Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery

Size: px
Start display at page:

Download "Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery"

Transcription

1 Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery The Essentials Series sponsored by Dan Sullivan

2 Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens of high quality books that just happen to be delivered in electronic format at no cost to you, the reader. We ve made this unique publishing model work through the generous support and cooperation of our sponsors, who agree to bear each book s production expenses for the benefit of our readers. Although we ve always offered our publications to you for free, don t think for a moment that quality is anything less than our top priority. My job is to make sure that our books are as good as and in most cases better than any printed book that would cost you $40 or more. Our electronic publishing model offers several advantages over printed books: You receive chapters literally as fast as our authors produce them (hence the realtime aspect of our model), and we can update chapters to reflect the latest changes in technology. I want to point out that our books are by no means paid advertisements or white papers. We re an independent publishing company, and an important aspect of my job is to make sure that our authors are free to voice their expertise and opinions without reservation or restriction. We maintain complete editorial control of our publications, and I m proud that we ve produced so many quality books over the past years. I want to extend an invitation to visit us at especially if you ve received this publication from a friend or colleague. We have a wide variety of additional books on a range of topics, and you re sure to find something that s of interest to you and it won t cost you a thing. We hope you ll continue to come to Realtime for your educational needs far into the future. Until then, enjoy. Don Jones i

3 Introduction to Realtime Publishers... i Ar ticle 1: The Business Case for Open Source Virtualization... 1 Cu rrent Trends in Virtualization Adoption... 1 Increasing Use of Virtualization... 1 The Emergence of Multiple Virtualization Options... 2 Growing Use of Multiple Hypervisors Within an Organization... 2 Ris ks with Single Vendor Virtualization... 2 Risk of Vendor Lock In... 3 Costly Changes in Licensing Structure... 3 Limited Tools Provided by Vendor... 4 Be nefits of Open Source Virtualization... 4 Cost Benefits of Open Source Virtualization... 4 Maturity and Scalability... 5 Integration with Existing Infrastructure... 5 Summary... 5 Ar ticle 2: Migration to Open Source Virtualization... 6 W ays of Deploying Virtualization... 6 Virtualized Servers... 7 Private Computing Clouds... 7 Virtual Desktop Environments... 7 Te chnical Features to Assess in Virtualization Platforms... 8 Cross Platform Support... 8 Performance and Scalability... 8 Security... 8 Live Migration Support... 9 High Availability... 9 Additional Advanced Features... 9 ii

4 Ma nagement Features to Assess in Virtualization Platforms... 9 Management Console Self Service Support Operations Automation Using Backup Solution to Support Migration Summary Ar ticle 3: Ongoing Operations: Backup, Disaster Recovery, and Data Protection Need for Virtualization Aware Backups Ke y Technical Features to Consider Support for Multiple Virtualization Solutions Perform Live Snapshots Support for Migration Support for Compliance Support for Compression Disaster Recovery and Data Protection Considerations Ma nagement Considerations Cost and Licensing Model Centralized Management Support for Existing Storage Media Policy Based Backups Deduplication of Data Support for Hybrid Virtual Physical Environments Summary iii

5 Copyright Statement 2012 Realtime Publishers. All rights reserved. This site contains materials that have been created, developed, or commissioned by, and published with the permission of, Realtime Publishers (the Materials ) and this site and any such Materials are protected by international copyright and trademark laws. THE MATERIALS ARE PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. The Materials are subject to change without notice and do not represent a commitment on the part of Realtime Publishers its web site sponsors. In no event shall Realtime Publishers or its web site sponsors be held liable for technical or editorial errors or omissions contained in the Materials, including without limitation, for any direct, indirect, incidental, special, exemplary or consequential damages whatsoever resulting from the use of any information contained in the Materials. The Materials (including but not limited to the text, images, audio, and/or video) may not be copied, reproduced, republished, uploaded, posted, transmitted, or distributed in any way, in whole or in part, except that one copy may be downloaded for your personal, noncommercial use on a single computer. In connection with such use, you may not modify or obscure any copyright or other proprietary notice. The Materials may contain trademarks, services marks and logos that are the property of third parties. You are not permitted to use these trademarks, services marks or logos without prior written consent of such third parties. Realtime Publishers and the Realtime Publishers logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. If you have any questions about these terms, or if you would like information about licensing materials from Realtime Publishers, please contact us via at info@realtimepublishers.com. iv

6 Article 1: The Business Case for Open Source Virtualization Virtualization is one of the single most important technologies for efficiently operating servers. It should not be surprising to learn that open source options are available for this essential technology. Just as open source initiatives have produced widely used operating systems (OSs), databases, application servers, and even desktop applications, there are open source options for virtualization as well. Do you wonder if open source virtualization is right for your business? Perhaps you are concerned about how it might fit with your existing virtualization platforms? Are you unsure about why you should even consider open source virtualization? In this first part of the series, you will learn about: Current trends in virtualization adoption Risks associated with single vendor virtualization Benefits of open source virtualization The benefits of virtualization are well established, as are the benefits of open source software. Now it is time to consider in detail the benefits of the two combined. Current Trends in Virtualization Adoption A few trends are apparent in the options and use of server virtualization platforms: Increasing use of virtualization Emergence of multiple virtualization options Growing use of multiple hypervisors within organizations These trends reflect the economic and business benefit of virtualization to the enterprise. Increasing Use of Virtualization It is no surprise that virtualization adoption is on the rise. With virtualization, organizations can increase the overall utilization of their servers. Prior to the development of hypervisors that allowed multiple OSs to run together on a single server, businesses often followed a one application one server rule of thumb. This was not because one application demanded all the resources of a server but because applications often required specific configurations, OS versions, or code libraries. Trying to run two or more enterprise applications on a single server could be more trouble than it was worth. For example, one of the applications might require an OS patch but the other application might break if that patch were applied. Rather than find out too late about unanticipated dependencies between an OS and application, IT professionals often opted for the one application one server approach. 1

7 Server virtualization solved the unanticipated dependency problem. With a hypervisor allowing multiple OSs to run on a single server, systems administrators could host multiple applications, each with their own optimally configured OS, on one server. Systems administrators are not even constrained to run the same OS on virtualized platforms. Windows Server and Linux can operate on the same physical server as easily as can multiple versions of the same OS. The Emergence of Multiple Virtualization Options One of the advantages of a maturing software technology is that multiple vendors will promote their products. In some cases, a single vendor may come to dominate such markets. For example, in the early days of personal computers before Microsoft s DOS users could choose PCs that ran a different OS; later, Windows dominated the PC market. In the early days of the relational database market, new and existing software vendors offered viable products to a growing community of users. Virtualization appears to be following the trajectory of relational databases more so than that of PC OSs. Businesses have choices when it comes to virtualization. They can choose from vendors specializing in virtualization, from large scale software vendors or from open source options. All have advantages and disadvantages, so, like so many IT decisions, the choice of virtualization is driven by your requirements and budget. Growing Use of Multiple Hypervisors Within an Organization Virtualization does not require you to use a single hypervisor for all your virtualization needs. An IT department can run their servers and LDAP servers on one hypervisor while choosing a different virtualization platform for their Web servers and application servers. The marginal costs of learning to manage two different virtualization platforms can be easily outweighed by the benefits of choosing the optimal hypervisor for each requirement. Another consideration is the risks associated with using a single virtualization product. Risks with Single Vendor Virtualization There are certainly conveniences that come with using a single virtualization platform. For example, you will have a single toolset to work with and one licensing model to understand. These are also two examples of the risks associated with using a single software provider. 2

8 Risk of Vendor Lock In When you select a single software provider for any enterprise application, that choice is often followed with decisions that promote vendor lock in. This decision is not intentional who would want to limit their future choices? The driver is economics. Once you have selected a virtualization platform, you will build an array of supporting systems and procedures for deploying virtual machines (VMs), managing images, reporting on usage, and performing other management tasks. You could design these in sufficiently abstract ways that enable you to swap in or out any virtualization platform, but we rarely do. Why? The cost of such efforts is difficult to justify when deploying a single virtualization platform. It is faster and less expense to use the tools provided with your chosen virtualization platform. Costly Changes in Licensing Structure Another aspect to factor in when considering the use of a single virtualization platform is that vendors may change their licensing model at any time. There are many ways to license virtualization software: Number of physical servers Number of virtual servers Amount of memory in physical servers Amount of memory allocated to VMs Number of CPU cores in a physical server Number of CPU cores allocated to VMs When a vendor changes the way it charges for licenses, the change can cause substantial modifications in your charges. For example, if a vendor starts with a charge based on physical servers, you will likely optimize your licensing according to that model. For example, you might minimize the number of physical servers you purchase while maximizing the number of CPU cores and amount of memory. If the vendor then changes the licensing model to be based on the amount of memory or number of CPU cores, you might find yourself with a larger virtualization bill than you planned for. Once a vendor makes such a change in licensing structure, you have several choices: Pay any additional licensing charges Change your strategy for deploying VMs to lower your costs under the new pricing scheme Change virtualization platforms The first option might be the only choice in the short term. Changing your strategy for deploying VMs might require changes in your hardware, which can be too costly to consider, at least during the useful lifespan of your current set of servers. Changing virtualization platforms might be the best option but will take time to plan and execute. 3

9 Limited Tools Provided by Vendor A third factor to consider about risks associated with working with a single virtualization platform is the potential limited toolset provided by the vendor. Tools are essential for deploying, managing, and monitoring your virtualized environment. If vendor provided tools do not offer the functionality you need, you might find yourself scripting your own tools, which of course, you will then have to maintain. As you evaluate your virtualization platform options, consider the tools provided by the various frameworks, including those for: Deploying VMs Creating VMs Monitoring performance and altering system managers to specific events Generating utilization and billing information Working with a single vendor for any enterprise application has appeal, but there are risks to consider too. Fortunately, there are several virtualization platforms available today, including open source options, that give you the choice of using multiple virtualization platforms in your organization. Benefits of Open Source Virtualization Open source virtualization should be considered because of the potential benefits of adding it to your virtualization environment. Some of the key considerations are: Cost Maturity Scalability Integration with existing infrastructure These benefits can be realized without limiting yourself to a single virtualization provider. Open source virtualization can be considered in addition to commercial virtualization products. Cost Benefits of Open Source Virtualization Perhaps the most obvious benefit of open source virtualization is cost. With open source products, there are no licensing charges, so the cost of working with these products is minimal. The open source model also limits the risk of increased future costs unlike commercial vendors that might change their pricing scheme after you have made substantial commitments based on the existing licensing model. With open source software, you have the choice to purchase maintenance support from commercial providers. This supplement can provide the benefits of both open source and commercial offerings: low initial costs with assurances of support in the future. 4

10 Maturity and Scalability Open source virtualization products are widely used and have demonstrated their maturity and scalability. Open source hypervisors have demonstrated high levels of performance and the ability to run large numbers of VMs in the industry standard benchmark SPECvirt. Open source hypervisors also deliver performance comparable with bare metal performance for widely used enterprise applications. Integration with Existing Infrastructure Open source virtualization platforms integrate with existing infrastructure. Commonly used OSs from Microsoft and open source OSs run within open source hypervisors. Enterprise applications from major vendors such as Microsoft, Oracle, and SAP are running within open source virtualization environments. Open source hypervisors do not come with restrictions on how they can be used in the enterprise. In fact, the largest public cloud provider uses an open source virtualization hypervisor in its cloud. Summary Virtualization is a mature technology. Organizations are using virtualization to improve the efficiency of their IT operations and provide greater flexibility in how they deliver business services. They are also increasingly using multiple virtualization platforms. Doing so allows users to choose the best virtualization solution for their particular requirements without the risk of single vendor lock in. Open source virtualization has demonstrated its cost advantages as well as its maturity and scalability without sacrificing integration with existing infrastructure. 5

11 Article 2: Migration to Open Source Virtualization Open source virtualization will fit well in many organizations. One of the first considerations is how to migrate from currently deployed hypervisors to an open source platform. There are multiple ways to deploy virtualization and, in some cases, the best option is a combination of multiple hypervisors. In order to realize the greatest benefit of open source virtualization, you should keep in mind a number of factors: Ways of deploying virtualization Technical features to assess in virtualization platforms Management features to asses in virtualization platforms Use of backup solutions to support migration By weighing the relative importance of features against your requirements, you should be able to find a combination of virtualization platforms and migration procedures that fit your needs. Ways of Deploying Virtualization Virtualization has fundamentally changed the way we deploy applications and deliver services. It has decoupled applications and even desktops from hardware. In the process, it has created operating system (OS) environments that are sufficiently removed from hardware dependencies that we no longer need to think in terms of one server to one application. Instead, we can think of servers as a pool of resources for running virtual machines. VMs can move between physical servers as needed to optimize performance, consolidate VMs, and minimize the number of physical servers running at any time. The ability to decouple an OS from dedicated hardware promotes at least three ways of deploying virtualization: Virtualized servers Private computing clouds Virtual desktop infrastructure These deployments implement a wide array of services that all use the same fundamental technology. 6

12 Virtualized Servers When a single physical server is used to run multiple OSs, we call that a virtualized server. You deploy virtualized servers when a physical server has more capacity than is needed by a single application or set of applications that would run on a single instance of an OS. For example, you might have a lightly used collaboration server and a moderately used employee portal that you need to deploy. One runs under Windows while the other runs under Linux. Neither requires the full capacity of one of your servers. This scenario is typical for a virtualized server. Private Computing Clouds Private computing clouds extend the way we think about virtualized servers. A computing cloud (or simply cloud ) is a set of servers and supporting infrastructure dedicated to running VMs. In the virtualized server model, we tend to run the same VMs for extended periods of time, such as months or years. Clouds support more frequent changes in the number and type of VMs deployed. For example, a retailer might update their data warehouse every night. Stores upload their daily transactions to a staging area where the data is processed and loaded into the data warehouse. This setup creates a peak demand for computing resources at night with no demand during the day. Rather than dedicate servers to this process, a better model is to deploy VMs during the demand period and then release the physical servers to run other jobs during the day. Cloud infrastructure is optimized for this kind of frequent change in VM deployment. Virtual Desktop Environments Virtualization technology works well with desktops as well as servers. One way to work with a virtualized desktop is to run a hypervisor on the desktop and host two or more OSs. This setup may be appropriate for developers or others who can make use of multiple OSs on the same desktop. Another practice provides virtual desktops to client devices while running the desktop OS on a server in a data center. This configuration can be especially appealing to businesses whose employees want to work with personal laptops, tablets, and smartphones. With virtualized desktops, centralized IT can configure VMs for desktops with all the security controls they require. Virtualization platforms are commonly used to virtualize servers, and the rate of adoption of cloud computing and desktop virtualization is increasing. As you consider how you will use virtualization, be sure to evaluate the technical features of the platforms. 7

13 Technical Features to Assess in Virtualization Platforms There are a range of technical features that can distinguish virtualization platforms. Some of the most important are: Cross platform support Performance and scalability Security Live migration support High availability Additional advanced features Some of these features may be more relevant to your requirements than others; their importance should be weighted accordingly. Cross Platform Support Hypervisors used for server virtualization should support multiple OSs on the same physical server. One of the advantages of virtualization is that it allows you to arrange multiple VMs across servers to optimally load each server. Being constrained to running only a single type of OS on a hypervisor reduces the chances of finding an optimal configuration of VMs. Performance and Scalability One of the ways to measure performance of a hypervisor is to compare it with a direct implementation on a bare metal server. For example, if you can run a database application benchmark in 100 seconds on a database deployed to an OS running directly on a server, and that same benchmark takes 120 seconds when deployed to a comparably configured VM, you have a 20% performance penalty. For obvious reasons, you want to minimize this penalty. Scalability is also a key consideration. The more VMs a hypervisor can support, the better the scalability. It is not unusual to have virtual servers that place minimal demand on underlying hardware. In such cases, it makes sense to run as many of these low utilization VMs as possible on a single server. If the hypervisor requires substantial overhead for each VM, scalability will be limited. Security Most security controls will be implemented at the OS level, but security is still an issue for hypervisors. It is important to logically isolate VMs so that an adverse event on one of the hosted VMs does not affect any other VM running on the same physical server. 8

14 Live Migration Support The load on servers running VMs will change over time. In especially dynamic environments, there might be physical servers with multiple VMs running heavy loads while other servers have relatively light loads. Ideally, the virtualization platform would allow VMs from one server to migrate to another server without shutting down the VM. With this type of support for live migration of VMs, resources can be continuously reconfigured for optimal performance. Migrating VMs can also result in better consolidation so that fewer physical servers have to be running at the same time, saving on power and potentially cooling costs. High Availability Businesses that depend on the constant availability of applications and services should assess the high availability features of virtualization platforms. Hardware fails and OSs hang. Virtualization platforms that can detect hardware and OS failures and automatically restart VMs on other hardware can enable high availability services. Additional Advanced Features In addition to high level technical features, such as high availability and security, there are lower level implementation details that should be considered: Advanced memory management features Network interface card (NIC) teaming to share traffic between physical and virtual networks across multiple NICs Support for multipathing, allowing for data transfer paths to storage Power management features to reduce power consumption when possible Hardware and guest OS certification Given the complexity of virtualization platforms, it would be understandable to focus on technical features as the prime differentiator between your options. That would be a mistake. Be sure to consider the management features as well. Management Features to Assess in Virtualization Platforms The day to day operations in a virtualized environment will have as much impact on the business bottom line as many of the technical features. Look for virtualization platforms that provide: Management console Self service support Operations automation The objective of this assessment is twofold: first, to determine what parts of day to day operations can be automated and second, understand what features are in place to streamline the remaining manual tasks. 9

15 Management Console A management console is a particularly important tool for systems administrators. This console should provide a single point of access for managing VM images, monitoring performance, viewing reports, and responding to alerts. VM image management can be time consuming without proper tools. Images will need to be patched from time to time. New images will be added to the image catalog and others will be removed. A management console should support searching metadata associated with images (for example, OS version or patch level) so that administrators can quickly isolate particular images. Self Service Support The more end users can do for themselves, the better. Self service reduces IT administration costs. It can also improve the response time between recognizing the need for a change and the time to actually finish implementing the change. Self service features should be made available on an as needed basis. A user s role in the organization should dictate their level of access to support functions. For example, developers might be granted the right to create a new VM image while most other users are not. Operations Automation Operation automation features overlap with some of the technical features described earlier. Some of the most significant are: Load balancing Power savings Image management Network and storage management These automation features can significantly influence the cost of ongoing operations. Load balancing in conjunction with power saving features can optimize the number of servers running at any time. Image management features can help ensure that images are cloned rapidly and snapshots are created and stored in case you need to roll back to an earlier state of the machine image. In the likely event that existing management features and reporting do not meet all of your needs, you might be able to implement a custom solution if a centralized API is available. Be sure to assess the functionality provided by the virtualization platform s API. Organizations that make use of multiple virtualization platforms can realize further savings by streamlining migrations with the right backup solution. 10

16 Using Backup Solution to Support Migration Backup solutions designed to support VMs can be particularly useful for migrations. You might be migrating from physical as well as virtual servers, so look for backup solution that can migrate: Physical to virtual servers (P2V) Virtual to virtual servers (V2V) Virtual to physical servers (V2P) The next article in this series will delve into detail about the need for virtualization aware backups and key backup technical features to consider. Summary Migrating to open source virtualization presents a number of opportunities. These choices are driven in part by the different ways you can deploy virtualization for example, as server virtualization, private clouds, or desktop virtualization. When migrating to or adopting another virtualization platform, consider both the technical and management features provided. 11

17 Article 3: Ongoing Operations: Backup, Disaster Recovery, and Data Protection Maintaining your virtualized environment will require attention to backup, disaster recovery, and data protection. Although there are many similarities between these operations in non virtualized and virtualized environments, there are significant differences as well. This concluding article on managing virtualized environments will examine: The need for virtualization aware backups Key features of backup solutions Disaster recovery and data protection considerations Management concerns related to backup, disaster recovery, and data protection The purpose of this article is to help you understand how to choose and deploy a backup solution that will meet your particular requirements. Need for Virtualization Aware Backups A typical backup solution for non virtualized servers includes a software agent that runs on the server and transfers data to a backup server, which in turn, writes data to a backup device. In theory, this setup might appear to work for a virtualized environment, however, this process can cause challenges in a virtual environment. To deal with these challenges, you need a virtualization aware technology so that you can save on resource consumption, whether storage or network related. If your backup solution is licensed on a per agent basis, the cost of licensing your backup solution could increase dramatically. Before you deploy an agent based backup solution in a virtualized environment, consider the licensing structure; site licensing or physical server based licensing will not constrain your ability to deploy additional virtual machines as needed. 12

18 Key Technical Features to Consider Virtualization awareness is just one of the features that a backup solution should provide. In today s enterprise, backup solutions have to support heterogeneous environments, provide features required for regulation compliance, and help control costs of backup storage. When evaluating backup solutions, consider: Support for multiple virtualization solutions The ability to perform live snapshots Support for migration Compliance issues, especially encryption Support for data compression These features will affect both the cost and efficiency of backup operations. Support for Multiple Virtualization Solutions Enterprises have long supported multiple operating systems (OSs) so it is no surprise that they would also deploy multiple virtualization platforms. Organizations choose virtualization platforms and OSs based on different sets of requirements, availability of applications, cost, and other factors. Enterprises rarely have a wide range of disparate backup requirements. A single comprehensive backup solution should be sufficient for most organizations. That is, as long as the backup solution supports multiple virtualization environments. Perform Live Snapshots There was a time when you could assume that most of the demand on your applications would occur during business hours. This situation left the night as the ideal time to perform backups. Those days are gone. Applications are used continuously. The amount of data requiring backup continues to grow to the point where traditional nightly backup windows are not long enough to complete backups. Another approach is needed. With live snapshots, you can quiesce the VMs and make snapshots at any time. Creating a snapshot happens quickly, so there is minimal impact on VM performance. This ability to make live snapshots is essential to allowing VMs to continue operations while ensuring that sufficiently frequent backups are always available. Support for Migration Backups are primarily used to protect systems in the event of a failure, but there are other uses as well. A backup of a VM can be used to migrate a VM to other physical servers running a hypervisor or to a physical server. This capability makes VM backups a useful tool for supporting migration that is, as long as the backup solution supports restoring a VM to a device or hypervisor different from it source device or hypervisor. 13

19 Support for Compliance Businesses in healthcare, financial services, and government as well as publically traded companies are subject to a number of regulations designed to protect the confidentiality and integrity of business and personal information. Many such regulations require security controls to mitigate the risk of disclosing private and personal information. These typically require that data is encrypted both when it is stored on devices and when it is transmitted over networks. If a backup tape or drive were lost or stolen, it could constitute a data breach under regulations. Backups that provide the ability to encrypt data as it is backed up can reduce and virtually eliminate the risk of a lost backup tape leading to the disclosure of private information. Support for Compression VMs must keep all of their state information and data uncompressed when executing. When stored on a backup device, however, the VM can be compressed. This setup can save substantial amounts of storage and ultimately reduce the cost of operating and protecting your virtualized environment. Backups are essential in virtualized environments just as they are in non virtualized environments. An appropriate backup solution should include support for multiple virtualization platforms and rapid backups using snapshots as well as support for migration, compliance, and compression. Disaster Recovery and Data Protection Considerations Backups are a basic building block of disaster recovery, but disaster recovery brings additional demands on how you use those backups. Imagine your data center is lost to a fire, flood, or other natural disaster. You have backups of all of your virtualized servers at an offsite location. You ve secured a disaster recovery site with a mix of hardware. Now comes the real test. Can you restore your operations with full VMs restored to the same hardware configuration, full VMs restored to different hardware configurations, or selectively restore files from VM backups? These are all scenarios you could encounter during a recovery operation. In fact, unless you have an identically configured recovery site, you will probably find yourself restoring to a different set of hardware. When selecting a backup solution, be sure to consider the range of possible options you might need in a disaster recovery situation. You would not want to find out during a restore operation that your backup solution does not restore to dissimilar hardware or requires you to restore a full VM just to restore a few files. 14

20 Management Considerations When it comes to backups, disaster recovery, and data protection, there is no shortage of management considerations. In some cases, there is overlap between technical and management considerations. Some of the most important features to assess in a backup solution, at least from a management perspective, include: Cost and licensing model Support for centralized management Support for existing storage media Deduplication of data Policy based backup Support for hybrid virtual physical environments These factors all have the potential to impact the cost and efficiency of operations. Cost and Licensing Model As with virtualization platforms, there are many ways to price a backup solution. Site licenses and per physical server licenses are probably the easiest to plan around. When license charges are based on the number of VMs using the backup system, estimates are more difficult. For example, would you pay per backup agent deployed to a running VM? Or perhaps by backup agent deployed to a VM image regardless of whether it is running? Be sure to understand the licensing model as part of your evaluation to avoid unexpected surprises down the road. Centralized Management Centralized management features can streamline backup operations. Look for backup systems that support: Remote agent installation Centralized backup plans Monitoring and reporting Each of these features can help reduce the administrative overhead associated with performing and managing backups. Support for Existing Storage Media Do not overlook the fact that your business might have a substantial investment in backup storage media. If you have to invest in a different media in order to use a new backup solution, be sure to factor that cost into your decision. 15

21 Policy Based Backups Not all data or applications are equally valuable. Some data and systems should be backed up more frequently than others. Consider the plight of a systems administrator who has to code a script with exceptions to the rules for backups. As new VMs are deployed, the systems administrator will have to add the new VM to the proper script. As users change their requirements for backup, the systems administrator will have to delve into scripts again to make changes. A more efficient method is to define policies that describe the backups that are to be performed based on characteristics of the target systems. Deduplication of Data Data is often redundant. Backing up every block of data, even if an identical block has already been backed up, is a costly option. Backup vendors have implemented deduplication technologies that detect duplicate data blocks within a backup. When a duplicate is detected, a reference to the first copy of that block of data is inserted into the backup instead of inserting another copy of the data block. Substituting a reference to a block of data for a block of data itself can substantially reduce the volume of storage required for backups. Support for Hybrid Virtual Physical Environments Organizations might find that they need to support a combination of virtualized and physical servers. For example, they might license enterprise software that is supported only when running on physical servers. In such a scenario, it s reasonable to deploy applications to VMs only when there are no restrictions on virtualization. Ideally, the business should not need two backup solutions, one for their virtual servers and one for their physical servers. Summary Backup, disaster recovery, and data protection are critical considerations in virtualized and physical server environments. When assessing the right backup solution for your organization, remember the need for virtualization aware backups as well as key technical and management features of the solution. Also keep in mind the additional requirements imposed by disaster recovery and other data protection considerations. 16

Protecting Data with a Unified Platform

Protecting Data with a Unified Platform Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens

More information

Protecting Data with a Unified Platform

Protecting Data with a Unified Platform Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens

More information

Steps to Migrating to a Private Cloud

Steps to Migrating to a Private Cloud Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime

More information

Protecting Data with a Unified Platform

Protecting Data with a Unified Platform Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens

More information

Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures

Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures sponsored by Introduction to Realtime

More information

Virtual Machine Environments: Data Protection and Recovery Solutions

Virtual Machine Environments: Data Protection and Recovery Solutions The Essentials Series: The Evolving Landscape of Enterprise Data Protection Virtual Machine Environments: Data Protection and Recovery Solutions sponsored by by Dan Sullivan Vir tual Machine Environments:

More information

How Configuration Management Tools Address the Challenges of Configuration Management

How Configuration Management Tools Address the Challenges of Configuration Management Streamlining Configuration Management The Essentials Series How Configuration Management Tools Address the Challenges of Configuration Management sponsored by Introduction to Realtime Publishers by Don

More information

Streamlining Web and Email Security

Streamlining Web and Email Security How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor

More information

How Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution

How Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series How Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution sponsored by Introduction to

More information

10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution

10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series 10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution sponsored by Introduction to Realtime

More information

Best Practices for Log File Management (Compliance, Security, Troubleshooting)

Best Practices for Log File Management (Compliance, Security, Troubleshooting) Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers

More information

Securing Endpoints without a Security Expert

Securing Endpoints without a Security Expert How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Securing Endpoints without a Security Expert sponsored by Introduction to Realtime Publishers by Don Jones, Series

More information

Collaborative and Agile Project Management

Collaborative and Agile Project Management Collaborative and Agile Project Management The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens

More information

Tips and Best Practices for Managing a Private Cloud

Tips and Best Practices for Managing a Private Cloud Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

Data Protection in a Virtualized Environment

Data Protection in a Virtualized Environment The Essentials Series: Virtualization and Disaster Recovery Data Protection in a Virtualized Environment sponsored by by J. Peter Bruzzese Da ta Protection in a Virtualized Environment... 1 An Overview

More information

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to

More information

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Desktop and Application Virtualization Management Best Practices... 1 Image Management

More information

Real World Considerations for Implementing Desktop Virtualization

Real World Considerations for Implementing Desktop Virtualization Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI

More information

The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage

The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage sponsored by Dan Sullivan Chapter 1: Advantages of Hybrid Storage... 1 Overview of Flash Deployment in Hybrid Storage Systems...

More information

Lowering Costs of Data Protection through Deduplication and Data Reduction

Lowering Costs of Data Protection through Deduplication and Data Reduction The Essentials Series: The Evolving Landscape of Enterprise Data Protection Lowering Costs of Data Protection through Deduplication and Data Reduction sponsored by by Dan Sullivan Lo wering Costs of Data

More information

Collaborative and Agile Project Management

Collaborative and Agile Project Management Collaborative and Agile Project Management The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens

More information

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction

More information

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop

More information

What Are Cloud Connected Data Protection Services About?

What Are Cloud Connected Data Protection Services About? Protecting Client Data in the Cloud: A Channel Perspective The Essentials Series What Are Cloud-Connected Data Protection Services About? Architectural Advice for Resellers sponsored by Introduction to

More information

The Next-Generation Virtual Data Center

The Next-Generation Virtual Data Center The Essentials Series: Managing Workloads in a Virtual Environment The Next-Generation Virtual Data Center sponsored by by Jaime Halscott Th e Next Generation Virtual Data Center... 1 Be nefits of Virtualization

More information

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop

More information

Mitigating Risks and Monitoring Activity for Database Security

Mitigating Risks and Monitoring Activity for Database Security The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring

More information

Non-Native Options for High Availability

Non-Native Options for High Availability The Essentials Series: Configuring High Availability for Windows Server 2008 Environments Non-Native Options for High Availability by Non-Native Options for High Availability... 1 Suitability and Cost...

More information

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop Virtualization...

More information

Controlling and Managing Security with Performance Tools

Controlling and Managing Security with Performance Tools Security Management Tactics for the Network Administrator The Essentials Series Controlling and Managing Security with Performance Tools sponsored by Co ntrolling and Managing Security with Performance

More information

Best Practices in Deploying Anti-Malware for Best Performance

Best Practices in Deploying Anti-Malware for Best Performance The Essentials Series: Increasing Performance in Enterprise Anti-Malware Software Best Practices in Deploying Anti-Malware for Best Performance sponsored by by Eric Schmidt Be st Practices in Deploying

More information

The Definitive Guide to Cloud Acceleration

The Definitive Guide to Cloud Acceleration The Definitive Guide to Cloud Acceleration Dan Sullivan sponsored by Chapter 5: Architecture of Clouds and Content Delivery... 80 Public Cloud Providers and Virtualized IT Infrastructure... 80 Essential

More information

How to Install SSL Certificates on Microsoft Servers

How to Install SSL Certificates on Microsoft Servers How to Install SSL Certificates on Microsoft Servers Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens of high quality books

More information

Reducing Backups with Data Deduplication

Reducing Backups with Data Deduplication The Essentials Series: New Techniques for Creating Better Backups Reducing Backups with Data Deduplication sponsored by by Eric Beehler Reducing Backups with Data Deduplication... 1 Explaining Data Deduplication...

More information

Why Endpoint Encryption Can Fail to Deliver

Why Endpoint Encryption Can Fail to Deliver Endpoint Data Encryption That Actually Works The Essentials Series Why Endpoint Encryption Can Fail to Deliver sponsored by W hy Endpoint Encryption Can Fail to Deliver... 1 Tr aditional Solutions... 1

More information

Real World Considerations for Implementing Desktop Virtualization

Real World Considerations for Implementing Desktop Virtualization Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by En suring Desktop Virtualization Success... 1 Siz ing Your Desktop Virtualization Environment... 2 Ap

More information

How to Install SSL Certificates on Microsoft Servers

How to Install SSL Certificates on Microsoft Servers How to Install SSL Certificates on Microsoft Servers Ch apter 3: Using SSL Certificates in Microsoft Internet Information Server... 36 Ins talling SSL Certificates in IIS with IIS Manager... 37 Requesting

More information

Solving the Storage Challenge Across Platforms: Transparent Compression for Windows Operating Systems

Solving the Storage Challenge Across Platforms: Transparent Compression for Windows Operating Systems Solving the Storage Challenge Across Platforms: Transparent Compression for Windows Operating Systems sponsored by Dan Sullivan The Increasing Importance of Compression in the Enterprise... 1 Online Transactions

More information

The Business Case for Security Information Management

The Business Case for Security Information Management The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un

More information

Replication and Recovery Management Solutions

Replication and Recovery Management Solutions The Essentials Series: Virtualization and Disaster Recovery Replication and Recovery Management Solutions sponsored by by J. Peter Bruzzese Re plication and Recovery Management Solutions... 1 Pricing Models

More information

Making Endpoint Encryption Work in the Real World

Making Endpoint Encryption Work in the Real World Endpoint Data Encryption That Actually Works The Essentials Series Making Endpoint Encryption Work in the Real World sponsored by Ma king Endpoint Encryption Work in the Real World... 1 Th e Key: Policy

More information

Tips and Tricks Guide tm. Windows Administration. Don Jones and Dan Sullivan

Tips and Tricks Guide tm. Windows Administration. Don Jones and Dan Sullivan Tips and Tricks Guide tm To tm Windows Administration Don Jones and Dan Sullivan Tip, Trick, Technique 13: Configuring Server Core in Windows Server 2008 R2... 1 Tip, Trick, Technique 14: What Are Microsoft

More information

The Shortcut Guide To. Availability, Continuity, and Disaster Recovery. Dan Sullivan

The Shortcut Guide To. Availability, Continuity, and Disaster Recovery. Dan Sullivan tm The Shortcut Guide To Availability, Continuity, and Disaster Recovery Chapter 4: Putting It All Together Recovery Management Scenarios for Small Businesses to Emerging Enterprises... 48 Different Business

More information

Benefits of Using Data Loss Prevention Technology

Benefits of Using Data Loss Prevention Technology The Essentials Series: Email-Centric Data Loss Prevention Benefits of Using Data Loss Prevention Technology sponsored by by Dan Sullivan Benefits of Using Data Loss Prevention Technology...1 Need for Automated

More information

The Evolving Threat Landscape and New Best Practices for SSL

The Evolving Threat Landscape and New Best Practices for SSL The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...

More information

Administration Challenges

Administration Challenges The Essentials Series: Enterprise Identity and Access Management Administration Challenges sponsored by by Richard Siddaway Administration Challenges...1 Heterogeneous Environments...1 Multiple Directories...1

More information

Understanding & Improving Hypervisor Security

Understanding & Improving Hypervisor Security The Essentials Series: Security Concerns & Solutions Understanding & Improving Hypervisor Security sponsored by by Greg Shields Understanding & Improving Hypervisor Security...1 What Is the Hypervisor?...1

More information

The Shortcut Guide To. Availability, Continuity, and Disaster Recovery. Dan Sullivan

The Shortcut Guide To. Availability, Continuity, and Disaster Recovery. Dan Sullivan tm The Shortcut Guide To Availability, Continuity, and Disaster Recovery Chapter 3: Top-5 Operational Challenges in Recovery Management and How to Solve Them.. 33 Challenge 1: Scheduling and Monitoring...

More information

The Definitive Guide. Cloud Computing. Dan Sullivan

The Definitive Guide. Cloud Computing. Dan Sullivan The Definitive Guide tm To Cloud Computing Ch apter 10: Key Steps in Establishing Enterprise Cloud Computing Services... 185 Ali gning Business Drivers with Cloud Services... 187 Un derstanding Business

More information

Matching High Availability Technology with Business Needs

Matching High Availability Technology with Business Needs The Essentials Series: Making High Availability Pay For Itself Matching High Availability Technology with Business Needs sponsored by by Matching High-Availability Tec hnology with Business Needs... 1

More information

Realizing the IT Management Value of Infrastructure Management

Realizing the IT Management Value of Infrastructure Management The Essentials Series: Infrastructure Management Realizing the IT Management Value of Infrastructure Management sponsored by by Chad Marshall Realizing the IT Management Value of Infrastructure Management...1

More information

Evaluation of Enterprise Data Protection using SEP Software

Evaluation of Enterprise Data Protection using SEP Software Test Validation Test Validation - SEP sesam Enterprise Backup Software Evaluation of Enterprise Data Protection using SEP Software Author:... Enabling you to make the best technology decisions Backup &

More information

How the Software-Defined Data Center Is Transforming End User Computing

How the Software-Defined Data Center Is Transforming End User Computing How the Software-Defined Data Center Is Transforming End User Computing The Essentials Series sponsored by David Davis Building the Future of the Desktop on the Software-Defined Data Center... 1 What Is

More information

Where Do I Start With Virtual Desktops?

Where Do I Start With Virtual Desktops? The Essentials Series: Important Questions in Implementing Virtual Desktops Where Do I Start With Virtual Desktops? sponsored by by W here Do I Start with Virtual Desktops?... 1 W hat Is a Virtual Desktop?...

More information

Becoming Proactive in Application Management and Monitoring

Becoming Proactive in Application Management and Monitoring The Essentials Series: Improving Application Performance Troubleshooting Becoming Proactive in Application Management and Monitoring sponsored by by Becoming Proactive in Application Managem ent and Monitoring...

More information

The Art of High Availability

The Art of High Availability The Essentials Series: Configuring High Availability for Windows Server 2008 Environments The Art of High Availability by The Art of High Availability... 1 Why Do We Need It?... 1 Downtime Hurts... 1 Critical

More information

How to Use SNMP in Network Problem Resolution

How to Use SNMP in Network Problem Resolution The Essentials Series: Solving Network Problems Before They Occur How to Use SNMP in Network Problem Resolution sponsored by KNOW YOUR NETWORK by Greg Shields Ho w to Use SNMP in Network Problem Resolution...

More information

Understanding the Business Benefits of Managed Services

Understanding the Business Benefits of Managed Services The Essentials Series: Managed Application Failover for the SMB Understanding the Business Benefits of Managed Services sponsored by by David Chernicoff Un derstanding the Business Benefits of Managed

More information

To Cloud or Not to Cloud? Growing a Managed Services Portfolio

To Cloud or Not to Cloud? Growing a Managed Services Portfolio Protecting Client Data in the Cloud: A Channel Perspective The Essentials Series To Cloud or Not to Cloud? Growing a Managed Services Portfolio sponsored by Introduction to Realtime Publishers by Don Jones,

More information

Eight Ways Better Software Deployment and Management Can Save You Money

Eight Ways Better Software Deployment and Management Can Save You Money Eight Ways Better Software Deployment and Management Can Save You Money Introduction Software management and deployment are perhaps among the most difficult and time-consuming activities undertaken by

More information

The Shortcut Guide To. Implementing Virtualization in the Small Environment. Greg Shields

The Shortcut Guide To. Implementing Virtualization in the Small Environment. Greg Shields tm The Shortcut Guide To Implementing Virtualization in the Small Environment Greg Shields Ch apter 2: What Business Benefits Will I Recognize from Implementing Virtualization?... 16 Why Should My Budget

More information

How to Install SSL Certificates on Microsoft Servers

How to Install SSL Certificates on Microsoft Servers How to Install SSL Certificates on Microsoft Servers Ch apter 4: Installing SSL Certificates in Exchange Server, SharePoint, and SQL Server... 57 Co mmon Operations... 57 Step 1: Prepare the Microsoft

More information

The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway

The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged

More information

Acronis Backup Product Line

Acronis Backup Product Line New Generation Data Protection Powered by Acronis AnyData Technology Acronis Backup Product Line Speaker name Introducing Acronis Backup Acronis Backup Target: Smaller environments, home office, remote

More information

The Essentials Series: Enterprise Identity and Access Management. Authorization. sponsored by. by Richard Siddaway

The Essentials Series: Enterprise Identity and Access Management. Authorization. sponsored by. by Richard Siddaway The Essentials Series: Enterprise Identity and Access Management Authorization sponsored by by Richard Siddaway Authorization...1 What Needs to Be Protected?...1 Groups...2 Role-Based Access...2 Heterogeneous

More information

Business Communications Tools and Solutions

Business Communications Tools and Solutions Building Business Productivity with Unified Communications The Essentials Series Networking for Increased Productivity and Reduced Costs sponsored by Introduction to Realtime Publishers by Don Jones, Series

More information

Optimizing Data Protection Operations in VMware Environments

Optimizing Data Protection Operations in VMware Environments Optimizing Data Protection Operations in VMware Environments March 2009 Data protection is critical for small and medium business (SMB) customers. Evolving business and regulatory mandates are driving

More information

Eradicating PST Files from Your Network

Eradicating PST Files from Your Network The Essentials Series: Operations Benefits of Email Archiving Eradicating PST Files from Your Network sponsored by by Jim McBee Eradicating PST Files from Your Network...1 Understanding the Disadvantages

More information

Auditing File and Folder Access

Auditing File and Folder Access The Essentials Series: Fundamentals of Effective File Server Security Auditing File and Folder Access sponsored by by Greg Shields Au diting File and Folder Access... 1 Auditing Considerations... 1 Co

More information

Deployment Options for Microsoft Hyper-V Server

Deployment Options for Microsoft Hyper-V Server CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES

More information

Introducing Arcserve Unified Data Protection

Introducing Arcserve Unified Data Protection Introducing Arcserve Unified Data Protection Arcserve UDP is based on a next generation unified architecture for both virtual and physical environments. Its unmatched breadth, ease of use, and Assured

More information

Why Native Windows Defragmentation Isn t Enough

Why Native Windows Defragmentation Isn t Enough Why Native Windows Defragmentation Isn t Enough The Essentials Series Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens of high-quality

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...

More information

The Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones

The Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones The Definitive Guide tm To Monitoring the Data Center, Virtual Environments, and the Cloud Don Jones The Nimsoft Monitoring Solution SERVICE LEVEL MONITORING VISUALIZATION AND REPORTING PRIVATE CLOUDS»

More information

Symantec NetBackup 7.5 for VMware

Symantec NetBackup 7.5 for VMware V-Ray visibility into virtual machine protection Solution Overview: Data Protection Overview There is little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped

More information

An Oracle White Paper November 2010. Oracle Real Application Clusters One Node: The Always On Single-Instance Database

An Oracle White Paper November 2010. Oracle Real Application Clusters One Node: The Always On Single-Instance Database An Oracle White Paper November 2010 Oracle Real Application Clusters One Node: The Always On Single-Instance Database Executive Summary... 1 Oracle Real Application Clusters One Node Overview... 1 Always

More information

Virtualized Disaster Recovery from VMware and Vision Solutions Cost-efficient, dependable solutions for virtualized disaster recovery and business

Virtualized Disaster Recovery from VMware and Vision Solutions Cost-efficient, dependable solutions for virtualized disaster recovery and business Virtualized Disaster Recovery from VMware and Vision Solutions Cost-efficient, dependable solutions for virtualized disaster recovery and business continuity Cost-efficient, dependable solutions for virtualized

More information

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

CA ARCserve Replication and High Availability Deployment Options for Hyper-V Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization

More information

How Are Certificates Used?

How Are Certificates Used? The Essentials Series: Code-Signing Certificates How Are Certificates Used? sponsored by by Don Jones Ho w Are Certificates Used?... 1 Web Applications... 1 Mobile Applications... 2 Public Software...

More information

Enabling Useful Active Directory Auditing

Enabling Useful Active Directory Auditing The Essentials Series: Tackling Active Directory s Four Biggest Challenges Enabling Useful Active Directory Auditing sponsored by by Greg Shields En abling Useful Active Directory Auditing... 1 The Native

More information

Active Directory 2008 Operations

Active Directory 2008 Operations The Essentials Series Active Directory 2008 Operations sponsored by by Greg Shields Understanding Active Directory Recovery in Windows Server 2008...1 Backing Up AD...1 Full Server Recovery of a Domain

More information

Virtualization Support - Real Backups of Virtual Environments

Virtualization Support - Real Backups of Virtual Environments Virtualization Support Real Backups of Virtual Environments Contents Virtualization Challenges 3 The Benefits of Agentless Backup 4 Backup and Recovery Built for Virtualized Environments 4 Agentless in

More information

Account Access Management - A Primer

Account Access Management - A Primer The Essentials Series: Managing Access to Privileged Accounts Understanding Account Access Management sponsored by by Ed Tittel Understanding Account Access Management...1 Types of Access...2 User Level...2

More information

Demystifying Virtualization for Small Businesses Executive Brief

Demystifying Virtualization for Small Businesses Executive Brief Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................

More information

Virtual Machine Protection with Symantec NetBackup 7

Virtual Machine Protection with Symantec NetBackup 7 Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing to embrace the promise of virtualization for

More information

Data Deduplication: An Essential Component of your Data Protection Strategy

Data Deduplication: An Essential Component of your Data Protection Strategy WHITE PAPER: THE EVOLUTION OF DATA DEDUPLICATION Data Deduplication: An Essential Component of your Data Protection Strategy JULY 2010 Andy Brewerton CA TECHNOLOGIES RECOVERY MANAGEMENT AND DATA MODELLING

More information

What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility

What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility Your Guide to Cost, Security, and Flexibility What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility 10 common questions answered Over the last decade, cloud backup, recovery

More information

CrashPlan PRO Enterprise Backup

CrashPlan PRO Enterprise Backup CrashPlan PRO Enterprise Backup People Friendly, Enterprise Tough CrashPlan PRO is a high performance, cross-platform backup solution that provides continuous protection onsite, offsite, and online for

More information

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation

More information

How the Software-Defined Data Center Is Transforming End User Computing

How the Software-Defined Data Center Is Transforming End User Computing How the Software-Defined Data Center Is Transforming End User Computing The Essentials Series sponsored by David Davis SDDC Powered Virtual Desktops and Applications... 1 Three Pillars of SDDC and Desktop/Application

More information

What Are Certificates?

What Are Certificates? The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form

More information

Protecting your Data in a New Generation Virtual and Physical Environment

Protecting your Data in a New Generation Virtual and Physical Environment Protecting your Data in a New Generation Virtual and Physical Environment Read this white paper to learn how you can easily and safely protect your data in a new generation virtual and physical IT environment,

More information

With Red Hat Enterprise Virtualization, you can: Take advantage of existing people skills and investments

With Red Hat Enterprise Virtualization, you can: Take advantage of existing people skills and investments RED HAT ENTERPRISE VIRTUALIZATION DATASHEET RED HAT ENTERPRISE VIRTUALIZATION AT A GLANCE Provides a complete end-toend enterprise virtualization solution for servers and desktop Provides an on-ramp to

More information

Quickly Recovering Deleted Active Directory Objects

Quickly Recovering Deleted Active Directory Objects The Essentials Series: Tackling Active Directory s Four Biggest Challenges Quickly Recovering Deleted Active Directory Objects sponsored by by Greg Shields Qu ickly Recovering Deleted Active Directory

More information

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup OpenStorage Solutions Guide for Disk Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

More information

IT@Intel. Developing an Enterprise Client Virtualization Strategy

IT@Intel. Developing an Enterprise Client Virtualization Strategy White Paper Intel Information Technology Computer Manufacturing Client Virtualization Developing an Enterprise Client Virtualization Strategy Intel IT is investigating virtualization because it has the

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration White Paper Published: August 09 This is a preliminary document and may be changed substantially prior to final commercial release of the software described

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

Pr oactively Monitoring Response Time and Complex Web Transactions... 1. Working with Partner Organizations... 2

Pr oactively Monitoring Response Time and Complex Web Transactions... 1. Working with Partner Organizations... 2 Pr oactively Monitoring Response Time and Complex Web Transactions... 1 An atomy of Common Web Transactions... 1 Asking for Decisions... 1 Collecting Information... 2 Providing Sensitive Information...

More information