F5 Data Manager Sample Report and Analysis
|
|
- Constance Horn
- 8 years ago
- Views:
Transcription
1 F5 Data Manager Sample Report and F5 Data Manager provides extensive reporting capabilities that can help IT organizations better understand the profile and characteristics of their file data. It highlights opportunities to optimize and improve file data management strategy over time.
2 Contents Introduction 3 Client Case Study: Background 3 Detailed Reporting 3 Total Storage Capacity 4 File Age 5 File Type 6 Top Owners 7 Trend Reporting 8 Storage Usage 8 Top Owners 9 Advanced Reporting 10 Top Owners 10 Return on Investment Statistics in Data Manager Reports 12 Data Manager Trial 13 2
3 Introduction Enterprise organizations are struggling to keep up with the rapid growth of the file data they must manage. With IT groups stretched to the breaking point, it often seems like the easiest solution is to continue purchasing more storage capacity. However, this can lead to unsustainable storage and operational costs. To effectively reduce these costs, organizations must better understand their file storage requirements. F5 Data Manager provides a lightweight reporting solution that gives organizations visibility into their file data and file storage requirements. This paper will discuss how Data Manager reports can be used to visualize how data is growing. It includes charts and tables that are excerpts from an actual Data Manager report, plus brief analyses of the data. The analyses were provided by an F5 Networks expert to the customer to help them understand what Data Manager had uncovered and what corrective action, if any, was required. All identifiable customer information has been removed. Client Case Study: Background This company (whose name is being withheld for privacy) is a fast-growing, mid-size enterprise. Their IT organization was struggling to cope with storage growth rates that exceeded 50 percent annually, which was causing a series of problems: Individual users and applications were frequently hitting the capacity limits on their network shares, even though the aggregate storage utilization for the entire organization was below 50 percent. Provisioning additional capacity and moving data required constant IT attention and often required client and application downtime. Backup times were growing increasingly lengthy and often exceeding available backup windows. Some full backups were taking 36 hours to complete. Data migrations due to consolidations and upgrades were painful and time-consuming and often required business downtime. Costs for managing the explosive data growth were increasing unsustainably, far outstripping growth in their IT budget. This company was considering implementing a file virtualization solution to resolve these issues. However, the IT organization wanted to first understand its existing file storage environment and identify particular areas of need. This company used F5 Data Manager, a software solution that is installed on a server running Microsoft Windows, to inventory its file system. Data Manager provided reporting and capacity forecasting capabilities, then helped the IT team identify key trends and problem areas that could be improved with file virtualization. Detailed Reporting Data Manager presents a wealth of information about file data, file systems, and file storage devices. The standard detailed reports it generates are useful for visualizing a file storage environment at a specific point in time. A good strategy for understanding this information is to examine characteristics of the overall environment, identify potential areas of concern, and then investigate those specific areas. 3
4 Total Storage Capacity Figure 1: Disk capacity statistics as displayed by Data Manager The company used Data Manager to perform an inventory of all file shares in its environment a mix of NetApp FAS, EMC Celerra, and Windows file servers. The cumulative storage capacity report showed that, despite the frequency of individual users and applications running out of capacity in their file shares, their aggregate level of storage utilization remained low. The company was spending additional money purchasing new storage every year, even though it had significant stranded capacity elsewhere in its environment. The company decided to virtualize its file storage environment and implement a global namespace with dynamic capacity balancing policies. This would enable IT to: Create a unified storage pool and automated policies to distribute storage utilization across many systems. Prevent localized spikes in storage utilization and even out the aggregate utilization across the entire environment. Set higher target levels of storage utilization without worrying about individual users and applications hitting capacity limits. Redeploy existing unused capacity to where it s most needed. 4
5 File Age Figure 2: Breakdown of file data by age as displayed by Data Manager Next the company looked at the age breakdown of its file data and discovered that almost 75 percent of all files had not been modified in over three months, and over 40 percent had not been modified in six months or more. Inactive file data was consuming the company s performance-optimized primary storage and driving the need to purchase additional performance-optimized capacity. In addition, the company was having issues making its backup windows, as weekly full backups were often taking over 36 hours to complete. Backups were a major source of operational pain, and by running Data Manager, the company s IT group was able to assess the impact of removing 80 percent of its inactive file data out of the weekly full backups. The company decided to move to a tiered storage environment. However, because this was a major change, it also planned to start with a conservative tiering policy and increase the aggressiveness over time. It decided to implement two storage tiers, augmenting existing primary storage as Tier 1 with capacity-optimized deduplicated SATA storage as Tier 2. Once the environment was virtualized, the company could create automated storage tiering policies based on the file age to: Automatically move data to more cost-effective storage without affecting user access to the data. Initially, files older than 180 days will be moved to Tier 2. Once the company becomes more comfortable with storage tiering, it is considering moving files older than 90 days to Tier 2, and files older 180 days to a new Tier 3. This policy would also allow them to consider cloud storage for long-term archive. Reduce backup time and backup costs by establishing separate backup practices for each storage tier. By backing up Tier 2 every three months, the company reduced weekly backup times and costs by 66 percent, from 36 hours to under 12 hours to complete. It also reduced backup media costs by 70 percent by reducing the size of weekly full backups. 5
6 File Type Figure 3: Breakdown of file data by extension as displayed by Data Manager Next, the company wanted to gain better visibility into what types of data users were generating by looking into user home directories, and specifically their top file extensions by capacity. As part of this process, the company discovered that archive (.PST) files were consuming over 22 percent of the total storage capacity in its home directories. The company decided to augment its storage tiering implementation with additional tiering policies based on file type. Specifically, it would automatically place all.pst files on a separate storage tier comprised of capacity-optimized deduplicated SATA storage. By doing so, the company would be able to: Reduce backup time and backup media costs by establishing specific backup practices for.pst files. By customizing the backup policy for this data set, the company reduced weekly full backup times and cost by over 20 percent. Reduce the cost of storage for a type of file that is infrequently accessed or modified. Maximize the benefits of data deduplication. Because archive files belonging to multiple users often contain many of the same attachments, data deduplication would further reduce the amount of storage capacity required for storing.pst files. 6
7 Top Owners Figure 4: Breakdown of file data by owners as displayed by Data Manager The company also wanted to see how much storage capacity their top users were consuming. What they discovered was that the top ten users (out of 753) were consuming almost a terabyte of storage, or 7.6 percent of total capacity used in the company s home directories. In addition, many of the top users had their home directories on the same file servers, which was causing utilization rates to skyrocket, requiring frequent IT intervention to ensure enough space was always available for all users. The company was already planning to implement dynamic capacity balancing policies in its virtualized storage environment that would distribute data across all of their file servers and even out the aggregate utilization. IT also decided to more proactively monitor the file storage requirement trending for their top users. 7
8 Trend Reporting Data Manager enables organizations to report on various aspects of file data growth through the creation of trend reports. A trend report illustrates how different aspects of the storage environment continue to change over time. Storage Usage Figure 5: Changes in storage usage over time as displayed by Data Manager The company took a closer look at one of the file shares that contained home directories for several of their top users. They discovered that one in particular was rapidly nearing its capacity limit and would soon affect users in that share. Although the company was planning to virtualize its environment and create dynamic capacity balancing policies, IT was still interested in the root causes of the current rapid utilization spike and planned to further investigate the storage consumption of individual users in that share. 8
9 Top Owners Figure 6: Changes in storage usage by top owners as displayed by Data Manager The company generated a trend report on their top users in the file share to see how storage consumption changed over the last three months. The IT team was surprised to see such a rapid increase in storage consumption from two of the top users. To better understand how these users were consuming capacity, IT planned to take a closer look at some of the file data characteristics with the Data Manager advanced reporting capabilities. 9
10 Advanced Reporting Data Manager also provides a mechanism for organizations to customize how they report on file data. With customizable reporting capabilities, organizations can report on specific file sets, using individual file attributes or combinations of attributes. Top Owners Figure 7: Breakdown of file data by file extension as displayed by Data Manager IT next looked at the characteristics of the file data being generated by each user. They created a simple advanced report to examine all of file data matching the following characteristics: Location: the file share in which FrankH s home directory was located Owner: FrankH After examining the growth trend presented by the advanced report, IT theorized that FrankH was using his home directory as a monthly backup for his corporate PC system, which it then confirmed with the user. After further analysis, it quickly became apparent that this was general practice throughout the company s user community. Based on this information, the IT team decided to further customize the storage tiering policies for its user home directories, more aggressively moving inactive data to Tier 2 storage, where it could maximize the benefit of data deduplication. 10
11 Return on Investment The information provided by Data Manager helped convinced the company to virtualize its file storage environment with F5 ARX intelligent file virtualization. ARX helps organizations reduce the cost and complexity of managing data through non-disruptive data migration, automated storage tiering, and dynamic capacity balancing. However, the IT team still needed to quantify the benefits to justify the investment to management. Figure 8: Projected ROI of an ARX solution as displayed by Data Manager Using information about the company s own file data and file systems, Data Manager provided a five-year projection for storage costs both with and without ARX, and it showed an ROI of less than one year based on its circumstances. 11
12 Statistics in Data Manager Reports The following are examples of some of the statistics available with Data Manager. Customers can also customize more detailed reports to meet their specific needs. For a full list of available reports and statistics, use the search function on f5.com to find the white paper, Introducing Data Manager. File System Structure Files per Directory Level Directories per Directory Level Average Directory Fan-out per Directory Level Leaf Directories per Directory Level Leaf Directory Files per Directory Level Capacity per Directory Level File Access Age File Counts by Access Time Capacity by Access Time File Modification Age File Counts by Modify Time Capacity by Modify Time File Size File Counts by Size Capacity by File Size Top File Extensions by Total Files Top File Extensions by Capacity Top Owners by Total Files Top Owners by Capacity Top File System Paths by Total Files Top File System Paths by Capacity 12
13 Data Manager Trial F5 Data Manager is an extensible storage management platform that helps companies better monitor multiple file storage resources. It provides a detailed understanding of unique file storage structure and enables organizations to identify areas that can be improved with file virtualization. To see what Data Manager can discover in your environment, download the Data Manager trial by following these simple instructions: 1. Go to downloads.f5.com and log in. 2. If you do not have a user account, click Register for an Account, follow the instructions, and log in. 3. Click Find a Download. 4. Click Data Manager in the F5 product line. On the next page, select the latest version and then click on the product container. 5. Read the End User Software License Agreement and click I Accept. 6. Click the Data Manager Trial file to initiate the download. Be sure to download the Installation Guide and User Guide for detailed instructions. For more information about how Data Manager and ARX can help organizations simplify data management and get storage costs under control, or for assistance with the Data Manager trial, visit or call F5 Networks, Inc. 401 Elliott Avenue West, Seattle, WA F5 Networks, Inc. Corporate Headquarters info@f5.com F5 Networks Asia-Pacific apacinfo@f5.com F5 Networks Ltd. Europe/Middle-East/Africa emeainfo@f5.com F5 Networks Japan K.K. f5j-info@f5.com 2011 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, and IT agility. Your way., are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com. Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, express or implied, claimed by F5. CS
Driving Data Migration with Intelligent Data Management
F5 White Paper Driving Data Migration with Intelligent Data Management F5 and NetApp are reducing the cost and complexity of managing file storage. F5 ARX complements and enables transparent migration
More informationCreate a Smarter Storage Strategy
F5 White Paper Create a Smarter Storage Strategy Building a smarter storage infrastructure based on the business value of data enables you to address your data storage requirements efficiently and at the
More informationSimplify Data Management and Reduce Storage Costs with File Virtualization
What s Inside: 2 Freedom from File Storage Constraints 2 Simplifying File Access with File Virtualization 3 Simplifying Data Management with Automated Management Policies 4 True Heterogeneity 5 Data Protection
More informationEnabling Flexibility with Intelligent File Virtualization
Enabling Flexibility with Intelligent File Virtualization Organizations can leverage a highly versatile virtualization technology in their file storage infrastructures to enable data mobility; improve
More informationOracle Database Firewall
Deployment Guide Document version: 1.0 What's inside: 2 Prerequisites and configuration notes 2 Configuration example 3 Configuring the LTM for Database Policy Enforcement (inline) Mode 5 Configuring the
More informationF5 and Secure Windows Azure Access
PARTNER USE CASE F5 and Secure Windows Azure Access F5 technologies give enterprises a new way to provide secure remote access and traffic management within their infrastructure. Ryan Korock, F5 Networks
More informationSafely Extend the Enterprise to Personal Mobile Devices
DATASHEET What s Inside 2 Boost Security for Employees and the Enterprise 3 Reduce IT Overhead 3 Encourage Employee Compliance 4 Improve Employee Productivity 4 Minimize Costs 5 F5 Services 5 More Information
More informationDeploying the BIG-IP System with Microsoft Lync Server 2010 and 2013 for Site Resiliency
Deployment Guide Document Version 1.2 What s inside: 2 Configuration example 5 Configuring the BIG-IP LTM using the Lync 2010 iapp 6 Configuring the BIG-IP GTM 11 Creating a Distributed Application for
More informationFilling the Threat Management Gateway Void with F5
Filling the Threat Management Gateway Void with F5 With the discontinuation of Microsoft Forefront Threat Management Gateway, enterprises need to find a replacement. F5 Secure Web Gateway Services offer
More informationConfiguring a single-tenant BIG-IP Virtual Edition in the Cloud
Deployment Guide Document Version: 1.0 What s inside: 2 Configuration example 4 Securing the isession deployment 6 Downloading and importing the new iapp 6 Configuring the BIG- IP systems using the Cloud
More informationDeploying the BIG-IP LTM with IBM QRadar Logging
Deployment Guide Deploying the BIG-IP LTM with IBM QRadar Logging Welcome to the F5 deployment guide for IBM Security QRadar SIEM and Log Manager. This guide shows administrators how to configure the BIG-IP
More informationDeploying the BIG-IP System for Microsoft Application Virtualization
Deployment Guide Deploying the BIG-IP System for Microsoft Application Virtualization Welcome to the F5 and Microsoft Application Virtualization deployment guide. Use this document for guidance on configuring
More informationDeploying the BIG-IP LTM with IBM WebSphere MQ
Deployment Guide Document version. What s inside: Prerequisites and configuration notes Configuration example and traffic flows Configuring the BIG-IP LTM 5 Next Steps 6 Document Revision History Deploying
More informationOperationalizing the Network: SDN
Operationalizing the Network: SDN Our world, our relationships, and our businesses are being transformed by applications. SDN promises to transform the networks responsible for delivering them. White Paper
More informationPrompta volumus denique eam ei, mel autem
The Utroque F5 Cloud Democritum Migration Aeterno Nostro Reference Aperiam Architecture Usu Prompta volumus denique eam ei, mel autem Whether you re adopting a public, private, or hybrid cloud, the F5
More informationThe F5 Intelligent DNS Scale Reference Architecture.
The F5 Intelligent DNS Scale Reference Architecture. End-to-end DNS delivery solutions from F5 maximize the use of organizational resources, while remaining agile and intelligent enough to scale and support
More informationBuilding an Enterprise Cloud with F5 and IBM
F5 Technical Brief Building an Enterprise Cloud with F5 and IBM Building a dynamic, agile enterprise cloud can be a daunting task. F5 and IBM have created a reference architecture that will accelerate
More informationApplication and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium
Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium Organizations need an end-to-end web application and database security solution to protect data, customers, and their businesses.
More informationDeploying the BIG-IP System v11 with DNS Servers
Deployment Guide Document version 1.1 What s inside: 2 What is F5 iapp? 2 Prerequisites and configuration notes 2 Configuration example 3 Preparation Worksheet 4 Configuring the BIG-IP iapp for DNS Servers
More informationAccelerating Mobile Access
Mobile devices are proliferating, and their use to access applications is skyrocketing, while users are less accepting of application performance issues than ever before. Since mobile devices have limited
More informationDocument version: 1.3 What's inside: Products and versions tested Important:
Deployment Guide Document version: 1.3 What's inside: 2 Prerequisites and configuration notes 2 Configuration example 3 Configuring the BIG-IP ASM for Oracle Database Firewall 3 Configuring the BIG-IP
More information5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP
5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP With support for Cisco ACE load balancer ending, organizations need to find an alternative. Contents Introduction 3 Advanced Architecture 3 Ease of
More informationCloud: Bridges, Brokers and Gateways
Integrating the Cloud: Bridges, Brokers, and Gateways Organizations are increasingly adopting a hybrid strategy for cloud computing to realize the benefits without compromising on control. The integration
More informationDeliver More Applications for More Users
HARDWARE DATASHEET Deliver More Applications for More Users F5 BIG-IP Application Delivery Controller (ADC) platforms can manage even the heaviest traffic loads at both layer 4 and layer 7. By merging
More informationScaleN: Elastic Infrastructure
Emerging data center models are based on flexibility and non-disruptive, on-demand scalability. Infrastructure must not only support these capabilities, but be able itself to provide these same benefits
More informationProtecting Against Online Fraud with F5
Protecting Against Online Fraud with F5 Fraud is a relentless threat to financial services organizations that offer online banking. The F5 Web Fraud Protection solution defends against malware, phishing
More informationDeploying F5 to Replace Microsoft TMG or ISA Server
Deploying F5 to Replace Microsoft TMG or ISA Server Welcome to the F5 deployment guide for configuring the BIG-IP system as a forward and reverse proxy, enabling you to remove or relocate gateway security
More informationF5 and VMware. Realize the Virtual Possibilities.
. Realize the Virtual Possibilities. Simplify. Accelerate. Manage. Secure. Discover how deliver a Software-Defined Data Center by providing simplified end-to-end networking through an application-centric
More informationCompetitive Replacement Program: Product Matrix
Competitive Replacement Program: Product Matrix Helping you get the right Application Delivery Networking solution for your organization s needs. Category Eligible Trade-in Products F5 Purchased Products
More informationProtecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution
Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution Today s security threats increasingly involve application-layer DDoS attacks mounted by organized groups of attackers
More informationConfiguring the BIG-IP LTM v11 for Oracle Database and RAC
Deployment Guide DOCUMENT VERSION 1.0 What s inside: 2 Prerequisites and configuration notes 2 Configuration example 3 Configuring the BIG- IP LTM for Oracle Database 8 Appendix A: Instance name switching
More informationCloud Balancing - A Case Study in Global Application Development
F5 White Paper Cloud Balancing: The Evolution of Global Server Load Balancing Cloud balancing evolves global server load balancing from traditional routing options based on static data to contextaware
More informationThe Shortfall of Network Load Balancing
F5 White Paper The Shortfall of Network Load Balancing Applications running across networks encounter a wide range of performance, security, and availability challenges that cost organizations an enormous
More informationDeploying the BIG-IP System v11 with LDAP Servers
Deployment Guide Deploying the BIG-IP System v11 with What s inside: 2 Prerequisites and configuration notes 2 Configuration example 3 Preparation Worksheet 4 Configuring the BIG-IP iapp for LDAP 7 Next
More informationConfiguring the BIG-IP LTM for FAST Search Server 2010 for SharePoint 2010
Deployment Guide Document Version.2 What s inside: 2 Configuration example 3 Configuring SharePoint Alternate Access Mappings to support SSL offload 6 Configuring the BIG-IP LTM for FAST Search Server
More informationAccess to easy-to-use tools that reduce management time with Arcserve Backup
Access to easy-to-use tools that reduce management time with Arcserve Backup In business, evolution is constant. Staff grows. New offices spring up. New applications are being implemented, and typically,
More informationF5 White Paper. The F5 Powered Cloud
F5 White Paper How F5 solutions power a cloud computing architecture capable of delivering highly-available, secure, and optimized on-demand application services. by Lori MacVittie Technical Marketing
More informationIntegrating F5 Application Delivery Solutions with VMware View 4.5
APPLICATION READY SOLUTION GUIDE What s inside: 2 Improving user experience 2 Enhancing security and access control 3 Application Performance and Availability 4 F5 and global configuration diagram 5 More
More informationDeploying F5 BIG-IP Virtual Editions in a Hyper-Converged Infrastructure
Deploying F5 BIG-IP Virtual Editions in a Hyper-Converged Infrastructure Justin Venezia Senior Solution Architect Paul Pindell Senior Solution Architect Contents The Challenge 3 What is a hyper-converged
More informationGot Files? Get Cloud!
I D C V E N D O R S P O T L I G H T Got Files? Get Cloud! November 2010 Adapted from State of File-Based Storage Use in Organizations by Richard Villars, IDC #221138 Sponsored by F5 Networks The explosion
More informationDeploying F5 Application Ready Solutions with VMware View 4.5
F5 White Paper Deploying F5 Application Ready Solutions with VMware View 4.5 VMware View is the leading desktop virtualization solution built for delivering desktops as a managed service. F5 BIG IP devices
More informationPrompta volumus denique eam ei, mel autem
The Utroque F5 Cloud Democritum Federation Aeterno Nostro Reference Aperiam Architecture Usu Prompta volumus denique eam ei, mel autem Safely adopt an SaaS model by eliminating the drawbacks of distributed
More informationProtect Your Business and Customers from Online Fraud
DATASHEET Protect Your Business and Customers from Online Fraud What s Inside 2 WebSafe 5 F5 Global Services 5 More Information Online services allow your company to have a global presence and to conveniently
More informationDeploying the BIG-IP LTM with. Citrix XenApp. Deployment Guide Version 1.2. What s inside: 2 Prerequisites and configuration notes
Deployment Guide Version 1.2 Deploying the BIG-IP LTM with What s inside: 2 Prerequisites and configuration notes 3 Configuration Worksheet 4 Using the BIG-IP LTM Application Template for 8 Modifying the
More informationThe On-Demand Application Delivery Controller
What s Inside: 2 Increase Intelligence, Not Operating Costs 2 Simplify Your Network 2 Maximize Large-Scale Application Performance 2 Achieve Ultimate Reliability 2 The Advantages of Technology 6 Platforms
More informationThe business value of improved backup and recovery
IBM Software Thought Leadership White Paper January 2013 The business value of improved backup and recovery The IBM Butterfly Analysis Engine uses empirical data to support better business results 2 The
More informationPost-TMG: Securely Delivering Microsoft Applications
Post-TMG: Securely Delivering Microsoft Applications Microsoft Forefront Threat Management Gateway customers need an alternative to secure their Internet-facing Microsoft applications. F5 BIG-IP Application
More informationFight Malware, Malfeasance, and Malingering with F5
Fight Malware, Malfeasance, and Malingering with F5 F5 give organizations control and visibility to secure their users Internet usage. The solution helps protect against malware and data loss, ensure compliance,
More informationF5 and the 8 Ways to Virtualization
F5 White Paper F5 pioneered the concept of breaking up data center virtualization technologies into eight unique categories within the data center. Any virtualization products or technologies implemented
More informationCloud Balancing: The Evolution of Global Server Load Balancing
Cloud Balancing: The Evolution of Global Server Load Balancing Cloud balancing moves global server load balancing from traditional routing options based on static data to context-aware distribution across
More informationReduce your data storage footprint and tame the information explosion
IBM Software White paper December 2010 Reduce your data storage footprint and tame the information explosion 2 Reduce your data storage footprint and tame the information explosion Contents 2 Executive
More informationDeploying the BIG-IP System with VMware vcenter Site Recovery Manager
Deployment Guide Version 1.0 Deploying the BIG-IP System with VMware vcenter Site Recovery Manager Contents 2 Prerequisites and configuration notes 2 Deployment overview 3 Example configuration of BIG-IP
More informationHitachi Cloud Service for Content Archiving. Delivered by Hitachi Data Systems
SOLUTION PROFILE Hitachi Cloud Service for Content Archiving, Delivered by Hitachi Data Systems Improve Efficiencies in Archiving of File and Content in the Enterprise Bridging enterprise IT infrastructure
More informationTrends in Enterprise Virtualization Technologies. A Research Study by F5 Networks
Trends in Enterprise Virtualization Technologies A Research Study by F5 Networks Trends in Enterprise Virtualization Technologies What s Inside Survey Overview and Objectives 2 Methodology 2 Key Findings
More informationVMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking
F5 White Paper VMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking VMware Infrastructure products provide the next generation virtual platform for the new data
More informationSecure iphone Access to Corporate Web Applications
F5 Technical Brief Secure iphone Access to Corporate Web Applications The way corporations operate around mobile devices is currently shifting employees are starting to use their own devices for business
More informationF5 PARTNERSHIP SOLUTION GUIDE. F5 and VMware. Virtualization solutions to tighten security, optimize performance and availability, and unify access
F5 PARTNERSHIP SOLUTION GUIDE F5 and VMware Virtualization solutions to tighten security, optimize performance and availability, and unify access 1 W H AT 'S INS I DE Data Center Virtualization 3 Enterprise
More informationOptimize Application Delivery Across Your Globally Distributed Data Centers
BIG IP Global Traffic Manager DATASHEET What s Inside: 1 Key Benefits 2 Globally Available Applications 4 Simple Management 5 Secure Applications 6 Network Integration 6 Architecture 7 BIG-IP GTM Platforms
More informationHigh-Performance DNS Services in BIG-IP Version 11
F5 White Paper High-Performance DNS Services in BIG-IP Version 11 To provide high-quality user experiences on the Internet, networks must be designed with optimized, secure, highly available, and high-performance
More informationEND TO END DATA CENTRE SOLUTIONS COMPANY PROFILE
END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing
More informationF5 Data Solutions w ofercie NASK
F5 Data Solutions w ofercie NASK 2 Company Snapshot Leading provider of Application Delivery Networking products that optimize the security, performance & availability of network applications, servers
More informationSimplified Management With Hitachi Command Suite. By Hitachi Data Systems
Simplified Management With Hitachi Command Suite By Hitachi Data Systems April 2015 Contents Executive Summary... 2 Introduction... 3 Hitachi Command Suite v8: Key Highlights... 4 Global Storage Virtualization
More informationUsing EMC SourceOne Email Management in IBM Lotus Notes/Domino Environments
Using EMC SourceOne Email Management in IBM Lotus Notes/Domino Environments Technology Concepts and Business Considerations Abstract EMC SourceOne Email Management enables customers to mitigate risk, reduce
More informationAccelerating SaaS Applications with F5 AAM and SSL Forward Proxy
Deployment Guide Accelerating Applications with F5 AAM and SSL Forward Proxy Welcome to the F5 deployment guide for Software as a Service (). This guide shows administrators how to configure the BIG-IP
More informationESG Lab Review. Authors: Copyright 2006, Enterprise Strategy Group, Inc. All Rights Reserved
ESG Lab Review Acopia ARX: Transparent, Heterogeneous Data Migrations for NAS Storage A Product Review by ESG Lab February 2006 Authors: Tony Asaro Brian Garrett Copyright 2006,, Inc. All Rights Reserved
More informationOptimizing VMware View VDI Deployments with F5
F5 White Paper Optimizing VDI Deployments with F5 F5 BIG-IP Local Traffic Manager optimizes deployments between offices to create a user experience on par with local desktops. by Alan Murphy Technical
More informationConnecting to the Cloud with F5 BIG-IP Solutions and VMware VMotion
F5 Technical Brief Connecting to the Cloud with F5 BIG-IP Solutions and VMware VMotion F5 and VMware partner to enable live application and storage migrations between data centers and clouds, over short
More informationLoad Balancing 101: Firewall Sandwiches
F5 White Paper Load Balancing 101: Firewall Sandwiches There are many advantages to deploying firewalls, in particular, behind Application Delivery Controllers. This white paper will show how you can implement
More informationBest Practices for Managing Storage in the Most Challenging Environments
Best Practices for Managing Storage in the Most Challenging Environments Sanjay Srivastava Senior Product Manager, Symantec The Typical Virtualization Adoption Path Today, 20-25% of server workloads are
More informationInformatica Application Information Lifecycle Management
Informatica Application Information Lifecycle Management Cost-Effectively Manage Every Phase of the Information Lifecycle brochure Controlling Explosive Data Growth The era of big data presents today s
More informationArchiving, Backup, and Recovery for Complete the Promise of Virtualization
Archiving, Backup, and Recovery for Complete the Promise of Virtualization Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that
More informationFive Reasons to Take Your Virtualization Environment to a New Level
Five Reasons to Take Your Virtualization Environment to a New Level Study finds the addition of robust management capabilities drives 20 to 40 percent increases in key performance metrics WHITE PAPER Table
More informationF5 and Microsoft Exchange Security Solutions
F5 PARTNERSHIP SOLUTION GUIDE F5 and Microsoft Exchange Security Solutions Deploying a service-oriented perimeter for Microsoft Exchange WHAT'S INSIDE Pre-Authentication Mobile Device Security Web Application
More informationEnhancing Application Protection and Recovery with a Modern Approach to Snapshot Management
Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management A CommVault Business Value and Technology White Paper which covers leveraging a modern approach to managing snapshots
More informationEmpowering IT to Optimize Storage Capacity Management
NETAPP WHITE PAPER Empowering IT to Optimize Storage Capacity Management Steve Cohen, Gadi Oren, and George Maheras, NetApp November 2008 WP-7060-1108 TABLE OF CONTENTS 1 EXECUTIVE OVERVIEW...3 2 CAPACITY
More informationSolution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments
Unified Information Management for Complex Windows Environments The Explosion of Unstructured Information It is estimated that email, documents, presentations, and other types of unstructured information
More informationVeritas Backup Exec : Protecting Microsoft SharePoint
Veritas Backup Exec : Protecting Microsoft SharePoint Who should read this paper Technical White Papers are designed to introduce IT professionals to key technologies and technical concepts that are associated
More informationHardware Load Balancing for Optimal Microsoft Exchange Server 2010 Performance
F5 White Paper Hardware Load Balancing for Optimal Microsoft Exchange Server 2010 Performance A comprehensive F5 solution readies application infrastructure for a successful implementation of the re-engineered
More informationIntroduction to NetApp Infinite Volume
Technical Report Introduction to NetApp Infinite Volume Sandra Moulton, Reena Gupta, NetApp April 2013 TR-4037 Summary This document provides an overview of NetApp Infinite Volume, a new innovation in
More informationOptimizing the Data Center for Today s State & Local Government
WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S STATE...... &.. LOCAL...... GOVERNMENT.......................... Optimizing the Data Center for Today s State & Local Government Who should read this
More informationThe VDC Maturity Model Moving Up the Virtual Data Center Stack
F5 White Paper The VDC Maturity Model Moving Up the Virtual Data Center Stack Defining the baseline and process of virtualization maturity for the data center. by Alan Murphy Technical Marketing Manager,
More informationStudy Shows Businesses Experience Significant Operational and Business Benefits from VMware vrealize Operations
Study Shows Businesses Experience Significant Operational and Business Benefits from VMware vrealize Operations Reduced Cost of Infrastructure Management, Higher Application Availability, Visibility Across
More informationW H I T E P A P E R. Reducing Server Total Cost of Ownership with VMware Virtualization Software
W H I T E P A P E R Reducing Server Total Cost of Ownership with VMware Virtualization Software Table of Contents Executive Summary............................................................ 3 Why is
More informationHitachi Cloud Services for Private File Tiering. Low Risk Cloud at Your Own Pace. The Hitachi Vision on Cloud
S o l u t i o n P r o f i l e Hitachi Cloud Services for Private File Tiering Low Risk Cloud at Your Own Pace Hitachi Data Systems is a premier provider of cloud storage infrastructure, services and solutions
More informationF5 and VMware Solution Guide. Virtualization solutions to optimize performance, improve availability, and reduce complexity
F5 and ware Solution Guide Virtualization solutions to optimize performance, improve availability, and reduce complexity Features >> Increased density by up to >> 60 percent Free up server resources to
More informationThe Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence
How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver White Paper: BEST PRACTICES The Modern Service Desk: Contents Introduction............................................................................................
More informationBest Practices for Implementing Software Asset Management
Best Practices for Implementing Software Asset Management Table of Contents I. The Case for Software Asset Management (SAM)............................ 2 II. Laying the Groundwork for SAM............................................
More informationA Dell Technical White Paper Dell Compellent
The Architectural Advantages of Dell Compellent Automated Tiered Storage A Dell Technical White Paper Dell Compellent THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL
More informationF5 and Microsoft Delivering IT as a Service
F5 and Microsoft Delivering IT as a Service F5 s best-in-class, application-specific load-balancing and acceleration combined with Microsoft Windows Server 2008 R2 Hyper-V and System Center management
More informationData Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Trusted and Proven Email Archiving Symantec Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage,
More informationAn Oracle White Paper September 2013. Lowering Storage Costs with the World's Fastest, Highest Capacity Tape Drive
An Oracle White Paper September 2013 Lowering Storage Costs with the World's Fastest, Highest Capacity Tape Drive Executive Overview... 1 Introduction... 1 Unmatched Capacity and Performance... 3 Lowering
More informationBackup Exec 2014: Protecting Microsoft SharePoint
TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SHAREPOINT........................................ Backup Exec 2014: Protecting Microsoft SharePoint Who should read this paper Technical White Papers
More informationIntegration and Automation with Lenovo XClarity Administrator
Integration and Automation with Lenovo XClarity Administrator Extend Management Processes to Existing Ecosystems Lenovo Enterprise Business Group April 2015 2015 Lenovo. All rights reserved. Introduction
More informationConsolidate and Virtualize Your Windows Environment with NetApp and VMware
White Paper Consolidate and Virtualize Your Windows Environment with NetApp and VMware Sachin Chheda, NetApp and Gaetan Castelein, VMware October 2009 WP-7086-1009 TABLE OF CONTENTS 1 EXECUTIVE SUMMARY...
More information10 Point Plan to Eliminate PST Files
10 Point Plan to Eliminate PST Files Executive Summary When it comes to assuring a comprehensive corporate data retention and litigation readiness plan, no single data set seems to present more challenges
More informationI D C M A R K E T S P O T L I G H T
I D C M A R K E T S P O T L I G H T E n t r y- L e ve l E n t e r p r ise Storage: Stepping Up t o B i g C h a l lenges October 2012 Adapted from The Appliance-ization of the Datacenter and Its Impact
More informationEnterprise Vault 11 Feature Briefing
Enterprise Vault 11 Feature Briefing Enterprise Vault SCOM Enhancements This document is about the new Enterprise Vault SCOM enhancements introduced in Enterprise Vault 11. If you have any feedback or
More information