by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : April 30, 2013
it resides is essential, Hennessey said. "I want to have a single solution that will back up from all the sources that I own to all the targets that I need to back up to," he said. Agencies should consider taking snap shots of their data on a regular basis so if the data is corrupted, they can revert to a known point in time to retrieve the uncor- rupted data, Hen- nessy said. Another option is to establish data mirroring so multiple copies of data are in multiple locations making back-up easier. "The point is ... not all applications are created equal," Hennessey said. "An application that is absolutely essential gets a higher level of protection than an application that ...we can live without for a day or two." More important applications must be recovered quickly. "We don t want to take time to restore from tape or back up disks," Hennessey said. "We want to keep replica- tion current at the remote site." There are several different ways to do this. The rst is continuous volume-based replication, which in Symantec s case is Veritas Volume Replicator. The other option is le-based replication, which, using Veritas File Replicator, is performed periodically. Agencies can also use Veritas File Replicator for content distribution. As some organizations found out with Hurricane Sandy, manual application recovery can be both time-consuming and expensive, Hennessey said. A better choice, he said, is automated application recovery regardless of whether it is on site or at an alternate site. Symantec provides several architectures for application recovery: * Local high availability: Moves applica- tions to another node within the data center in the event of a localized outage such as a server failure. * Metropolitan cluster: Creates a cluster of nodes across different sites (within 60 miles or less of each other) making applications available in one data center in the event the other one fails. * Global cluster: Makes applications avail- able at a remote facility (over an unlimited distance) in the event of a data center failure. Even the best solutions must be tested, Hennessey said, particularly if you consider the statistics. Only about 20 percent of outages are brought on by environmental factors such as natural disasters and power failures, while 80 percent fall into the category of applica- tions failure or operations failure, he said. Symantec provides numerous ways to validate the con guration of clusters and applications, Hennessey said. For instance, Veritas Cluster Server Simulator allows users to model cluster con gurations in a simulated environment. Another product, Disaster Recovery Advisor, scans the envi- ronment and the host, looks at application con guration and storage con guration, and determines where problems might occur in the event of a disaster. It doesn t matter if applications are running on a physical or a virtual machine, Hennessey said. "We can do that because we have the ability to run within the VMware environment or other virtualized environments." Another offering from Symantec is the notion of virtual business services. "We are able to link the different components of the applications together and treat them as a single business service," Hennessy said. "It doesn t matter if they are all running on dif- ferent platforms; we can link them together and treat them as a single business service." What if you are an organization with one data center? To address this situation, Symantec teamed up with Microsoft Corp. to allow Windows applications to failover to Microsoft Windows Azure cloud service. It is built on Veritas Storage Foundation HA for Windows. This is designed for organizations with one data center and need an alternative for failing over. "The whole idea is to minimize the risk to your business continuity," Hennessey said. "We are a peace-of-mind company. We pro- vide the right level of protection for the data or the application no matter what platform it s running on." SPONSORED CONTENT "I come from a military background and one of the first things you learn is no plan ever survives the first contact with the enemy. That is true when it comes to disaster recovery. There is always going to be that one thing that you didn t think of that causes everything to fall apart." -- Eric Hennessey, Business Continuity Solutions Evangelist, Symantec SPONSORED BY: For more from Symantec, go to: go.symantec.com/missioncritical 40% Application Failure 20% Environmental Factors, Hardware, Power, OS, Disasters 40% Operations Errors ROOT CAUSES OF UNPLANNED DOWNTIME Source: Gartner
April 15, 2013
May 15, 2013