Datacane - When the bits hit the fan!

Size: px
Start display at page:

Download "Datacane - When the bits hit the fan!"

Transcription

1 TECHNICAL BRIEF: DATACANE Datacane - When the bits hit the fan! Who should read this paper This paper is intended for those who have seen the Symantec Datacane video and wish to know more about the underlying technology used in its production.

2

3 Content Introduction Overview The Failover Scenario Configuration Details Appendix 1 - Server Rack Build Details Appendix 2 - Primary Database Cluster Configuration Appendix 3 - Primary Application Cluster Configuration Appendix 4 - First Primary Web ApplicationHA Configuration Appendix 5 - Second Primary Web ApplicationHA Configuration Appendix 6 - Recovery Site Single Node DB Cluster Configuration Appendix 7 - Recovery Site Single Node App Cluster Configuration Appendix 8 - Recovery Site Web Server ApplicationHA Configuration Appendix 9 - Primary Database Server Volume Manager (VxVM) Configuration Appendix 10 - Recovery Site Database Server Volume Manager (VxVM) Configuration Appendix 11 - Primary Application Server Volume Manager (VxVM) Configuration Appendix 12 - Flexible Storage Sharing Configuration Appendix 13 - Stills From The Datacane Video

4 Introduction This paper describes the technical architecture of the hardware and software components used in the Symantec Information Availability team's "Datacane" video production. The "Datacane" video was produced in September, 2013 by Symantec product marketing to promote Symantec Information Availability products. It dramatizes a scenario in which an organization, threatened by an approaching hurricane must migrate its most mission critical applications to a remote data center just minutes before a storm surge is forecast to occur and possibly flood the data center. The Symantec solutions used and their role in the video are: Symantec Storage Foundation Cluster File System: Provides cluster volume management and cluster file system services to servers in a cluster, allowing all servers to concurrently access the cluster file system data. Symantec Cluster Server: Provides local high availability and wide-area disaster recovery to applications running in physical or virtual machines by automating the start, stop, monitoring and failover of the application. Symantec Application HA: Provides high availability for applications running in a virtual machine by automating the start, stop, monitoring and in-place restart of the application. Symantec Replicator: Provides continuous volume replication and periodic file replication between sites for disaster recovery purposes. Veritas Operations Manager: Provides centralized, "single pane of glass" management and visibility into the Storage Foundation, Cluster Server and Application HA configurations. Overview The server rack designated as the primary data center was situated in the Insurance Institute for Business and Home Safety's research center in Richburg, South Carolina while the rack designated as the secondary, or recovery data center, was placed in a data center co-location facility in Ashburn, Virginia. Both "data centers" and the migration of the applications were monitored from Symantec's Executive Briefing Center in Mountain View, California. The IBHS research center was built to measure the effect of extreme weather conditions on structures and other property, and was used for the production of the "Datacane" video to simulate hurricane-force winds and the accompanying storm surge. Figure 1: The IBHS research center in Richburg, South Carolina 1

5 Architecture Summary Primary Site The primary data center located in Richburg, SC consisted of two physical servers running VMware vsphere 5.1. Each server hosted a set of virtual machines, some providing local management services such as VMware vcenter, Veritas Operations Manager (VOM), Symantec HA console services and DNS. The remaining virtual machines hosted the database, application and web tiers of a multi-tier application stack mimicking Symantec's Norton e-store architecture, as well as idle virtual machines to provide local high availability in the event of an isolated local failure. All the database and application virtual machines at the primary site had Symantec Storage Foundation Cluster File System High Availability installed. This solution bundle provides storage management through the Cluster Volume Manager and Cluster File System extensions to Symantec Storage Foundation, allowing file systems to be mounted concurrently across all cluster nodes. It also includes Symantec Cluster Server to provide local high availability and wide-area disaster recovery services. The web servers had Symantec ApplicationHA installed, which provide application start, stop, monitoring and restart within a virtual machine. (Please refer to Figure 2 for a logical block diagram of the configuration.) At the primary site, virtual machines were configured as a 2-node cluster for the Oracle database server, a 2-node cluster for the Oracle WebLogic application server, and the Apache web servers were configured as two standalone virtual machines with the web server instances managed by Symantec ApplicationHA. Veritas Operations Manager was employed to manage all storage and HA/DR for the site, and to configure Virtual Business Services which manages mulit-tier application dependencies. This allows the automated startup, shutdown and failover of multi-tier application stacks like the Norton e-store to be properly orchestrated and ensures all application components are started and stopped in the proper sequence. With the latest (6.1) version of Symantec Storage Foundation Cluster File System installed, it was possible to employ a "shared nothing" storage model consisting of 100% direct-attached storage (DAS) on all nodes, using the new Flexible Storage Sharing feature. This negated the need for any complex SAN infrastructure as storage directly attached to one host was presented to the other node in the cluster across the cluster interconnects. Architecture Summary Recovery Site The recovery data center located in Ashburn, VA consisted of a single physical server running VMware vsphere 5.1. Similar to the primary data center, this server hosted virtual machines providing local management services as well as virtual machines for all three tiers of the Norton e-store application stack. There was no second physical server or idle virtual machines for local high availability, which is a common approach to disaster recovery site configuration. (Please refer to Figure 2 for a logical block diagram of the configuration.) The database and application virtual machines each had Symantec Storage Foundation High Availability installed, which provides nonclustered storage management as well as Symantec Cluster Server for high availability and disaster recovery. The web server virtual machine had Symantec ApplicationHA installed. As with the primary site, Veritas Operations Manager was employed here to manage storage, HA/DR and Virtual Business Services. The application's database files were replicated from Richburg to Ashburn using Symantec Volume Replicator. Symantec Volume Replicator is a block-level continuous data replication solution, and was set in this configuration to replicate asynchronously due to the distance involved. 2

6 Figure 2: Logical diagram of the disaster recovery architecture Figure 3: Detail of virtual machine builds. Note that at the primary site (Richburg), there were two database and application server virtual machines for redundancy 3

7 The Failover Scenario With the Norton e-store service running at the primary data center in Richburg and its data being continuously replicated to the recovery site in Ashburn, Symantec employees monitored application status from consoles in both Richburg and Symantec corporate headquarters in Mountain View, California. With a hurricane approaching, the employees were alerted to the likelihood of a storm surge only minutes away. From the Veritas Operations Manager console, it was confirmed that the Virtual Business Service named Norton Primary was currently running: Figure 4: View of Norton e-store service at primary site prior to migration Having made the decision to migrate this mission critical service to the recovery site 1, operations staff selected from the VOM console the appropriate recovery plan, and executed it: 1- Note that this type of failover differs from a failover that occurs automatically as the result of a failure. In this instance, the failover is initiated in anticipation of a likely disaster, and is preferable since it allows for a graceful shutdown of the applications and orderly restart at the recovery site. The Symantec solution set works the same way in either scenario, though. 4

8 Figure 5: Executing a recovery plan Once failover was initiated, the storm surge was only three minutes away. At the three minute mark, the storm surge waters flooded the primary data center, and employees in Mountain View, monitoring critical services from their Veritas Operations Manager console, confirmed that the Norton e-store service was fully recovered and available. 5

9 Configuration Details The appendices that follow contain the details of the server and cluster configurations for each site and system. While not strictly a reference architecture, it gives a very detailed description of how a multi-tiered application stack such as the Norton e-store might be configured for disaster recovery using Symantec solutions. It's assumed that the reader is familiar with both Volume Manager and Symantec Cluster Server configurations and output. Appendix 1 - Server Rack Build Details Briefly, the Primary Data Center and Recovery Data Center configurations were built on Dell R720 servers running VMware vsphere 5.1. The virtual machines configured to run the various tiers of the multi-tier application stack shown in the video were all Red Hat Enterprise Linux 6.x systems running Symantec Storage Foundation/HA version 6.1. Primary Site (Richburg, SC): ESXi 5.1 build: 64 GB RAM 2 x Intel Xeon E processors (6 core processors, with Hyperthreading capabilities, so VMware sees it as 24 logical processors) Mellanox ConnectX-3 Dual Port: Both ports VM DirectPath to Oracle VM 300 GB SAS Disk #1: 10 GB ESXi partition, remainder VMFS datastore1 300 GB SAS Disk #2: VMFS datastore2 300 GB SAS Disk #3: VMFS datastore3 400 GB SSD: VM DirectPath to Oracle VM ESXi Host #1 Guest Virtual Machines: vcenter 5.1 Windows 2008R2 8 GB RAM 2 vcpu NIC1 on vswitch1 (User) NIC2 on vswitch2 (Management) 50 GB VMDK on datastore2 (OS) Symantec HA Console Windows 2008R2 4 GB RAM 2 vcpu NIC1 on vswitch1 (User) NIC2 on vswitch2 (Management) 40 GB VMDK on datastore2 (OS) Web Tier Red Hat Enterprise Linux 6.X 6

10 4 GB RAM 2 vcpu NIC1 on vswitch1 (User) NIC2 on vswitch2 (Management) 24 GB VMDK on datastore2 (OS) 4 GB swap 20 GB / (ext4) Application Tier Red Hat Enterprise Linux 6.X 16 GB RAM 4 vcpu NIC1 on vswitch1 (User) NIC2 on vswitch2 (Management) NIC3 on vswitch3 (VCS HB1) NIC4 on vswitch4 (VCS HB2) 80 GB VMDK on datastore3 (CFS/FSS, Application data) 32 GB VMDK on datastore2 (OS) 8 GB swap 24 GB / (ext4, room for application binaries) Database Tier Red Hat Enterprise Linux 6.X 16 GB RAM 4 vcpu NIC1 on vswitch1 (User) NIC2 on vswitch2 (Management) VM DirectPath Infiniband Port1 (VCS HB1) VM DirectPath Infiniband Port2 (VCS HB2) VM DirectPath SSD (CFS/FSS, Oracle data) 32 GB VMDK on datastore2 (OS) 8 GB swap 24 GB / (ext4, room for Oracle binaries) ESXi Host #2 Guest Virtual Machines: Active Directory/DNS Windows 2008R2 2 GB RAM 2 vcpu NIC1 on vswitch1 (User) NIC2 on vswitch2 (Management) 7

11 40 GB VMDK on datastore2 (OS) Veritas Operations Manager (VOM) Red Hat Enterprise Linux 6.X 8 GB RAM 2 vcpu NIC1 on vswitch1 (User) NIC2 on vswitch2 (Management) 28 GB VMDK on datastore2 (OS) 4 GB swap 24 GB / (ext4, room for VOM) Web Tier Red Hat Enterprise Linux 6.X 4 GB RAM 2 vcpu NIC1 on vswitch1 (User) NIC2 on vswitch2 (Management) 24 GB VMDK on datastore2 (OS) 4 GB swap 20 GB / (ext4) Application Tier Red Hat Enterprise Linux 6.X 16 GB RAM 4 vcpu NIC1 on vswitch1 (User) NIC2 on vswitch2 (Management) NIC3 on vswitch3 (VCS HB1) NIC4 on vswitch4 (VCS HB2) 80 GB VMDK on datastore3 (CFS/FSS, Application data) 32 GB VMDK on datastore2 (OS) 8 GB swap 24 GB / (ext4, room for application binaries) Database Tier Red Hat Enterprise Linux 6.X 16 GB RAM 4 vcpu NIC1 on vswitch1 (User) NIC2 on vswitch2 (Management) VM DirectPath Infiniband Port1 (VCS HB1) VM DirectPath Infiniband Port2 (VCS HB2) VM DirectPath SSD (CFS/FSS, Oracle data) 8

12 32 GB VMDK on datastore2 (OS) 8 GB swap 24 GB / (ext4, room for Oracle binaries) Recovery Site (Ashburn, VA): ESXi 5.1 build: 64 GB RAM 2 x Intel Xeon E processors (6 core processors, with Hyperthreading capabilities, so VMware sees it as 24 logical processors) 300 GB SAS Disk #1: 10 GB ESXi partition, remainder VMFS datastore1 300 GB SAS Disk #2: VMFS datastore2 300 GB SAS Disk #3: VMFS datastore3 300 GB SAS Disk #3: VMFS datastore3 ESXi Host #1 Guest Virtual Machines: vcenter 5.1 Windows 2008R2 8 GB RAM 2 vcpu NIC1 on vswitch1 (User) NIC2 on vswitch2 (Management) 50 GB VMDK on datastore2 (OS) Symantec HA Console Windows 2008R2 4 GB RAM 2 vcpu NIC1 on vswitch1 (User) NIC2 on vswitch2 (Management) 50 GB VMDK on datastore2 (OS) Active Directory/DNS Windows 2008R2 2 GB RAM 2 vcpu NIC1 on vswitch1 (User) NIC2 on vswitch2 (Management) 40 GB VMDK on datastore2 (OS) Veritas Operations Manager (VOM) Red Hat Enterprise Linux 6.X 8 GB RAM 9

13 2 vcpu NIC1 on vswitch1 (User) NIC2 on vswitch2 (Management) 28 GB VMDK on datastore2 (OS) 4 GB swap 24 GB / (ext4, room for VOM) Web Tier Red Hat Enterprise Linux 6.X 4 GB RAM 2 vcpu NIC1 on vswitch1 (User) NIC2 on vswitch2 (Management) 24 GB VMDK on datastore3 (OS) 4 GB swap 20 GB / (ext4) Application Tier Red Hat Enterprise Linux 6.X 16 GB RAM 4 vcpu NIC1 on vswitch1 (User) NIC2 on vswitch2 (Management) NIC3 on vswitch3 (VCS HB1) NIC4 on vswitch4 (VCS HB2) 80 GB VMDK on datastore3 (VxVM/VxFS, Application data) 32 GB VMDK on datastore3 (OS) 8 GB swap 24 GB / (ext4, room for application binaries) Database Tier Red Hat Enterprise Linux 6.X 16 GB RAM 4 vcpu NIC1 on vswitch1 (User) NIC2 on vswitch2 (Management) NIC3 on vswitch3 (VCS HB1) NIC4 on vswitch4 (VCS HB2) 300 GB on datastore4 (VxVM/VxFS, Oracle Data) 32 GB VMDK on datastore3 (OS) 8 GB swap 24 GB / (ext4, room for Oracle binaries) 10

14 Appendix 2 - Primary Database Cluster Configuration 11

15 12

16 13 Datacane - When the bits hit the fan!

17 14

18 15 Datacane - When the bits hit the fan!

19 16

20 Appendix 3 - Primary Application Cluster Configuration 17

21 18

22 19 Datacane - When the bits hit the fan!

23 20

24 21 Datacane - When the bits hit the fan!

25 22

26 23 Datacane - When the bits hit the fan!

27 24

28 Appendix 4 - First Primary Web ApplicationHA Configuration 25

29 26

30 Appendix 5 - Second Primary Web ApplicationHA Configuration 27

31 28

32 Appendix 6 - Recovery Site Single Node DB Cluster Configuration 29

33 30

34 31 Datacane - When the bits hit the fan!

35 32

36 Appendix 7 - Recovery Site Single Node App Cluster Configuration 33

37 34

38 35 Datacane - When the bits hit the fan!

39 36

40 37 Datacane - When the bits hit the fan!

41 38

42 39 Datacane - When the bits hit the fan!

43 Appendix 8 - Recovery Site Web Server ApplicationHA Configuration 40

44 41 Datacane - When the bits hit the fan!

45 Appendix 9 - Primary Database Server Volume Manager (VxVM) Configuration 42

46 43 Datacane - When the bits hit the fan!

47 44

48 45 Datacane - When the bits hit the fan!

49 Appendix 10 - Recovery Site Database Server Volume Manager (VxVM) Configuration 46

50 47 Datacane - When the bits hit the fan!

51 48

52 Appendix 11 - Primary Application Server Volume Manager (VxVM) Configuration 49

53 50

54 Appendix 12 - Flexible Storage Sharing Configuration The screen capture below shows the storage configuration as viewed by the first database node. As mentioned earlier, Flexible Storage Sharing (FSS) was employed to share each node s direct-attached storage (DAS) with the other node in the cluster. In this case, each node has two Intel solid state disk (SSD) devices which it has exported to the other node. So from system ia-db1, we see that in addition to its own Intel SSD devices named sdc and sdd, ia-db1 also has as remote disks the Intel SSD devices exported to the cluster from ia-db2. When volumes are created in an FSS configuration they are created on a local disk, and mirrored to a remote disk. In this way the volume is still available to surviving nodes in the event a node is lost. File systems created on these volumes are concurrently mounted on all nodes in the cluster. Symantec Cluster File System supports up to eight nodes when FSS is employed. Figure 6: Output from vxdisk command showing FSS-shared disks 51

55 Appendix 13 - Stills From The Datacane Video Figure 7: The primary data center, before the storm Figure 8: Hurricane in full swing, with winds increasing by the minute 52

56 Figure 9: Chad Bersche (seated, left) and John Cronin (seated, right), both Symantec Product Managers, monitor the progress of the failover of the Norton e- store applications as Amol Shah looks on Figure 10: With eight seconds remaining on the clock, the storm surge arrives, posing an imminent threat to the primary data center 53

57 Figure 11: Out of time, the flood waters enter the data center Figure 12: This really can t be good for data center equipment 54

58 Figure 13: Jason Buffington (left), Sr. Analyst with Enterprise Strategy Group, and Ryan Jancaitis, Symantec Product Manager, monitor the status of the Norton e-store service from Symantec corporate headquarters in Mountain View, California and confirm that the service is back online and running at 55

59

60 About Symantec Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses, and governments seeking the freedom to unlock the opportunities technology brings anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company operating one of the largest global data-intelligence networks, has provided leading security, backup, and availability solutions for where vital information is stored, accessed, and shared. The company s more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2013, it recorded revenues of $6.9 billion. To learn more go to or connect with Symantec at: go.symantec.com/socialmedia. For specific country offices and contact numbers, please visit our website. Symantec World Headquarters 350 Ellis St. Mountain View, CA USA +1 (650) (800) Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 5/

Confidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA

Confidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA WHITE PAPER: VIRTUALIZE BUSINESS-CRITICAL APPLICATIONS.............. WITH..... CONFIDENCE..................... Confidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA

More information

Veritas InfoScale Availability

Veritas InfoScale Availability Veritas InfoScale Availability Delivers high availability and disaster recovery for your critical applications Overview protects your most important applications from planned and unplanned downtime. InfoScale

More information

Veritas Cluster Server from Symantec

Veritas Cluster Server from Symantec Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

Keeping GE Healthcare Universal Viewer Highly Available with Symantec ApplicationHA

Keeping GE Healthcare Universal Viewer Highly Available with Symantec ApplicationHA Keeping GE Healthcare Universal Viewer Highly Available with Symantec ApplicationHA Solution Overview: High Availability Introduction Providing high availability to clinical applications like GE Universal

More information

Realizing the True Potential of Software-Defined Storage

Realizing the True Potential of Software-Defined Storage Realizing the True Potential of Software-Defined Storage Who should read this paper Technology leaders, architects, and application owners who are looking at transforming their organization s storage infrastructure

More information

Symantec Cluster Server powered by Veritas

Symantec Cluster Server powered by Veritas Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

Software-defined Storage at the Speed of Flash

Software-defined Storage at the Speed of Flash TECHNICAL BRIEF: SOFTWARE-DEFINED STORAGE AT THE SPEED OF... FLASH..................................... Intel SSD Data Center P3700 Series and Symantec Storage Foundation with Flexible Storage Sharing

More information

Veritas Storage Foundation High Availability for Windows by Symantec

Veritas Storage Foundation High Availability for Windows by Symantec Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability

More information

Strategies to Solve and Optimize Management of Multi-tiered Business Services

Strategies to Solve and Optimize Management of Multi-tiered Business Services WHITE PAPER: STRATEGIES TO SOLVE AND OPTIMIZE MGMT OF... MULTI-TIERED............. BUSINESS......... SERVICES............... Strategies to Solve and Optimize Management of Multi-tiered Business Services

More information

Direct virtual machine creation from backup with BMR

Direct virtual machine creation from backup with BMR NETBACKUP 7.6 FEATURE BRIEFING DIRECT VIRTUAL MACHINE CREATION FROM BACKUP WITH BMR NetBackup 7.6 Feature Briefing Direct virtual machine creation from backup with BMR Version number: 1.0 Issue date: 5

More information

Deploying Global Clusters for Site Disaster Recovery via Symantec Storage Foundation on Infortrend Systems

Deploying Global Clusters for Site Disaster Recovery via Symantec Storage Foundation on Infortrend Systems Deploying Global Clusters for Site Disaster Recovery via Symantec Storage Foundation on Infortrend Systems Application Notes Abstract: This document describes how to apply global clusters in site disaster

More information

Backup Exec 15: Protecting Microsoft Hyper-V

Backup Exec 15: Protecting Microsoft Hyper-V TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT HYPER-V........................................ Backup Exec 15: Protecting Microsoft Hyper-V Who should read this paper Technical White Papers are

More information

Backup Exec 2014: Protecting Microsoft SQL

Backup Exec 2014: Protecting Microsoft SQL TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SQL........................................ Backup Exec 2014: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed

More information

Confidently Virtualize Business-Critical Applications in Microsoft

Confidently Virtualize Business-Critical Applications in Microsoft Confidently Virtualize Business-Critical Applications in Microsoft Hyper-V with Veritas ApplicationHA Who should read this paper Windows Virtualization IT Architects and IT Director for Windows Server

More information

VMware vsphere-6.0 Administration Training

VMware vsphere-6.0 Administration Training VMware vsphere-6.0 Administration Training Course Course Duration : 20 Days Class Duration : 3 hours per day (Including LAB Practical) Classroom Fee = 20,000 INR Online / Fast-Track Fee = 25,000 INR Fast

More information

Backup Exec 15: Protecting Microsoft SQL

Backup Exec 15: Protecting Microsoft SQL TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT SQL........................................ Backup Exec 15: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed

More information

Instant Recovery for VMware

Instant Recovery for VMware NETBACKUP 7.6 FEATURE BRIEFING INSTANT RECOVERY FOR VMWARE NetBackup 7.6 Feature Briefing Instant Recovery for VMware Version number: 1.0 Issue date: 2 nd August 2013 This document describes a feature

More information

Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture. Dell Compellent Product Specialist Team

Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture. Dell Compellent Product Specialist Team Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture Dell Compellent Product Specialist Team THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL

More information

Running Highly Available, High Performance Databases in a SAN-Free Environment

Running Highly Available, High Performance Databases in a SAN-Free Environment TECHNICAL BRIEF:........................................ Running Highly Available, High Performance Databases in a SAN-Free Environment Who should read this paper Architects, application owners and database

More information

Virtualizing Business-Critical Applications with Confidence

Virtualizing Business-Critical Applications with Confidence Virtualizing Business-Critical Applications with Confidence T e c h n i c a l W H I T E P A P E R Challenges Using Traditional High-Availability Solutions Within any business, there are a number of applications

More information

VMware vcenter Site Recovery Manager 5 Technical

VMware vcenter Site Recovery Manager 5 Technical VMware vcenter Site Recovery Manager 5 Technical Raj Jethnani, VCP 4/5, VCAP4-DCA / DCD Systems Engineer VMware, Inc. rjethnani@vmware.com @rajtech 2009 VMware Inc. All rights reserved Agenda Simplifying

More information

WHITE PAPER: HIGH CUSTOMIZE AVAILABILITY AND DISASTER RECOVERY

WHITE PAPER: HIGH CUSTOMIZE AVAILABILITY AND DISASTER RECOVERY WHITE PAPER: HIGH CUSTOMIZE AVAILABILITY AND DISASTER RECOVERY Confidence in a connected world. Protecting Business-Critical Applications in a VMware Infrastructure 3 Environment Using Veritas Cluster

More information

High Availability for Databases Protecting DB2 Databases with Veritas Cluster Server

High Availability for Databases Protecting DB2 Databases with Veritas Cluster Server WHITE PAPER: P customize T E C H N I C A L Confidence in a connected world. High Availability for Databases Protecting DB2 Databases with Veritas Cluster Server Eric Hennessey, Director Technical Product

More information

Virtual SAN Design and Deployment Guide

Virtual SAN Design and Deployment Guide Virtual SAN Design and Deployment Guide TECHNICAL MARKETING DOCUMENTATION VERSION 1.3 - November 2014 Copyright 2014 DataCore Software All Rights Reserved Table of Contents INTRODUCTION... 3 1.1 DataCore

More information

Veritas Cluster Server by Symantec

Veritas Cluster Server by Symantec Veritas Cluster Server by Symantec Reduce application downtime Veritas Cluster Server is the industry s leading clustering solution for reducing both planned and unplanned downtime. By monitoring the status

More information

Vocera Voice 4.3 and 4.4 Server Sizing Matrix

Vocera Voice 4.3 and 4.4 Server Sizing Matrix Vocera Voice 4.3 and 4.4 Server Sizing Matrix Vocera Server Recommended Configuration Guidelines Maximum Simultaneous Users 450 5,000 Sites Single Site or Multiple Sites Requires Multiple Sites Entities

More information

Symantec Control Compliance Suite Standards Manager

Symantec Control Compliance Suite Standards Manager Symantec Control Compliance Suite Standards Manager Automate Security Configuration Assessments. Discover Rogue Networks & Assets. Harden the Data Center. Data Sheet: Security Management Control Compliance

More information

MAKING YOUR VIRTUAL INFRASTUCTURE NON-STOP Making availability efficient with Veritas products

MAKING YOUR VIRTUAL INFRASTUCTURE NON-STOP Making availability efficient with Veritas products TECHNOLOGY REVIEW MAKING YOUR VIRTUAL INFRASTUCTURE NON-STOP Making availability efficient with Veritas products AUGUST 2015 All businesses have a core set of applications and services that are critical

More information

Backup Exec 2014: Protecting Microsoft SharePoint

Backup Exec 2014: Protecting Microsoft SharePoint TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SHAREPOINT........................................ Backup Exec 2014: Protecting Microsoft SharePoint Who should read this paper Technical White Papers

More information

Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER

Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER Challenges of Using Traditional High-Availability Solutions Business-critical applications and the systems they

More information

Symantec NetBackup 7.1 What s New and Version Comparison Matrix

Symantec NetBackup 7.1 What s New and Version Comparison Matrix Symantec 7.1 What s New and Version Comparison Matrix Symantec 7 allows customers to standardize backup and recovery operations across physical and virtual environments with fewer resources and less risk

More information

High-Availability Fault Tolerant Computing for Remote and Branch Offices HA/FT solutions for Cisco UCS E-Series servers and VMware vsphere

High-Availability Fault Tolerant Computing for Remote and Branch Offices HA/FT solutions for Cisco UCS E-Series servers and VMware vsphere Table of Contents UCS E-Series Availability and Fault Tolerance... 3 Solid hardware... 3 Consistent management... 3 VMware vsphere HA and FT... 3 Storage High Availability and Fault Tolerance... 4 Quick-start

More information

Symantec Storage Foundation High Availability for Windows

Symantec Storage Foundation High Availability for Windows Symantec Storage Foundation High Availability for Windows Storage management, high availability and disaster recovery for physical and virtual Windows applications Data Sheet: High Availability Overview

More information

Software-defined Storage Architecture for Analytics Computing

Software-defined Storage Architecture for Analytics Computing Software-defined Storage Architecture for Analytics Computing Arati Joshi Performance Engineering Colin Eldridge File System Engineering Carlos Carrero Product Management June 2015 Reference Architecture

More information

Migrating to ESXi: How To

Migrating to ESXi: How To ILTA Webinar Session Migrating to ESXi: How To Strategies, Procedures & Precautions Server Operations and Security Technology Speaker: Christopher Janoch December 29, 2010 Migrating to ESXi: How To Strategies,

More information

Drobo How-To Guide. Topics Drobo and vcenter SRM Basics Configuring an SRM solution Testing and executing recovery plans

Drobo How-To Guide. Topics Drobo and vcenter SRM Basics Configuring an SRM solution Testing and executing recovery plans VMware Site Recovery Manager (SRM) was designed to simplify DR by eliminating complex runbooks, orchestrating the workflow of failover, and enabling automation of parts of that workflow. VMware SRM leverages

More information

Achieving Business Agility Through An Agile Data Center

Achieving Business Agility Through An Agile Data Center Achieving Business Agility Through An Agile Data Center Overview: Enable the Agile Data Center Business Agility Is Your End Goal In today s world, customers expect or even demand instant gratification

More information

Pivot3 Reference Architecture for VMware View Version 1.03

Pivot3 Reference Architecture for VMware View Version 1.03 Pivot3 Reference Architecture for VMware View Version 1.03 January 2012 Table of Contents Test and Document History... 2 Test Goals... 3 Reference Architecture Design... 4 Design Overview... 4 The Pivot3

More information

Delivering Performance and Value through Multiple Deduplication Pools

Delivering Performance and Value through Multiple Deduplication Pools SOLUTION BRIEF: SYMANTEC NETBACKUP........................................ Delivering Performance and Value through Multiple Deduplication Pools Who should read this paper - Directors of IT and IT Managers

More information

Symantec Server Management Suite 7.6 powered by Altiris technology

Symantec Server Management Suite 7.6 powered by Altiris technology Symantec Server Management Suite 7.6 powered by Altiris technology Standardized control for distributed, heterogeneous server environments Data Sheet: Endpoint Management Overviewview Symantec Server Management

More information

Expert Reference Series of White Papers. Visions of My Datacenter Virtualized

Expert Reference Series of White Papers. Visions of My Datacenter Virtualized Expert Reference Series of White Papers Visions of My Datacenter Virtualized 1-800-COURSES www.globalknowledge.com Visions of My Datacenter Virtualized John A. Davis, VMware Certified Instructor (VCI),

More information

Best Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software

Best Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software Best Practices for Monitoring Databases on VMware Dean Richards Senior DBA, Confio Software 1 Who Am I? 20+ Years in Oracle & SQL Server DBA and Developer Worked for Oracle Consulting Specialize in Performance

More information

Backup Exec 2014: Deduplication Option

Backup Exec 2014: Deduplication Option TECHNICAL BRIEF: BACKUP EXEC 2014: DEDUPLICATION OPTION........................................ Backup Exec 2014: Deduplication Option Who should read this paper Technical White Papers are designed to

More information

Cyber Security Services: Data Loss Prevention Monitoring Overview

Cyber Security Services: Data Loss Prevention Monitoring Overview WHITE PAPER: DLP MONITORING OVERVIEW........................................ Cyber Security Services: Data Loss Prevention Monitoring Overview Who should read this paper Customers who are interested in

More information

Powering Linux in the Data Center

Powering Linux in the Data Center SOLUTION BRIEF: POWERING LINUX IN THE DATA CENTER........................................ Powering Linux in the Data Center Who should read this paper Linux IT Architect and Director of IT for Linux Servers

More information

Availability Guide for Deploying SQL Server on VMware vsphere. August 2009

Availability Guide for Deploying SQL Server on VMware vsphere. August 2009 Availability Guide for Deploying SQL Server on VMware vsphere August 2009 Contents Introduction...1 SQL Server 2008 with vsphere and VMware HA/DRS...2 Log Shipping Availability Option...4 Database Mirroring...

More information

Virtual Machine Protection with Symantec NetBackup 7

Virtual Machine Protection with Symantec NetBackup 7 Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing to embrace the promise of virtualization for

More information

Veritas InfoScale 7.0 Virtualization Guide - Linux

Veritas InfoScale 7.0 Virtualization Guide - Linux Veritas InfoScale 7.0 Virtualization Guide - Linux November 2015 Veritas InfoScale 7.0 Virtualization Guide The software described in this book is furnished under a license agreement and may be used only

More information

VMware Virtual SAN Backup Using VMware vsphere Data Protection Advanced SEPTEMBER 2014

VMware Virtual SAN Backup Using VMware vsphere Data Protection Advanced SEPTEMBER 2014 VMware SAN Backup Using VMware vsphere Data Protection Advanced SEPTEMBER 2014 VMware SAN Backup Using VMware vsphere Table of Contents Introduction.... 3 vsphere Architectural Overview... 4 SAN Backup

More information

Backup Exec 15: Deduplication Option

Backup Exec 15: Deduplication Option TECHNICAL BRIEF: BACKUP EXEC 15: DEDUPLICATION OPTION........................................ Backup Exec 15: Deduplication Option Who should read this paper Technical White Papers are designed to introduce

More information

Configuration Maximums VMware vsphere 4.0

Configuration Maximums VMware vsphere 4.0 Topic Configuration s VMware vsphere 4.0 When you select and configure your virtual and physical equipment, you must stay at or below the maximums supported by vsphere 4.0. The limits presented in the

More information

Enterprise Cloud VM Image Import User Guide. Version 1.0

Enterprise Cloud VM Image Import User Guide. Version 1.0 Enterprise Cloud VM Image Import User Guide Version 1.0 Version History Issue Date Comments 1.0 2013/03/20 Initial version i Introduction 1) Purpose of this document: The purpose of this document is to

More information

Data Sheet: Disaster Recovery Veritas Volume Replicator by Symantec Data replication for disaster recovery

Data Sheet: Disaster Recovery Veritas Volume Replicator by Symantec Data replication for disaster recovery Data replication for disaster recovery Overview Veritas Volume Replicator provides organizations with a world-class foundation for continuous data replication, enabling rapid and reliable recovery of critical

More information

EMC Business Continuity for VMware View Enabled by EMC SRDF/S and VMware vcenter Site Recovery Manager

EMC Business Continuity for VMware View Enabled by EMC SRDF/S and VMware vcenter Site Recovery Manager EMC Business Continuity for VMware View Enabled by EMC SRDF/S and VMware vcenter Site Recovery Manager A Detailed Review Abstract This white paper demonstrates that business continuity can be enhanced

More information

Partner Technical Support Benefits Quick Guide

Partner Technical Support Benefits Quick Guide PARTNER BRIEF: TECHNICAL SUPPORT BENEFITS........................................ Symantec Secure One Partner Technical Support Benefits Who should read this paper Symantec Partners supporting end user

More information

VBLOCK SOLUTION FOR SAP APPLICATION HIGH AVAILABILITY

VBLOCK SOLUTION FOR SAP APPLICATION HIGH AVAILABILITY Vblock Solution for SAP Application High Availability Table of Contents www.vce.com VBLOCK SOLUTION FOR SAP APPLICATION HIGH AVAILABILITY Version 2.0 February 2013 1 Copyright 2013 VCE Company, LLC. All

More information

SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5

SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5 SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5 Simplify continuous security monitoring for physical and virtual servers as well as private and public clouds. Data Sheet: Security Management Symantec

More information

How to Unlock Agility by Backing up to, from, and in the Cloud

How to Unlock Agility by Backing up to, from, and in the Cloud WHITE PAPER: HOW TO UNLOCK AGILITY BY BACKING UP TO, FROM,....... AND.... IN.. THE.... CLOUD....................... How to Unlock Agility by Backing up to, from, and in the Cloud Who should read this paper

More information

VMware vsphere Data Protection 6.0

VMware vsphere Data Protection 6.0 VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application

More information

Oracle Database Solutions on VMware High Availability. Business Continuance of SAP Solutions on Vmware vsphere

Oracle Database Solutions on VMware High Availability. Business Continuance of SAP Solutions on Vmware vsphere Business Continuance of SAP Solutions on Vmware vsphere This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed

More information

Get The Private Cloud You Want From The Infrastructure You ve Got

Get The Private Cloud You Want From The Infrastructure You ve Got Get The Private Cloud You Want From The Infrastructure You ve Got Eric Hennessey Sr. Principal Technical Product Manager, Storage and Availability Management Group 1 Digital Government Institute November

More information

Storage management and business continuity strategy and futures

Storage management and business continuity strategy and futures #SymVisionEmea #SymVisionEmea Storage management and business continuity strategy and futures Petter Sveum Information Availability Solution Lead EMEA Ian Wood Information Management Strategy & GTM Storage

More information

Symantec Advanced Threat Protection: Network

Symantec Advanced Threat Protection: Network Symantec Advanced Threat Protection: Network Data Sheet: Advanced Threat Protection The Problem Today s advanced attacks hide themselves on legitimate websites, leverage new and unknown vulnerabilities,

More information

INSIGHT. Symantec Optimizes Veritas Cluster Server for Use in VMware Environments IDC OPINION IN THIS INSIGHT SITUATION OVERVIEW. Jean S.

INSIGHT. Symantec Optimizes Veritas Cluster Server for Use in VMware Environments IDC OPINION IN THIS INSIGHT SITUATION OVERVIEW. Jean S. INSIGHT Symantec Optimizes Veritas Cluster Server for Use in VMware Environments Jean S. Bozman IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

More information

EMC Virtual Infrastructure for SAP Enabled by EMC Symmetrix with Auto-provisioning Groups, Symmetrix Management Console, and VMware vcenter Converter

EMC Virtual Infrastructure for SAP Enabled by EMC Symmetrix with Auto-provisioning Groups, Symmetrix Management Console, and VMware vcenter Converter EMC Virtual Infrastructure for SAP Enabled by EMC Symmetrix with Auto-provisioning Groups, VMware vcenter Converter A Detailed Review EMC Information Infrastructure Solutions Abstract This white paper

More information

Delivering a New Level of Data Protection Resiliency with Appliances

Delivering a New Level of Data Protection Resiliency with Appliances SOLUTION BRIEF: SYMANTEC NETBACKUP........................................ Delivering a New Level of Data Protection Resiliency with Appliances Who should read this paper - Directors of IT and IT Managers

More information

Oracle Databases on VMware High Availability

Oracle Databases on VMware High Availability This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware

More information

Pivot3 Desktop Virtualization Appliances. vstac VDI Technology Overview

Pivot3 Desktop Virtualization Appliances. vstac VDI Technology Overview Pivot3 Desktop Virtualization Appliances vstac VDI Technology Overview February 2012 Pivot3 Desktop Virtualization Technology Overview Table of Contents Executive Summary... 3 The Pivot3 VDI Appliance...

More information

Symantec NetBackup Snapshots, Continuous Data Protection, and Replication

Symantec NetBackup Snapshots, Continuous Data Protection, and Replication Symantec NetBackup Snapshots, Continuous Data Protection, and Replication Technical Brief: Symantec NetBackup Symantec NetBackup Snapshots, Continuous Data Protection, and Replication Contents Overview...............................................................................................

More information

Improve Backup Performance by Upgrading to Symantec Backup Exec 12.5 with Service Pack 2

Improve Backup Performance by Upgrading to Symantec Backup Exec 12.5 with Service Pack 2 Improve Backup Performance by Upgrading to Symantec Backup Exec 12.5 with Service Pack 2 Test Report to Show How Existing Backup Exec Customers Can Improve Backup Performance and Reduce Backup Windows

More information

Centrata IT Management Suite 3.0

Centrata IT Management Suite 3.0 Centrata IT Management Suite 3.0 Technical Operating Environment April 9, 2004 Centrata Incorporated Copyright 2004 by Centrata Incorporated All rights reserved. April 9, 2004 Centrata IT Management Suite

More information

Symantec Backup Exec.cloud

Symantec Backup Exec.cloud Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are

More information

Configuration Maximums VMware vsphere 4.1

Configuration Maximums VMware vsphere 4.1 Topic Configuration s VMware vsphere 4.1 When you select and configure your virtual and physical equipment, you must stay at or below the maximums supported by vsphere 4.1. The limits presented in the

More information

Symantec Storage Foundation and High Availability Solutions 6.1 Virtualization Guide - Linux on ESXi

Symantec Storage Foundation and High Availability Solutions 6.1 Virtualization Guide - Linux on ESXi Symantec Storage Foundation and High Availability Solutions 6.1 Virtualization Guide - Linux on ESXi June 2014 Symantec Storage Foundation and High Availability Solutions Virtualization Guide The software

More information

Veritas Replicator from Symantec

Veritas Replicator from Symantec Data replication across multi-vendor storage for cost effective disaster recovery Data Sheet: Disaster Recovery Overviewview provides organizations with a comprehensive solution for heterogeneous data

More information

Veritas NetBackup for Epic Healthcare Protection

Veritas NetBackup for Epic Healthcare Protection Veritas NetBackup for Epic Healthcare Protection Who should read this paper Healthcare information technology practitioners that have or are considering an Epic Electronic Health Record (EHR) solution.

More information

Configuration Maximums

Configuration Maximums Topic Configuration s VMware vsphere 5.0 When you select and configure your virtual and physical equipment, you must stay at or below the maximums supported by vsphere 5.0. The limits presented in the

More information

Technical Paper. Moving SAS Applications from a Physical to a Virtual VMware Environment

Technical Paper. Moving SAS Applications from a Physical to a Virtual VMware Environment Technical Paper Moving SAS Applications from a Physical to a Virtual VMware Environment Release Information Content Version: April 2015. Trademarks and Patents SAS Institute Inc., SAS Campus Drive, Cary,

More information

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway 10.6 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Host-based Protection for ATM's

Host-based Protection for ATM's SOLUTION BRIEF:........................................ Host-based Protection for ATM's Who should read this paper ATM manufacturers, system integrators and operators. Content Introduction...........................................................................................................

More information

Top Ten Private Cloud Risks. Potential downtime and data loss causes

Top Ten Private Cloud Risks. Potential downtime and data loss causes Top Ten Private Cloud Risks Potential downtime and data loss causes Introduction: Risk sources Enterprises routinely build Disaster Recovery and High Availability measures into their private cloud environments.

More information

Disaster Recover Challenges Today

Disaster Recover Challenges Today S O L U T I O N S O V E R V I E W Disaster Recovery Solutions from VMware Transforming Disaster Recovery - VMware Infrastructure for Rapid, Reliable and Cost-Effective Disaster Recovery Disaster Recover

More information

Symantec NetBackup 5000 Appliance Series

Symantec NetBackup 5000 Appliance Series A turnkey, end-to-end, global deduplication solution for the enterprise. Data Sheet: Data Protection Overview Symantec NetBackup 5000 series offers your organization a content aware, end-to-end, and global

More information

HIGH AVAILABILITY STRATEGIES

HIGH AVAILABILITY STRATEGIES An InterSystems Technology Guide One Memorial Drive, Cambridge, MA 02142, USA Tel: +1.617.621.0600 Fax: +1.617.494.1631 http://www.intersystems.com HIGH AVAILABILITY STRATEGIES HA Strategies for InterSystems

More information

Building Private Cloud Architectures

Building Private Cloud Architectures Building Private Cloud Architectures Chandra Rangan Sr. Director, Storage & Availability Management Group Symantec Corporation SNW Spring 2011: Building Private Cloud Architectures 1 State of the infrastructure

More information

Symantec Endpoint Protection 12.1.6

Symantec Endpoint Protection 12.1.6 Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly

More information

Technical Paper. Leveraging VMware Software to Provide Failover Protection for the Platform for SAS Business Analytics April 2011

Technical Paper. Leveraging VMware Software to Provide Failover Protection for the Platform for SAS Business Analytics April 2011 Technical Paper Leveraging VMware Software to Provide Failover Protection for the Platform for SAS Business Analytics April 2011 Table of Contents About this Document... 3 Introduction... 4 What is Failover?...

More information

Citrix XenApp Server Deployment on VMware ESX at a Large Multi-National Insurance Company

Citrix XenApp Server Deployment on VMware ESX at a Large Multi-National Insurance Company Citrix XenApp Server Deployment on VMware ESX at a Large Multi-National Insurance Company June 2010 TECHNICAL CASE STUDY Table of Contents Executive Summary...1 Customer Overview...1 Business Challenges...1

More information

Evaluation of Enterprise Data Protection using SEP Software

Evaluation of Enterprise Data Protection using SEP Software Test Validation Test Validation - SEP sesam Enterprise Backup Software Evaluation of Enterprise Data Protection using SEP Software Author:... Enabling you to make the best technology decisions Backup &

More information

Configuration Maximums

Configuration Maximums Topic Configuration s VMware vsphere 5.1 When you select and configure your virtual and physical equipment, you must stay at or below the maximums supported by vsphere 5.1. The limits presented in the

More information

Symantec Backup Exec 2012

Symantec Backup Exec 2012 Better backup for all Data Sheet: Backup and Disaster Recovery Overview is one integrated product that protects virtual and physical environments, simplifies both backup and disaster recovery, and recovers

More information

Deep Dive on SimpliVity s OmniStack A Technical Whitepaper

Deep Dive on SimpliVity s OmniStack A Technical Whitepaper Deep Dive on SimpliVity s OmniStack A Technical Whitepaper By Hans De Leenheer and Stephen Foskett August 2013 1 Introduction This paper is an in-depth look at OmniStack, the technology that powers SimpliVity

More information

Backup Exec 15: Protecting VMware

Backup Exec 15: Protecting VMware TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING VMWARE........................................ Backup Exec 15: Protecting VMware Who should read this paper Technical White Papers are designed to introduce

More information

Symantec Backup Exec 2014 Agents and Options

Symantec Backup Exec 2014 Agents and Options Symantec Backup Exec 2014 Agents and Options Data Sheet: Data Protection Overview enhance and extend Backup Exec features, capabilities, and platform support. Whether you need to protect VMware vsphere,

More information

Managing, Maintaining Data in a Virtual World

Managing, Maintaining Data in a Virtual World Moving, ed.harnish@acronis.com Ed Acronis Harnish, Inc. VP Managing, Maintaining Data in a Virtual World BR The VM, Console DR and & Archiving and Recovery Operating Recovery Strategies System Agenda High

More information

VMware vsphere Storage Appliance 5.1.x Brownfield Deployments. TECHNICAL MARKETING DOCUMENTATION v 1.0

VMware vsphere Storage Appliance 5.1.x Brownfield Deployments. TECHNICAL MARKETING DOCUMENTATION v 1.0 VMware vsphere Storage Appliance 5.1.x TECHNICAL MARKETING DOCUMENTATION v 1.0 Table of Contents Introduction.... 3 vsphere Storage Appliance 5.1.x Brownfield Deployment.... 3 vsphere Storage Appliance

More information

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server

More information

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5 SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5 Advanced protection and hardening for advanced threats. Data Sheet: Security Management Symantec Data Center Security: Server Advanced 6.5 Solution Overviewview

More information

Technology Insight Series

Technology Insight Series Advancing VMware-based Data Resilience John Webster August, 2011 Technology Insight Series Evaluator Group Advancing VMware-based Data Resilience Copyright 2011 Evaluator Group, Inc. All rights reserved.

More information

FOR SERVERS 2.2: FEATURE matrix

FOR SERVERS 2.2: FEATURE matrix RED hat ENTERPRISE VIRTUALIZATION FOR SERVERS 2.2: FEATURE matrix Red hat enterprise virtualization for servers Server virtualization offers tremendous benefits for enterprise IT organizations server consolidation,

More information