InterScan Web Security Virtual Appliance
|
|
|
- Bernard Sanders
- 10 years ago
- Views:
Transcription
1 InterScan Web Security Virtual Appliance Sizing Guide for version 6.0 July 2013 TREND MICRO INC N. De Anza Blvd. Cupertino, CA Toll free: Fax: Phone:
2 Contents Executive Summary... 1 Assumptions and Recommendations... 1 General Sizing Guidelines... 2 Sizing at a Glance Software Appliance (Bare Metal)... 2 Sizing at a Glance Virtual Appliance (VMware ESXi 5.0)... 3 Sizing at a Glance Virtual Appliance (Hyper-V 3.0)... 4 Sizing at a Glance Log query impact... 5 Sizing at a Glance Log entries V.S. Disk size... 5 Sizing at a Glance Reporting... 6 Calculating the Number of IWSVA Servers Required... 6 Step 1: Obtain the Required Data for the Customer Environment... 7 Step 2: Determine the Number of Required Servers... 8 Step 3: Determine the Storage Step 4: Determine the Standalone log server Appendix A How Tests Were Conducted What Configuration Changes do to Sizing Reporting Caching Performance Criteria for Tests Scalability and Accuracy Hardware Tested About Trend Micro Incorporated Copyright 2013 by Trend Micro Incorporated. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the prior written consent of Trend Micro Incorporated. Trend Micro, the t-ball logo, and InterScan are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is provided "as-is" and subject to change without notice. This report is for informational purposes only and is not part of the documentation supporting Trend Micro products. TREND MICRO MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS REPORT. [ETM Part No: SG_SVA_201206US] This document is a product of Trend Micro Technical Sales Solutions. ii
3 Trend Micro InterScan Web Security Virtual Appliance Customer Sizing Guide Executive Summary Trend Micro conducted tests on Trend Micro InterScan Web Security Virtual Appliance v6.0 (IWSVA) to obtain performance-sizing data for customer deployment. Several factors impacts the sizing results for an IWSVA deployment, including: CPU Which scanning features are enabled and what percentage of traffic will be scanned by those features For the latest information about InterScan Web Security Virtual Appliance, including product documentation, server hardware support, and the latest software builds, visit the Trend Micro Web site at: Assumptions and Recommendations Assumptions: The user population is the total number of potential Web users within an organization. The number of active users is the total number of client workstations that are simultaneously requesting HTTP content at any point in time. This is assumed to be 20% of the user population by default. Gigabit network interface cards (NIC) are used throughout the LAN. HTTPS scanning is disabled by default. When measuring the impact of Application Control policies on performance, we assumed 35% of the network traffic to be non-http (e.g. UDP, Skype, bittorrent, etc.) Each active user has in average 3.5 opening HTTP connections to the Internet at any one time. Each Internet access generates in average 5 log events There are three feature set configurations tested: o A basic feature set, including virus scanning, advanced threat scanning, Web reputation, URL filtering, and Anti-Botnet o An advanced feature set, which adds Application Control to the Basic feature set o The advanced feature set with Data Loss Prevention enabled The impact of HTTPS scanning and LDAP authentication is discussed after the performance data from the three configurations are presented. Recommendations: Hardware should meet the minimum requirements specified in the Installation Guide. IWSVA requires having adequate memory to establish TCP connections. If there is not enough memory, system performance will be restricted. In IWSVA v6.0, we recommend the ratio of to the number of CPU Threads shall be larger than the following calculation result: = CPU_Threads_Num x Minimum memory requirement is 4GB. 1
4 Trend Micro InterScan Web Security Virtual Appliance Customer Sizing Guide General Sizing G u i d e l i n e s Administrators can obtain the general sizing on a per-server basis if the specification of the available hardware is known. The sizing below shows the three configurations of enabled features in both Forward Proxy mode and Transparent Bridge mode. Content caching was not used in these tests. IWSVA performance is CPU-bound, and the number of CPU threads will affect performance. For multicore or hyper-threading systems, each CPU thread is considered for the purpose of this sizing guide. A linear increase in allocated CPU GHz does not equate to a linear performance increase. The sizing information in this guide is the absolute maximum the specified hardware configuration can support before the additional latency introduced to average page download times exceeds 2 seconds. The results in the tables below are accurate to within ±5 percent. Sizing at a Glance Software Appliance (Bare Metal) The features including virus scanning, advanced threat scanning, Web reputation, Anti-Botnet and URL filtering are active on an IWSVA 6.0 server in Forward Proxy and Transparent Bridge mode deployment; Tables 1, 2, and 3 provide recommendations for bare-metal software appliance general sizing respectively for the three feature set configurations described in Assumptions and Recommendations: 1. Basic feature set, 2. Basic feature set plus App control, 3. Basic feature set plus App control and DLP. T a b l e 1 IWSVA 6.0 Sizing at a Glance with All Scanning Policies Active and disable Application Control (Only basic feature set) Server Type Dell R210II 1 x Intel Xeon E (4 Cores, 8 Threads) Dell R420 2 x Intel Xeon E (6 Cores, 12 Threads) Dell R720 2 x Intel Xeon E (8 Cores, 16 Threads) Size Concurrent Connections HTTP Transactions per Second Throughput (Mbps) Maximum Total User Population per device 8 GB 7,500 4, Mbps 10, GB 10,000 7, Mbps 15, GB 11,500 8,000 ~1,000 Mbps 16,500 T a b l e 2 IWSVA 6.0 Sizing at a Glance with All Scanning Policies Active and enable Application Control (Basic feature set + App control) Server Type Dell R210II 1 x Intel Xeon E (4 Cores, 8 Threads) Dell R420 2 x Intel Xeon E (6 Cores, 12 Threads) Size Concurrent Connections HTTP Transactions per Second HTTP Throughput (Mbps) Maximum Total User Population per device 8 GB 6,000 3, Mbps 8, GB 9,000 5, Mbps 13,000 2
5 Dell R720 2 x Intel Xeon E (8 Cores, 16 Threads) 24 GB 11,000 7, Mbps 15,000 Table 3 IWSVA 6.0 Sizing at a Glance with All Scanning Policies Active and enable Application Control and DLP (Basic feature set + App control + DLP) Server Type Dell R210II 1 x Intel Xeon E (4 Cores, 8 Threads) Dell R420 2 x Intel Xeon E (6 Cores, 12 Threads) Dell R720 2 x Intel Xeon E (8 Cores, 16 Threads) Size Concurrent Connections HTTP Transactions per Second Throughput (Mbps) Maximum Total User Population per device 8 GB 5,500 3, Mbps 5, GB 8,500 5, Mbps 8, GB 10,500 7, Mbps 13,500 Please refer to Appendix A for the specific hardware configuration of each server type used above. Features and Modes Impact on Performance: The feature with the largest use of system resources is virus scanning, whilst the second is application control. The use of Web reputation, URL filtering, and Anti-Botnet, only modestly lowers system performance and does not significantly decrease the supported user population per server. Transparent bridge mode performance was tested no obvious difference than forward proxy mode performance. For DLP feature, we configured a policy with only a single template (HIPAA compliance). The sizing and capacity numbers in table 1 were reduced by approximately 10%. After enabling LDAP authentication, it will cause nearly 14% drop of sizing capacity number in general. Enabling HTTPS scanning in a network that contains 15% of all traffics, as HTTPS will reduce the performance numbers by approximately 26%. This is normal since HTTPS key negotiation; decryption and re-encryption are CPU-bound activities. Environments with HTTPs scanning requirements should consider to higher level CPU configuration; Sizing at a Glance Virtual Appliance (VMware ESXi 5.0) Table 4 provides the general sizing for virtual appliance deployment in VMware ESXi environment. Table 4 IWSVA 6.0 Sizing at a Glance with All Scanning Policies Active and enable Application Control and DLP (Basic feature set + App control + DLP) 3
6 Server Type Size Concurrent Connections HTTP Transactions per Second Throughput (Mbps) Maximum Total User Population per device VM (2 core) 4 GB 1, Mbps 1,370 VM (4 core) 6 GB 3,250 2, Mbps 2,970 VM (16 core) 16 GB 6,990 4, Mbps 6,300 The performance difference of installing IWSVA on a VMware virtual appliance verses installing IWSVA on a bare metal software appliance server is nearly 10%. The performance degradation under VMware is normal and can be attributable to the VMware OS overhead that is required to manage the Virtual Machines (VMs) and the resources being shared. Sizing at a Glance Virtual Appliance (Hyper-V 3.0) Table 5 provides the general sizing for virtual appliance deployment in Microsoft Windows Server 2012 Hyper-V environment. Table 5 IWSVA 6.0 Sizing at a Glance with All Scanning Policies Active and enable Application Control and DLP (Basic feature set + App control + DLP) Server Type size Concurrent Connections HTTP Transactions per Second Throughput (Mbps) Maximum Total User Population per device VM (2 core) 4 GB 1, Mbps 1,390 VM (4 core) 6 GB 3,200 2, Mbps 2,990 The performance difference of installing IWSVA on a Hyper-V virtual appliance verses installing IWSVA on a bare metal software appliance server (both using 2/4 CPUs and the same amount of memory and disk) is approximately 10%. The performance degradation under Hyper-V is normal and can be attributable to the Hyper-V OS overhead that is required to manage the Virtual Machines (VMs) and the resources being shared. 4
7 Sizing at a Glance Log query impact Log query may need to read large amount of historical data. The data amount decides the system resource usage for the log query. In this log-query testing we tested with the total 2.2-billion log entries and keeping query 1.1-billion log entries to identify the maximum performance impacts. Table 6 IWSVA 6.0 Sizing at a Glance with Log query impact Server Type Dell R210II 1 x Intel Xeon E (4 Cores, 8 Threads) Dell R210II 1 x Intel Xeon E (4 Cores, 8 Threads) With Log query Size Concurrent Connections HTTP Transactions per Second Throughput (Mbps) Maximum Total User Population per device 8 GB GB From the Table 6, large amount of log query will make system performance drop nearly 20%. Log query impact on performance: Querying logs requires the system CPU/ resources. The larger the amount of logs, the higher CPU usage is. The log query does not require much physical memory. It uses Linux cache memory. In average IWSVA completes one-time log queries on 1.1-billion logs in 5 seconds; after completion the CPU/physical used by log query will be freed up. The maximum system performance impact for the log query is 20%. Sizing at a Glance Log entries V.S. Disk size Table 7 provides recommendations for required minimum disk space V.S. Log entries Table 7 IWSVA 6.0 Sizing at a Glance with disk space V.S. Log entries Log Entries Disk Space (GB) Average Disk Space per million log entries (MB) 3,000, GB 206 MB 110,000, GB 103 MB 2,200,000, GB 63 MB 4,400,000, GB 61 MB 5
8 IWSVA6.0 log storage mechanism makes non-linear relation between log entries and disk space. In general, the average disk space required will be reduced with log entries increasing. For simple disk size calculation with respect to log entries, the average disk size is 140MB per million log entries. Sizing at a Glance Reporting If the total log entries is less than 100 million, generating each single report type takes 10 seconds or less. Even selecting all report types the report can be generated in 3 minutes. If the total log entries are greater than 1.1 billion, generating the most of single report type takes 1 minute or less. For the two Top N sites visited and Top N sites by bandwidth report types each takes about 50 minutes or less. We recommend scheduling big reports in system idle hours, such as midnight, to avoid the resource conflict with content scanning functions. Calculating the Number of IWSVA Servers Required This procedure allows administrators to calculate the number of IWSVA servers required for the deployment based on the number of total users in the organization. 6
9 Step 1: Obtain the Required Data for the Customer Environment At a minimum, the following information is required to size a customer environment: User Population Number The following items are recommended to collect either for more accurate sizing: Peak number of concurrent user Peak throughput (Mbps) Caching percentage (if present) Sizing variables are defined in Table 14. Obtain from the customer environment as many of the variables listed in Table 14 as practical and write them down on a worksheet to be used in the calculations or in the Sizing Calculator. To ensure proper sizing, Trend Micro recommends that customers use peak loads (the highest number of active users and peak throughput) when calculating the number of required IWSVA servers. All the calculations are based on performance data from IWSVA 6.0. Table 8 Environment Variables for IWSVA Sizing Name Variable Description Number of Users with Internet Access USER_POPULATION The total number of users with Internet access that will be supported by the IWSVA deployment. Number of Users Accessing the Internet Simultaneously Peak Bandwidth Required Connections per user %_CONCURRENCY THROUGHPUT_TOTAL CONNECTIONS_USER The percentage of the USER_POPULATION who are actively making an internet request (clicking a link in a web browser) If unknown, it is common to choose 20% (0.20) concurrency when sizing. For environments with more active users, increase the concurrency percentage to a value such as 0.33 or higher. (%_CONCURRENCY=0.20) The amount of HTTP traffic passing through the gateway in Megabits per second (Mbps). If unknown, it is common to choose a value of 75% available Internet bandwidth. For example, an organization with a T3 connection would have Mbits per second. For this organization THROUGHPUT_TOTAL = 0.75 x = The number of HTTP connections per active user. If unknown, the default value is 3.5. For environments with users accessing many Web 2.0 sites, increase the number of connections per user to 5 or higher. (CONNECTIONS_USER=3.5). 7
10 Name Variable Description If a caching solution is present, the percentage of caching occurring for the environment is required. Caching percentage %_CACHE If unknown yet caching is present, it is common to choose 25% caching (%_CACHE = 0.25) for the environment. If no caching is present, choose %_CACHE = 0. Maximum log entries per month MAX_LOG_MONTH The maximum log number one month in customer s environment Total maximum log entries MAX_LOG_TOTAL The maximum total log number in customer s environment Number of days to keep logs DAYS_OF_LOG The number of days that log can kept on IWSVA (IWSVA default use 30 day as default value) Number of Internet accesses per user per day NUM_OF_ACCESS An estimated number of one user s accesses to the internet in one day. (If you don t know it, we recommend 1300) Step 2: Determine the Number of Required Servers Identical hardware configuration is assumed for all servers in a multi-server deployment. After calculation, the customer can determine which server type fits their needs the best and use the recommended number of servers for that specific hardware configuration. It is important to note that only one type of server is used for sizing. Do not add the results from the options below; simply choose one of the results for the sizing. Option 1: Number of 2 x 4-core servers (3.3 GHz Intel E3-1240, 8 GB RAM) Using the variables obtained or assumed from Table 8 and LDAP/HTTPs impact ratio, calculate the number of servers required: Number (CONNECTIO _ Servers = NS_USER %_CONCURRE 3,100 NT USER_POPUL ATION) (1 % _ CACHE ) Round up the number of IWSVA servers to the nearest whole number. 8
11 Option 2: Number of 2 x 6-core server (2 x 1.9 GHz Intel E5-2420, 16 GB RAM) Using the variables obtained or assumed from Table 8 and LDAP/HTTPs impact ratio, calculate the number of servers required: Number (CONNECTIO _ Servers = NS_USER %_CONCURRE 5,400 NT USER_POPUL ATION) (1 % _ CACHE ) Option 3: Number of 2 x 8-core server (2 x 2.2 GHz Intel E5-2620, 24 GB RAM) Using the variables obtained or assumed from Table 8 and LDAP/HTTPs impact ratio, calculate the number of servers required: Number (CONNECTIO _ Servers = NS_USER %_CONCURRE 7,500 NT USER_POPUL ATION) (1 % _ CACHE ) Round up the number of IWSVA servers to the nearest integer number. 9
12 IWSVA 6.0 Sizing Example For a deployment with: USER_POPULATION = 10,000 %_CONCURRENT = 0.20 CONNECTIONS_USER = 3.5 %_CACHE = 0.20 THROUGHPUT_TOTAL=180 Megabits per second Who desires sizing using the following existing server configuration: Two CPU (two, dual-core, 3.0 GHz Intel Xeon 5160 CPU s) per server is 4 GB The number of required servers is as follows: = 3. With rounding up, this equals 3.0 For this network, three (3) servers are required to meets their needs to ensure scanning capacity meets environmental conditions. If throughput information is also available, the throughput capabilities of the solution should be compared to the environment needs prior to making a recommendation. Simply compare the THROUGHPUT_TOTAL variable (if available) to the calculated throughput for the recommended solution. The calculated throughput should be greater than the THROUGHPUT_TOTAL variable. If it is not, the number of recommended servers should be adjusted accordingly. Conclusion: For customers using IWSVA version < 6.0, if no need to enable new features and just keep legacy features enable, customers only need to adopt memory = num of CPU threads x If they want to enable new features in IWSVA 6.0, suggest use calculation above to adopt hardware resource. For new customers using IWSVA 6.0, just use calculation above to adopt hardware is enough. 10
13 Step 3: Determine the Storage The administrators can use the information described below to calculate the required disk space for log storage. For storage type, we recommend a fast disk subsystem. (For example, 15K RPM SAS disk in RAID 1+0 configurations) As the number of users and events increases, the DISK_IO will be more and more busy, it becomes more important to use a fast disk subsystem to increase Log performance Dimensions 1: How much disk space is needed if I have XXX log entries? From above sizing about Log entries V.S. Disk size, the average log size is 140MB per million log entries, so we can calculate needed disk size (GB): AX_LOG_TOTAL Disk _ Size ( GB) = M 140 1,000 1,000 1,024 IWSVA 6.0 Storage Sizing Example For a customer with: MAX_LOG_TOTAL = 2,200,000,000 The number of required disk size is as follows: = with rounding up, this equals 301 GB Dimensions 2: How much disk space is needed if I have XXX users? NUM _ OF _ USER NUM _ OF _ ACCESS DAYS _ OF _ LOG Disk _ Size ( GB) = 140 1,000 1,000 1,024 11
14 IWSVA 6.0 Storage Sizing Example For a customer with: USER_POPULATION = 10,000 Following is IWSVA default value: NUM_OF_ACCESS = 6,500 (default) DAYS_OF_LOG = 30 (default) The number of required disk size is as follows: = with rounding up, this equals 267 GB Dimensions 3: How many days of log can be kept on IWSVA? The default value for log days on IWSVA is 30 days. Sometimes user wants to modify the log days on IWSVA to fits the hardware. If the user has known the disk space available for logs and the number of users, then he can get the number of days to keep log on IWSVA by one of the following formulas: Disk _ Size 1,000 1,000 1,024 DAYS _ OF _ LOG = NUM _ OF _ ACCESS NUM _ OF _ USER 140 IWSVA 6.0 Storage Sizing Example For a customer with: USER_POPULATION = 5,000 Disk_Size = 128 (GB) Following is IWSVA default value: NUM_OF_ACCESS = 6,500 (default) LOG_LEVEL = 5 (default) The days of log can be kept is as follows: days = with rounding up, this equals 27 Step 4: Determine the Standalone log server Standalone log server can receive log from multiple IWSVA instances. Using standalone log server can also avoid IWSVA content scanning performance impact induced by log query and report generation operation. 12
15 Trend Micro InterScan Web Security Virtual Appliance Customer Sizing Guide The performance of log server is mainly determined by the handling capacity of log entries generated per day in the environment. The number of log sources registered has negligible impact on performance. Recommended Configuration: l If the log entries are greater than 10 million per day: CPU: 8 Threads MEM: 16GB Disk Size: Please refer to the section Determine the storage If log entries are greater than 1 billion per month, it is recommended to keep only 2-month logs for optimal performance. l If the log entries are less than 3 million per day: CPU: 4 Threads MEM: 8GB Disk Size: Please refer to the section Determine the storage 1. The fast CPU and Disk IO can help on the log handling capacity; the more CPU threads can help query logs and generate reports in parallel. 2. IWSVA as log server can also be installed on a Vmware ESXi virtual environment, and can leverage the VMware s redundancy and fault tolerant features to create a robust and scalable deployment. Appendix A How Tests Were Conducted Product performance was determined based on a workload where each active user accesses 12 Web sites sequentially. This workload was deemed representative of that of an actual enterprise. The range of object sizes (.jpg,.png,.css,.gif, and.js) ranged between 9 and 174 KBytes, with.htm pages ranging between 3 and 143 KBytes. Think time was maintained at 5 seconds, making this a test of moderately aggressive Internet surfing behavior. For the application control s impact for IWSVA 6.0, we use one scenario, which is to use pure HTTP traffic to check application control s impact for features. The ICAP mode deployment with external caching servers in general greatly improves the capacity of the environment by reducing the amount of network communication to the IWSVA server. IWSVA also includes a Web Reputation feature. This feature relies on DNS queries to Trend Micro data centers for each new URL request. Reputations are cached for a period of 35 minutes by default and new reputation requests for that URL are provided without the need for additional queries. This Sizing Guide assumes that the customer environment has sufficient DNS infrastructure to handle the query load that results from deploying one or more IWSVA units. 13
16 What Configuration Changes do to Sizing Configuration changes to IWSVA affect sizing in a number of ways. These impacts are summarized below: Reporting Real-time reports can take a significant amount of time to complete in high-workload environments if there are inadequate amounts of free CPU to process each request. For this reason, it is recommend to create schedule report for non-peak workload periods. Environments requiring efficient real-time reporting during high-workload periods are advised to size their servers for less than 100% CPU utilization to keep the end-user and administrative experiences positive. Alternatively, the standalone log server can be deployed on a separate host/vm to handle all log processing and reporting actions. This frees up the IWSVA instance to dedicate its resources to processing traffic. Using high-performance RAID arrays with fast hard disks will improve performance significantly. Caching Using caching in an environment improves system performance. With a properly sized ICAP 1.0 solution, the capacity of the environment increases proportionally to the cache percentage: A 25-percent cache allows each server to increase capacity by a factor of 1.3. A 50-percent cache allows each server to increase capacity by a factor of 2. A 75-percent cache allows each server to increase capacity by a factor of 4. A 90-percent cache allows each server to increase capacity by a factor of 10. These performance factors are based on an off box external ICAP server. Performance Criteria for Tests Trend Micro conducted the tests with the requirement that all test results and sizing recommendations meet the following conditions: Hosts and servers have zero TCP Connection failures Hosts and servers have zero HTTP Transaction failures Hosts must experience an average page load time of no more than 2000ms (2 seconds) Although the IWSVA servers can provide more connections and transactions than listed in the sizing tables, the page load latency will be above 2 seconds and will not reflect real-world expectations where users expect faster Internet response times. Scalability and Accuracy The performance ability of IWSVA depends on the quantity and type of CPU being used and also the feature sets enabled. Higher MHZ and more CPU can bring better performance results.. However, when the Application Control feature is enabled, performance increases flatten out above 12 CPU cores. Since 12 cores can support up to 12,000 users in a single IWSVA instance, it is unlikely that a customer would have more than that many users traffic flowing through a single instance. Segmenting the network to have Internet traffic from separate sub-nets flowing to multiple concurrent IWSVA instances is one way to address this potential scalability issue. The testing procedure and methodology used in this report is accurate, reproducible and well documented. The results are precise by ±5 percent. 14
17 Hardware Tested Tables provide details of the hardware used in this Sizing Guide. Table 9 4 thread Server Component Type Chassis CPU CPU Speed Cores per CPU Threads per cores Number of physical CPU Total Threads Storage Network Value Dell R210II Intel Xeon Processor E GHz GB SATA SSD, SAS Broadcom BCM 5716 Table thread Server Component Type Chassis CPU CPU Speed Cores per CPU Threads per cores Number of physical CPU Total Threads Storage Network Value Dell R420 Intel Xeon Processor E GHz GB SAS SSD, SATA SSD, SAS Broadcom NetXtreme 5709c Table thread Server Component Type Chassis CPU CPU Speed (Total Allocated) Cores per CPU Threads per cores Number of physical CPU Total Threads Storage Network Value Dell R720 Intel Xeon Processor E GHz GB SAS SSD, SATA SSD, SAS Broadcom BMC5709C 15
18 Glossary Active Users The number of actual users requesting Web content through an HTTP Web browser (such as Microsoft Internet Explorer) at any time. Connection Latency The amount of time between the user s first click in a Web browser until the time data begins appearing on the screen. Default Configuration The default configuration of IWSVA is with antivirus, Web-reputation, URL filtering, and Anti-Botnet (enabled in IWSVA 6.0 by default) active. HTTP 1.1 Connection A method that enables the use of one connection to send or receive multiple HTTP requests or responses. HTTP 1.1 allows multiple requests to be made through a single connection. Requests per second The rate at which HTTP objects (for example.jpg,.gif or.html files) are requested and processed. Think Time The time between browser clicks for an active user. Throughput The amount of digital data per time unit that is delivered over a physical or logical link, or that is passing through a gateway scanning device. This is expressed as either Bytes per second or bits per second (8 bits = 1 Byte). Total Page Download Latency The average total time to download a workload-specific Web site after initial connection. User Population The total number of users with Internet access to be supported by the IWSVA deployment. About Trend Micro Incorporated Trend Micro Incorporated, a global leader in Internet content security, focuses on securing the exchange of digital information for businesses and consumers. A pioneer and industry vanguard, Trend Micro is advancing integrated threat management technology to protect operational continuity, personal information, and property from malware, spam, data leaks and the newest Web threats. Trend Micro s flexible solutions, available in multiple form factors, are supported 24/7 by threat intelligence experts around the globe. A transnational company, with headquarters in Tokyo, Trend Micro s trusted security solutions are sold through its business partners worldwide. For more information, please visit 16
T E C H N I C A L S A L E S S O L U T I O N
Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com
Oracle Database Scalability in VMware ESX VMware ESX 3.5
Performance Study Oracle Database Scalability in VMware ESX VMware ESX 3.5 Database applications running on individual physical servers represent a large consolidation opportunity. However enterprises
DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION
DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION A DIABLO WHITE PAPER AUGUST 2014 Ricky Trigalo Director of Business Development Virtualization, Diablo Technologies
Performance Characteristics of VMFS and RDM VMware ESX Server 3.0.1
Performance Study Performance Characteristics of and RDM VMware ESX Server 3.0.1 VMware ESX Server offers three choices for managing disk access in a virtual machine VMware Virtual Machine File System
W H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers
W H I T E P A P E R : T E C H N I C A L Understanding and Configuring Symantec Endpoint Protection Group Update Providers Martial Richard, Technical Field Enablement Manager Table of Contents Content Introduction...
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
Superior protection from Internet threats and control over unsafe web usage
datasheet Trend Micro interscan web security Superior protection from Internet threats and control over unsafe web usage Traditional secure web gateway solutions that rely on periodic updates to cyber
How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)
Scalability Results Select the right hardware configuration for your organization to optimize performance Table of Contents Introduction... 1 Scalability... 2 Definition... 2 CPU and Memory Usage... 2
Optimizing SQL Server Storage Performance with the PowerEdge R720
Optimizing SQL Server Storage Performance with the PowerEdge R720 Choosing the best storage solution for optimal database performance Luis Acosta Solutions Performance Analysis Group Joe Noyola Advanced
Microsoft Dynamics NAV 2013 R2 Sizing Guidelines for On-Premises Single Tenant Deployments
Microsoft Dynamics NAV 2013 R2 Sizing Guidelines for On-Premises Single Tenant Deployments July 2014 White Paper Page 1 Contents 3 Sizing Recommendations Summary 3 Workloads used in the tests 3 Transactional
Initial Hardware Estimation Guidelines. AgilePoint BPMS v5.0 SP1
Initial Hardware Estimation Guidelines Document Revision r5.2.3 November 2011 Contents 2 Contents Preface...3 Disclaimer of Warranty...3 Copyright...3 Trademarks...3 Government Rights Legend...3 Virus-free
F-Secure Internet Gatekeeper Virtual Appliance
F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4
Delphi 2015 SP1-AP1 System Requirements
Delphi 2015 SP1-AP1 System Requirements Revision 1.2 Newmarket International Inc. July 24,2015 newmarketinc.com Copyright 2015 Newmarket International, Inc., an Amadeus company. All rights reserved. This
ACANO SOLUTION VIRTUALIZED DEPLOYMENTS. White Paper. Simon Evans, Acano Chief Scientist
ACANO SOLUTION VIRTUALIZED DEPLOYMENTS White Paper Simon Evans, Acano Chief Scientist Updated April 2015 CONTENTS Introduction... 3 Host Requirements... 5 Sizing a VM... 6 Call Bridge VM... 7 Acano Edge
Performance Test Report: Novell iprint Appliance 1.1
White Paper File and Networking Services Performance Test Report: Novell iprint Appliance. Table of Contents page Executive Summary.... Introduction.... Overview... 3. Configurable Test Variables...3 4.
Reference Architecture for a Virtualized SharePoint 2010 Document Management Solution A Dell Technical White Paper
Dell EqualLogic Best Practices Series Reference Architecture for a Virtualized SharePoint 2010 Document Management Solution A Dell Technical White Paper Storage Infrastructure and Solutions Engineering
DELL. Virtual Desktop Infrastructure Study END-TO-END COMPUTING. Dell Enterprise Solutions Engineering
DELL Virtual Desktop Infrastructure Study END-TO-END COMPUTING Dell Enterprise Solutions Engineering 1 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL
HP SN1000E 16 Gb Fibre Channel HBA Evaluation
HP SN1000E 16 Gb Fibre Channel HBA Evaluation Evaluation report prepared under contract with Emulex Executive Summary The computing industry is experiencing an increasing demand for storage performance
Technical Paper. Moving SAS Applications from a Physical to a Virtual VMware Environment
Technical Paper Moving SAS Applications from a Physical to a Virtual VMware Environment Release Information Content Version: April 2015. Trademarks and Patents SAS Institute Inc., SAS Campus Drive, Cary,
Outline. Introduction Virtualization Platform - Hypervisor High-level NAS Functions Applications Supported NAS models
1 2 Outline Introduction Virtualization Platform - Hypervisor High-level NAS Functions Applications Supported NAS models 3 Introduction What is Virtualization Station? Allows users to create and operate
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
Benchmarking Hadoop & HBase on Violin
Technical White Paper Report Technical Report Benchmarking Hadoop & HBase on Violin Harnessing Big Data Analytics at the Speed of Memory Version 1.0 Abstract The purpose of benchmarking is to show advantages
Remote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
Kronos Workforce Central on VMware Virtual Infrastructure
Kronos Workforce Central on VMware Virtual Infrastructure June 2010 VALIDATION TEST REPORT Legal Notice 2010 VMware, Inc., Kronos Incorporated. All rights reserved. VMware is a registered trademark or
Dragon NaturallySpeaking and citrix. A White Paper from Nuance Communications March 2009
Dragon NaturallySpeaking and citrix A White Paper from Nuance Communications March 2009 Introduction As the number of deployed enterprise applications increases, organizations are seeking solutions that
8Gb Fibre Channel Adapter of Choice in Microsoft Hyper-V Environments
8Gb Fibre Channel Adapter of Choice in Microsoft Hyper-V Environments QLogic 8Gb Adapter Outperforms Emulex QLogic Offers Best Performance and Scalability in Hyper-V Environments Key Findings The QLogic
SanDisk SSD Boot Storm Testing for Virtual Desktop Infrastructure (VDI)
WHITE PAPER SanDisk SSD Boot Storm Testing for Virtual Desktop Infrastructure (VDI) August 214 951 SanDisk Drive, Milpitas, CA 9535 214 SanDIsk Corporation. All rights reserved www.sandisk.com 2 Table
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server
Using VMware VMotion with Oracle Database and EMC CLARiiON Storage Systems
Using VMware VMotion with Oracle Database and EMC CLARiiON Storage Systems Applied Technology Abstract By migrating VMware virtual machines from one physical environment to another, VMware VMotion can
SQL Server Business Intelligence on HP ProLiant DL785 Server
SQL Server Business Intelligence on HP ProLiant DL785 Server By Ajay Goyal www.scalabilityexperts.com Mike Fitzner Hewlett Packard www.hp.com Recommendations presented in this document should be thoroughly
DEPLOYMENT GUIDE. Websense Enterprise Websense Web Security Suite TM. v6.3.1
DEPLOYMENT GUIDE Websense Enterprise Websense Web Security Suite TM v6.3.1 1996 2009, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published June 13, 2007 Printed
Cloud Storage. Parallels. Performance Benchmark Results. White Paper. www.parallels.com
Parallels Cloud Storage White Paper Performance Benchmark Results www.parallels.com Table of Contents Executive Summary... 3 Architecture Overview... 3 Key Features... 4 No Special Hardware Requirements...
An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide
Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide An Oracle White Paper July 2011 1 Disclaimer The following is intended to outline our general product direction.
Netsweeper Whitepaper
Netsweeper Inc. Corporate Headquarters 104 Dawson Road Suite 100 Guelph, ON, Canada N1H 1A7 CANADA T: +1 (519) 826 5222 F: +1 (519) 826 5228 Netsweeper Whitepaper Deploying Netsweeper Internet Content
Dell Virtualization Solution for Microsoft SQL Server 2012 using PowerEdge R820
Dell Virtualization Solution for Microsoft SQL Server 2012 using PowerEdge R820 This white paper discusses the SQL server workload consolidation capabilities of Dell PowerEdge R820 using Virtualization.
Virtual Desktops Security Test Report
Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
SECURE Web Gateway Sizing Guide
Technical Guide Version 02 26/02/2015 Contents Introduction... 3 Overview... 3 Example one... 4 Example two... 4 Maximum throughput... 4 Gateway Reporter... 4 Gateway Reporter server specification... 5
Virtual Web Appliance Setup Guide
Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing
MS Exchange Server Acceleration
White Paper MS Exchange Server Acceleration Using virtualization to dramatically maximize user experience for Microsoft Exchange Server Allon Cohen, PhD Scott Harlin OCZ Storage Solutions, Inc. A Toshiba
Performance Evaluation of VMXNET3 Virtual Network Device VMware vsphere 4 build 164009
Performance Study Performance Evaluation of VMXNET3 Virtual Network Device VMware vsphere 4 build 164009 Introduction With more and more mission critical networking intensive workloads being virtualized
http://downloadcenter.trendmicro.com/
Trend Micro Incorporated reserves the right to make changes to this document and to the product/service described herein without notice. Before installing and using the product/service, review the readme
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
Accelerating Microsoft Exchange Servers with I/O Caching
Accelerating Microsoft Exchange Servers with I/O Caching QLogic FabricCache Caching Technology Designed for High-Performance Microsoft Exchange Servers Key Findings The QLogic FabricCache 10000 Series
VMware Virtual SAN Backup Using VMware vsphere Data Protection Advanced SEPTEMBER 2014
VMware SAN Backup Using VMware vsphere Data Protection Advanced SEPTEMBER 2014 VMware SAN Backup Using VMware vsphere Table of Contents Introduction.... 3 vsphere Architectural Overview... 4 SAN Backup
Muse Server Sizing. 18 June 2012. Document Version 0.0.1.9 Muse 2.7.0.0
Muse Server Sizing 18 June 2012 Document Version 0.0.1.9 Muse 2.7.0.0 Notice No part of this publication may be reproduced stored in a retrieval system, or transmitted, in any form or by any means, without
Maximizing SQL Server Virtualization Performance
Maximizing SQL Server Virtualization Performance Michael Otey Senior Technical Director Windows IT Pro SQL Server Pro 1 What this presentation covers Host configuration guidelines CPU, RAM, networking
Cloud Optimize Your IT
Cloud Optimize Your IT Windows Server 2012 The information contained in this presentation relates to a pre-release product which may be substantially modified before it is commercially released. This pre-release
An Oracle Technical White Paper January 2014. How to Configure the Trend Micro IWSA Virus Scanner for the Oracle ZFS Storage Appliance
An Oracle Technical White Paper January 2014 How to Configure the Trend Micro IWSA Virus Scanner for the Oracle ZFS Storage Appliance Table of Contents Introduction... 2 How VSCAN Works... 3 Installing
WanVelocity. WAN Optimization & Acceleration
WanVelocity D A T A S H E E T WAN Optimization & Acceleration WanVelocity significantly accelerates applications while reducing bandwidth costs using a combination of application acceleration, network
VDI Without Compromise with SimpliVity OmniStack and Citrix XenDesktop
VDI Without Compromise with SimpliVity OmniStack and Citrix XenDesktop Page 1 of 11 Introduction Virtual Desktop Infrastructure (VDI) provides customers with a more consistent end-user experience and excellent
msuite5 & mdesign Installation Prerequisites
CommonTime Limited msuite5 & mdesign Installation Prerequisites Administration considerations prior to installing msuite5 and mdesign. 7/7/2011 Version 2.4 Overview... 1 msuite version... 1 SQL credentials...
Video Surveillance Storage and Verint Nextiva NetApp Video Surveillance Storage Solution
Technical Report Video Surveillance Storage and Verint Nextiva NetApp Video Surveillance Storage Solution Joel W. King, NetApp September 2012 TR-4110 TABLE OF CONTENTS 1 Executive Summary... 3 1.1 Overview...
Sage SalesLogix White Paper. Sage SalesLogix v8.0 Performance Testing
White Paper Table of Contents Table of Contents... 1 Summary... 2 Client Performance Recommendations... 2 Test Environments... 2 Web Server (TLWEBPERF02)... 2 SQL Server (TLPERFDB01)... 3 Client Machine
Benchmarking Cassandra on Violin
Technical White Paper Report Technical Report Benchmarking Cassandra on Violin Accelerating Cassandra Performance and Reducing Read Latency With Violin Memory Flash-based Storage Arrays Version 1.0 Abstract
Virtuoso and Database Scalability
Virtuoso and Database Scalability By Orri Erling Table of Contents Abstract Metrics Results Transaction Throughput Initializing 40 warehouses Serial Read Test Conditions Analysis Working Set Effect of
Performance and scalability of a large OLTP workload
Performance and scalability of a large OLTP workload ii Performance and scalability of a large OLTP workload Contents Performance and scalability of a large OLTP workload with DB2 9 for System z on Linux..............
The MAX5 Advantage: Clients Benefit running Microsoft SQL Server Data Warehouse (Workloads) on IBM BladeCenter HX5 with IBM MAX5.
Performance benefit of MAX5 for databases The MAX5 Advantage: Clients Benefit running Microsoft SQL Server Data Warehouse (Workloads) on IBM BladeCenter HX5 with IBM MAX5 Vinay Kulkarni Kent Swalin IBM
Best Practices for Deploying SSDs in a Microsoft SQL Server 2008 OLTP Environment with Dell EqualLogic PS-Series Arrays
Best Practices for Deploying SSDs in a Microsoft SQL Server 2008 OLTP Environment with Dell EqualLogic PS-Series Arrays Database Solutions Engineering By Murali Krishnan.K Dell Product Group October 2009
Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide. An Oracle White Paper October 2010
Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide An Oracle White Paper October 2010 Disclaimer The following is intended to outline our general product direction.
PANO MANAGER CONNECTOR FOR SCVMM& HYPER-V
PANO MANAGER CONNECTOR FOR SCVMM& HYPER-V Version 6.0.8 Published: DEC-2013 Updated: 24 MAR 2014 2005-2014 Propalms Ltd. All rights reserved. The information contained in this document represents the current
StarWind iscsi SAN: Configuring Global Deduplication May 2012
StarWind iscsi SAN: Configuring Global Deduplication May 2012 TRADEMARKS StarWind, StarWind Software, and the StarWind and StarWind Software logos are trademarks of StarWind Software that may be registered
System Requirements. SuccessMaker 5
System Requirements SuccessMaker 5 System requirements are subject to change. For the latest information on system requirements, go to support.pearsonschool.com. For more information about Digital Learning
Proof of Concept Guide
Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the
Delphi+ System Requirements
Delphi+ System Requirements Revision 1.1 Newmarket International, Inc. October 24, 2013 Delphi+ System Requirements Users Up to 15 Up to 25 Up to 50 Up to 90 Up to 200 Over 200 Minimum 2008 Server Hardware
Virtualization of the MS Exchange Server Environment
MS Exchange Server Acceleration Maximizing Users in a Virtualized Environment with Flash-Powered Consolidation Allon Cohen, PhD OCZ Technology Group Introduction Microsoft (MS) Exchange Server is one of
Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools
Terminal Server Software and Hardware Requirements Datacolor Match Pigment Datacolor Tools January 21, 2011 Page 1 of 8 Introduction This document will provide preliminary information about the both the
Red Hat enterprise virtualization 3.0 feature comparison
Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware
Oracle Hyperion Financial Management Virtualization Whitepaper
Oracle Hyperion Financial Management Virtualization Whitepaper Oracle Hyperion Financial Management Virtualization Whitepaper TABLE OF CONTENTS Overview... 3 Benefits... 4 HFM Virtualization testing...
Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60
Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60 rev2.1, January 2006 Pre-Installation Guide Notice 2006 SurfControl. All rights reserved. SurfControl, SurfControl E-mail Filter, SurfControl
Virtual Managment Appliance Setup Guide
Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy
Deploying F5 BIG-IP Virtual Editions in a Hyper-Converged Infrastructure
Deploying F5 BIG-IP Virtual Editions in a Hyper-Converged Infrastructure Justin Venezia Senior Solution Architect Paul Pindell Senior Solution Architect Contents The Challenge 3 What is a hyper-converged
System Requirements and Server Configuration
Hardware Requirements for C Series, page 1 Open Virtualization Files, page 2 VMware Hosting, page 2 Software, page 2 Side A Server Component Configurations, page 5 Side B Server Component Configurations,
Accelerating Server Storage Performance on Lenovo ThinkServer
Accelerating Server Storage Performance on Lenovo ThinkServer Lenovo Enterprise Product Group April 214 Copyright Lenovo 214 LENOVO PROVIDES THIS PUBLICATION AS IS WITHOUT WARRANTY OF ANY KIND, EITHER
Symantec AntiVirus Enterprise Edition
Symantec AntiVirus Enterprise Edition Comprehensive threat protection for every network tier, including client-based spyware prot e c t i o n, in a single product suite Overview Symantec AntiVirus Enterprise
Express5800 Scalable Enterprise Server Reference Architecture. For NEC PCIe SSD Appliance for Microsoft SQL Server
Express5800 Scalable Enterprise Server Reference Architecture For NEC PCIe SSD Appliance for Microsoft SQL Server An appliance that significantly improves performance of enterprise systems and large-scale
Dell Virtual Remote Desktop Reference Architecture. Technical White Paper Version 1.0
Dell Virtual Remote Desktop Reference Architecture Technical White Paper Version 1.0 July 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.
Tableau Server 7.0 scalability
Tableau Server 7.0 scalability February 2012 p2 Executive summary In January 2012, we performed scalability tests on Tableau Server to help our customers plan for large deployments. We tested three different
Tuning Tableau Server for High Performance
Tuning Tableau Server for High Performance I wanna go fast PRESENT ED BY Francois Ajenstat Alan Doerhoefer Daniel Meyer Agenda What are the things that can impact performance? Tips and tricks to improve
Cisco Prime Home 5.0 Minimum System Requirements (Standalone and High Availability)
White Paper Cisco Prime Home 5.0 Minimum System Requirements (Standalone and High Availability) White Paper July, 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public
An Oracle White Paper December 2011. Oracle Virtual Desktop Infrastructure: A Design Proposal for Hosted Virtual Desktops
An Oracle White Paper December 2011 Oracle Virtual Desktop Infrastructure: A Design Proposal for Hosted Virtual Desktops Introduction... 2! Design Goals... 3! Architectural Overview... 5! Logical Architecture...
IT Business Management System Requirements Guide
IT Business Management System Requirements Guide IT Business Management 8.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer [email protected] Agenda Session Length:
Microsoft Exchange Solutions on VMware
Design and Sizing Examples: Microsoft Exchange Solutions on VMware Page 1 of 19 Contents 1. Introduction... 3 1.1. Overview... 3 1.2. Benefits of Running Exchange Server 2007 on VMware Infrastructure 3...
An Oracle White Paper June 2011. Oracle Database Firewall 5.0 Sizing Best Practices
An Oracle White Paper June 2011 Oracle Database Firewall 5.0 Sizing Best Practices Introduction... 1 Component Overview... 1 Database Firewall Deployment Modes... 2 Sizing Hardware Requirements... 2 Database
IOmark- VDI. HP HP ConvergedSystem 242- HC StoreVirtual Test Report: VDI- HC- 150427- b Test Report Date: 27, April 2015. www.iomark.
IOmark- VDI HP HP ConvergedSystem 242- HC StoreVirtual Test Report: VDI- HC- 150427- b Test Copyright 2010-2014 Evaluator Group, Inc. All rights reserved. IOmark- VDI, IOmark- VM, VDI- IOmark, and IOmark
SIDN Server Measurements
SIDN Server Measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-003 July 19, 2010 1 Introduction For future capacity planning SIDN would like to have an insight on the required resources
WHITE PAPER 1 WWW.FUSIONIO.COM
1 WWW.FUSIONIO.COM WHITE PAPER WHITE PAPER Executive Summary Fusion iovdi is the first desktop- aware solution to virtual desktop infrastructure. Its software- defined approach uniquely combines the economics
Remote PC Guide for VMware Implementation Using ESXi versions 4.01 and 4.1 U2 with vcenter
Remote PC Guide for VMware Implementation Using ESXi versions 4.01 and 4.1 U2 with vcenter Document Version: 2012-06-29 This guide is a primer for adding remotely accessible PC or servers into your NETLAB+
Deployment Guide. Websense Web Security Websense Web Filter. v7.1
Deployment Guide Websense Web Security Websense Web Filter v7.1 1996 2009, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2009 Printed in the United States
Performance Guideline for syslog-ng Premium Edition 5 LTS
Performance Guideline for syslog-ng Premium Edition 5 LTS May 08, 2015 Abstract Performance analysis of syslog-ng Premium Edition Copyright 1996-2015 BalaBit S.a.r.l. Table of Contents 1. Preface... 3
Planning Domain Controller Capacity
C H A P T E R 4 Planning Domain Controller Capacity Planning domain controller capacity helps you determine the appropriate number of domain controllers to place in each domain that is represented in a
Leveraging NIC Technology to Improve Network Performance in VMware vsphere
Leveraging NIC Technology to Improve Network Performance in VMware vsphere Performance Study TECHNICAL WHITE PAPER Table of Contents Introduction... 3 Hardware Description... 3 List of Features... 4 NetQueue...
Windows Server 2012 2,500-user pooled VDI deployment guide
Windows Server 2012 2,500-user pooled VDI deployment guide Microsoft Corporation Published: August 2013 Abstract Microsoft Virtual Desktop Infrastructure (VDI) is a centralized desktop delivery solution
Introduction to VMware EVO: RAIL. White Paper
Introduction to VMware EVO: RAIL White Paper Table of Contents Introducing VMware EVO: RAIL.... 3 Hardware.................................................................... 4 Appliance...............................................................
An Oracle White Paper Released Sept 2008
Performance and Scalability Benchmark: Siebel CRM Release 8.0 Industry Applications on HP BL460c/BL680c Servers running Microsoft Windows Server 2008 Enterprise Edition and SQL Server 2008 (x64) An Oracle
