Uninett seminar, Tromsø 12/ Jan Harald Østbye

Size: px
Start display at page:

Download "Uninett seminar, Tromsø 12/4-2010 Jan Harald Østbye"

Transcription

1 Uninett seminar, Tromsø 12/ Jan Harald Østbye Enterprise Account Manager 1

2 Symantec At a Glance Founded in 1982 IPO in 1989 More than 17,500 employees Operations in more than 40 countries #419 on the 2009 Fortune percent of Fortune 1000 companies are customers $6.2 billion revenue in FY 2009 More than 600 global patents More than 120 million active consumer users 110 million enterprise customers Invests 13% of annual revenue in R&D 2 2

3 Expanding the Enterprise Portfolio $5.93 billion $5.25 billion $2.6 billion Peter Norton Computing $53 million $530 million $750 million $1.07 billion $1.4 billion $1.9 billion /7 PC desktop protection PC desktop storage Enterprise security Global intelligence & managed services Enterprise security & application management Message management & archiving Availability & compliance End point compliance, data center management, data loss prevention 2008 Software distribution & workflow 3

4 Strategic Priorities & Enterprise Solutions STRATEGIC PRIORITIES: Enterprise Security & Management Data Center Optimization SOLUTIONS: Endpoint Management Security Management IT Compliance Storage Management Disaster Recovery IT Service Management Endpoint Virtualization Endpoint Security Messaging Security Discovery & Retention Management Data Loss Prevention Archiving Data Protection High Availability Virtualization Management Web Security Green IT 4

5 Market MARKET SHARE LEADERSHIP GARTNER MAGIC QUADRANTS: LEADERS Endpoint Protection Platforms 10 Archiving 11 Content Monitoring and Filtering for Data Loss Prevention 12 Security Boundary 13 PC Configuration Life Cycle Management 14 Storage Services 15 Security Information and Event Management 16 Managed Security Service Providers 17 #1 in Endpoint Security Software (40% Share) 1 #1 in Security Software (31% share) 2 #1 in Secure Content and Threat Management (18% share) 3 #1 in Data Protection and Recovery (37% share) 4 #1 in Core Storage Management (35% share ) 5 #1 in Messaging Security Management (18% share ) 6 #1 in Archiving Applications (23% share) 7 #1 in Software Distribution (19% share) 8 #1 in Security and Vulnerability Management (9% share) 9 FORRESTER WAVES: A LEADER Enterprise Database Monitoring and Real-Time Protection 18 Client Management Suites 19 Enterprise Security Information Management 20 Information Leak Prevention 21 IT Asset Management 22 Message Archiving Wave 23 5

6 In a connected world Information is everything In the Business World In the Consumer World Confidential & IP Identity Regulated or Private Parental Controls Business Operations Workplace Content Digital Music Photos and Files Financial Transactions Financial Records 487 exabytes growing 51% annually 6

7 Today s reality More risks, more demands, smaller budgets Technology Sprawl = Added Risk Relentless demand, financial pressure 6X growth in storage from 07 to 11 Datacenter energy costs double every five years The average storage utilization is only 35% People, business and technology inseparable More risks, bigger consequences Blocked more than 250 million attempted malicious attacks per month 1.6+ million new malicious code signatures more than last 17 years combined Information mobility puts risk everywhere Computing + Virtual Platforms Operating Systems Delivery Models Electronic Communications Pervasive Networks Devices 7

8 Protection Suite 3.0 Enterprise Edition 8

9 Symantec Global Intelligence Network Vulnerability Database Fraud: Spam & Phishing Honeypot Network 25,000+ vulnerabilities in database 2+ Million Probe Network Accounts Virtual network of IP addresses 55,000+ technologies from over 8000 vendors Statistics on 1+ Billion messages a day Geo-location capabilities on servers and zombies Capturing previously unseen threats and attack methods 2B+ events logged daily Over 100,000 security alerts generated annually 200,000 daily code submissions Managed devices in 70+ countries 40,000+ Sensors in 200+ Countries 120 Million Threat/ Virus Submission Systems Symantec Brightmail Gateway 9 9

10 Threat Overview A New Threat Landscape Requires a Different Approach 91% of all breaches are now driven by highly resourced organized criminals Point solutions leave gaps multi-protocol converged threat analysis and unrivaled accuracy are essential Early warning systems were built for the old style mass mailing viruses not targeted attacks or smaller attacks from thousands of attackers 67% of data breaches happen because of the mistakes of well-meaning insiders Source: Verizon Business Risk Team, 2009 Data Breach Investigations Report Symantec Hosted Services Add-On Options for Symantec Protection Suites 10

11 Threat Overview Virus Trends Over Six Months 1 in s contained a virus An estimated 100 billion spam messages per day were driven by botnets 1 in s was a phishing attempt Proactive, up-to-the-minute intelligence is needed to meet this volume in real time Source: MessageLabs Intelligence February 2010 Symantec Hosted Services Add-On Options for Symantec Protection Suites 11

12 Threat Overview The Web and Web 2.0 Use Increase Risks An average of 4,998 new Websites are identified each day harboring malware 80% of malicious domains are legitimate domains which have been compromised Proactive protection with up-to-the-minute intelligence is needed to meet this volume in real time Source: MessageLabs Intelligence February 2010 Symantec Hosted Services Add-On Options for Symantec Protection Suites 12

13 The Endpoint Security Challenge Many threats to data Hackers, viruses, worms, spyware, malware, day-zero exploits Careless or malicious insiders leaking or stealing confidential data Confidential data inappropriately stored on an endpoint Mobile users connecting to untrusted networks or web sites Unpatched endpoints or contractor/temp laptops Many endpoint entry and exit points for data USB, CD/DVD, printer, Infrared, Bluetooth Network-based apps: , web, IM, FTP, P2P Open firewall ports Lost or stolen laptops or removable media How to solve with endpoint software Multiple vendors without a complete product offering Suite offerings may sacrifice functionality or be unproven Need a best of breed yet comprehensive solution from a single vendor

14 Symantec Protection Suite Enterprise Edition Symantec Protection Suite Enterprise Edition Endpoint Security Symantec Endpoint Protection Symantec Network Access Control Self Enforcement NEW! Symantec AntiVirus for Mac Symantec AntiVirus for Linux Symantec Mobile AntiVirus for Windows Mobile Messaging & Web Security Symantec Brightmail Gateway Symantec Web Gateway NEW! Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Domino Symantec Premium AntiSpam Backup and Recovery Symantec Backup Exec System Recovery Desktop Edition NEW! 14

15

16 Award Modular BIOS v6.473, an Energy Star Ally Copyright {C} , Award Software Inc. System Recovery The New, Automated Way Pentium 4 Centrino Mobile Processor Memory Test: 1024MB OK Award Plug and Play BIOS Extension v1.0a Copyright {C} 1995, Award Software Inc. Detecting primary master hard disk... FAILED Device I/O error: Unable to read sector 0 on primary hard disk Press any key to reboot... Press DEL to enter SETUP 2/16/2008 W3HU4-877FH4-08

17 Are Your Systems Indestructible? 85% of Systems Are Not Backed Up 53% of Loss Due to H/W or S/W 38% of Loss Due to Human Error Typical Recovery Time 6 8 hrs. You DO NOT need a major disaster to need rapid system recovery. Everyday occurrences cause a system loss. 17

18 Complete Protection For Any Size Organization NetBackup 500+ employees >$150m revenue Backup Exec s of servers Specialized backup team employees Data center focus Backup Exec System Recovery $50-$150m revenue s of servers employees <$50m revenue 1-4 servers 1-2 general IT staff Windows server focus Offsite/ Vault No IT staff Windows desktop & server Data Center Data Center Main/Remote Office Remote Office Remote Office Server, Desktops & Laptops Servers, Desktops & Laptops Desktops & Laptops Desktops & Laptops Desktops & Laptops Symantec Backup Exec

19 A History of Leadership in the Backup & Archive Market for Over a Decade Leading Customer Validation 99% of the Fortune % of the Global Million savvy small / medium businesses #1 Backup Market Share #1 Archiving Market Share 10 of 10 leading telecommunication companies 10 of 10 leading healthcare companies 10 of 10 leading financial services companies Leading Analyst Recognition Leading Backup Vision Leading Archiving Vision 19

20 Net Backup 7 20

21 Symantec s Prescription For Better Data Protection Deduplicate Everywhere To Rationalize Infrastructure Archive for Long Term Storage & Improve Backup Performance Centralize Management To Reduce Complexity 21

22 Deduplicate Everywhere, Closer to the Source Primary Storage Client Servers Media Server Backup Appliance Archive data off primary storage & dedupe data Deduplicate at the client Deduplicate at the media server New in NetBackup 7 Integrate with appliances via OpenStorage RESULTS Faster backup & recovery Reduced bandwidth Less storage requirements Optimized search/discovery 22

23 Dedupe for any Enterprise Easy & Cost Effective Fully Integrated Easy to Configure NetBackup Client Configuration Cost Effective & Flexible NetBackup 7 SAN/ DAS Commodity disk Front-end licensing - Keep as many copies as you want Proven Technology Site 1 SAN/ DAS NetBackup 7 Replication Site 2 PureDisk Storage NetBackup 7 * Assumes replication 23

24 What Sets NetBackup Deduplication Apart Built-in, easy to use No expensive hardware Lower TCO than Appliances Proven Product Line, Proven Technology Works out of the box. No additional setup required Use commodity hardware of choice Up to 50-70% less than appliance solutions (assumes replication) Built into NetBackup, based on PureDisk Dedupe Technology Investment Protection Dedupe value wherever needed- Source, Media Server, Appliance 24

25 If You Like Deduplication You ll Love Archiving Improve Backup & Search Regardless of NetBackup Version No Archiving Archiving / SharePoint / File Servers 200 GB 15MB/s or 54GB/h / SharePoint / File Servers 100 GB ~4 hrs 80 GB ~2 hrs Enterprise Vault Backups Backups A typical client with 200GB of data would take ~4 hours to complete a full backup. With archiving content is reduced by 50% leaving 100GB of data backed up in ~2 hrs. Archive backed up separately. 25

26 NetBackup 7 Simple & Comprehensive Protection for Virtual Machines Improve How You Protect Any Virtual Machine with NetBackup Shorten Backup Time by 50-90% old 90% new Client-side deduplication & unique incremental backup support Lower impact backups for Hyper-V & VMware (using vstorage API) Find & Recover Files Instantly Recovery VM File 1.. File 2.. VM Backup Storage Simple recovery process - Guided VM recovery Instant file recovery - ANY type of backup disk tape Greater Storage Efficiency VM VM VM Hypervisor Deduplication across physical & virtual Store less with VMware block optimization 26

27 Better Disaster Recovery for Global Data Protection One Console To View Distributed Backup Information Replicate & Store 80% Less Data Duplication Recover terabytes of data in seconds from anywhere 27

28 Move Up to 80% Less Data With Optimized Duplication One Policy for Backup & DR Copies Site 1 Site 2 SAN/ DAS Optimized Duplication Copy 1: 14 days Copy 2: 21 days Copy 3: 60 days OST Optimized Duplication OST Copy 1: 14 days Copy 2: 21 days OST=OpenStorage Appliance (e.g., Data Domain) 28

29 Improve Backup Operations With NetBackup OpsCenter and OpsCenter Analytics Monitoring, Reporting & Alerts Across Sites Consolidate Backup & Archive Reports NetBackup, Backup Exec, & Enterprise Vault OpsCenter Analytics Turn on SLAs, forecasting with a key IMPROVED USABILITY 29

30 NetBackup 7 Other Enhancements Full Support for New Windows Platforms and Applications Full support for Windows Server 2008 R2 Full support for Exchange 2010 and Enterprise Vault 8 Oracle Cloning Use a backup to reduce the impact of cloning on production databases Simplified Licensing License Virtual Machines Protection per physical host (no OS distinction) New Terabyte Based Licensing Model that includes clients 30

31 FileStore

32 FileStore Continues Symantec s File System Leadership File System 1991 Clustered File System FileStore App App App / Clustered NFS App SF SF CFS FileStore Storage Foundation First journaled UNIX file system CFS Mission critical transactional apps (RAC, SAP, Tibco) FileStore Enterprise and high performance file serving 32

33 FTP Clients CIFS NFS A Scalable Architecture FileStore NAS Storage Arrays FC-SAN / SAS / iscsi LAN / WAN / Cloud FileStore Core Technology ( up to 16 nodes) Veritas Cluster File System Veritas Cluster Volume Mgr Veritas Cluster Server 33

34 Delivery Options FileStore can be delivered in two ways: 1 Soft-appliance: A software package that can be installed on off-the-shelf hardware. Reference configurations available for major hardware vendors. 2 OEM: System vendors offer storage solutions based on Symantec FileStore products. 34

35 Exceptional Scaling of Both Performance and Capacity Performance Scaling: Industry-leading performance Up to 16 nodes serving a common set of data Excellent small and large file performance Capacity Scaling: 256TB file systems 200 million files per file system 2PB clusters Availability: <20sec failover times SPECsfs 2008 IOPS Ranking #1 FileStore 176,728 ops/sec #2 BlueArc 146K ops/sec #3 HP 135K ops/sec (using VxFS) #5 NetApp FAS K ops/sec Linear scaling 35 35

36 Drive Price An Information Services Platform Dynamic Storage Tiering Intelligently move data to low-cost disk (and back) Anti-Virus Reduce costs with native virus scanning SSD SAS SATA AV Symantec AV FileStore Backup Decrease backup windows with embedded NetBackup Higher performance Simpler administration Fewer servers required 36

37 Performance Requirement A Flexible NAS Platform That Fits Many Workloads FileStore Customers * Regional Hospital (PACS) * Internet Game (Live Game Sessions) * University (Document Library) * Top-3 Mobile Provider (Media Delivery) * Top-10 Internet Retailer (Online Images) Why is FileStore used so broadly? Performance/feature benefits across workloads. Easy scaling from small to large workloads. Best in class price / performance 10TB Scale Requirement 2PB 37

38 Appendix 38

39 Account Manager Jan Harald Østbye DDI: Mobile: Specialist Sales Endpoint Management/Security Roger Ison-Haug Tlf: Symantec Services Ulf Trapp Tlf: Technical Support Tlf: Customer Care Tlf: Presales Manager, Datacenter Kåre Juvkam Tlf: Security Gunnar Kopperud Tlf: ILM/GRC Paul-Christian Garpe Tlf:

40 Source: Industry Recognition 1 IDC, Worldwide Endpoint Security Software Forecast and 2006 Vendor Shares: How Suite It Is, Kolodgy, December Based on new license revenue, Gartner Dataquest, Market Share: Security Software, Worldwide, 2006, Latimer-Livingston, July IDC, Worldwide Secure Content and Threat Management Forecast and 2006 Vendor Shares:1+1=4, #207523, June IDC, Worldwide Data Protection and Recovery Software 2006 Vendor Shares, Doc # , December Gartner Report, Market Share: Storage Management Software, Worldwide, 2006, Alan Dayley, January, 1, IDC, Worldwide Messaging Security Forecast and 2006 Vendor Shares: DLP, Encryption, and Hosted Services Heating Up, Dec IDC, Worldwide Archiving Applications Forecast and 2006 Vendor Shares, May IDC, Worldwide Software Distribution Forecast and 2006 Vendor Shares, Broussard, December 2007 Doc # IDC, Worldwide Security and Vulnerability Management Software Forecast and Analysis, Kolodgy-Ryan, Aug Doc # Gartner, Magic Quadrant for Endpoint Protection Platforms, Firstbrook, Hallawell, Girard, MacDonald, December 21, Gartner, Magic Quadrant for Active Archiving, 2006; Carolyn DiCenzo & Kenneth Chin; May 12, Gartner, Magic Quadrant for Content Monitoring and Filtering for Data Loss Prevention Q4 2007, April Gartner, Magic Quadrant for Security Boundary, 2006; Peter Firstbrook, Arabella Hallawell Sept 25, Gartner, Magic Quadrant for PC Life Cycle Configuration Management, 2007; Terrence Cosgrove & Ronni J. Colville; December 21, Gartner, Magic Quadrant for Storage Services, 2Q07; Adam Couture & Robert E. Passmore; May 16, Gartner, Magic Quadrant for Security Information and Event Management, 1Q07; Mark Nicolett & Kelly Kavangh; May 9, Gartner, Magic Quadrant for MSSPs, North America, 1H07, Kelly M. Kavanagh, John Pescatore, August The Forrester Wave : Enterprise Database Auditing And Real-Time Protection, Q4 2007, October 26, The Forrester Wave : Client Management Suites, Q3 2007, July 24, The Forrester Wave : Enterprise Security Information Management, Dec, The Forrester Wave : Information Leak Prevention Q4, Dec. 15, The Forrester Wave : IT Asset Management, Q3 2006, August 4, The Forrester Wave : Message Archiving Software, Q1 2008, February 14, 2008 * The Magic Quadrant is copyrighted by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. 40

41 Protection Technology Comparison Enterprise Solutions Symantec Trend Micro McAfee Total Protection Protection Technology 1 Endpoint Protection Protection Suite EE Neat Suite Advanced Client Server Messaging Endpoint Essential Endpoint Endpoint Advanced Secure Business Endpoint Security Antivirus / Antispyware Desktop Firewall Intrusion Prevention 2 Generic Exploit Blocking 3 Device & Application Control Antivirus for Mac 4 Antivirus for Linux 4 Antivirus for Mobile Network Access Control Self Enforcement Messaging & Web Security Antivirus/Antispam/Antiphishing E/D/G/IM E/D/G/ - E/-/-/- E/D/-/- E/D/-/- E/D/G/- Reputation-based spam filtering Global/Local Global/ - Global/- Content Filtering / Compliance E/D/G/IM E/D/G/- E/-/-/- E/D/-/- E/D/-/- E/D/G- Data Loss Prevention MS Exchange Lotus Domino Messaging Gateway software subscription Web Gateway software subscription Backup and Recovery Backup Live Desktops & Laptops Restore to any Hardware Threat Driven Backups Legend: E = Available for Microsoft Exchange D = Available on Domino G = Available as gateway or hosted solution IM = Available for Instant Messaging

42 FileStore Storage Tiering Single name space: one filesystem. dual storage tiers. Administrator defines policy on when to relocate files based on access time. 30 / 60 / 90 / #x day policy options for time. Place files in secondary tiers and promote to primary based on I/O throughput. Manually move files/folders as needed. Files go where they should when they should automatically and transparently. /one_file_system /sales /financial /development /current /forecast /2005 /2004 /new_app /history FC Attach Storage TIER 1 SSD / FC FC TIER 2 SATA SATA 42

43 FileStore NFS connection Management NFS Clients DNS based load balancing VIP failover by VCS Round Robin DNS provides balanced access to nodes. VIP1 VIP2 VIP3 VIP4 VIP5 VIP6 VIP7 VIP8 VIP9 VIP10 VIP11 VIP12 VIP13 VIP14 VIP15 VIP16 Evenly allocate Virtual IP addresses across active nodes FS Node n FS Node n FS Node n FS Node n FS Node n FS Node n VCS Monitored Resources FS Node n FS Node n Administrator can move VIPs to new nodes Always-on NFS/CIFS serving IP addresses Cluster File System NFS shares export on all nodes creating a single namespace /vx/nfs_share 43

Symantec NetBackup Appliances

Symantec NetBackup Appliances Symantec NetBackup Appliances Simplifying Backup Operations Geoff Greenlaw Manager, Data Centre Appliances UK & Ireland January 2012 1 Simplifying Your Backups Reduce Costs Minimise Complexity Deliver

More information

Gartner Magic Quadrant Sources and Disclaimer

Gartner Magic Quadrant Sources and Disclaimer Gartner Magic Quadrant Sources and Disclaimer 1. Gartner Magic Quadrant for Network Access Control; by Lawrence Orans, John Pescatore, Mark Nicolett; March 27, 2009 2. Gartner Magic Quadrant for Endpoint

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

Backup for branch offices and compartment backups. Måns Höiom & Rikard Lindkvist

Backup for branch offices and compartment backups. Måns Höiom & Rikard Lindkvist Backup for branch offices and compartment backups Måns Höiom & Rikard Lindkvist Today s IT Challenges: Why Better Backup is needed? Accelerated Data Growth 62% Year Over Year This kind of data growth means

More information

On and off premises technologies Which is best for you?

On and off premises technologies Which is best for you? On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email

More information

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation Next Generation Data Protection with Symantec NetBackup 7 Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation White Paper: Next Generation Data Protection with NetBackup

More information

Symantec NetBackup 7.1 What s New and Version Comparison Matrix

Symantec NetBackup 7.1 What s New and Version Comparison Matrix Symantec 7.1 What s New and Version Comparison Matrix Symantec 7 allows customers to standardize backup and recovery operations across physical and virtual environments with fewer resources and less risk

More information

SYMANTEC ENTERPRISE SOLUTION STRATEGY

SYMANTEC ENTERPRISE SOLUTION STRATEGY ENTERPRISE STRATEGY IT OPERATIONS STORAGE MANAGEMENT CONTINUITY Data Center Automation pg 3 Veritas Cluster Server Veritas Server Foundation Veritas Application Director Veritas Configuration Manager Veritas

More information

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easyto-use, all-in-one suite that secures your critical business assets and information against today

More information

Die Herausforderung an Backup/Recovery durch das Datenwachstum Wie optimiere ich

Die Herausforderung an Backup/Recovery durch das Datenwachstum Wie optimiere ich Die Herausforderung an Backup/Recovery durch das Datenwachstum Wie optimiere ich meine Datensicherung und hilft mir die Archivierung? Mario Hoffmann Principal Presales Consultant, TC Lead IIG EMEA 1 Current

More information

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec.

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec. Confidence in a Connected World MEEC Symantec Product Availability John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec.com 1 Agenda New threats means advanced security tactics SEP

More information

DPAD Introduction. EMC Data Protection and Availability Division. Copyright 2011 EMC Corporation. All rights reserved.

DPAD Introduction. EMC Data Protection and Availability Division. Copyright 2011 EMC Corporation. All rights reserved. DPAD Introduction EMC Data Protection and Availability Division 1 EMC 的 備 份 與 回 復 的 解 決 方 案 Data Domain Avamar NetWorker Data Protection Advisor 2 EMC 雙 活 資 料 中 心 的 解 決 方 案 移 動 性 ( Mobility ) 可 用 性 ( Availability

More information

Data deduplication is more than just a BUZZ word

Data deduplication is more than just a BUZZ word Data deduplication is more than just a BUZZ word Per Larsen Principal Systems Engineer Mr. Hansen DATA BUDGET RECOVERY & DATACENTER GROWTH PRESSURE DISCOVERY REVOLUTION More Storage Longer Backups Smaller

More information

Archiving with Enterprise Vault Bruno Ritter

Archiving with Enterprise Vault Bruno Ritter Archiving with Enterprise Vault Bruno Ritter Senior Presales Tech Specialist Symantec Enterprise Vault Flexible Policy-based Archiving Software Resource management Retention management Discovery management

More information

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easy-to-use, all-in-one suite that secures your critical business assets and information against

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business is an easyto-use, all-in-one suite that secures your critical business assets and information against today s complex

More information

Backup Exec 2010 R2 Key Sales Plays Safe, Secure, Sold

Backup Exec 2010 R2 Key Sales Plays Safe, Secure, Sold Backup Exec 2010 R2 Key Sales Plays Safe, Secure, Sold Udi Taboch CTO, ABnet Communications How Do Businesses Ensure Easy Recovery of Critical Data While Minimizing Storage Costs? Only 27% of SMBs believe

More information

BlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything

BlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything BlueArc unified network storage systems 7th TF-Storage Meeting Scale Bigger, Store Smarter, Accelerate Everything BlueArc s Heritage Private Company, founded in 1998 Headquarters in San Jose, CA Highest

More information

Symantec Backup Exec 2010

Symantec Backup Exec 2010 Reliable Backup and Recovery Designed for Your Growing Business Overview delivers market leading backup and recovery protection from server to desktop. Easily protect more data while you reduce storage

More information

Best Practices for Managing Storage in the Most Challenging Environments

Best Practices for Managing Storage in the Most Challenging Environments Best Practices for Managing Storage in the Most Challenging Environments Sanjay Srivastava Senior Product Manager, Symantec The Typical Virtualization Adoption Path Today, 20-25% of server workloads are

More information

Reducing Costs and Complexity with CommVault

Reducing Costs and Complexity with CommVault Reducing Costs and Complexity with CommVault Agenda The CommVault approach to Data Management Infrastructure De-duplication Snapshots VM backup and recovery Reducing costs with CommVault new pricing options

More information

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus

More information

INFORMATION PROTECTED

INFORMATION PROTECTED INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never

More information

Big data Devices Apps

Big data Devices Apps Trends driving IT pressures Cloud Big data Devices Apps Devices: Info Workers Will Erase Boundary Between enterprise And Consumer Technologies. Forrester Research. August 30, 2012 Apps: Gartner: Predicts

More information

<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures

<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures 1 Refreshing Your Data Protection Environment with Next-Generation Architectures Dale Rhine, Principal Sales Consultant Kelly Boeckman, Product Marketing Analyst Program Agenda Storage

More information

Business Life Insurance 18.5 - 12.1.1

Business Life Insurance 18.5 - 12.1.1 Changing Nothing Risks Everything. The New Style of IT demands a new approach to Backup, Recovery and Archive Bill Philbin VP Data Protection & Retention, Software Defined Storage HP Storage, Enterprise

More information

Backup Exec 15 Agents and Options

Backup Exec 15 Agents and Options DATA PROTECTION Backup Exec 15 Agents and Options Enhance and extend Backup Exec features, capabilities, and platform support Overview enhance and extend Backup Exec features, capabilities, and platform

More information

Symantec Protection Suite SMB Family: Comparison Matrices and Migration. Presentation Identifier Goes Here 1

Symantec Protection Suite SMB Family: Comparison Matrices and Migration. Presentation Identifier Goes Here 1 SMB Family: Comparison Matrices and Migration Presentation Identifier Goes Here 1 Core Family Matrix Customer pain point delivers Cost-conscious All-in-one Robust and flexible Small Business Advanced Business

More information

Backup Exec 2010 Deduplication Protect More, Store Less, Save More

Backup Exec 2010 Deduplication Protect More, Store Less, Save More Backup Exec 2010 Deduplication Protect More, Store Less, Save More Lim Andre Xavier Regional Product Manager Asia Pacific & Japan Information Management Group - SMB 2 3 Symantec Backup Exec 2010 Agenda

More information

Symantec Backup Appliances

Symantec Backup Appliances Symantec Backup Appliances End-to-end Protection for your backup environment Stefan Redtzer Sales Manager Backup Appliances, Nordics 1 Today s IT Challenges: Why Better Backup is needed? Accelerated Data

More information

Symantec NetBackup 7 Clients and Agents

Symantec NetBackup 7 Clients and Agents Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency

More information

Symantec Backup Exec 2014

Symantec Backup Exec 2014 Symantec Backup Exec 2014 Maxim Tsvetaev Principal Systems Engineer Backup Exec 2014 1 Today s Top Backup and Recovery Challenges Reducing Costs and Complexity Protecting Virtual Machines Meeting Backup

More information

NetApp SANscreen: come controllare i costi senza sacrificare la service quality. Roberto Patano Business Development Manager NetApp Italia

NetApp SANscreen: come controllare i costi senza sacrificare la service quality. Roberto Patano Business Development Manager NetApp Italia NetApp SANscreen: come controllare i costi senza sacrificare la service quality Roberto Patano Business Development Manager NetApp Italia Data Center Transformation Explosive Data Growth Dedicated Architectures

More information

Efficiently Protect, Manage and Access Big Data. Nigel Tozer Business Development Director EMEA

Efficiently Protect, Manage and Access Big Data. Nigel Tozer Business Development Director EMEA Efficiently Protect, Manage and Access Big Data Nigel Tozer Business Development Director EMEA WHAT WE DO We are relentlessly focused on giving companies better, more cost-effective ways to protect, manage,

More information

Solution Overview. Business Continuity with ReadyNAS

Solution Overview. Business Continuity with ReadyNAS Business Continuity with ReadyNAS What is ReadyNAS? ReadyNAS is a family of network storage solutions for small and medium businesses, workgroups, and remote/home offices. ReadyNAS delivers unified storage

More information

Symantec NetBackup deduplication general deployment guidelines

Symantec NetBackup deduplication general deployment guidelines TECHNICAL BRIEF: SYMANTEC NETBACKUP DEDUPLICATION GENERAL......... DEPLOYMENT............. GUIDELINES.................. Symantec NetBackup deduplication general deployment guidelines Who should read this

More information

CA Technologies Data Protection

CA Technologies Data Protection CA Technologies Data Protection can you protect and control information? Johan Van Hove Senior Solutions Strategist Security Johan.VanHove@CA.com CA Technologies Content-Aware IAM strategy CA Technologies

More information

Efficient Backup with Data Deduplication Which Strategy is Right for You?

Efficient Backup with Data Deduplication Which Strategy is Right for You? Efficient Backup with Data Deduplication Which Strategy is Right for You? Rob Emsley Senior Director, Product Marketing CPU Utilization CPU Utilization Exabytes Why So Much Interest in Data Deduplication?

More information

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup OpenStorage Solutions Guide for Disk Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

More information

CommVault Backup Appliance with NetApp

CommVault Backup Appliance with NetApp CommVault Backup Appliance with NetApp Powerful scalability. Broad flexibility. Comprehensive management. Presenter Name Today s data protection challenges Explosive data growth Shrinking backup windows

More information

Powering Linux in the Data Center

Powering Linux in the Data Center SOLUTION BRIEF: POWERING LINUX IN THE DATA CENTER........................................ Powering Linux in the Data Center Who should read this paper Linux IT Architect and Director of IT for Linux Servers

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

G06 - How to store your data in SharePoint

G06 - How to store your data in SharePoint G06 - How to store your data in SharePoint European Microsoft SharePoint Conference 2007 A story about Performance, Compliance and Reliability by NetApp February 12th to 14th, 2007 Convention Center Hotel

More information

The future of Storage and Storage Management Using Virtualization to Increase Productivity. Storyflex VISION 2007 Hans Lamprecht NetApp SEE Vienna

The future of Storage and Storage Management Using Virtualization to Increase Productivity. Storyflex VISION 2007 Hans Lamprecht NetApp SEE Vienna The future of Storage and Storage Management Using Virtualization to Increase Productivity Storyflex VISION 2007 Hans Lamprecht NetApp SEE Vienna The Evolution of Storage & NetApp Vision The Growing Burden

More information

COMMVAULT CORPORATE PRESENTATION

COMMVAULT CORPORATE PRESENTATION COMMVAULT CORPORATE PRESENTATION What we do Key IT Priorities Where Our Vision And The Needs Of The Enterprise Connect Virtualization & Cloud Computing Cost Reduction & Operational Efficiency Data Center

More information

Symantec Endpoint Protection 12.1.2

Symantec Endpoint Protection 12.1.2 Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high

More information

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Symantec Endpoint Security Management Solutions Presentation and Demo for: Symantec Endpoint Security Management Solutions Presentation and Demo for: University System of Georgia Board of Regents Information Technology Services Executive Summary Business Requirements To migrate

More information

Security Information & Event Management (SIEM)

Security Information & Event Management (SIEM) Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting

More information

Maximize Your Virtual Environment Investment with EMC Avamar. Rob Emsley Senior Director, Product Marketing

Maximize Your Virtual Environment Investment with EMC Avamar. Rob Emsley Senior Director, Product Marketing 1 Maximize Your Virtual Environment Investment with EMC Avamar Rob Emsley Senior Director, Product Marketing 2 Private Cloud is the Vision Virtualized Data Center Internal Cloud Trusted Flexible Control

More information

Hitachi and Symantec Build Your Archiving and Discovery Strategy Today

Hitachi and Symantec Build Your Archiving and Discovery Strategy Today Hitachi and Symantec Build Your Archiving and Discovery Strategy Today Asim Zaheer, Hitachi Data Systems Vice President, Global Product & Competitive Marketing Brandy Kerr, Symantec Enterprise Vault Senior

More information

DATA PROTECTION AND DEDUPLICATION

DATA PROTECTION AND DEDUPLICATION DATA PROTECTION AND DEDUPLICATION SALES PACK Reference Guide Symantec is the proven market leader in data protection and recovery with just under 40% of the market. Symantec NetBackup (NBU) 7.5 allows

More information

Protect Microsoft Exchange databases, achieve long-term data retention

Protect Microsoft Exchange databases, achieve long-term data retention Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,

More information

Backup and Recovery Redesign with Deduplication

Backup and Recovery Redesign with Deduplication Backup and Recovery Redesign with Deduplication Why the move is on September 9, 2010 1 Major trends driving the transformation of backup environments UNABATED DATA GROWTH Backup = 4 to 30 times production

More information

Symantec Protection Suite Add-On for Hosted Email and Web Security

Symantec Protection Suite Add-On for Hosted Email and Web Security Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication

More information

Presentation Identifier Goes Here 1

Presentation Identifier Goes Here 1 Presentation Identifier Goes Here 1 Backup Exec 2010 NetBackup 7 Måns Höiom Symantec Nordic Rikard Lindkvist Symantec Nordic Backup Exec 2010 Protect More Store Less Save More NEW Option Storage and Cost

More information

Data Sheet: Data Protection Veritas NetBackup 6.5 NetBackup Enterprise Server- Next Generation Data Protection

Data Sheet: Data Protection Veritas NetBackup 6.5 NetBackup Enterprise Server- Next Generation Data Protection NetBackup Enterprise Server- Next Generation Data Protection Overview As an established market leader in enterprise backup and recovery, Veritas NetBackup provides unparalleled data protection for enterprise

More information

Huawei OceanStor Backup Software Technical White Paper for NetBackup

Huawei OceanStor Backup Software Technical White Paper for NetBackup Huawei OceanStor Backup Software Technical White Paper for NetBackup Huawei Page 1 of 14 Copyright Huawei. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form

More information

EMC BACKUP MEETS BIG DATA

EMC BACKUP MEETS BIG DATA EMC BACKUP MEETS BIG DATA Strategies To Protect Greenplum, Isilon And Teradata Systems 1 Agenda Big Data: Overview, Backup and Recovery EMC Big Data Backup Strategy EMC Backup and Recovery Solutions for

More information

EMC AVAMAR. Deduplication backup software and system. Copyright 2012 EMC Corporation. All rights reserved.

EMC AVAMAR. Deduplication backup software and system. Copyright 2012 EMC Corporation. All rights reserved. EMC AVAMAR Deduplication backup software and system 1 IT Pressures 2009 2020 0.8 zettabytes 35.2 zettabytes DATA DELUGE BUDGET DILEMMA Transformation INFRASTRUCTURE SHIFT COMPLIANCE and DISCOVERY 2 EMC

More information

(Scale Out NAS System)

(Scale Out NAS System) For Unlimited Capacity & Performance Clustered NAS System (Scale Out NAS System) Copyright 2010 by Netclips, Ltd. All rights reserved -0- 1 2 3 4 5 NAS Storage Trend Scale-Out NAS Solution Scaleway Advantages

More information

WHITE PAPER: ENTERPRISE SOLUTIONS. Effective Enterprise Data Management with Veritas NetBackup and Symantec Enterprise Vault Software Solutions

WHITE PAPER: ENTERPRISE SOLUTIONS. Effective Enterprise Data Management with Veritas NetBackup and Symantec Enterprise Vault Software Solutions WHITE PAPER: ENTERPRISE SOLUTIONS Effective Enterprise Data Management with Veritas NetBackup and Symantec Enterprise Vault Software Solutions Now from Symantec White Paper: Enterprise Solutions Effective

More information

Chief Security Strategist Symantec Public Sector

Chief Security Strategist Symantec Public Sector Chief Security Strategist Symantec Public Sector Advanced Persistent Threat Further things to understand about the APT Compromised Game Networks Lulzec Anonymous/YamaTough WikiLeaks 101 Global Intelligence

More information

Backup and Recovery Solutions for Exadata. Ľubomír Vaňo Principal Sales Consultant

Backup and Recovery Solutions for Exadata. Ľubomír Vaňo Principal Sales Consultant Backup and Recovery Solutions for Exadata Ľubomír Vaňo Principal Sales Consultant Fundamental Backup and Recovery Data doesn t exist in most organizations until the rule of 3 is complete: Different Media

More information

Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication

Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication PRODUCT BRIEF Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication NOTICE This Product Brief contains proprietary information protected by copyright. Information in this

More information

Asigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data

Asigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data Datasheet Asigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data Ensure the critical data you need to run your operations, serve customers, gain competitive advantage, and

More information

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses A simple, effective and affordable solution designed for small businesses Overview Symantec Protection Suite Small Business Edition is a simple, affordable, security and backup solution. It is designed

More information

Backup & Disaster Recovery for Business

Backup & Disaster Recovery for Business Your complete guide to Online Backup and Disaster Recovery Backup & Disaster Recovery for Business 1 Doc V1.0 Jan 2014 Table of Contents 3 Hosted Desktop Backup and Disaster Recovery (DR) today 4 Different

More information

Backup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland

Backup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland Backup and Recovery Solutions for Exadata Cor Beumer Storage Sales Specialist Oracle Nederland Recovery Point and Recovery Time Wks Days Hrs Mins Secs Secs Mins Hrs Days Wks Data Loss (Recovery Point Objective)

More information

Cost Effective Backup with Deduplication. Copyright 2009 EMC Corporation. All rights reserved.

Cost Effective Backup with Deduplication. Copyright 2009 EMC Corporation. All rights reserved. Cost Effective Backup with Deduplication Agenda Today s Backup Challenges Benefits of Deduplication Source and Target Deduplication Introduction to EMC Backup Solutions Avamar, Disk Library, and NetWorker

More information

Medicaid MITA: Innovative COTS solutions for IT Risk Management

Medicaid MITA: Innovative COTS solutions for IT Risk Management Medicaid MITA: Innovative COTS solutions for IT Risk Management White Paper: COTS Solutions for MITA 2.0 Medicaid MITA: Innovative COTS solutions for IT Risk Management Contents Introduction to MITA &

More information

Symantec Backup Exec 2014 Agents and Options

Symantec Backup Exec 2014 Agents and Options Symantec Backup Exec 2014 Agents and Options Data Sheet: Data Protection Overview enhance and extend Backup Exec features, capabilities, and platform support. Whether you need to protect VMware vsphere,

More information

EMC DATA PROTECTION. Backup ed Archivio su cui fare affidamento

EMC DATA PROTECTION. Backup ed Archivio su cui fare affidamento EMC DATA PROTECTION Backup ed Archivio su cui fare affidamento 1 Challenges with Traditional Tape Tightening backup windows Lengthy restores Reliability, security and management issues Inability to meet

More information

Seagate Cloud Systems & Solutions

Seagate Cloud Systems & Solutions Seagate Cloud Systems & Solutions Market Challenge 3 Traditional Storage Is Not Viable Traditional Enterprise (EMC, NetApp, HP) DIY Public Cloud 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 4 Seagate

More information

CA ARCserve Family r15

CA ARCserve Family r15 CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales Rami.Nasser@ca.com The ARCserve Family More than Backup The only solution that: Gives customers control over their changing

More information

HP Software, Big Data Rethinking Data Protection

HP Software, Big Data Rethinking Data Protection HP Software, Big Data Rethinking Data Protection EPIC Technology Day, November 19 th, 2014 HP Software The 6th largest software company in the world Applications Delivery Management IT Operations Management

More information

IBM Endpoint Manager for Core Protection

IBM Endpoint Manager for Core Protection IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,

More information

Symantec and VMware - Product Overview

Symantec and VMware - Product Overview Symantec and VMware - Product Overview Tomas Valles Sr. Systems Engineer, vcloud Architect Symantec - VMware 1 Overview 1 Introduction 2 VMware vsphere and vstorage APIs 3 NetBackup 7 4 Symantec Backup

More information

Intelligent Archiving for Managing Unstructured Information. Victor Law Director, Specialist Sales, Asia Pacific & Japan Information Management Group

Intelligent Archiving for Managing Unstructured Information. Victor Law Director, Specialist Sales, Asia Pacific & Japan Information Management Group Intelligent Archiving for Managing Unstructured Information Victor Law Director, Specialist Sales, Asia Pacific & Japan Information Management Group Today s Information Challenges Unstructured information

More information

Turnkey Deduplication Solution for the Enterprise

Turnkey Deduplication Solution for the Enterprise Symantec NetBackup 5000 Appliance Turnkey Deduplication Solution for the Enterprise Mayur Dewaikar Sr. Product Manager, Information Management Group White Paper: A Deduplication Appliance Solution for

More information

Veritas NetBackup for Epic Healthcare Protection

Veritas NetBackup for Epic Healthcare Protection Veritas NetBackup for Epic Healthcare Protection Who should read this paper Healthcare information technology practitioners that have or are considering an Epic Electronic Health Record (EHR) solution.

More information

Next Gen Firewall and UTM Buyers Guide

Next Gen Firewall and UTM Buyers Guide Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains

More information

TRANSFORMING DATA PROTECTION

TRANSFORMING DATA PROTECTION TRANSFORMING DATA PROTECTION Moving from Reactive to Proactive Mark Galpin 1 Our Protection Strategy: Best Of Breed Performance LEADER HIGH-END STORAGE VMAX Low Service Level LEADER SCALE-OUT NAS STORAGE

More information

End to End Security do Endpoint ao Datacenter

End to End Security do Endpoint ao Datacenter do Endpoint ao Datacenter Piero DePaoli & Leandro Vicente Security Product Marketing & Systems Engineering 1 Agenda 1 Today s Threat Landscape 2 From Endpoint: Symantec Endpoint Protection 3 To Datacenter:

More information

HP StorageWorks Enterprise File Services Clustered Gateway. Technical Product Review. Sprawl Makes Inexpensive Servers Expensive

HP StorageWorks Enterprise File Services Clustered Gateway. Technical Product Review. Sprawl Makes Inexpensive Servers Expensive HP StorageWorks Enterprise File Services Clustered Gateway Technical Product Review 2006 Hewlett-Packard Development Company, L.P. The inf ormation contained herein is subject to change without notice

More information

Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description

Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.

More information

Dell PowerVault DL2200 & BE 2010 Power Suite. Owen Que. Channel Systems Consultant Dell

Dell PowerVault DL2200 & BE 2010 Power Suite. Owen Que. Channel Systems Consultant Dell Dell PowerVault DL2200 & BE 2010 Power Suite Owen Que Channel Systems Consultant Dell Dell PowerVault DL2200 powered by Symantec Backup Exec 2010 1 Replace Tape with Deduplication Customer Storage Challenge

More information

Backup Exec 2012 Agents and Options

Backup Exec 2012 Agents and Options Backup Exec 2012 Agents and Options Markku A Suistola Principal Presales Consultant Backup Exec 2012 Backup Exec 2012 Architecture Overview Understanding the technology workflow 2 Backup Exec 2012 Core

More information

COMMVAULT: LA GESTIONE DEL DATO OLTRE IL BACKUP ED IL DISASTER RECOVERY

COMMVAULT: LA GESTIONE DEL DATO OLTRE IL BACKUP ED IL DISASTER RECOVERY 20/05/14 COMMVAULT: LA GESTIONE DEL DATO OLTRE IL BACKUP ED IL DISASTER RECOVERY Roberto Massoli Channel Manager UNSTRUCTURED DATA FUELING COSTS 100TB =18x storage over 3 years, 100TB of production storage

More information

Small and Midsize Business Protection Guide

Small and Midsize Business Protection Guide P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected

More information

NetBackup 7.6 Best Practices: Protecting Virtual Environments Suwat Saelim

NetBackup 7.6 Best Practices: Protecting Virtual Environments Suwat Saelim NetBackup 7.6 Best Practices: Protecting Virtual Environments Suwat Saelim Sr. Technical Consultant Virtualization Environments 2 General Concepts for Better Virtualization Backups Understand virtualization

More information

EMC arhiviranje. Lilijana Pelko Primož Golob. Sarajevo, 16.10.2008. Copyright 2008 EMC Corporation. All rights reserved.

EMC arhiviranje. Lilijana Pelko Primož Golob. Sarajevo, 16.10.2008. Copyright 2008 EMC Corporation. All rights reserved. EMC arhiviranje Lilijana Pelko Primož Golob Sarajevo, 16.10.2008 1 Agenda EMC Today Reasons to archive EMC Centera EMC EmailXtender EMC DiskXtender Use cases 2 EMC Strategic Acquisitions: Strengthen and

More information

Symantec NetBackup 7.5 What s New and Version Comparison Matrix

Symantec NetBackup 7.5 What s New and Version Comparison Matrix Symantec NetBackup 7.5 What s New and Version Comparison Matrix Solution Overview: Data Protection While backup takes many forms, recovery shouldn t. Symantec NetBackup with V-Ray technology is the single

More information

Storage management and business continuity strategy and futures

Storage management and business continuity strategy and futures #SymVisionEmea #SymVisionEmea Storage management and business continuity strategy and futures Petter Sveum Information Availability Solution Lead EMEA Ian Wood Information Management Strategy & GTM Storage

More information

How To Improve Backup Exec 2014

How To Improve Backup Exec 2014 Backup Exec 2014 Olivier Bogaerts Sr Presales Consultant Today s IT Challenge Virtualization, data growth, low downtime tolerance Technical Overview: Backup Exec 2014 2 Today s IT Challenge Infrastructure

More information

June 2009. Blade.org 2009 ALL RIGHTS RESERVED

June 2009. Blade.org 2009 ALL RIGHTS RESERVED Contributions for this vendor neutral technology paper have been provided by Blade.org members including NetApp, BLADE Network Technologies, and Double-Take Software. June 2009 Blade.org 2009 ALL RIGHTS

More information

Licensing Guide for CA ARCserve & CA XOsoft Products

Licensing Guide for CA ARCserve & CA XOsoft Products Licensing Guide for CA ARCserve & CA XOsoft Products CA ARCserve and CA XOsoft Product Pricing Models CA ARCserve and CA XOsoft products offer a multi-layered data protection solution that combines highperformance

More information

EMC Integrated Infrastructure for VMware

EMC Integrated Infrastructure for VMware EMC Integrated Infrastructure for VMware Enabled by EMC Celerra NS-120 Reference Architecture EMC Global Solutions Centers EMC Corporation Corporate Headquarters Hopkinton MA 01748-9103 1.508.435.1000

More information

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the

More information