Explosive Data Growth – How to Handle the Risks and Opportunities David Bregman Director November 7, 2006.

Slides:



Advertisements
Similar presentations
TACTICAL/OPERATIONAL PLANNING
Advertisements

Impacts of 3 rd Party IaaS on broadband network operations and businesses Prabhat Kumar Managing Partner, i 3 m 3 Solutions.
STORAGE MANAGEMENT/ GETTING STARTED: Storage Management 101 Everything you always wanted to know about Storage Management (but were afraid to ask) Stephen.
Pros and Cons of Cloud Computing Professor Kam-Fai Wong Faculty of Engineering The Chinese University of Hong Kong.
Service Delivery – your ticket to play
ITIL: Service Transition
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Citrix Partner Update The Citrix Delivery Centre.
High-Level Assessment Month Year
Defining Services for Your IT Service Catalog
Does "The Cloud" Fit Into Your Organization? Tom Horan Meridian IT Inc. VP, Strategic Markets (847)
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Integrated IT Service Management
IT ASSET MANAGEMENT (From Booz-Allen & Hamilton).
Enterprise Architecture
IT Outsourcing Chad Doiron / Michael Saunders April, 2007.
Selling Consolidation’s Value. Why Consolidate? Reduce Complexity Increase Productivity Reduce TCO Improve End User Experience Improve IT Performance.
Getting Smarter with Information An Information Agenda Approach
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
The Evergreen, Background, Methodology and IT Service Management Model
Continual Service Improvement Process
Collin County’s Doing More with Less How Collin County’s ITIL Framework has worked to do more with less.
STORAGE MANAGEMENT/ EXECUTIVE: ITIL® and Other Best Practices Frameworks Jim Damoulakis CTO, GlassHouse Technologies Sept. 21, 2004.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
UCSF IT Update November 2013 Presenter: Joe Bengfort.
The Challenge of IT-Business Alignment
Roles and Responsibilities
1 © Copyright 2010 EMC Corporation. All rights reserved.  Consolidation  Create economies of scale through standardization  Reduce IT costs  Deliver.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
© 2008 IBM Corporation Challenges for Infrastructure Outsourcing July 29, 2011 Atul Gupta Vice President, Strategic Outsourcing, IBM.
Storage Trends: DoITT Enterprise Storage Gregory Neuhaus – Assistant Commissioner: Enterprise Systems Matthew Sims – Director of Critical Infrastructure.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
ITIL Overview 1 Configuration Management Working Group February 8, 2011.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
ITIL Drivers for Government Scott Spencer Vice President, Program Management, GTSI.
E-TechServices's IT Strategy Open. Virtualize. Rationalize. A Strategy for Optimal IT Deployment.
Service Level Agreements Service Level Statements NO YES The process of negotiating and defining the levels of user service (service levels) required.
IT SERVICE MANAGEMENT (ITSM). ITIL\ITSM OVERVIEW  ITIL Framework.
1 © Copyright 2010 EMC Corporation. All rights reserved. The Virtualization BenefitThe Physical Challenge Virtualizing Microsoft Applications Aging, Inefficient.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
SAM for SQL Workloads Presenter Name.
IBM Systems and Technology Group © 2009 IBM Corporation IBM System Storage – Tape Part 1 This document is for IBM and IBM Business Partner use only. It.
Microsoft and Symantec
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
2006 Infrastructure Projects Four Themes: Storage – room to grow Security – reacting to threats Virtual Systems – increased efficiency Service Management.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Introduction to ITIL and ITIS. CONFIDENTIAL Agenda ITIL Introduction  What is ITIL?  ITIL History  ITIL Phases  ITIL Certification Introduction to.
1© Copyright 2015 EMC Corporation. All rights reserved. FEDERATION ENTERPRISE HYBRID CLOUD OPERATION SERVICES FULL RANGE OF SERVICES TO ASSIST YOUR STAFF.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Cisco Consulting Services for Application-Centric Cloud Your Company Needs Fast IT Cisco Application-Centric Cloud Can Help.
CLOUD-BASED VIDS A CIO’S PERSPECTIVE Stephen Alford, CIO WEP, Inc.
ICS Area Managers Training 2010 ITIL V3 Overview April 1, 2010.
Driving Value from IT Services using ITIL and COBIT 5 July 24, 2013 Gary Hardy ITWinners.
Vodafone Business Cloud
Blazent / ServiceNow Messaging Guide. Transforming data into actionable intelligence Improve business outcomes by contextualizing data to make informed.
References: Supply Chain Saves the World. Boston, MA: AMR Research (2006); Designing and Managing the Supply Chain – Concepts, Strategies and Case Studies;
Introduction to ITIL IT Service Management Collin Smith
ITIL: Service Transition
Data Center Infrastructure
CIM Modeling for E&U - (Short Version)
CCNET Managed Services
Transforming IT Management
Storage Trends: DoITT Enterprise Storage
Cloud Consulting Services and Solutions
MAZARS’ CONSULTING PRACTICE
Presentation transcript:

Explosive Data Growth – How to Handle the Risks and Opportunities David Bregman Director November 7, 2006

© GlassHouse Technologies, Inc.This material may not be reprinted or redistributed without the express written consent of GlassHouse Technologies, Inc. Data Growth  Increase in digital data growth 60-80% per year – “There is no more safe bet in the industry (technology) that you will need more storage next year” - Jonathan Schwartz, President Sun Microsystems, WSJ 11/05  Decrease in unit cost of storage devices of 20-30% per year is not keeping pace with growth – “The combined revenues of the two largest storage-specialty companies EMC and Network Appliance…grew by 26% in their latest four quarters. By comparison, the two biggest broadline computer companies, IBM and HP, had combined revenue gains of 6%” - WSJ 11/05

© GlassHouse Technologies, Inc.This material may not be reprinted or redistributed without the express written consent of GlassHouse Technologies, Inc. Competing Priorities for IT User Satisfaction Risk Cost Storage User Satisfaction Internal service levels throughout the organization always have room for improvement Risk Reducing the risk of failure with scalable solutions that optimize processes and minimize the amount of human intervention necessary Costs Need to be managed and lowered to meet needs of the business Operational Complexitie s Busines s Demand s Audit and compliance

© GlassHouse Technologies, Inc.This material may not be reprinted or redistributed without the express written consent of GlassHouse Technologies, Inc. Increasing Operating Complexity  Increasing complexity to operate enterprise storage environments – Natural data growth – Corporate mergers – Interconnected componentry – Business and data compliance and regulation – Increasing heterogeneity of technologies in the data center – Storage vendor consolidation, new technologies, and quickly evolving product strategies

© GlassHouse Technologies, Inc.This material may not be reprinted or redistributed without the express written consent of GlassHouse Technologies, Inc. Low Utilization  Glasshouse is observing utilization rates of 5% to 17%  Utilization rates of 60% or higher are attainable – “Good utilization…is 70%-90%” (Gartner August )  Storage device utilization measurements vary by company and by industry, but it is generally the ratio of data stored to disk space  Utilization is impacted by poor process maturity and a lack of good management tools

© GlassHouse Technologies, Inc.This material may not be reprinted or redistributed without the express written consent of GlassHouse Technologies, Inc. Where does all the storage go?  Physical – Raw storage capacity – Procurement view  Logical – Storage capacity available after applying data protection policies – Storage architect view  Allocated – Storage consigned to users – Storage administrator view  Claimed - Storage assigned to servers – System administrator view  Assigned – Storage mounted by servers – Application owner view  Written - % of storage actually containing data

© GlassHouse Technologies, Inc.This material may not be reprinted or redistributed without the express written consent of GlassHouse Technologies, Inc. Escalating Costs

© GlassHouse Technologies, Inc.This material may not be reprinted or redistributed without the express written consent of GlassHouse Technologies, Inc. Data vs. Information  Data is the domain of storage device intelligence - placement, movement, and protection  Information is the business asset - available through applications  A vast quantity of data is stored in virtual warehouses without preexisting manifests, creating a challenge to address compliance and regulatory requirements  Compliance deals with information rather than data – new opportunities exist for products and services on the storage side to integrate information

© GlassHouse Technologies, Inc.This material may not be reprinted or redistributed without the express written consent of GlassHouse Technologies, Inc. Data Protection - More  Its all about disk based backups now – The speed arguments – The dollars – The implications – Virtual Tape  Disaster Recovery – Cheaper – Faster – More full functioned  Archiving and Compliance

© GlassHouse Technologies, Inc.This material may not be reprinted or redistributed without the express written consent of GlassHouse Technologies, Inc. Shifting Focus to Process Efficiency  Future focus for innovation is management processes – Unravel the complexity and articulate the real business issues – Manage the “supply chain” of data – Translate compliance issues into actionable tasks – Implement controls, policies, and procedures  New tools will support process efficiency and simplicity Focus on Functionality “Speeds and Feeds” Focus on Manageability

© GlassHouse Technologies, Inc.This material may not be reprinted or redistributed without the express written consent of GlassHouse Technologies, Inc. Storage Security  54% of storage managers have no documented security procedures  70% of IT executives rated their storage security as fair to poor  80% of shops do not encrypt their backups  61% of IT executives believe external threats are greater despite the fact that internal users have greater access

© GlassHouse Technologies, Inc.This material may not be reprinted or redistributed without the express written consent of GlassHouse Technologies, Inc. Data Value Model Value at Risk Total Cost of Ownership (TCO) $$$$$$ High Medium Low  The Data Value Model (DVM) is an approach to align management of data with its actual business value to the organization  Valuing data is a foundation for the development of the Service Provider Model (SPM)  Business alignment challenge: – IT understands cost (X-axis) – Business understands value (Y-axis) – Cannot succeed without both

© GlassHouse Technologies, Inc.This material may not be reprinted or redistributed without the express written consent of GlassHouse Technologies, Inc. IT Infrastructure Goals  Successful organizations are focusing on… – Offering services in conjunction with overall organizational maturity – Establishing standard services and technology implementations – Developing mature practices including policies, processes, and organization structure – Implementing effective metrics and reporting Source: Bittman, Thomas J.; Gartner Introduces the Infrastructure Maturity Model, Gartner, 2004  IT infrastructure organizations becoming more business focused – Technology no longer viewed as the solution for all IT problems – Internal and external forces demand a re-evaluation of organizational maturity

© GlassHouse Technologies, Inc.This material may not be reprinted or redistributed without the express written consent of GlassHouse Technologies, Inc. Metrics Service Standards Practices A Service Provider Model  Service – A service focus separates the “what” from the “how” of service delivery – A service level agreement between IT and users of technology provides a pragmatic basis for alignment of IT capabilities with business objectives  Standards – Standard services and technical architecture – A stratification of service offerings allows different service level requirements to be satisfied at appropriate cost levels  Practices – Management practices are the processes, policies, and organizational model used to deliver services – As processes mature, they become repeatable, documented, measured, and finally have continuous review for improvement  Metrics – External and internal metrics define the progress of the service model – A complete cost model is critical to understanding the true cost of service delivery

© GlassHouse Technologies, Inc.This material may not be reprinted or redistributed without the express written consent of GlassHouse Technologies, Inc. Transitioning to the Service Provider Model Current State High TCO Low Satisfaction Current State High TCO Low Satisfaction Service Provider Model (SPM) Low TCO High Satisfaction Service Provider Model (SPM) Low TCO High Satisfaction Data Value Model (DVM) Transition Foundation Data Value Model (DVM) Transition Foundation Storage Management Lifecycle (SML) Transition Activities Storage Management Lifecycle (SML) Transition Activities Continuous Alignment and Control Key Performance Indicators  The Storage Transformation Framework is a methodology for the assessment, design, acquisition, deployment, migration to, and operation of enterprise class storage  You can create a framework that correlates with key industry standards such as ITIL and COBIT. Storage Maturity Model (SMM) Transition Phases Storage Maturity Model (SMM) Transition Phases

© GlassHouse Technologies, Inc.This material may not be reprinted or redistributed without the express written consent of GlassHouse Technologies, Inc. Storage Management Lifecycle Domains Strategy & Planning 1.Strategy (Business Requirements) 2.Policies 3.Discovery 4.Technical Requirements Strategy & Planning 1.Strategy (Business Requirements) 2.Policies 3.Discovery 4.Technical Requirements Operations & Maintenance 1.Service Delivery 2.Infrastructure Management 3.Service Support 4.Compliance Operations & Maintenance 1.Service Delivery 2.Infrastructure Management 3.Service Support 4.Compliance Provisioning 1.Purchasing 2.Change Control 3.Activation 4.Service Acceptance Provisioning 1.Purchasing 2.Change Control 3.Activation 4.Service Acceptance Customer Care 1.Service Requirement 2.Service Fulfillment 3.Service Quality Customer Care 1.Service Requirement 2.Service Fulfillment 3.Service Quality

© GlassHouse Technologies, Inc.This material may not be reprinted or redistributed without the express written consent of GlassHouse Technologies, Inc. Storage Maturity Model State Change Characterization ReactiveMonitoredProactivePredictive Business Aligned People OrganizationApplication-Centric Platform Team Storage Team (IT Aligned) Storage Team (LOB Aligned) Business Analysts Included in Storage Team Operations Reactive Incident Management Basic Reports, Metrics, and Escalation Configuration and Change Management Capacity Forecasting Integrated Storage Budgeting and Provisioning Process Service Management None SOPs for Key Function Integrated SOPs Workflow Driven SOPs Business Driven SOPs Metrics and Reporting Exceptions Some Base Metrics Simple Performance Indicators Metrics Integrated into SOPs Business KPIs Reporting Technology Data Protection Distributed Backup and Recovery Centralized Backup Data Categorization and Policy Groups Virtualized Protection Target Business Aligned Continuance and Recovery Storage Management Distributed Storage, None Networked, Storage Network Management Tiers of Storage, SRM Tools Virtualized Storage Environment Tiers of Storage Services Business Financial Planning IT as an Overhead Fixed Asset Cost Management Administration Cost Management Total Cost Storage Ownership Management Total Cost of Data Ownership and Lifecycle Management Business Interface Annual Budgetary Informal Requests Support Desk Service Level Objectives Service Level Agreements with Business KPIs Level 1 Level 2 Level 3 Level 4 Level 5

© GlassHouse Technologies, Inc.This material may not be reprinted or redistributed without the express written consent of GlassHouse Technologies, Inc. The Typical Approach Custom Services Implementation Strategic Services Managed Services Disruption

© GlassHouse Technologies, Inc.This material may not be reprinted or redistributed without the express written consent of GlassHouse Technologies, Inc. Questions? Thank you! David Bregman,