CA World: Storage a Major Focus, Part 1: Page 2

Posted September 22, 2003

Drew Robb

Drew Robb

(Page 2 of 2)

While server virtualization is an early step in the on-demand evolution, it requires dynamic provisioning to move much closer to real world reality. Dynamic provisioning means the automatic provisioning of new servers and storage resources (including CPU's, memory and more) according to defined policies to meet specific business goals. According to initial reports this technology coupled with server virtualization could lead to savings of 40% in terms of hardware/software acquisition costs.

The end result of this move towards centralization and standardization will be the ability to access and manage voice, data or video in an integrated manner. But this necessitates a shift from a software perspective to a service-oriented architecture.

One key element of this approach is code named Sonar by CA. This technology, built into several of the CA product lines, automatically discovers and manages on-demand business processes. It enables networks to shift existing server capacities to other areas as needed. Sonar automates several processes such as discovery, inventory, mapping to business and relationship definitions.

"Sonar is an agentless technology that watches and analyzes traffic," said Gupta.

Armed with the ability to map infrastructure to business processes, organizations can then prioritize the allocation of IT resources according to the needs of the organization. This includes monitoring transactions and network traffic as they flow within and across networks, and dynamically collecting the information needed to build business process maps and how they relate to IT infrastructure. Essentially, Sonar opens the door to the delivery of IT as a service.

"Achieving the flexibility and improved ROI promised by on-demand computing requires that we manage our infrastructure based on end-to-end business processes, not as islands of technology," said George Fiedorowicz, vice president of technology at Concord EFS, an electronics payment processing firm that has used CA Unicenter for many years. His company is among the first to implement Sonar-enabled applications.

This technology is a core factor in four new products announced:

BrightStor Process Automation Manager

This automates the allocation and provisioning of storage resources across multiple platforms in response to business demands. A collector technology automatically discovers applications and the devices that support them. Once the information is collected, Sonar uses it to build business process maps. As the infrastructure changes, these maps are automatically updated. This can be done passively by listening to traffic or actively by sending out and tracking generated transactions. Built-in advanced analytics aid in root cause analysis and infrastructure diagnosis. The software can monitor over 1700 protocols and information sources. Best practice templates are provided for common procedures such as storage provisioning, policy-driven backup and disaster recovery.

eTrust Vulnerability Manager

This is an asset-based vulnerability appliance that provides monitoring capabilities and security intelligence to pinpoint vulnerabilities that threaten the integrity of the network.

"Vulnerability analysis and management is an expensive and time consuming problem for today's dynamic IT organizations," said Howard A. Schmidt, a cyber security expert who served as cyber security advisor to the White House and as chief security officer at Microsoft. "Asset-based vulnerability management is a critical step towards our goal of automated proactive security management."

Unicenter Network and System Management for VMware Software

This monitors virtual machine environments on Linux and Windows to determine when additional resources need to be brought in to meet service levels requirements, as well as analyzing a VMware environment.

Unicenter Network and System Management Dynamic Reconfiguration Option

This manages and dynamically provisions VMware virtual machines.

Click here for Part 2.

Page 2 of 2

Previous Page
1 2

0 Comments (click to add your comment)
Comment and Contribute


(Maximum characters: 1200). You have characters left.