Uninett seminar, Tromsø 12/ Jan Harald Østbye
|
|
- Amos Simmons
- 8 years ago
- Views:
Transcription
1 Uninett seminar, Tromsø 12/ Jan Harald Østbye Enterprise Account Manager 1
2 Symantec At a Glance Founded in 1982 IPO in 1989 More than 17,500 employees Operations in more than 40 countries #419 on the 2009 Fortune percent of Fortune 1000 companies are customers $6.2 billion revenue in FY 2009 More than 600 global patents More than 120 million active consumer users 110 million enterprise customers Invests 13% of annual revenue in R&D 2 2
3 Expanding the Enterprise Portfolio $5.93 billion $5.25 billion $2.6 billion Peter Norton Computing $53 million $530 million $750 million $1.07 billion $1.4 billion $1.9 billion /7 PC desktop protection PC desktop storage Enterprise security Global intelligence & managed services Enterprise security & application management Message management & archiving Availability & compliance End point compliance, data center management, data loss prevention 2008 Software distribution & workflow 3
4 Strategic Priorities & Enterprise Solutions STRATEGIC PRIORITIES: Enterprise Security & Management Data Center Optimization SOLUTIONS: Endpoint Management Security Management IT Compliance Storage Management Disaster Recovery IT Service Management Endpoint Virtualization Endpoint Security Messaging Security Discovery & Retention Management Data Loss Prevention Archiving Data Protection High Availability Virtualization Management Web Security Green IT 4
5 Market MARKET SHARE LEADERSHIP GARTNER MAGIC QUADRANTS: LEADERS Endpoint Protection Platforms 10 Archiving 11 Content Monitoring and Filtering for Data Loss Prevention 12 Security Boundary 13 PC Configuration Life Cycle Management 14 Storage Services 15 Security Information and Event Management 16 Managed Security Service Providers 17 #1 in Endpoint Security Software (40% Share) 1 #1 in Security Software (31% share) 2 #1 in Secure Content and Threat Management (18% share) 3 #1 in Data Protection and Recovery (37% share) 4 #1 in Core Storage Management (35% share ) 5 #1 in Messaging Security Management (18% share ) 6 #1 in Archiving Applications (23% share) 7 #1 in Software Distribution (19% share) 8 #1 in Security and Vulnerability Management (9% share) 9 FORRESTER WAVES: A LEADER Enterprise Database Monitoring and Real-Time Protection 18 Client Management Suites 19 Enterprise Security Information Management 20 Information Leak Prevention 21 IT Asset Management 22 Message Archiving Wave 23 5
6 In a connected world Information is everything In the Business World In the Consumer World Confidential & IP Identity Regulated or Private Parental Controls Business Operations Workplace Content Digital Music Photos and Files Financial Transactions Financial Records 487 exabytes growing 51% annually 6
7 Today s reality More risks, more demands, smaller budgets Technology Sprawl = Added Risk Relentless demand, financial pressure 6X growth in storage from 07 to 11 Datacenter energy costs double every five years The average storage utilization is only 35% People, business and technology inseparable More risks, bigger consequences Blocked more than 250 million attempted malicious attacks per month 1.6+ million new malicious code signatures more than last 17 years combined Information mobility puts risk everywhere Computing + Virtual Platforms Operating Systems Delivery Models Electronic Communications Pervasive Networks Devices 7
8 Protection Suite 3.0 Enterprise Edition 8
9 Symantec Global Intelligence Network Vulnerability Database Fraud: Spam & Phishing Honeypot Network 25,000+ vulnerabilities in database 2+ Million Probe Network Accounts Virtual network of IP addresses 55,000+ technologies from over 8000 vendors Statistics on 1+ Billion messages a day Geo-location capabilities on servers and zombies Capturing previously unseen threats and attack methods 2B+ events logged daily Over 100,000 security alerts generated annually 200,000 daily code submissions Managed devices in 70+ countries 40,000+ Sensors in 200+ Countries 120 Million Threat/ Virus Submission Systems Symantec Brightmail Gateway 9 9
10 Threat Overview A New Threat Landscape Requires a Different Approach 91% of all breaches are now driven by highly resourced organized criminals Point solutions leave gaps multi-protocol converged threat analysis and unrivaled accuracy are essential Early warning systems were built for the old style mass mailing viruses not targeted attacks or smaller attacks from thousands of attackers 67% of data breaches happen because of the mistakes of well-meaning insiders Source: Verizon Business Risk Team, 2009 Data Breach Investigations Report Symantec Hosted Services Add-On Options for Symantec Protection Suites 10
11 Threat Overview Virus Trends Over Six Months 1 in s contained a virus An estimated 100 billion spam messages per day were driven by botnets 1 in s was a phishing attempt Proactive, up-to-the-minute intelligence is needed to meet this volume in real time Source: MessageLabs Intelligence February 2010 Symantec Hosted Services Add-On Options for Symantec Protection Suites 11
12 Threat Overview The Web and Web 2.0 Use Increase Risks An average of 4,998 new Websites are identified each day harboring malware 80% of malicious domains are legitimate domains which have been compromised Proactive protection with up-to-the-minute intelligence is needed to meet this volume in real time Source: MessageLabs Intelligence February 2010 Symantec Hosted Services Add-On Options for Symantec Protection Suites 12
13 The Endpoint Security Challenge Many threats to data Hackers, viruses, worms, spyware, malware, day-zero exploits Careless or malicious insiders leaking or stealing confidential data Confidential data inappropriately stored on an endpoint Mobile users connecting to untrusted networks or web sites Unpatched endpoints or contractor/temp laptops Many endpoint entry and exit points for data USB, CD/DVD, printer, Infrared, Bluetooth Network-based apps: , web, IM, FTP, P2P Open firewall ports Lost or stolen laptops or removable media How to solve with endpoint software Multiple vendors without a complete product offering Suite offerings may sacrifice functionality or be unproven Need a best of breed yet comprehensive solution from a single vendor
14 Symantec Protection Suite Enterprise Edition Symantec Protection Suite Enterprise Edition Endpoint Security Symantec Endpoint Protection Symantec Network Access Control Self Enforcement NEW! Symantec AntiVirus for Mac Symantec AntiVirus for Linux Symantec Mobile AntiVirus for Windows Mobile Messaging & Web Security Symantec Brightmail Gateway Symantec Web Gateway NEW! Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Domino Symantec Premium AntiSpam Backup and Recovery Symantec Backup Exec System Recovery Desktop Edition NEW! 14
15
16 Award Modular BIOS v6.473, an Energy Star Ally Copyright {C} , Award Software Inc. System Recovery The New, Automated Way Pentium 4 Centrino Mobile Processor Memory Test: 1024MB OK Award Plug and Play BIOS Extension v1.0a Copyright {C} 1995, Award Software Inc. Detecting primary master hard disk... FAILED Device I/O error: Unable to read sector 0 on primary hard disk Press any key to reboot... Press DEL to enter SETUP 2/16/2008 W3HU4-877FH4-08
17 Are Your Systems Indestructible? 85% of Systems Are Not Backed Up 53% of Loss Due to H/W or S/W 38% of Loss Due to Human Error Typical Recovery Time 6 8 hrs. You DO NOT need a major disaster to need rapid system recovery. Everyday occurrences cause a system loss. 17
18 Complete Protection For Any Size Organization NetBackup 500+ employees >$150m revenue Backup Exec s of servers Specialized backup team employees Data center focus Backup Exec System Recovery $50-$150m revenue s of servers employees <$50m revenue 1-4 servers 1-2 general IT staff Windows server focus Offsite/ Vault No IT staff Windows desktop & server Data Center Data Center Main/Remote Office Remote Office Remote Office Server, Desktops & Laptops Servers, Desktops & Laptops Desktops & Laptops Desktops & Laptops Desktops & Laptops Symantec Backup Exec
19 A History of Leadership in the Backup & Archive Market for Over a Decade Leading Customer Validation 99% of the Fortune % of the Global Million savvy small / medium businesses #1 Backup Market Share #1 Archiving Market Share 10 of 10 leading telecommunication companies 10 of 10 leading healthcare companies 10 of 10 leading financial services companies Leading Analyst Recognition Leading Backup Vision Leading Archiving Vision 19
20 Net Backup 7 20
21 Symantec s Prescription For Better Data Protection Deduplicate Everywhere To Rationalize Infrastructure Archive for Long Term Storage & Improve Backup Performance Centralize Management To Reduce Complexity 21
22 Deduplicate Everywhere, Closer to the Source Primary Storage Client Servers Media Server Backup Appliance Archive data off primary storage & dedupe data Deduplicate at the client Deduplicate at the media server New in NetBackup 7 Integrate with appliances via OpenStorage RESULTS Faster backup & recovery Reduced bandwidth Less storage requirements Optimized search/discovery 22
23 Dedupe for any Enterprise Easy & Cost Effective Fully Integrated Easy to Configure NetBackup Client Configuration Cost Effective & Flexible NetBackup 7 SAN/ DAS Commodity disk Front-end licensing - Keep as many copies as you want Proven Technology Site 1 SAN/ DAS NetBackup 7 Replication Site 2 PureDisk Storage NetBackup 7 * Assumes replication 23
24 What Sets NetBackup Deduplication Apart Built-in, easy to use No expensive hardware Lower TCO than Appliances Proven Product Line, Proven Technology Works out of the box. No additional setup required Use commodity hardware of choice Up to 50-70% less than appliance solutions (assumes replication) Built into NetBackup, based on PureDisk Dedupe Technology Investment Protection Dedupe value wherever needed- Source, Media Server, Appliance 24
25 If You Like Deduplication You ll Love Archiving Improve Backup & Search Regardless of NetBackup Version No Archiving Archiving / SharePoint / File Servers 200 GB 15MB/s or 54GB/h / SharePoint / File Servers 100 GB ~4 hrs 80 GB ~2 hrs Enterprise Vault Backups Backups A typical client with 200GB of data would take ~4 hours to complete a full backup. With archiving content is reduced by 50% leaving 100GB of data backed up in ~2 hrs. Archive backed up separately. 25
26 NetBackup 7 Simple & Comprehensive Protection for Virtual Machines Improve How You Protect Any Virtual Machine with NetBackup Shorten Backup Time by 50-90% old 90% new Client-side deduplication & unique incremental backup support Lower impact backups for Hyper-V & VMware (using vstorage API) Find & Recover Files Instantly Recovery VM File 1.. File 2.. VM Backup Storage Simple recovery process - Guided VM recovery Instant file recovery - ANY type of backup disk tape Greater Storage Efficiency VM VM VM Hypervisor Deduplication across physical & virtual Store less with VMware block optimization 26
27 Better Disaster Recovery for Global Data Protection One Console To View Distributed Backup Information Replicate & Store 80% Less Data Duplication Recover terabytes of data in seconds from anywhere 27
28 Move Up to 80% Less Data With Optimized Duplication One Policy for Backup & DR Copies Site 1 Site 2 SAN/ DAS Optimized Duplication Copy 1: 14 days Copy 2: 21 days Copy 3: 60 days OST Optimized Duplication OST Copy 1: 14 days Copy 2: 21 days OST=OpenStorage Appliance (e.g., Data Domain) 28
29 Improve Backup Operations With NetBackup OpsCenter and OpsCenter Analytics Monitoring, Reporting & Alerts Across Sites Consolidate Backup & Archive Reports NetBackup, Backup Exec, & Enterprise Vault OpsCenter Analytics Turn on SLAs, forecasting with a key IMPROVED USABILITY 29
30 NetBackup 7 Other Enhancements Full Support for New Windows Platforms and Applications Full support for Windows Server 2008 R2 Full support for Exchange 2010 and Enterprise Vault 8 Oracle Cloning Use a backup to reduce the impact of cloning on production databases Simplified Licensing License Virtual Machines Protection per physical host (no OS distinction) New Terabyte Based Licensing Model that includes clients 30
31 FileStore
32 FileStore Continues Symantec s File System Leadership File System 1991 Clustered File System FileStore App App App / Clustered NFS App SF SF CFS FileStore Storage Foundation First journaled UNIX file system CFS Mission critical transactional apps (RAC, SAP, Tibco) FileStore Enterprise and high performance file serving 32
33 FTP Clients CIFS NFS A Scalable Architecture FileStore NAS Storage Arrays FC-SAN / SAS / iscsi LAN / WAN / Cloud FileStore Core Technology ( up to 16 nodes) Veritas Cluster File System Veritas Cluster Volume Mgr Veritas Cluster Server 33
34 Delivery Options FileStore can be delivered in two ways: 1 Soft-appliance: A software package that can be installed on off-the-shelf hardware. Reference configurations available for major hardware vendors. 2 OEM: System vendors offer storage solutions based on Symantec FileStore products. 34
35 Exceptional Scaling of Both Performance and Capacity Performance Scaling: Industry-leading performance Up to 16 nodes serving a common set of data Excellent small and large file performance Capacity Scaling: 256TB file systems 200 million files per file system 2PB clusters Availability: <20sec failover times SPECsfs 2008 IOPS Ranking #1 FileStore 176,728 ops/sec #2 BlueArc 146K ops/sec #3 HP 135K ops/sec (using VxFS) #5 NetApp FAS K ops/sec Linear scaling 35 35
36 Drive Price An Information Services Platform Dynamic Storage Tiering Intelligently move data to low-cost disk (and back) Anti-Virus Reduce costs with native virus scanning SSD SAS SATA AV Symantec AV FileStore Backup Decrease backup windows with embedded NetBackup Higher performance Simpler administration Fewer servers required 36
37 Performance Requirement A Flexible NAS Platform That Fits Many Workloads FileStore Customers * Regional Hospital (PACS) * Internet Game (Live Game Sessions) * University (Document Library) * Top-3 Mobile Provider (Media Delivery) * Top-10 Internet Retailer (Online Images) Why is FileStore used so broadly? Performance/feature benefits across workloads. Easy scaling from small to large workloads. Best in class price / performance 10TB Scale Requirement 2PB 37
38 Appendix 38
39 Account Manager Jan Harald Østbye DDI: Mobile: Specialist Sales Endpoint Management/Security Roger Ison-Haug Tlf: Symantec Services Ulf Trapp Tlf: Technical Support Tlf: Customer Care Tlf: Presales Manager, Datacenter Kåre Juvkam Tlf: Security Gunnar Kopperud Tlf: ILM/GRC Paul-Christian Garpe Tlf:
40 Source: Industry Recognition 1 IDC, Worldwide Endpoint Security Software Forecast and 2006 Vendor Shares: How Suite It Is, Kolodgy, December Based on new license revenue, Gartner Dataquest, Market Share: Security Software, Worldwide, 2006, Latimer-Livingston, July IDC, Worldwide Secure Content and Threat Management Forecast and 2006 Vendor Shares:1+1=4, #207523, June IDC, Worldwide Data Protection and Recovery Software 2006 Vendor Shares, Doc # , December Gartner Report, Market Share: Storage Management Software, Worldwide, 2006, Alan Dayley, January, 1, IDC, Worldwide Messaging Security Forecast and 2006 Vendor Shares: DLP, Encryption, and Hosted Services Heating Up, Dec IDC, Worldwide Archiving Applications Forecast and 2006 Vendor Shares, May IDC, Worldwide Software Distribution Forecast and 2006 Vendor Shares, Broussard, December 2007 Doc # IDC, Worldwide Security and Vulnerability Management Software Forecast and Analysis, Kolodgy-Ryan, Aug Doc # Gartner, Magic Quadrant for Endpoint Protection Platforms, Firstbrook, Hallawell, Girard, MacDonald, December 21, Gartner, Magic Quadrant for Active Archiving, 2006; Carolyn DiCenzo & Kenneth Chin; May 12, Gartner, Magic Quadrant for Content Monitoring and Filtering for Data Loss Prevention Q4 2007, April Gartner, Magic Quadrant for Security Boundary, 2006; Peter Firstbrook, Arabella Hallawell Sept 25, Gartner, Magic Quadrant for PC Life Cycle Configuration Management, 2007; Terrence Cosgrove & Ronni J. Colville; December 21, Gartner, Magic Quadrant for Storage Services, 2Q07; Adam Couture & Robert E. Passmore; May 16, Gartner, Magic Quadrant for Security Information and Event Management, 1Q07; Mark Nicolett & Kelly Kavangh; May 9, Gartner, Magic Quadrant for MSSPs, North America, 1H07, Kelly M. Kavanagh, John Pescatore, August The Forrester Wave : Enterprise Database Auditing And Real-Time Protection, Q4 2007, October 26, The Forrester Wave : Client Management Suites, Q3 2007, July 24, The Forrester Wave : Enterprise Security Information Management, Dec, The Forrester Wave : Information Leak Prevention Q4, Dec. 15, The Forrester Wave : IT Asset Management, Q3 2006, August 4, The Forrester Wave : Message Archiving Software, Q1 2008, February 14, 2008 * The Magic Quadrant is copyrighted by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. 40
41 Protection Technology Comparison Enterprise Solutions Symantec Trend Micro McAfee Total Protection Protection Technology 1 Endpoint Protection Protection Suite EE Neat Suite Advanced Client Server Messaging Endpoint Essential Endpoint Endpoint Advanced Secure Business Endpoint Security Antivirus / Antispyware Desktop Firewall Intrusion Prevention 2 Generic Exploit Blocking 3 Device & Application Control Antivirus for Mac 4 Antivirus for Linux 4 Antivirus for Mobile Network Access Control Self Enforcement Messaging & Web Security Antivirus/Antispam/Antiphishing E/D/G/IM E/D/G/ - E/-/-/- E/D/-/- E/D/-/- E/D/G/- Reputation-based spam filtering Global/Local Global/ - Global/- Content Filtering / Compliance E/D/G/IM E/D/G/- E/-/-/- E/D/-/- E/D/-/- E/D/G- Data Loss Prevention MS Exchange Lotus Domino Messaging Gateway software subscription Web Gateway software subscription Backup and Recovery Backup Live Desktops & Laptops Restore to any Hardware Threat Driven Backups Legend: E = Available for Microsoft Exchange D = Available on Domino G = Available as gateway or hosted solution IM = Available for Instant Messaging
42 FileStore Storage Tiering Single name space: one filesystem. dual storage tiers. Administrator defines policy on when to relocate files based on access time. 30 / 60 / 90 / #x day policy options for time. Place files in secondary tiers and promote to primary based on I/O throughput. Manually move files/folders as needed. Files go where they should when they should automatically and transparently. /one_file_system /sales /financial /development /current /forecast /2005 /2004 /new_app /history FC Attach Storage TIER 1 SSD / FC FC TIER 2 SATA SATA 42
43 FileStore NFS connection Management NFS Clients DNS based load balancing VIP failover by VCS Round Robin DNS provides balanced access to nodes. VIP1 VIP2 VIP3 VIP4 VIP5 VIP6 VIP7 VIP8 VIP9 VIP10 VIP11 VIP12 VIP13 VIP14 VIP15 VIP16 Evenly allocate Virtual IP addresses across active nodes FS Node n FS Node n FS Node n FS Node n FS Node n FS Node n VCS Monitored Resources FS Node n FS Node n Administrator can move VIPs to new nodes Always-on NFS/CIFS serving IP addresses Cluster File System NFS shares export on all nodes creating a single namespace /vx/nfs_share 43
Symantec NetBackup Appliances
Symantec NetBackup Appliances Simplifying Backup Operations Geoff Greenlaw Manager, Data Centre Appliances UK & Ireland January 2012 1 Simplifying Your Backups Reduce Costs Minimise Complexity Deliver
More informationGartner Magic Quadrant Sources and Disclaimer
Gartner Magic Quadrant Sources and Disclaimer 1. Gartner Magic Quadrant for Network Access Control; by Lawrence Orans, John Pescatore, Mark Nicolett; March 27, 2009 2. Gartner Magic Quadrant for Endpoint
More informationData Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
More informationBackup for branch offices and compartment backups. Måns Höiom & Rikard Lindkvist
Backup for branch offices and compartment backups Måns Höiom & Rikard Lindkvist Today s IT Challenges: Why Better Backup is needed? Accelerated Data Growth 62% Year Over Year This kind of data growth means
More informationOn and off premises technologies Which is best for you?
On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email
More informationMayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation
Next Generation Data Protection with Symantec NetBackup 7 Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation White Paper: Next Generation Data Protection with NetBackup
More informationSymantec NetBackup 7.1 What s New and Version Comparison Matrix
Symantec 7.1 What s New and Version Comparison Matrix Symantec 7 allows customers to standardize backup and recovery operations across physical and virtual environments with fewer resources and less risk
More informationSYMANTEC ENTERPRISE SOLUTION STRATEGY
ENTERPRISE STRATEGY IT OPERATIONS STORAGE MANAGEMENT CONTINUITY Data Center Automation pg 3 Veritas Cluster Server Veritas Server Foundation Veritas Application Director Veritas Configuration Manager Veritas
More informationSymantec Protection Suite Small Business Edition
Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easyto-use, all-in-one suite that secures your critical business assets and information against today
More informationDie Herausforderung an Backup/Recovery durch das Datenwachstum Wie optimiere ich
Die Herausforderung an Backup/Recovery durch das Datenwachstum Wie optimiere ich meine Datensicherung und hilft mir die Archivierung? Mario Hoffmann Principal Presales Consultant, TC Lead IIG EMEA 1 Current
More informationConfidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec.
Confidence in a Connected World MEEC Symantec Product Availability John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec.com 1 Agenda New threats means advanced security tactics SEP
More informationDPAD Introduction. EMC Data Protection and Availability Division. Copyright 2011 EMC Corporation. All rights reserved.
DPAD Introduction EMC Data Protection and Availability Division 1 EMC 的 備 份 與 回 復 的 解 決 方 案 Data Domain Avamar NetWorker Data Protection Advisor 2 EMC 雙 活 資 料 中 心 的 解 決 方 案 移 動 性 ( Mobility ) 可 用 性 ( Availability
More informationData deduplication is more than just a BUZZ word
Data deduplication is more than just a BUZZ word Per Larsen Principal Systems Engineer Mr. Hansen DATA BUDGET RECOVERY & DATACENTER GROWTH PRESSURE DISCOVERY REVOLUTION More Storage Longer Backups Smaller
More informationArchiving with Enterprise Vault Bruno Ritter
Archiving with Enterprise Vault Bruno Ritter Senior Presales Tech Specialist Symantec Enterprise Vault Flexible Policy-based Archiving Software Resource management Retention management Discovery management
More informationSymantec Protection Suite Small Business Edition
Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easy-to-use, all-in-one suite that secures your critical business assets and information against
More informationSecure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
More informationSymantec Protection Suite Small Business Edition
Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business is an easyto-use, all-in-one suite that secures your critical business assets and information against today s complex
More informationBackup Exec 2010 R2 Key Sales Plays Safe, Secure, Sold
Backup Exec 2010 R2 Key Sales Plays Safe, Secure, Sold Udi Taboch CTO, ABnet Communications How Do Businesses Ensure Easy Recovery of Critical Data While Minimizing Storage Costs? Only 27% of SMBs believe
More informationBlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything
BlueArc unified network storage systems 7th TF-Storage Meeting Scale Bigger, Store Smarter, Accelerate Everything BlueArc s Heritage Private Company, founded in 1998 Headquarters in San Jose, CA Highest
More informationSymantec Backup Exec 2010
Reliable Backup and Recovery Designed for Your Growing Business Overview delivers market leading backup and recovery protection from server to desktop. Easily protect more data while you reduce storage
More informationBest Practices for Managing Storage in the Most Challenging Environments
Best Practices for Managing Storage in the Most Challenging Environments Sanjay Srivastava Senior Product Manager, Symantec The Typical Virtualization Adoption Path Today, 20-25% of server workloads are
More informationReducing Costs and Complexity with CommVault
Reducing Costs and Complexity with CommVault Agenda The CommVault approach to Data Management Infrastructure De-duplication Snapshots VM backup and recovery Reducing costs with CommVault new pricing options
More informationSymantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
More informationINFORMATION PROTECTED
INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never
More informationBig data Devices Apps
Trends driving IT pressures Cloud Big data Devices Apps Devices: Info Workers Will Erase Boundary Between enterprise And Consumer Technologies. Forrester Research. August 30, 2012 Apps: Gartner: Predicts
More information<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures
1 Refreshing Your Data Protection Environment with Next-Generation Architectures Dale Rhine, Principal Sales Consultant Kelly Boeckman, Product Marketing Analyst Program Agenda Storage
More informationBusiness Life Insurance 18.5 - 12.1.1
Changing Nothing Risks Everything. The New Style of IT demands a new approach to Backup, Recovery and Archive Bill Philbin VP Data Protection & Retention, Software Defined Storage HP Storage, Enterprise
More informationBackup Exec 15 Agents and Options
DATA PROTECTION Backup Exec 15 Agents and Options Enhance and extend Backup Exec features, capabilities, and platform support Overview enhance and extend Backup Exec features, capabilities, and platform
More informationSymantec Protection Suite SMB Family: Comparison Matrices and Migration. Presentation Identifier Goes Here 1
SMB Family: Comparison Matrices and Migration Presentation Identifier Goes Here 1 Core Family Matrix Customer pain point delivers Cost-conscious All-in-one Robust and flexible Small Business Advanced Business
More informationBackup Exec 2010 Deduplication Protect More, Store Less, Save More
Backup Exec 2010 Deduplication Protect More, Store Less, Save More Lim Andre Xavier Regional Product Manager Asia Pacific & Japan Information Management Group - SMB 2 3 Symantec Backup Exec 2010 Agenda
More informationSymantec Backup Appliances
Symantec Backup Appliances End-to-end Protection for your backup environment Stefan Redtzer Sales Manager Backup Appliances, Nordics 1 Today s IT Challenges: Why Better Backup is needed? Accelerated Data
More informationSymantec NetBackup 7 Clients and Agents
Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency
More informationSymantec Backup Exec 2014
Symantec Backup Exec 2014 Maxim Tsvetaev Principal Systems Engineer Backup Exec 2014 1 Today s Top Backup and Recovery Challenges Reducing Costs and Complexity Protecting Virtual Machines Meeting Backup
More informationNetApp SANscreen: come controllare i costi senza sacrificare la service quality. Roberto Patano Business Development Manager NetApp Italia
NetApp SANscreen: come controllare i costi senza sacrificare la service quality Roberto Patano Business Development Manager NetApp Italia Data Center Transformation Explosive Data Growth Dedicated Architectures
More informationEfficiently Protect, Manage and Access Big Data. Nigel Tozer Business Development Director EMEA
Efficiently Protect, Manage and Access Big Data Nigel Tozer Business Development Director EMEA WHAT WE DO We are relentlessly focused on giving companies better, more cost-effective ways to protect, manage,
More informationSolution Overview. Business Continuity with ReadyNAS
Business Continuity with ReadyNAS What is ReadyNAS? ReadyNAS is a family of network storage solutions for small and medium businesses, workgroups, and remote/home offices. ReadyNAS delivers unified storage
More informationSymantec NetBackup deduplication general deployment guidelines
TECHNICAL BRIEF: SYMANTEC NETBACKUP DEDUPLICATION GENERAL......... DEPLOYMENT............. GUIDELINES.................. Symantec NetBackup deduplication general deployment guidelines Who should read this
More informationCA Technologies Data Protection
CA Technologies Data Protection can you protect and control information? Johan Van Hove Senior Solutions Strategist Security Johan.VanHove@CA.com CA Technologies Content-Aware IAM strategy CA Technologies
More informationEfficient Backup with Data Deduplication Which Strategy is Right for You?
Efficient Backup with Data Deduplication Which Strategy is Right for You? Rob Emsley Senior Director, Product Marketing CPU Utilization CPU Utilization Exabytes Why So Much Interest in Data Deduplication?
More informationSymantec NetBackup OpenStorage Solutions Guide for Disk
Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a
More informationCommVault Backup Appliance with NetApp
CommVault Backup Appliance with NetApp Powerful scalability. Broad flexibility. Comprehensive management. Presenter Name Today s data protection challenges Explosive data growth Shrinking backup windows
More informationPowering Linux in the Data Center
SOLUTION BRIEF: POWERING LINUX IN THE DATA CENTER........................................ Powering Linux in the Data Center Who should read this paper Linux IT Architect and Director of IT for Linux Servers
More informationPayment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
More informationG06 - How to store your data in SharePoint
G06 - How to store your data in SharePoint European Microsoft SharePoint Conference 2007 A story about Performance, Compliance and Reliability by NetApp February 12th to 14th, 2007 Convention Center Hotel
More informationThe future of Storage and Storage Management Using Virtualization to Increase Productivity. Storyflex VISION 2007 Hans Lamprecht NetApp SEE Vienna
The future of Storage and Storage Management Using Virtualization to Increase Productivity Storyflex VISION 2007 Hans Lamprecht NetApp SEE Vienna The Evolution of Storage & NetApp Vision The Growing Burden
More informationCOMMVAULT CORPORATE PRESENTATION
COMMVAULT CORPORATE PRESENTATION What we do Key IT Priorities Where Our Vision And The Needs Of The Enterprise Connect Virtualization & Cloud Computing Cost Reduction & Operational Efficiency Data Center
More informationSymantec Endpoint Protection 12.1.2
Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high
More informationSymantec Endpoint Security Management Solutions Presentation and Demo for:
Symantec Endpoint Security Management Solutions Presentation and Demo for: University System of Georgia Board of Regents Information Technology Services Executive Summary Business Requirements To migrate
More informationSecurity Information & Event Management (SIEM)
Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting
More informationMaximize Your Virtual Environment Investment with EMC Avamar. Rob Emsley Senior Director, Product Marketing
1 Maximize Your Virtual Environment Investment with EMC Avamar Rob Emsley Senior Director, Product Marketing 2 Private Cloud is the Vision Virtualized Data Center Internal Cloud Trusted Flexible Control
More informationHitachi and Symantec Build Your Archiving and Discovery Strategy Today
Hitachi and Symantec Build Your Archiving and Discovery Strategy Today Asim Zaheer, Hitachi Data Systems Vice President, Global Product & Competitive Marketing Brandy Kerr, Symantec Enterprise Vault Senior
More informationDATA PROTECTION AND DEDUPLICATION
DATA PROTECTION AND DEDUPLICATION SALES PACK Reference Guide Symantec is the proven market leader in data protection and recovery with just under 40% of the market. Symantec NetBackup (NBU) 7.5 allows
More informationProtect Microsoft Exchange databases, achieve long-term data retention
Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...
More informationSymantec Endpoint Protection
The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,
More informationBackup and Recovery Redesign with Deduplication
Backup and Recovery Redesign with Deduplication Why the move is on September 9, 2010 1 Major trends driving the transformation of backup environments UNABATED DATA GROWTH Backup = 4 to 30 times production
More informationSymantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
More informationPresentation Identifier Goes Here 1
Presentation Identifier Goes Here 1 Backup Exec 2010 NetBackup 7 Måns Höiom Symantec Nordic Rikard Lindkvist Symantec Nordic Backup Exec 2010 Protect More Store Less Save More NEW Option Storage and Cost
More informationData Sheet: Data Protection Veritas NetBackup 6.5 NetBackup Enterprise Server- Next Generation Data Protection
NetBackup Enterprise Server- Next Generation Data Protection Overview As an established market leader in enterprise backup and recovery, Veritas NetBackup provides unparalleled data protection for enterprise
More informationHuawei OceanStor Backup Software Technical White Paper for NetBackup
Huawei OceanStor Backup Software Technical White Paper for NetBackup Huawei Page 1 of 14 Copyright Huawei. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form
More informationEMC BACKUP MEETS BIG DATA
EMC BACKUP MEETS BIG DATA Strategies To Protect Greenplum, Isilon And Teradata Systems 1 Agenda Big Data: Overview, Backup and Recovery EMC Big Data Backup Strategy EMC Backup and Recovery Solutions for
More informationEMC AVAMAR. Deduplication backup software and system. Copyright 2012 EMC Corporation. All rights reserved.
EMC AVAMAR Deduplication backup software and system 1 IT Pressures 2009 2020 0.8 zettabytes 35.2 zettabytes DATA DELUGE BUDGET DILEMMA Transformation INFRASTRUCTURE SHIFT COMPLIANCE and DISCOVERY 2 EMC
More information(Scale Out NAS System)
For Unlimited Capacity & Performance Clustered NAS System (Scale Out NAS System) Copyright 2010 by Netclips, Ltd. All rights reserved -0- 1 2 3 4 5 NAS Storage Trend Scale-Out NAS Solution Scaleway Advantages
More informationWHITE PAPER: ENTERPRISE SOLUTIONS. Effective Enterprise Data Management with Veritas NetBackup and Symantec Enterprise Vault Software Solutions
WHITE PAPER: ENTERPRISE SOLUTIONS Effective Enterprise Data Management with Veritas NetBackup and Symantec Enterprise Vault Software Solutions Now from Symantec White Paper: Enterprise Solutions Effective
More informationChief Security Strategist Symantec Public Sector
Chief Security Strategist Symantec Public Sector Advanced Persistent Threat Further things to understand about the APT Compromised Game Networks Lulzec Anonymous/YamaTough WikiLeaks 101 Global Intelligence
More informationBackup and Recovery Solutions for Exadata. Ľubomír Vaňo Principal Sales Consultant
Backup and Recovery Solutions for Exadata Ľubomír Vaňo Principal Sales Consultant Fundamental Backup and Recovery Data doesn t exist in most organizations until the rule of 3 is complete: Different Media
More informationQuantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication
PRODUCT BRIEF Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication NOTICE This Product Brief contains proprietary information protected by copyright. Information in this
More informationAsigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data
Datasheet Asigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data Ensure the critical data you need to run your operations, serve customers, gain competitive advantage, and
More informationSymantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses
A simple, effective and affordable solution designed for small businesses Overview Symantec Protection Suite Small Business Edition is a simple, affordable, security and backup solution. It is designed
More informationBackup & Disaster Recovery for Business
Your complete guide to Online Backup and Disaster Recovery Backup & Disaster Recovery for Business 1 Doc V1.0 Jan 2014 Table of Contents 3 Hosted Desktop Backup and Disaster Recovery (DR) today 4 Different
More informationBackup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland
Backup and Recovery Solutions for Exadata Cor Beumer Storage Sales Specialist Oracle Nederland Recovery Point and Recovery Time Wks Days Hrs Mins Secs Secs Mins Hrs Days Wks Data Loss (Recovery Point Objective)
More informationCost Effective Backup with Deduplication. Copyright 2009 EMC Corporation. All rights reserved.
Cost Effective Backup with Deduplication Agenda Today s Backup Challenges Benefits of Deduplication Source and Target Deduplication Introduction to EMC Backup Solutions Avamar, Disk Library, and NetWorker
More informationMedicaid MITA: Innovative COTS solutions for IT Risk Management
Medicaid MITA: Innovative COTS solutions for IT Risk Management White Paper: COTS Solutions for MITA 2.0 Medicaid MITA: Innovative COTS solutions for IT Risk Management Contents Introduction to MITA &
More informationSymantec Backup Exec 2014 Agents and Options
Symantec Backup Exec 2014 Agents and Options Data Sheet: Data Protection Overview enhance and extend Backup Exec features, capabilities, and platform support. Whether you need to protect VMware vsphere,
More informationEMC DATA PROTECTION. Backup ed Archivio su cui fare affidamento
EMC DATA PROTECTION Backup ed Archivio su cui fare affidamento 1 Challenges with Traditional Tape Tightening backup windows Lengthy restores Reliability, security and management issues Inability to meet
More informationSeagate Cloud Systems & Solutions
Seagate Cloud Systems & Solutions Market Challenge 3 Traditional Storage Is Not Viable Traditional Enterprise (EMC, NetApp, HP) DIY Public Cloud 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 4 Seagate
More informationCA ARCserve Family r15
CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales Rami.Nasser@ca.com The ARCserve Family More than Backup The only solution that: Gives customers control over their changing
More informationHP Software, Big Data Rethinking Data Protection
HP Software, Big Data Rethinking Data Protection EPIC Technology Day, November 19 th, 2014 HP Software The 6th largest software company in the world Applications Delivery Management IT Operations Management
More informationIBM Endpoint Manager for Core Protection
IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,
More informationSymantec and VMware - Product Overview
Symantec and VMware - Product Overview Tomas Valles Sr. Systems Engineer, vcloud Architect Symantec - VMware 1 Overview 1 Introduction 2 VMware vsphere and vstorage APIs 3 NetBackup 7 4 Symantec Backup
More informationIntelligent Archiving for Managing Unstructured Information. Victor Law Director, Specialist Sales, Asia Pacific & Japan Information Management Group
Intelligent Archiving for Managing Unstructured Information Victor Law Director, Specialist Sales, Asia Pacific & Japan Information Management Group Today s Information Challenges Unstructured information
More informationTurnkey Deduplication Solution for the Enterprise
Symantec NetBackup 5000 Appliance Turnkey Deduplication Solution for the Enterprise Mayur Dewaikar Sr. Product Manager, Information Management Group White Paper: A Deduplication Appliance Solution for
More informationVeritas NetBackup for Epic Healthcare Protection
Veritas NetBackup for Epic Healthcare Protection Who should read this paper Healthcare information technology practitioners that have or are considering an Epic Electronic Health Record (EHR) solution.
More informationNext Gen Firewall and UTM Buyers Guide
Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains
More informationTRANSFORMING DATA PROTECTION
TRANSFORMING DATA PROTECTION Moving from Reactive to Proactive Mark Galpin 1 Our Protection Strategy: Best Of Breed Performance LEADER HIGH-END STORAGE VMAX Low Service Level LEADER SCALE-OUT NAS STORAGE
More informationEnd to End Security do Endpoint ao Datacenter
do Endpoint ao Datacenter Piero DePaoli & Leandro Vicente Security Product Marketing & Systems Engineering 1 Agenda 1 Today s Threat Landscape 2 From Endpoint: Symantec Endpoint Protection 3 To Datacenter:
More informationHP StorageWorks Enterprise File Services Clustered Gateway. Technical Product Review. Sprawl Makes Inexpensive Servers Expensive
HP StorageWorks Enterprise File Services Clustered Gateway Technical Product Review 2006 Hewlett-Packard Development Company, L.P. The inf ormation contained herein is subject to change without notice
More informationData Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description
Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.
More informationDell PowerVault DL2200 & BE 2010 Power Suite. Owen Que. Channel Systems Consultant Dell
Dell PowerVault DL2200 & BE 2010 Power Suite Owen Que Channel Systems Consultant Dell Dell PowerVault DL2200 powered by Symantec Backup Exec 2010 1 Replace Tape with Deduplication Customer Storage Challenge
More informationBackup Exec 2012 Agents and Options
Backup Exec 2012 Agents and Options Markku A Suistola Principal Presales Consultant Backup Exec 2012 Backup Exec 2012 Architecture Overview Understanding the technology workflow 2 Backup Exec 2012 Core
More informationCOMMVAULT: LA GESTIONE DEL DATO OLTRE IL BACKUP ED IL DISASTER RECOVERY
20/05/14 COMMVAULT: LA GESTIONE DEL DATO OLTRE IL BACKUP ED IL DISASTER RECOVERY Roberto Massoli Channel Manager UNSTRUCTURED DATA FUELING COSTS 100TB =18x storage over 3 years, 100TB of production storage
More informationSmall and Midsize Business Protection Guide
P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected
More informationNetBackup 7.6 Best Practices: Protecting Virtual Environments Suwat Saelim
NetBackup 7.6 Best Practices: Protecting Virtual Environments Suwat Saelim Sr. Technical Consultant Virtualization Environments 2 General Concepts for Better Virtualization Backups Understand virtualization
More informationEMC arhiviranje. Lilijana Pelko Primož Golob. Sarajevo, 16.10.2008. Copyright 2008 EMC Corporation. All rights reserved.
EMC arhiviranje Lilijana Pelko Primož Golob Sarajevo, 16.10.2008 1 Agenda EMC Today Reasons to archive EMC Centera EMC EmailXtender EMC DiskXtender Use cases 2 EMC Strategic Acquisitions: Strengthen and
More informationSymantec NetBackup 7.5 What s New and Version Comparison Matrix
Symantec NetBackup 7.5 What s New and Version Comparison Matrix Solution Overview: Data Protection While backup takes many forms, recovery shouldn t. Symantec NetBackup with V-Ray technology is the single
More informationStorage management and business continuity strategy and futures
#SymVisionEmea #SymVisionEmea Storage management and business continuity strategy and futures Petter Sveum Information Availability Solution Lead EMEA Ian Wood Information Management Strategy & GTM Storage
More informationHow To Improve Backup Exec 2014
Backup Exec 2014 Olivier Bogaerts Sr Presales Consultant Today s IT Challenge Virtualization, data growth, low downtime tolerance Technical Overview: Backup Exec 2014 2 Today s IT Challenge Infrastructure
More informationJune 2009. Blade.org 2009 ALL RIGHTS RESERVED
Contributions for this vendor neutral technology paper have been provided by Blade.org members including NetApp, BLADE Network Technologies, and Double-Take Software. June 2009 Blade.org 2009 ALL RIGHTS
More informationLicensing Guide for CA ARCserve & CA XOsoft Products
Licensing Guide for CA ARCserve & CA XOsoft Products CA ARCserve and CA XOsoft Product Pricing Models CA ARCserve and CA XOsoft products offer a multi-layered data protection solution that combines highperformance
More informationEMC Integrated Infrastructure for VMware
EMC Integrated Infrastructure for VMware Enabled by EMC Celerra NS-120 Reference Architecture EMC Global Solutions Centers EMC Corporation Corporate Headquarters Hopkinton MA 01748-9103 1.508.435.1000
More informationData Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection
The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the
More information