Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery
|
|
- Alexandrina Marianna Pearson
- 8 years ago
- Views:
Transcription
1 Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery The Essentials Series sponsored by Dan Sullivan
2 Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens of high quality books that just happen to be delivered in electronic format at no cost to you, the reader. We ve made this unique publishing model work through the generous support and cooperation of our sponsors, who agree to bear each book s production expenses for the benefit of our readers. Although we ve always offered our publications to you for free, don t think for a moment that quality is anything less than our top priority. My job is to make sure that our books are as good as and in most cases better than any printed book that would cost you $40 or more. Our electronic publishing model offers several advantages over printed books: You receive chapters literally as fast as our authors produce them (hence the realtime aspect of our model), and we can update chapters to reflect the latest changes in technology. I want to point out that our books are by no means paid advertisements or white papers. We re an independent publishing company, and an important aspect of my job is to make sure that our authors are free to voice their expertise and opinions without reservation or restriction. We maintain complete editorial control of our publications, and I m proud that we ve produced so many quality books over the past years. I want to extend an invitation to visit us at especially if you ve received this publication from a friend or colleague. We have a wide variety of additional books on a range of topics, and you re sure to find something that s of interest to you and it won t cost you a thing. We hope you ll continue to come to Realtime for your educational needs far into the future. Until then, enjoy. Don Jones i
3 Introduction to Realtime Publishers... i Ar ticle 1: The Business Case for Open Source Virtualization... 1 Cu rrent Trends in Virtualization Adoption... 1 Increasing Use of Virtualization... 1 The Emergence of Multiple Virtualization Options... 2 Growing Use of Multiple Hypervisors Within an Organization... 2 Ris ks with Single Vendor Virtualization... 2 Risk of Vendor Lock In... 3 Costly Changes in Licensing Structure... 3 Limited Tools Provided by Vendor... 4 Be nefits of Open Source Virtualization... 4 Cost Benefits of Open Source Virtualization... 4 Maturity and Scalability... 5 Integration with Existing Infrastructure... 5 Summary... 5 Ar ticle 2: Migration to Open Source Virtualization... 6 W ays of Deploying Virtualization... 6 Virtualized Servers... 7 Private Computing Clouds... 7 Virtual Desktop Environments... 7 Te chnical Features to Assess in Virtualization Platforms... 8 Cross Platform Support... 8 Performance and Scalability... 8 Security... 8 Live Migration Support... 9 High Availability... 9 Additional Advanced Features... 9 ii
4 Ma nagement Features to Assess in Virtualization Platforms... 9 Management Console Self Service Support Operations Automation Using Backup Solution to Support Migration Summary Ar ticle 3: Ongoing Operations: Backup, Disaster Recovery, and Data Protection Need for Virtualization Aware Backups Ke y Technical Features to Consider Support for Multiple Virtualization Solutions Perform Live Snapshots Support for Migration Support for Compliance Support for Compression Disaster Recovery and Data Protection Considerations Ma nagement Considerations Cost and Licensing Model Centralized Management Support for Existing Storage Media Policy Based Backups Deduplication of Data Support for Hybrid Virtual Physical Environments Summary iii
5 Copyright Statement 2012 Realtime Publishers. All rights reserved. This site contains materials that have been created, developed, or commissioned by, and published with the permission of, Realtime Publishers (the Materials ) and this site and any such Materials are protected by international copyright and trademark laws. THE MATERIALS ARE PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. The Materials are subject to change without notice and do not represent a commitment on the part of Realtime Publishers its web site sponsors. In no event shall Realtime Publishers or its web site sponsors be held liable for technical or editorial errors or omissions contained in the Materials, including without limitation, for any direct, indirect, incidental, special, exemplary or consequential damages whatsoever resulting from the use of any information contained in the Materials. The Materials (including but not limited to the text, images, audio, and/or video) may not be copied, reproduced, republished, uploaded, posted, transmitted, or distributed in any way, in whole or in part, except that one copy may be downloaded for your personal, noncommercial use on a single computer. In connection with such use, you may not modify or obscure any copyright or other proprietary notice. The Materials may contain trademarks, services marks and logos that are the property of third parties. You are not permitted to use these trademarks, services marks or logos without prior written consent of such third parties. Realtime Publishers and the Realtime Publishers logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. If you have any questions about these terms, or if you would like information about licensing materials from Realtime Publishers, please contact us via at info@realtimepublishers.com. iv
6 Article 1: The Business Case for Open Source Virtualization Virtualization is one of the single most important technologies for efficiently operating servers. It should not be surprising to learn that open source options are available for this essential technology. Just as open source initiatives have produced widely used operating systems (OSs), databases, application servers, and even desktop applications, there are open source options for virtualization as well. Do you wonder if open source virtualization is right for your business? Perhaps you are concerned about how it might fit with your existing virtualization platforms? Are you unsure about why you should even consider open source virtualization? In this first part of the series, you will learn about: Current trends in virtualization adoption Risks associated with single vendor virtualization Benefits of open source virtualization The benefits of virtualization are well established, as are the benefits of open source software. Now it is time to consider in detail the benefits of the two combined. Current Trends in Virtualization Adoption A few trends are apparent in the options and use of server virtualization platforms: Increasing use of virtualization Emergence of multiple virtualization options Growing use of multiple hypervisors within organizations These trends reflect the economic and business benefit of virtualization to the enterprise. Increasing Use of Virtualization It is no surprise that virtualization adoption is on the rise. With virtualization, organizations can increase the overall utilization of their servers. Prior to the development of hypervisors that allowed multiple OSs to run together on a single server, businesses often followed a one application one server rule of thumb. This was not because one application demanded all the resources of a server but because applications often required specific configurations, OS versions, or code libraries. Trying to run two or more enterprise applications on a single server could be more trouble than it was worth. For example, one of the applications might require an OS patch but the other application might break if that patch were applied. Rather than find out too late about unanticipated dependencies between an OS and application, IT professionals often opted for the one application one server approach. 1
7 Server virtualization solved the unanticipated dependency problem. With a hypervisor allowing multiple OSs to run on a single server, systems administrators could host multiple applications, each with their own optimally configured OS, on one server. Systems administrators are not even constrained to run the same OS on virtualized platforms. Windows Server and Linux can operate on the same physical server as easily as can multiple versions of the same OS. The Emergence of Multiple Virtualization Options One of the advantages of a maturing software technology is that multiple vendors will promote their products. In some cases, a single vendor may come to dominate such markets. For example, in the early days of personal computers before Microsoft s DOS users could choose PCs that ran a different OS; later, Windows dominated the PC market. In the early days of the relational database market, new and existing software vendors offered viable products to a growing community of users. Virtualization appears to be following the trajectory of relational databases more so than that of PC OSs. Businesses have choices when it comes to virtualization. They can choose from vendors specializing in virtualization, from large scale software vendors or from open source options. All have advantages and disadvantages, so, like so many IT decisions, the choice of virtualization is driven by your requirements and budget. Growing Use of Multiple Hypervisors Within an Organization Virtualization does not require you to use a single hypervisor for all your virtualization needs. An IT department can run their servers and LDAP servers on one hypervisor while choosing a different virtualization platform for their Web servers and application servers. The marginal costs of learning to manage two different virtualization platforms can be easily outweighed by the benefits of choosing the optimal hypervisor for each requirement. Another consideration is the risks associated with using a single virtualization product. Risks with Single Vendor Virtualization There are certainly conveniences that come with using a single virtualization platform. For example, you will have a single toolset to work with and one licensing model to understand. These are also two examples of the risks associated with using a single software provider. 2
8 Risk of Vendor Lock In When you select a single software provider for any enterprise application, that choice is often followed with decisions that promote vendor lock in. This decision is not intentional who would want to limit their future choices? The driver is economics. Once you have selected a virtualization platform, you will build an array of supporting systems and procedures for deploying virtual machines (VMs), managing images, reporting on usage, and performing other management tasks. You could design these in sufficiently abstract ways that enable you to swap in or out any virtualization platform, but we rarely do. Why? The cost of such efforts is difficult to justify when deploying a single virtualization platform. It is faster and less expense to use the tools provided with your chosen virtualization platform. Costly Changes in Licensing Structure Another aspect to factor in when considering the use of a single virtualization platform is that vendors may change their licensing model at any time. There are many ways to license virtualization software: Number of physical servers Number of virtual servers Amount of memory in physical servers Amount of memory allocated to VMs Number of CPU cores in a physical server Number of CPU cores allocated to VMs When a vendor changes the way it charges for licenses, the change can cause substantial modifications in your charges. For example, if a vendor starts with a charge based on physical servers, you will likely optimize your licensing according to that model. For example, you might minimize the number of physical servers you purchase while maximizing the number of CPU cores and amount of memory. If the vendor then changes the licensing model to be based on the amount of memory or number of CPU cores, you might find yourself with a larger virtualization bill than you planned for. Once a vendor makes such a change in licensing structure, you have several choices: Pay any additional licensing charges Change your strategy for deploying VMs to lower your costs under the new pricing scheme Change virtualization platforms The first option might be the only choice in the short term. Changing your strategy for deploying VMs might require changes in your hardware, which can be too costly to consider, at least during the useful lifespan of your current set of servers. Changing virtualization platforms might be the best option but will take time to plan and execute. 3
9 Limited Tools Provided by Vendor A third factor to consider about risks associated with working with a single virtualization platform is the potential limited toolset provided by the vendor. Tools are essential for deploying, managing, and monitoring your virtualized environment. If vendor provided tools do not offer the functionality you need, you might find yourself scripting your own tools, which of course, you will then have to maintain. As you evaluate your virtualization platform options, consider the tools provided by the various frameworks, including those for: Deploying VMs Creating VMs Monitoring performance and altering system managers to specific events Generating utilization and billing information Working with a single vendor for any enterprise application has appeal, but there are risks to consider too. Fortunately, there are several virtualization platforms available today, including open source options, that give you the choice of using multiple virtualization platforms in your organization. Benefits of Open Source Virtualization Open source virtualization should be considered because of the potential benefits of adding it to your virtualization environment. Some of the key considerations are: Cost Maturity Scalability Integration with existing infrastructure These benefits can be realized without limiting yourself to a single virtualization provider. Open source virtualization can be considered in addition to commercial virtualization products. Cost Benefits of Open Source Virtualization Perhaps the most obvious benefit of open source virtualization is cost. With open source products, there are no licensing charges, so the cost of working with these products is minimal. The open source model also limits the risk of increased future costs unlike commercial vendors that might change their pricing scheme after you have made substantial commitments based on the existing licensing model. With open source software, you have the choice to purchase maintenance support from commercial providers. This supplement can provide the benefits of both open source and commercial offerings: low initial costs with assurances of support in the future. 4
10 Maturity and Scalability Open source virtualization products are widely used and have demonstrated their maturity and scalability. Open source hypervisors have demonstrated high levels of performance and the ability to run large numbers of VMs in the industry standard benchmark SPECvirt. Open source hypervisors also deliver performance comparable with bare metal performance for widely used enterprise applications. Integration with Existing Infrastructure Open source virtualization platforms integrate with existing infrastructure. Commonly used OSs from Microsoft and open source OSs run within open source hypervisors. Enterprise applications from major vendors such as Microsoft, Oracle, and SAP are running within open source virtualization environments. Open source hypervisors do not come with restrictions on how they can be used in the enterprise. In fact, the largest public cloud provider uses an open source virtualization hypervisor in its cloud. Summary Virtualization is a mature technology. Organizations are using virtualization to improve the efficiency of their IT operations and provide greater flexibility in how they deliver business services. They are also increasingly using multiple virtualization platforms. Doing so allows users to choose the best virtualization solution for their particular requirements without the risk of single vendor lock in. Open source virtualization has demonstrated its cost advantages as well as its maturity and scalability without sacrificing integration with existing infrastructure. 5
11 Article 2: Migration to Open Source Virtualization Open source virtualization will fit well in many organizations. One of the first considerations is how to migrate from currently deployed hypervisors to an open source platform. There are multiple ways to deploy virtualization and, in some cases, the best option is a combination of multiple hypervisors. In order to realize the greatest benefit of open source virtualization, you should keep in mind a number of factors: Ways of deploying virtualization Technical features to assess in virtualization platforms Management features to asses in virtualization platforms Use of backup solutions to support migration By weighing the relative importance of features against your requirements, you should be able to find a combination of virtualization platforms and migration procedures that fit your needs. Ways of Deploying Virtualization Virtualization has fundamentally changed the way we deploy applications and deliver services. It has decoupled applications and even desktops from hardware. In the process, it has created operating system (OS) environments that are sufficiently removed from hardware dependencies that we no longer need to think in terms of one server to one application. Instead, we can think of servers as a pool of resources for running virtual machines. VMs can move between physical servers as needed to optimize performance, consolidate VMs, and minimize the number of physical servers running at any time. The ability to decouple an OS from dedicated hardware promotes at least three ways of deploying virtualization: Virtualized servers Private computing clouds Virtual desktop infrastructure These deployments implement a wide array of services that all use the same fundamental technology. 6
12 Virtualized Servers When a single physical server is used to run multiple OSs, we call that a virtualized server. You deploy virtualized servers when a physical server has more capacity than is needed by a single application or set of applications that would run on a single instance of an OS. For example, you might have a lightly used collaboration server and a moderately used employee portal that you need to deploy. One runs under Windows while the other runs under Linux. Neither requires the full capacity of one of your servers. This scenario is typical for a virtualized server. Private Computing Clouds Private computing clouds extend the way we think about virtualized servers. A computing cloud (or simply cloud ) is a set of servers and supporting infrastructure dedicated to running VMs. In the virtualized server model, we tend to run the same VMs for extended periods of time, such as months or years. Clouds support more frequent changes in the number and type of VMs deployed. For example, a retailer might update their data warehouse every night. Stores upload their daily transactions to a staging area where the data is processed and loaded into the data warehouse. This setup creates a peak demand for computing resources at night with no demand during the day. Rather than dedicate servers to this process, a better model is to deploy VMs during the demand period and then release the physical servers to run other jobs during the day. Cloud infrastructure is optimized for this kind of frequent change in VM deployment. Virtual Desktop Environments Virtualization technology works well with desktops as well as servers. One way to work with a virtualized desktop is to run a hypervisor on the desktop and host two or more OSs. This setup may be appropriate for developers or others who can make use of multiple OSs on the same desktop. Another practice provides virtual desktops to client devices while running the desktop OS on a server in a data center. This configuration can be especially appealing to businesses whose employees want to work with personal laptops, tablets, and smartphones. With virtualized desktops, centralized IT can configure VMs for desktops with all the security controls they require. Virtualization platforms are commonly used to virtualize servers, and the rate of adoption of cloud computing and desktop virtualization is increasing. As you consider how you will use virtualization, be sure to evaluate the technical features of the platforms. 7
13 Technical Features to Assess in Virtualization Platforms There are a range of technical features that can distinguish virtualization platforms. Some of the most important are: Cross platform support Performance and scalability Security Live migration support High availability Additional advanced features Some of these features may be more relevant to your requirements than others; their importance should be weighted accordingly. Cross Platform Support Hypervisors used for server virtualization should support multiple OSs on the same physical server. One of the advantages of virtualization is that it allows you to arrange multiple VMs across servers to optimally load each server. Being constrained to running only a single type of OS on a hypervisor reduces the chances of finding an optimal configuration of VMs. Performance and Scalability One of the ways to measure performance of a hypervisor is to compare it with a direct implementation on a bare metal server. For example, if you can run a database application benchmark in 100 seconds on a database deployed to an OS running directly on a server, and that same benchmark takes 120 seconds when deployed to a comparably configured VM, you have a 20% performance penalty. For obvious reasons, you want to minimize this penalty. Scalability is also a key consideration. The more VMs a hypervisor can support, the better the scalability. It is not unusual to have virtual servers that place minimal demand on underlying hardware. In such cases, it makes sense to run as many of these low utilization VMs as possible on a single server. If the hypervisor requires substantial overhead for each VM, scalability will be limited. Security Most security controls will be implemented at the OS level, but security is still an issue for hypervisors. It is important to logically isolate VMs so that an adverse event on one of the hosted VMs does not affect any other VM running on the same physical server. 8
14 Live Migration Support The load on servers running VMs will change over time. In especially dynamic environments, there might be physical servers with multiple VMs running heavy loads while other servers have relatively light loads. Ideally, the virtualization platform would allow VMs from one server to migrate to another server without shutting down the VM. With this type of support for live migration of VMs, resources can be continuously reconfigured for optimal performance. Migrating VMs can also result in better consolidation so that fewer physical servers have to be running at the same time, saving on power and potentially cooling costs. High Availability Businesses that depend on the constant availability of applications and services should assess the high availability features of virtualization platforms. Hardware fails and OSs hang. Virtualization platforms that can detect hardware and OS failures and automatically restart VMs on other hardware can enable high availability services. Additional Advanced Features In addition to high level technical features, such as high availability and security, there are lower level implementation details that should be considered: Advanced memory management features Network interface card (NIC) teaming to share traffic between physical and virtual networks across multiple NICs Support for multipathing, allowing for data transfer paths to storage Power management features to reduce power consumption when possible Hardware and guest OS certification Given the complexity of virtualization platforms, it would be understandable to focus on technical features as the prime differentiator between your options. That would be a mistake. Be sure to consider the management features as well. Management Features to Assess in Virtualization Platforms The day to day operations in a virtualized environment will have as much impact on the business bottom line as many of the technical features. Look for virtualization platforms that provide: Management console Self service support Operations automation The objective of this assessment is twofold: first, to determine what parts of day to day operations can be automated and second, understand what features are in place to streamline the remaining manual tasks. 9
15 Management Console A management console is a particularly important tool for systems administrators. This console should provide a single point of access for managing VM images, monitoring performance, viewing reports, and responding to alerts. VM image management can be time consuming without proper tools. Images will need to be patched from time to time. New images will be added to the image catalog and others will be removed. A management console should support searching metadata associated with images (for example, OS version or patch level) so that administrators can quickly isolate particular images. Self Service Support The more end users can do for themselves, the better. Self service reduces IT administration costs. It can also improve the response time between recognizing the need for a change and the time to actually finish implementing the change. Self service features should be made available on an as needed basis. A user s role in the organization should dictate their level of access to support functions. For example, developers might be granted the right to create a new VM image while most other users are not. Operations Automation Operation automation features overlap with some of the technical features described earlier. Some of the most significant are: Load balancing Power savings Image management Network and storage management These automation features can significantly influence the cost of ongoing operations. Load balancing in conjunction with power saving features can optimize the number of servers running at any time. Image management features can help ensure that images are cloned rapidly and snapshots are created and stored in case you need to roll back to an earlier state of the machine image. In the likely event that existing management features and reporting do not meet all of your needs, you might be able to implement a custom solution if a centralized API is available. Be sure to assess the functionality provided by the virtualization platform s API. Organizations that make use of multiple virtualization platforms can realize further savings by streamlining migrations with the right backup solution. 10
16 Using Backup Solution to Support Migration Backup solutions designed to support VMs can be particularly useful for migrations. You might be migrating from physical as well as virtual servers, so look for backup solution that can migrate: Physical to virtual servers (P2V) Virtual to virtual servers (V2V) Virtual to physical servers (V2P) The next article in this series will delve into detail about the need for virtualization aware backups and key backup technical features to consider. Summary Migrating to open source virtualization presents a number of opportunities. These choices are driven in part by the different ways you can deploy virtualization for example, as server virtualization, private clouds, or desktop virtualization. When migrating to or adopting another virtualization platform, consider both the technical and management features provided. 11
17 Article 3: Ongoing Operations: Backup, Disaster Recovery, and Data Protection Maintaining your virtualized environment will require attention to backup, disaster recovery, and data protection. Although there are many similarities between these operations in non virtualized and virtualized environments, there are significant differences as well. This concluding article on managing virtualized environments will examine: The need for virtualization aware backups Key features of backup solutions Disaster recovery and data protection considerations Management concerns related to backup, disaster recovery, and data protection The purpose of this article is to help you understand how to choose and deploy a backup solution that will meet your particular requirements. Need for Virtualization Aware Backups A typical backup solution for non virtualized servers includes a software agent that runs on the server and transfers data to a backup server, which in turn, writes data to a backup device. In theory, this setup might appear to work for a virtualized environment, however, this process can cause challenges in a virtual environment. To deal with these challenges, you need a virtualization aware technology so that you can save on resource consumption, whether storage or network related. If your backup solution is licensed on a per agent basis, the cost of licensing your backup solution could increase dramatically. Before you deploy an agent based backup solution in a virtualized environment, consider the licensing structure; site licensing or physical server based licensing will not constrain your ability to deploy additional virtual machines as needed. 12
18 Key Technical Features to Consider Virtualization awareness is just one of the features that a backup solution should provide. In today s enterprise, backup solutions have to support heterogeneous environments, provide features required for regulation compliance, and help control costs of backup storage. When evaluating backup solutions, consider: Support for multiple virtualization solutions The ability to perform live snapshots Support for migration Compliance issues, especially encryption Support for data compression These features will affect both the cost and efficiency of backup operations. Support for Multiple Virtualization Solutions Enterprises have long supported multiple operating systems (OSs) so it is no surprise that they would also deploy multiple virtualization platforms. Organizations choose virtualization platforms and OSs based on different sets of requirements, availability of applications, cost, and other factors. Enterprises rarely have a wide range of disparate backup requirements. A single comprehensive backup solution should be sufficient for most organizations. That is, as long as the backup solution supports multiple virtualization environments. Perform Live Snapshots There was a time when you could assume that most of the demand on your applications would occur during business hours. This situation left the night as the ideal time to perform backups. Those days are gone. Applications are used continuously. The amount of data requiring backup continues to grow to the point where traditional nightly backup windows are not long enough to complete backups. Another approach is needed. With live snapshots, you can quiesce the VMs and make snapshots at any time. Creating a snapshot happens quickly, so there is minimal impact on VM performance. This ability to make live snapshots is essential to allowing VMs to continue operations while ensuring that sufficiently frequent backups are always available. Support for Migration Backups are primarily used to protect systems in the event of a failure, but there are other uses as well. A backup of a VM can be used to migrate a VM to other physical servers running a hypervisor or to a physical server. This capability makes VM backups a useful tool for supporting migration that is, as long as the backup solution supports restoring a VM to a device or hypervisor different from it source device or hypervisor. 13
19 Support for Compliance Businesses in healthcare, financial services, and government as well as publically traded companies are subject to a number of regulations designed to protect the confidentiality and integrity of business and personal information. Many such regulations require security controls to mitigate the risk of disclosing private and personal information. These typically require that data is encrypted both when it is stored on devices and when it is transmitted over networks. If a backup tape or drive were lost or stolen, it could constitute a data breach under regulations. Backups that provide the ability to encrypt data as it is backed up can reduce and virtually eliminate the risk of a lost backup tape leading to the disclosure of private information. Support for Compression VMs must keep all of their state information and data uncompressed when executing. When stored on a backup device, however, the VM can be compressed. This setup can save substantial amounts of storage and ultimately reduce the cost of operating and protecting your virtualized environment. Backups are essential in virtualized environments just as they are in non virtualized environments. An appropriate backup solution should include support for multiple virtualization platforms and rapid backups using snapshots as well as support for migration, compliance, and compression. Disaster Recovery and Data Protection Considerations Backups are a basic building block of disaster recovery, but disaster recovery brings additional demands on how you use those backups. Imagine your data center is lost to a fire, flood, or other natural disaster. You have backups of all of your virtualized servers at an offsite location. You ve secured a disaster recovery site with a mix of hardware. Now comes the real test. Can you restore your operations with full VMs restored to the same hardware configuration, full VMs restored to different hardware configurations, or selectively restore files from VM backups? These are all scenarios you could encounter during a recovery operation. In fact, unless you have an identically configured recovery site, you will probably find yourself restoring to a different set of hardware. When selecting a backup solution, be sure to consider the range of possible options you might need in a disaster recovery situation. You would not want to find out during a restore operation that your backup solution does not restore to dissimilar hardware or requires you to restore a full VM just to restore a few files. 14
20 Management Considerations When it comes to backups, disaster recovery, and data protection, there is no shortage of management considerations. In some cases, there is overlap between technical and management considerations. Some of the most important features to assess in a backup solution, at least from a management perspective, include: Cost and licensing model Support for centralized management Support for existing storage media Deduplication of data Policy based backup Support for hybrid virtual physical environments These factors all have the potential to impact the cost and efficiency of operations. Cost and Licensing Model As with virtualization platforms, there are many ways to price a backup solution. Site licenses and per physical server licenses are probably the easiest to plan around. When license charges are based on the number of VMs using the backup system, estimates are more difficult. For example, would you pay per backup agent deployed to a running VM? Or perhaps by backup agent deployed to a VM image regardless of whether it is running? Be sure to understand the licensing model as part of your evaluation to avoid unexpected surprises down the road. Centralized Management Centralized management features can streamline backup operations. Look for backup systems that support: Remote agent installation Centralized backup plans Monitoring and reporting Each of these features can help reduce the administrative overhead associated with performing and managing backups. Support for Existing Storage Media Do not overlook the fact that your business might have a substantial investment in backup storage media. If you have to invest in a different media in order to use a new backup solution, be sure to factor that cost into your decision. 15
21 Policy Based Backups Not all data or applications are equally valuable. Some data and systems should be backed up more frequently than others. Consider the plight of a systems administrator who has to code a script with exceptions to the rules for backups. As new VMs are deployed, the systems administrator will have to add the new VM to the proper script. As users change their requirements for backup, the systems administrator will have to delve into scripts again to make changes. A more efficient method is to define policies that describe the backups that are to be performed based on characteristics of the target systems. Deduplication of Data Data is often redundant. Backing up every block of data, even if an identical block has already been backed up, is a costly option. Backup vendors have implemented deduplication technologies that detect duplicate data blocks within a backup. When a duplicate is detected, a reference to the first copy of that block of data is inserted into the backup instead of inserting another copy of the data block. Substituting a reference to a block of data for a block of data itself can substantially reduce the volume of storage required for backups. Support for Hybrid Virtual Physical Environments Organizations might find that they need to support a combination of virtualized and physical servers. For example, they might license enterprise software that is supported only when running on physical servers. In such a scenario, it s reasonable to deploy applications to VMs only when there are no restrictions on virtualization. Ideally, the business should not need two backup solutions, one for their virtual servers and one for their physical servers. Summary Backup, disaster recovery, and data protection are critical considerations in virtualized and physical server environments. When assessing the right backup solution for your organization, remember the need for virtualization aware backups as well as key technical and management features of the solution. Also keep in mind the additional requirements imposed by disaster recovery and other data protection considerations. 16
Protecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
More informationProtecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
More informationSteps to Migrating to a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime
More informationProtecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
More informationDeveloping a Backup Strategy for Hybrid Physical and Virtual Infrastructures
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures sponsored by Introduction to Realtime
More informationVirtual Machine Environments: Data Protection and Recovery Solutions
The Essentials Series: The Evolving Landscape of Enterprise Data Protection Virtual Machine Environments: Data Protection and Recovery Solutions sponsored by by Dan Sullivan Vir tual Machine Environments:
More informationHow Configuration Management Tools Address the Challenges of Configuration Management
Streamlining Configuration Management The Essentials Series How Configuration Management Tools Address the Challenges of Configuration Management sponsored by Introduction to Realtime Publishers by Don
More informationStreamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
More informationHow Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series How Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution sponsored by Introduction to
More information10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series 10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution sponsored by Introduction to Realtime
More informationBest Practices for Log File Management (Compliance, Security, Troubleshooting)
Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers
More informationSecuring Endpoints without a Security Expert
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Securing Endpoints without a Security Expert sponsored by Introduction to Realtime Publishers by Don Jones, Series
More informationCollaborative and Agile Project Management
Collaborative and Agile Project Management The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
More informationTips and Best Practices for Managing a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies
More informationBeyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
More informationData Protection in a Virtualized Environment
The Essentials Series: Virtualization and Disaster Recovery Data Protection in a Virtualized Environment sponsored by by J. Peter Bruzzese Da ta Protection in a Virtualized Environment... 1 An Overview
More informationManaging for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
More informationMaximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Desktop and Application Virtualization Management Best Practices... 1 Image Management
More informationReal World Considerations for Implementing Desktop Virtualization
Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI
More informationThe Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage sponsored by Dan Sullivan Chapter 1: Advantages of Hybrid Storage... 1 Overview of Flash Deployment in Hybrid Storage Systems...
More informationLowering Costs of Data Protection through Deduplication and Data Reduction
The Essentials Series: The Evolving Landscape of Enterprise Data Protection Lowering Costs of Data Protection through Deduplication and Data Reduction sponsored by by Dan Sullivan Lo wering Costs of Data
More informationCollaborative and Agile Project Management
Collaborative and Agile Project Management The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
More informationMalware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
More informationMaximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
More informationWhat Are Cloud Connected Data Protection Services About?
Protecting Client Data in the Cloud: A Channel Perspective The Essentials Series What Are Cloud-Connected Data Protection Services About? Architectural Advice for Resellers sponsored by Introduction to
More informationThe Next-Generation Virtual Data Center
The Essentials Series: Managing Workloads in a Virtual Environment The Next-Generation Virtual Data Center sponsored by by Jaime Halscott Th e Next Generation Virtual Data Center... 1 Be nefits of Virtualization
More informationMaximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
More informationMitigating Risks and Monitoring Activity for Database Security
The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring
More informationNon-Native Options for High Availability
The Essentials Series: Configuring High Availability for Windows Server 2008 Environments Non-Native Options for High Availability by Non-Native Options for High Availability... 1 Suitability and Cost...
More informationMaximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop Virtualization...
More informationControlling and Managing Security with Performance Tools
Security Management Tactics for the Network Administrator The Essentials Series Controlling and Managing Security with Performance Tools sponsored by Co ntrolling and Managing Security with Performance
More informationBest Practices in Deploying Anti-Malware for Best Performance
The Essentials Series: Increasing Performance in Enterprise Anti-Malware Software Best Practices in Deploying Anti-Malware for Best Performance sponsored by by Eric Schmidt Be st Practices in Deploying
More informationThe Definitive Guide to Cloud Acceleration
The Definitive Guide to Cloud Acceleration Dan Sullivan sponsored by Chapter 5: Architecture of Clouds and Content Delivery... 80 Public Cloud Providers and Virtualized IT Infrastructure... 80 Essential
More informationHow to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens of high quality books
More informationReducing Backups with Data Deduplication
The Essentials Series: New Techniques for Creating Better Backups Reducing Backups with Data Deduplication sponsored by by Eric Beehler Reducing Backups with Data Deduplication... 1 Explaining Data Deduplication...
More informationWhy Endpoint Encryption Can Fail to Deliver
Endpoint Data Encryption That Actually Works The Essentials Series Why Endpoint Encryption Can Fail to Deliver sponsored by W hy Endpoint Encryption Can Fail to Deliver... 1 Tr aditional Solutions... 1
More informationReal World Considerations for Implementing Desktop Virtualization
Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by En suring Desktop Virtualization Success... 1 Siz ing Your Desktop Virtualization Environment... 2 Ap
More informationHow to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Ch apter 3: Using SSL Certificates in Microsoft Internet Information Server... 36 Ins talling SSL Certificates in IIS with IIS Manager... 37 Requesting
More informationSolving the Storage Challenge Across Platforms: Transparent Compression for Windows Operating Systems
Solving the Storage Challenge Across Platforms: Transparent Compression for Windows Operating Systems sponsored by Dan Sullivan The Increasing Importance of Compression in the Enterprise... 1 Online Transactions
More informationThe Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
More informationReplication and Recovery Management Solutions
The Essentials Series: Virtualization and Disaster Recovery Replication and Recovery Management Solutions sponsored by by J. Peter Bruzzese Re plication and Recovery Management Solutions... 1 Pricing Models
More informationMaking Endpoint Encryption Work in the Real World
Endpoint Data Encryption That Actually Works The Essentials Series Making Endpoint Encryption Work in the Real World sponsored by Ma king Endpoint Encryption Work in the Real World... 1 Th e Key: Policy
More informationTips and Tricks Guide tm. Windows Administration. Don Jones and Dan Sullivan
Tips and Tricks Guide tm To tm Windows Administration Don Jones and Dan Sullivan Tip, Trick, Technique 13: Configuring Server Core in Windows Server 2008 R2... 1 Tip, Trick, Technique 14: What Are Microsoft
More informationThe Shortcut Guide To. Availability, Continuity, and Disaster Recovery. Dan Sullivan
tm The Shortcut Guide To Availability, Continuity, and Disaster Recovery Chapter 4: Putting It All Together Recovery Management Scenarios for Small Businesses to Emerging Enterprises... 48 Different Business
More informationBenefits of Using Data Loss Prevention Technology
The Essentials Series: Email-Centric Data Loss Prevention Benefits of Using Data Loss Prevention Technology sponsored by by Dan Sullivan Benefits of Using Data Loss Prevention Technology...1 Need for Automated
More informationThe Evolving Threat Landscape and New Best Practices for SSL
The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...
More informationAdministration Challenges
The Essentials Series: Enterprise Identity and Access Management Administration Challenges sponsored by by Richard Siddaway Administration Challenges...1 Heterogeneous Environments...1 Multiple Directories...1
More informationUnderstanding & Improving Hypervisor Security
The Essentials Series: Security Concerns & Solutions Understanding & Improving Hypervisor Security sponsored by by Greg Shields Understanding & Improving Hypervisor Security...1 What Is the Hypervisor?...1
More informationThe Shortcut Guide To. Availability, Continuity, and Disaster Recovery. Dan Sullivan
tm The Shortcut Guide To Availability, Continuity, and Disaster Recovery Chapter 3: Top-5 Operational Challenges in Recovery Management and How to Solve Them.. 33 Challenge 1: Scheduling and Monitoring...
More informationThe Definitive Guide. Cloud Computing. Dan Sullivan
The Definitive Guide tm To Cloud Computing Ch apter 10: Key Steps in Establishing Enterprise Cloud Computing Services... 185 Ali gning Business Drivers with Cloud Services... 187 Un derstanding Business
More informationMatching High Availability Technology with Business Needs
The Essentials Series: Making High Availability Pay For Itself Matching High Availability Technology with Business Needs sponsored by by Matching High-Availability Tec hnology with Business Needs... 1
More informationRealizing the IT Management Value of Infrastructure Management
The Essentials Series: Infrastructure Management Realizing the IT Management Value of Infrastructure Management sponsored by by Chad Marshall Realizing the IT Management Value of Infrastructure Management...1
More informationEvaluation of Enterprise Data Protection using SEP Software
Test Validation Test Validation - SEP sesam Enterprise Backup Software Evaluation of Enterprise Data Protection using SEP Software Author:... Enabling you to make the best technology decisions Backup &
More informationHow the Software-Defined Data Center Is Transforming End User Computing
How the Software-Defined Data Center Is Transforming End User Computing The Essentials Series sponsored by David Davis Building the Future of the Desktop on the Software-Defined Data Center... 1 What Is
More informationWhere Do I Start With Virtual Desktops?
The Essentials Series: Important Questions in Implementing Virtual Desktops Where Do I Start With Virtual Desktops? sponsored by by W here Do I Start with Virtual Desktops?... 1 W hat Is a Virtual Desktop?...
More informationBecoming Proactive in Application Management and Monitoring
The Essentials Series: Improving Application Performance Troubleshooting Becoming Proactive in Application Management and Monitoring sponsored by by Becoming Proactive in Application Managem ent and Monitoring...
More informationThe Art of High Availability
The Essentials Series: Configuring High Availability for Windows Server 2008 Environments The Art of High Availability by The Art of High Availability... 1 Why Do We Need It?... 1 Downtime Hurts... 1 Critical
More informationHow to Use SNMP in Network Problem Resolution
The Essentials Series: Solving Network Problems Before They Occur How to Use SNMP in Network Problem Resolution sponsored by KNOW YOUR NETWORK by Greg Shields Ho w to Use SNMP in Network Problem Resolution...
More informationUnderstanding the Business Benefits of Managed Services
The Essentials Series: Managed Application Failover for the SMB Understanding the Business Benefits of Managed Services sponsored by by David Chernicoff Un derstanding the Business Benefits of Managed
More informationTo Cloud or Not to Cloud? Growing a Managed Services Portfolio
Protecting Client Data in the Cloud: A Channel Perspective The Essentials Series To Cloud or Not to Cloud? Growing a Managed Services Portfolio sponsored by Introduction to Realtime Publishers by Don Jones,
More informationEight Ways Better Software Deployment and Management Can Save You Money
Eight Ways Better Software Deployment and Management Can Save You Money Introduction Software management and deployment are perhaps among the most difficult and time-consuming activities undertaken by
More informationThe Shortcut Guide To. Implementing Virtualization in the Small Environment. Greg Shields
tm The Shortcut Guide To Implementing Virtualization in the Small Environment Greg Shields Ch apter 2: What Business Benefits Will I Recognize from Implementing Virtualization?... 16 Why Should My Budget
More informationHow to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Ch apter 4: Installing SSL Certificates in Exchange Server, SharePoint, and SQL Server... 57 Co mmon Operations... 57 Step 1: Prepare the Microsoft
More informationThe Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged
More informationAcronis Backup Product Line
New Generation Data Protection Powered by Acronis AnyData Technology Acronis Backup Product Line Speaker name Introducing Acronis Backup Acronis Backup Target: Smaller environments, home office, remote
More informationThe Essentials Series: Enterprise Identity and Access Management. Authorization. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authorization sponsored by by Richard Siddaway Authorization...1 What Needs to Be Protected?...1 Groups...2 Role-Based Access...2 Heterogeneous
More informationBusiness Communications Tools and Solutions
Building Business Productivity with Unified Communications The Essentials Series Networking for Increased Productivity and Reduced Costs sponsored by Introduction to Realtime Publishers by Don Jones, Series
More informationOptimizing Data Protection Operations in VMware Environments
Optimizing Data Protection Operations in VMware Environments March 2009 Data protection is critical for small and medium business (SMB) customers. Evolving business and regulatory mandates are driving
More informationEradicating PST Files from Your Network
The Essentials Series: Operations Benefits of Email Archiving Eradicating PST Files from Your Network sponsored by by Jim McBee Eradicating PST Files from Your Network...1 Understanding the Disadvantages
More informationAuditing File and Folder Access
The Essentials Series: Fundamentals of Effective File Server Security Auditing File and Folder Access sponsored by by Greg Shields Au diting File and Folder Access... 1 Auditing Considerations... 1 Co
More informationDeployment Options for Microsoft Hyper-V Server
CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES
More informationIntroducing Arcserve Unified Data Protection
Introducing Arcserve Unified Data Protection Arcserve UDP is based on a next generation unified architecture for both virtual and physical environments. Its unmatched breadth, ease of use, and Assured
More informationWhy Native Windows Defragmentation Isn t Enough
Why Native Windows Defragmentation Isn t Enough The Essentials Series Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens of high-quality
More informationParallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...
More informationThe Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones
The Definitive Guide tm To Monitoring the Data Center, Virtual Environments, and the Cloud Don Jones The Nimsoft Monitoring Solution SERVICE LEVEL MONITORING VISUALIZATION AND REPORTING PRIVATE CLOUDS»
More informationSymantec NetBackup 7.5 for VMware
V-Ray visibility into virtual machine protection Solution Overview: Data Protection Overview There is little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped
More informationAn Oracle White Paper November 2010. Oracle Real Application Clusters One Node: The Always On Single-Instance Database
An Oracle White Paper November 2010 Oracle Real Application Clusters One Node: The Always On Single-Instance Database Executive Summary... 1 Oracle Real Application Clusters One Node Overview... 1 Always
More informationVirtualized Disaster Recovery from VMware and Vision Solutions Cost-efficient, dependable solutions for virtualized disaster recovery and business
Virtualized Disaster Recovery from VMware and Vision Solutions Cost-efficient, dependable solutions for virtualized disaster recovery and business continuity Cost-efficient, dependable solutions for virtualized
More informationCA ARCserve Replication and High Availability Deployment Options for Hyper-V
Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization
More informationHow Are Certificates Used?
The Essentials Series: Code-Signing Certificates How Are Certificates Used? sponsored by by Don Jones Ho w Are Certificates Used?... 1 Web Applications... 1 Mobile Applications... 2 Public Software...
More informationEnabling Useful Active Directory Auditing
The Essentials Series: Tackling Active Directory s Four Biggest Challenges Enabling Useful Active Directory Auditing sponsored by by Greg Shields En abling Useful Active Directory Auditing... 1 The Native
More informationActive Directory 2008 Operations
The Essentials Series Active Directory 2008 Operations sponsored by by Greg Shields Understanding Active Directory Recovery in Windows Server 2008...1 Backing Up AD...1 Full Server Recovery of a Domain
More informationVirtualization Support - Real Backups of Virtual Environments
Virtualization Support Real Backups of Virtual Environments Contents Virtualization Challenges 3 The Benefits of Agentless Backup 4 Backup and Recovery Built for Virtualized Environments 4 Agentless in
More informationAccount Access Management - A Primer
The Essentials Series: Managing Access to Privileged Accounts Understanding Account Access Management sponsored by by Ed Tittel Understanding Account Access Management...1 Types of Access...2 User Level...2
More informationDemystifying Virtualization for Small Businesses Executive Brief
Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................
More informationVirtual Machine Protection with Symantec NetBackup 7
Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing to embrace the promise of virtualization for
More informationData Deduplication: An Essential Component of your Data Protection Strategy
WHITE PAPER: THE EVOLUTION OF DATA DEDUPLICATION Data Deduplication: An Essential Component of your Data Protection Strategy JULY 2010 Andy Brewerton CA TECHNOLOGIES RECOVERY MANAGEMENT AND DATA MODELLING
More informationWhat You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility
Your Guide to Cost, Security, and Flexibility What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility 10 common questions answered Over the last decade, cloud backup, recovery
More informationCrashPlan PRO Enterprise Backup
CrashPlan PRO Enterprise Backup People Friendly, Enterprise Tough CrashPlan PRO is a high performance, cross-platform backup solution that provides continuous protection onsite, offsite, and online for
More informationRadware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical
Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation
More informationHow the Software-Defined Data Center Is Transforming End User Computing
How the Software-Defined Data Center Is Transforming End User Computing The Essentials Series sponsored by David Davis SDDC Powered Virtual Desktops and Applications... 1 Three Pillars of SDDC and Desktop/Application
More informationWhat Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
More informationProtecting your Data in a New Generation Virtual and Physical Environment
Protecting your Data in a New Generation Virtual and Physical Environment Read this white paper to learn how you can easily and safely protect your data in a new generation virtual and physical IT environment,
More informationWith Red Hat Enterprise Virtualization, you can: Take advantage of existing people skills and investments
RED HAT ENTERPRISE VIRTUALIZATION DATASHEET RED HAT ENTERPRISE VIRTUALIZATION AT A GLANCE Provides a complete end-toend enterprise virtualization solution for servers and desktop Provides an on-ramp to
More informationQuickly Recovering Deleted Active Directory Objects
The Essentials Series: Tackling Active Directory s Four Biggest Challenges Quickly Recovering Deleted Active Directory Objects sponsored by by Greg Shields Qu ickly Recovering Deleted Active Directory
More informationSymantec NetBackup OpenStorage Solutions Guide for Disk
Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a
More informationIT@Intel. Developing an Enterprise Client Virtualization Strategy
White Paper Intel Information Technology Computer Manufacturing Client Virtualization Developing an Enterprise Client Virtualization Strategy Intel IT is investigating virtualization because it has the
More informationWindows Server 2008 R2 Hyper-V Live Migration
Windows Server 2008 R2 Hyper-V Live Migration White Paper Published: August 09 This is a preliminary document and may be changed substantially prior to final commercial release of the software described
More informationWhite Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
More informationPr oactively Monitoring Response Time and Complex Web Transactions... 1. Working with Partner Organizations... 2
Pr oactively Monitoring Response Time and Complex Web Transactions... 1 An atomy of Common Web Transactions... 1 Asking for Decisions... 1 Collecting Information... 2 Providing Sensitive Information...
More information