Configuring Celerra for Security Information Management with Network Intelligence s envision
|
|
- Aubrey Martin
- 8 years ago
- Views:
Transcription
1 Configuring Celerra for Security Information Management with Best Practices Planning Abstract appliance is used to monitor log information from any device on the network to determine how that device is being used. envision captures security events that take place in the network infrastructure. This white paper provides guidelines to set up storage for Security Information and Event Management with EMC s Celerra Network. October 2006
2 Copyright 2006 EMC Corporation. All rights reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED AS IS. EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com All other trademarks used herein are the property of their respective owners. Part Number H2465 Best Practices Planning 2
3 Table of Contents Executive summary...4 Introduction...4 Audience... 4 Terminology... 4 Overview...4 Recommendations... 5 Conclusion...8 References...8 Best Practices Planning 3
4 Executive summary Regulatory compliance now makes it imperative that corporations secure sensitive information and articulate how they manage the effectiveness of their security program. Enterprise security teams use Security Information and Event Management (SIEM) products to automate the compliance reporting of security transactions. envision provides security professionals with the essential real-time security intelligence to help identify and understand hacker, virus, and SPAM/spyware behavior to combat security threats and meet compliance auditing requirements. Network Intelligence s 1 envision provides security intelligence across thousands of network devices that have an impact on a company s security framework. envision automatically collects and correlates event data from a variety of heterogeneous multi-vendor network devices and systems including routers, switches, firewalls, VPNs, IDS/IPS systems, proxy servers, antivirus, SPAM, and spyware systems, content filtering and web security appliances. This security information must be stored safely for the duration of its data retention period. The volume of information generated by SIEM necessitates the integration of powerful Network Attached Storage, such as EMC s Celerra. envision helps to eliminate false positives, improve security operations and delivers all necessary tools to meet Sarbanes-Oxley, GLBA, HIPAA, and FISMA compliance. Using the real-time monitoring and correlation analysis, security professionals can quickly and easily gain insight into hacker and virus activity to improve the overall security posture. Introduction envision appliances create thousands of new files every day. Enterprise environments with a large number of monitored devices need a robust storage platform to house the volume of data gathered by envision. Celerra network servers are capable of storing this large volume of data and quickly serving files back to envision for analysis and correlation of network events. Recommendations are provided in this paper that follow known best practices for configuring EMC Celerra in an envision environment. Audience Security or Network Administrators using envision to monitor their networks and servers, envision users that integrate the Celerra storage platform to hold compliance information for their company, and EMC engineers who will deploy Celerra in an envision environment comprise the intended audience for this white paper. Terminology SIEM - Security Information and Event Management Network Intelligence Engine (NIE) - hardware platform running envision software for SIEM Overview envision is made up of three components: - Supports interactive users and runs the suite of analysis tools. Data - Manages access and retrieval of captured events. s - Captures incoming events from network devices. Some NIE series appliances, EX and HA series, are designed to operate in a stand-alone, non-distributed mode. They have all three envision components (,, and Data ) installed on one appliance. The single appliance is a site. The LS series NIE appliances are designed to operate in a distributed installation, where each envision component (,, and Data ) is on its 1 Network Intelligence is a business unit of RSA, the Security Division of EMC Best Practices Planning 4
5 own appliance. All of the appliances together form a site. Multiple appliances allow a variety of installations for the three components to be deployed in order to manage the variety of network infrastructures found in production environments. Each appliance in the site is referred to as a node. s can be local or remote depending on their location in the network. LAN attached collectors are local. WAN separated collectors are remote. The maximum number of s and collectors a site can have is five. If three s are used, then only two s can be implemented. If three s are used, then only two s can be implemented. A site can also support up to 16 Remote s. Remote s have store-andforward technology that allows user-selectable critical events to be processed in real-time, while noncritical events are compressed, securely stored, and locally cached until they can be forwarded to the Data, which send the events on to the Celerra. Only the s and the Data will create directories and write files to the Celerra. Just the Data server will read from the Celerra. Network Administrators or Security Managers will run queries or reports from s that interface with the Data to retrieve alert, log, or security event data. Celerra network servers have been tested with envision at the maximum collection rate per site. The following diagram illustrates the flow of communications and data between envision components and the Celerra. Data Remote (s) Data Remote (s) Celerra File Celerra File Figure 1. Multiple appliance sites with the maximum number of s or s Recommendations Recommendation #1 Whenever possible, ensure that the latest available software code version or patch is installed and active. Keep all software up to date on your systems. The latest versions have upgraded features and higher performance potential for the storage and retrieval of security event information. Best Practices Planning 5
6 Recommendation #2 Use Fibre Channel drives configured for RAID-5. The I/O workload generated by an NIE consists of simultaneous reads and writes. For the most part, the reads are random. This workload is not suitable for ATA drives. Fibre Channel drives should be used due to the random nature of the workload. Recommendation #3 Size the storage environment based upon the number of collectors and the desired event retention period. In order to estimate the Celerra storage sizing, the following factors are multiplied by the Events per second from which daily, monthly, and yearly storage requirements are drawn. This estimate provides the usable space requirements for the disks and does not include hot spare or RAID-5 parity considerations for the Celerra. Events per second - The total number of events per second for all collectors, up to 30,000 events per second per LS site. Event size - The average event size collected from the network. The minimum event size is 160 bytes while the maximum is 2000 bytes, 250 bytes is an accurate norm for storage calculation. EPS duty factor - How much of the potential collection maximum is used on average, for example 50% or 0.50 Hours per day collection - Portion of day that collection is active, for example 9 out of 24 hours or 37.5% of a day. DE factor - Data explosion factor, compression factor when consolidating hourly event files, fixed at 29% Calculations: Events /sec Average event size EPS duty factor Hours per day collection DE factor = bytes /sec bytes per second = bytes per day bytes per day ( ) = GB per day Example using events per second: = 10.9 GB/day = GB/month = GB/year Recommendation #4 Configure Network High Availability on Celerra Data Movers. To protect against Data Mover device or network switch port failure, the Celerra Network provides network high-availability or redundancy through the use of three types of virtual devices: Ethernet channels, EtherChannel, that enable multiple active Ethernet connections to the same switch to appear as a single link. Link aggregation, LACP, that allows Ethernet ports with similar characteristics to the same switch to be combined into a single virtual device/link. Fail-Safe Networks, FSN, that extend link failover out into the network by providing switch-level redundancy. Consider using EtherChannel or LACP along with FSN to sustain network communications. Refer to the Configuring and Managing Celerra Network High Availability technical module for more details. Recommendation #5 Consider using standbys for high availability on the Celerra. Celerra Network protects against hardware or software failure by providing one or more standby Data Movers, and for some Celerra server models, a standby Control Station. The standby Data Mover or Control Station assumes operation from the failed component. Failover occurs when a standby component Best Practices Planning 6
7 takes over for a failed primary component by immediately routing data to an alternate data path or device to avoid interrupting services during a failure. Creating a standby Data Mover assures continuous access to the file systems that NIEs use. Refer to the Configuring Standbys on Celerra technical module for more details. Recommendation #6 When configuring the Celerra, use Automatic Volume Management to create the file systems. Automatic Volume Management is a Celerra Network feature that automates volume creation and management. AVM creates well-designed file system layouts for most situations. AVM reduces the risk of user error during file system configuration and follows backend disk performance best practices as the underlying volumes are created for the new file systems automatically. With Celerra command options and interfaces that support AVM, system defined storage pools create file systems without the need of manual creation and management of stripes, slices, or metavolumes. The clar_r5_performance storage pool will provide optimal performance file systems for envision environments. Refer to the Celerra Network Best Practices for Performance (5.5) paper and the Managing Celerra Volumes and File Systems with Automatic Volume Management technical module for more details. Recommendation #7 Use Automatic File System Extension. The Automatic File System Extension feature allows a file system to be configured to extend automatically, without system administrator intervention, as the file system grows. Automatic File System Extension causes the file system to extend when it reaches a specified usage point, the high water mark. The high water mark is the percentage of the file system that has been consumed and will trigger an Automatic File System Extension. A high water mark of 90% is the default setting. Automatic File System Extension allows the file system to grow as needed without system administrator intervention, making it easier to meet system operations requirements continuously, without interruptions. Refer to the Celerra Network Best Practices for Performance (5.5) paper for more details Recommendation #8 Use NTFS permissions to secure folders on the Celerra file systems that envision is using. Apply the same approach used to secure other sensitive folders. Using NTFS permissions restrict access to the share to only users that need access. envision uses two user accounts to access the Celerra file systems: NIC_System and master. Allow Full Control to the NIC_System and master user accounts. By reducing the number of users allowed to interact with the Celerra folders, envision files can be secured. Refer to the Using Windows Administrative Tools with Celerra technical module for more details. Recommendation #9 Create a separate Celerra file system for each envision collector. Up to three s can be utilized per site. A daily potential of 122,880 files can be written to the Celerra by each, resulting in a total of 368,640 files per day. Having a separate file system in Celerra for each will keep the number of files in each file system manageable. Recommendation #10 Consider using Celerra NDMP Volume Backup, also known as Volume Based Backup, VBB, for the Celerra file systems used by envision. Celerra NDMP Volume Backup (VBB) is a backup feature that improves upon file level backup procedures. VBB is a volume level replication, so it does not track individual files that have changed. Instead, VBB processes file system metadata first, and then transfers used blocks from the volume level rather than from individual files. VBB replicates only the blocks of data that have changed since the last replication, which significantly reduces the amount of data to be transferred. NIEs create a large number of files every day. SIEM environments will benefit from this feature as VBB allows for faster NDMP backups. Refer to EMC 5.5 NDMP Features for more details. Best Practices Planning 7
8 Recommendation #11 Consider using CWORM file level retention on the Celerra file systems. Celerra File-Level Retention Capability (also known as CWORM) allows you to archive data to Write- Once Read-Many (WORM) storage on standard rewriteable magnetic disks. You can write data to a CIFS or NFS file system only once to create a permanent, non-editable set of records that cannot be altered, corrupted, or deleted. SIEM data cannot be lost or removed using CWORM. This protection will help with compliance of security information management. In a CWORM environment, administrators can use WORM protection on a per-file basis. Files can be stored with specified retention periods, which, until expiration, prohibit the files from being deleted. Only an administrator has the ability to delete the CWORM file system. A file in a CWORM file system is in one of three possible states: CLEAN, WORM, or EXPIRED. The administrator manages files in the WORM state by setting retention periods, which until expiration, prevent the files from being deleted. WORM files can be grouped by directory or batch process, thus enabling the administrator to manage the file archives on a file system basis, or to run a script to locate and delete files in the EXPIRED state. The administrator has the ability to delete a CWORM file system, but cannot delete or modify files in the WORM state. The path to a file in the WORM state is also protected from modification, which means that a directory on a CWORM file system cannot be renamed or deleted unless it is empty. A Celerra File-Level Retention Capability enabled file system: Safeguards data while ensuring its integrity and accessibility. Simplifies the task of archiving data for administrators and applications. Improves storage management flexibility and application performance. Refer to the Using Celerra WORM technical module for more details. Conclusion Celerra Network enhances the Network Intelligence environment, safeguarding its file systems and enabling envision Data s to quickly respond to requests. Security officers must be able to run reports or mine event data quickly to interpret activities in their network and respond to possible threats. Celerra offers envision a scalable storage platform that can expand over time and comply with data retention regulations. Security event information must be stored for the duration of its data retention period. Organizations that do not address data retention requirements face significant fines and penalties that can cripple business or even put an organization out of business. References Configuring and Managing Celerra Network High Availability available at Powerlink.EMC.com Using Windows Administrative Tools with Celerra available at Powerlink.EMC.com Managing Celerra Volumes and File Systems with Automatic Volume Management technical module available at Powerlink.EMC.com Using Celerra WORM technical module available at Powerlink.EMC.com Configuring Standbys on Celerra technical module available at Powerlink.EMC.com EMC 5.5 NDMP Features available at Powerlink.EMC.com Celerra Network Best Practices for Performance (5.5) available on NSPEED 2 2 Available to NSPEED gurus For a list of NSPEED gurus, go to Best Practices Planning 8
Clavister InSight TM. Protecting Values
Clavister InSight TM Clavister SSP Security Services Platform firewall VPN termination intrusion prevention anti-virus anti-spam content filtering traffic shaping authentication Protecting Values & Enterprise-wide
More informationEMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
More informationIBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
More informationQRadar Security Intelligence Platform Appliances
DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management
More informationEMC DOCUMENTUM xplore 1.1 DISASTER RECOVERY USING EMC NETWORKER
White Paper EMC DOCUMENTUM xplore 1.1 DISASTER RECOVERY USING EMC NETWORKER Abstract The objective of this white paper is to describe the architecture of and procedure for configuring EMC Documentum xplore
More informationCONFIGURATION GUIDELINES: EMC STORAGE FOR PHYSICAL SECURITY
White Paper CONFIGURATION GUIDELINES: EMC STORAGE FOR PHYSICAL SECURITY DVTel Latitude NVMS performance using EMC Isilon storage arrays Correct sizing for storage in a DVTel Latitude physical security
More informationEMC Backup and Recovery for Microsoft Exchange 2007 SP2
EMC Backup and Recovery for Microsoft Exchange 2007 SP2 Enabled by EMC Celerra and Microsoft Windows 2008 Copyright 2010 EMC Corporation. All rights reserved. Published February, 2010 EMC believes the
More informationEMC Backup and Recovery for Microsoft SQL Server
EMC Backup and Recovery for Microsoft SQL Server Enabled by Quest LiteSpeed Copyright 2010 EMC Corporation. All rights reserved. Published February, 2010 EMC believes the information in this publication
More informationEMC Backup and Recovery for Microsoft SQL Server
EMC Backup and Recovery for Microsoft SQL Server Enabled by EMC NetWorker Module for Microsoft SQL Server Copyright 2010 EMC Corporation. All rights reserved. Published February, 2010 EMC believes the
More informationEMC Data Domain Boost for Oracle Recovery Manager (RMAN)
White Paper EMC Data Domain Boost for Oracle Recovery Manager (RMAN) Abstract EMC delivers Database Administrators (DBAs) complete control of Oracle backup, recovery, and offsite disaster recovery with
More informationEMC CENTERA VIRTUAL ARCHIVE
White Paper EMC CENTERA VIRTUAL ARCHIVE Planning and Configuration Guide Abstract This white paper provides best practices for using EMC Centera Virtual Archive in a customer environment. The guide starts
More informationEMC Disk Library with EMC Data Domain Deployment Scenario
EMC Disk Library with EMC Data Domain Deployment Scenario Best Practices Planning Abstract This white paper is an overview of the EMC Disk Library with EMC Data Domain deduplication storage system deployment
More informationUnderstanding EMC Avamar with EMC Data Protection Advisor
Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features that reduce the complexity of managing data protection
More informationEMC Unified Storage for Microsoft SQL Server 2008
EMC Unified Storage for Microsoft SQL Server 2008 Enabled by EMC CLARiiON and EMC FAST Cache Reference Copyright 2010 EMC Corporation. All rights reserved. Published October, 2010 EMC believes the information
More informationQRadar SIEM 6.3 Datasheet
QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar
More informationEMC VNXe HIGH AVAILABILITY
White Paper EMC VNXe HIGH AVAILABILITY Overview Abstract This white paper discusses the high availability (HA) features in the EMC VNXe system and how you can configure a VNXe system to achieve your goals
More informationIsilon OneFS. Version 7.2.1. OneFS Migration Tools Guide
Isilon OneFS Version 7.2.1 OneFS Migration Tools Guide Copyright 2015 EMC Corporation. All rights reserved. Published in USA. Published July, 2015 EMC believes the information in this publication is accurate
More informationSymantec NetBackup OpenStorage Solutions Guide for Disk
Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a
More informationSymantec Security Information Manager 4.8 Release Notes
Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes The software described in this book is furnished under a license agreement and may be used
More informationEMC Integrated Infrastructure for VMware
EMC Integrated Infrastructure for VMware Enabled by EMC Celerra NS-120 Reference Architecture EMC Global Solutions Centers EMC Corporation Corporate Headquarters Hopkinton MA 01748-9103 1.508.435.1000
More informationCONFIGURATION BEST PRACTICES FOR MICROSOFT SQL SERVER AND EMC SYMMETRIX VMAXe
White Paper CONFIGURATION BEST PRACTICES FOR MICROSOFT SQL SERVER AND EMC SYMMETRIX VMAXe Simplified configuration, deployment, and management for Microsoft SQL Server on Symmetrix VMAXe Abstract This
More informationVirtualizing SQL Server 2008 Using EMC VNX Series and Microsoft Windows Server 2008 R2 Hyper-V. Reference Architecture
Virtualizing SQL Server 2008 Using EMC VNX Series and Microsoft Windows Server 2008 R2 Hyper-V Copyright 2011 EMC Corporation. All rights reserved. Published February, 2011 EMC believes the information
More informationSymantec Security Information Manager - Best Practices for Selective Backup and Restore
Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best practices for selective backup and restore The software described in
More informationWHITEPAPER: Understanding Pillar Axiom Data Protection Options
WHITEPAPER: Understanding Pillar Axiom Data Protection Options Introduction This document gives an overview of the Pillar Data System Axiom RAID protection schemas. It does not delve into corner cases
More informationIBM QRadar Security Intelligence Platform appliances
IBM QRadar Security Intelligence Platform Comprehensive, state-of-the-art solutions providing next-generation security intelligence Highlights Get integrated log management, security information and event
More informationEMC Virtual Infrastructure for Microsoft SQL Server
Microsoft SQL Server Enabled by EMC Celerra and Microsoft Hyper-V Copyright 2010 EMC Corporation. All rights reserved. Published February, 2010 EMC believes the information in this publication is accurate
More informationIsilon OneFS. Version 7.2. OneFS Migration Tools Guide
Isilon OneFS Version 7.2 OneFS Migration Tools Guide Copyright 2014 EMC Corporation. All rights reserved. Published in USA. Published November, 2014 EMC believes the information in this publication is
More informationEMC Business Continuity for Microsoft SQL Server 2008
EMC Business Continuity for Microsoft SQL Server 2008 Enabled by EMC Celerra Fibre Channel, EMC MirrorView, VMware Site Recovery Manager, and VMware vsphere 4 Reference Architecture Copyright 2009, 2010
More informationRSA Solution Brief. RSA envision. Platform. Compliance and Security Information Management. RSA Solution Brief
RSA Solution Brief RSA envision Compliance and Security Information Management Platform RSA Solution Brief Actionable Compliance and Security Intelligence RSA envision technology is an information management
More informationSymantec Security Information Manager 4.7.4 Administrator Guide
Symantec Security Information Manager 4.7.4 Administrator Guide Symantec Security Information Manager 4.7.4 Administrator Guide The software described in this book is furnished under a license agreement
More informationEMC VNXe File Deduplication and Compression
White Paper EMC VNXe File Deduplication and Compression Overview Abstract This white paper describes EMC VNXe File Deduplication and Compression, a VNXe system feature that increases the efficiency with
More informationEMC Symmetrix Data at Rest Encryption
Detailed Review Abstract This white paper provides a detailed description of EMC Symmetrix Data at Rest Encryption features and operations. March 2011 Copyright 2010, 2011 EMC Corporation. All rights reserved.
More informationUnderstanding EMC Avamar with EMC Data Protection Advisor
Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection
More informationEMC ViPR Controller. Version 2.4. User Interface Virtual Data Center Configuration Guide 302-002-416 REV 01 DRAFT
EMC ViPR Controller Version 2.4 User Interface Virtual Data Center Configuration Guide 302-002-416 REV 01 DRAFT Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published November,
More informationVIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS
VIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS Successfully configure all solution components Use VMS at the required bandwidth for NAS storage Meet the bandwidth demands of a 2,200
More informationSolution Overview 4 Layers...2. Layer 1: VMware Infrastructure 3...2. Components of the VMware infrastructure...2
Contents Overview...1 Key Implementation Challenges...1 Providing a Solution through Virtualization...1 Benefits of Running SQL Server with VMware Infrastructure...1 Solution Overview 4 Layers...2 Layer
More informationEMC DATA DOMAIN OPERATING SYSTEM
ESSENTIALS HIGH-SPEED, SCALABLE DEDUPLICATION Up to 58.7 TB/hr performance Reduces protection storage requirements by 10 to 30x CPU-centric scalability DATA INVULNERABILITY ARCHITECTURE Inline write/read
More informationEMC Integrated Infrastructure for VMware
EMC Integrated Infrastructure for VMware Enabled by Celerra Reference Architecture EMC Global Solutions Centers EMC Corporation Corporate Headquarters Hopkinton MA 01748-9103 1.508.435.1000 www.emc.com
More informationGet Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : E22-290 Title : EMC Data Domain Deduplication, Backup and Recovery Exam Version : DEMO 1.A customer has a Data Domain system with
More informationSQL Server Database Administrator s Guide
SQL Server Database Administrator s Guide Copyright 2011 Sophos Limited. All rights reserved. No part of this publication may be reproduced, stored in retrieval system, or transmitted, in any form or by
More informationVeeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
More informationAUTOMATED DATA RETENTION WITH EMC ISILON SMARTLOCK
White Paper AUTOMATED DATA RETENTION WITH EMC ISILON SMARTLOCK Abstract EMC Isilon SmartLock protects critical data against accidental, malicious or premature deletion or alteration. Whether you need to
More informationOnline Transaction Processing in SQL Server 2008
Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,
More informationProtect Microsoft Exchange databases, achieve long-term data retention
Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...
More informationEMC Celerra Version 5.6 Technical Primer: Control Station Password Complexity Policy Technology Concepts and Business Considerations
EMC Celerra Version 5.6 Technical Primer: Control Station Password Complexity Policy Technology Concepts and Business Considerations Abstract This white paper presents a high-level overview of the EMC
More informationImplementing Offline Digital Video Storage using XenData Software
using XenData Software XenData software manages data tape drives, optionally combined with a tape library, on a Windows Server 2003 platform to create an attractive offline storage solution for professional
More informationSymantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
More informationEMC Celerra Unified Storage Platforms
EMC Solutions for Microsoft SQL Server EMC Celerra Unified Storage Platforms EMC NAS Product Validation Corporate Headquarters Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2008, 2009 EMC
More informationEMC DATA DOMAIN OPERATING SYSTEM
EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 58.7 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive
More informationXenData Archive Series Software Technical Overview
XenData White Paper XenData Archive Series Software Technical Overview Advanced and Video Editions, Version 4.0 December 2006 XenData Archive Series software manages digital assets on data tape and magnetic
More informationWorkflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
More informationSecurity Information Lifecycle
Security Information Lifecycle By Eric Ogren Security Analyst, April 2006 Copyright 2006. The, Inc. All Rights Reserved. Table of Contents Executive Summary...2 Figure 1... 2 The Compliance Climate...4
More informationIntegration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide
Integration Guide EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide August 2013 Copyright 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate
More informationMICROSOFT HYPER-V SCALABILITY WITH EMC SYMMETRIX VMAX
White Paper MICROSOFT HYPER-V SCALABILITY WITH EMC SYMMETRIX VMAX Abstract This white paper highlights EMC s Hyper-V scalability test in which one of the largest Hyper-V environments in the world was created.
More informationCisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation
Solution Overview Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation IT organizations face challenges in consolidating costly and difficult-to-manage branch-office
More informationEMC Business Continuity for Microsoft SQL Server Enabled by SQL DB Mirroring Celerra Unified Storage Platforms Using iscsi
EMC Business Continuity for Microsoft SQL Server Enabled by SQL DB Mirroring Applied Technology Abstract Microsoft SQL Server includes a powerful capability to protect active databases by using either
More informationIBM System Storage DS5020 Express
IBM DS5020 Express Manage growth, complexity, and risk with scalable, high-performance storage Highlights Mixed host interfaces support (Fibre Channel/iSCSI) enables SAN tiering Balanced performance well-suited
More informationAX4 5 Series Software Overview
AX4 5 Series Software Overview March 6, 2008 This document presents an overview of all software you need to configure and monitor any AX4 5 series storage system running the Navisphere Express management
More informationHigh Availability and Disaster Recovery Solutions for Perforce
High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce
More informationnwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
More informationEMC Data Domain Boost for Oracle Recovery Manager (RMAN)
White Paper EMC Data Domain Boost for Oracle Recovery Manager (RMAN) Abstract EMC delivers Database Administrators (DBAs) complete control of Oracle backup, recovery, and offsite disaster recovery with
More informationACHIEVING STORAGE EFFICIENCY WITH DATA DEDUPLICATION
ACHIEVING STORAGE EFFICIENCY WITH DATA DEDUPLICATION Dell NX4 Dell Inc. Visit dell.com/nx4 for more information and additional resources Copyright 2008 Dell Inc. THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES
More informationArchive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration
Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta
More informationSecurity Information and Event Management Introduction to envision: The Information Management Platform for Security and Compliance Operations Success
Security Information and Event Management Introduction to envision: The Information Management Platform for Security and Compliance Operations Success Copyright 2008 EMC Corporation. All rights reserved.
More informationEMC Storage Administrator for Exchange SMB Edition
EMC White Paper EMC Storage Administrator for Exchange SMB Edition Product Overview Abstract: This white paper examines the storage management technologies available with EMC Storage Administrator for
More informationBig data management with IBM General Parallel File System
Big data management with IBM General Parallel File System Optimize storage management and boost your return on investment Highlights Handles the explosive growth of structured and unstructured data Offers
More informationEMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION Automated file synchronization Flexible, cloud-based administration Secure, on-premises storage EMC Solutions January 2015 Copyright 2014 EMC Corporation. All
More informationHow To Protect Data On Network Attached Storage (Nas) From Disaster
White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains
More informationEMC AVAMAR INTEGRATION WITH EMC DATA DOMAIN SYSTEMS
EMC AVAMAR INTEGRATION WITH EMC DATA DOMAIN SYSTEMS A Detailed Review ABSTRACT This white paper highlights integration features implemented in EMC Avamar with EMC Data Domain deduplication storage systems
More informationEMC Documentum Repository Services for Microsoft SharePoint
EMC Documentum Repository Services for Microsoft SharePoint Version 6.5 SP2 Installation Guide P/N 300 009 829 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com
More informationIBM CommonStore email Archiving Preload Solution
Designed to simplify e-mail archiving to help support data protection, governance and compliance IBM CommonStore email Archiving Preload Solution Highlights This solution can help small to This end-to-end
More informationMicrosoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,
More informationEMC NetWorker and Replication: Solutions for Backup and Recovery Performance Improvement
EMC NetWorker and Replication: Solutions for Backup and Recovery Performance Improvement A Detailed Review Abstract Recovery management, the next phase in the evolution of backup and data protection methodologies,
More informationHow To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
More informationEMC VNXe Series Using a VNXe System with CIFS Shared Folders
EMC VNXe Series Using a VNXe System with CIFS Shared Folders VNXe Operating Environment Version 2.4 P/N 300-010-548 REV 04 Connect to Storage Copyright 2013 EMC Corporation. All rights reserved. Published
More informationWindows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology
Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication
More informationVicom Storage Virtualization Engine. Simple, scalable, cost-effective storage virtualization for the enterprise
Vicom Storage Virtualization Engine Simple, scalable, cost-effective storage virtualization for the enterprise Vicom Storage Virtualization Engine (SVE) enables centralized administration of multi-platform,
More informationUsing HP StoreOnce Backup systems for Oracle database backups
Technical white paper Using HP StoreOnce Backup systems for Oracle database backups Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key features and benefits 2 HP StoreOnce
More informationEMC Celerra NS Series/Integrated
Data Sheet EMC Celerra NS Series/Integrated High-end features in a mid-tier IP Storage solution: NS20, NS40, NS80 The Big Picture Ensure no-compromise availability through integrated advanced clustering,
More informationEMC NetWorker. Server Disaster Recovery and Availability Best Practices Guide. Release 8.0 Service Pack 1 P/N 300-999-723 REV 01
EMC NetWorker Release 8.0 Service Pack 1 Server Disaster Recovery and Availability Best Practices Guide P/N 300-999-723 REV 01 Copyright 1990-2012 EMC Corporation. All rights reserved. Published in the
More informationVMware Site Recovery Manager with EMC RecoverPoint
VMware Site Recovery Manager with EMC RecoverPoint Implementation Guide EMC Global Solutions Centers EMC Corporation Corporate Headquarters Hopkinton MA 01748-9103 1.508.435.1000 www.emc.com Copyright
More information16 TB of Disk Savings and 3 Oracle Applications Modules Retired in 3 Days: EMC IT s Informatica Data Retirement Proof of Concept
16 TB of Disk Savings and 3 Oracle Applications Modules Retired in 3 Days: EMC IT s Informatica Data Retirement Proof of Concept Applied Technology Abstract This white paper illustrates the ability to
More informationEMC Virtual Infrastructure for SAP Enabled by EMC Symmetrix with Auto-provisioning Groups, Symmetrix Management Console, and VMware vcenter Converter
EMC Virtual Infrastructure for SAP Enabled by EMC Symmetrix with Auto-provisioning Groups, VMware vcenter Converter A Detailed Review EMC Information Infrastructure Solutions Abstract This white paper
More informationOptimizing Large Arrays with StoneFly Storage Concentrators
Optimizing Large Arrays with StoneFly Storage Concentrators All trademark names are the property of their respective companies. This publication contains opinions of which are subject to change from time
More informationSynology High Availability (SHA)
Synology High Availability (SHA) Based on DSM 5.1 Synology Inc. Synology_SHAWP_ 20141106 Table of Contents Chapter 1: Introduction... 3 Chapter 2: High-Availability Clustering... 4 2.1 Synology High-Availability
More informationIBM Software InfoSphere Guardium. Planning a data security and auditing deployment for Hadoop
Planning a data security and auditing deployment for Hadoop 2 1 2 3 4 5 6 Introduction Architecture Plan Implement Operationalize Conclusion Key requirements for detecting data breaches and addressing
More informationPharos Uniprint 8.4. Maintenance Guide. Document Version: UP84-Maintenance-1.0. Distribution Date: July 2013
Pharos Uniprint 8.4 Maintenance Guide Document Version: UP84-Maintenance-1.0 Distribution Date: July 2013 Pharos Systems International Suite 310, 80 Linden Oaks Rochester, New York 14625 Phone: 1-585-939-7000
More informationConnectivity. SWIFTNet Link 7.0. Functional Overview
Connectivity SWIFTNet Link 7.0 Functional Overview December 2010 SWIFTNet Link 7.0 Table of Contents 1 Introduction... 3 2 Enhancements and features... 4 2.1 Message and File Copy... 4 2.2 Message and
More informationEMC VNX2 Deduplication and Compression
White Paper VNX5200, VNX5400, VNX5600, VNX5800, VNX7600, & VNX8000 Maximizing effective capacity utilization Abstract This white paper discusses the capacity optimization technologies delivered in the
More informationEMC VNXe3200 UFS64 FILE SYSTEM
White Paper EMC VNXe3200 UFS64 FILE SYSTEM A DETAILED REVIEW Abstract This white paper explains the UFS64 File System architecture, functionality, and features available in the EMC VNXe3200 storage system.
More informationEoin Thornton Senior Security Architect Zinopy Security Ltd.
RSA envision: Transform your Security Operations A Technical overview & demo of RSA envision The Information Log Management Platform for Security and Compliance Success Eoin Thornton Senior Security Architect
More informationABSTRACT. February, 2014 EMC WHITE PAPER
EMC APPSYNC SOLUTION FOR MANAGING PROTECTION OF MICROSOFT SQL SERVER SLA-DRIVEN, SELF-SERVICE CAPABILITIES FOR MAXIMIZING AND SIMPLIFYING DATA PROTECTION AND RECOVERABILITY ABSTRACT With Microsoft SQL
More informationCA arcserve Unified Data Protection Agent for Linux
CA arcserve Unified Data Protection Agent for Linux User Guide Version 5.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as
More informationEMC UNISPHERE FOR VNXe: NEXT-GENERATION STORAGE MANAGEMENT A Detailed Review
White Paper EMC UNISPHERE FOR VNXe: NEXT-GENERATION STORAGE MANAGEMENT A Detailed Review Abstract This white paper introduces EMC Unisphere for VNXe, a web-based management environment for creating storage
More informationEMC SOLUTION FOR SPLUNK
EMC SOLUTION FOR SPLUNK Splunk validation using all-flash EMC XtremIO and EMC Isilon scale-out NAS ABSTRACT This white paper provides details on the validation of functionality and performance of Splunk
More informationPreface... 1. Introduction... 1 High Availability... 2 Users... 4 Other Resources... 5 Conventions... 5
Table of Contents Preface.................................................... 1 Introduction............................................................. 1 High Availability.........................................................
More informationBackup Solutions for the Celerra File Server
White Paper Backup Solutions for the Celerra File Server EMC Corporation 171 South Street, Hopkinton, MA 01748-9103 Corporate Headquarters: 508) 435-1000, (800) 424-EMC2 Fax: (508) 435-5374, Service: (800)
More informationGFI Product Manual. Deployment Guide
GFI Product Manual Deployment Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of
More informationAND Recorder 5.4. Overview. Benefits. Datenblatt
Datenblatt AND Recorder 5.4 Using affordable call recording enables you to comply with legal and regulatory obligations. These requirements are easily achieved by deploying a secure call recording solution
More informationIncreasing Recoverability of Critical Data with EMC Data Protection Advisor and Replication Analysis
Increasing Recoverability of Critical Data with EMC Data Protection Advisor and Replication Analysis A Detailed Review Abstract EMC Data Protection Advisor (DPA) provides a comprehensive set of features
More information