Symantec reference architectures for the virtualization of Microsoft SQL Server, Microsoft SharePoint, and Microsoft Exchange Server

Size: px
Start display at page:

Download "Symantec reference architectures for the virtualization of Microsoft SQL Server, Microsoft SharePoint, and Microsoft Exchange Server"

Transcription

1 WHITE PAPER: ACCELERATING VIRTUALIZATION OF TIER 1 APPLICATIONS Symantec reference architectures for the virtualization of Microsoft SQL Server, Microsoft SharePoint, and Microsoft Exchange Server Who should read this paper C-level IT executives, Database Administrators, and Application Owners

2

3 Content Business overview Goals and objectives Stakeholders and their concerns Role of a reference architecture Principles guiding this architecture Assumptions guiding this architecture Components of a reference architecture Summary of the technical scope Microsoft SQL Server Virtualization Reference Architecture Microsoft SharePoint Virtualization Reference Architecture Microsoft Exchange Server Virtualization Reference Architecture Comprehensive business-critical application environment Technology components Conclusions Appendix A: Test infrastructure

4 Business overview Organizations strive to leverage the benefits of virtualization to help drive down cost, improve business agility through greater consolidation, improve utilization of resources, and benefit from increased automation and efficiency. Today, enterprise businesses commonly deploy virtualization for non-critical environments only, due to the perception of obstacles that prevent further virtualization in the data center. Projects stall when applications are considered too large, too complex, or too high risk to virtualize. To help organizations implement proven and repeatable enterprise-class IT solutions in virtual environments, Symantec has created a series of reference architectures. The focus of the reference architectures is to accelerate the virtualized deployments of Microsoft applications on VMware platforms, enhanced by Symantec software. The reference architectures demonstrate how organizations can meet the demands for application performance, availability, security, and cost, as well as increase the business value and return on investment from Symantec software. Goals and objectives The goal of the Symantec reference architectures is to remove the barriers to virtualization, and provide proven capabilities to help businesses migrate their critical Microsoft applications safely to virtual environments, while managing complexity and risk. Figure 1 - Business transformation 1

5 The reference architectures within this series include: Symantec Reference Architecture for Microsoft SQL Server Symantec Reference Architecture for Microsoft SharePoint Symantec Reference Architecture for Microsoft Exchange Server The documents provide assistance and guidance with the validation, design, and implementation of enterprise-class virtualization of Microsoft applications, leveraging the power of Symantec technology to accelerate the deployment of virtualization. Objectives derived from the goals The major barriers to deployment of virtualized business-critical services common among organizations include: I/O performance Availability and recovery Virtualized server security Cost Operational efficiency These key attributes form the core focus of the business and technical objectives presented in the reference architectures, as detailed in the following series of tables. Optimize I/O performance Objective Provide capacity-on-demand capability for storage. Provide scalable performance. Description Scale to support large multi-terabyte databases without any disruption to critical business services. Support high transaction rates by enabling the data to be load balanced across multiple I/O paths and storage devices, with the ability to increase or decrease bandwidth online. Provide business-critical levels of availability Objective Respond to application-level failures. Respond to virtual machine failures. Respond to server hardware failures. Description Extend the capabilities of VMware to deliver business-critical levels of availability through enhanced monitoring and recovery of failed application components running on a virtual machine. Restart virtual machines when faults are detected. Start the virtual machine on another server if it cannot be restarted successfully. Migrate virtual machines to a different server when a server fault or stability issue is detected. 2

6 Objective Respond to site failures or outages. Enable live migration of running virtual machines. Enable instant recovery of data using snapshots. Enable recovery of individual objects. Ensure I/O path resiliency. Description Integrate with VMware high availability (HA), VMware Site Recovery Manager (SRM) and replication technologies to provide a cost-effective disaster recovery solution. Fully support VMware VMotion technology to enable live migration of servers and minimize planned downtime. Provide instant point-in-time recovery from snapshot copies of the data with ability to roll the database forward using transaction logs to recover quickly from data corruption or loss. Enable granular recovery of SQL Server database objects including user, system, full text catalogs, and file streams while database is online. Deploy multipathing technology to eliminate single points of failure in the I/O data path. Protect critical servers from security threats Objective Protect against network-based security threats. Provide intrusion protection and prevention for virtualized environments. Description Use VMware vshield to enforce firewall security policies that stay with a virtual server even after live migration or site failover, to protect applications from network-based threats. Implement intrusion protection and prevention to further improve the security of virtual machines. Reduce infrastructure costs Objective Use physical resources more efficiently. Reduce the physical server footprint. Provide thin provisioning and storage reclamation. Perform off-host backups and data deduplication. Description Make more efficient use of physical server resources through virtualization, reducing both management and operating costs through consolidation. Reduce physical server footprint through virtualization to reduce IT spending on data center capacity, power and cooling, and to reduce the environmental impact of data center sprawl. Combine thin provisioning with storage reclamation capabilities to achieve cost savings through greater utilization of storage. Enable efficient off-host backups, with data deduplication, to achieve cost savings by reducing storage requirements for offline data retention. 3

7 Improve operations efficiency Objective Deploy or decommission components quickly. Eliminate physical silos. Reduce the risk of application failures impacting other functions. Provide high availability without hot standby servers. Remove complexity from data center failover procedures. Automate operational procedures. Centralize management. Description Enable new applications to be deployed or decommissioned quickly without involving the lengthy processes associated with physical hardware, thereby removing complexity and improving business agility. Eliminate silos, where applications underutilize dedicated resources, through virtualization; resources can be shared, improving business efficiency. Remove the cascading effect of one failing application bringing down another application, or an entire operating system, by limiting each virtual machine to running one application, reducing operational risk. Achieve high availability without requiring hot standby servers, to help realize the cost savings expected through virtualization of business-critical applications. Use VMware SRM to reduce risk and to remove complexity from data center failovers and planned migrations. Automate operational procedures to improve efficiency and reduce risk. Centralize management for an application-centric view of virtual servers, helping to optimize data center assets, scale operations, and centralize visibility and control. Constraints The reference architectures are limited by the constraints described in the table. Constraint Preserve or enhance VMware capabilities Hardware agnostic Compatibility with existing hardware solutions Description VMware capabilities will either be preserved or built upon, but they must not be removed or broken. For example, VMware VMotion and SRM are features that will be used within the solution. Hardware vendor tie-in must be eliminated. Although specific hardware vendors may be recommended or referred to by the reference architecture, the design will not preclude the use of other hardware vendors. This may come with a caveat; for example, if certain features are not available from a particular vendor, those features will be missing in the final solution. Compatibility will be maintained with standard hardware solutions in the virtualization space, such as Vblock and FlexPod. 4

8 Constraint 64-bit architecture Security architecture Assisted site failover Description Solution is for 64-bit Intel or AMD processor architectures only. The security architecture in this release relies upon Symantec Critical System Protection. Due to the design of VMware SRM and its lack of external arbitration services, it will not be possible to fully automate site failover within this architecture. Instead, site failover must be triggered manually, after which the process is automatic. Stakeholders and their concerns A number of stakeholder views have been considered for the creation of the reference architectures, including: Senior IT managers Chief Information Officers Chief Technology Officers The stakeholders consulted for these reference architectures have a range of concerns relating to virtualization, which are summarized in the following table. Stakeholder Abbrev. Summary of Concerns Chief Information and Technology Officers CIO/CTO IT budgets, demonstrable benefits Chief Financial Officer CFO Cost transparency and recovery (chargeback) Chief Security Officer CSO Security and compliance Chief Operations Officer and Database Administrators COO/DBA Performance and scalability, resource and capacity management Application Owners App Cost, time to provision, reliability, performance and scalability IT Infrastructure Operations Ops Cost, time to provision, reliability and availability, performance and scalability, resource and capacity management IT Service Management ITSM Usability, service delivery, visibility, compliance Role of a reference architecture A reference architecture is a framework for defining a solution, including components, relationships between components, and the principles governing the design of the architecture. It provides a set of consistent architecture best practices that can be used by a variety of organizations to design their own solutions for their specific goals. 5

9 The intent of the Symantec reference architectures is to short-cut the design process for organizations interested in virtualizing critical business services. The aim is to reduce or eliminate errors in technology decisions and increase the likelihood of successful implementation of blended Microsoft, VMware, and Symantec solutions in a virtual environment. Using a reference architecture as a guide for designing solutions with similar capabilities enables organizations to derive several benefits, including: Reducing complexity Reducing resources requirements and cost Minimizing design and implementation timeframes While a reference architecture provides a basis for creating real-world solutions, it is not intended as an implementation blueprint. Each organization can apply the principles and goals appropriate for their requirements, and modify design criteria as needed for their purposes. For example, the Symantec reference architectures describe collections of technology, along with the capabilities and configuration options used in the solution. An organization may choose different capabilities or configuration options in their implementations. Principles guiding this architecture The following core principles have been identified to guide the design of the solutions presented in the reference architectures. Business principles Information management decisions are made to provide maximum benefit to the enterprise as a whole. Enterprise operations are maintained in spite of system interruptions. Enterprise operations are performed within the time constraints set by pre-defined service levels. Enterprise processes are automated where appropriate to reduce manual effort. Development of applications used across the enterprise is preferred over the development of similar or duplicative applications which are only provided to a particular organization. Enterprise information management processes comply with all relevant laws, policies, and regulations. The IT organization is responsible for owning and implementing IT processes and infrastructure that enable solutions to meet userdefined requirements for functionality, service levels, cost, and delivery timing. Effectively align expectations with capabilities and costs so that all projects are cost-effective. Efficient and effective solutions have reasonable costs and clear benefits. Data principles Information is central to the successful running of an organization. Data is an asset that has value to the enterprise and is managed accordingly. Data is shared between applications across the enterprise. Data is accessible for users to perform their functions. Each data element has a trustee accountable for data quality. Data is defined consistently throughout the enterprise, and the definitions are understandable and available to all users. Data is protected from unauthorized use and disclosure. In addition to the traditional aspects of national security classification, this includes, but is not limited to, protection of pre-decisional, sensitive, source selection sensitive, and proprietary information. 6

10 Application principles Applications are independent of specific technology choices and therefore can operate on a variety of technology platforms. Applications are easy to use. The underlying technology is transparent to users, so they can concentrate on tasks at hand. Only in response to business needs are changes to applications and technology made. Technology principles Changes to the enterprise information environment are implemented in a timely manner. Technological diversity is controlled to minimize the non-trivial cost of maintaining expertise in and connectivity between multiple processing environments. Software and hardware should conform to defined standards that promote interoperability for data, applications, and technology. Assumptions guiding this architecture The solutions identified in the reference architectures define optimum configurations that ensure VMware, Microsoft, and Symantec technologies work together for maximum combined benefit. They do not seek to optimize a single component within the stack to the detriment of the others. While the reference architectures are targeted to medium and large enterprises deploying business-critical applications with high transaction rates, the scope is limited to single-instance application environments with no database mirroring or availability groups. Minimizing cost of implementation is the highest priority goal of the Reference Architecture. Organizations can expand the scope of a specific implementation of the Symantec reference architecture to include multi-instance applications. The versions of software used in an implementation based on the reference architectures must be equal to, or later than, those versions specified in the physical view of each technical architecture. For example, vsphere 4.1 cannot be used in the solution; VMware version 5.0 software is the minimum requirement. Virtualization is maturing considerably within enterprise class organizations, and accordingly the reference architectures do not aim to cover these areas in detail: Business benefits of virtualization Transition to a cloud technology Design and build instructions for Microsoft applications, VMware, or the Symantec products Components of a reference architecture The reference architecture documents are structured in a manner which can be leveraged by each type of stakeholder. Business architecture The business architecture focuses on how the solutions meet business goals. Application architecture The application architecture provides a general overview of the Microsoft applications that are the subject of the three reference architectures: SQL Server, Exchange Server, and SharePoint Server. 7

11 Because these are well-known applications with a large existing collection of documentation detailing all aspects of their architecture and design, the application architecture section provides a higher-level discussion regarding how these products fit into the overall Symantec reference architectures. Technology architecture The core focus of each reference architecture document is the technology architecture, which highlights the attributes considered essential for deploying Microsoft SQL Server, Exchange, or SharePoint, virtualized on VMware as an enterprise-class application. Practical and realworld experience from Symantec subject matter experts provides an understanding of how to design solutions that leverage Symantec products. The technology architecture is organized into conceptual, logical, and physical views. Conceptual view The conceptual view represents the business owner point of view, describing how the solution aligns with business needs. This view is an implementation-independent view of all infrastructure services. The conceptual view provides an abstract or high-level design of only the most important business components and entities; its main goal is to provide an understanding of the overall purpose of the proposed solution in direct relation to business need. Components include major technology systems, relevant business processes, external systems required for integration or overall functionality, high-level data flow, and system functionality. Logical view The logical view represents the designer point of view, identifying the significant components and showing how they fit together to deliver the solution. This view includes realizable elements of the infrastructure, interaction models, principles for use, and product capabilities. The logical view includes a more detailed design for all major components and entities, as well as relationships, data flows, and connections. The target audience is typically developers or other systems architects. The logical view includes business services, application names and capabilities, and other relevant information needed for development purposes, and it intentionally omits physical server names or addresses. Physical view The physical view is the builder view, showing how the solution is created and configured. This includes implementation models, technology patterns, and templates. The physical view has all major components and entities identified within specific physical servers and locations, as well as specific software services, objects, and solutions. This view includes known details such as operating systems, version numbers, and patches that are relevant. Any physical constraints or limitations are also identified within the server components, data flows, or connections. The physical view references resources such as product documentation, white papers, and websites to augment the architecture content. The design presented in the physical view may be included and extended by the final implementation team into an implementation design. Summary of the technical scope The Symantec reference architectures are designed to help businesses transform critical applications from a silo model, in which applications are islands that under-utilize enterprise IT resources, to a virtualized model, in which IT resources are pooled together and shared. In a traditional data center model (illustrated in Figure 2), applications use dedicated infrastructure and a variety of incompatible data replication schemes; clusters typically employ hot standby servers that are under-utilized or not utilized at all; infrastructure and storage 8

12 requirements spiral out of control; and dedicated and intrusive on-host backups take longer to complete while application owners demand smaller and smaller maintenance windows. Figure 2 - Traditional data center model The Symantec reference architecture (illustrated in Figure 3) presents a model to address these problems in each tier of the data center, providing a secure, scalable, and heterogeneous solution. This model enables an enterprise to cost-effectively deploy business-critical applications while employing various measures to curb growing storage and backup requirements, and introduces improved operational efficiencies with a goal of reducing total cost of ownership (TCO) and lowering risk. 9

13 Figure 3 Symantec reference architecture While databases and data-intensive applications have often been considered poor candidates for virtualization due to their heavy I/O demands, complex recovery processes, and high availability requirements, this reference architecture illustrates that these business-critical applications commonly among the most over-provisioned environments in the data center are actually very good candidates for virtualization. Virtualization also enables organizations to respond more quickly to business demands, whether for provisioning new application environments, rolling out applications from development into production, or migrating applications quickly and efficiently to more powerful computers. Visit the Symantec Virtualization microsite, located at for further information about Symantec solutions for virtualization. The next three sections summarize the specific virtualization solutions for Microsoft SQL, SharePoint, and Exchange Servers implemented for the Symantec reference architectures. 10

14 1.8 Microsoft SQL Server Virtualization Reference Architecture Microsoft SQL Server 2008 R2 provides a data platform that delivers a low TCO and is equipped to handle the needs of even the most demanding mission-critical applications. In a fast-evolving business environment, this platform helps enable businesses to quickly adapt to changing requirements, promotes the reliability to maintain highly available service provisioning at scale, and provides a comprehensive range of tools, features, and functionality to increase IT efficiency and reduce management overhead. The platform is tightly integrated with Microsoft s directory services to help enable a secure and scalable security model. A typical configuration for SQL Server in a VMware virtual environment is shown in Figure 4. Figure 4 - Typical SQL Server configuration for VMware In this configuration, an instance of Microsoft SQL Server is running on a Windows guest operating system in a virtual machine. Each instance, running in its own virtual machine, consists of a distinct set of services that have specific settings for collations and other options. The directory structure, registry structure, and service names all reflect the instance name and a specific instance ID created during SQL Server setup. 11

15 This uniquely named instance has a database engine, an agent that handles inbound client connection requests, an analysis service for handling online analytical processing (OLAP) type of requests, and a Filestream agent for keeping track of database objects stored outside of the database in a file system. Each instance includes one or more associated databases a collection of related tables, indexes, and other objects that store and manage access to data records. While it is possible to have multiple instances running on the same Windows guest operating system, this reference architecture maps each instance to its own virtual machine for ease of configuration and management. Figure 5 depicts how the individual SQL Server virtual configurations fit within an example virtualized data center. The management servers are virtualized in this case, but in any particular implementation of the Reference Architecture, management services could be provided using a combination of physical and virtual servers, depending on existing infrastructure and specific requirements of an organization. Figure 5 - SQL Server in a virtual data center The components of the SQL Server solution are summarized below. For complete details, see the Symantec Reference Architecture for Virtualization of Microsoft SQL Server. Storage architecture VMware ESXi presents the storage to the guest operating system either as Virtual Machine Disks (VMDK) or using raw device mapping (RDM). The SQL Server can use both types of storage for database data and log files; however, this reference architecture utilizes RDM devices for optimum I/O performance and scalability. Storage Foundation for Windows is installed on all application virtual machines and all storage is managed from the Veritas Operations Management (VOM) Advanced server. Storage Foundation provides capacity-on-demand, taking full advantages of pool storage resources in a virtual environment. 12

16 High availability and disaster recovery VMware HA manages local failover and live migration of virtual machines. In this example environment, the application virtual machines are configured on a two-node VMware HA cluster, with each node functioning as the failover node in the event an ESXi host becomes unstable or faults. In this case, VMware HA restarts the virtual machines on the remaining cluster node. A Symantec ApplicationHA agent is installed on all application virtual machines to provide application monitoring, because VMware HA has no visibility into the applications running on the guest host. Without ApplicationHA, application failures go undetected. ApplicationHA detects when an application faults and can be configured to restart the application automatically, or signal to VM to restart the virtual machine. The ApplicationHA Console integrates with vcenter Server to provide centralized management of high availability. Veritas Operations Manager integrates with ApplicationHA to manage relationships between applications to ensure that dependent applications are started, stopped, and failed over in a coordinated fashion. Disaster recovery is provided by VMware Site Recovery Manager (SRM). SRM is integrated with data replication technologies to present replicated storage to the correct ESXi servers, enabling virtual machines to be started at different sites. Symantec ApplicationHA integrates with SRM to ensure continuity of application monitoring when a failover has occurred. Data protection The data protection solution for this reference architecture leverages Symantec NetBackup to provide a full spectrum of backup and recovery options, for both VMDK and RDM storage used in this architecture. To protect VMDK storage, NetBackup for VMware provides comprehensive protection for virtual machines by integrating with VMware vstorage APIs for Data Protection (VADP) and VM snapshots. NetBackup uses VMware to take VM snapshots of VMDK storage without any disruption to the running guest operating systems and applications. These snapshots can then be backed up without involving the guest operating system in the data transfer. NetBackup V-Ray technology enables recovery of individual Windows files from a VM backup. The NetBackup client is installed on each virtual machine to receive data during a file-level restore. The NetBackup media and master servers handle data transfer and job management, respectively. Although shown in the diagram as running on a single virtual machine, these servers are often run on existing physical, off-host backup servers to further minimize any impact to the VMs and ESXi host. If SQL Server databases are deployed in VMDK storage, then NetBackup for VMware will include those databases in the VM backup, and optionally manage SQL Server log truncation. Furthermore, NetBackup V-Ray technology can again be used to recover individual databases from the same VM backup. If SQL Server databases are deployed in RDM storage, then the NetBackup for SQL Server agent in the guest provides database backup and recovery, and log truncation management. This approach is necessary because RDM storage is external to VMware, and the contents are not included in VM snapshots. Therefore, RDM data must be backed up via the guest operating system. Alternatively, if the RDM storage is shared storage with an array-based snapshot provider, then the NetBackup media server can directly backup a snapshot of the RDM storage for optimal performance and minimal impact. OpsCenter provides centralized management of data backup and archive operations across products and platforms, and a central portal for all file-level recoveries of both physical and virtual machine backups. Security Symantec Critical System Protection (SCSP) is implemented throughout the virtual data center to provide a both resilient and scalable security infrastructure. SCSP agents are installed on all physical and virtual systems to be protected. Additionally, an SCSP agent is placed 13

17 on the vcenter server to further protect the virtual environment. Both the agents and the management console connect to the management server to exchange data. The management server in turn acts as a liaison to the internal SCSP SQL data store, which is where all policies, configuration data, and event information are stored. Many management servers within a given environment can report to the same internal SQL data store, providing for centralized management and control of systems across the enterprise. This also allows customers flexibility in determining how to distribute their SCSP infrastructure, as both agents and consoles can then connect to any of the available management servers. For network-related security, VMware vshield App resides within the security architecture. vshield protects applications and data in the virtual data center from network-based threats and gives organizations the ability to create and manage business-relevant policies that adapt to dynamic environments. vshield also provides deep visibility into network communications between virtual machines and granular enforcement through security groups. 1.9 Microsoft SharePoint Virtualization Reference Architecture Microsoft SharePoint is a central application platform for common enterprise Web requirements. The multipurpose design of SharePoint enables management, scaling, and provisioning of a broad variety of business applications. SharePoint provides a layer of management and abstraction from the Web server, with the ultimate goal of enabling business users to leverage Web features without having to understand technical aspects of Web development. SharePoint also contains pre-defined applications for commonly requested functionality, such as intranet portals, extranets, websites, document and file management services, collaboration spaces, social tools, enterprise search, and business intelligence. A medium-scale SharePoint farm running in a VMware virtual environment is shown in Figure 6. Figure 6 - Medium SharePoint farm in a virtual environment In this configuration, the SharePoint server roles are spread across eight virtual machines. Two SQL Server databases manage SharePoint content and each run on their own virtual machine, hosted on separate ESXi systems. Certain server roles can be split among virtual machines or combined, as needed. For example, the Application 1 virtual machine can run the Query server while Application 2 runs the Crawl server, with other roles split among the Application 3 and 4 virtual machines. Other virtual machines can be used for Web services, as 14

18 depicted by the Web Front-End 1 and 2 virtual machines. New SharePoint servers can easily be provisioned to expand server farms to accommodate growth and meet performance objectives. Figure 7 depicts how the SharePoint virtual configurations fit within the Symantec virtualization reference architecture for SharePoint. As with the SQL Server solution, the management servers are virtualized in this case, but in any particular implementation of the reference architecture, management services could be provided using a combination of physical and virtual servers, depending on existing infrastructure and specific requirements of an organization. Figure 7 - SharePoint in a virtual data center Depending on an organization s needs, the SharePoint architecture can be customized to meet scalability, performance, and high availability requirements. Because no one single solution suits all environments, Microsoft provides numerous resources and documents, such as the Capacity Planning for Microsoft SharePoint 2010 document, used for planning and deployment of SharePoint For the Symantec reference architecture, a single server farm is implemented. The SharePoint roles, as well as the SQL Servers, are distributed across four virtual machines. The reference architecture components of the SharePoint solution are similar to those used in the SQL Server solution, summarized in Section 1.8. An overview of differences for SharePoint is provided below. For complete details, see the Symantec Reference Architecture for Microsoft SharePoint Architecture Definition document. 15

19 Storage architecture SharePoint uses a SQL Server database to store data; therefore, the storage architecture is essentially the same as the SQL Server Storage Architecture. A key aspect of the storage solution for SharePoint is capacity-on-demand, enabling the easy addition of new content databases to accommodate growth in storage usage. Yet storage planning is still critical for ensuring a successful SharePoint deployment. See the Planning and Architecture for SharePoint Server 2010 article from Microsoft for details. High availability and disaster recovery The high availability and disaster recovery (HA/DR) architecture is similar to SQL Server. Each application virtual machine has an ApplicationHA agent for SharePoint installed. The virtual machines running the SQL Server for SharePoint data have the SQL Server ApplicationHA agent installed as well. ApplicationHA monitors the SharePoint and SQL Server, and automatically takes action if a fault is detected. The Symantec Reference Architecture for Microsoft SharePoint Architecture Definition document focuses on a single farm with a single service application group. Organizations can evolve this design to accommodate a more complex configuration based on experience and the opportunities for change. Data protection The data protection architecture for SharePoint is very similar to the previous one for SQL Server, again leveraging NetBackup to protect VMDK and RDM storage. To protect VMDK storage, NetBackup for VMware is used to backup a VM snapshot, and provides both VM-level and file-level recovery from the same backup. If SharePoint databases reside in VMDK storage, then NetBackup for VMware will include those databases in the VM backup. NetBackup V- Ray technology can be used to recover individual databases and SharePoint content, like documents, calendars, and other granular items from the same VM backup. If SharePoint databases reside in RDM storage, then the NetBackup for SharePoint agent in the guest provides database backup and recovery. This approach is necessary because RDM storage is external to VMware, and the contents are not included in VM snapshots. Alternatively, if the RDM storage is shared storage with an array-based snapshot provider, then the NetBackup media server can directly backup snapshot of the RDM storage for optimal performance and minimal impact. Granular recovery of SharePoint content is supported as well. Archiving and ediscovery The archiving and ediscovery architecture for SharePoint is based on Symantec Enterprise Vault, which enables organizations to store, manage, and discover unstructured information across the enterprise. A standalone software-based solution, Enterprise Vault integrates with SharePoint environments to enable organizations to control the explosive growth of vital business content both inside the enterprise on intranets, and outside of the firewall on extranets or the Internet. Both Discovery Accelerator and the Clearwell ediscovery Platform are integrated with Enterprise Vault to provide ediscovery of SharePoint data, used for compliance with corporate policy and regulatory bodies. 16

20 Security The security architecture for SharePoint is also based on the same technologies as the SQL Server architecture. A Symantec Critical System Protection (SCSP) agent is installed on all physical and virtual systems to be protected. VMware vshield is deployed in the virtual data center to handle network-related security Microsoft Exchange Server Virtualization Reference Architecture Microsoft Exchange Server is the industry-leading collaborative platform for , calendaring, and unified messaging. These services are accessible through personal computer (PC), Web, and mobile devices so employees can stay connected, and have become an increasing important tool for supporting businesses, whether large or small. Microsoft Exchange 2010 is closely aligned with the Microsoft Office suite of products, and provides trusted communication within an organization s domain, enables greater collaboration and improved productivity for employees, and offers the ability reduce storage costs while allowing larger mailbox sizes. An Exchange Server configuration for a virtual environment is shown in Figure 8. Figure 8 - Exchange Server in a virtual data center 17

Veritas Storage Foundation High Availability for Windows by Symantec

Veritas Storage Foundation High Availability for Windows by Symantec Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability

More information

Symantec NetBackup 7.5 for VMware

Symantec NetBackup 7.5 for VMware V-Ray visibility into virtual machine protection Solution Overview: Data Protection Overview There is little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped

More information

Symantec Storage Foundation High Availability for Windows

Symantec Storage Foundation High Availability for Windows Symantec Storage Foundation High Availability for Windows Storage management, high availability and disaster recovery for physical and virtual Windows applications Data Sheet: High Availability Overview

More information

Virtual Machine Protection with Symantec NetBackup 7

Virtual Machine Protection with Symantec NetBackup 7 Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing to embrace the promise of virtualization for

More information

Symantec NetBackup 7.1 What s New and Version Comparison Matrix

Symantec NetBackup 7.1 What s New and Version Comparison Matrix Symantec 7.1 What s New and Version Comparison Matrix Symantec 7 allows customers to standardize backup and recovery operations across physical and virtual environments with fewer resources and less risk

More information

Symantec NetBackup deduplication general deployment guidelines

Symantec NetBackup deduplication general deployment guidelines TECHNICAL BRIEF: SYMANTEC NETBACKUP DEDUPLICATION GENERAL......... DEPLOYMENT............. GUIDELINES.................. Symantec NetBackup deduplication general deployment guidelines Who should read this

More information

Symantec NetBackup 7.5 What s New and Version Comparison Matrix

Symantec NetBackup 7.5 What s New and Version Comparison Matrix Symantec NetBackup 7.5 What s New and Version Comparison Matrix Solution Overview: Data Protection While backup takes many forms, recovery shouldn t. Symantec NetBackup with V-Ray technology is the single

More information

Backup Exec 15: Protecting Microsoft Hyper-V

Backup Exec 15: Protecting Microsoft Hyper-V TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT HYPER-V........................................ Backup Exec 15: Protecting Microsoft Hyper-V Who should read this paper Technical White Papers are

More information

Symantec Backup Exec 2012

Symantec Backup Exec 2012 Better backup for all Data Sheet: Backup and Disaster Recovery Overview is one integrated product that protects virtual and physical environments, simplifies both backup and disaster recovery, and recovers

More information

Consulting Services for Veritas Storage Foundation

Consulting Services for Veritas Storage Foundation Reducing the complexity of enterprise storage management The continued explosive growth in corporate data, combined with the proliferation of disparate storage management tools and technologies, has created

More information

NetBackup for VMware Data Recovery Services to End the Dark Ages of Virtualization

NetBackup for VMware Data Recovery Services to End the Dark Ages of Virtualization NetBackup for VMware Data Recovery Services to End the Dark Ages of Virtualization VADP vstorage APIs for Data Protection Centralized Efficient Off-host LAN free Challenges Dynamic Environment Performance

More information

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation Next Generation Data Protection with Symantec NetBackup 7 Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation White Paper: Next Generation Data Protection with NetBackup

More information

Symantec Backup Exec 2014 Agents and Options

Symantec Backup Exec 2014 Agents and Options Symantec Backup Exec 2014 Agents and Options Data Sheet: Data Protection Overview enhance and extend Backup Exec features, capabilities, and platform support. Whether you need to protect VMware vsphere,

More information

Optimizing the Data Center for Today s State & Local Government

Optimizing the Data Center for Today s State & Local Government WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S STATE...... &.. LOCAL...... GOVERNMENT.......................... Optimizing the Data Center for Today s State & Local Government Who should read this

More information

Symantec NetBackup 7 Clients and Agents

Symantec NetBackup 7 Clients and Agents Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency

More information

Best Practices for Managing Storage in the Most Challenging Environments

Best Practices for Managing Storage in the Most Challenging Environments Best Practices for Managing Storage in the Most Challenging Environments Sanjay Srivastava Senior Product Manager, Symantec The Typical Virtualization Adoption Path Today, 20-25% of server workloads are

More information

Veritas Cluster Server from Symantec

Veritas Cluster Server from Symantec Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

Symantec NetBackup 7.5 Technical Brief

Symantec NetBackup 7.5 Technical Brief TECHNICAL BRIEF: SYMANTEC NETBACKUP 7.5 TECHNICAL BRIEF........................................ Symantec NetBackup 7.5 Technical Brief Who should read this paper This document is intended for backup administrators

More information

Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER

Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER Challenges of Using Traditional High-Availability Solutions Business-critical applications and the systems they

More information

EMC Virtual Infrastructure for Microsoft Applications Data Center Solution

EMC Virtual Infrastructure for Microsoft Applications Data Center Solution EMC Virtual Infrastructure for Microsoft Applications Data Center Solution Enabled by EMC Symmetrix V-Max and Reference Architecture EMC Global Solutions Copyright and Trademark Information Copyright 2009

More information

Backup Exec 15 Agents and Options

Backup Exec 15 Agents and Options DATA PROTECTION Backup Exec 15 Agents and Options Enhance and extend Backup Exec features, capabilities, and platform support Overview enhance and extend Backup Exec features, capabilities, and platform

More information

Symantec Backup Exec 2010

Symantec Backup Exec 2010 Reliable Backup and Recovery Designed for Your Growing Business Overview delivers market leading backup and recovery protection from server to desktop. Easily protect more data while you reduce storage

More information

Archiving, Backup, and Recovery for Complete the Promise of Virtualization

Archiving, Backup, and Recovery for Complete the Promise of Virtualization Archiving, Backup, and Recovery for Complete the Promise of Virtualization Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that

More information

EMC Virtual Infrastructure for Microsoft Applications Data Center Solution

EMC Virtual Infrastructure for Microsoft Applications Data Center Solution EMC Virtual Infrastructure for Microsoft Applications Data Center Solution Enabled by EMC Symmetrix V-Max and Reference Architecture EMC Global Solutions Copyright and Trademark Information Copyright 2009

More information

Redefining Microsoft SQL Server Data Management. PAS Specification

Redefining Microsoft SQL Server Data Management. PAS Specification Redefining Microsoft SQL Server Data Management APRIL Actifio 11, 2013 PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft SQL Server Data Management.... 4 Virtualizing

More information

Confidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA

Confidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA WHITE PAPER: VIRTUALIZE BUSINESS-CRITICAL APPLICATIONS.............. WITH..... CONFIDENCE..................... Confidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA

More information

Cloud Storage Backup for Storage as a Service with AT&T

Cloud Storage Backup for Storage as a Service with AT&T WHITE PAPER: CLOUD STORAGE BACKUP FOR STORAGE AS A SERVICE........ WITH..... AT&T........................... Cloud Storage Backup for Storage as a Service with AT&T Who should read this paper Customers,

More information

Protecting Miscrosoft Hyper-V Environments

Protecting Miscrosoft Hyper-V Environments Protecting Miscrosoft Hyper-V Environments Who should read this paper Technical White Papers are designed to introduce Veritas partners and end users to key technologies and technical concepts that are

More information

Symantec Storage Foundation for Windows

Symantec Storage Foundation for Windows Advanced online storage management Data Sheet: Storage Management Overview Symantec TM Storage Foundation for Windows brings advanced online storage management to Microsoft Windows Server physical and

More information

INSIGHT. Symantec Optimizes Veritas Cluster Server for Use in VMware Environments IDC OPINION IN THIS INSIGHT SITUATION OVERVIEW. Jean S.

INSIGHT. Symantec Optimizes Veritas Cluster Server for Use in VMware Environments IDC OPINION IN THIS INSIGHT SITUATION OVERVIEW. Jean S. INSIGHT Symantec Optimizes Veritas Cluster Server for Use in VMware Environments Jean S. Bozman IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

More information

Optimizing the Data Center for Today s Federal Government

Optimizing the Data Center for Today s Federal Government WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S FEDERAL......... GOVERNMENT............................... Optimizing the Data Center for Today s Federal Government Who should read this paper CIOs,

More information

Backup Exec 2012 Agent for VMware and Hyper-V

Backup Exec 2012 Agent for VMware and Hyper-V Backup Exec 2012 Agent for VMware and Hyper-V Technical Feature Brief change without notice. Copyright 2011 Symantec Corporation. All rights reserved. Symantec, the Symantec logo and Backup Exec are trademarks

More information

Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options

Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware

More information

Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems

Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec

More information

MAKING YOUR VIRTUAL INFRASTUCTURE NON-STOP Making availability efficient with Veritas products

MAKING YOUR VIRTUAL INFRASTUCTURE NON-STOP Making availability efficient with Veritas products TECHNOLOGY REVIEW MAKING YOUR VIRTUAL INFRASTUCTURE NON-STOP Making availability efficient with Veritas products AUGUST 2015 All businesses have a core set of applications and services that are critical

More information

Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide

Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide WHITE Deployment PAPERGuide Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide An Acronis White Paper Copyright Acronis, Inc., 2000 2011 Deployment Guide Table of contents About

More information

Realizing the True Potential of Software-Defined Storage

Realizing the True Potential of Software-Defined Storage Realizing the True Potential of Software-Defined Storage Who should read this paper Technology leaders, architects, and application owners who are looking at transforming their organization s storage infrastructure

More information

Symantec NetBackup 5220

Symantec NetBackup 5220 A single-vendor enterprise backup appliance that installs in minutes Data Sheet: Data Protection Overview is a single-vendor enterprise backup appliance that installs in minutes, with expandable storage

More information

Database Storage Management with Veritas Storage Foundation by Symantec Manageability, availability, and superior performance for databases

Database Storage Management with Veritas Storage Foundation by Symantec Manageability, availability, and superior performance for databases Database Storage Management with Veritas Storage Foundation by Symantec Manageability, availability, and superior performance for databases Solution Brief: Database Storage Management Database Storage

More information

Symantec Enterprise Vault for Microsoft Exchange

Symantec Enterprise Vault for Microsoft Exchange Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry

More information

Symantec NetBackup Snapshots, Continuous Data Protection, and Replication

Symantec NetBackup Snapshots, Continuous Data Protection, and Replication Symantec NetBackup Snapshots, Continuous Data Protection, and Replication Technical Brief: Symantec NetBackup Symantec NetBackup Snapshots, Continuous Data Protection, and Replication Contents Overview...............................................................................................

More information

Backup and Recovery in the Virtual Age. Scott Baker and Bahar Shah

Backup and Recovery in the Virtual Age. Scott Baker and Bahar Shah Backup and Recovery in the Virtual Age Scott Baker and Bahar Shah Trends Symantec V-Ray Server virtualization is the single biggest game-changing trend in IT today Virtual environments are becoming the

More information

Redefining Microsoft Exchange Data Management

Redefining Microsoft Exchange Data Management Redefining Microsoft Exchange Data Management FEBBRUARY, 2013 Actifio PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft Exchange Data Management.... 3 Virtualizing

More information

Symantec Enterprise Vault for Microsoft Exchange

Symantec Enterprise Vault for Microsoft Exchange Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry

More information

Virtualizing Exchange

Virtualizing Exchange Virtualizing Exchange Simplifying and Optimizing Management of Microsoft Exchange Server Using Virtualization Technologies By Anil Desai Microsoft MVP September, 2008 An Alternative to Hosted Exchange

More information

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization. WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read

More information

Evolving Datacenter Architectures

Evolving Datacenter Architectures Technology Insight Paper Evolving Datacenter Architectures HP technologies for Cloud ready IT By Russ Fellows January, 2013 Enabling you to make the best technology decisions Evolving Datacenter Architectures

More information

Data Sheet: Storage Management Veritas Virtual Infrastructure Bringing enterprise-class storage management to virtual server environments

Data Sheet: Storage Management Veritas Virtual Infrastructure Bringing enterprise-class storage management to virtual server environments Bringing enterprise-class storage management to virtual server environments Overview Veritas Virtual Infrastructure delivers the first unified enterprise-class virtualization solution, bringing industry-leading

More information

SYMANTEC NETBACKUP APPLIANCE FAMILY OVERVIEW BROCHURE. When you can do it simply, you can do it all.

SYMANTEC NETBACKUP APPLIANCE FAMILY OVERVIEW BROCHURE. When you can do it simply, you can do it all. SYMANTEC NETBACKUP APPLIANCE FAMILY OVERVIEW BROCHURE When you can do it simply, you can do it all. SYMANTEC NETBACKUP APPLIANCES Symantec understands the shifting needs of the data center and offers NetBackup

More information

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments Unified Information Management for Complex Windows Environments The Explosion of Unstructured Information It is estimated that email, documents, presentations, and other types of unstructured information

More information

Demystifying Virtualization for Small Businesses Executive Brief

Demystifying Virtualization for Small Businesses Executive Brief Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................

More information

Instant Recovery for VMware

Instant Recovery for VMware NETBACKUP 7.6 FEATURE BRIEFING INSTANT RECOVERY FOR VMWARE NetBackup 7.6 Feature Briefing Instant Recovery for VMware Version number: 1.0 Issue date: 2 nd August 2013 This document describes a feature

More information

Confidently Virtualize Business-Critical Applications in Microsoft

Confidently Virtualize Business-Critical Applications in Microsoft Confidently Virtualize Business-Critical Applications in Microsoft Hyper-V with Veritas ApplicationHA Who should read this paper Windows Virtualization IT Architects and IT Director for Windows Server

More information

Veritas InfoScale Availability

Veritas InfoScale Availability Veritas InfoScale Availability Delivers high availability and disaster recovery for your critical applications Overview protects your most important applications from planned and unplanned downtime. InfoScale

More information

Microsoft SMB File Sharing Best Practices Guide

Microsoft SMB File Sharing Best Practices Guide Technical White Paper Microsoft SMB File Sharing Best Practices Guide Tintri VMstore, Microsoft SMB 3.0 Protocol, and VMware 6.x Author: Neil Glick Version 1.0 06/15/2016 @tintri www.tintri.com Contents

More information

Symantec Cluster Server powered by Veritas

Symantec Cluster Server powered by Veritas Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

Benefits of Consolidating and Virtualizing Microsoft Exchange and SharePoint in a Private Cloud Environment

Benefits of Consolidating and Virtualizing Microsoft Exchange and SharePoint in a Private Cloud Environment . The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Benefits of Consolidating and Virtualizing

More information

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery

More information

Symantec NetBackup 5000 Appliance Series

Symantec NetBackup 5000 Appliance Series A turnkey, end-to-end, global deduplication solution for the enterprise. Data Sheet: Data Protection Overview Symantec NetBackup 5000 series offers your organization a content aware, end-to-end, and global

More information

Introduction. Setup of Exchange in a VM. VMware Infrastructure

Introduction. Setup of Exchange in a VM. VMware Infrastructure Introduction VMware Infrastructure is deployed in data centers for deploying mission critical applications. Deployment of Microsoft Exchange is a very important task for the IT staff. Email system is an

More information

Virtualizing Business-Critical Applications with Confidence

Virtualizing Business-Critical Applications with Confidence Virtualizing Business-Critical Applications with Confidence T e c h n i c a l W H I T E P A P E R Challenges Using Traditional High-Availability Solutions Within any business, there are a number of applications

More information

Protecting the Microsoft Data Center with NetBackup 7.6

Protecting the Microsoft Data Center with NetBackup 7.6 Protecting the Microsoft Data Center with NetBackup 7.6 Amit Sinha NetBackup Product Management 1 Major Components of a Microsoft Data Center Software Hardware Servers Disk Tape Networking Server OS Applications

More information

Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email

Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email Harnessing the Power of Virtualization with an Integrated Solution Based on VMware vsphere and VMware Zimbra WHITE

More information

Nutanix Solution Note

Nutanix Solution Note Nutanix Solution Note Version 1.0 April 2015 2 Copyright 2015 Nutanix, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Nutanix is

More information

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication

More information

Die Herausforderung an Backup/Recovery durch das Datenwachstum Wie optimiere ich

Die Herausforderung an Backup/Recovery durch das Datenwachstum Wie optimiere ich Die Herausforderung an Backup/Recovery durch das Datenwachstum Wie optimiere ich meine Datensicherung und hilft mir die Archivierung? Mario Hoffmann Principal Presales Consultant, TC Lead IIG EMEA 1 Current

More information

WHITE PAPER: ENTERPRISE SECURITY. Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions

WHITE PAPER: ENTERPRISE SECURITY. Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server White Paper: Enterprise Security Symantec

More information

Oracle Databases on VMware High Availability

Oracle Databases on VMware High Availability This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware

More information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information Store, Manage, and Discover Critical Business Information Trusted and Proven Email Archiving Symantec Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage,

More information

DESIGN AND IMPLEMENTATION GUIDE EMC DATA PROTECTION OPTION NS FOR VSPEXX PRIVATE CLOUD EMC VSPEX December 2014

DESIGN AND IMPLEMENTATION GUIDE EMC DATA PROTECTION OPTION NS FOR VSPEXX PRIVATE CLOUD EMC VSPEX December 2014 DESIGN AND IMPLEMENTATION GUIDE EMC DATA PROTECTION OPTIONS FOR VSPEX PRIVATE CLOUD EMC VSPEX December 2014 Copyright 2013-2014 EMC Corporation. All rights reserved. Published in USA. Published December,

More information

Symantec NetBackup 7.5 Clients and Agents

Symantec NetBackup 7.5 Clients and Agents Complete protection for your information-driven enterprise Data Sheet: Data Protection Overviewview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to

More information

Dell PowerVault DL2200 & BE 2010 Power Suite. Owen Que. Channel Systems Consultant Dell

Dell PowerVault DL2200 & BE 2010 Power Suite. Owen Que. Channel Systems Consultant Dell Dell PowerVault DL2200 & BE 2010 Power Suite Owen Que Channel Systems Consultant Dell Dell PowerVault DL2200 powered by Symantec Backup Exec 2010 1 Replace Tape with Deduplication Customer Storage Challenge

More information

VERITAS Storage Foundation 4.3 for Windows

VERITAS Storage Foundation 4.3 for Windows DATASHEET VERITAS Storage Foundation 4.3 for Windows Advanced Volume Management Technology for Windows In distributed client/server environments, users demand that databases, mission-critical applications

More information

Veritas NetBackup for Epic Healthcare Protection

Veritas NetBackup for Epic Healthcare Protection Veritas NetBackup for Epic Healthcare Protection Who should read this paper Healthcare information technology practitioners that have or are considering an Epic Electronic Health Record (EHR) solution.

More information

How To Protect Your Cloud From Attack

How To Protect Your Cloud From Attack A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to

More information

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review Accelerate e-discovery and simplify review Overview provides IT/Legal liaisons, investigators, lawyers, paralegals and HR professionals the ability to search, preserve and review information across the

More information

Symantec Backup Exec 2014

Symantec Backup Exec 2014 Symantec Backup Exec 2014 Maxim Tsvetaev Principal Systems Engineer Backup Exec 2014 1 Today s Top Backup and Recovery Challenges Reducing Costs and Complexity Protecting Virtual Machines Meeting Backup

More information

CA Cloud Overview Benefits of the Hyper-V Cloud

CA Cloud Overview Benefits of the Hyper-V Cloud Benefits of the Hyper-V Cloud For more information, please contact: Email: sales@canadianwebhosting.com Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter

More information

EMC Business Continuity for Microsoft SQL Server 2008

EMC Business Continuity for Microsoft SQL Server 2008 EMC Business Continuity for Microsoft SQL Server 2008 Enabled by EMC Celerra Fibre Channel, EMC MirrorView, VMware Site Recovery Manager, and VMware vsphere 4 Reference Architecture Copyright 2009, 2010

More information

Symantec Backup Exec 2012 Licensing Guide

Symantec Backup Exec 2012 Licensing Guide REPORT: SYMANTEC BACKUP EXEC 2012 LICENSING GUIDE........................................ Symantec Backup Exec 2012 Licensing Guide Who should read this paper Use this guide to learn how to license Symantec

More information

WHITE PAPER: DATA PROTECTION. Veritas NetBackup for Microsoft Exchange Server Solution Guide. Bill Roth January 2008

WHITE PAPER: DATA PROTECTION. Veritas NetBackup for Microsoft Exchange Server Solution Guide. Bill Roth January 2008 WHITE PAPER: DATA PROTECTION Veritas NetBackup for Microsoft Exchange Server Solution Guide Bill Roth January 2008 White Paper: Veritas NetBackup for Microsoft Exchange Server Solution Guide Content 1.

More information

EMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise

EMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise EMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise ESSENTIALS Easy-to-use, single volume, single file system architecture Highly scalable with

More information

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the

More information

How To Get A Storage And Data Protection Solution For Virtualization

How To Get A Storage And Data Protection Solution For Virtualization Smart Storage and Modern Data Protection Built for Virtualization Dot Hill Storage Arrays and Veeam Backup & Replication Software offer the winning combination. Veeam and Dot Hill Solutions Introduction

More information

Backup Exec 2012 Agents and Options

Backup Exec 2012 Agents and Options Backup Exec 2012 Agents and Options Markku A Suistola Principal Presales Consultant Backup Exec 2012 Backup Exec 2012 Architecture Overview Understanding the technology workflow 2 Backup Exec 2012 Core

More information

Backup Exec 15: Protecting Microsoft SQL

Backup Exec 15: Protecting Microsoft SQL TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT SQL........................................ Backup Exec 15: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed

More information

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud Blue skies ahead? Yes if you are protected when you move to the cloud. Lately, it seems as if every enterprise

More information

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information Store, Manage, and Discover Critical Business Information Managing millions of mailboxes for thousands of customers worldwide, Enterprise Vault, the industry leader in email and content archiving, enables

More information

Oracle Database Solutions on VMware High Availability. Business Continuance of SAP Solutions on Vmware vsphere

Oracle Database Solutions on VMware High Availability. Business Continuance of SAP Solutions on Vmware vsphere Business Continuance of SAP Solutions on Vmware vsphere This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed

More information

VMware vsphere Data Protection 6.0

VMware vsphere Data Protection 6.0 VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application

More information

Minimize the impact of downtime and disruption. Replace time-consuming manual processes with fast, automated recovery.

Minimize the impact of downtime and disruption. Replace time-consuming manual processes with fast, automated recovery. Protect Against Business Downtime and Disaster with Rapid, Reliable Backup and Recovery Overview Symantec Backup Exec System Recovery 2010 is a simple, cost-effective backup and recovery solution for small

More information

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL

More information

Datacane - When the bits hit the fan!

Datacane - When the bits hit the fan! TECHNICAL BRIEF: DATACANE........................................ Datacane - When the bits hit the fan! Who should read this paper This paper is intended for those who have seen the Symantec Datacane video

More information

Veritas Storage Foundation 4.3 for Windows by Symantec

Veritas Storage Foundation 4.3 for Windows by Symantec Veritas Storage Foundation 4.3 for Windows by Symantec Advanced online volume management technology for Windows Veritas Storage Foundation for Windows brings advanced volume management technology to Windows

More information

Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server

Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server Windows 6.1 February 2014 Symantec Storage Foundation and High Availability Solutions

More information

DATA PROTECTION IN A VIRTUALIZED ENVIRONMENT - ISSUES AND SOLUTIONS

DATA PROTECTION IN A VIRTUALIZED ENVIRONMENT - ISSUES AND SOLUTIONS International Journal of Computer Science Engineering and Information Technology Research Vol.1, Issue.1 (2011) 1-9 TJPRC Pvt. Ltd., DATA PROTECTION IN A VIRTUALIZED ENVIRONMENT - ISSUES AND SOLUTIONS

More information

A Practical Guide to Protecting and. Virtual Environment for Rapid Recovery

A Practical Guide to Protecting and. Virtual Environment for Rapid Recovery A Practical Guide to Protecting and Leveraging Your Virtual Environment for Rapid Recovery TABLE OF CONTENTS PAGE 03 PART 1 Common roadblocks to broadly rolling out virtualization PAGE 05 PART 2 The challenges

More information

Veeam Backup & Replication Enterprise Plus Powered by Cisco UCS: Reliable Data Protection Designed for Virtualized Environments

Veeam Backup & Replication Enterprise Plus Powered by Cisco UCS: Reliable Data Protection Designed for Virtualized Environments Plus Powered by : Reliable Data Protection Designed for Virtualized Environments Solution Brief April 2015 Solution Highlights Extend backup for current Cisco, VMware, and Microsoft Hyper-V virtual machine

More information

Backup Exec 2014: Protecting Microsoft SQL

Backup Exec 2014: Protecting Microsoft SQL TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SQL........................................ Backup Exec 2014: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed

More information

The Benefits of Virtualizing

The Benefits of Virtualizing T E C H N I C A L B R I E F The Benefits of Virtualizing Aciduisismodo Microsoft SQL Dolore Server Eolore in Dionseq Hitachi Storage Uatummy Environments Odolorem Vel Leveraging Microsoft Hyper-V By Heidi

More information