Transcript Slide 1

Why Unisys and MISER?
Anup Barde
Technology, Consulting and Integration Solutions
Disruptive Trends in 2013
Cloud
Computing
Cloud computing is an ondemand, pay-per-use, flexible
and scalable model for service
delivery over the Internet
The Consumerization of IT and
mobile computing are driving
the need for a new generation
of IT support models
CyberSecurity
CyberSecurity involves the
security of IT systems within
the enterprise and the broader
digital networks they rely upon
Social computing is creating
a web of people who interact
with applications, data and
each other real time
IT
Appliances
Appliances are a packaged
combination of hardware and
software, offering a faster and
easier deployment model
Big Data relates to the use of
huge volumes of data to derive
real-time insights for
competitive advantage
Consumerization
of IT/Mobility
Social Computing
Big Data/Smart
Computing
Drive New Business Opportunities
and Control IT Costs
Key disruptive trends are creating new opportunities for IT to deliver
business value and a step-change in productivity via new styles of
interaction, automation and service delivery
© 2012 Unisys Corporation. All rights reserved.
2
Unisys Strategic Focus Areas for 2013
We support a roadmap to Big Data Readiness by providing both analytics and infrastructure
Unisys Focus Areas
Information Infrastructure
Transformation: Helping clients
optimize their existing infrastructure
such as storage and implement new
platforms for processing Big Data
Predictive Analytics for IT Service
Management: Optimizing our
service, device and network
management costs and offering as a
service to clients
Highly Targeted Analytics in
Financial Services, Government &
Transportation: Building off
strengths in mission-critical industry
applications and ClearPath to help
clients identify patterns and gain
insights and competitive advantage
KeyPortfolio
PortfolioOfferings
Approaches
Storage Analysis (SRA), storage
optimization technologies (QuickTier),
and data hygiene services optimize and
control a client’s growing storage costs
Predictive Analytics help to optimize
our end user service management
environment, enabling us to lower costs
and offer predictive support to clients via
our Service Excellence Office
Native Big Data Hadoop Technology
on ClearPath Forward provides a high
performing and secure analytics engine
that combines real-time analysis with
transactional execution capabilities.
We enhance traditional transactional
industry applications by integrating
real-time Big Data Analytics into process
flows for greater business insight.
Our focus areas help clients in three highly targeted areas in the Big Data arena
where we have existing core competencies and a differentiated value proposition
© 2012 Unisys Corporation. All rights reserved.
3
Unisys Strategic Focus Areas for 2013
Clients are expecting security to be embedded in our mission critical portfolio offerings
Unisys Focus Areas
Sensitive Data Protection Securing and
protecting sensitive data no matter where it
resides – securing data in motion and data
at rest via Stealth.
Securing the Borderless Enterprise
Securing the new wave of mobile devices,
roaming users, and Web 2.0 applications
operating in hostile networks.
Portfolio Offerings
Stealth technology provides Sensitive
Data Protection of corporate assets and
Regional Data isolation to protect from
Advanced Persistent threats
SPC with Stealth provides the most
comprehensive cloud security offering in
the marketplace. Our Mobile Security
offerings complement this focus area
CyberSecurity Operations & Situational
Awareness providing real-time visibility,
through our MSS offerings across all aspects
of security operations to address today’s
advanced cyber threats.
Managed Security Services are tightly
coupled with End User and Data Center
Outsourcing Services to address both the
desktop and data center needs
Biometrics & Trusted Identities in
CyberSpace Leveraging advanced
biometrics to securely identify people and
systems in cyberspace, and ensure that data
access is both authorized and tracked.
CyberSecurity Operations Center
Solutions protect critical infrastructure
and our LEIDA Biometrics capability
protects trusted identities in Cyberspace
We leverage our Cybersecurity-focused IP to ensure that our IT Outsourcing, ClearPath Forward,
Cloud Computing, and SI Application Solution portfolios provide mission-critical security capabilities
© 2012 Unisys Corporation. All rights reserved.
4
Unisys Cybersecurity Solutions
Addressing the Zero-Trust security model with a suite of Cybersecurity solutions covering each
critical domain (users, applications, data, infrastructure and assets) with a comprehensive logical framework
Security
Advisory
Services
Cybersecurity
Operations
Center
Secure
Infrastructure
Engineering
Adjacent Solutions
• Identity and Credentialing
• Secure Image Management Systems
• Video Surveillance Consolidation Solution
Identity and
Access
Management
© 2012 Unisys Corporation. All rights reserved.
5
Transformation with Optimized IT Appliances
IT Appliances simplify technology deployments and offer highly specialized functionality
New IT Appliance offerings are helping CIOs deploy market innovations more quickly, supporting
areas beyond data analytics such as cloud computing, enterprise applications, and security
2013 Market Trends
Growth in Private
Cloud Appliances
Key Considerations
Challenge/Opportunity
Speeding Cloud Implementations – Using
appliances to support internal private cloud
deployments to gain cost and flexibility benefits of
public cloud…yet in a secure environment
How to maximize value from
cloud appliances to jumpstart private cloud
implementations
Highly-scalable cloud appliances allow IT to more quickly
deploy and scale private cloud implementations.1
Appliance
Extensions for
Enterprise Servers
and Mainframes
Highly Specialized
CyberSecurity
Appliances
Mainframe-based IT Appliances – Extending
mission-critical computing systems with industry
standard application platforms and features
Over 80% of technology buyers are open to new IT
appliances based on proprietary hardware and software
if they perform 2
Security-Related Appliances – Securing
increasingly porous IT security perimeters, protect
against data leakage, guarantee data integrity,
and support regulatory requirements.
Appliances providing thin provisioning, encryption and
further security capability.3
How to extend missioncritical mainframe
applications with leading
edge functionality
How to take advantage of
security appliances in areas
such as data center
segmentation and
communities of interest
© 2012 Unisys Corporation. All rights reserved.
6
ClearPath Mainframes - Key Differentiators
Mission critical
Business critical
High volume transactions
Full data integrity
Unmatched by
Unix, Linux or
Windows
Exceptional security
Best value
Many ClearPath customers measure the time between outages in years, both
planned and unplanned
© 2012 Unisys Corporation. All rights reserved.
7
Traditional ClearPath Mainframe Attributes
• Scalability
• High Reliability
• High capacity
• High availability
Mainframe
attributes built in:
 Architecture
 Hardware
 Software
 Operations
• Resiliency
• Highly integrated software
• Data Integrity
• Security
• Manageability
 Mission Critical
 Ultra High
Volume
Transactions
• Serviceability
© 2012 Unisys Corporation. All rights reserved.
8
ClearPath: Setting the Standard for Security
Operating System
Architecture
Number of
Vulnerabilities
Date of Last
Vulnerability
Compromised
User Data
Unisys ClearPath OS2200
Xeon or Proprietary
0
-
No
Unisys ClearPath MCP
Xeon or Proprietary
1
12/31/2002
No
IBM zSeries
Proprietary
20
12/26/2012
Yes
IBM iSeries
Proprietary
21
06/11/2009
Yes
OpenVMS
Proprietary
35
12/13/2012
Yes
HP-UX
Proprietary
325
01/21/2013
Yes
AIX
Proprietary
347
10/20/2012
Yes
Unix
Xeon
642
04/08/2013
Yes
Solaris
Xeon
665
09/25/2012
Yes
Windows
Xeon
3,187
04/16/2013
Yes
Linux
Xeon
3,965
04/10/2013
Yes
“Unisys has made a significant breakthrough with its advanced ClearPath architecture,
achieving one of the highest levels of security that any systems provider has delivered
on the Intel Xeon Processor platform,”
© 2012 Unisys Corporation. All rights reserved.
9
ClearPath Integrated Stacks (MCP and OS 2200)
ClearPath Solution
Web Server
Middleware
Database Server
Transaction Server
Operating System
Security Software
Platforms
Over 110 / 125 products
Complete Environments
Other
SystemsSolution
Solution
Other
Systems
Transaction
Server
Database
Server
Release 2.3
Vendor A
Release 9.1
Vendor B
Security
Software
Operating
System
Release 2.2
Vendor C
Release V7R4
Vendor D
Middleware
Release 6.1
Vendor E
Platforms
Web Server
Vendor G-Z
Release 1.0
Vendor F
Compatibility?
Reliability?
Integrate-it-yourself
Designed, developed, tested, and
integrated for optimized
performance, security, and
reliability.
Cost? Risk? Time to market?
By Unisys
Support?
© 2012 Unisys Corporation. All rights reserved.
10
Evolution of a system architecture
ClearPath Forward! (2013)
ClearPath Classic
ClearPath NextGen
ClearPath Forward!
Application Workload
Application Workload
Any Application Workload
Specialty Specialty
ClearPath OS
Engine
Engine
(MCP or OS2200)
in an
in an
Applicance Applicance
Unisys
CMOS
Platform
Unisys
Unisys
Intel
Intel
Platform Platform
ClearPath OS
(MCP or OS2200)
Specialty
Engine
in a
Secure
Partition
Specialty
Engine
in a
Secure
Partition
MCP /
MCP /
OS 2200 OS 2200
Specialty Specialty
Windows
Engine
Engine
Linux
ClearPath Forward! Services
s-Par
s-Par
Unisys Intel Platform
Unisys Intel Platform
ClearPath Attributes
Extend ClearPath core attributes to other operating environments
Our ClearPath Forward! Mission-critical Platform Vision
• Opens ClearPath for integration of industry standard databases and applications
• Creates a new business solution platform with ClearPath attributes
• Cloud like environment, with multiple ClearPath Forward! platforms managed as a single entity.
© 2012 Unisys Corporation. All rights reserved.
11
IT Appliances for Mission-Critical Functionality
What are we doing and how is it different?
IT Appliances simplify technology deployment and are taking on increasingly specialized
functions in Predictive Analytics, IT infrastructure, Cloud Computing and CyberSecurity
Benefits of ClearPath Forward!
ClearPath Forward! Example:
ClearPath Forward! does everything
converged infrastructures from others
promise, and more ..
MCP-Based Financial Appliance
 Converged infrastructure without the
need for proprietary processors
 A unique system backbone provides
“game changing” possibilities for
composite workloads and data sharing
 Elastic system characteristics that
extend beyond the chassis or cabinet
 Unique security, resiliency and
enterprise characteristics not available
in traditional environments
Platform 1
MCP
VM
Windows Windows
EP
EP
Unisys Secure Partitioning
Intel x86-64 (VT-x) Platform
• The CPF architecture uses a modular hardware
and software building block approach to produce
products
• “I want to create an appliance that consolidates
the MCP & Windows servers I use to deliver my
solution”
IT Appliances provide “plug-and-play” functionality which speeds installation and deployment time and
reduces maintenance costs due to their bundled hardware/software functionality
© 2012 Unisys Corporation. All rights reserved.
12
What Matters to Performance
FISERV Premier
FIS MISER
Single Thread/CPM Performance
Single Thread/CPM Performance
Disk Performance
Disk Performance
MCP Host Disk Cache
DMSII Memory Usage
Concurrence of Nightly Batch Jobs
Concurrence of Nightly Batch Jobs
FS4290
FS6290
FS1760
FS4150
FS1800
Single
Thread/CPM
Performance
350
MIPS
(2400/8)
550
MIPS
(4200/8)
300
MIPS
(1200/5)
300
MIPS*
(1800/6)
500 MIPS
(1000/2)
MCP Disk Cache
YES
YES
NO
YES
YES
DMSII Memory
YES
YES
YES
YES
YES
Concurrence of
Nightly Batch
Jobs
8 CPMS
8 CPMS
5 CPMS
6 CPMS
2 CPMS*
© 2012 Unisys Corporation. All rights reserved.
13
Essential Data Center Services
Unisys Disaster Recovery Services and Technologies
Anup Barde
Agenda – Disaster Recovery
• IT Challenges that impact Disaster Recovery
• Disaster Recovery Vision, Reality and Best Practice
• Technical Challenges
• Unisys Disaster Recovery Service
• VyStar Use Case
© 2012 Unisys Corporation. All rights reserved.
15
IT Challenges
Budget out of step with and SLAs…
• Flat or declining budgets
• Increased pressure to drive efficiencies
• SLAs/ IT expectations going UP not down
• Explosive Storage growth threatens other IT imperatives
• Longer retention periods
• Consolidation and the cloud initiatives require a new type of
non traditional DR strategy
© 2012 Unisys Corporation. All rights reserved.
16
Disaster Recovery Confidence Levels
7% are extremely confident, 32% are very confident and 45% are
somewhat confident in their companies’ business continuity
preparedness
BUT
– 44% of respondents test their plan less than annually or not at all
– 44% report that their companies have never communicated overall
business continuity/disaster recovery plans to all employees
– 46% indicate that they have an RTO of less than 12 hours
Source: IDG Research’s Business Continuity Survey
7/7/2015
7/7/2015
Page
Page 17
17
17
© 2012 Unisys Corporation. All rights reserved.
Disaster Recovery Reality
• Balancing Act
– Best practices versus cost
– Capabilities versus expectations
• Disaster recovery is one of the biggest challenges in IT
– It requires performing activities that are rarely done under the worst
possible circumstances
– Planning and testing limitations
– Drag on day-to-day priorities
– IT expected to walk on water
– Touches local HA requirements, data Protection, data
corruption and backup strategies and all of these MUST be
integrated
• Need for an honest evaluation
7/7/2015
7/7/2015
Page
Page 19
19
19
© 2012 Unisys Corporation. All rights reserved.
Best Practices
1. Empirical basis for Business Impact Assesment
2. Cost basis for disaster recovery service offerings
3. Realistic RPOs and RTOs
4. Business Unit buy-in to disaster recovery policies
5. Know your inventory (CMDB)
6. Leverage disaster recovery resources
7. Know your interdependencies
8. Understand physical versus logical integrity
9. Realism of the disaster recovery test scenario
10. Plan for post failover
7/7/2015
7/7/2015
Page
Page 20
20
20
© 2012 Unisys Corporation. All rights reserved.
Technical Considerations
• Without DR enabled infrastructure, most other DR efforts will fail
• Core services like Networks, DNS, Directory Services, etc… are
required for all of the other process that run in the Data Center
• VPN and remote access services can be your best ally in the event of
disaster and must be core to your plans
• Management infrastructure will play a role in conducting root cause
analysis, ONLY if it is available
• Vendor selection and partnership is key in this area because in most
infrastructure solutions, both hardware and software based protection
must interoperate
• There is no silver bullet for all applications
– Work with your COTS vendors and internal development groups to define
standards
© 2012 Unisys Corporation. All rights reserved.
21
Technical Considerations
• Creating remote and local copies of your data is a must for DR but
deduplication can assist in reducing cost
• The replication of storage data is a complex process that requires knowledge of
what is being stored, detailed performance analysis and network impact
analysis
• Synchronous vs. Asynchronous
– It’s all about distance
• Data Backup is here to stay; having a robust backup AND restore environment
is crucial
– Deduplication
– Tape
– Backup to Disk (VTL & CDP)
– Offsite storage of backup data
– Data Security
• Consolidating data protection management on all tiers.
© 2012 Unisys Corporation. All rights reserved.
22
DR Architecture Service
The Disaster Recovery Architecture Service helps you
achieve the appropriate levels of application and
infrastructure recoverability in the face of any disaster. We
work with you to design, plan and implement sound,
actionable disaster recovery services that ensure applications
are recoverable and that their data is restorable within explicit
recovery time objectives and recovery point objectives. The
Disaster Recovery Architecture Service provides you with a
solid foundation and proven methodology to build end-to-end
disaster recovery capabilities.
7/7/2015
7/7/2015
Page
Page 23
23
23
© 2012 Unisys Corporation. All rights reserved.
What Unisys Solves
Challenges
Cost
• In the event a “disaster” is declared, unreliable
disaster recovery services can cost businesses
millions of dollars
• Due to misalignment between IT and business
needs there is over-inflated cost within the
recovery process
• Redundant recovery solutions among the IT
functional teams within the end-to-end recovery
process results in high costs
Risk
• Lack of detailed recovery coordination among IT
functional teams puts recoverability at high risk
• Lack of formalized recovery services management
rapidly increases risk of missing recovery targets
over time
Quality of Service
• The business lacks confidence in IT’s ability to
recover applications and data
• Lack of cost transparency of disaster recovery
service options leads to ineffective budgeting and
business planning
DR Architecture Results
Cost
• Adoption of mature recovery services management
results in reduced cost
• The collective DR architectures and processes are
financially rationalized against explicit business driven
recovery targets
Risk
• Each IT function understands its specific role within the
overall end-to-end recovery process
• Proven and formalized recovery services management
yields reliable disaster recover capabilities
Quality of Service
• DR service performance reviews build the business’s
confidence through “proof of delivery capability” reports
• The actual costs of disaster recovery service options to
the business are transparent
7/7/2015
7/7/2015
Page
Page 24
24
24
© 2012 Unisys Corporation. All rights reserved.
Deliverables
• Design Session
– Joint development of formalized set of interrelated recovery architectures
and processes based on consensus of client team
– Design documentation including
• Project requirements definition, critical success factors, weighted selection
criteria, straw-man designs, illustrations of design, benefits and drawbacks of the
considered alternatives, recommendations
• Implementation Planning
– Joint development of precedence diagram showing true project/task
precedence and critical path
– Joint development of detailed MPP project schedule
– Document overview of plan including timelines, major milestones and
resource requirements by skill set
7/7/2015
7/7/2015
Page
Page 25
25
25
© 2012 Unisys Corporation. All rights reserved.
Timeline and Activities
Phase
Days
Activities
Output
1
1-5
Project kick-off and session
scheduling
Statement of Initiative (SOI)
1
6-7
Design session
Consensus on design
1
8-16
Design development and due
diligence
Architecture documents, including
design alternatives and estimated
costs
2
17-18
Planning session/review architecture
document
Define any needed changes to
architecture documents and
develop plan for implementation
2
19-24
Develop implementation plan
Create precedence diagram, MPP
and overview document
2
25
Deliver plan
Review/deliver plan document
7/7/2015
7/7/2015
Page
Page 26
26
26
© 2012 Unisys Corporation. All rights reserved.
Additional Benefits of the Disaster Recovery
Architecture Service
• Quick
– Project planning and design in 4-to-6 weeks
• Data Driven
– Design and implementation strategies based on facilitated input
sessions with all project stakeholders
• Cost-Effective
– Accelerated planning and full implementation saves time
and money
• Practical
– Focus on high value, feasible actions to optimize IT operations
7/7/2015
7/7/2015
Page
Page 27
27
27
© 2012 Unisys Corporation. All rights reserved.
Disaster Recovery Vision Become Reality
Accomplish your goals:
–
–
–
–
–
–
Prepared to handle multiple categories of disaster
Clearly documented policies and procedures
Well-documented and understood roles and responsibilities
Thoughtfully crafted RTOs and RPOs
Prioritized applications and servers
Highly automated replication and recovery tools
7/7/2015
7/7/2015
Page
Page 28
28
28
© 2012 Unisys Corporation. All rights reserved.
VyStar Accomplishments
• MISER Application
– New FS4190 for production
– Repurpose FS1800 for DR
• Data Replication
– EMC RecoverPoint software
– VNX storage platforms
• SMA OpCon
– Disaster Recover Process Automation
– Event driven
© 2012 Unisys Corporation. All rights reserved.
29
OpCon
• Fully Automated Disaster Recovery Process
– Automated 262 processes with OpCon
– Reduced Failover test time and resources from:
5 hours to > 2 hours and 3 FTEs to 1 FTE
75% time savings
66% resource savings
– All testing conducted remotely
• Automating the Daily Production Schedule: 75 jobs
– Have automated 2 sets of 4 jobs: job runs a WFL, then copies the
output file to a server, FTPs the file to a vendor, then archives it.
– “Pretty simple setup, but flawless results every time!”
Alex Castanheira
VyStar Credit Union
© 2012 Unisys Corporation. All rights reserved.
30
Timeline and Activities for Typical
Engagement
Presales
Week 1
Customer kickoff and gather data about current systems.
Week 2
Analysis by Storage Architect
Week 3
Consult and review findings to gain concurrence/correction
Week 4
Build and present recommended configuration
Postsales
Week 1
Customer kickoff and confirm data is still valid
Week 2
Build implementation plan based on previous analysis
Week 3
Present plan to customer to gain concurrence/correction for plan
Week 4
Implement onsite based on the plan
Week 5
Address questions, prepare and support final implementation
7/7/2015
7/7/2015
Page
Page 31
31
31
© 2012 Unisys Corporation. All rights reserved.
Unisys DR Customers
• Allied Bank Pakistan
• Karachi Stock Exchange
• US Air Force DR Program
• US Internal Revenue Service
• Multiple US Civilian Agencies
• Multiple US Intel Agencies
• Multiple US DoD Agencies
• Isle of Man all Government Operations
• Swiss Social Security Administration
© 2012 Unisys Corporation. All rights reserved.
32
Unisys Financial DR Customers
• Western Union
• Old Lane
• Fisher Investments
• Bank Fund
• Stifel Nichols
• Insight Investments
• Canyon Capital
• Agstar Financial
• College Load Corporation
• China International Capital
Corporation
• Options Express
• Wescot Credit Services
• Dexia Private Bank
• Janus
• Stevens Capital
Management
• Nationwide Building Society
• Armed Forces Bank
• Ruesch Financial
• First Independent Bank
© 2012 Unisys Corporation. All rights reserved.
33
Thank You
© 2012 Unisys Corporation. All rights reserved.
34