Virtual Machine Environments: Data Protection and Recovery Solutions
|
|
|
- Victor Kelley
- 10 years ago
- Views:
Transcription
1 The Essentials Series: The Evolving Landscape of Enterprise Data Protection Virtual Machine Environments: Data Protection and Recovery Solutions sponsored by by Dan Sullivan
2 Vir tual Machine Environments: Data Protection and Recovery Solutions... 1 Virtual Machine Environments in the Enterprise... 1 Ad apting Backup Strategies to Virtual Machine Environments... 2 Conventional Backups... 2 Specialized Virtual Machine Backups... 3 Source Side Deduplication Backups... 3 Leveraging Virtual Machines for Disaster Recovery... 4 Summary... 5 i
3 Copyright Statement 2009 Realtime Publishers, Inc. All rights reserved. This site contains materials that have been created, developed, or commissioned by, and published with the permission of, Realtime Publishers, Inc. (the Materials ) and this site and any such Materials are protected by international copyright and trademark laws. THE MATERIALS ARE PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. The Materials are subject to change without notice and do not represent a commitment on the part of Realtime Publishers, Inc or its web site sponsors. In no event shall Realtime Publishers, Inc. or its web site sponsors be held liable for technical or editorial errors or omissions contained in the Materials, including without limitation, for any direct, indirect, incidental, special, exemplary or consequential damages whatsoever resulting from the use of any information contained in the Materials. The Materials (including but not limited to the text, images, audio, and/or video) may not be copied, reproduced, republished, uploaded, posted, transmitted, or distributed in any way, in whole or in part, except that one copy may be downloaded for your personal, noncommercial use on a single computer. In connection with such use, you may not modify or obscure any copyright or other proprietary notice. The Materials may contain trademarks, services marks and logos that are the property of third parties. You are not permitted to use these trademarks, services marks or logos without prior written consent of such third parties. Realtime Publishers and the Realtime Publishers logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. If you have any questions about these terms, or if you would like information about licensing materials from Realtime Publishers, please contact us via at [email protected]. ii
4 Virtual Machine Environments: Data Protection and Recovery Solutions Virtualization technology, widely adopted for its cost efficiency and ease of administration, has implications for data protection and recovery solutions. The data and applications running on virtual machine environments must be protected just as those on physical servers, but differences in physical and virtual servers have implications for your backup strategies. At the same time, virtual machine technology can significantly contribute to streamlining disaster recovery operations. In both cases, proper planning and deployment of virtual machine environments and backup solutions can positively influence the return on investment (ROI) in these technologies. Virtual Machine Environments in the Enterprise Virtual machine technologies such as VMware s Infrastructure 3 and VMware Server and Microsoft s Hyper V technology, available in Windows Server 2008, are gaining in popularity. Virtualization technologies such as these insert a software layer between the hardware and the operating system (OS), which traditionally ran directly on that hardware. The new software layer, known as a hypervisor, can act as a mediator between CPUs, memory, storage, and other hardware components and one or more OSs. Figure 1: Virtual machine environments enable server consolidation without sacrificing the benefits of running applications in dedicated OSs. 1
5 Some of the key drivers behind this adoption are The ability to consolidate multiple applications on a single physical server while retaining the advantages of running applications on separate OSs Reduced power consumption due to fewer servers and less demand for cooling Reduced cost and time to provision application servers on a virtual machine versus on a physical machine Ability to reduce cost of disaster recovery With these advantages, though, come differences in the way typical IT operations are performed. Backups, in particular, require special attention. Adapting Backup Strategies to Virtual Machine Environments Moving to virtual machine environments does not change the need to protect these servers at the same level that physical machines are protected. Although virtual machines can be installed from images to new hardware ( raw iron ) faster than OSs and applications can be installed and configured from scratch, there is still a need to protect the data on virtual servers. It is reasonable to presume that virtual machines will require similar service level agreements (SLAs), recovery point objectives (RPOs), and recovery time objectives (RTOs) to those of physical servers. Conventional Backups Conventional backup methods, however, can adversely impact some virtual machine environments and slow the performance of other virtual machines. For example, if one virtual machine is running a full backup, the performance of other virtual machines on the same physical server may be so degraded that they no longer meet their response time objectives. In other cases, a systems administrator may be forced to choose between delaying the backup of one virtual machine to allow another virtual machine s backup to complete or risk degrading the performance of all virtual machines on the physical server. 2
6 Specialized Virtual Machine Backups Specialized solutions can improve upon conventional backup methods but at the cost of increased complexity. Take, for example, solutions that offload the backup process to another server. This type of solution offers the ability to perform full and incremental backups of virtual machines, make full image backups of virtual machines, and perform these operations from a centralized management system. It does require some changes to the typical backup system: Needs a backup proxy system that stores a snapshot of a virtual machine Conventional backup software performs backup from proxy server to tape or disk storage Restoration becomes a two step process with backup software restoring to the proxy device; that image is then restored to the target server This method eliminates the overhead of performing backups from the virtual machines and consolidates it on the proxy server. It does, however, introduce another component (the proxy server) to manage. Another approach is to reduce, rather than shift, the overhead of creating backups. Source Side Deduplication Backups Backup overhead is reduced when the amount of data copied, transmitted, and stored is reduced. There are a number of ways to do so, including source side decompression and target side decompression; this article will discuss the efficient source side deduplication method. See the first article in this Essential Series for details about source side deduplication compared with other data reduction strategies. With source side deduplication, block level incremental backups are performed. This is more efficient than file level backups because only changed blocks rather than entire files are backed up. As a result, backups finish faster with less demand on CPU, disk, and network resources. This approach eliminates the need for a proxy server to reduce the load on virtual servers, which, in turn, eliminates the two step recovery process required with a proxy based solution. Fewer recovery steps means less complexity, less room for error, and faster recovery times. Special Issues with Databases and Block Level Backups It should be noted, though, that some applications, such as databases, may perform block level operations of their own within the context of logical transactions. Block level backup systems must take this into account to ensure that backups represent a consistent database state. If this is not possible, backups should be performed only when there are no changes being made to the database. 3
7 Depending on the backup solution and the hypervisor constraints, a data protection system with source side deduplication may also offer: Bare metal recovery Support for multiple OS platforms Application specific recovery options for databases and servers The last feature is especially important if you are required to recover a single user s folder or a single table within a database. Restoring an entire database, for example, in order to restore a single table can add significantly to the time and space required to perform a restore operation. Solutions that reduce overhead and reduce complexity yield favorable ROI for a variety of reasons: Small backup footprint allows for more frequent backups, which provide many recovery points Management costs are reduced because there is no need for an additional proxy server Reduced backup sizes reduce storage costs More virtual machines may be run on a single server because backups do not introduce unnecessary load on the servers Optimizing backups for virtual machines is just one way to improve overall ROI with virtual machines and it contributes to more effective disaster recovery as well. Leveraging Virtual Machines for Disaster Recovery As the number of virtual machines in business grows, so does the need for disaster recovery support. When selecting a backup solution, look for features that support creating virtual machines from a single backup instance. This approach brings several advantages. Perhaps the most important from a disaster recovery perspective is the ability to rapidly recover both virtual and physical servers with the instant availability of virtual machine images. Certain data protection products allow you to iscsi connect and LUN map from the virtual server to the backup image, creating a temporary fully operational virtual machine without even a data transfer. There are cost advantages as well. The ability to recover physical servers to virtual machines reduces the cost of maintaining a disaster recovery center. For example, if a production server running on a dedicated server completely fails, a virtual machine can be rapidly deployed to a shared server in a disaster recovery site. Performance may be slower but services can be maintained until a production level server is available. In addition, jobs, such as backup jobs, can continue to complete even after migration. 4
8 The overall impact is the need for fewer servers in a disaster recovery site. Rather than a worst case scenario of having to support a failover server for every production server that runs a single application, you can consolidate both production and disaster recovery servers. Presumably, virtual machines are already used in production to optimize the number of physical servers needed to meet performance requirements and SLAs. If those SLAs allow for reduced performance during disaster recovery periods, you could further reduce the cost of maintaining a disaster recovery site by running more virtual machines on physical servers during recovery periods. Favorable ROI is also realized by using a shared backup and disaster recovery procedure: the same backups used for data recovery are available for disaster recovery. Summary Virtual machine environments are a staple of enterprise IT infrastructure. The cost and management advantages of virtual environments are compelling, so backup and disaster recovery strategies should adapt to their particular requirements. In the process, though, you find that the same techniques you deploy to provide backups for virtual machines without undo overhead on physical servers yield favorable ROI. The lower overhead performance of source side deduplication allows for more resources dedicated to virtual machines and their applications and reduced storage costs on backup devices. In addition, the same procedures provide for cost effective disaster recovery. 5
Tips and Best Practices for Managing a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies
Protecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
The Next-Generation Virtual Data Center
The Essentials Series: Managing Workloads in a Virtual Environment The Next-Generation Virtual Data Center sponsored by by Jaime Halscott Th e Next Generation Virtual Data Center... 1 Be nefits of Virtualization
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop Virtualization...
Protecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures sponsored by Introduction to Realtime
Steps to Migrating to a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime
Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery
Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery The Essentials Series sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones, Series Editor For
Data Protection in a Virtualized Environment
The Essentials Series: Virtualization and Disaster Recovery Data Protection in a Virtualized Environment sponsored by by J. Peter Bruzzese Da ta Protection in a Virtualized Environment... 1 An Overview
Understanding & Improving Hypervisor Security
The Essentials Series: Security Concerns & Solutions Understanding & Improving Hypervisor Security sponsored by by Greg Shields Understanding & Improving Hypervisor Security...1 What Is the Hypervisor?...1
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
The Art of High Availability
The Essentials Series: Configuring High Availability for Windows Server 2008 Environments The Art of High Availability by The Art of High Availability... 1 Why Do We Need It?... 1 Downtime Hurts... 1 Critical
Real World Considerations for Implementing Desktop Virtualization
Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage sponsored by Dan Sullivan Chapter 1: Advantages of Hybrid Storage... 1 Overview of Flash Deployment in Hybrid Storage Systems...
Mitigating Risks and Monitoring Activity for Database Security
The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring
10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series 10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution sponsored by Introduction to Realtime
Controlling and Managing Security with Performance Tools
Security Management Tactics for the Network Administrator The Essentials Series Controlling and Managing Security with Performance Tools sponsored by Co ntrolling and Managing Security with Performance
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
The Shortcut Guide To. Availability, Continuity, and Disaster Recovery. Dan Sullivan
tm The Shortcut Guide To Availability, Continuity, and Disaster Recovery Chapter 4: Putting It All Together Recovery Management Scenarios for Small Businesses to Emerging Enterprises... 48 Different Business
Why Endpoint Encryption Can Fail to Deliver
Endpoint Data Encryption That Actually Works The Essentials Series Why Endpoint Encryption Can Fail to Deliver sponsored by W hy Endpoint Encryption Can Fail to Deliver... 1 Tr aditional Solutions... 1
Active Directory 2008 Operations
The Essentials Series Active Directory 2008 Operations sponsored by by Greg Shields Understanding Active Directory Recovery in Windows Server 2008...1 Backing Up AD...1 Full Server Recovery of a Domain
The Definitive Guide to Cloud Acceleration
The Definitive Guide to Cloud Acceleration Dan Sullivan sponsored by Chapter 5: Architecture of Clouds and Content Delivery... 80 Public Cloud Providers and Virtualized IT Infrastructure... 80 Essential
Realizing the IT Management Value of Infrastructure Management
The Essentials Series: Infrastructure Management Realizing the IT Management Value of Infrastructure Management sponsored by by Chad Marshall Realizing the IT Management Value of Infrastructure Management...1
Auditing File and Folder Access
The Essentials Series: Fundamentals of Effective File Server Security Auditing File and Folder Access sponsored by by Greg Shields Au diting File and Folder Access... 1 Auditing Considerations... 1 Co
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
How Configuration Management Tools Address the Challenges of Configuration Management
Streamlining Configuration Management The Essentials Series How Configuration Management Tools Address the Challenges of Configuration Management sponsored by Introduction to Realtime Publishers by Don
The Definitive Guide. Cloud Computing. Dan Sullivan
The Definitive Guide tm To Cloud Computing Ch apter 10: Key Steps in Establishing Enterprise Cloud Computing Services... 185 Ali gning Business Drivers with Cloud Services... 187 Un derstanding Business
Virtual Server System and Data Protection, Recovery and Availability
Virtual Server System and Data Protection, Recovery and Availability Although server virtualization helps reduce IT infrastructure costs, it also adds complexity to protecting the wide range of applications
The Shortcut Guide To. Availability, Continuity, and Disaster Recovery. Dan Sullivan
tm The Shortcut Guide To Availability, Continuity, and Disaster Recovery Chapter 3: Top-5 Operational Challenges in Recovery Management and How to Solve Them.. 33 Challenge 1: Scheduling and Monitoring...
Eradicating PST Files from Your Network
The Essentials Series: Operations Benefits of Email Archiving Eradicating PST Files from Your Network sponsored by by Jim McBee Eradicating PST Files from Your Network...1 Understanding the Disadvantages
The Evolving Threat Landscape and New Best Practices for SSL
The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...
Using Web Security Services to Protect Portable Devices
Using Cloud Services to Improve Web Security The Essentials Series Using Web Security Services to Protect Portable Devices sponsored by Us ing Web Security Services to Protect Portable Devices... 1 Understanding
Becoming Proactive in Application Management and Monitoring
The Essentials Series: Improving Application Performance Troubleshooting Becoming Proactive in Application Management and Monitoring sponsored by by Becoming Proactive in Application Managem ent and Monitoring...
Tips and Tricks Guide tm. Windows Administration. Don Jones and Dan Sullivan
Tips and Tricks Guide tm To tm Windows Administration Don Jones and Dan Sullivan Tip, Trick, Technique 13: Configuring Server Core in Windows Server 2008 R2... 1 Tip, Trick, Technique 14: What Are Microsoft
Best Practices for Log File Management (Compliance, Security, Troubleshooting)
Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers
The Essentials Series: Enterprise Identity and Access Management. Authorization. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authorization sponsored by by Richard Siddaway Authorization...1 What Needs to Be Protected?...1 Groups...2 Role-Based Access...2 Heterogeneous
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Collaborative and Agile Project Management
Collaborative and Agile Project Management The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
Quickly Recovering Deleted Active Directory Objects
The Essentials Series: Tackling Active Directory s Four Biggest Challenges Quickly Recovering Deleted Active Directory Objects sponsored by by Greg Shields Qu ickly Recovering Deleted Active Directory
The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones
The Definitive Guide tm To Active Directory Troubleshooting, Auditing, and Best Practices 2011 Edition Don Jones Ch apter 5: Active Directory Auditing... 63 Goals of Native Auditing... 63 Native Auditing
Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve
Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while
Taking Virtualization
Taking Virtualization to the SMB Market How Lenovo is driving Virtualization solutions for the SMB market by lowering costs and simplifying deployment White Paper Lenovo Virtualization Solutions Introduction
Meeting the Top Backup Challenges in Small and Medium Business Environments
Meeting the Top Backup Challenges in Small and Medium Business Environments December 2008 Although small and medium businesses (SMBs) do not typically generate the same amount of data that large enterprises
Optimizing Data Protection Operations in VMware Environments
Optimizing Data Protection Operations in VMware Environments March 2009 Data protection is critical for small and medium business (SMB) customers. Evolving business and regulatory mandates are driving
Evaluation of Enterprise Data Protection using SEP Software
Test Validation Test Validation - SEP sesam Enterprise Backup Software Evaluation of Enterprise Data Protection using SEP Software Author:... Enabling you to make the best technology decisions Backup &
SOLUTION BRIEF: CA ARCserve R16. Virtual Server System and Data Protection, Recovery and Availability
Virtual Server System and Data Protection, Recovery and Availability Page 2 Although server virtualization helps reduce IT infrastructure costs, it also adds complexity to protecting the wide range of
IBM Tivoli Storage Manager for Virtual Environments
IBM Storage Manager for Virtual Environments Non-disruptive backup and instant recovery: Simplified and streamlined Highlights Simplify management of the backup and restore process for virtual machines
Parallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...
The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged
How to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Ch apter 3: Using SSL Certificates in Microsoft Internet Information Server... 36 Ins talling SSL Certificates in IIS with IIS Manager... 37 Requesting
CA arcserve r16.5 Hybrid data protection
CA arcserve r16.5 Hybrid data protection Whether you re protecting the data center, remote offices or desktop resources, you need a solution that helps you meet today s demanding service-level agreements
Virtual Server System and Data Protection, Recovery and Availability
Solution Brief: CA ARCserve R16.5 Complexity ate my budget Virtual Server System and Data Protection, Recovery and Availability Although server virtualization helps reduce IT infrastructure costs, it also
Isolating Network vs. Application Problems
The Essentials Series: Network Troubleshooting and Problem Identification Isolating Network vs. Application Problems sponsored by by Greg Shields Isolating Network vs. Application Problems...1 Common
The Shortcut Guide To. Implementing Virtualization in the Small Environment. Greg Shields
tm The Shortcut Guide To Implementing Virtualization in the Small Environment Greg Shields Ch apter 2: What Business Benefits Will I Recognize from Implementing Virtualization?... 16 Why Should My Budget
How to Use SNMP in Network Problem Resolution
The Essentials Series: Solving Network Problems Before They Occur How to Use SNMP in Network Problem Resolution sponsored by KNOW YOUR NETWORK by Greg Shields Ho w to Use SNMP in Network Problem Resolution...
Protecting Citrix XenServer Environments with CA ARCserve
Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting Citrix XenServer Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while
Data Protection and Recovery
Due to shrinking IT staffing and budgets, many IT organizations are turning to Service Providers for hosting of business-critical systems and applications (i.e., web hosting, email hosting, and database
Introduction. Setup of Exchange in a VM. VMware Infrastructure
Introduction VMware Infrastructure is deployed in data centers for deploying mission critical applications. Deployment of Microsoft Exchange is a very important task for the IT staff. Email system is an
How the Software-Defined Data Center Is Transforming End User Computing
How the Software-Defined Data Center Is Transforming End User Computing The Essentials Series sponsored by David Davis SDDC Powered Virtual Desktops and Applications... 1 Three Pillars of SDDC and Desktop/Application
Deployment Options for Microsoft Hyper-V Server
CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES
SOLUTION BRIEF: CA ARCserve R16. Leveraging the Cloud for Business Continuity and Disaster Recovery
Leveraging the Cloud for Business Continuity and Disaster Recovery There are many reasons why businesses today find high value in a cloud service, whether it s a private cloud offered by a Managed Services
WHITE PAPER. Solving the Challenges of Virtual Machine Backups with Acronis Backup & Recovery 10
Solving the Challenges of Virtual Machine Backups with Acronis Backup & Recovery 10 Copyright Acronis, Inc., 2000 2009 Table of contents Introduction... 3 Backup Approaches for Virtual Machines (VMs)...
Introducing Arcserve Unified Data Protection
Introducing Arcserve Unified Data Protection Arcserve UDP is based on a next generation unified architecture for both virtual and physical environments. Its unmatched breadth, ease of use, and Assured
solution brief September 2011 Can You Effectively Plan For The Migration And Management of Systems And Applications on Vblock Platforms?
solution brief September 2011 Can You Effectively Plan For The Migration And Management of Systems And Applications on Vblock Platforms? CA Capacity Management and Reporting Suite for Vblock Platforms
Backing Up the CTERA Portal Using Veeam Backup & Replication. CTERA Portal Datacenter Edition. May 2014 Version 4.0
Backing Up the CTERA Portal Using Veeam Backup & Replication CTERA Portal Datacenter Edition May 2014 Version 4.0 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may
The Benefits of Virtualization for Your DR Plan
E-Guide The Benefits of Virtualization for Your DR Plan Server virtualization is making a positive impact in the area of disaster recovery. Through virtualization, organizations can save money, as well
Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide
WHITE Deployment PAPERGuide Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide An Acronis White Paper Copyright Acronis, Inc., 2000 2011 Deployment Guide Table of contents About
What Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
can you effectively plan for the migration and management of systems and applications on Vblock Platforms?
SOLUTION BRIEF CA Capacity Management and Reporting Suite for Vblock Platforms can you effectively plan for the migration and management of systems and applications on Vblock Platforms? agility made possible
