SlideShare a Scribd company logo
1 of 15
Download to read offline
W H I T E P AP E R
P r o t e c t i n g Y o u r B u s i n e s s : Ad d r e s s i n g B u s i n e s s R i s k w i t h
E f f e c t i v e T e c h n o l o g y
Sponsored by: HP
Raymond Boggs Randy Perry
Jed Scaramella
March 2014
E X E C U T I V E S U M M AR Y
Over the past five years, companies of all sizes have been under increased pressure to
improve IT efficiency and effectiveness. This is especially true for small and midsize
businesses (SMBs) that have fewer than 1,000 employees but must match larger
company competitors in managing their on-premise resources (most notably x86
servers) as efficiently as possible in order to support the constantly evolving business
processes necessary for success. While advanced cloud and mobile resources are an
increasingly important part of IT environments, core infrastructure technology continues
to be the foundation for SMB IT performance.
Automation of maintenance procedures — ranging from proactive monitoring of
hardware components to single-pane-of-glass control consoles — is an effective way
to combat these IT staff costs. While automation does not eliminate all maintenance
costs, it is a leverage point to drive down operational expenditures (opex) on an
ongoing basis.
Efforts to reduce manual processes traditionally used by IT staff will directly result in
operational cost reductions; therefore, technologies aimed at automating repetitive
tasks are well-suited to address these customer pain points. The effects of attacking
these costs could be dramatic: Significantly reducing costs would both transform the
way today's datacenters work and reduce opex for a wide array of customer sites.
Key to the automation process is the collection of server data and of parameters
indicating the health of the server system. The system proactively monitors the
servers via sensors, and this information informs the management console about
whether components need to be replaced or turned off prior to replacement.
As discussed in this paper, IDC customer-based studies show that using appropriate
technology in consistent ways helps SMB organizations mitigate business risk and
improve overall business protection by avoiding unplanned downtime. According to the
studies, targeted technology upgrades, combined with a program to standardize
infrastructure and to improve IT business practices, can deliver substantial risk reduction.
This approach is powerful: It can reduce annual outage risk by as much as 87%; in
some cases, downtime was reduced from an average of over 1.4 hours per month to
less than 12 minutes per month. (The amount of downtime reduction that measures to
protect IT infrastructure can deliver represents significant business savings, given that
SMBs studied by IDC experienced an average loss of $75,000 per downtime hour.)
GlobalHeadquarters:5SpeenStreetFramingham,MA01701USAP.508.872.8200F.508.935.4015www.idc.com
2 #247225 ©2014 IDC
Midsize businesses recognize the escalating importance of protecting their IT
infrastructure to reduce business risk and to improve business continuity. These
business drivers are the reasons why HP has worked to optimize its technology
offerings (servers, storage, and networking equipment) to address midsize customers'
business protection requirements.
HP ProLiant Gen8 servers support automated management and proactive monitoring
— and HP is offering financial terms for purchase or lease to SMBs deploying them.
For these reasons, HP ProLiant Gen8 servers can play an important role in
supporting business continuity and can serve as a key element of business protection
programs that are designed to reduce operational costs in today's midsize and large
businesses.
B u s i n e s s R i s k : W h a t ' s t h e D a m a g e ?
IDC customer-based studies show that each year, the average midsize company
experiences 15–18 business hours of network, system, or application downtime.
Causes of downtime vary, but aging systems can have components or software that
fail, while network connections and power grids can fail at any time because of
external causes (e.g., weather, construction work, or natural disaster). Outages
occurring during business hours result in revenue loss, as orders are dropped,
customers move on, and employees cannot access critical applications. IDC research
found that revenue losses per hour averaged $75,000.
However, the adoption of best practices has allowed midsize companies to reduce
downtime significantly in recent years. Solutions that improve system management,
protect data assets from loss and unauthorized access, strengthen network security,
and ensure availability directly reduce these losses at customer sites. As depicted in
Figure 1, IDC ROI research finds that solutions and best practices directed at
avoiding such outages — both approaches supported by HP's Business Protection
solutions — can reduce outages by as much as 87%, cutting downtime per month
from over 1.4 hours to less than 12 minutes on average. This means less lost
revenue — the actual loss avoided varies from industry to industry, but the revenue
losses avoided are significant given that IDC has found an average downtime cost of
$75,000 per hour for United States–based SMBs. A brief summary of these findings,
which show downtime hours per month, and their relationship to revenue loss follows:
 The consistent use of management software tools across the infrastructure
reduces network and system downtime by 65%.
 The use of virtualization software reduces server downtime by 10%.
 Adopting industry best practices standards (e.g., ITIL, CobiT) across the
organization reduces all downtime by 13%.
©2014 IDC #247225 3
F I G U R E 1
T h e I m p a c t o f D o w n t i m e o n B u s i n e s s a n d t h e V a l u e o f
R e d u c i n g I t
Note: Revenue loss measures represent an average across many industries, each with differing
downtime cost impacts.
Source: IDC's Business Value Research, 2011–2014
L o o k i n g a t R i s k — E x t e r n a l V e r s u s I n t e r n a l
Small businesses (firms with fewer than 100 employees) and midsize firms (those
with 100–1,000 employees) face a host of risks, both internal and external. That is,
the source of risk can come from outside the company or — perhaps more
concerning because it could be prevented — from inside the company.
The external causes of risk are especially challenging — the changing economic
environment, new competitors, customers that suffer financial reversals, changing
government requirements, and increasing raw material and transportation costs. The
one small comfort that a manager can take in these challenges is that they will affect
all competitors. No one is immune, although firms can respond to them with different
degrees of success.
Easier to anticipate, but no less difficult to address, are the internal risks a company
faces. These risks will not adversely affect any company but your own, which makes
Downtime Hours Vs. Business Hours Per Year
Downtime Hours
18
Business Hours
3,030
500 1,000 1,500 2,000 2,500 3,000
-
0.20
0.40
0.60
0.80
1.00
1.20
1.40
1.60
Before After
Downtime Hours
(Per Month) Downtime Reduction due to:
Best Practices
Virtualization
Management Software Tools
Data, Network Security
Data Replication, Backup
High-Availability Servers
$-
$20,000
$40,000
$60,000
$80,000
$100,000
Revenue Loss
Due to Downtime
(Per Month)
4 #247225 ©2014 IDC
them all the more important to address. While it may not be possible to prepare
adequately for a global economic crisis, it is possible to manage, if not eliminate, the
risks associated with internal IT infrastructure problems. These risks fall into three
basic categories:
 System downtime. When local systems go offline, their data and applications
are not available to end users within the organization or to end customers outside
the organization who are trying to access data or to buy products/services via a
Web interface to the systems/storage/networking components of the IT
infrastructure within the company.
 Network outages. Loss of network access can halt business operations and in
some cases suspend revenue-generating operations. When visible to customers,
a suspension of network operations can complicate the delivery of customer
service and can even raise questions about a firm's reliability, increasing the
opportunity for competitors to take away business.
 Security breaches. Even more potentially serious, a security breach can
compromise sensitive customer and employee information or intellectual property
stored in disk drives or on tape media. Even if data is not corrupted and even if
programs are not ruined, the damage to a company's reputation can be
catastrophic. Sometimes, news about security breaches surfaces publicly, and
the publicity can affect customer loyalty and repeat business by altering
customers' perception of the data integrity and data reliability within the
organization that experiences the security breach.
While large firms can rely on redundancy and high-availability computing solutions, as
implemented by their own IT organizations, many SMB customers must rely on more
basic technology approaches that they implement themselves or ask service
providers to implement on their behalf. IDC research indicates that SMBs, many of
which access central-site infrastructure or third party–operated datacenters, are
interested in upgrading their network infrastructure and improving the security of their
IT resources (see Table 1).
T A B L E 1
S h a r e o f F i r m s C i t i n g I n f r a s t r u c t u r e a s T o p T e c h n o l o g y S p e n d i n g P r i o r i t y ( % )
Priority Small Business Midsize Business
Increase storage capacity/improve storage management 26.5 30.5
Improve network security/security management 15.9 41.7
Implement/upgrade wireless connectivity 13.7 21.6
Note: Small businesses are firms with fewer than 100 employees, and midsize firms have from 100 to 1,000 employees.
Source: IDC's SMB Survey, 2013
©2014 IDC #247225 5
C u s t o m e r P a i n P o i n t s
Potential sources for disruption to business processes abound in the modern
workplace: Aging systems, inconsistent implementations, and unevenly applied data
and security policies all can result in business risk and can threaten business
continuity. The top customer pain points include the following:
 Systems and applications reliability. Older, less reliable systems cause downtime
more frequently than newer systems outfitted with monitoring software that provides
alerts to system administrators when a key component fails or goes offline, speeding
timely repair. The process of upgrading software or applying security patches can
cause system downtime, if not done according to "best practices" that take systems
offline for such repair. Virtualization and migration of virtual machines (VMs) to
alternate servers during repairs can reduce planned downtime. Physical repairs also
need to be made, such as updating aging infrastructure that has too many cables,
and too many devices. Inconsistent backup/recovery procedures mean that some
systems are better protected than others; inconsistencies in security and
management must be addressed across the entire IT infrastructure.
 Networking and systems management. Many SMB organizations lack a single,
coherent "view" of systems and networking from a centralized console. This
results in an incomplete picture of systems, storage, and networking
infrastructure — allowing small problems to develop into big ones before being
addressed. In addition, just as SMB organizations have experienced systems
sprawl, as many systems were added to the infrastructure in recent years, there
has been an accompanying low-end switch "sprawl," which has grown over the
years. Importantly, bandwidth constraints hamper data connections to service
partners or to channel partners, who are supporting SMB IT operations, or to
central headquarters for a large company that has branch operations across
multiple geographic locations. Local sites need high-bandwidth connections to
stay current with other systems across the network — and to provide local
systems with software updates in a timely and efficient way.
 Security issues across the infrastructure. For many SMB organizations, the
lack of support for single sign-on and authorization across the company prevents
accurate approvals for end-user access and could result in inappropriate access
to systems by outsiders or hackers. Inconsistent security practices, along with
inadequate or aging Internet access methods, leave room for security business
risks to develop over time. Data backups that are not regularly scheduled or
encrypted can result in security issues related to tampering with data or
impacting the integrity of a business' data housed on storage devices or on the
organization's PCs. The need to improve employee productivity with wireless
networks further increases the risk exposure.
 PCs and printers at different software release "levels." The challenge of
maintaining aging equipment or updating software for that equipment is
widespread in SMB organizations. Inconsistent life-cycle management causes
many operational issues. Security lapses associated with data and access to
company documents also cause operations issues and unscheduled downtime
for end users, affecting their productivity. All of these issues increase IT staff
costs, raising opex throughout the year.
6 #247225 ©2014 IDC
IDC customer-based studies reveal that IT infrastructure is seen as a top priority in
terms of planned spending by companies and their IT organizations. However, in the
current economy, many IT organizations are finding that they have to put many of their
updating/upgrading/replacement plans on hold, which is impacting planned updates to
aging datacenter infrastructure. The importance of keeping IT infrastructure current can
be seen in Table 1.
Business Protection Focus: Disaster Readiness and Operational
Efficiency
Many of the companies interviewed focused more intently on readying backup data
and preconfiguring applications for rapid redeployment in the event of a disaster.
Some replicated data within their own offices or branches, while others turned to
outside services to provide the backup capabilities. By expanding the percentage of
their critical applications that are continuously backed up with data stored offsite,
midsize organizations can more quickly redeploy applications and recover them. The
more effectively they do this, the more they can reduce the "disaster to full restore"
time horizon and therefore improve their protection of the business.
Research indicates that advanced storage, server virtualization (enabling workload
consolidation and workload isolation), and systems management capabilities bring
this promise of quick recovery closer to the midsize organization. For example, newer
approaches leverage the ability to migrate virtualized server images (virtual machines
or VMs) to alternate servers or storage devices for later start-up. If IT has replicated
production data, then it can resume work using the copied VM with replicated data.
As another example of advanced technologies enabling disaster recovery, surveyed
sites found that backup processes that utilized advanced primary-to-remote, disk-to-disk
backup reduced backup and recovery times by up to 90%, as indicated in Figure 2.
©2014 IDC #247225 7
F I G U R E 2
M a n a g e m e n t a n d T e c h n o l o g y U p g r a d e s R e d u c e M i d s i z e
O r g a n i z a t i o n s ' D i s a s t e r R e c o v e r y C o s t s
Source: IDC's Business Value Research, 2011–2014
Using these and other newer technologies, IT administrators can minimize the backup
cost per application and establish a secondary backup site with far fewer
requirements than they could before. Though many of these organizations have not
found the resources to fully duplicate a primary site within a remote recovery site,
they have begun to establish a foundation for doing so later on.
S o l u t i o n s T h a t I m p r o v e B u s i n e s s P r o t e c t i o n
The adoption of technology solutions can address many of the "specifics" around
mitigating business risks, including server refreshes, operating system upgrades,
centralized security policies and systems, consistent management practices, storage
backup and recovery practices, encryption/de-encryption of data files, and networking
security for wired and wireless LANs.
Customer "pain points" related to downtime, security issues, or networking issues —
or the operational impact of PCs and printers that do not work properly and require
repair — are sources of both customer frustration and added cost. Best practices,
which are built on solutions already tested to work at customer sites and implemented
through management policies, reduce the variations in implementation that often
cause business risk to manifest itself in systems that go offline.
-
10
20
30
40
50
60
70
Hours
(per user
per year)
Recovery 4.0 0.5
Backup 60.0 6.0
Before After
90% reduction in task time:
disk-to-disk remote backup and
restore versus traditional tape
backup and physical transport
methods
8 #247225 ©2014 IDC
B U S I N E S S V AL U E R E S U L T S
" B e f o r e " a n d " A f t e r " P r o t e c t i o n I m p a c t s
To quantify the business protection value of technology-enabled best practices for
IT operations processes, IDC used in-depth interviews from multiple surveys of IT
practitioners in SMB organizations; these interviews were conducted over the past
four years. The makeup of firms that compose the sample set varies in terms of
numbers of users, PCs, and servers deployed at the firms' IT sites.
The cost of downtime for midsize companies varies sharply both by industry and by
geography. Our research sample covers United States–based companies, so the
geographic variations across the regions of the world do not apply to these results.
However, the samples showed results that are consistent with the multi-geography
studies conducted by IDC from 2011 to 2014. Figure 3 shows the varying cost of an hour
of downtime across a selection of industries.
F I G U R E 3
A v e r a g e A n n u a l R e v e n u e a n d P r o d u c t i v i t y L o s s p e r D o w n t i m e H o u r ,
D o w n t i m e H o u r s b y I n d u s t r y
Note: The size of the circle representing the industry denotes the average annual downtime
hours for that industry.
Source: IDC's Business Value Research, 2011–2014
Productivity Loss / Hour Revenue Loss / Hour Downtime Hours
Financial $3,642 $9,997,500 3.6
Retail $2,579 $397,500 7.8
Healthcare $1,246 $157,500 21.7
Manufacturing $3,062 $59,925 8.0
Public Sector $850 $ - 9.4
3.6
7.8
21.7
8.0
9.4
1
10
100
1,000
10,000
100,000
1,000,000
10,000,000
100,000,000
0 1,000 2,000 3,000 4,000
Revenue Loss Per
Downtime Hour
($)
Log Scale
Productivity Loss Per Downtime Hour Per 100 Users ($)
Financial
Services
Retail
Manufacturing
Healthcare
Public Sector
©2014 IDC #247225 9
Figure 3 also shows how average downtime hours per year vary by industry. One
should notice that cost per hour of downtime inversely relates to the average number
of downtime hours per year. IDC notes that this relationship between cost and
reported downtime intervals is not coincidental because companies with high-value
operations tend to adopt technology initiatives and best practices to reduce risk.
Reducing the Business Risk of Downtime
So which technology initiatives and best practices have the greatest impact on
reducing downtime? IDC research about midsize companies has identified the
practices and technologies that either have greatly reduced downtime or occur in
companies with lower downtime compared with others of similar size, industry, etc.
For this white paper, we have selected the technology initiatives and best practices
noted in the following list and in Table 2. Each initiative displays the maximum
downtime impact holding all other factors constant. These values do not sum to 100
as we measured each initiative's effects on customers' downtime independently.
 Management software tools (65%) to provision, configure, monitor, and manage all
technology assets include HP products such as HP Insight Control system
management software, HP Integrated Lights-Out (iLO) embedded management
software, HP Data Protector Express, HP StoreOnce deduplication software and
HP Backup Systems for automating data protection, HP PCM network
management for wired and wireless networks, IT service management, information
management, application, system and network management, and SOA solutions.
 Server virtualization (10%) reduces downtime arising from system failures and
operating system incompatibilities and enhances the ability to shift workloads, further
reducing outages by means of planned downtime and migration of virtual machines.
 Enabling failover clustering (43%) for enhancing the availability of internally faced
applications.
 Industry best practices processes (e.g., ITIL, CobiT) (13%) make up a set of
processes implemented uniformly across the entire organization to centrally
manage all aspects of IT.
 Thin clients/blades (25% PC downtime) reduce hardware failures caused by user
errors, software incompatibilities, or physical damage and theft.
 Comprehensive PC security (28% PC downtime) is a set of technologies
that reduce PC vulnerability to external security threats. All notebooks and
desktops are equipped with encryption, access control, antivirus utilities,
antispyware/malware utilities, centrally managed PC firewalls, and an automated
patch distribution system that supports software updates and patching while
reducing demands on IT staff time.
 Standardizing on one desktop operating system, version, and release level (30%).
 Upgrading servers, storage, and networking hardware (50%) sustains more
advanced, faster versions of these hardware devices and reduces risks of
downtime caused by aged or out-of-synch platforms.
 Deploying antivirus and antispam solutions throughout the organization (15%).
10 #247225 ©2014 IDC
T A B L E 2
D o w n t i m e R e d u c t i o n s E n a b l e d b y S p e c i f i c I n i t i a t i v e s ( % )
Initiative Downtime Reduction
Management tools 65
Upgrade servers, storage, networking 50
Failover clustering for internally faced applications 43
Standardization on single desktop operating system 30
Comprehensive PC security 28
Thin clients/blades 25
Deploying multiple antivirus, antispam solutions 15
Industry best practices implementation (ITIL, CobiT, etc.) 13
Server virtualization 10
Notes:
Percentages do not add to 100.
Effects were measured independent of each other.
Source: IDC's Business Value Research, 2011–2014
H P ' s B u s i n e s s P r o t e c t i o n P r o g r a m
HP's Business Protection program is aimed at delivering business benefits over the life
of the technology. This is a full-spectrum approach to making business protection
solutions easier to acquire, deploy, and maintain over the entire infrastructure life cycle.
The ability to replace aging equipment with new equipment — and to do so at reduced
acquisition costs — supports customers' programs to improve business protection for
their organizations.
Because technology acquisition is challenging for small and medium-sized
businesses in the face of difficult economic conditions, HP is providing new financial
offers, including low-interest financing from HP Financial Services, and offering new
support/services packages in conjunction with its business partners that provide
technical support for new solution deployments:
 "Recipes" for success. HP has highly customizable infrastructure solutions that
combine server, storage, management, data protection, data security,
networking, PCs, and printers. These reference solutions are being provided to
customers and HP channel partners to speed deployment of consolidated
business protection solutions. Because the components of these solutions have
been tested against many operational conditions, they will be easier to support
and maintain in the branch office site.
 Rightsizing of solutions. HP has designed solutions for businesses of different
sizes: those with up to 300 users; 500 users; or 1,000 users. Sizing for the
workload is important because it provides the appropriate amount of data
processing power, storage, and bandwidth capacity, and it does so for a given
number of users to optimize system response time and to boost IT staff and
end-user productivity.
©2014 IDC #247225 11
 Ease of use in management tools for system administrators. IT staff costs
must be contained — and the ratio of system administrators to servers and the
ratio of administrators to other types of managed devices (e.g., storage,
networked PC printers, and networking devices) must be improved wherever
possible. Recognizing that system management must be simplified and easy to
learn, HP is providing integrated software tools that enable the companies'
IT staff and/or their third-party IT service providers to effectively manage the
environment from either onsite or offsite (remote) locations.
 Improved financial terms. The economic downturn has made it more difficult than
before to acquire or lease new technology. HP is providing new financial offers,
including low-rate financing and deferred payments from HP Financial services.
HP is also offering new support services packages in conjunction with its business
partners; these packages provide technical support for new solution deployments.
This approach is intended to make it easier to acquire new technology or to refresh
technology, such as upgrading to the latest generation of HP ProLiant Gen8 servers.
R e d u c i n g t h e M a i n t e n a n c e C y c l e
Operational costs for IT staff time, power/cooling, and responses to unplanned
downtime all combine to drain IT budgets. However, to the degree that any, or all, of
these cost factors could be reduced, then the operational costs — and the ROI to
acquire the computers — would be reduced.
As servers age in place, the number of service incidents tends to increase over time.
That means that intensive oversight of all of the components — and the ability to
address any failing components prior to disruption of business services — is critical to
maintaining business continuity. HP has long provided such oversight through its iLO
technology and other system management software capabilities, but it has greatly
expanded them in terms of granularity and coverage and automation in HP ProLiant
Gen8.
HP ProLiant Gen8 includes updated and upgraded iLO technology, with rich
instrumentation and DVR functionality (including virtual media patch and provisioning
capabilities). HP iLO 4 Advanced allows system administrators to remotely control
servers via the Internet. The iLO 4 Advanced capability provides a view of the server
environment, with full graphics displaying the state of the remote system, along with an
automatic video recording capability and support for team collaboration. Using these
capabilities, administrators can control systems from a central location. They can restart
servers, control power settings, update software, and interact with the remote system —
without traveling to the server room.
N e w H P T e c h n o l o g y i n H P P r o L i a n t G e n 8
With HP ProLiant Gen8, HP is strengthening the automated management capabilities for
its HP ProLiant servers. Importantly, it is doing so to address the variation in IT skill sets
from one customer site to another. As a result, it will not be critical to ongoing IT
operations to have equal amounts of management skills at each site where ProLiant
servers are deployed — reducing the time and costs associated with installing and
maintaining these systems.
12 #247225 ©2014 IDC
Importantly, the capabilities will be built into, or embedded in, the ProLiant x86 server
components, supporting problem detection; the gathering of vital operational
information; identification of any signs that hardware components may fail; and
forwarding of that operational information to a unified console for system administrators.
Highlights of the HP ProLiant Gen8 technologies include the following:
 HP ProActive Insight architecture is a self-aware architecture that impacts the
server life cycle by supporting preventive maintenance to keep servers up and
running by reducing unplanned downtime. Proactive maintenance based on
HP ProActive Insight reduces the possibility that hardware components will fail
online. The key goals of HP ProActive Insight are to provide operational
efficiency, application acceleration and availability, and datacenter optimization.
 HP iLO 4 Advanced. The HP iLO management processor is the core foundation for
the HP iLO Management. HP iLO for HP ProLiant Gen8 servers simplifies server
setup, monitors system health, provides power and thermal control, and enables
remote management.
 HP Agentless Management. The HP iLO Management Engine provides
hardware monitoring and alerting capability, which is built into the system
(embedded in the HP iLO chipset). Thus capability is activated on startup and
booting of the ProLiant Gen8 server systems.
 HP Active Health System. HP Active Health System is an essential component
of the HP iLO 4 Advanced Management Engine. It provides customers with
diagnostic tools and scanners wrapped into one, providing 24 x 7 x 365
continuous monitoring; detailed configuration history; health and service alerts;
and an easy way to export and upload system information to service and support.
 HP Intelligent Provisioning (previously known as HP SmartStart). HP Intelligent
Provisioning offers the ability for out-of-the box single-server deployment and
configuration without the need for media.
 Smart Socket. This feature avoids the bending of "pins" in microprocessors as
they are added to system boards, avoiding damage that must be repaired by IT
staff. This is another type of proactive avoidance of IT staff time and costs.
 HP Insight Online. This is a repository of service bulletins, which updates the
status of the technology bulletins for service and support. It provides "phone
home" support. The ability to easily access the latest service bulletins — and to
find them all in one place — addresses another pain point seen by IT staff at
many customer sites.
 HP Services. HP's ProLiant Gen8 technologies are supported by a robust
portfolio of HP support offerings. New service offers such as Collaborative
Support, Proactive Care, and Insight Online take full advantage of the
HP ProLiant Gen8 technology. These services are delivered to customers via the
global presence of HP direct and HP ServiceOne authorized partners.
©2014 IDC #247225 13
O f f - t h e - S h e l f S o l u t i o n s B a s e d o n C o n v e r g e d
I n f r a s t r u c t u r e
HP Converged Systems are preintegrated, tested, and supported solutions that are
optimized for cloud, virtualization, and next-generation applications. HP intends for
these systems to reduce the resources and the time (by months or even years)
required for planning, procurement, and deployment so that customers can accelerate
their time to application value.
HP offers customers off-the-shelf solutions for business continuity and improving
business protection — such as security solutions, networking solutions, and
server/storage solutions. These are converged infrastructure solutions — meaning
that all of the components fit together without special scripting or tuning — saving on
IT operational costs. The Business Protection program protects both data and
applications, provides automated backups, and supports disaster recovery for
business continuity.
Depending on the solution set, these solutions are based on a variety of components,
including the following: HP ProLiant Gen8 servers, HP storage products, HP network
switches and wireless network infrastructure, HP Insight Control system management
software, and HP Technology Support Services and HP Protect Tools, which are
used for business PCs and HP secure printing.
I T B e n e f i t s
System administrators in small and midsize sites spend a lot of their working hours
checking on mechanical devices, such as electrical cables, power cords, system board
connections, fans, and the like. This work is time intensive and labor intensive. Building
in connections and components directly on the system boards reduces the total number
of connections that must be checked, time and again, by system administrators. By
detecting hardware component issues in a more automated way, the HP ProLiant Gen8
technologies reduce the time associated with identifying and diagnosing server
hardware issues and speed the time to resolution of those problems. All of this reduces
IT staff time associated with deployment of physical servers and ongoing maintenance.
Unplanned downtime has a big impact on operational costs and must be avoided,
wherever possible. Preventive maintenance of hardware components — replacing
them prior to an actual failure — reduces unplanned downtime appreciably.
"Phone home" capabilities provide an early warning system, allowing administrators
to proactively replace system components and avoid actual downtime.
Upgrades and updates for any given server — multiplied by tens or hundreds of servers
— cause major costs within the enterprise datacenter. Automation of care/maintenance
avoids needless duplication of effort, reduces the number of physical tasks, and helps
avoid downtime.
14 #247225 ©2014 IDC
B u s i n e s s B e n e f i t s
Today's businesses rely on hundreds of servers operating efficiently — and doing so
on a 24 x 7 x 365 basis. Any prolonged disruptions in these operations, which
businesses sometimes call "computer glitches," are simply unacceptable because
they affect the availability of applications and databases being accessed by
employees and by end customers. Therefore, any interruptions are to be avoided. In
the event that processing is interrupted by an outage, it must be able to resume on
other systems as quickly as possible.
The ability to manage all servers from a single point of view, or console, has the
advantage of reducing time associated with identifying a problem in the first place.
HP has given all of these factors consideration in its HP ProLiant Gen8 designs,
making it easier to identify and to address hardware problems and to restart
workloads on alternate servers, if needed. The use of cloud technology to gather
information and to make it universally available across all the "sites" at a customer
installation is inventive and should allow rapid response to any hardware operational
issues.
C H AL L E N G E S / O P P O R T U N I T I E S
Business risks take many forms — including risks to IT infrastructure encompassing
servers, storage and networking equipment, and endpoint devices such as PCs and
printers. Security threats impact customers' data and cause networking downtime.
This in turn delays or prevents the communication of voice and data inside and
outside the company. It impacts customers and business partners. Current economic
conditions are highlighting the need to avoid business risks because any interruption
to business processes will result in lost revenue and increased costs. Those costs
can take several forms, including the actual cost of repairs, the IT staff costs to
resume processing, and the potential damage to revenue and to company reputation
that can result from a prolonged outage.
HP is well-positioned to address these business risks because of its deep and broad
inventory of hardware, software, and services that enable companies to keep watch
over the "state" of their systems, storage, and networking equipment, along with their
portfolio of PCs and printers. These technologies, when combined with management
and monitoring software and security protection, allow business customers to respond
to threats of disruption effectively and affordably.
C O N C L U S I O N
Customers need to have a well-thought-out approach to business protection and
business risk mitigation. Downtime and security threats cannot be prevented, but they
can be isolated by taking a comprehensive approach to identifying business risks and
to addressing each of the major causes of business risk.
©2014 IDC #247225 15
Applying automation to repetitive tasks — and proactively monitoring the systems —
results in an intelligent infrastructure that takes round-the-clock steps to improve
uptime without requiring the involvement of IT staff.
A self-aware infrastructure can have a dramatic impact on IT costs, which in turn
affects the business organization and its annual budget. HP ProLiant Gen8 servers,
using HP ProActive Insight architecture, have been designed to address customer
pain points associated with everyday maintenance and, in the event of an outage, the
costs of recovering from unplanned downtime.
As IDC customer-based data demonstrates, combining updated technology and IT
best practices can reduce costs associated with downtime by 30% to 60% and reduce
the amount of lost productivity by up to 80%. By adopting best practices and updating
IT infrastructure, companies can lower annual downtime significantly, greatly reducing
interruptions to daily data processing and access, supporting business continuity, and
containing operational costs.
C o p y r i g h t N o t i c e
External Publication of IDC Information and Data — Any IDC information that is to be
used in advertising, press releases, or promotional materials requires prior written
approval from the appropriate IDC Vice President or Country Manager. A draft of the
proposed document should accompany any such request. IDC reserves the right to
deny approval of external usage for any reason.
Copyright 2014 IDC. Reproduction without written permission is completely forbidden.

More Related Content

What's hot

Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Dawn Simpson
 
ISACA_21st century technologist
ISACA_21st century technologistISACA_21st century technologist
ISACA_21st century technologistDonald Tabone
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data BackupsGFI Software
 
Microsoft Core Infratructure
Microsoft Core InfratructureMicrosoft Core Infratructure
Microsoft Core Infratructureirvin1969
 
Business Continuation The Basics
Business Continuation   The BasicsBusiness Continuation   The Basics
Business Continuation The Basicsguest13df88e8
 
idc-business-value-whitepaper2015
idc-business-value-whitepaper2015idc-business-value-whitepaper2015
idc-business-value-whitepaper2015Timothy Ori
 
White Paper IDC | The Business Value of VCE Vblock Systems: Leveraging Conver...
White Paper IDC | The Business Value of VCE Vblock Systems: Leveraging Conver...White Paper IDC | The Business Value of VCE Vblock Systems: Leveraging Conver...
White Paper IDC | The Business Value of VCE Vblock Systems: Leveraging Conver...Melissa Luongo
 
Business Continuation - The basics according to John Small 2014-02-21
Business Continuation - The basics according to John Small 2014-02-21Business Continuation - The basics according to John Small 2014-02-21
Business Continuation - The basics according to John Small 2014-02-21Business As Usual, Inc.
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Upbaselsss
 
Saving Money Through EDI Integration
Saving Money Through EDI IntegrationSaving Money Through EDI Integration
Saving Money Through EDI IntegrationDicentral Corporation
 
The Changing Data Quality & Data Governance Landscape
The Changing Data Quality & Data Governance LandscapeThe Changing Data Quality & Data Governance Landscape
The Changing Data Quality & Data Governance LandscapeTrillium Software
 
Going Green Whitepaper
Going Green WhitepaperGoing Green Whitepaper
Going Green WhitepaperUdayRavi
 
Review the five signs that you need a new Segregation of Duties compliance st...
Review the five signs that you need a new Segregation of Duties compliance st...Review the five signs that you need a new Segregation of Duties compliance st...
Review the five signs that you need a new Segregation of Duties compliance st...Symmetry™
 
BMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 YearsBMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 YearsChris Farwell
 
Trillium Software Building the Business Case for Data Quality
Trillium Software Building the Business Case for Data QualityTrillium Software Building the Business Case for Data Quality
Trillium Software Building the Business Case for Data QualityTrillium Software
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and TrendsMaclear LLC
 

What's hot (20)

Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
 
ISACA_21st century technologist
ISACA_21st century technologistISACA_21st century technologist
ISACA_21st century technologist
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data Backups
 
Microsoft Core Infratructure
Microsoft Core InfratructureMicrosoft Core Infratructure
Microsoft Core Infratructure
 
Business Continuation The Basics
Business Continuation   The BasicsBusiness Continuation   The Basics
Business Continuation The Basics
 
idc-business-value-whitepaper2015
idc-business-value-whitepaper2015idc-business-value-whitepaper2015
idc-business-value-whitepaper2015
 
White Paper IDC | The Business Value of VCE Vblock Systems: Leveraging Conver...
White Paper IDC | The Business Value of VCE Vblock Systems: Leveraging Conver...White Paper IDC | The Business Value of VCE Vblock Systems: Leveraging Conver...
White Paper IDC | The Business Value of VCE Vblock Systems: Leveraging Conver...
 
Business Continuation - The basics according to John Small 2014-02-21
Business Continuation - The basics according to John Small 2014-02-21Business Continuation - The basics according to John Small 2014-02-21
Business Continuation - The basics according to John Small 2014-02-21
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Up
 
Saving Money Through EDI Integration
Saving Money Through EDI IntegrationSaving Money Through EDI Integration
Saving Money Through EDI Integration
 
The Changing Data Quality & Data Governance Landscape
The Changing Data Quality & Data Governance LandscapeThe Changing Data Quality & Data Governance Landscape
The Changing Data Quality & Data Governance Landscape
 
Going Green Whitepaper
Going Green WhitepaperGoing Green Whitepaper
Going Green Whitepaper
 
Virtualization 2013: Mission Critical Strategy
Virtualization 2013: Mission Critical StrategyVirtualization 2013: Mission Critical Strategy
Virtualization 2013: Mission Critical Strategy
 
Fm computer roomcleaningguide
Fm computer roomcleaningguideFm computer roomcleaningguide
Fm computer roomcleaningguide
 
Review the five signs that you need a new Segregation of Duties compliance st...
Review the five signs that you need a new Segregation of Duties compliance st...Review the five signs that you need a new Segregation of Duties compliance st...
Review the five signs that you need a new Segregation of Duties compliance st...
 
BMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 YearsBMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 Years
 
Trillium Software Building the Business Case for Data Quality
Trillium Software Building the Business Case for Data QualityTrillium Software Building the Business Case for Data Quality
Trillium Software Building the Business Case for Data Quality
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
 

Similar to P r o t e c t i n g y o u r b u s i n e s s

idc-business-value-whitepaper
idc-business-value-whitepaperidc-business-value-whitepaper
idc-business-value-whitepaperSteve Brown
 
veeamup_04
veeamup_04veeamup_04
veeamup_04S. Hanau
 
The cost of downtime
The cost of downtimeThe cost of downtime
The cost of downtimeBillyHosking
 
ANZ SMS Synopsis
ANZ SMS SynopsisANZ SMS Synopsis
ANZ SMS Synopsispatrikbzz
 
Hu Yoshida's Point of View: Competing In An Always On World
Hu Yoshida's Point of View: Competing In An Always On WorldHu Yoshida's Point of View: Competing In An Always On World
Hu Yoshida's Point of View: Competing In An Always On WorldHitachi Vantara
 
Software environmentalism - Tudor Girba - Codemotion Amsterdam 2016
Software environmentalism - Tudor Girba - Codemotion Amsterdam 2016Software environmentalism - Tudor Girba - Codemotion Amsterdam 2016
Software environmentalism - Tudor Girba - Codemotion Amsterdam 2016Codemotion
 
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperWill You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperChristian Caracciolo
 
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034Maru Schietekat
 
Large-Scale Remote Access & Mobility
Large-Scale Remote Access & MobilityLarge-Scale Remote Access & Mobility
Large-Scale Remote Access & Mobility Array Networks
 
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...Jim Mason
 
Infor cloud suite industrial machinery, handbook, english 0216
Infor cloud suite industrial machinery, handbook, english 0216Infor cloud suite industrial machinery, handbook, english 0216
Infor cloud suite industrial machinery, handbook, english 0216Drake Brown
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recoveryVMware_EMEA
 
Addressing Storage Challenges to Support Business Analytics and Big Data Work...
Addressing Storage Challenges to Support Business Analytics and Big Data Work...Addressing Storage Challenges to Support Business Analytics and Big Data Work...
Addressing Storage Challenges to Support Business Analytics and Big Data Work...IBM India Smarter Computing
 
IT and Business solutions through Cloud and Big Data transformation for stron...
IT and Business solutions through Cloud and Big Data transformation for stron...IT and Business solutions through Cloud and Big Data transformation for stron...
IT and Business solutions through Cloud and Big Data transformation for stron...Rolta
 
NEC Backup as a Service reduces administrative tasks, helping it departments...
 NEC Backup as a Service reduces administrative tasks, helping it departments... NEC Backup as a Service reduces administrative tasks, helping it departments...
NEC Backup as a Service reduces administrative tasks, helping it departments...InteractiveNEC
 
Cisco Connect 2018 Malaysia - It transformation-an imperative for driving bus...
Cisco Connect 2018 Malaysia - It transformation-an imperative for driving bus...Cisco Connect 2018 Malaysia - It transformation-an imperative for driving bus...
Cisco Connect 2018 Malaysia - It transformation-an imperative for driving bus...NetworkCollaborators
 
8 Strategies for IT Transformation
8 Strategies for IT Transformation8 Strategies for IT Transformation
8 Strategies for IT Transformationkenaibarbosa
 

Similar to P r o t e c t i n g y o u r b u s i n e s s (20)

idc-business-value-whitepaper
idc-business-value-whitepaperidc-business-value-whitepaper
idc-business-value-whitepaper
 
veeamup_04
veeamup_04veeamup_04
veeamup_04
 
The cost of downtime
The cost of downtimeThe cost of downtime
The cost of downtime
 
ANZ SMS Synopsis
ANZ SMS SynopsisANZ SMS Synopsis
ANZ SMS Synopsis
 
Hu Yoshida's Point of View: Competing In An Always On World
Hu Yoshida's Point of View: Competing In An Always On WorldHu Yoshida's Point of View: Competing In An Always On World
Hu Yoshida's Point of View: Competing In An Always On World
 
Software environmentalism - Tudor Girba - Codemotion Amsterdam 2016
Software environmentalism - Tudor Girba - Codemotion Amsterdam 2016Software environmentalism - Tudor Girba - Codemotion Amsterdam 2016
Software environmentalism - Tudor Girba - Codemotion Amsterdam 2016
 
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperWill You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
 
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
 
Large-Scale Remote Access & Mobility
Large-Scale Remote Access & MobilityLarge-Scale Remote Access & Mobility
Large-Scale Remote Access & Mobility
 
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
 
MTW03011USEN.PDF
MTW03011USEN.PDFMTW03011USEN.PDF
MTW03011USEN.PDF
 
Infor cloud suite industrial machinery, handbook, english 0216
Infor cloud suite industrial machinery, handbook, english 0216Infor cloud suite industrial machinery, handbook, english 0216
Infor cloud suite industrial machinery, handbook, english 0216
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recovery
 
journey to always-on
journey to always-onjourney to always-on
journey to always-on
 
Addressing Storage Challenges to Support Business Analytics and Big Data Work...
Addressing Storage Challenges to Support Business Analytics and Big Data Work...Addressing Storage Challenges to Support Business Analytics and Big Data Work...
Addressing Storage Challenges to Support Business Analytics and Big Data Work...
 
IT and Business solutions through Cloud and Big Data transformation for stron...
IT and Business solutions through Cloud and Big Data transformation for stron...IT and Business solutions through Cloud and Big Data transformation for stron...
IT and Business solutions through Cloud and Big Data transformation for stron...
 
TierPoint_ColocationWhitepaper-Six_Reasons
TierPoint_ColocationWhitepaper-Six_ReasonsTierPoint_ColocationWhitepaper-Six_Reasons
TierPoint_ColocationWhitepaper-Six_Reasons
 
NEC Backup as a Service reduces administrative tasks, helping it departments...
 NEC Backup as a Service reduces administrative tasks, helping it departments... NEC Backup as a Service reduces administrative tasks, helping it departments...
NEC Backup as a Service reduces administrative tasks, helping it departments...
 
Cisco Connect 2018 Malaysia - It transformation-an imperative for driving bus...
Cisco Connect 2018 Malaysia - It transformation-an imperative for driving bus...Cisco Connect 2018 Malaysia - It transformation-an imperative for driving bus...
Cisco Connect 2018 Malaysia - It transformation-an imperative for driving bus...
 
8 Strategies for IT Transformation
8 Strategies for IT Transformation8 Strategies for IT Transformation
8 Strategies for IT Transformation
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 

P r o t e c t i n g y o u r b u s i n e s s

  • 1. W H I T E P AP E R P r o t e c t i n g Y o u r B u s i n e s s : Ad d r e s s i n g B u s i n e s s R i s k w i t h E f f e c t i v e T e c h n o l o g y Sponsored by: HP Raymond Boggs Randy Perry Jed Scaramella March 2014 E X E C U T I V E S U M M AR Y Over the past five years, companies of all sizes have been under increased pressure to improve IT efficiency and effectiveness. This is especially true for small and midsize businesses (SMBs) that have fewer than 1,000 employees but must match larger company competitors in managing their on-premise resources (most notably x86 servers) as efficiently as possible in order to support the constantly evolving business processes necessary for success. While advanced cloud and mobile resources are an increasingly important part of IT environments, core infrastructure technology continues to be the foundation for SMB IT performance. Automation of maintenance procedures — ranging from proactive monitoring of hardware components to single-pane-of-glass control consoles — is an effective way to combat these IT staff costs. While automation does not eliminate all maintenance costs, it is a leverage point to drive down operational expenditures (opex) on an ongoing basis. Efforts to reduce manual processes traditionally used by IT staff will directly result in operational cost reductions; therefore, technologies aimed at automating repetitive tasks are well-suited to address these customer pain points. The effects of attacking these costs could be dramatic: Significantly reducing costs would both transform the way today's datacenters work and reduce opex for a wide array of customer sites. Key to the automation process is the collection of server data and of parameters indicating the health of the server system. The system proactively monitors the servers via sensors, and this information informs the management console about whether components need to be replaced or turned off prior to replacement. As discussed in this paper, IDC customer-based studies show that using appropriate technology in consistent ways helps SMB organizations mitigate business risk and improve overall business protection by avoiding unplanned downtime. According to the studies, targeted technology upgrades, combined with a program to standardize infrastructure and to improve IT business practices, can deliver substantial risk reduction. This approach is powerful: It can reduce annual outage risk by as much as 87%; in some cases, downtime was reduced from an average of over 1.4 hours per month to less than 12 minutes per month. (The amount of downtime reduction that measures to protect IT infrastructure can deliver represents significant business savings, given that SMBs studied by IDC experienced an average loss of $75,000 per downtime hour.) GlobalHeadquarters:5SpeenStreetFramingham,MA01701USAP.508.872.8200F.508.935.4015www.idc.com
  • 2. 2 #247225 ©2014 IDC Midsize businesses recognize the escalating importance of protecting their IT infrastructure to reduce business risk and to improve business continuity. These business drivers are the reasons why HP has worked to optimize its technology offerings (servers, storage, and networking equipment) to address midsize customers' business protection requirements. HP ProLiant Gen8 servers support automated management and proactive monitoring — and HP is offering financial terms for purchase or lease to SMBs deploying them. For these reasons, HP ProLiant Gen8 servers can play an important role in supporting business continuity and can serve as a key element of business protection programs that are designed to reduce operational costs in today's midsize and large businesses. B u s i n e s s R i s k : W h a t ' s t h e D a m a g e ? IDC customer-based studies show that each year, the average midsize company experiences 15–18 business hours of network, system, or application downtime. Causes of downtime vary, but aging systems can have components or software that fail, while network connections and power grids can fail at any time because of external causes (e.g., weather, construction work, or natural disaster). Outages occurring during business hours result in revenue loss, as orders are dropped, customers move on, and employees cannot access critical applications. IDC research found that revenue losses per hour averaged $75,000. However, the adoption of best practices has allowed midsize companies to reduce downtime significantly in recent years. Solutions that improve system management, protect data assets from loss and unauthorized access, strengthen network security, and ensure availability directly reduce these losses at customer sites. As depicted in Figure 1, IDC ROI research finds that solutions and best practices directed at avoiding such outages — both approaches supported by HP's Business Protection solutions — can reduce outages by as much as 87%, cutting downtime per month from over 1.4 hours to less than 12 minutes on average. This means less lost revenue — the actual loss avoided varies from industry to industry, but the revenue losses avoided are significant given that IDC has found an average downtime cost of $75,000 per hour for United States–based SMBs. A brief summary of these findings, which show downtime hours per month, and their relationship to revenue loss follows:  The consistent use of management software tools across the infrastructure reduces network and system downtime by 65%.  The use of virtualization software reduces server downtime by 10%.  Adopting industry best practices standards (e.g., ITIL, CobiT) across the organization reduces all downtime by 13%.
  • 3. ©2014 IDC #247225 3 F I G U R E 1 T h e I m p a c t o f D o w n t i m e o n B u s i n e s s a n d t h e V a l u e o f R e d u c i n g I t Note: Revenue loss measures represent an average across many industries, each with differing downtime cost impacts. Source: IDC's Business Value Research, 2011–2014 L o o k i n g a t R i s k — E x t e r n a l V e r s u s I n t e r n a l Small businesses (firms with fewer than 100 employees) and midsize firms (those with 100–1,000 employees) face a host of risks, both internal and external. That is, the source of risk can come from outside the company or — perhaps more concerning because it could be prevented — from inside the company. The external causes of risk are especially challenging — the changing economic environment, new competitors, customers that suffer financial reversals, changing government requirements, and increasing raw material and transportation costs. The one small comfort that a manager can take in these challenges is that they will affect all competitors. No one is immune, although firms can respond to them with different degrees of success. Easier to anticipate, but no less difficult to address, are the internal risks a company faces. These risks will not adversely affect any company but your own, which makes Downtime Hours Vs. Business Hours Per Year Downtime Hours 18 Business Hours 3,030 500 1,000 1,500 2,000 2,500 3,000 - 0.20 0.40 0.60 0.80 1.00 1.20 1.40 1.60 Before After Downtime Hours (Per Month) Downtime Reduction due to: Best Practices Virtualization Management Software Tools Data, Network Security Data Replication, Backup High-Availability Servers $- $20,000 $40,000 $60,000 $80,000 $100,000 Revenue Loss Due to Downtime (Per Month)
  • 4. 4 #247225 ©2014 IDC them all the more important to address. While it may not be possible to prepare adequately for a global economic crisis, it is possible to manage, if not eliminate, the risks associated with internal IT infrastructure problems. These risks fall into three basic categories:  System downtime. When local systems go offline, their data and applications are not available to end users within the organization or to end customers outside the organization who are trying to access data or to buy products/services via a Web interface to the systems/storage/networking components of the IT infrastructure within the company.  Network outages. Loss of network access can halt business operations and in some cases suspend revenue-generating operations. When visible to customers, a suspension of network operations can complicate the delivery of customer service and can even raise questions about a firm's reliability, increasing the opportunity for competitors to take away business.  Security breaches. Even more potentially serious, a security breach can compromise sensitive customer and employee information or intellectual property stored in disk drives or on tape media. Even if data is not corrupted and even if programs are not ruined, the damage to a company's reputation can be catastrophic. Sometimes, news about security breaches surfaces publicly, and the publicity can affect customer loyalty and repeat business by altering customers' perception of the data integrity and data reliability within the organization that experiences the security breach. While large firms can rely on redundancy and high-availability computing solutions, as implemented by their own IT organizations, many SMB customers must rely on more basic technology approaches that they implement themselves or ask service providers to implement on their behalf. IDC research indicates that SMBs, many of which access central-site infrastructure or third party–operated datacenters, are interested in upgrading their network infrastructure and improving the security of their IT resources (see Table 1). T A B L E 1 S h a r e o f F i r m s C i t i n g I n f r a s t r u c t u r e a s T o p T e c h n o l o g y S p e n d i n g P r i o r i t y ( % ) Priority Small Business Midsize Business Increase storage capacity/improve storage management 26.5 30.5 Improve network security/security management 15.9 41.7 Implement/upgrade wireless connectivity 13.7 21.6 Note: Small businesses are firms with fewer than 100 employees, and midsize firms have from 100 to 1,000 employees. Source: IDC's SMB Survey, 2013
  • 5. ©2014 IDC #247225 5 C u s t o m e r P a i n P o i n t s Potential sources for disruption to business processes abound in the modern workplace: Aging systems, inconsistent implementations, and unevenly applied data and security policies all can result in business risk and can threaten business continuity. The top customer pain points include the following:  Systems and applications reliability. Older, less reliable systems cause downtime more frequently than newer systems outfitted with monitoring software that provides alerts to system administrators when a key component fails or goes offline, speeding timely repair. The process of upgrading software or applying security patches can cause system downtime, if not done according to "best practices" that take systems offline for such repair. Virtualization and migration of virtual machines (VMs) to alternate servers during repairs can reduce planned downtime. Physical repairs also need to be made, such as updating aging infrastructure that has too many cables, and too many devices. Inconsistent backup/recovery procedures mean that some systems are better protected than others; inconsistencies in security and management must be addressed across the entire IT infrastructure.  Networking and systems management. Many SMB organizations lack a single, coherent "view" of systems and networking from a centralized console. This results in an incomplete picture of systems, storage, and networking infrastructure — allowing small problems to develop into big ones before being addressed. In addition, just as SMB organizations have experienced systems sprawl, as many systems were added to the infrastructure in recent years, there has been an accompanying low-end switch "sprawl," which has grown over the years. Importantly, bandwidth constraints hamper data connections to service partners or to channel partners, who are supporting SMB IT operations, or to central headquarters for a large company that has branch operations across multiple geographic locations. Local sites need high-bandwidth connections to stay current with other systems across the network — and to provide local systems with software updates in a timely and efficient way.  Security issues across the infrastructure. For many SMB organizations, the lack of support for single sign-on and authorization across the company prevents accurate approvals for end-user access and could result in inappropriate access to systems by outsiders or hackers. Inconsistent security practices, along with inadequate or aging Internet access methods, leave room for security business risks to develop over time. Data backups that are not regularly scheduled or encrypted can result in security issues related to tampering with data or impacting the integrity of a business' data housed on storage devices or on the organization's PCs. The need to improve employee productivity with wireless networks further increases the risk exposure.  PCs and printers at different software release "levels." The challenge of maintaining aging equipment or updating software for that equipment is widespread in SMB organizations. Inconsistent life-cycle management causes many operational issues. Security lapses associated with data and access to company documents also cause operations issues and unscheduled downtime for end users, affecting their productivity. All of these issues increase IT staff costs, raising opex throughout the year.
  • 6. 6 #247225 ©2014 IDC IDC customer-based studies reveal that IT infrastructure is seen as a top priority in terms of planned spending by companies and their IT organizations. However, in the current economy, many IT organizations are finding that they have to put many of their updating/upgrading/replacement plans on hold, which is impacting planned updates to aging datacenter infrastructure. The importance of keeping IT infrastructure current can be seen in Table 1. Business Protection Focus: Disaster Readiness and Operational Efficiency Many of the companies interviewed focused more intently on readying backup data and preconfiguring applications for rapid redeployment in the event of a disaster. Some replicated data within their own offices or branches, while others turned to outside services to provide the backup capabilities. By expanding the percentage of their critical applications that are continuously backed up with data stored offsite, midsize organizations can more quickly redeploy applications and recover them. The more effectively they do this, the more they can reduce the "disaster to full restore" time horizon and therefore improve their protection of the business. Research indicates that advanced storage, server virtualization (enabling workload consolidation and workload isolation), and systems management capabilities bring this promise of quick recovery closer to the midsize organization. For example, newer approaches leverage the ability to migrate virtualized server images (virtual machines or VMs) to alternate servers or storage devices for later start-up. If IT has replicated production data, then it can resume work using the copied VM with replicated data. As another example of advanced technologies enabling disaster recovery, surveyed sites found that backup processes that utilized advanced primary-to-remote, disk-to-disk backup reduced backup and recovery times by up to 90%, as indicated in Figure 2.
  • 7. ©2014 IDC #247225 7 F I G U R E 2 M a n a g e m e n t a n d T e c h n o l o g y U p g r a d e s R e d u c e M i d s i z e O r g a n i z a t i o n s ' D i s a s t e r R e c o v e r y C o s t s Source: IDC's Business Value Research, 2011–2014 Using these and other newer technologies, IT administrators can minimize the backup cost per application and establish a secondary backup site with far fewer requirements than they could before. Though many of these organizations have not found the resources to fully duplicate a primary site within a remote recovery site, they have begun to establish a foundation for doing so later on. S o l u t i o n s T h a t I m p r o v e B u s i n e s s P r o t e c t i o n The adoption of technology solutions can address many of the "specifics" around mitigating business risks, including server refreshes, operating system upgrades, centralized security policies and systems, consistent management practices, storage backup and recovery practices, encryption/de-encryption of data files, and networking security for wired and wireless LANs. Customer "pain points" related to downtime, security issues, or networking issues — or the operational impact of PCs and printers that do not work properly and require repair — are sources of both customer frustration and added cost. Best practices, which are built on solutions already tested to work at customer sites and implemented through management policies, reduce the variations in implementation that often cause business risk to manifest itself in systems that go offline. - 10 20 30 40 50 60 70 Hours (per user per year) Recovery 4.0 0.5 Backup 60.0 6.0 Before After 90% reduction in task time: disk-to-disk remote backup and restore versus traditional tape backup and physical transport methods
  • 8. 8 #247225 ©2014 IDC B U S I N E S S V AL U E R E S U L T S " B e f o r e " a n d " A f t e r " P r o t e c t i o n I m p a c t s To quantify the business protection value of technology-enabled best practices for IT operations processes, IDC used in-depth interviews from multiple surveys of IT practitioners in SMB organizations; these interviews were conducted over the past four years. The makeup of firms that compose the sample set varies in terms of numbers of users, PCs, and servers deployed at the firms' IT sites. The cost of downtime for midsize companies varies sharply both by industry and by geography. Our research sample covers United States–based companies, so the geographic variations across the regions of the world do not apply to these results. However, the samples showed results that are consistent with the multi-geography studies conducted by IDC from 2011 to 2014. Figure 3 shows the varying cost of an hour of downtime across a selection of industries. F I G U R E 3 A v e r a g e A n n u a l R e v e n u e a n d P r o d u c t i v i t y L o s s p e r D o w n t i m e H o u r , D o w n t i m e H o u r s b y I n d u s t r y Note: The size of the circle representing the industry denotes the average annual downtime hours for that industry. Source: IDC's Business Value Research, 2011–2014 Productivity Loss / Hour Revenue Loss / Hour Downtime Hours Financial $3,642 $9,997,500 3.6 Retail $2,579 $397,500 7.8 Healthcare $1,246 $157,500 21.7 Manufacturing $3,062 $59,925 8.0 Public Sector $850 $ - 9.4 3.6 7.8 21.7 8.0 9.4 1 10 100 1,000 10,000 100,000 1,000,000 10,000,000 100,000,000 0 1,000 2,000 3,000 4,000 Revenue Loss Per Downtime Hour ($) Log Scale Productivity Loss Per Downtime Hour Per 100 Users ($) Financial Services Retail Manufacturing Healthcare Public Sector
  • 9. ©2014 IDC #247225 9 Figure 3 also shows how average downtime hours per year vary by industry. One should notice that cost per hour of downtime inversely relates to the average number of downtime hours per year. IDC notes that this relationship between cost and reported downtime intervals is not coincidental because companies with high-value operations tend to adopt technology initiatives and best practices to reduce risk. Reducing the Business Risk of Downtime So which technology initiatives and best practices have the greatest impact on reducing downtime? IDC research about midsize companies has identified the practices and technologies that either have greatly reduced downtime or occur in companies with lower downtime compared with others of similar size, industry, etc. For this white paper, we have selected the technology initiatives and best practices noted in the following list and in Table 2. Each initiative displays the maximum downtime impact holding all other factors constant. These values do not sum to 100 as we measured each initiative's effects on customers' downtime independently.  Management software tools (65%) to provision, configure, monitor, and manage all technology assets include HP products such as HP Insight Control system management software, HP Integrated Lights-Out (iLO) embedded management software, HP Data Protector Express, HP StoreOnce deduplication software and HP Backup Systems for automating data protection, HP PCM network management for wired and wireless networks, IT service management, information management, application, system and network management, and SOA solutions.  Server virtualization (10%) reduces downtime arising from system failures and operating system incompatibilities and enhances the ability to shift workloads, further reducing outages by means of planned downtime and migration of virtual machines.  Enabling failover clustering (43%) for enhancing the availability of internally faced applications.  Industry best practices processes (e.g., ITIL, CobiT) (13%) make up a set of processes implemented uniformly across the entire organization to centrally manage all aspects of IT.  Thin clients/blades (25% PC downtime) reduce hardware failures caused by user errors, software incompatibilities, or physical damage and theft.  Comprehensive PC security (28% PC downtime) is a set of technologies that reduce PC vulnerability to external security threats. All notebooks and desktops are equipped with encryption, access control, antivirus utilities, antispyware/malware utilities, centrally managed PC firewalls, and an automated patch distribution system that supports software updates and patching while reducing demands on IT staff time.  Standardizing on one desktop operating system, version, and release level (30%).  Upgrading servers, storage, and networking hardware (50%) sustains more advanced, faster versions of these hardware devices and reduces risks of downtime caused by aged or out-of-synch platforms.  Deploying antivirus and antispam solutions throughout the organization (15%).
  • 10. 10 #247225 ©2014 IDC T A B L E 2 D o w n t i m e R e d u c t i o n s E n a b l e d b y S p e c i f i c I n i t i a t i v e s ( % ) Initiative Downtime Reduction Management tools 65 Upgrade servers, storage, networking 50 Failover clustering for internally faced applications 43 Standardization on single desktop operating system 30 Comprehensive PC security 28 Thin clients/blades 25 Deploying multiple antivirus, antispam solutions 15 Industry best practices implementation (ITIL, CobiT, etc.) 13 Server virtualization 10 Notes: Percentages do not add to 100. Effects were measured independent of each other. Source: IDC's Business Value Research, 2011–2014 H P ' s B u s i n e s s P r o t e c t i o n P r o g r a m HP's Business Protection program is aimed at delivering business benefits over the life of the technology. This is a full-spectrum approach to making business protection solutions easier to acquire, deploy, and maintain over the entire infrastructure life cycle. The ability to replace aging equipment with new equipment — and to do so at reduced acquisition costs — supports customers' programs to improve business protection for their organizations. Because technology acquisition is challenging for small and medium-sized businesses in the face of difficult economic conditions, HP is providing new financial offers, including low-interest financing from HP Financial Services, and offering new support/services packages in conjunction with its business partners that provide technical support for new solution deployments:  "Recipes" for success. HP has highly customizable infrastructure solutions that combine server, storage, management, data protection, data security, networking, PCs, and printers. These reference solutions are being provided to customers and HP channel partners to speed deployment of consolidated business protection solutions. Because the components of these solutions have been tested against many operational conditions, they will be easier to support and maintain in the branch office site.  Rightsizing of solutions. HP has designed solutions for businesses of different sizes: those with up to 300 users; 500 users; or 1,000 users. Sizing for the workload is important because it provides the appropriate amount of data processing power, storage, and bandwidth capacity, and it does so for a given number of users to optimize system response time and to boost IT staff and end-user productivity.
  • 11. ©2014 IDC #247225 11  Ease of use in management tools for system administrators. IT staff costs must be contained — and the ratio of system administrators to servers and the ratio of administrators to other types of managed devices (e.g., storage, networked PC printers, and networking devices) must be improved wherever possible. Recognizing that system management must be simplified and easy to learn, HP is providing integrated software tools that enable the companies' IT staff and/or their third-party IT service providers to effectively manage the environment from either onsite or offsite (remote) locations.  Improved financial terms. The economic downturn has made it more difficult than before to acquire or lease new technology. HP is providing new financial offers, including low-rate financing and deferred payments from HP Financial services. HP is also offering new support services packages in conjunction with its business partners; these packages provide technical support for new solution deployments. This approach is intended to make it easier to acquire new technology or to refresh technology, such as upgrading to the latest generation of HP ProLiant Gen8 servers. R e d u c i n g t h e M a i n t e n a n c e C y c l e Operational costs for IT staff time, power/cooling, and responses to unplanned downtime all combine to drain IT budgets. However, to the degree that any, or all, of these cost factors could be reduced, then the operational costs — and the ROI to acquire the computers — would be reduced. As servers age in place, the number of service incidents tends to increase over time. That means that intensive oversight of all of the components — and the ability to address any failing components prior to disruption of business services — is critical to maintaining business continuity. HP has long provided such oversight through its iLO technology and other system management software capabilities, but it has greatly expanded them in terms of granularity and coverage and automation in HP ProLiant Gen8. HP ProLiant Gen8 includes updated and upgraded iLO technology, with rich instrumentation and DVR functionality (including virtual media patch and provisioning capabilities). HP iLO 4 Advanced allows system administrators to remotely control servers via the Internet. The iLO 4 Advanced capability provides a view of the server environment, with full graphics displaying the state of the remote system, along with an automatic video recording capability and support for team collaboration. Using these capabilities, administrators can control systems from a central location. They can restart servers, control power settings, update software, and interact with the remote system — without traveling to the server room. N e w H P T e c h n o l o g y i n H P P r o L i a n t G e n 8 With HP ProLiant Gen8, HP is strengthening the automated management capabilities for its HP ProLiant servers. Importantly, it is doing so to address the variation in IT skill sets from one customer site to another. As a result, it will not be critical to ongoing IT operations to have equal amounts of management skills at each site where ProLiant servers are deployed — reducing the time and costs associated with installing and maintaining these systems.
  • 12. 12 #247225 ©2014 IDC Importantly, the capabilities will be built into, or embedded in, the ProLiant x86 server components, supporting problem detection; the gathering of vital operational information; identification of any signs that hardware components may fail; and forwarding of that operational information to a unified console for system administrators. Highlights of the HP ProLiant Gen8 technologies include the following:  HP ProActive Insight architecture is a self-aware architecture that impacts the server life cycle by supporting preventive maintenance to keep servers up and running by reducing unplanned downtime. Proactive maintenance based on HP ProActive Insight reduces the possibility that hardware components will fail online. The key goals of HP ProActive Insight are to provide operational efficiency, application acceleration and availability, and datacenter optimization.  HP iLO 4 Advanced. The HP iLO management processor is the core foundation for the HP iLO Management. HP iLO for HP ProLiant Gen8 servers simplifies server setup, monitors system health, provides power and thermal control, and enables remote management.  HP Agentless Management. The HP iLO Management Engine provides hardware monitoring and alerting capability, which is built into the system (embedded in the HP iLO chipset). Thus capability is activated on startup and booting of the ProLiant Gen8 server systems.  HP Active Health System. HP Active Health System is an essential component of the HP iLO 4 Advanced Management Engine. It provides customers with diagnostic tools and scanners wrapped into one, providing 24 x 7 x 365 continuous monitoring; detailed configuration history; health and service alerts; and an easy way to export and upload system information to service and support.  HP Intelligent Provisioning (previously known as HP SmartStart). HP Intelligent Provisioning offers the ability for out-of-the box single-server deployment and configuration without the need for media.  Smart Socket. This feature avoids the bending of "pins" in microprocessors as they are added to system boards, avoiding damage that must be repaired by IT staff. This is another type of proactive avoidance of IT staff time and costs.  HP Insight Online. This is a repository of service bulletins, which updates the status of the technology bulletins for service and support. It provides "phone home" support. The ability to easily access the latest service bulletins — and to find them all in one place — addresses another pain point seen by IT staff at many customer sites.  HP Services. HP's ProLiant Gen8 technologies are supported by a robust portfolio of HP support offerings. New service offers such as Collaborative Support, Proactive Care, and Insight Online take full advantage of the HP ProLiant Gen8 technology. These services are delivered to customers via the global presence of HP direct and HP ServiceOne authorized partners.
  • 13. ©2014 IDC #247225 13 O f f - t h e - S h e l f S o l u t i o n s B a s e d o n C o n v e r g e d I n f r a s t r u c t u r e HP Converged Systems are preintegrated, tested, and supported solutions that are optimized for cloud, virtualization, and next-generation applications. HP intends for these systems to reduce the resources and the time (by months or even years) required for planning, procurement, and deployment so that customers can accelerate their time to application value. HP offers customers off-the-shelf solutions for business continuity and improving business protection — such as security solutions, networking solutions, and server/storage solutions. These are converged infrastructure solutions — meaning that all of the components fit together without special scripting or tuning — saving on IT operational costs. The Business Protection program protects both data and applications, provides automated backups, and supports disaster recovery for business continuity. Depending on the solution set, these solutions are based on a variety of components, including the following: HP ProLiant Gen8 servers, HP storage products, HP network switches and wireless network infrastructure, HP Insight Control system management software, and HP Technology Support Services and HP Protect Tools, which are used for business PCs and HP secure printing. I T B e n e f i t s System administrators in small and midsize sites spend a lot of their working hours checking on mechanical devices, such as electrical cables, power cords, system board connections, fans, and the like. This work is time intensive and labor intensive. Building in connections and components directly on the system boards reduces the total number of connections that must be checked, time and again, by system administrators. By detecting hardware component issues in a more automated way, the HP ProLiant Gen8 technologies reduce the time associated with identifying and diagnosing server hardware issues and speed the time to resolution of those problems. All of this reduces IT staff time associated with deployment of physical servers and ongoing maintenance. Unplanned downtime has a big impact on operational costs and must be avoided, wherever possible. Preventive maintenance of hardware components — replacing them prior to an actual failure — reduces unplanned downtime appreciably. "Phone home" capabilities provide an early warning system, allowing administrators to proactively replace system components and avoid actual downtime. Upgrades and updates for any given server — multiplied by tens or hundreds of servers — cause major costs within the enterprise datacenter. Automation of care/maintenance avoids needless duplication of effort, reduces the number of physical tasks, and helps avoid downtime.
  • 14. 14 #247225 ©2014 IDC B u s i n e s s B e n e f i t s Today's businesses rely on hundreds of servers operating efficiently — and doing so on a 24 x 7 x 365 basis. Any prolonged disruptions in these operations, which businesses sometimes call "computer glitches," are simply unacceptable because they affect the availability of applications and databases being accessed by employees and by end customers. Therefore, any interruptions are to be avoided. In the event that processing is interrupted by an outage, it must be able to resume on other systems as quickly as possible. The ability to manage all servers from a single point of view, or console, has the advantage of reducing time associated with identifying a problem in the first place. HP has given all of these factors consideration in its HP ProLiant Gen8 designs, making it easier to identify and to address hardware problems and to restart workloads on alternate servers, if needed. The use of cloud technology to gather information and to make it universally available across all the "sites" at a customer installation is inventive and should allow rapid response to any hardware operational issues. C H AL L E N G E S / O P P O R T U N I T I E S Business risks take many forms — including risks to IT infrastructure encompassing servers, storage and networking equipment, and endpoint devices such as PCs and printers. Security threats impact customers' data and cause networking downtime. This in turn delays or prevents the communication of voice and data inside and outside the company. It impacts customers and business partners. Current economic conditions are highlighting the need to avoid business risks because any interruption to business processes will result in lost revenue and increased costs. Those costs can take several forms, including the actual cost of repairs, the IT staff costs to resume processing, and the potential damage to revenue and to company reputation that can result from a prolonged outage. HP is well-positioned to address these business risks because of its deep and broad inventory of hardware, software, and services that enable companies to keep watch over the "state" of their systems, storage, and networking equipment, along with their portfolio of PCs and printers. These technologies, when combined with management and monitoring software and security protection, allow business customers to respond to threats of disruption effectively and affordably. C O N C L U S I O N Customers need to have a well-thought-out approach to business protection and business risk mitigation. Downtime and security threats cannot be prevented, but they can be isolated by taking a comprehensive approach to identifying business risks and to addressing each of the major causes of business risk.
  • 15. ©2014 IDC #247225 15 Applying automation to repetitive tasks — and proactively monitoring the systems — results in an intelligent infrastructure that takes round-the-clock steps to improve uptime without requiring the involvement of IT staff. A self-aware infrastructure can have a dramatic impact on IT costs, which in turn affects the business organization and its annual budget. HP ProLiant Gen8 servers, using HP ProActive Insight architecture, have been designed to address customer pain points associated with everyday maintenance and, in the event of an outage, the costs of recovering from unplanned downtime. As IDC customer-based data demonstrates, combining updated technology and IT best practices can reduce costs associated with downtime by 30% to 60% and reduce the amount of lost productivity by up to 80%. By adopting best practices and updating IT infrastructure, companies can lower annual downtime significantly, greatly reducing interruptions to daily data processing and access, supporting business continuity, and containing operational costs. C o p y r i g h t N o t i c e External Publication of IDC Information and Data — Any IDC information that is to be used in advertising, press releases, or promotional materials requires prior written approval from the appropriate IDC Vice President or Country Manager. A draft of the proposed document should accompany any such request. IDC reserves the right to deny approval of external usage for any reason. Copyright 2014 IDC. Reproduction without written permission is completely forbidden.