Uninett seminar, Tromsø 12/4-2010 Jan Harald Østbye Enterprise Account Manager 1
Symantec At a Glance Founded in 1982 IPO in 1989 More than 17,500 employees Operations in more than 40 countries #419 on the 2009 Fortune 500 99 percent of Fortune 1000 companies are customers $6.2 billion revenue in FY 2009 More than 600 global patents More than 120 million active consumer users 110 million enterprise customers Invests 13% of annual revenue in R&D 2 2
Expanding the Enterprise Portfolio $5.93 billion $5.25 billion $2.6 billion Peter Norton Computing $53 million $530 million $750 million $1.07 billion $1.4 billion $1.9 billion 1990 1998 2000 2002 2003 2004 2005 2006/7 PC desktop protection PC desktop storage Enterprise security Global intelligence & managed services Enterprise security & application management Message management & archiving Availability & compliance End point compliance, data center management, data loss prevention 2008 Software distribution & workflow 3
Strategic Priorities & Enterprise Solutions STRATEGIC PRIORITIES: Enterprise Security & Management Data Center Optimization SOLUTIONS: Endpoint Management Security Management IT Compliance Storage Management Disaster Recovery IT Service Management Endpoint Virtualization Endpoint Security Messaging Security Discovery & Retention Management Data Loss Prevention Archiving Data Protection High Availability Virtualization Management Web Security Green IT 4
Market MARKET SHARE LEADERSHIP GARTNER MAGIC QUADRANTS: LEADERS Endpoint Protection Platforms 10 Email Archiving 11 Content Monitoring and Filtering for Data Loss Prevention 12 Email Security Boundary 13 PC Configuration Life Cycle Management 14 Storage Services 15 Security Information and Event Management 16 Managed Security Service Providers 17 #1 in Endpoint Security Software (40% Share) 1 #1 in Security Software (31% share) 2 #1 in Secure Content and Threat Management (18% share) 3 #1 in Data Protection and Recovery (37% share) 4 #1 in Core Storage Management (35% share ) 5 #1 in Messaging Security Management (18% share ) 6 #1 in Email Archiving Applications (23% share) 7 #1 in Software Distribution (19% share) 8 #1 in Security and Vulnerability Management (9% share) 9 FORRESTER WAVES: A LEADER Enterprise Database Monitoring and Real-Time Protection 18 Client Management Suites 19 Enterprise Security Information Management 20 Information Leak Prevention 21 IT Asset Management 22 Message Archiving Wave 23 5
In a connected world Information is everything In the Business World In the Consumer World Confidential & IP Identity Regulated or Private Parental Controls Business Operations Workplace Content Digital Music Photos and Files Financial Transactions Financial Records 487 exabytes growing 51% annually 6
Today s reality More risks, more demands, smaller budgets Technology Sprawl = Added Risk Relentless demand, financial pressure 6X growth in storage from 07 to 11 Datacenter energy costs double every five years The average storage utilization is only 35% People, business and technology inseparable More risks, bigger consequences Blocked more than 250 million attempted malicious attacks per month 1.6+ million new malicious code signatures more than last 17 years combined Information mobility puts risk everywhere Computing + Virtual Platforms Operating Systems Delivery Models Electronic Communications Pervasive Networks Devices 7
Protection Suite 3.0 Enterprise Edition 8
Symantec Global Intelligence Network Vulnerability Database Fraud: Spam & Phishing Honeypot Network 25,000+ vulnerabilities in database 2+ Million Probe Network Accounts Virtual network of 8000+ IP addresses 55,000+ technologies from over 8000 vendors Statistics on 1+ Billion email messages a day Geo-location capabilities on servers and zombies Capturing previously unseen threats and attack methods 2B+ events logged daily Over 100,000 security alerts generated annually 200,000 daily code submissions Managed devices in 70+ countries 40,000+ Sensors in 200+ Countries 120 Million Threat/ Virus Submission Systems Symantec Brightmail Gateway 9 9
Threat Overview A New Threat Landscape Requires a Different Approach 91% of all breaches are now driven by highly resourced organized criminals Point solutions leave gaps multi-protocol converged threat analysis and unrivaled accuracy are essential Early warning systems were built for the old style mass mailing viruses not targeted attacks or smaller attacks from thousands of attackers 67% of data breaches happen because of the mistakes of well-meaning insiders Source: Verizon Business Risk Team, 2009 Data Breach Investigations Report Symantec Hosted Services Add-On Options for Symantec Protection Suites 10
Threat Overview Email Virus Trends Over Six Months 1 in 280.6 emails contained a virus An estimated 100 billion spam messages per day were driven by botnets 1 in 405.7 emails was a phishing attempt Proactive, up-to-the-minute intelligence is needed to meet this volume in real time Source: MessageLabs Intelligence February 2010 Symantec Hosted Services Add-On Options for Symantec Protection Suites 11
Threat Overview The Web and Web 2.0 Use Increase Risks An average of 4,998 new Websites are identified each day harboring malware 80% of malicious domains are legitimate domains which have been compromised Proactive protection with up-to-the-minute intelligence is needed to meet this volume in real time Source: MessageLabs Intelligence February 2010 Symantec Hosted Services Add-On Options for Symantec Protection Suites 12
The Endpoint Security Challenge Many threats to data Hackers, viruses, worms, spyware, malware, day-zero exploits Careless or malicious insiders leaking or stealing confidential data Confidential data inappropriately stored on an endpoint Mobile users connecting to untrusted networks or web sites Unpatched endpoints or contractor/temp laptops Many endpoint entry and exit points for data USB, CD/DVD, printer, Infrared, Bluetooth Network-based apps: Email, web, IM, FTP, P2P Open firewall ports Lost or stolen laptops or removable media How to solve with endpoint software Multiple vendors without a complete product offering Suite offerings may sacrifice functionality or be unproven Need a best of breed yet comprehensive solution from a single vendor
Symantec Protection Suite Enterprise Edition Symantec Protection Suite Enterprise Edition Endpoint Security Symantec Endpoint Protection Symantec Network Access Control Self Enforcement NEW! Symantec AntiVirus for Mac Symantec AntiVirus for Linux Symantec Mobile AntiVirus for Windows Mobile Messaging & Web Security Symantec Brightmail Gateway Symantec Web Gateway NEW! Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Domino Symantec Premium AntiSpam Backup and Recovery Symantec Backup Exec System Recovery Desktop Edition NEW! 14
Award Modular BIOS v6.473, an Energy Star Ally Copyright {C} 1994-2003, Award Software Inc. System Recovery The New, Automated Way Pentium 4 Centrino Mobile Processor Memory Test: 1024MB OK Award Plug and Play BIOS Extension v1.0a Copyright {C} 1995, Award Software Inc. Detecting primary master hard disk... FAILED Device I/O error: Unable to read sector 0 on primary hard disk Press any key to reboot... Press DEL to enter SETUP 2/16/2008 W3HU4-877FH4-08
Are Your Systems Indestructible? 85% of Systems Are Not Backed Up 53% of Loss Due to H/W or S/W 38% of Loss Due to Human Error Typical Recovery Time 6 8 hrs. You DO NOT need a major disaster to need rapid system recovery. Everyday occurrences cause a system loss. 17
Complete Protection For Any Size Organization NetBackup 500+ employees >$150m revenue Backup Exec 50-1000s of servers Specialized backup team 100-999 employees Data center focus Backup Exec System Recovery $50-$150m revenue 3-100 s of servers 10-99 employees <$50m revenue 1-4 servers 1-2 general IT staff Windows server focus Offsite/ Vault No IT staff Windows desktop & server Data Center Data Center Main/Remote Office Remote Office Remote Office Server, Desktops & Laptops Servers, Desktops & Laptops Desktops & Laptops Desktops & Laptops Desktops & Laptops Symantec Backup Exec 2010 18
A History of Leadership in the Backup & Archive Market for Over a Decade Leading Customer Validation 99% of the Fortune 500 90% of the Global 2000 1.5 Million savvy small / medium businesses #1 Backup Market Share #1 Archiving Market Share 10 of 10 leading telecommunication companies 10 of 10 leading healthcare companies 10 of 10 leading financial services companies Leading Analyst Recognition Leading Backup Vision Leading Archiving Vision 19
Net Backup 7 20
Symantec s Prescription For Better Data Protection Deduplicate Everywhere To Rationalize Infrastructure Archive for Long Term Storage & Improve Backup Performance Centralize Management To Reduce Complexity 21
Deduplicate Everywhere, Closer to the Source Primary Storage Client Servers Media Server Backup Appliance Archive data off primary storage & dedupe data Deduplicate at the client Deduplicate at the media server New in NetBackup 7 Integrate with appliances via OpenStorage RESULTS Faster backup & recovery Reduced bandwidth Less storage requirements Optimized search/discovery 22
Dedupe for any Enterprise Easy & Cost Effective Fully Integrated Easy to Configure NetBackup Client Configuration Cost Effective & Flexible NetBackup 7 SAN/ DAS Commodity disk Front-end licensing - Keep as many copies as you want Proven Technology Site 1 SAN/ DAS NetBackup 7 Replication Site 2 PureDisk Storage NetBackup 7 * Assumes replication 23
What Sets NetBackup Deduplication Apart Built-in, easy to use No expensive hardware Lower TCO than Appliances Proven Product Line, Proven Technology Works out of the box. No additional setup required Use commodity hardware of choice Up to 50-70% less than appliance solutions (assumes replication) Built into NetBackup, based on PureDisk Dedupe Technology Investment Protection Dedupe value wherever needed- Source, Media Server, Appliance 24
If You Like Deduplication You ll Love Archiving Improve Backup & Search Regardless of NetBackup Version No Archiving Archiving Email / SharePoint / File Servers 200 GB 15MB/s or 54GB/h Email / SharePoint / File Servers 100 GB ~4 hrs 80 GB ~2 hrs Enterprise Vault Backups Backups A typical client with 200GB of data would take ~4 hours to complete a full backup. With archiving content is reduced by 50% leaving 100GB of data backed up in ~2 hrs. Archive backed up separately. 25
NetBackup 7 Simple & Comprehensive Protection for Virtual Machines Improve How You Protect Any Virtual Machine with NetBackup Shorten Backup Time by 50-90% old 90% new Client-side deduplication & unique incremental backup support Lower impact backups for Hyper-V & VMware (using vstorage API) Find & Recover Files Instantly Recovery VM File 1.. File 2.. VM Backup Storage Simple recovery process - Guided VM recovery Instant file recovery - ANY type of backup disk tape Greater Storage Efficiency VM VM VM Hypervisor Deduplication across physical & virtual Store less with VMware block optimization 26
Better Disaster Recovery for Global Data Protection One Console To View Distributed Backup Information Replicate & Store 80% Less Data Duplication Recover terabytes of data in seconds from anywhere 27
Move Up to 80% Less Data With Optimized Duplication One Policy for Backup & DR Copies Site 1 Site 2 SAN/ DAS Optimized Duplication Copy 1: 14 days Copy 2: 21 days Copy 3: 60 days OST Optimized Duplication OST Copy 1: 14 days Copy 2: 21 days OST=OpenStorage Appliance (e.g., Data Domain) 28
Improve Backup Operations With NetBackup OpsCenter and OpsCenter Analytics Monitoring, Reporting & Alerts Across Sites Consolidate Backup & Archive Reports NetBackup, Backup Exec, & Enterprise Vault OpsCenter Analytics Turn on SLAs, forecasting with a key IMPROVED USABILITY 29
NetBackup 7 Other Enhancements Full Support for New Windows Platforms and Applications Full support for Windows Server 2008 R2 Full support for Exchange 2010 and Enterprise Vault 8 Oracle Cloning Use a backup to reduce the impact of cloning on production databases Simplified Licensing License Virtual Machines Protection per physical host (no OS distinction) New Terabyte Based Licensing Model that includes clients 30
FileStore 5.5 31
FileStore Continues Symantec s File System Leadership File System 1991 Clustered File System 2000 2008 FileStore App App App / Clustered NFS App SF SF CFS FileStore Storage Foundation First journaled UNIX file system CFS Mission critical transactional apps (RAC, SAP, Tibco) FileStore Enterprise and high performance file serving 32
FTP Clients CIFS NFS A Scalable Architecture FileStore NAS Storage Arrays FC-SAN / SAS / iscsi LAN / WAN / Cloud FileStore Core Technology ( up to 16 nodes) Veritas Cluster File System Veritas Cluster Volume Mgr Veritas Cluster Server 33
Delivery Options FileStore can be delivered in two ways: 1 Soft-appliance: A software package that can be installed on off-the-shelf hardware. Reference configurations available for major hardware vendors. 2 OEM: System vendors offer storage solutions based on Symantec FileStore products. 34
Exceptional Scaling of Both Performance and Capacity Performance Scaling: Industry-leading performance Up to 16 nodes serving a common set of data Excellent small and large file performance Capacity Scaling: 256TB file systems 200 million files per file system 2PB clusters Availability: <20sec failover times SPECsfs 2008 IOPS Ranking #1 FileStore 176,728 ops/sec #2 BlueArc 146K ops/sec #3 HP 135K ops/sec (using VxFS) #5 NetApp FAS6080 120K ops/sec Linear scaling 35 35
Drive Price An Information Services Platform Dynamic Storage Tiering Intelligently move data to low-cost disk (and back) Anti-Virus Reduce costs with native virus scanning SSD SAS SATA AV Symantec AV FileStore Backup Decrease backup windows with embedded NetBackup Higher performance Simpler administration Fewer servers required 36
Performance Requirement A Flexible NAS Platform That Fits Many Workloads FileStore Customers * Regional Hospital (PACS) * Internet Game (Live Game Sessions) * University (Document Library) * Top-3 Mobile Provider (Media Delivery) * Top-10 Internet Retailer (Online Images) Why is FileStore used so broadly? Performance/feature benefits across workloads. Easy scaling from small to large workloads. Best in class price / performance 10TB Scale Requirement 2PB 37
Appendix 38
Account Manager Jan Harald Østbye janharald_ostbye@symantec.com DDI: +47 6783 8907 Mobile: +47 4801 8907 Specialist Sales Endpoint Management/Security Roger Ison-Haug roger_isonhaug@symantec.com Tlf: 4801 8914 Symantec Services Ulf Trapp ulf_trapp@symantec.com Tlf: 4801 8904 Technical Support Tlf: +47 23 16 21 23 enterprise_support@symantec.com http://mysupport.symantec.com Customer Care Tlf: +47 23 16 21 22 emea_customercare@symantec.com Presales Manager, Datacenter Kåre Juvkam kare_juvkam@symantec.com Tlf: 4801 8922 Security Gunnar Kopperud gunnar_kopperud@symantec.com Tlf: 4801 8908 ILM/GRC Paul-Christian Garpe paulchristian_garpe@symantec.com Tlf: 4801 8903 39
Source: Industry Recognition 1 IDC, Worldwide Endpoint Security Software 2007-2011 Forecast and 2006 Vendor Shares: How Suite It Is, Kolodgy, December 2007 2 Based on new license revenue, Gartner Dataquest, Market Share: Security Software, Worldwide, 2006, Latimer-Livingston, July 2007 3 IDC, Worldwide Secure Content and Threat Management 2007-2011 Forecast and 2006 Vendor Shares:1+1=4, #207523, June 2007 4 IDC, Worldwide Data Protection and Recovery Software 2006 Vendor Shares, Doc # 209653, December 2007 5 Gartner Report, Market Share: Storage Management Software, Worldwide, 2006, Alan Dayley, January, 1, 2006 6 IDC, Worldwide Messaging Security 2007 2011 Forecast and 2006 Vendor Shares: DLP, Encryption, and Hosted Services Heating Up, Dec. 2007 7 IDC, Worldwide Email Archiving Applications 2007-2011 Forecast and 2006 Vendor Shares, May 2007 8 IDC, Worldwide Software Distribution 2007 2011 Forecast and 2006 Vendor Shares, Broussard, December 2007 Doc #210004 9 IDC, Worldwide Security and Vulnerability Management Software 2007 2011 Forecast and Analysis, Kolodgy-Ryan, Aug 2 007 Doc #207658 10 Gartner, Magic Quadrant for Endpoint Protection Platforms, Firstbrook, Hallawell, Girard, MacDonald, December 21, 2007 11 Gartner, Magic Quadrant for E-Mail Active Archiving, 2006; Carolyn DiCenzo & Kenneth Chin; May 12, 2006 12 Gartner, Magic Quadrant for Content Monitoring and Filtering for Data Loss Prevention Q4 2007, April 2007 13 Gartner, Magic Quadrant for E-mail Security Boundary, 2006; Peter Firstbrook, Arabella Hallawell Sept 25, 2006 14 Gartner, Magic Quadrant for PC Life Cycle Configuration Management, 2007; Terrence Cosgrove & Ronni J. Colville; December 21, 2007 15 Gartner, Magic Quadrant for Storage Services, 2Q07; Adam Couture & Robert E. Passmore; May 16, 2007 16 Gartner, Magic Quadrant for Security Information and Event Management, 1Q07; Mark Nicolett & Kelly Kavangh; May 9, 2007 17 Gartner, Magic Quadrant for MSSPs, North America, 1H07, Kelly M. Kavanagh, John Pescatore, August 2007 18 The Forrester Wave : Enterprise Database Auditing And Real-Time Protection, Q4 2007, October 26, 2007 19 The Forrester Wave : Client Management Suites, Q3 2007, July 24, 2007 20 The Forrester Wave : Enterprise Security Information Management, Dec, 2006 21 The Forrester Wave : Information Leak Prevention Q4, Dec. 15, 2006 22 The Forrester Wave : IT Asset Management, Q3 2006, August 4, 2006 23 The Forrester Wave : Message Archiving Software, Q1 2008, February 14, 2008 * The Magic Quadrant is copyrighted by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. 40
Protection Technology Comparison Enterprise Solutions Symantec Trend Micro McAfee Total Protection Protection Technology 1 Endpoint Protection Protection Suite EE Neat Suite Advanced Client Server Messaging Endpoint Essential Endpoint Endpoint Advanced Secure Business Endpoint Security Antivirus / Antispyware Desktop Firewall Intrusion Prevention 2 Generic Exploit Blocking 3 Device & Application Control Antivirus for Mac 4 Antivirus for Linux 4 Antivirus for Mobile Network Access Control Self Enforcement Messaging & Web Security Antivirus/Antispam/Antiphishing E/D/G/IM E/D/G/ - E/-/-/- E/D/-/- E/D/-/- E/D/G/- Reputation-based spam filtering Global/Local Global/ - Global/- Content Filtering / Compliance E/D/G/IM E/D/G/- E/-/-/- E/D/-/- E/D/-/- E/D/G- Data Loss Prevention MS Exchange Lotus Domino Messaging Gateway software subscription Web Gateway software subscription Backup and Recovery Backup Live Desktops & Laptops Restore to any Hardware Threat Driven Backups Legend: E = Available for Microsoft Exchange D = Available on Domino G = Available as gateway or hosted solution IM = Available for Instant Messaging
FileStore Storage Tiering Single name space: one filesystem. dual storage tiers. Administrator defines policy on when to relocate files based on access time. 30 / 60 / 90 / #x day policy options for time. Place files in secondary tiers and promote to primary based on I/O throughput. Manually move files/folders as needed. Files go where they should when they should automatically and transparently. /one_file_system /sales /financial /development /current /forecast /2005 /2004 /new_app /history FC Attach Storage TIER 1 SSD / FC FC TIER 2 SATA SATA 42
FileStore NFS connection Management NFS Clients DNS based load balancing VIP failover by VCS Round Robin DNS provides balanced access to nodes. VIP1 VIP2 VIP3 VIP4 VIP5 VIP6 VIP7 VIP8 VIP9 VIP10 VIP11 VIP12 VIP13 VIP14 VIP15 VIP16 Evenly allocate Virtual IP addresses across active nodes FS Node n FS Node n FS Node n FS Node n FS Node n FS Node n VCS Monitored Resources FS Node n FS Node n Administrator can move VIPs to new nodes Always-on NFS/CIFS serving IP addresses Cluster File System NFS shares export on all nodes creating a single namespace /vx/nfs_share 43