IBM Global Technology Services - Resilience - The Silver Lining to Cloud Computing
Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and...
Transcript of Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and...
2006
© 2006 IBM Corporation
IBM System i5
8/22/2007
Steven FinnesBusiness Resilience Product ManagerPower [email protected]
Business Resilience & Compliance
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
2 © 2006 IBM Corporation
1) Increasing WW demand for 24x7 service
Globalization & consolidation2)
Growing risk awareness3)
4)
What’s Driving The HA Market ?
Compliance & protection of corporate assets5)
Business managers demanding higher service levels
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
3 © 2006 IBM Corporation
What are System i Customers Saying?
� On average 60% of our customers are looking to improve availability
� Nearly 50% want to make significant security improvements
� Over 25% want to implement high availability clusters
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
4 © 2006 IBM Corporation
The Move is On
Every IT Shop has already deployed a level of resiliency
LE
SMB
Tape DR HA FT
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
5 © 2006 IBM Corporation
The Availability Challenge
ProcessesProcesses
TechnologyTechnology
OrganizationOrganization
FacilitiesFacilities
Strategy and VisionStrategy and Vision
Applicationsand DataApplicationsand Data
Bu
sin
ess
Res
ilie
nc
e
Drivers
Real Time Operations
Ubiquitous Access (Internet)
Asset Utilization
Globalization
Customer Expectations
Business Dependencies
Se
rvic
e a
nd
Su
pp
ort
Dis
cip
line
& P
roc
es
s
Org
an
iza
tion
Needs
So
lutio
n R
es
ilien
ce
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
6 © 2006 IBM Corporation
Disaster Recovery
High Availability
Backup
Transaction Integrity
Disk Protection
Fundamentals of Business Resilience
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
7 © 2006 IBM Corporation
Disaster Recovery
Data Center Remote Recovery Center
Solution Focus:
– Reduced risk of data loss
– Establish or strengthen a business recovery plan
– Provide separate recovery location
– Primary focus is recovery point
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
8 © 2006 IBM Corporation
High Availability
Solution Focus:
– Near continuous application service
– Eliminate the affects of planned outages
– Minimize unplanned outages
– Primary focus is recovery time & recovery point
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
9 © 2006 IBM Corporation
Top Five Disaster Recovery Solutions
1. Off-site tape storage
2. Logical replication
3. IBM DS8000 with Global Mirror
4. Cross Site Mirroring (XSM)
5. Business recovery services (BCRS)
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
10 © 2006 IBM Corporation
Top High Availability Solutions
1. Logical replication
2. Switchable Storage (IASPs)
3. IBM DS8000 with IASPs & Metro Mirror
4. XSM (Cross Site Mirroring)
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
11 © 2006 IBM Corporation
Integrated or SAN
� Widely deployed
� Very flexible
� Concurrent access
� Active-Active !
Logical Replication
� FlashCopy, Metro Mirror, Global Mirror
� Point in time copy
Basic Copy Services
Copy
Integrated or SAN
� i5/OS managed copy of IASP
� Simple Switching
� Enhancements with i5/OS V5R4
Cross Site Mirroring
Advanced Copy Services
� Switchable IASPs DS Copy Services
� Metro Mirror
� Global MirrorPPRCFlashCopy
System i Multi System Availability Techniques
Integrated or SAN
Switch IASP Cluster
IASP
� Simple availability
� Single copy of data
� Building block for other IASP solutions
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
12 © 2006 IBM Corporation
IBM Capacity Backup (CBU) OFFERINGS
� NOT ONLY FOR DR ANYMORE !
� 525 CBU, 570 CBU, 595 CBU
� Optional Processor Activations
� Move i5/OS, EE & User Entitlements
� Exceptional Value
525 CBU
520
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
13 © 2006 IBM Corporation
http://www-03.ibm.com/systems/i/hardware/cbu/
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
14 © 2006 IBM Corporation
The CBU: Your Next HA System
� Get started today with DR and later expand to HA
– Start with a low-cost DR implementation expand later to HA
� In-source your disaster recovery operations
– Provides a compelling cost case for in-sourcing HA/DR
� Choose any HA technology option !
– Global Mirroring, Logical Replication, XSM, IASPs, Metro Mirroring
� Upgrade your 8xx system to a CBU
– Upgrades from the 8xx are flexible, cost effective alternatives
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
15 © 2006 IBM Corporation
Logical Replication Solutions
570 Primary570 CBU
DR, HA, Active-Active
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
16 © 2006 IBM Corporation
Switchable Independent ASP (IASP)
IASP
OS and other
system data
OS and other
system data
System Admin Domain
Watch This Space !!
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
17 © 2006 IBM Corporation
Cross-Site Mirroring (XSM) with Geographic Mirroring
IASP
OS and other
system data
OS and other
system data
OS and other
system dataIASP Mirrored Copy
Synchronous Replication
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
18 © 2006 IBM Corporation
System i & TotalStorage HA Solution
OS and other system data
OS and other
system data
DS8000 DS8000
Metro Mirror
FlashCopyIASP Copy
IASP Copy
IASP Copy
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
19 © 2006 IBM Corporation
Objection Handling
1. It costs too much
– The CBU will change all your assumptions on cost
– Two for the price of one i5/OS entitlements !
– Optional processor activations
2. The CFO says “We’ve never had an outage!”
– Let me help you shift the risk from CIO to CFO
– Let’s focus on planned downtime first
3. Tape back is good enough for our DR strategy
– Can your business really afford data loss?
– When did you last test your recovery plan?
– How do you recover transactions from last tape backup?
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
20 © 2006 IBM Corporation
What CBU Means To You
1)
2) Start now and stage your resiliency goals
3)
5 Reasons To CBU Now
Deploy AIX or LINUX minus the cost of i5/OS 5)
This is the best economic value for HA
Choose any resiliency solution approachXSM, Logical Replication, Metro Mirror….Change your mind anytime
4) Upgrade your current 8XX to a CBU !
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
21 © 2006 IBM Corporation
HA/DR ISV Enhanced CBU Companion Offers
To activate hyperlinks, view in Screen Show mode
www.visionsolutions.comVision HA for CBUVision Solutions
www.maxava.com/cbuNoMax CBUMaximum Availability
www.quick-edd.com/uk/promos_ibm.htm
Quick EDD CBU Edition 2006Trader’s
Website URLCompanion OfferHA/DR ISV
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
22 © 2006 IBM Corporation
The global regulatory and business The global regulatory and business
environment requires ongoing audit environment requires ongoing audit
capabilities.capabilities.
Security & ComplianceSecurity & Compliance
Corpora
te Polic
y
IT Polic
y
Network
Platform
(s)
HR
Financial Securit
y
&Compliance
Physical
Security
Privacy
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
23 © 2006 IBM Corporation
The System i Security Value Proposition
� Architected for Security
� Easy To Secure
� World Class ISV Portfolio
http://www.freeimages.co.uk/
Harness the Power
http://www-03.ibm.com/systems/i/security/
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
24 © 2006 IBM Corporation
Compliance
Define Security Policy
Protect Assets From Internal Threats
Protect Assets From External Threats
Fundamentals of IT Security
Manage Security
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
25 © 2006 IBM Corporation
Define Security Policy
� Challenges
– Expertise
– Scope
– Complexity
� Best Practices
– Lab Services Consulting
– Security ISVs
– IGS
� Secure Perspective
– Define, Implement and Audit Seamlessly
– Major innovated breakthrough
Corpora
te Polic
y
IT Polic
y
Network
Platform
(s)
HR
Financial Securit
y
&Compliance
Physical
Security
Privacy
For more information & Flash Demo
http://www-
03.ibm.com/systems/i/security/
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
26 © 2006 IBM Corporation
IBM Secure Perspective for System i
� Secure Perspective
– Enables you to create your policy using natural language
– Implements your system security settings
– Demonstrates compliance to your policy
– Reports on compliance defined to Secure Perspective
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
27 © 2006 IBM Corporation
Raising the Bar With Data Centric Security
� Traditional security focuses on
• Firewalls
• Virus scanning
• Password management
• Default privileges
• Encryption
� Data Centric Security
• Is done in addition to traditional security
• Provides access control to individual objects and folders
• Secure Perspective - initial focus is data centric
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
28 © 2006 IBM Corporation
Secure Perspective: Policy Based Centric Security
Network
System
Data
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
29 © 2006 IBM Corporation
Protect Assets From External Threats
� Challenges
– Establish all points of entry
– Manage assets outside of the datacenter
– Audit for Compliance
– Complexity
� Best Practices
– Establish Security Policy
– Firewalls, IP Filtering
– Anti Virus
– Intrusion Detection (new in V5R4)
– VPN, SSL
– Encryption
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
30 © 2006 IBM Corporation
System i Network Security Technologies
� i5/OS Network Security
– Integrated intrusion detection
• New with V5R4
– Native VPN/SSL Solutions
� Encryption
– Integrated Cryptography and Key management APIs
• Watch this space V6R1 !
– Viruses
– Native i5/OS is Virus Resistant
– Check Object Integrity (i5/OS Exclusive)
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
31 © 2006 IBM Corporation
System i Security ISVs
Products would be used to set and manage the security settings of the system.For example, tools to manage system values and network attributes, users,authority attributes etc
http://www-03.ibm.com/systems/i/security/
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
32 © 2006 IBM Corporation
System i5 and Business Resilience & Compliance
� Make outages of any kind, planned or unplanned transparent to business operations
� Safeguard data by keeping hackers and viruses out
� Promote the highest levels of security, auditing and compliance management
� Deliver proven technology, backed by world-class service and support
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
33 © 2006 IBM Corporation
Looking for Case Studies?� VEKA, Germany, iASP with external storage
– http://www-306.ibm.com/software/success/cssdb.nsf/CS/STRD-6R7GQ7?OpenDocument&Site=eserveriseries&cty=en_us
� Saertex, Germany - *noMax from Maximum Availability
– http://www-306.ibm.com/software/success/cssdb.nsf/CS/STRD-6R8GKW?OpenDocument&Site=eserveriseries&cty=en_us
� QUIXTAR online retailer – Mimix from Lakeview Technology
– http://www-306.ibm.com/software/success/cssdb.nsf/CS/JKIN-6NRRC3?OpenDocument&Site=eserveriseries&cty=en_us
� TDG, supply chain UK – Vision Orion
– http://www-306.ibm.com/software/success/cssdb.nsf/CS/STRD-6V3NF7?OpenDocument&Site=eserveriseries&cty=en_us
� Tradex, Insurance UK – Echo2 from iTera
– http://www-306.ibm.com/software/success/cssdb.nsf/CS/STRD-6SNKL6?OpenDocument&Site=eserveriseries&cty=en_us
� Ponzio Sud, Manufacturing Italy – QuickEDD from Trader’s
– http://www-306.ibm.com/software/success/cssdb.nsf/CS/STRD-6SNKFK?OpenDocument&Site=eserveriseries&cty=en_us
� Estes Express, Transportation US - IBM Global Mirror with System i Copy Services Toolkit
– http://www-306.ibm.com/software/success/cssdb.nsf/CS/CSDB-6WD83P?OpenDocument&Site=eserveriseries&cty=en_us
� Prolit Verlagsauslieferung GmbH, Distribution – Germany – IBM XSM
– http://www-306.ibm.com/software/success/cssdb.nsf/CS/STRD-6SFJEV?OpenDocument&Site=eserveriseries&cty=en_us
� Don’t see one to suit you? Go to http://www-306.ibm.com/software/success/cssdb.nsf/topstoriesFM?OpenForm&Site=eserveriseries
IBM Systems and Technology Group University 2006
© 2003 IBM Corporation
IBM System i5
34 © 2006 IBM Corporation
The following are trademarks of the International Business Machines Corporation in the United States and/or other countries. For a complete list of IBM Trademarks, see www.ibm.com/legal/copytrade.shtml: AIX, AIX 5L, BladeCenter,Blue Gene, DB2, e-business logo, eServer, IBM, IBM Logo, Infoprint,IntelliStation, iSeries, pSeries, OpenPower, POWER5, POWER5+, Power Architecture, TotalStorage, Websphere, xSeries, z/OS, zSeries
The following are trademarks or registered trademarks of other companies:Java and all Java based trademarks and logos are trademarks of Sun Microsystems, Inc., in the United States and other countries or bothMicrosoft, Windows,Windows NT and the Windows logo are registered trademarks of Microsoft Corporation in the United States, other countries, or both.Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarksof Intel Corporation or its subsidiaries in the United States and other countries.UNIX is a registered trademark of The Open Group in the United States and other countries or both.Linux is a trademark of Linus Torvalds in the United States, other countries, or both.Other company, product, or service names may be trademarks or service marks of others.
NOTES:Any performance data contained in this document was determined in a controlled environment. Actual results may vary significantly and are dependent on many factors including system hardware configuration and software design and configuration. Some measurements quoted in this document may have been made on development-level systems. There is no guarantee these measurements will be the same on generally-available systems. Users of this document should verify the applicable data for their specific environment.
IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply.
Information is provided “AS IS” without warranty of any kind.
All customer examples cited or described in this presentation are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics will vary depending on individual customer configurations and conditions.
This publication was produced in the United States. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to change without notice. Consult your local IBM business contact for information on the product or services available in your area.
All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.
Information about non-IBM products is obtained from the manufacturers of those products or their published announcements. IBM has not tested those products and cannot confirm the performance, compatibility, or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.
Prices are suggested US list prices and are subject to change without notice. Starting price may not include a hard drive, operating system or other features. Contact your IBM representative or Business Partner for the most current pricing in your geography.
Any proposed use of claims in this presentation outside of the United States must be reviewed by local IBM country counsel prior to such use.
The information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. Thematerials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk.
IBM makes no representation or warranty regarding third-party products or services including those designated as ServerProven, ClusterProven or BladeCenter Interoperability Program products. Support for these third-party (non-IBM) products is provided by non-IBM Manufacturers.
IBM may have patents or pending patent applications covering subject matter in this document. The furnishing of this document does not give you any license to these patents. Send license inquires, in writing, to IBM Director of Licensing, IBM Corporation, New Castle Drive, Armonk, NY 10504-1785 USA.
Trademarks