Symantec reference architectures for the virtualization of Microsoft SQL Server, Microsoft SharePoint, and Microsoft Exchange Server
|
|
- Harriet Hamilton
- 8 years ago
- Views:
Transcription
1 WHITE PAPER: ACCELERATING VIRTUALIZATION OF TIER 1 APPLICATIONS Symantec reference architectures for the virtualization of Microsoft SQL Server, Microsoft SharePoint, and Microsoft Exchange Server Who should read this paper C-level IT executives, Database Administrators, and Application Owners
2
3 Content Business overview Goals and objectives Stakeholders and their concerns Role of a reference architecture Principles guiding this architecture Assumptions guiding this architecture Components of a reference architecture Summary of the technical scope Microsoft SQL Server Virtualization Reference Architecture Microsoft SharePoint Virtualization Reference Architecture Microsoft Exchange Server Virtualization Reference Architecture Comprehensive business-critical application environment Technology components Conclusions Appendix A: Test infrastructure
4 Business overview Organizations strive to leverage the benefits of virtualization to help drive down cost, improve business agility through greater consolidation, improve utilization of resources, and benefit from increased automation and efficiency. Today, enterprise businesses commonly deploy virtualization for non-critical environments only, due to the perception of obstacles that prevent further virtualization in the data center. Projects stall when applications are considered too large, too complex, or too high risk to virtualize. To help organizations implement proven and repeatable enterprise-class IT solutions in virtual environments, Symantec has created a series of reference architectures. The focus of the reference architectures is to accelerate the virtualized deployments of Microsoft applications on VMware platforms, enhanced by Symantec software. The reference architectures demonstrate how organizations can meet the demands for application performance, availability, security, and cost, as well as increase the business value and return on investment from Symantec software. Goals and objectives The goal of the Symantec reference architectures is to remove the barriers to virtualization, and provide proven capabilities to help businesses migrate their critical Microsoft applications safely to virtual environments, while managing complexity and risk. Figure 1 - Business transformation 1
5 The reference architectures within this series include: Symantec Reference Architecture for Microsoft SQL Server Symantec Reference Architecture for Microsoft SharePoint Symantec Reference Architecture for Microsoft Exchange Server The documents provide assistance and guidance with the validation, design, and implementation of enterprise-class virtualization of Microsoft applications, leveraging the power of Symantec technology to accelerate the deployment of virtualization. Objectives derived from the goals The major barriers to deployment of virtualized business-critical services common among organizations include: I/O performance Availability and recovery Virtualized server security Cost Operational efficiency These key attributes form the core focus of the business and technical objectives presented in the reference architectures, as detailed in the following series of tables. Optimize I/O performance Objective Provide capacity-on-demand capability for storage. Provide scalable performance. Description Scale to support large multi-terabyte databases without any disruption to critical business services. Support high transaction rates by enabling the data to be load balanced across multiple I/O paths and storage devices, with the ability to increase or decrease bandwidth online. Provide business-critical levels of availability Objective Respond to application-level failures. Respond to virtual machine failures. Respond to server hardware failures. Description Extend the capabilities of VMware to deliver business-critical levels of availability through enhanced monitoring and recovery of failed application components running on a virtual machine. Restart virtual machines when faults are detected. Start the virtual machine on another server if it cannot be restarted successfully. Migrate virtual machines to a different server when a server fault or stability issue is detected. 2
6 Objective Respond to site failures or outages. Enable live migration of running virtual machines. Enable instant recovery of data using snapshots. Enable recovery of individual objects. Ensure I/O path resiliency. Description Integrate with VMware high availability (HA), VMware Site Recovery Manager (SRM) and replication technologies to provide a cost-effective disaster recovery solution. Fully support VMware VMotion technology to enable live migration of servers and minimize planned downtime. Provide instant point-in-time recovery from snapshot copies of the data with ability to roll the database forward using transaction logs to recover quickly from data corruption or loss. Enable granular recovery of SQL Server database objects including user, system, full text catalogs, and file streams while database is online. Deploy multipathing technology to eliminate single points of failure in the I/O data path. Protect critical servers from security threats Objective Protect against network-based security threats. Provide intrusion protection and prevention for virtualized environments. Description Use VMware vshield to enforce firewall security policies that stay with a virtual server even after live migration or site failover, to protect applications from network-based threats. Implement intrusion protection and prevention to further improve the security of virtual machines. Reduce infrastructure costs Objective Use physical resources more efficiently. Reduce the physical server footprint. Provide thin provisioning and storage reclamation. Perform off-host backups and data deduplication. Description Make more efficient use of physical server resources through virtualization, reducing both management and operating costs through consolidation. Reduce physical server footprint through virtualization to reduce IT spending on data center capacity, power and cooling, and to reduce the environmental impact of data center sprawl. Combine thin provisioning with storage reclamation capabilities to achieve cost savings through greater utilization of storage. Enable efficient off-host backups, with data deduplication, to achieve cost savings by reducing storage requirements for offline data retention. 3
7 Improve operations efficiency Objective Deploy or decommission components quickly. Eliminate physical silos. Reduce the risk of application failures impacting other functions. Provide high availability without hot standby servers. Remove complexity from data center failover procedures. Automate operational procedures. Centralize management. Description Enable new applications to be deployed or decommissioned quickly without involving the lengthy processes associated with physical hardware, thereby removing complexity and improving business agility. Eliminate silos, where applications underutilize dedicated resources, through virtualization; resources can be shared, improving business efficiency. Remove the cascading effect of one failing application bringing down another application, or an entire operating system, by limiting each virtual machine to running one application, reducing operational risk. Achieve high availability without requiring hot standby servers, to help realize the cost savings expected through virtualization of business-critical applications. Use VMware SRM to reduce risk and to remove complexity from data center failovers and planned migrations. Automate operational procedures to improve efficiency and reduce risk. Centralize management for an application-centric view of virtual servers, helping to optimize data center assets, scale operations, and centralize visibility and control. Constraints The reference architectures are limited by the constraints described in the table. Constraint Preserve or enhance VMware capabilities Hardware agnostic Compatibility with existing hardware solutions Description VMware capabilities will either be preserved or built upon, but they must not be removed or broken. For example, VMware VMotion and SRM are features that will be used within the solution. Hardware vendor tie-in must be eliminated. Although specific hardware vendors may be recommended or referred to by the reference architecture, the design will not preclude the use of other hardware vendors. This may come with a caveat; for example, if certain features are not available from a particular vendor, those features will be missing in the final solution. Compatibility will be maintained with standard hardware solutions in the virtualization space, such as Vblock and FlexPod. 4
8 Constraint 64-bit architecture Security architecture Assisted site failover Description Solution is for 64-bit Intel or AMD processor architectures only. The security architecture in this release relies upon Symantec Critical System Protection. Due to the design of VMware SRM and its lack of external arbitration services, it will not be possible to fully automate site failover within this architecture. Instead, site failover must be triggered manually, after which the process is automatic. Stakeholders and their concerns A number of stakeholder views have been considered for the creation of the reference architectures, including: Senior IT managers Chief Information Officers Chief Technology Officers The stakeholders consulted for these reference architectures have a range of concerns relating to virtualization, which are summarized in the following table. Stakeholder Abbrev. Summary of Concerns Chief Information and Technology Officers CIO/CTO IT budgets, demonstrable benefits Chief Financial Officer CFO Cost transparency and recovery (chargeback) Chief Security Officer CSO Security and compliance Chief Operations Officer and Database Administrators COO/DBA Performance and scalability, resource and capacity management Application Owners App Cost, time to provision, reliability, performance and scalability IT Infrastructure Operations Ops Cost, time to provision, reliability and availability, performance and scalability, resource and capacity management IT Service Management ITSM Usability, service delivery, visibility, compliance Role of a reference architecture A reference architecture is a framework for defining a solution, including components, relationships between components, and the principles governing the design of the architecture. It provides a set of consistent architecture best practices that can be used by a variety of organizations to design their own solutions for their specific goals. 5
9 The intent of the Symantec reference architectures is to short-cut the design process for organizations interested in virtualizing critical business services. The aim is to reduce or eliminate errors in technology decisions and increase the likelihood of successful implementation of blended Microsoft, VMware, and Symantec solutions in a virtual environment. Using a reference architecture as a guide for designing solutions with similar capabilities enables organizations to derive several benefits, including: Reducing complexity Reducing resources requirements and cost Minimizing design and implementation timeframes While a reference architecture provides a basis for creating real-world solutions, it is not intended as an implementation blueprint. Each organization can apply the principles and goals appropriate for their requirements, and modify design criteria as needed for their purposes. For example, the Symantec reference architectures describe collections of technology, along with the capabilities and configuration options used in the solution. An organization may choose different capabilities or configuration options in their implementations. Principles guiding this architecture The following core principles have been identified to guide the design of the solutions presented in the reference architectures. Business principles Information management decisions are made to provide maximum benefit to the enterprise as a whole. Enterprise operations are maintained in spite of system interruptions. Enterprise operations are performed within the time constraints set by pre-defined service levels. Enterprise processes are automated where appropriate to reduce manual effort. Development of applications used across the enterprise is preferred over the development of similar or duplicative applications which are only provided to a particular organization. Enterprise information management processes comply with all relevant laws, policies, and regulations. The IT organization is responsible for owning and implementing IT processes and infrastructure that enable solutions to meet userdefined requirements for functionality, service levels, cost, and delivery timing. Effectively align expectations with capabilities and costs so that all projects are cost-effective. Efficient and effective solutions have reasonable costs and clear benefits. Data principles Information is central to the successful running of an organization. Data is an asset that has value to the enterprise and is managed accordingly. Data is shared between applications across the enterprise. Data is accessible for users to perform their functions. Each data element has a trustee accountable for data quality. Data is defined consistently throughout the enterprise, and the definitions are understandable and available to all users. Data is protected from unauthorized use and disclosure. In addition to the traditional aspects of national security classification, this includes, but is not limited to, protection of pre-decisional, sensitive, source selection sensitive, and proprietary information. 6
10 Application principles Applications are independent of specific technology choices and therefore can operate on a variety of technology platforms. Applications are easy to use. The underlying technology is transparent to users, so they can concentrate on tasks at hand. Only in response to business needs are changes to applications and technology made. Technology principles Changes to the enterprise information environment are implemented in a timely manner. Technological diversity is controlled to minimize the non-trivial cost of maintaining expertise in and connectivity between multiple processing environments. Software and hardware should conform to defined standards that promote interoperability for data, applications, and technology. Assumptions guiding this architecture The solutions identified in the reference architectures define optimum configurations that ensure VMware, Microsoft, and Symantec technologies work together for maximum combined benefit. They do not seek to optimize a single component within the stack to the detriment of the others. While the reference architectures are targeted to medium and large enterprises deploying business-critical applications with high transaction rates, the scope is limited to single-instance application environments with no database mirroring or availability groups. Minimizing cost of implementation is the highest priority goal of the Reference Architecture. Organizations can expand the scope of a specific implementation of the Symantec reference architecture to include multi-instance applications. The versions of software used in an implementation based on the reference architectures must be equal to, or later than, those versions specified in the physical view of each technical architecture. For example, vsphere 4.1 cannot be used in the solution; VMware version 5.0 software is the minimum requirement. Virtualization is maturing considerably within enterprise class organizations, and accordingly the reference architectures do not aim to cover these areas in detail: Business benefits of virtualization Transition to a cloud technology Design and build instructions for Microsoft applications, VMware, or the Symantec products Components of a reference architecture The reference architecture documents are structured in a manner which can be leveraged by each type of stakeholder. Business architecture The business architecture focuses on how the solutions meet business goals. Application architecture The application architecture provides a general overview of the Microsoft applications that are the subject of the three reference architectures: SQL Server, Exchange Server, and SharePoint Server. 7
11 Because these are well-known applications with a large existing collection of documentation detailing all aspects of their architecture and design, the application architecture section provides a higher-level discussion regarding how these products fit into the overall Symantec reference architectures. Technology architecture The core focus of each reference architecture document is the technology architecture, which highlights the attributes considered essential for deploying Microsoft SQL Server, Exchange, or SharePoint, virtualized on VMware as an enterprise-class application. Practical and realworld experience from Symantec subject matter experts provides an understanding of how to design solutions that leverage Symantec products. The technology architecture is organized into conceptual, logical, and physical views. Conceptual view The conceptual view represents the business owner point of view, describing how the solution aligns with business needs. This view is an implementation-independent view of all infrastructure services. The conceptual view provides an abstract or high-level design of only the most important business components and entities; its main goal is to provide an understanding of the overall purpose of the proposed solution in direct relation to business need. Components include major technology systems, relevant business processes, external systems required for integration or overall functionality, high-level data flow, and system functionality. Logical view The logical view represents the designer point of view, identifying the significant components and showing how they fit together to deliver the solution. This view includes realizable elements of the infrastructure, interaction models, principles for use, and product capabilities. The logical view includes a more detailed design for all major components and entities, as well as relationships, data flows, and connections. The target audience is typically developers or other systems architects. The logical view includes business services, application names and capabilities, and other relevant information needed for development purposes, and it intentionally omits physical server names or addresses. Physical view The physical view is the builder view, showing how the solution is created and configured. This includes implementation models, technology patterns, and templates. The physical view has all major components and entities identified within specific physical servers and locations, as well as specific software services, objects, and solutions. This view includes known details such as operating systems, version numbers, and patches that are relevant. Any physical constraints or limitations are also identified within the server components, data flows, or connections. The physical view references resources such as product documentation, white papers, and websites to augment the architecture content. The design presented in the physical view may be included and extended by the final implementation team into an implementation design. Summary of the technical scope The Symantec reference architectures are designed to help businesses transform critical applications from a silo model, in which applications are islands that under-utilize enterprise IT resources, to a virtualized model, in which IT resources are pooled together and shared. In a traditional data center model (illustrated in Figure 2), applications use dedicated infrastructure and a variety of incompatible data replication schemes; clusters typically employ hot standby servers that are under-utilized or not utilized at all; infrastructure and storage 8
12 requirements spiral out of control; and dedicated and intrusive on-host backups take longer to complete while application owners demand smaller and smaller maintenance windows. Figure 2 - Traditional data center model The Symantec reference architecture (illustrated in Figure 3) presents a model to address these problems in each tier of the data center, providing a secure, scalable, and heterogeneous solution. This model enables an enterprise to cost-effectively deploy business-critical applications while employing various measures to curb growing storage and backup requirements, and introduces improved operational efficiencies with a goal of reducing total cost of ownership (TCO) and lowering risk. 9
13 Figure 3 Symantec reference architecture While databases and data-intensive applications have often been considered poor candidates for virtualization due to their heavy I/O demands, complex recovery processes, and high availability requirements, this reference architecture illustrates that these business-critical applications commonly among the most over-provisioned environments in the data center are actually very good candidates for virtualization. Virtualization also enables organizations to respond more quickly to business demands, whether for provisioning new application environments, rolling out applications from development into production, or migrating applications quickly and efficiently to more powerful computers. Visit the Symantec Virtualization microsite, located at for further information about Symantec solutions for virtualization. The next three sections summarize the specific virtualization solutions for Microsoft SQL, SharePoint, and Exchange Servers implemented for the Symantec reference architectures. 10
14 1.8 Microsoft SQL Server Virtualization Reference Architecture Microsoft SQL Server 2008 R2 provides a data platform that delivers a low TCO and is equipped to handle the needs of even the most demanding mission-critical applications. In a fast-evolving business environment, this platform helps enable businesses to quickly adapt to changing requirements, promotes the reliability to maintain highly available service provisioning at scale, and provides a comprehensive range of tools, features, and functionality to increase IT efficiency and reduce management overhead. The platform is tightly integrated with Microsoft s directory services to help enable a secure and scalable security model. A typical configuration for SQL Server in a VMware virtual environment is shown in Figure 4. Figure 4 - Typical SQL Server configuration for VMware In this configuration, an instance of Microsoft SQL Server is running on a Windows guest operating system in a virtual machine. Each instance, running in its own virtual machine, consists of a distinct set of services that have specific settings for collations and other options. The directory structure, registry structure, and service names all reflect the instance name and a specific instance ID created during SQL Server setup. 11
15 This uniquely named instance has a database engine, an agent that handles inbound client connection requests, an analysis service for handling online analytical processing (OLAP) type of requests, and a Filestream agent for keeping track of database objects stored outside of the database in a file system. Each instance includes one or more associated databases a collection of related tables, indexes, and other objects that store and manage access to data records. While it is possible to have multiple instances running on the same Windows guest operating system, this reference architecture maps each instance to its own virtual machine for ease of configuration and management. Figure 5 depicts how the individual SQL Server virtual configurations fit within an example virtualized data center. The management servers are virtualized in this case, but in any particular implementation of the Reference Architecture, management services could be provided using a combination of physical and virtual servers, depending on existing infrastructure and specific requirements of an organization. Figure 5 - SQL Server in a virtual data center The components of the SQL Server solution are summarized below. For complete details, see the Symantec Reference Architecture for Virtualization of Microsoft SQL Server. Storage architecture VMware ESXi presents the storage to the guest operating system either as Virtual Machine Disks (VMDK) or using raw device mapping (RDM). The SQL Server can use both types of storage for database data and log files; however, this reference architecture utilizes RDM devices for optimum I/O performance and scalability. Storage Foundation for Windows is installed on all application virtual machines and all storage is managed from the Veritas Operations Management (VOM) Advanced server. Storage Foundation provides capacity-on-demand, taking full advantages of pool storage resources in a virtual environment. 12
16 High availability and disaster recovery VMware HA manages local failover and live migration of virtual machines. In this example environment, the application virtual machines are configured on a two-node VMware HA cluster, with each node functioning as the failover node in the event an ESXi host becomes unstable or faults. In this case, VMware HA restarts the virtual machines on the remaining cluster node. A Symantec ApplicationHA agent is installed on all application virtual machines to provide application monitoring, because VMware HA has no visibility into the applications running on the guest host. Without ApplicationHA, application failures go undetected. ApplicationHA detects when an application faults and can be configured to restart the application automatically, or signal to VM to restart the virtual machine. The ApplicationHA Console integrates with vcenter Server to provide centralized management of high availability. Veritas Operations Manager integrates with ApplicationHA to manage relationships between applications to ensure that dependent applications are started, stopped, and failed over in a coordinated fashion. Disaster recovery is provided by VMware Site Recovery Manager (SRM). SRM is integrated with data replication technologies to present replicated storage to the correct ESXi servers, enabling virtual machines to be started at different sites. Symantec ApplicationHA integrates with SRM to ensure continuity of application monitoring when a failover has occurred. Data protection The data protection solution for this reference architecture leverages Symantec NetBackup to provide a full spectrum of backup and recovery options, for both VMDK and RDM storage used in this architecture. To protect VMDK storage, NetBackup for VMware provides comprehensive protection for virtual machines by integrating with VMware vstorage APIs for Data Protection (VADP) and VM snapshots. NetBackup uses VMware to take VM snapshots of VMDK storage without any disruption to the running guest operating systems and applications. These snapshots can then be backed up without involving the guest operating system in the data transfer. NetBackup V-Ray technology enables recovery of individual Windows files from a VM backup. The NetBackup client is installed on each virtual machine to receive data during a file-level restore. The NetBackup media and master servers handle data transfer and job management, respectively. Although shown in the diagram as running on a single virtual machine, these servers are often run on existing physical, off-host backup servers to further minimize any impact to the VMs and ESXi host. If SQL Server databases are deployed in VMDK storage, then NetBackup for VMware will include those databases in the VM backup, and optionally manage SQL Server log truncation. Furthermore, NetBackup V-Ray technology can again be used to recover individual databases from the same VM backup. If SQL Server databases are deployed in RDM storage, then the NetBackup for SQL Server agent in the guest provides database backup and recovery, and log truncation management. This approach is necessary because RDM storage is external to VMware, and the contents are not included in VM snapshots. Therefore, RDM data must be backed up via the guest operating system. Alternatively, if the RDM storage is shared storage with an array-based snapshot provider, then the NetBackup media server can directly backup a snapshot of the RDM storage for optimal performance and minimal impact. OpsCenter provides centralized management of data backup and archive operations across products and platforms, and a central portal for all file-level recoveries of both physical and virtual machine backups. Security Symantec Critical System Protection (SCSP) is implemented throughout the virtual data center to provide a both resilient and scalable security infrastructure. SCSP agents are installed on all physical and virtual systems to be protected. Additionally, an SCSP agent is placed 13
17 on the vcenter server to further protect the virtual environment. Both the agents and the management console connect to the management server to exchange data. The management server in turn acts as a liaison to the internal SCSP SQL data store, which is where all policies, configuration data, and event information are stored. Many management servers within a given environment can report to the same internal SQL data store, providing for centralized management and control of systems across the enterprise. This also allows customers flexibility in determining how to distribute their SCSP infrastructure, as both agents and consoles can then connect to any of the available management servers. For network-related security, VMware vshield App resides within the security architecture. vshield protects applications and data in the virtual data center from network-based threats and gives organizations the ability to create and manage business-relevant policies that adapt to dynamic environments. vshield also provides deep visibility into network communications between virtual machines and granular enforcement through security groups. 1.9 Microsoft SharePoint Virtualization Reference Architecture Microsoft SharePoint is a central application platform for common enterprise Web requirements. The multipurpose design of SharePoint enables management, scaling, and provisioning of a broad variety of business applications. SharePoint provides a layer of management and abstraction from the Web server, with the ultimate goal of enabling business users to leverage Web features without having to understand technical aspects of Web development. SharePoint also contains pre-defined applications for commonly requested functionality, such as intranet portals, extranets, websites, document and file management services, collaboration spaces, social tools, enterprise search, and business intelligence. A medium-scale SharePoint farm running in a VMware virtual environment is shown in Figure 6. Figure 6 - Medium SharePoint farm in a virtual environment In this configuration, the SharePoint server roles are spread across eight virtual machines. Two SQL Server databases manage SharePoint content and each run on their own virtual machine, hosted on separate ESXi systems. Certain server roles can be split among virtual machines or combined, as needed. For example, the Application 1 virtual machine can run the Query server while Application 2 runs the Crawl server, with other roles split among the Application 3 and 4 virtual machines. Other virtual machines can be used for Web services, as 14
18 depicted by the Web Front-End 1 and 2 virtual machines. New SharePoint servers can easily be provisioned to expand server farms to accommodate growth and meet performance objectives. Figure 7 depicts how the SharePoint virtual configurations fit within the Symantec virtualization reference architecture for SharePoint. As with the SQL Server solution, the management servers are virtualized in this case, but in any particular implementation of the reference architecture, management services could be provided using a combination of physical and virtual servers, depending on existing infrastructure and specific requirements of an organization. Figure 7 - SharePoint in a virtual data center Depending on an organization s needs, the SharePoint architecture can be customized to meet scalability, performance, and high availability requirements. Because no one single solution suits all environments, Microsoft provides numerous resources and documents, such as the Capacity Planning for Microsoft SharePoint 2010 document, used for planning and deployment of SharePoint For the Symantec reference architecture, a single server farm is implemented. The SharePoint roles, as well as the SQL Servers, are distributed across four virtual machines. The reference architecture components of the SharePoint solution are similar to those used in the SQL Server solution, summarized in Section 1.8. An overview of differences for SharePoint is provided below. For complete details, see the Symantec Reference Architecture for Microsoft SharePoint Architecture Definition document. 15
19 Storage architecture SharePoint uses a SQL Server database to store data; therefore, the storage architecture is essentially the same as the SQL Server Storage Architecture. A key aspect of the storage solution for SharePoint is capacity-on-demand, enabling the easy addition of new content databases to accommodate growth in storage usage. Yet storage planning is still critical for ensuring a successful SharePoint deployment. See the Planning and Architecture for SharePoint Server 2010 article from Microsoft for details. High availability and disaster recovery The high availability and disaster recovery (HA/DR) architecture is similar to SQL Server. Each application virtual machine has an ApplicationHA agent for SharePoint installed. The virtual machines running the SQL Server for SharePoint data have the SQL Server ApplicationHA agent installed as well. ApplicationHA monitors the SharePoint and SQL Server, and automatically takes action if a fault is detected. The Symantec Reference Architecture for Microsoft SharePoint Architecture Definition document focuses on a single farm with a single service application group. Organizations can evolve this design to accommodate a more complex configuration based on experience and the opportunities for change. Data protection The data protection architecture for SharePoint is very similar to the previous one for SQL Server, again leveraging NetBackup to protect VMDK and RDM storage. To protect VMDK storage, NetBackup for VMware is used to backup a VM snapshot, and provides both VM-level and file-level recovery from the same backup. If SharePoint databases reside in VMDK storage, then NetBackup for VMware will include those databases in the VM backup. NetBackup V- Ray technology can be used to recover individual databases and SharePoint content, like documents, calendars, and other granular items from the same VM backup. If SharePoint databases reside in RDM storage, then the NetBackup for SharePoint agent in the guest provides database backup and recovery. This approach is necessary because RDM storage is external to VMware, and the contents are not included in VM snapshots. Alternatively, if the RDM storage is shared storage with an array-based snapshot provider, then the NetBackup media server can directly backup snapshot of the RDM storage for optimal performance and minimal impact. Granular recovery of SharePoint content is supported as well. Archiving and ediscovery The archiving and ediscovery architecture for SharePoint is based on Symantec Enterprise Vault, which enables organizations to store, manage, and discover unstructured information across the enterprise. A standalone software-based solution, Enterprise Vault integrates with SharePoint environments to enable organizations to control the explosive growth of vital business content both inside the enterprise on intranets, and outside of the firewall on extranets or the Internet. Both Discovery Accelerator and the Clearwell ediscovery Platform are integrated with Enterprise Vault to provide ediscovery of SharePoint data, used for compliance with corporate policy and regulatory bodies. 16
20 Security The security architecture for SharePoint is also based on the same technologies as the SQL Server architecture. A Symantec Critical System Protection (SCSP) agent is installed on all physical and virtual systems to be protected. VMware vshield is deployed in the virtual data center to handle network-related security Microsoft Exchange Server Virtualization Reference Architecture Microsoft Exchange Server is the industry-leading collaborative platform for , calendaring, and unified messaging. These services are accessible through personal computer (PC), Web, and mobile devices so employees can stay connected, and have become an increasing important tool for supporting businesses, whether large or small. Microsoft Exchange 2010 is closely aligned with the Microsoft Office suite of products, and provides trusted communication within an organization s domain, enables greater collaboration and improved productivity for employees, and offers the ability reduce storage costs while allowing larger mailbox sizes. An Exchange Server configuration for a virtual environment is shown in Figure 8. Figure 8 - Exchange Server in a virtual data center 17
Veritas Storage Foundation High Availability for Windows by Symantec
Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability
More informationSymantec NetBackup 7.5 for VMware
V-Ray visibility into virtual machine protection Solution Overview: Data Protection Overview There is little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped
More informationSymantec Storage Foundation High Availability for Windows
Symantec Storage Foundation High Availability for Windows Storage management, high availability and disaster recovery for physical and virtual Windows applications Data Sheet: High Availability Overview
More informationVirtual Machine Protection with Symantec NetBackup 7
Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing to embrace the promise of virtualization for
More informationSymantec NetBackup 7.1 What s New and Version Comparison Matrix
Symantec 7.1 What s New and Version Comparison Matrix Symantec 7 allows customers to standardize backup and recovery operations across physical and virtual environments with fewer resources and less risk
More informationSymantec NetBackup deduplication general deployment guidelines
TECHNICAL BRIEF: SYMANTEC NETBACKUP DEDUPLICATION GENERAL......... DEPLOYMENT............. GUIDELINES.................. Symantec NetBackup deduplication general deployment guidelines Who should read this
More informationSymantec NetBackup 7.5 What s New and Version Comparison Matrix
Symantec NetBackup 7.5 What s New and Version Comparison Matrix Solution Overview: Data Protection While backup takes many forms, recovery shouldn t. Symantec NetBackup with V-Ray technology is the single
More informationBackup Exec 15: Protecting Microsoft Hyper-V
TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT HYPER-V........................................ Backup Exec 15: Protecting Microsoft Hyper-V Who should read this paper Technical White Papers are
More informationSymantec Backup Exec 2012
Better backup for all Data Sheet: Backup and Disaster Recovery Overview is one integrated product that protects virtual and physical environments, simplifies both backup and disaster recovery, and recovers
More informationConsulting Services for Veritas Storage Foundation
Reducing the complexity of enterprise storage management The continued explosive growth in corporate data, combined with the proliferation of disparate storage management tools and technologies, has created
More informationNetBackup for VMware Data Recovery Services to End the Dark Ages of Virtualization
NetBackup for VMware Data Recovery Services to End the Dark Ages of Virtualization VADP vstorage APIs for Data Protection Centralized Efficient Off-host LAN free Challenges Dynamic Environment Performance
More informationMayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation
Next Generation Data Protection with Symantec NetBackup 7 Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation White Paper: Next Generation Data Protection with NetBackup
More informationSymantec Backup Exec 2014 Agents and Options
Symantec Backup Exec 2014 Agents and Options Data Sheet: Data Protection Overview enhance and extend Backup Exec features, capabilities, and platform support. Whether you need to protect VMware vsphere,
More informationOptimizing the Data Center for Today s State & Local Government
WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S STATE...... &.. LOCAL...... GOVERNMENT.......................... Optimizing the Data Center for Today s State & Local Government Who should read this
More informationSymantec NetBackup 7 Clients and Agents
Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency
More informationBest Practices for Managing Storage in the Most Challenging Environments
Best Practices for Managing Storage in the Most Challenging Environments Sanjay Srivastava Senior Product Manager, Symantec The Typical Virtualization Adoption Path Today, 20-25% of server workloads are
More informationVeritas Cluster Server from Symantec
Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster
More informationSymantec NetBackup 7.5 Technical Brief
TECHNICAL BRIEF: SYMANTEC NETBACKUP 7.5 TECHNICAL BRIEF........................................ Symantec NetBackup 7.5 Technical Brief Who should read this paper This document is intended for backup administrators
More informationSymantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER
Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER Challenges of Using Traditional High-Availability Solutions Business-critical applications and the systems they
More informationEMC Virtual Infrastructure for Microsoft Applications Data Center Solution
EMC Virtual Infrastructure for Microsoft Applications Data Center Solution Enabled by EMC Symmetrix V-Max and Reference Architecture EMC Global Solutions Copyright and Trademark Information Copyright 2009
More informationBackup Exec 15 Agents and Options
DATA PROTECTION Backup Exec 15 Agents and Options Enhance and extend Backup Exec features, capabilities, and platform support Overview enhance and extend Backup Exec features, capabilities, and platform
More informationSymantec Backup Exec 2010
Reliable Backup and Recovery Designed for Your Growing Business Overview delivers market leading backup and recovery protection from server to desktop. Easily protect more data while you reduce storage
More informationArchiving, Backup, and Recovery for Complete the Promise of Virtualization
Archiving, Backup, and Recovery for Complete the Promise of Virtualization Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that
More informationEMC Virtual Infrastructure for Microsoft Applications Data Center Solution
EMC Virtual Infrastructure for Microsoft Applications Data Center Solution Enabled by EMC Symmetrix V-Max and Reference Architecture EMC Global Solutions Copyright and Trademark Information Copyright 2009
More informationRedefining Microsoft SQL Server Data Management. PAS Specification
Redefining Microsoft SQL Server Data Management APRIL Actifio 11, 2013 PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft SQL Server Data Management.... 4 Virtualizing
More informationConfidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA
WHITE PAPER: VIRTUALIZE BUSINESS-CRITICAL APPLICATIONS.............. WITH..... CONFIDENCE..................... Confidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA
More informationCloud Storage Backup for Storage as a Service with AT&T
WHITE PAPER: CLOUD STORAGE BACKUP FOR STORAGE AS A SERVICE........ WITH..... AT&T........................... Cloud Storage Backup for Storage as a Service with AT&T Who should read this paper Customers,
More informationProtecting Miscrosoft Hyper-V Environments
Protecting Miscrosoft Hyper-V Environments Who should read this paper Technical White Papers are designed to introduce Veritas partners and end users to key technologies and technical concepts that are
More informationSymantec Storage Foundation for Windows
Advanced online storage management Data Sheet: Storage Management Overview Symantec TM Storage Foundation for Windows brings advanced online storage management to Microsoft Windows Server physical and
More informationINSIGHT. Symantec Optimizes Veritas Cluster Server for Use in VMware Environments IDC OPINION IN THIS INSIGHT SITUATION OVERVIEW. Jean S.
INSIGHT Symantec Optimizes Veritas Cluster Server for Use in VMware Environments Jean S. Bozman IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
More informationOptimizing the Data Center for Today s Federal Government
WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S FEDERAL......... GOVERNMENT............................... Optimizing the Data Center for Today s Federal Government Who should read this paper CIOs,
More informationBackup Exec 2012 Agent for VMware and Hyper-V
Backup Exec 2012 Agent for VMware and Hyper-V Technical Feature Brief change without notice. Copyright 2011 Symantec Corporation. All rights reserved. Symantec, the Symantec logo and Backup Exec are trademarks
More informationMicrosoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options
This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware
More informationOptimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems
Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec
More informationMAKING YOUR VIRTUAL INFRASTUCTURE NON-STOP Making availability efficient with Veritas products
TECHNOLOGY REVIEW MAKING YOUR VIRTUAL INFRASTUCTURE NON-STOP Making availability efficient with Veritas products AUGUST 2015 All businesses have a core set of applications and services that are critical
More informationBusiness Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide
WHITE Deployment PAPERGuide Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide An Acronis White Paper Copyright Acronis, Inc., 2000 2011 Deployment Guide Table of contents About
More informationRealizing the True Potential of Software-Defined Storage
Realizing the True Potential of Software-Defined Storage Who should read this paper Technology leaders, architects, and application owners who are looking at transforming their organization s storage infrastructure
More informationSymantec NetBackup 5220
A single-vendor enterprise backup appliance that installs in minutes Data Sheet: Data Protection Overview is a single-vendor enterprise backup appliance that installs in minutes, with expandable storage
More informationDatabase Storage Management with Veritas Storage Foundation by Symantec Manageability, availability, and superior performance for databases
Database Storage Management with Veritas Storage Foundation by Symantec Manageability, availability, and superior performance for databases Solution Brief: Database Storage Management Database Storage
More informationSymantec Enterprise Vault for Microsoft Exchange
Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry
More informationSymantec NetBackup Snapshots, Continuous Data Protection, and Replication
Symantec NetBackup Snapshots, Continuous Data Protection, and Replication Technical Brief: Symantec NetBackup Symantec NetBackup Snapshots, Continuous Data Protection, and Replication Contents Overview...............................................................................................
More informationBackup and Recovery in the Virtual Age. Scott Baker and Bahar Shah
Backup and Recovery in the Virtual Age Scott Baker and Bahar Shah Trends Symantec V-Ray Server virtualization is the single biggest game-changing trend in IT today Virtual environments are becoming the
More informationRedefining Microsoft Exchange Data Management
Redefining Microsoft Exchange Data Management FEBBRUARY, 2013 Actifio PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft Exchange Data Management.... 3 Virtualizing
More informationSymantec Enterprise Vault for Microsoft Exchange
Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry
More informationVirtualizing Exchange
Virtualizing Exchange Simplifying and Optimizing Management of Microsoft Exchange Server Using Virtualization Technologies By Anil Desai Microsoft MVP September, 2008 An Alternative to Hosted Exchange
More informationCloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.
WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read
More informationEvolving Datacenter Architectures
Technology Insight Paper Evolving Datacenter Architectures HP technologies for Cloud ready IT By Russ Fellows January, 2013 Enabling you to make the best technology decisions Evolving Datacenter Architectures
More informationData Sheet: Storage Management Veritas Virtual Infrastructure Bringing enterprise-class storage management to virtual server environments
Bringing enterprise-class storage management to virtual server environments Overview Veritas Virtual Infrastructure delivers the first unified enterprise-class virtualization solution, bringing industry-leading
More informationSYMANTEC NETBACKUP APPLIANCE FAMILY OVERVIEW BROCHURE. When you can do it simply, you can do it all.
SYMANTEC NETBACKUP APPLIANCE FAMILY OVERVIEW BROCHURE When you can do it simply, you can do it all. SYMANTEC NETBACKUP APPLIANCES Symantec understands the shifting needs of the data center and offers NetBackup
More informationSolution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments
Unified Information Management for Complex Windows Environments The Explosion of Unstructured Information It is estimated that email, documents, presentations, and other types of unstructured information
More informationDemystifying Virtualization for Small Businesses Executive Brief
Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................
More informationInstant Recovery for VMware
NETBACKUP 7.6 FEATURE BRIEFING INSTANT RECOVERY FOR VMWARE NetBackup 7.6 Feature Briefing Instant Recovery for VMware Version number: 1.0 Issue date: 2 nd August 2013 This document describes a feature
More informationConfidently Virtualize Business-Critical Applications in Microsoft
Confidently Virtualize Business-Critical Applications in Microsoft Hyper-V with Veritas ApplicationHA Who should read this paper Windows Virtualization IT Architects and IT Director for Windows Server
More informationVeritas InfoScale Availability
Veritas InfoScale Availability Delivers high availability and disaster recovery for your critical applications Overview protects your most important applications from planned and unplanned downtime. InfoScale
More informationMicrosoft SMB File Sharing Best Practices Guide
Technical White Paper Microsoft SMB File Sharing Best Practices Guide Tintri VMstore, Microsoft SMB 3.0 Protocol, and VMware 6.x Author: Neil Glick Version 1.0 06/15/2016 @tintri www.tintri.com Contents
More informationSymantec Cluster Server powered by Veritas
Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster
More informationBenefits of Consolidating and Virtualizing Microsoft Exchange and SharePoint in a Private Cloud Environment
. The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Benefits of Consolidating and Virtualizing
More informationSolution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware
Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery
More informationSymantec NetBackup 5000 Appliance Series
A turnkey, end-to-end, global deduplication solution for the enterprise. Data Sheet: Data Protection Overview Symantec NetBackup 5000 series offers your organization a content aware, end-to-end, and global
More informationIntroduction. Setup of Exchange in a VM. VMware Infrastructure
Introduction VMware Infrastructure is deployed in data centers for deploying mission critical applications. Deployment of Microsoft Exchange is a very important task for the IT staff. Email system is an
More informationVirtualizing Business-Critical Applications with Confidence
Virtualizing Business-Critical Applications with Confidence T e c h n i c a l W H I T E P A P E R Challenges Using Traditional High-Availability Solutions Within any business, there are a number of applications
More informationProtecting the Microsoft Data Center with NetBackup 7.6
Protecting the Microsoft Data Center with NetBackup 7.6 Amit Sinha NetBackup Product Management 1 Major Components of a Microsoft Data Center Software Hardware Servers Disk Tape Networking Server OS Applications
More informationReducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email
Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email Harnessing the Power of Virtualization with an Integrated Solution Based on VMware vsphere and VMware Zimbra WHITE
More informationNutanix Solution Note
Nutanix Solution Note Version 1.0 April 2015 2 Copyright 2015 Nutanix, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Nutanix is
More informationWindows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology
Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication
More informationDie Herausforderung an Backup/Recovery durch das Datenwachstum Wie optimiere ich
Die Herausforderung an Backup/Recovery durch das Datenwachstum Wie optimiere ich meine Datensicherung und hilft mir die Archivierung? Mario Hoffmann Principal Presales Consultant, TC Lead IIG EMEA 1 Current
More informationWHITE PAPER: ENTERPRISE SECURITY. Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions
WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server White Paper: Enterprise Security Symantec
More informationOracle Databases on VMware High Availability
This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware
More informationData Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Trusted and Proven Email Archiving Symantec Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage,
More informationDESIGN AND IMPLEMENTATION GUIDE EMC DATA PROTECTION OPTION NS FOR VSPEXX PRIVATE CLOUD EMC VSPEX December 2014
DESIGN AND IMPLEMENTATION GUIDE EMC DATA PROTECTION OPTIONS FOR VSPEX PRIVATE CLOUD EMC VSPEX December 2014 Copyright 2013-2014 EMC Corporation. All rights reserved. Published in USA. Published December,
More informationSymantec NetBackup 7.5 Clients and Agents
Complete protection for your information-driven enterprise Data Sheet: Data Protection Overviewview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to
More informationDell PowerVault DL2200 & BE 2010 Power Suite. Owen Que. Channel Systems Consultant Dell
Dell PowerVault DL2200 & BE 2010 Power Suite Owen Que Channel Systems Consultant Dell Dell PowerVault DL2200 powered by Symantec Backup Exec 2010 1 Replace Tape with Deduplication Customer Storage Challenge
More informationVERITAS Storage Foundation 4.3 for Windows
DATASHEET VERITAS Storage Foundation 4.3 for Windows Advanced Volume Management Technology for Windows In distributed client/server environments, users demand that databases, mission-critical applications
More informationVeritas NetBackup for Epic Healthcare Protection
Veritas NetBackup for Epic Healthcare Protection Who should read this paper Healthcare information technology practitioners that have or are considering an Epic Electronic Health Record (EHR) solution.
More informationHow To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
More informationData Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review
Accelerate e-discovery and simplify review Overview provides IT/Legal liaisons, investigators, lawyers, paralegals and HR professionals the ability to search, preserve and review information across the
More informationSymantec Backup Exec 2014
Symantec Backup Exec 2014 Maxim Tsvetaev Principal Systems Engineer Backup Exec 2014 1 Today s Top Backup and Recovery Challenges Reducing Costs and Complexity Protecting Virtual Machines Meeting Backup
More informationCA Cloud Overview Benefits of the Hyper-V Cloud
Benefits of the Hyper-V Cloud For more information, please contact: Email: sales@canadianwebhosting.com Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter
More informationEMC Business Continuity for Microsoft SQL Server 2008
EMC Business Continuity for Microsoft SQL Server 2008 Enabled by EMC Celerra Fibre Channel, EMC MirrorView, VMware Site Recovery Manager, and VMware vsphere 4 Reference Architecture Copyright 2009, 2010
More informationSymantec Backup Exec 2012 Licensing Guide
REPORT: SYMANTEC BACKUP EXEC 2012 LICENSING GUIDE........................................ Symantec Backup Exec 2012 Licensing Guide Who should read this paper Use this guide to learn how to license Symantec
More informationWHITE PAPER: DATA PROTECTION. Veritas NetBackup for Microsoft Exchange Server Solution Guide. Bill Roth January 2008
WHITE PAPER: DATA PROTECTION Veritas NetBackup for Microsoft Exchange Server Solution Guide Bill Roth January 2008 White Paper: Veritas NetBackup for Microsoft Exchange Server Solution Guide Content 1.
More informationEMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise
EMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise ESSENTIALS Easy-to-use, single volume, single file system architecture Highly scalable with
More informationData Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection
The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the
More informationHow To Get A Storage And Data Protection Solution For Virtualization
Smart Storage and Modern Data Protection Built for Virtualization Dot Hill Storage Arrays and Veeam Backup & Replication Software offer the winning combination. Veeam and Dot Hill Solutions Introduction
More informationBackup Exec 2012 Agents and Options
Backup Exec 2012 Agents and Options Markku A Suistola Principal Presales Consultant Backup Exec 2012 Backup Exec 2012 Architecture Overview Understanding the technology workflow 2 Backup Exec 2012 Core
More informationBackup Exec 15: Protecting Microsoft SQL
TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT SQL........................................ Backup Exec 15: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed
More informationPROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud
PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud Blue skies ahead? Yes if you are protected when you move to the cloud. Lately, it seems as if every enterprise
More informationData Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Managing millions of mailboxes for thousands of customers worldwide, Enterprise Vault, the industry leader in email and content archiving, enables
More informationOracle Database Solutions on VMware High Availability. Business Continuance of SAP Solutions on Vmware vsphere
Business Continuance of SAP Solutions on Vmware vsphere This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed
More informationVMware vsphere Data Protection 6.0
VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application
More informationMinimize the impact of downtime and disruption. Replace time-consuming manual processes with fast, automated recovery.
Protect Against Business Downtime and Disaster with Rapid, Reliable Backup and Recovery Overview Symantec Backup Exec System Recovery 2010 is a simple, cost-effective backup and recovery solution for small
More informationEMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
More informationDatacane - When the bits hit the fan!
TECHNICAL BRIEF: DATACANE........................................ Datacane - When the bits hit the fan! Who should read this paper This paper is intended for those who have seen the Symantec Datacane video
More informationVeritas Storage Foundation 4.3 for Windows by Symantec
Veritas Storage Foundation 4.3 for Windows by Symantec Advanced online volume management technology for Windows Veritas Storage Foundation for Windows brings advanced volume management technology to Windows
More informationSymantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server
Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server Windows 6.1 February 2014 Symantec Storage Foundation and High Availability Solutions
More informationDATA PROTECTION IN A VIRTUALIZED ENVIRONMENT - ISSUES AND SOLUTIONS
International Journal of Computer Science Engineering and Information Technology Research Vol.1, Issue.1 (2011) 1-9 TJPRC Pvt. Ltd., DATA PROTECTION IN A VIRTUALIZED ENVIRONMENT - ISSUES AND SOLUTIONS
More informationA Practical Guide to Protecting and. Virtual Environment for Rapid Recovery
A Practical Guide to Protecting and Leveraging Your Virtual Environment for Rapid Recovery TABLE OF CONTENTS PAGE 03 PART 1 Common roadblocks to broadly rolling out virtualization PAGE 05 PART 2 The challenges
More informationVeeam Backup & Replication Enterprise Plus Powered by Cisco UCS: Reliable Data Protection Designed for Virtualized Environments
Plus Powered by : Reliable Data Protection Designed for Virtualized Environments Solution Brief April 2015 Solution Highlights Extend backup for current Cisco, VMware, and Microsoft Hyper-V virtual machine
More informationBackup Exec 2014: Protecting Microsoft SQL
TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SQL........................................ Backup Exec 2014: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed
More informationThe Benefits of Virtualizing
T E C H N I C A L B R I E F The Benefits of Virtualizing Aciduisismodo Microsoft SQL Dolore Server Eolore in Dionseq Hitachi Storage Uatummy Environments Odolorem Vel Leveraging Microsoft Hyper-V By Heidi
More information