Transcript Slide 1
Why Unisys and MISER? Anup Barde Technology, Consulting and Integration Solutions Disruptive Trends in 2013 Cloud Computing Cloud computing is an ondemand, pay-per-use, flexible and scalable model for service delivery over the Internet The Consumerization of IT and mobile computing are driving the need for a new generation of IT support models CyberSecurity CyberSecurity involves the security of IT systems within the enterprise and the broader digital networks they rely upon Social computing is creating a web of people who interact with applications, data and each other real time IT Appliances Appliances are a packaged combination of hardware and software, offering a faster and easier deployment model Big Data relates to the use of huge volumes of data to derive real-time insights for competitive advantage Consumerization of IT/Mobility Social Computing Big Data/Smart Computing Drive New Business Opportunities and Control IT Costs Key disruptive trends are creating new opportunities for IT to deliver business value and a step-change in productivity via new styles of interaction, automation and service delivery © 2012 Unisys Corporation. All rights reserved. 2 Unisys Strategic Focus Areas for 2013 We support a roadmap to Big Data Readiness by providing both analytics and infrastructure Unisys Focus Areas Information Infrastructure Transformation: Helping clients optimize their existing infrastructure such as storage and implement new platforms for processing Big Data Predictive Analytics for IT Service Management: Optimizing our service, device and network management costs and offering as a service to clients Highly Targeted Analytics in Financial Services, Government & Transportation: Building off strengths in mission-critical industry applications and ClearPath to help clients identify patterns and gain insights and competitive advantage KeyPortfolio PortfolioOfferings Approaches Storage Analysis (SRA), storage optimization technologies (QuickTier), and data hygiene services optimize and control a client’s growing storage costs Predictive Analytics help to optimize our end user service management environment, enabling us to lower costs and offer predictive support to clients via our Service Excellence Office Native Big Data Hadoop Technology on ClearPath Forward provides a high performing and secure analytics engine that combines real-time analysis with transactional execution capabilities. We enhance traditional transactional industry applications by integrating real-time Big Data Analytics into process flows for greater business insight. Our focus areas help clients in three highly targeted areas in the Big Data arena where we have existing core competencies and a differentiated value proposition © 2012 Unisys Corporation. All rights reserved. 3 Unisys Strategic Focus Areas for 2013 Clients are expecting security to be embedded in our mission critical portfolio offerings Unisys Focus Areas Sensitive Data Protection Securing and protecting sensitive data no matter where it resides – securing data in motion and data at rest via Stealth. Securing the Borderless Enterprise Securing the new wave of mobile devices, roaming users, and Web 2.0 applications operating in hostile networks. Portfolio Offerings Stealth technology provides Sensitive Data Protection of corporate assets and Regional Data isolation to protect from Advanced Persistent threats SPC with Stealth provides the most comprehensive cloud security offering in the marketplace. Our Mobile Security offerings complement this focus area CyberSecurity Operations & Situational Awareness providing real-time visibility, through our MSS offerings across all aspects of security operations to address today’s advanced cyber threats. Managed Security Services are tightly coupled with End User and Data Center Outsourcing Services to address both the desktop and data center needs Biometrics & Trusted Identities in CyberSpace Leveraging advanced biometrics to securely identify people and systems in cyberspace, and ensure that data access is both authorized and tracked. CyberSecurity Operations Center Solutions protect critical infrastructure and our LEIDA Biometrics capability protects trusted identities in Cyberspace We leverage our Cybersecurity-focused IP to ensure that our IT Outsourcing, ClearPath Forward, Cloud Computing, and SI Application Solution portfolios provide mission-critical security capabilities © 2012 Unisys Corporation. All rights reserved. 4 Unisys Cybersecurity Solutions Addressing the Zero-Trust security model with a suite of Cybersecurity solutions covering each critical domain (users, applications, data, infrastructure and assets) with a comprehensive logical framework Security Advisory Services Cybersecurity Operations Center Secure Infrastructure Engineering Adjacent Solutions • Identity and Credentialing • Secure Image Management Systems • Video Surveillance Consolidation Solution Identity and Access Management © 2012 Unisys Corporation. All rights reserved. 5 Transformation with Optimized IT Appliances IT Appliances simplify technology deployments and offer highly specialized functionality New IT Appliance offerings are helping CIOs deploy market innovations more quickly, supporting areas beyond data analytics such as cloud computing, enterprise applications, and security 2013 Market Trends Growth in Private Cloud Appliances Key Considerations Challenge/Opportunity Speeding Cloud Implementations – Using appliances to support internal private cloud deployments to gain cost and flexibility benefits of public cloud…yet in a secure environment How to maximize value from cloud appliances to jumpstart private cloud implementations Highly-scalable cloud appliances allow IT to more quickly deploy and scale private cloud implementations.1 Appliance Extensions for Enterprise Servers and Mainframes Highly Specialized CyberSecurity Appliances Mainframe-based IT Appliances – Extending mission-critical computing systems with industry standard application platforms and features Over 80% of technology buyers are open to new IT appliances based on proprietary hardware and software if they perform 2 Security-Related Appliances – Securing increasingly porous IT security perimeters, protect against data leakage, guarantee data integrity, and support regulatory requirements. Appliances providing thin provisioning, encryption and further security capability.3 How to extend missioncritical mainframe applications with leading edge functionality How to take advantage of security appliances in areas such as data center segmentation and communities of interest © 2012 Unisys Corporation. All rights reserved. 6 ClearPath Mainframes - Key Differentiators Mission critical Business critical High volume transactions Full data integrity Unmatched by Unix, Linux or Windows Exceptional security Best value Many ClearPath customers measure the time between outages in years, both planned and unplanned © 2012 Unisys Corporation. All rights reserved. 7 Traditional ClearPath Mainframe Attributes • Scalability • High Reliability • High capacity • High availability Mainframe attributes built in: Architecture Hardware Software Operations • Resiliency • Highly integrated software • Data Integrity • Security • Manageability Mission Critical Ultra High Volume Transactions • Serviceability © 2012 Unisys Corporation. All rights reserved. 8 ClearPath: Setting the Standard for Security Operating System Architecture Number of Vulnerabilities Date of Last Vulnerability Compromised User Data Unisys ClearPath OS2200 Xeon or Proprietary 0 - No Unisys ClearPath MCP Xeon or Proprietary 1 12/31/2002 No IBM zSeries Proprietary 20 12/26/2012 Yes IBM iSeries Proprietary 21 06/11/2009 Yes OpenVMS Proprietary 35 12/13/2012 Yes HP-UX Proprietary 325 01/21/2013 Yes AIX Proprietary 347 10/20/2012 Yes Unix Xeon 642 04/08/2013 Yes Solaris Xeon 665 09/25/2012 Yes Windows Xeon 3,187 04/16/2013 Yes Linux Xeon 3,965 04/10/2013 Yes “Unisys has made a significant breakthrough with its advanced ClearPath architecture, achieving one of the highest levels of security that any systems provider has delivered on the Intel Xeon Processor platform,” © 2012 Unisys Corporation. All rights reserved. 9 ClearPath Integrated Stacks (MCP and OS 2200) ClearPath Solution Web Server Middleware Database Server Transaction Server Operating System Security Software Platforms Over 110 / 125 products Complete Environments Other SystemsSolution Solution Other Systems Transaction Server Database Server Release 2.3 Vendor A Release 9.1 Vendor B Security Software Operating System Release 2.2 Vendor C Release V7R4 Vendor D Middleware Release 6.1 Vendor E Platforms Web Server Vendor G-Z Release 1.0 Vendor F Compatibility? Reliability? Integrate-it-yourself Designed, developed, tested, and integrated for optimized performance, security, and reliability. Cost? Risk? Time to market? By Unisys Support? © 2012 Unisys Corporation. All rights reserved. 10 Evolution of a system architecture ClearPath Forward! (2013) ClearPath Classic ClearPath NextGen ClearPath Forward! Application Workload Application Workload Any Application Workload Specialty Specialty ClearPath OS Engine Engine (MCP or OS2200) in an in an Applicance Applicance Unisys CMOS Platform Unisys Unisys Intel Intel Platform Platform ClearPath OS (MCP or OS2200) Specialty Engine in a Secure Partition Specialty Engine in a Secure Partition MCP / MCP / OS 2200 OS 2200 Specialty Specialty Windows Engine Engine Linux ClearPath Forward! Services s-Par s-Par Unisys Intel Platform Unisys Intel Platform ClearPath Attributes Extend ClearPath core attributes to other operating environments Our ClearPath Forward! Mission-critical Platform Vision • Opens ClearPath for integration of industry standard databases and applications • Creates a new business solution platform with ClearPath attributes • Cloud like environment, with multiple ClearPath Forward! platforms managed as a single entity. © 2012 Unisys Corporation. All rights reserved. 11 IT Appliances for Mission-Critical Functionality What are we doing and how is it different? IT Appliances simplify technology deployment and are taking on increasingly specialized functions in Predictive Analytics, IT infrastructure, Cloud Computing and CyberSecurity Benefits of ClearPath Forward! ClearPath Forward! Example: ClearPath Forward! does everything converged infrastructures from others promise, and more .. MCP-Based Financial Appliance Converged infrastructure without the need for proprietary processors A unique system backbone provides “game changing” possibilities for composite workloads and data sharing Elastic system characteristics that extend beyond the chassis or cabinet Unique security, resiliency and enterprise characteristics not available in traditional environments Platform 1 MCP VM Windows Windows EP EP Unisys Secure Partitioning Intel x86-64 (VT-x) Platform • The CPF architecture uses a modular hardware and software building block approach to produce products • “I want to create an appliance that consolidates the MCP & Windows servers I use to deliver my solution” IT Appliances provide “plug-and-play” functionality which speeds installation and deployment time and reduces maintenance costs due to their bundled hardware/software functionality © 2012 Unisys Corporation. All rights reserved. 12 What Matters to Performance FISERV Premier FIS MISER Single Thread/CPM Performance Single Thread/CPM Performance Disk Performance Disk Performance MCP Host Disk Cache DMSII Memory Usage Concurrence of Nightly Batch Jobs Concurrence of Nightly Batch Jobs FS4290 FS6290 FS1760 FS4150 FS1800 Single Thread/CPM Performance 350 MIPS (2400/8) 550 MIPS (4200/8) 300 MIPS (1200/5) 300 MIPS* (1800/6) 500 MIPS (1000/2) MCP Disk Cache YES YES NO YES YES DMSII Memory YES YES YES YES YES Concurrence of Nightly Batch Jobs 8 CPMS 8 CPMS 5 CPMS 6 CPMS 2 CPMS* © 2012 Unisys Corporation. All rights reserved. 13 Essential Data Center Services Unisys Disaster Recovery Services and Technologies Anup Barde Agenda – Disaster Recovery • IT Challenges that impact Disaster Recovery • Disaster Recovery Vision, Reality and Best Practice • Technical Challenges • Unisys Disaster Recovery Service • VyStar Use Case © 2012 Unisys Corporation. All rights reserved. 15 IT Challenges Budget out of step with and SLAs… • Flat or declining budgets • Increased pressure to drive efficiencies • SLAs/ IT expectations going UP not down • Explosive Storage growth threatens other IT imperatives • Longer retention periods • Consolidation and the cloud initiatives require a new type of non traditional DR strategy © 2012 Unisys Corporation. All rights reserved. 16 Disaster Recovery Confidence Levels 7% are extremely confident, 32% are very confident and 45% are somewhat confident in their companies’ business continuity preparedness BUT – 44% of respondents test their plan less than annually or not at all – 44% report that their companies have never communicated overall business continuity/disaster recovery plans to all employees – 46% indicate that they have an RTO of less than 12 hours Source: IDG Research’s Business Continuity Survey 7/7/2015 7/7/2015 Page Page 17 17 17 © 2012 Unisys Corporation. All rights reserved. Disaster Recovery Reality • Balancing Act – Best practices versus cost – Capabilities versus expectations • Disaster recovery is one of the biggest challenges in IT – It requires performing activities that are rarely done under the worst possible circumstances – Planning and testing limitations – Drag on day-to-day priorities – IT expected to walk on water – Touches local HA requirements, data Protection, data corruption and backup strategies and all of these MUST be integrated • Need for an honest evaluation 7/7/2015 7/7/2015 Page Page 19 19 19 © 2012 Unisys Corporation. All rights reserved. Best Practices 1. Empirical basis for Business Impact Assesment 2. Cost basis for disaster recovery service offerings 3. Realistic RPOs and RTOs 4. Business Unit buy-in to disaster recovery policies 5. Know your inventory (CMDB) 6. Leverage disaster recovery resources 7. Know your interdependencies 8. Understand physical versus logical integrity 9. Realism of the disaster recovery test scenario 10. Plan for post failover 7/7/2015 7/7/2015 Page Page 20 20 20 © 2012 Unisys Corporation. All rights reserved. Technical Considerations • Without DR enabled infrastructure, most other DR efforts will fail • Core services like Networks, DNS, Directory Services, etc… are required for all of the other process that run in the Data Center • VPN and remote access services can be your best ally in the event of disaster and must be core to your plans • Management infrastructure will play a role in conducting root cause analysis, ONLY if it is available • Vendor selection and partnership is key in this area because in most infrastructure solutions, both hardware and software based protection must interoperate • There is no silver bullet for all applications – Work with your COTS vendors and internal development groups to define standards © 2012 Unisys Corporation. All rights reserved. 21 Technical Considerations • Creating remote and local copies of your data is a must for DR but deduplication can assist in reducing cost • The replication of storage data is a complex process that requires knowledge of what is being stored, detailed performance analysis and network impact analysis • Synchronous vs. Asynchronous – It’s all about distance • Data Backup is here to stay; having a robust backup AND restore environment is crucial – Deduplication – Tape – Backup to Disk (VTL & CDP) – Offsite storage of backup data – Data Security • Consolidating data protection management on all tiers. © 2012 Unisys Corporation. All rights reserved. 22 DR Architecture Service The Disaster Recovery Architecture Service helps you achieve the appropriate levels of application and infrastructure recoverability in the face of any disaster. We work with you to design, plan and implement sound, actionable disaster recovery services that ensure applications are recoverable and that their data is restorable within explicit recovery time objectives and recovery point objectives. The Disaster Recovery Architecture Service provides you with a solid foundation and proven methodology to build end-to-end disaster recovery capabilities. 7/7/2015 7/7/2015 Page Page 23 23 23 © 2012 Unisys Corporation. All rights reserved. What Unisys Solves Challenges Cost • In the event a “disaster” is declared, unreliable disaster recovery services can cost businesses millions of dollars • Due to misalignment between IT and business needs there is over-inflated cost within the recovery process • Redundant recovery solutions among the IT functional teams within the end-to-end recovery process results in high costs Risk • Lack of detailed recovery coordination among IT functional teams puts recoverability at high risk • Lack of formalized recovery services management rapidly increases risk of missing recovery targets over time Quality of Service • The business lacks confidence in IT’s ability to recover applications and data • Lack of cost transparency of disaster recovery service options leads to ineffective budgeting and business planning DR Architecture Results Cost • Adoption of mature recovery services management results in reduced cost • The collective DR architectures and processes are financially rationalized against explicit business driven recovery targets Risk • Each IT function understands its specific role within the overall end-to-end recovery process • Proven and formalized recovery services management yields reliable disaster recover capabilities Quality of Service • DR service performance reviews build the business’s confidence through “proof of delivery capability” reports • The actual costs of disaster recovery service options to the business are transparent 7/7/2015 7/7/2015 Page Page 24 24 24 © 2012 Unisys Corporation. All rights reserved. Deliverables • Design Session – Joint development of formalized set of interrelated recovery architectures and processes based on consensus of client team – Design documentation including • Project requirements definition, critical success factors, weighted selection criteria, straw-man designs, illustrations of design, benefits and drawbacks of the considered alternatives, recommendations • Implementation Planning – Joint development of precedence diagram showing true project/task precedence and critical path – Joint development of detailed MPP project schedule – Document overview of plan including timelines, major milestones and resource requirements by skill set 7/7/2015 7/7/2015 Page Page 25 25 25 © 2012 Unisys Corporation. All rights reserved. Timeline and Activities Phase Days Activities Output 1 1-5 Project kick-off and session scheduling Statement of Initiative (SOI) 1 6-7 Design session Consensus on design 1 8-16 Design development and due diligence Architecture documents, including design alternatives and estimated costs 2 17-18 Planning session/review architecture document Define any needed changes to architecture documents and develop plan for implementation 2 19-24 Develop implementation plan Create precedence diagram, MPP and overview document 2 25 Deliver plan Review/deliver plan document 7/7/2015 7/7/2015 Page Page 26 26 26 © 2012 Unisys Corporation. All rights reserved. Additional Benefits of the Disaster Recovery Architecture Service • Quick – Project planning and design in 4-to-6 weeks • Data Driven – Design and implementation strategies based on facilitated input sessions with all project stakeholders • Cost-Effective – Accelerated planning and full implementation saves time and money • Practical – Focus on high value, feasible actions to optimize IT operations 7/7/2015 7/7/2015 Page Page 27 27 27 © 2012 Unisys Corporation. All rights reserved. Disaster Recovery Vision Become Reality Accomplish your goals: – – – – – – Prepared to handle multiple categories of disaster Clearly documented policies and procedures Well-documented and understood roles and responsibilities Thoughtfully crafted RTOs and RPOs Prioritized applications and servers Highly automated replication and recovery tools 7/7/2015 7/7/2015 Page Page 28 28 28 © 2012 Unisys Corporation. All rights reserved. VyStar Accomplishments • MISER Application – New FS4190 for production – Repurpose FS1800 for DR • Data Replication – EMC RecoverPoint software – VNX storage platforms • SMA OpCon – Disaster Recover Process Automation – Event driven © 2012 Unisys Corporation. All rights reserved. 29 OpCon • Fully Automated Disaster Recovery Process – Automated 262 processes with OpCon – Reduced Failover test time and resources from: 5 hours to > 2 hours and 3 FTEs to 1 FTE 75% time savings 66% resource savings – All testing conducted remotely • Automating the Daily Production Schedule: 75 jobs – Have automated 2 sets of 4 jobs: job runs a WFL, then copies the output file to a server, FTPs the file to a vendor, then archives it. – “Pretty simple setup, but flawless results every time!” Alex Castanheira VyStar Credit Union © 2012 Unisys Corporation. All rights reserved. 30 Timeline and Activities for Typical Engagement Presales Week 1 Customer kickoff and gather data about current systems. Week 2 Analysis by Storage Architect Week 3 Consult and review findings to gain concurrence/correction Week 4 Build and present recommended configuration Postsales Week 1 Customer kickoff and confirm data is still valid Week 2 Build implementation plan based on previous analysis Week 3 Present plan to customer to gain concurrence/correction for plan Week 4 Implement onsite based on the plan Week 5 Address questions, prepare and support final implementation 7/7/2015 7/7/2015 Page Page 31 31 31 © 2012 Unisys Corporation. All rights reserved. Unisys DR Customers • Allied Bank Pakistan • Karachi Stock Exchange • US Air Force DR Program • US Internal Revenue Service • Multiple US Civilian Agencies • Multiple US Intel Agencies • Multiple US DoD Agencies • Isle of Man all Government Operations • Swiss Social Security Administration © 2012 Unisys Corporation. All rights reserved. 32 Unisys Financial DR Customers • Western Union • Old Lane • Fisher Investments • Bank Fund • Stifel Nichols • Insight Investments • Canyon Capital • Agstar Financial • College Load Corporation • China International Capital Corporation • Options Express • Wescot Credit Services • Dexia Private Bank • Janus • Stevens Capital Management • Nationwide Building Society • Armed Forces Bank • Ruesch Financial • First Independent Bank © 2012 Unisys Corporation. All rights reserved. 33 Thank You © 2012 Unisys Corporation. All rights reserved. 34