single set of security policies that operate across multiple platforms and systems. That’s precisely what Novell’s Secure Access Suite delivers— plus added benefits such as reduced password management costs and the elimination of the custom development that would otherwise be necessary to ensure web security.
But let’s say the worst happens, and you find yourself in the midst of a crisis…The first thing you’ll need to think about is restoring communications. Communication is vital to your ability to instruct employees and reassure customers and partners. In a crisis situation, no news is bad news, but well-timed communication can help you establish control and ensure that everyone is proceeding according to the same instruction set. To begin with, you’ll need to quickly make contact with your employees—wherever they may be. The problem is that most companies don’t have an efficient way of maintaining current employee contact information, let alone accessing it securely in the event of an emergency. With Novell’s recovery and continuity solutions, however, you can conduct secure, browser-based searches for employee data based on your backed up network and Human Resource directories. And because much of this personal data is sensitive, you can restrict access to appropriate personnel with strong authentication tools. Once initial contacts have been made and baseline instructions have been given, you’ll want to utilize a secure portal as a virtual command center. This capability is strongly recommended by business continuity experts for emergency situations, because portal environments can be accessed from any device and can help you communicate instructions quickly and easily via the web. And with Novell, these instructions—like all content in the portal—can be automatically customized for specific groups, communities, or even individuals. The bottom line is that any disaster recovery solution should allow you to use the Internet as a secure lifeline for business communications—one that may continue to function even when others fail. So you’ve made initial contact with your employees, and you’ve set up a secure portal for distributing more detailed updates and instructions. What’s next? Restoring access to e-mail and workflow processes through various means. Novell messaging solutions allow e-mail access from any Internet-connected device—wired or wireless—so employees have a variety of ways to communicate with each other, customers, and business partners. In addition, Novell solutions allow messaging domains to communicate with one another for redundancy without the usual issues of timing out. If one domain goes down, messaging and collaboration among the other domains is uninterrupted. You can even replicate message stores to local hard drives so users can continue to work during temporary outages.
How does this solution facilitate business objectives? Less than one hour downtime per year when these services are used in conjunction Support for secure protocols (SSL, S/MIME) Clustering promotes redundancy across the server cluster in event of an outage
The next step in addressing a crisis is recovering data and restoring access. The ability to communicate may be key in the immediate aftermath of a crisis, but the need to share business-critical data is not far behind. And the key to recovering data after a crisis is backing up or mirroring that data before the crisis occurs. These backups must be automated, cost effective, and non-disruptive to enterprise functions. That’s why Novell provides strong clustering services and the ability to inexpensively mirror data within a cluster at a remote geographical location. Furthermore, these capabilities allow you to shift access from one location to the other without IT intervention and without disruption to the user. With Novell solutions, you can enable key network functions like printing to be performed over the web, with automated setup for remote or temporary worksites. Finally, Novell enables your IT staff to perform remote server management from any location—a critical need in many emergency situations. But protecting network data is only half of the equation. The reality is that the data residing on local user devices is critical, time-sensitive, and often in the greatest demand during a crisis situation. So you must also ensure that local data files are synchronized across multiple locations. This not only protects the data itself, it makes local knowledge available to employees who may be covering responsibilities in a crisis. And what about the content your servers distribute? Are you distributing it across multiple servers to establish redundancy? Do you have a solid foundation with which to distribute software if your disaster takes the form of a debilitating virus? Do you have a backup solution for your branch offices and remote storage appliances? And do you have a way to synchronize identity data with second- and third-tier applications if you make changes to the authoritative data source after a disaster occurs? Having cost-effective solutions to complex issues like these is key to recovering from any disaster—and with Novell solutions like NetWare, ZENworks, and eDirectory, they’re built right in.
From these numbers, you can see that most of a company’s critical business data resides on local machines. The workforce is also becoming more mobile.
You have several computers which can author, edit, and share the info. You have documents all over, but it is sometimes hared to find the most recent version. To try and maintain the latest version on all your machines you email the file to yourself. You probably don’t have a personal disaster recovery in place. If you system crashes or your laptop is stolen, chances are you may not get your files back. All the data you have locally is just that, it’s local. You probably can’t get to your local files on your hard drive though the Internet. You must have your computer in hand wherever you are if you want your files. If you have sensitive files, chances are you are not willing to save them to the network. You keep them close to you on your hard drive or on a disk. You don’t want to have to learn a new process or change the way you work with, and access your files.
Encrypted data is secure data. Also, data that’s stored in more than one place simultaneously is secure data--if a laptop gets stolen, all is not lost; the files are still readily available on the network. And something that network managers are always striving for: greater control of data assets. After all, they’re the ones who are held accountable for corporate data loss--they’re the ones who get the phone call when something goes wrong. They need better tools to secure data via centralized control.
Novell iFolder is a revolutionary new product from the leader in Net services software. It’s revolutionary in its simplicity--the kind of product you’ll see in action and wonder why somebody didn’t think of it years ago.
Novell iFolder gives you security by encrypting your files to prevent others from viewing them. Your data is also now backed up and your corporate data assets on those local machines are now protected.
You can see that Novell iFolder has a variety of benefits. Novell iFolder lets your files follow you anywhere. It automatically updates your data across multiple machines – you don’t’ have to remember to synchronize your files to multiple locations. It also lets you work with your files through the normal methods you use now--just go to your My Documents directory – you don’t have to learn any new procedures. You can also access your data from any Web browser and any computer--you are now truly mobile. Your productivity is also increased because you don’t have to search for that latest file; you always have a current copy of your files.
Novell iFolder is a standards-based, Internet solution. It uses HTTP to make file access and management just another efficient e-Business process. It keeps bandwidth usage to a minimum by only sending changes in files, not entire files. And it automatically updates data in the iFolder file when the user accesses the network, so only the most current information is on any machine at any given time.
From this architecture diagram, you can see that you can have your iFolder data on multiple machines. You can be out of the office, outside the firewall, working on a home machine, laptop or kiosk and still be able to access the iFolder server because iFolder uses HTTP over TCP/IP on port 80 so it acts just like a Web server. You can also be inside the firewall to access the server. iFolder uses LDAP for user authentication. LDAP is the new standard for user authentication, Novell’s eDirectory is the leading LDAP Directory today. The iFolder server also has disk storage attached to it and has multiple users’ iFolders on it.
And what about workspace? If you ask many of the companies that survived, they’ll probably tell you that configuring productive workspaces in the most unlikely of places was paramount to their success. Whether your employees need to work from a temporary office space, home, an Internet kiosk, or a borrowed machine, they need automated configuration and delivery of content and applications across web, mobile, and desktop devices. That’s why Novell ZENworks enables you to configure multiple desktops with the right applications in a single operation. How? By using the profiles and policies stored in eDirectory. Novell also allows you to base desktop restoration and management on the user profile instead of the device, so even if a user is transitioning from a desktop computer to a borrowed PDA, the new device can quickly be tuned to the user’s individual work and productivity needs.
Drive the cost out of branch office infrastructure.
This redundant architecture allows for a high level of disaster tolerance.
Finally, you need to worry about recovering IT skills and expertise. If your enterprise is built on a Novell net services foundation, you have a distinct advantage here. Because Novell solutions have been specifically designed to reduce administration headaches in the first place. Processes are easily automated, and centralized policies, user identities, and access rights replace many manual tasks. Even so, restoring certain core functions will require the time and attention of experienced IT staff. And with more than 600,000 certified Novell professionals worldwide, you can supplement your staff with a broad pool of Novell expertise in any emergency. Furthermore, Novell’s support services are ranked among the best in the industry, with dedicated support contacts and powerful tools and education. With Novell Premium Support, you enjoy 24x7 access to experts via phone, web, or email and an unlimited number of incidents. Priority response options include everything from dial-in directory restoration and repair to onsite deployment of personnel to a list of contract vendors who can provide staff expertise within 12 to 24 hours.
This expertise proved its value during the September 11 crisis, when ten Novell support engineers training in New York City were instantly redeployed to assist key government agencies and financial customers with onsite recovery work. In fact, Novell contacted all Premium Support customers in the New York and Washington, D.C. areas in the immediate aftermath of the attacks to ensure that they were able to continue operations as quickly as possible. Assisted customers included the New York Department of Transportation, the New York Office of Real Properties, the Port Authority of New York/New Jersey, Bank of New York, the EPA, and the FBI.
Even in the absence of a full-fledged crisis, Novell solutions deliver peace of mind and significant ROI. The Queensland Health corporate office, serving 38 health service districts in Brisbane, Australia, for example, deployed a Novell Storage Area Network, Cluster Services, and High Availability Server Software solution with impressive results. Since its implementation in January of 2001, they’ve experienced 100% uptime on the new network. Nightly backup is completed three times faster than before and requires far fewer tapes. But one of the most concrete benefits was realized when a recent incident took the system offline for 32 minutes. “After the initial period of fault diagnosis, it took only two minutes to bring the cluster back online,” says Graham Stocks, Manager of the Brisbane City Information Services Unit. “Previously, this would have taken almost three hours. This single event represents a productivity improvement of $77,000.”
It's a complex process but Novell / Cambridge provides a total solution, through our focus and experience. We add value by assisting your organization to come to terms with the many variables and options, so that you have more control in extracting value from your IT investments Our experience helps drive complexity out of process, and increases the potential benefits that can be achieved.
Solutions for Business Continuity
Novell Solutions for Business Continuity Herndon, VA Ramesh Pattni AVP/Senior Strategist [email_address]
IT Problems <ul><li>Shrinking Budgets </li></ul><ul><li>Reduced Headcount </li></ul><ul><li>Greater Demands </li></ul>DOWNTIME
According to Gartner… <ul><li>Two out of five enterprises that experience a disaster will go out of business within five years. </li></ul><ul><li>While 85% of Global 2000 enterprises have a disaster recovery plan covering core technology and infrastructure, only 15% have a full-fledged business continuity plan. </li></ul><ul><li>Source: “What is Crisis Management?” Gartner Research, September 2001 </li></ul>
Cost of Downtime Business Operation Average Cost per Hour $6.5 million Brokerage Operations … $2.6 million Credit Card/Sales Authorization … $1.1 million Pay-per-View Television … $113.0 thousand Home Shopping (TV) … $90.0 thousand Home Catalog Sales … $89.5 thousand Airline Reservations …
The Problem Level of Executive concern for disaster recovery and business continuity IT budget allocation
Rapid Technology Rationalization (RTR) Innovate ERP applications Enhance/Maintain Competitive Edge IT infrastructure “ Keep the trains running well” RTR identified short term savings Relatively low-risk investments needed to promote steady growth Higher-risk but strategic investments Invest Leverage Alignment with business objectives RTR Savings $ $
Novell Solutions for Business Continuity Cost Year 1 Year 2 Year 3 0 25% 50% 75% Novell offers reliable solutions with recovery and business continuity capabilities built right in! $
After 9/11 IT Priorities Have Shifted Source: CIO November 2001 CIO 's October 2001 survey of 320 IT professionals showed that companies will increase their investment in IT contingency and disaster recovery plans 54% will increase spending on DRP 46% will keep DRP costs the same 34% will increase spending in off-site redundant systems 31% will increase spending in off-site data and application backups 25% will increase spending in backup facility for employees 24% will increase spending in replacement equipment 23% will increase spending in remote access 23% will increase spending on virus detection
Business Continuity must cover <ul><li>People </li></ul><ul><li>Process </li></ul><ul><li>Information technology </li></ul><ul><li>Connectivity </li></ul><ul><li>Supply chain </li></ul><ul><li>Call Centers </li></ul><ul><li>Facilities </li></ul><ul><li>It’s not just the data center! </li></ul>
Business Continuity Life Cycle Business Impact Assessment Strategy Implementation And Testing Maintenance And yearly updates Business Continuity Strategies
Begin with a Business Impact Assessment <ul><li>Objective </li></ul><ul><ul><ul><li>To clearly and impartially demonstrate the bottom line impact of systems and other disruptions on specific functional areas within your enterprise </li></ul></ul></ul><ul><li>Goals </li></ul><ul><ul><ul><li>To quantify the level of Business Continuity Planning needed to ensure rapid restoration of key business processes and resumption of technology based operations in the event of a disruption. </li></ul></ul></ul><ul><ul><ul><li>To meet the requirements set forth by customers, suppliers and employees </li></ul></ul></ul>
Why is the Business Impact Assessment Important <ul><li>Which processes and functions are critical, necessary, or optional for business survival </li></ul><ul><li>In what order and how fast these functions need to be recovered </li></ul><ul><li>What the interdependencies of these functions are </li></ul><ul><li>What the financial exposures are </li></ul><ul><li>The impact on revenue, investor confidence, customer service, goodwill, competitive edge, market share, etc. if critical functions can’t be performed </li></ul>
Business Continuity – physical and technical infrastructure Reduced Business Continuity Technical Infrastructure Network Redundant Cooling Battery Backup UPS Power Generation Increasing Costs Higher Business Continuity Application Architecture Power from multiple stations Security Server Clustering & Blades SAN and NAS storage Off-Site data & app. backups Off-site redundant systems Follow-the-sun NOC Help desk Backup facilities for employees Physical l Infrastructure
Preventing a Crisis with Strong Integrated Security <ul><li>Establish a robust and integrated security infrastructure that is cost-effective to manage and easy to use </li></ul>
Key Building Blocks Access and Security Portal Identity Management
Novell Secure Access Advantages <ul><li>Reduce security risk to a minimum </li></ul><ul><li>Reduce time and costs </li></ul><ul><ul><li>Password management </li></ul></ul><ul><ul><li>Web infrastructure management </li></ul></ul><ul><ul><li>Web application development </li></ul></ul><ul><li>Deliver dramatic ROI to day-to-day operations </li></ul><ul><li>Centrally manage all security points </li></ul><ul><li>Control application security costs </li></ul><ul><li>Novell Secure Access Suite </li></ul><ul><ul><li>Novell eDirectory™ </li></ul></ul><ul><ul><li>Novell Account Management and </li></ul></ul><ul><ul><li>SecureLogin </li></ul></ul><ul><ul><li>Novell iChain ® </li></ul></ul><ul><ul><li>Novell BorderManager ® </li></ul></ul><ul><ul><li>Novell Modular Authentication Services™ (NMAS™) </li></ul></ul><ul><ul><li>Authentication Services </li></ul></ul>
Restoring Communications <ul><li>Facilitate crisis management and work flow with an automatically-maintained emergency contact list and Web and e-mail access to any location or device </li></ul>
GroupWise ® 6: Secure, Dynamic Communication <ul><li>Flexible access to e-mail communication </li></ul><ul><ul><li>Across the network </li></ul></ul><ul><ul><li>Any Internet-connected device, wired or wireless </li></ul></ul><ul><li>Workflow capabilities to continue business processes </li></ul><ul><li>“ Chunking” data and clustering capabilities for redundancy </li></ul><ul><li>Caching mode to work offline </li></ul><ul><li>ROI and accelerated corporate productivity </li></ul><ul><ul><li>The only bundled wireless solution in the industry </li></ul></ul><ul><ul><li>Decrease server requests by up to 90% </li></ul></ul><ul><ul><li>Decrease server overhead by more than 50% </li></ul></ul><ul><ul><li>Reduced overall networking costs </li></ul></ul>
Restoring Critical Communications <ul><ul><li>Less than one hour downtime per year when these services are used in conjunction </li></ul></ul><ul><ul><li>Support for secure protocols (SSL, S/MIME) </li></ul></ul><ul><ul><li>Clustering promotes redundancy across the server cluster in event of an outage </li></ul></ul>
Establish a Communication Command Center <ul><li>eGuide </li></ul><ul><ul><li>Access latest contact and organizational data from backed-up network and HR directories </li></ul></ul><ul><ul><li>Conduct browser-based searches for employee information across LDAP-enabled directories </li></ul></ul><ul><ul><li>Improve daily productivity </li></ul></ul><ul><li>Novell Portal Services </li></ul><ul><ul><li>Portal capabilities allow a virtual command center that can be accessed from any device </li></ul></ul><ul><ul><li>Communicate customized updates and instructions via the web </li></ul></ul><ul><ul><li>Personalize portal content and services to each user </li></ul></ul><ul><ul><li>Lower cost of ownership for portal infrastructure </li></ul></ul>
Recovering Data and Restoring Access <ul><li>Automatically back up or mirror local and network mission-critical data and user identities with integrated Web and VPN services </li></ul>
Levels of Data Recovery Tape backup Tape backup offsite Mirror Mirror failover Cost/data importance Function
Recover Data and Restore Access <ul><li>Automatically back up or mirror local and network mission-critical data and user identities with integrated services to immediately restore access to that data via VPN or even the web </li></ul><ul><li>Novell NetWare ® 6 </li></ul><ul><ul><li>Supports all leading backup solutions </li></ul></ul><ul><ul><li>Offers automated and cost-effective options for backing up data locally, remotely, and in real-time </li></ul></ul><ul><ul><li>Allows instant access to data files, even if network connection becomes unavailable </li></ul></ul><ul><ul><li>Offers remote management benefits </li></ul></ul>
NetWare 6 Data Redundancy <ul><li>Novell Cluster Services™ </li></ul><ul><ul><li>Free cluster software for up to two systems in NetWare 6 </li></ul></ul><ul><ul><li>Up to 32 NetWare servers in a cluster </li></ul></ul><ul><ul><li>Mirror data within a geographically distributed cluster for redundancy </li></ul></ul><ul><ul><li>Eliminate single point of failure </li></ul></ul><ul><ul><ul><li>Transparent failover—uninterrupted access </li></ul></ul></ul><ul><ul><ul><li>FAN-OUT FAILOVER™ for load balancing on failover </li></ul></ul></ul><ul><ul><li>Cluster enable any applications running on NetWare </li></ul></ul>
<ul><li>Data center </li></ul><ul><li>High availability, reduce management costs and consolidate resources </li></ul>Three Areas of Storage to Protect one Net Users Back up valuable local files and enhance productivity Create, share, find, store, organize Branch Office Reduce storage, connectivity and management costs
SAN Architecture for Redundancy (Data Center) Windows, Mac, UNIX, and Novell clients Disaster recovery site Corporate data center Mobile access <ul><li>Novell solutions: NetWare, Cluster Services, Native File Access, Novell Storage Services™ (NSS) File System, iFolder™ </li></ul><ul><li>Partner hardware/software </li></ul><ul><li>Professional services </li></ul><ul><li>Disaster recovery </li></ul><ul><li>High availability </li></ul><ul><li>24 X 7 backup </li></ul><ul><li>Scalability </li></ul><ul><li>Native access </li></ul><ul><li>Simplified management </li></ul>
How Does Novell Compare? Excellent Poor Based on IDC Clustering Report and Novell Research Application failover/recovery Shared storage/data failover Cascading failover File-level client reconnect Grey data preservation Automatic failback Resource prioritization scheme Cluster volume manager Manage multiple clusters centrally Split brain detection Geographically separate servers Volume repair and remount time Dynamic node addition Availability Scalability Overall Novell Microsoft Veritas
Integrated Services for Recovery and Access (Users) <ul><li>Novell iFolder™ </li></ul>“ W e needed a central point of storage for local files, something other than a normal ‘Home Directory’ that would be available should another disaster occur . We needed something that would ‘ back up’ the user's local data automatically because they will never do it themselves. iFolder to the rescue! We have our pilot group syncing their files to a server off-site automatically. It takes no time at all seeing that iFolder only writes the delta rather than the whole darn file like some ‘ other’ similar products. ” Steven Beyer, Consultant PC/LAN Support Securities Industry Automation Corporation
Where is your corporate data? <ul><li>Gartner Group, IDC, and Meta Group state that up to 80% of a company’s business critical data resides on PCs (Desktops & Laptops) </li></ul><ul><li>Up to 96% of all business PCs are not being backed up (Strategic Research Corporation ) </li></ul><ul><li>According to IDC, the mobile work force in the U.S., Western Europe and Latin America is expected to grow from 34.7 million in 2001 to 60.8 million in 2004. </li></ul><ul><li>35% of PCs sold into business organizations are laptops (IDC) </li></ul>
What the analysts are saying <ul><li>According to John Girard, a vice president and research director at Gartner, "Enterprises can realize substantial support savings and productivity gains by selecting appropriate remote backup and restore tools for their nomadic users. Avoiding just a few disasters may justify the entire value of the investment." </li></ul>
Problems of Data Availability <ul><li>Your data is everywhere and yet, frequently not where you need it </li></ul><ul><li>Your data is difficult to access from the Internet </li></ul><ul><li>If your computer experiences a system crash or is stolen, your data is lost – no disaster recovery </li></ul><ul><li>You don’t dare store sensitive data on the network </li></ul><ul><li>You don’t want to change the way you access your data </li></ul>Home Mobile Air Office Cyber Cafe Hotel PDA
What the Organization Needs <ul><ul><li>Critical corporate data on laptops and desktops needs to be backed up to the network automatically </li></ul></ul><ul><ul><li>Local files should be safe when they are sent to the server and should remain secure on the network – encryption should be automatic </li></ul></ul><ul><ul><li>Anywhere file access that increases the productivity of all users </li></ul></ul><ul><ul><li>Ability to consolidate the storage and simplify the management associated with network “home directories” </li></ul></ul>
Novell iFolder Product Overview <ul><li>Novell iFolder lets your files follow you—everywhere. </li></ul><ul><li>No matter where you are, your files are always with you </li></ul><ul><li>Automatically backs up your local data </li></ul><ul><li>Simplifies the way files are used across the Net </li></ul><ul><li>Files are always safe, secure, and up-to-date </li></ul><ul><li>Secures and protects corporate digital assets </li></ul><ul><li>Accelerates the productivity of today’s mobile professionals </li></ul>
Novell iFolder Benefits <ul><li>Automatically SECURES and protects your files </li></ul><ul><li>Your files are automatically backed up on the network and multiple workstations, protecting your organization’s critical data </li></ul><ul><li>Files are encrypted during delivery and on the server, so no one but you can access them </li></ul>
Novell iFolder Benefits <ul><li>It SIMPLIFIES the way you use your files </li></ul><ul><li>Your files follow you everywhere </li></ul><ul><ul><li>Your files are automatically updated across the machines your regularly use (Work, Laptop, Home) </li></ul></ul><ul><ul><li>Your files are in a local directory so you use them the same way you always have </li></ul></ul><ul><ul><li>If you are on the road you can access your files anywhere using a Web browser </li></ul></ul><ul><li>No need to remember complex login procedures </li></ul><ul><ul><li>Lengthy VPN logins are no longer required </li></ul></ul><ul><li>The view of data is the same on all machines </li></ul>
Novell iFolder Benefits <ul><li>It makes mobile professionals more PRODUCTIVE </li></ul><ul><li>The latest version of your files are always available </li></ul><ul><ul><li>Make a change at work and the changes show up at home </li></ul></ul><ul><li>iFolder recognizes the changes you make to files and o nly sends the changes in a file, not the whole file </li></ul><ul><ul><li>Especially important when working with a slow connection from home or in a hotel </li></ul></ul><ul><li>Uses I nternet standards so you aren’t stuck to a LAN-only solution </li></ul><ul><ul><li>It becomes part of the organization’s eBusiness strategy </li></ul></ul>
iFolder Architecture Novell eDirectory iFolder Servers Jeff’s i Folder User Authentication Storage Jeff’s i Folder through a browser Jeff’s i Folder Jeff’s i Folder Jeff’s i Folder Matt’s i Folder Office Mobile Home Kiosk PDA
Data Recovery and Access <ul><li>Distributes local data to ensure availability in the event of a disaster </li></ul><ul><li>Configurations can be managed more effectively; also, content can be pushed (e.g. virus updates) </li></ul><ul><li>Automates and pushes security policies, such as termination results </li></ul>
Recovering Workspace <ul><li>Provide automated, identity-based configuration and delivery of applications and content across desktops, the Web, and mobile devices </li></ul>
Challenges of Distributed Offices <ul><li>Customers want to: </li></ul><ul><li>Reduce $$ to support branch offices </li></ul><ul><li>Consolidate servers, storage, and applications </li></ul><ul><li>Have directory services for central management at an affordable price when spanning the WAN </li></ul><ul><li>Reduce costs of backups and administration </li></ul><ul><li>Reduce the need for IT staff in the field </li></ul><ul><li>Have disaster tolerance for the rural parts of their network without breaking the bank </li></ul><ul><li>Reduce costs of low bandwidth private WAN links – and leverage the Internet </li></ul><ul><li>Improve services to users on the outskirts of the network </li></ul>
Novell Nterprise Branch Office Nterprise Branch Office drives the cost out of branch office infrastructure in a distributed enterprise by Automatically provisioning stationary, mobile, and visiting users in the rural parts of the customer network Accelerating IT service deployment and access in the branch office Eliminating the data backup challenges in remote offices Securely leveraging the Internet for WAN connectivity between central offices and branch offices Simplifying directory services for distributed environments Enabling server, storage, and application consolidation
Nterprise Branch Office Key Features <ul><li>Soft appliance </li></ul><ul><li>NAS-style file service </li></ul><ul><li>Portal Services for web-based user access </li></ul><ul><li>iPrint </li></ul><ul><li>Data replication for backup (Rsync) </li></ul><ul><li>Integrates with ZFS for content distribution </li></ul><ul><li>Disaster tolerant architecture </li></ul><ul><li>User Access Provisioner </li></ul>
Nterprise Branch Office Architecture London Users BOMAVOL2 BOMAVOL1 Visiting User <ul><li>Local Service Cache for File, Print, Directory </li></ul><ul><li>NAS-Style File Service </li></ul><ul><li>iPrint Print Service </li></ul><ul><li>Replication for Backup </li></ul><ul><li>User Access Provisioner for user caching and provisioning </li></ul><ul><li>Regional data center acts as master of the services and fail-over site </li></ul>BOMAVOL1 BOMAVOL2 BOMAVOL3 BOMAVOL2 iPrint Agent <ul><li>Login </li></ul><ul><li>HTTP </li></ul><ul><li>CIFS </li></ul><ul><li>NCP </li></ul><ul><li>NFS </li></ul><ul><li>AFP </li></ul><ul><li>FTP </li></ul>iPrint Agent iPrint Agent iPrint Agent Barcelona Branch Office Chicago Branch Office Helsinki Branch Office
Recover Productive Work Space <ul><li>Quickly provide new, temporary, or alternate work environments </li></ul><ul><li>Automated, self-service configuration and delivery of applications and content </li></ul><ul><ul><li>Delivered across desktops, the web, or mobile device </li></ul></ul><ul><ul><li>Based on each employee’s identity </li></ul></ul>
Providing a Unified Work Environment <ul><li>Leverage the day-to-day benefits of ZENworks Synergy™—the only solution that can deliver… </li></ul><ul><ul><li>All three kinds of applications: web, thin-client, and 32-bit </li></ul></ul><ul><ul><li>Manage across your network operating systems, including Windows NT/2000 and NetWare </li></ul></ul>
Recovering Work Space Appropriate content pushed server to server and then desktops (rapid deployment) Mobilizes workforce in the event workspace is destroyed In the event of disaster, home computers can receive pushed content
Recovering IT Skills and Expertise <ul><li>Leverage the skills and expertise of the vast Novell community to create a ready workforce should your own IT staff be unavailable in an emergency </li></ul>
Help When You Need It <ul><li>In the wake of September 11, Novell assisted the following customers… </li></ul><ul><li>New York Department of Transportation </li></ul><ul><li>New York Office of Real Properties </li></ul><ul><li>Port Authority of New York/New Jersey </li></ul><ul><li>Bank of New York </li></ul><ul><li>Environmental Protection Agency (EPA) </li></ul><ul><li>Federal Bureau of Investigation (FBI) </li></ul><ul><li>And many others </li></ul>
Recover IT Expertise and Skills <ul><li>The Novell support community is a ready workforce </li></ul>Direct, single point of contact for deployment Pooled resource catalog for appropriate skill set Global organization with mobile workforce Virtual consulting assistance is available Technical delivery automation capabilities
Queensland Health <ul><li>“ A recent unexpected incident meant we were off line for 32 minutes. After the initial period of fault diagnosis, it took only two minutes to bring the cluster back online. Previously, this would have taken almost three hours. This single event represents a productivity improvement of $77,000.” </li></ul><ul><li> </li></ul><ul><li>— Graham Stocks, Manager Brisbane City Information Services Unit </li></ul>
Novell provides the total solution <ul><li>Focus </li></ul><ul><ul><li>Substantial experience designing and implementing efficient and effective IT strategies, architectures and infrastructures with our Cambridge Technology Partners division and Solution Partners </li></ul></ul><ul><li>Experience </li></ul><ul><ul><li>Direct experience (both internal and external) in reducing IT infrastructure complexity and costs and implementing business continuity strategies </li></ul></ul><ul><ul><li>Experience in developing enterprise technology strategies </li></ul></ul><ul><ul><li>Integrating and enabling business applications and solutions </li></ul></ul><ul><ul><li>Designing and installing effective networks </li></ul></ul>
Key Focus Areas for Novell <ul><li>Novell Nsure - Secure Identity Management </li></ul><ul><li>Novell exteNd - Web Services Oriented Architecture </li></ul><ul><li>Novell Nterprise - Cross Platform Network Services </li></ul><ul><li>Novell Ngage - Consulting </li></ul><ul><ul><li>Business Strategy </li></ul></ul><ul><ul><li>IT Strategy and Governance </li></ul></ul><ul><ul><li>Business Value Justification </li></ul></ul><ul><ul><li>Enterprise Technology Strategy </li></ul></ul><ul><ul><li>Directory Strategy </li></ul></ul><ul><ul><li>Rapid Technology Rationalization </li></ul></ul><ul><ul><li>Discovery Workshops </li></ul></ul>