Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Storage & Clustering Community Blog
Showing posts tagged with ApplicationHA
Showing posts in English
dennis_wenk | 05 Oct 2012 | 0 comments

Basel II Accord for International Banking Operational Risk is defined as, “Risk of loss from inadequate or failed internal; processes, people, and systems or external events “.   When Processes, People or Systems fail, whether it be from internal or external events, the losses can be substantial.  As an example, the Ponemon Institute estimates that worldwide organizational are losing over $35 Billion monthly from data center downtime.  Nicholas G. Carr point out in his seminal Harvard Business Review article IT Doesn’t Matter, “today, an IT disruption can paralyze a company’s ability to make products, deliver its services, and connect with its customers, not to mention foul its reputation … even a brief disruption in availability of technology can be devastating.”

There are two primary ways for an organization to increase value.  The first way is to...

dennis_wenk | 05 Oct 2012 | 0 comments

The Effectiveness of internal control systems is now an issue for public policy and formal law. Section 404 of the Sarbanes-Oxley law is aimed at helping companies prevent financial reporting mistakes and fraud. The rule requires companies to include in their annual reports:

  • A statement of management's responsibility for establishing and maintaining "adequate" controls over financial reporting
  • Management's assessment of the effectiveness of the company's internal controls
  • A statement identifying the framework used by management to evaluate the effectiveness
  • An auditor's report on management's evaluation of internal controls
  • Any material weaknesses identified in the internal controls review

While the rule only requires companies to disclose material weaknesses in their annual reports, many companies have begun alerting investors about deficiencies and potential problems. The rule is intended...

dennis_wenk | 04 Oct 2012 | 1 comment

“Best Practices” is a popular expression of the intent to manage business continuity prudently.  Best Practices are seen as a way to sidestep both the quantification of operational-risks, as well as, the objective evaluation of the cost-benefit for any proposed mitigation actions.  There are several reasons why Best Practices “Are not.” best for Business Continuity purposes.

  • It is unreasonable to assume that a best practice could optimally answer the business continuity questions for multiple organizations.  Organizations differ widely in terms of their maturity level, their technologies deployed, and their vulnerabilities. 
  • Given the wide assortment of published ‘best practices’, which of the best practices really are the ‘best’ for any particular circumstance? 
  • No organization could hope to implement all of the thousands of best practices to get it perfectly-right, and there is...
dennis_wenk | 04 Oct 2012 | 1 comment

Professor John Graham of Indiana University points out that “large amounts of resources are devoted to slight or speculative dangers while substantial and well-documented dangers remain unaddressed”.  It has been well established that people often too much weight is placed on risks of low probability.  Such is the dilemma of complexity within IT infrastructure.  We often talk about hackers, malware, floods, fires, earthquakes, and tornados; while the real crisis is happening right under our nose and it has well over 5,000 risk signatures.  This crisis is the complexity in the IT infrastructure and it is causing considerable losses for companies.

The likelihood that an organization will experience a catastrophic loss from an IT failure is far greater than any catastrophic disaster or "black swan" event.   IT failures are costing companies trillions of dollars every year; worldwide downtime is estimated at over $35 Billion...

Maria Bledsoe | 25 Sep 2012 | 0 comments

Virtualization has become THE buzzword within the IT community; in some circles it’s even bigger than Cloud. As with any new technology the buzz comes along with a considerable amount of hype and risk. Virtualization does have very tangible benefits to organizations, however wading through what’s real and what’s not can be a challenge.

Listen to this webcast to hear about:

  • The risk of moving business critical applications to virtual environments
  • How to avoid these risks and still reap the cost savings benefits of virtualization
  • How to take advantage of your physical infrastructure in tandem with your virtual environment

The on demand webcast is available at http://www.symantec.com/offer?a_id=147034

dennis_wenk | 24 Sep 2012 | 0 comments

Operational resilience is the economical balance between an organization’s requirements for service availability and the consequence of an interruption to that service.  The likelihood that your organization will experience a catastrophic loss from a material service interruption caused by an IT operational-problem is far greater than any service interruption being caused by some disaster or ‘black swan’ event.  So if the overarching objective is to protect our organizations from bad events that generate losses then it is time to focus our attention to creating resilient IT operations.   

We live in a technology driven world.  Every possible business processes has been automated; automated to the point where Information Technology is deeply embedded in the operating fabric of our business and the organization is now highly dependent on information technology.  IT has become a microcosm of the organization and it is used to...

dennis_wenk | 24 Sep 2012 | 0 comments

Recently some have said that the ultimate goal for Business Continuity Management (BCM) practitioners is to get “business continuity management activities out from the computer room and into the business and boardroom”.  Most likely this is the remnant from bygone era in business continuity; the notion that the computer room, or more appropriately the modern data center, should be relegated to disaster recovery (DR) activities, undeserving of serious attention for the business-oriented BCM practitioner.    Nothing could be further from the truth in today’s business-world and if our ‘best practice’ provides this type of misdirected guidance then we have completely lost touch with reality.  

Technology has transformed the way we do business and that transformation puts the data center directly into the domain of business-oriented practitioner because the data center is the largest source of operational risk in any...

Maria Bledsoe | 17 Sep 2012 | 0 comments

During the recent VMworld conference in San Francisco, Lorenzo Galelli's (Symantec Senior Technical Product Manager) presentation on application availability in virtual environments was a huge success, and not only because he gave away some pretty cool prizes. Lorenzo covered several topics including VMware native tool compatibility and multi-tiered application support and gave a demo of the latest release of VCS with VMware functionality.

If you missed the session, you now have the opportunity to participate from the comfort of your desk. Register for the webcast right now!

https://symantecevents.verite.com/26797/

Mayank Vasa | 14 Sep 2012 | 0 comments

We want to hear from you! Post a blog about your experience about Veritas Operations Manager (VOM) or VOM Advanced and earn 200 Symantec Connect points (approximately USD 30). Bragging about your data center is encouraged!

For residents in Europe, Asia, Africa and South America - read this blog for details.

For U.S. and Canadian residents, check out the VOM Tell Your Story Contest 2012.

Eric.Hennessey | 31 Aug 2012 | 0 comments
I had the pleasure of attending VMworld 2012 this week and had every intention of blogging daily from the venue. Suffice it to say that between working in the booth a few hours each day and meetings on the side with Symantec customers and partners, that just didn't happen. On the other hand, I did manage to spot Brent Spiner (Data from the Star Trek: The Next Generation series) at the event.
 
As I said, I spent several hours each day in the Symantec booth talking with customers (current and future!) about our new release of Veritas Cluster Server due out this Fall. This release is pretty exciting in that it has enhancements allowing users to install VCS on Windows and Linux VMware guests, providing application failover between virtual machines. This gives customers another level of protection beyond what our ApplicationHA product delivers so our customers can now select the appropriate level of availability based on service level...