Uninett seminar, Tromsø 12/4-2010 Jan Harald Østbye



Similar documents
Symantec NetBackup Appliances

Gartner Magic Quadrant Sources and Disclaimer

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Backup for branch offices and compartment backups. Måns Höiom & Rikard Lindkvist

On and off premises technologies Which is best for you?

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation

Symantec NetBackup 7.1 What s New and Version Comparison Matrix

SYMANTEC ENTERPRISE SOLUTION STRATEGY

Symantec Protection Suite Small Business Edition

Die Herausforderung an Backup/Recovery durch das Datenwachstum Wie optimiere ich

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive John_Lally@symantec.

DPAD Introduction. EMC Data Protection and Availability Division. Copyright 2011 EMC Corporation. All rights reserved.

Data deduplication is more than just a BUZZ word

Archiving with Enterprise Vault Bruno Ritter

Secure Your Mobile Workplace

Symantec Protection Suite Small Business Edition

Backup Exec 2010 R2 Key Sales Plays Safe, Secure, Sold

BlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything

Symantec Backup Exec 2010

Best Practices for Managing Storage in the Most Challenging Environments

Reducing Costs and Complexity with CommVault

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

INFORMATION PROTECTED

Big data Devices Apps

<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures

Backup Exec 15 Agents and Options

Symantec Protection Suite SMB Family: Comparison Matrices and Migration. Presentation Identifier Goes Here 1

Backup Exec 2010 Deduplication Protect More, Store Less, Save More

Symantec Backup Appliances

Symantec NetBackup 7 Clients and Agents

Symantec Backup Exec 2014

NetApp SANscreen: come controllare i costi senza sacrificare la service quality. Roberto Patano Business Development Manager NetApp Italia

Efficiently Protect, Manage and Access Big Data. Nigel Tozer Business Development Director EMEA

Solution Overview. Business Continuity with ReadyNAS

Symantec NetBackup deduplication general deployment guidelines

CA Technologies Data Protection

Efficient Backup with Data Deduplication Which Strategy is Right for You?

Symantec NetBackup OpenStorage Solutions Guide for Disk

CommVault Backup Appliance with NetApp

Powering Linux in the Data Center

Payment Card Industry Data Security Standard

G06 - How to store your data in SharePoint

The future of Storage and Storage Management Using Virtualization to Increase Productivity. Storyflex VISION 2007 Hans Lamprecht NetApp SEE Vienna

COMMVAULT CORPORATE PRESENTATION

Symantec Endpoint Protection

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Security Information & Event Management (SIEM)

Maximize Your Virtual Environment Investment with EMC Avamar. Rob Emsley Senior Director, Product Marketing

Hitachi and Symantec Build Your Archiving and Discovery Strategy Today

DATA PROTECTION AND DEDUPLICATION

Protect Microsoft Exchange databases, achieve long-term data retention

Symantec Endpoint Protection

Backup and Recovery Redesign with Deduplication

Symantec Protection Suite Add-On for Hosted and Web Security

Presentation Identifier Goes Here 1

Data Sheet: Data Protection Veritas NetBackup 6.5 NetBackup Enterprise Server- Next Generation Data Protection

Huawei OceanStor Backup Software Technical White Paper for NetBackup

EMC BACKUP MEETS BIG DATA

EMC AVAMAR. Deduplication backup software and system. Copyright 2012 EMC Corporation. All rights reserved.

(Scale Out NAS System)

WHITE PAPER: ENTERPRISE SOLUTIONS. Effective Enterprise Data Management with Veritas NetBackup and Symantec Enterprise Vault Software Solutions

Backup and Recovery Solutions for Exadata. Ľubomír Vaňo Principal Sales Consultant

Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication

Asigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Backup & Disaster Recovery for Business

Backup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland

Cost Effective Backup with Deduplication. Copyright 2009 EMC Corporation. All rights reserved.

Medicaid MITA: Innovative COTS solutions for IT Risk Management

Symantec Backup Exec 2014 Agents and Options

EMC DATA PROTECTION. Backup ed Archivio su cui fare affidamento

Seagate Cloud Systems & Solutions

CA ARCserve Family r15

HP Software, Big Data Rethinking Data Protection

IBM Endpoint Manager for Core Protection

Symantec and VMware - Product Overview

Turnkey Deduplication Solution for the Enterprise

Veritas NetBackup for Epic Healthcare Protection

Next Gen Firewall and UTM Buyers Guide

TRANSFORMING DATA PROTECTION

End to End Security do Endpoint ao Datacenter

HP StorageWorks Enterprise File Services Clustered Gateway. Technical Product Review. Sprawl Makes Inexpensive Servers Expensive

Data Backup and Restore (DBR) Overview Detailed Description Pricing... 5 SLAs... 5 Service Matrix Service Description

Dell PowerVault DL2200 & BE 2010 Power Suite. Owen Que. Channel Systems Consultant Dell

Backup Exec 2012 Agents and Options

COMMVAULT: LA GESTIONE DEL DATO OLTRE IL BACKUP ED IL DISASTER RECOVERY

Small and Midsize Business Protection Guide

NetBackup 7.6 Best Practices: Protecting Virtual Environments Suwat Saelim

EMC arhiviranje. Lilijana Pelko Primož Golob. Sarajevo, Copyright 2008 EMC Corporation. All rights reserved.

Symantec NetBackup 7.5 What s New and Version Comparison Matrix

How To Improve Backup Exec 2014

June Blade.org 2009 ALL RIGHTS RESERVED

Licensing Guide for CA ARCserve & CA XOsoft Products

EMC Integrated Infrastructure for VMware

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection

Transcription:

Uninett seminar, Tromsø 12/4-2010 Jan Harald Østbye Enterprise Account Manager 1

Symantec At a Glance Founded in 1982 IPO in 1989 More than 17,500 employees Operations in more than 40 countries #419 on the 2009 Fortune 500 99 percent of Fortune 1000 companies are customers $6.2 billion revenue in FY 2009 More than 600 global patents More than 120 million active consumer users 110 million enterprise customers Invests 13% of annual revenue in R&D 2 2

Expanding the Enterprise Portfolio $5.93 billion $5.25 billion $2.6 billion Peter Norton Computing $53 million $530 million $750 million $1.07 billion $1.4 billion $1.9 billion 1990 1998 2000 2002 2003 2004 2005 2006/7 PC desktop protection PC desktop storage Enterprise security Global intelligence & managed services Enterprise security & application management Message management & archiving Availability & compliance End point compliance, data center management, data loss prevention 2008 Software distribution & workflow 3

Strategic Priorities & Enterprise Solutions STRATEGIC PRIORITIES: Enterprise Security & Management Data Center Optimization SOLUTIONS: Endpoint Management Security Management IT Compliance Storage Management Disaster Recovery IT Service Management Endpoint Virtualization Endpoint Security Messaging Security Discovery & Retention Management Data Loss Prevention Archiving Data Protection High Availability Virtualization Management Web Security Green IT 4

Market MARKET SHARE LEADERSHIP GARTNER MAGIC QUADRANTS: LEADERS Endpoint Protection Platforms 10 Email Archiving 11 Content Monitoring and Filtering for Data Loss Prevention 12 Email Security Boundary 13 PC Configuration Life Cycle Management 14 Storage Services 15 Security Information and Event Management 16 Managed Security Service Providers 17 #1 in Endpoint Security Software (40% Share) 1 #1 in Security Software (31% share) 2 #1 in Secure Content and Threat Management (18% share) 3 #1 in Data Protection and Recovery (37% share) 4 #1 in Core Storage Management (35% share ) 5 #1 in Messaging Security Management (18% share ) 6 #1 in Email Archiving Applications (23% share) 7 #1 in Software Distribution (19% share) 8 #1 in Security and Vulnerability Management (9% share) 9 FORRESTER WAVES: A LEADER Enterprise Database Monitoring and Real-Time Protection 18 Client Management Suites 19 Enterprise Security Information Management 20 Information Leak Prevention 21 IT Asset Management 22 Message Archiving Wave 23 5

In a connected world Information is everything In the Business World In the Consumer World Confidential & IP Identity Regulated or Private Parental Controls Business Operations Workplace Content Digital Music Photos and Files Financial Transactions Financial Records 487 exabytes growing 51% annually 6

Today s reality More risks, more demands, smaller budgets Technology Sprawl = Added Risk Relentless demand, financial pressure 6X growth in storage from 07 to 11 Datacenter energy costs double every five years The average storage utilization is only 35% People, business and technology inseparable More risks, bigger consequences Blocked more than 250 million attempted malicious attacks per month 1.6+ million new malicious code signatures more than last 17 years combined Information mobility puts risk everywhere Computing + Virtual Platforms Operating Systems Delivery Models Electronic Communications Pervasive Networks Devices 7

Protection Suite 3.0 Enterprise Edition 8

Symantec Global Intelligence Network Vulnerability Database Fraud: Spam & Phishing Honeypot Network 25,000+ vulnerabilities in database 2+ Million Probe Network Accounts Virtual network of 8000+ IP addresses 55,000+ technologies from over 8000 vendors Statistics on 1+ Billion email messages a day Geo-location capabilities on servers and zombies Capturing previously unseen threats and attack methods 2B+ events logged daily Over 100,000 security alerts generated annually 200,000 daily code submissions Managed devices in 70+ countries 40,000+ Sensors in 200+ Countries 120 Million Threat/ Virus Submission Systems Symantec Brightmail Gateway 9 9

Threat Overview A New Threat Landscape Requires a Different Approach 91% of all breaches are now driven by highly resourced organized criminals Point solutions leave gaps multi-protocol converged threat analysis and unrivaled accuracy are essential Early warning systems were built for the old style mass mailing viruses not targeted attacks or smaller attacks from thousands of attackers 67% of data breaches happen because of the mistakes of well-meaning insiders Source: Verizon Business Risk Team, 2009 Data Breach Investigations Report Symantec Hosted Services Add-On Options for Symantec Protection Suites 10

Threat Overview Email Virus Trends Over Six Months 1 in 280.6 emails contained a virus An estimated 100 billion spam messages per day were driven by botnets 1 in 405.7 emails was a phishing attempt Proactive, up-to-the-minute intelligence is needed to meet this volume in real time Source: MessageLabs Intelligence February 2010 Symantec Hosted Services Add-On Options for Symantec Protection Suites 11

Threat Overview The Web and Web 2.0 Use Increase Risks An average of 4,998 new Websites are identified each day harboring malware 80% of malicious domains are legitimate domains which have been compromised Proactive protection with up-to-the-minute intelligence is needed to meet this volume in real time Source: MessageLabs Intelligence February 2010 Symantec Hosted Services Add-On Options for Symantec Protection Suites 12

The Endpoint Security Challenge Many threats to data Hackers, viruses, worms, spyware, malware, day-zero exploits Careless or malicious insiders leaking or stealing confidential data Confidential data inappropriately stored on an endpoint Mobile users connecting to untrusted networks or web sites Unpatched endpoints or contractor/temp laptops Many endpoint entry and exit points for data USB, CD/DVD, printer, Infrared, Bluetooth Network-based apps: Email, web, IM, FTP, P2P Open firewall ports Lost or stolen laptops or removable media How to solve with endpoint software Multiple vendors without a complete product offering Suite offerings may sacrifice functionality or be unproven Need a best of breed yet comprehensive solution from a single vendor

Symantec Protection Suite Enterprise Edition Symantec Protection Suite Enterprise Edition Endpoint Security Symantec Endpoint Protection Symantec Network Access Control Self Enforcement NEW! Symantec AntiVirus for Mac Symantec AntiVirus for Linux Symantec Mobile AntiVirus for Windows Mobile Messaging & Web Security Symantec Brightmail Gateway Symantec Web Gateway NEW! Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Domino Symantec Premium AntiSpam Backup and Recovery Symantec Backup Exec System Recovery Desktop Edition NEW! 14

Award Modular BIOS v6.473, an Energy Star Ally Copyright {C} 1994-2003, Award Software Inc. System Recovery The New, Automated Way Pentium 4 Centrino Mobile Processor Memory Test: 1024MB OK Award Plug and Play BIOS Extension v1.0a Copyright {C} 1995, Award Software Inc. Detecting primary master hard disk... FAILED Device I/O error: Unable to read sector 0 on primary hard disk Press any key to reboot... Press DEL to enter SETUP 2/16/2008 W3HU4-877FH4-08

Are Your Systems Indestructible? 85% of Systems Are Not Backed Up 53% of Loss Due to H/W or S/W 38% of Loss Due to Human Error Typical Recovery Time 6 8 hrs. You DO NOT need a major disaster to need rapid system recovery. Everyday occurrences cause a system loss. 17

Complete Protection For Any Size Organization NetBackup 500+ employees >$150m revenue Backup Exec 50-1000s of servers Specialized backup team 100-999 employees Data center focus Backup Exec System Recovery $50-$150m revenue 3-100 s of servers 10-99 employees <$50m revenue 1-4 servers 1-2 general IT staff Windows server focus Offsite/ Vault No IT staff Windows desktop & server Data Center Data Center Main/Remote Office Remote Office Remote Office Server, Desktops & Laptops Servers, Desktops & Laptops Desktops & Laptops Desktops & Laptops Desktops & Laptops Symantec Backup Exec 2010 18

A History of Leadership in the Backup & Archive Market for Over a Decade Leading Customer Validation 99% of the Fortune 500 90% of the Global 2000 1.5 Million savvy small / medium businesses #1 Backup Market Share #1 Archiving Market Share 10 of 10 leading telecommunication companies 10 of 10 leading healthcare companies 10 of 10 leading financial services companies Leading Analyst Recognition Leading Backup Vision Leading Archiving Vision 19

Net Backup 7 20

Symantec s Prescription For Better Data Protection Deduplicate Everywhere To Rationalize Infrastructure Archive for Long Term Storage & Improve Backup Performance Centralize Management To Reduce Complexity 21

Deduplicate Everywhere, Closer to the Source Primary Storage Client Servers Media Server Backup Appliance Archive data off primary storage & dedupe data Deduplicate at the client Deduplicate at the media server New in NetBackup 7 Integrate with appliances via OpenStorage RESULTS Faster backup & recovery Reduced bandwidth Less storage requirements Optimized search/discovery 22

Dedupe for any Enterprise Easy & Cost Effective Fully Integrated Easy to Configure NetBackup Client Configuration Cost Effective & Flexible NetBackup 7 SAN/ DAS Commodity disk Front-end licensing - Keep as many copies as you want Proven Technology Site 1 SAN/ DAS NetBackup 7 Replication Site 2 PureDisk Storage NetBackup 7 * Assumes replication 23

What Sets NetBackup Deduplication Apart Built-in, easy to use No expensive hardware Lower TCO than Appliances Proven Product Line, Proven Technology Works out of the box. No additional setup required Use commodity hardware of choice Up to 50-70% less than appliance solutions (assumes replication) Built into NetBackup, based on PureDisk Dedupe Technology Investment Protection Dedupe value wherever needed- Source, Media Server, Appliance 24

If You Like Deduplication You ll Love Archiving Improve Backup & Search Regardless of NetBackup Version No Archiving Archiving Email / SharePoint / File Servers 200 GB 15MB/s or 54GB/h Email / SharePoint / File Servers 100 GB ~4 hrs 80 GB ~2 hrs Enterprise Vault Backups Backups A typical client with 200GB of data would take ~4 hours to complete a full backup. With archiving content is reduced by 50% leaving 100GB of data backed up in ~2 hrs. Archive backed up separately. 25

NetBackup 7 Simple & Comprehensive Protection for Virtual Machines Improve How You Protect Any Virtual Machine with NetBackup Shorten Backup Time by 50-90% old 90% new Client-side deduplication & unique incremental backup support Lower impact backups for Hyper-V & VMware (using vstorage API) Find & Recover Files Instantly Recovery VM File 1.. File 2.. VM Backup Storage Simple recovery process - Guided VM recovery Instant file recovery - ANY type of backup disk tape Greater Storage Efficiency VM VM VM Hypervisor Deduplication across physical & virtual Store less with VMware block optimization 26

Better Disaster Recovery for Global Data Protection One Console To View Distributed Backup Information Replicate & Store 80% Less Data Duplication Recover terabytes of data in seconds from anywhere 27

Move Up to 80% Less Data With Optimized Duplication One Policy for Backup & DR Copies Site 1 Site 2 SAN/ DAS Optimized Duplication Copy 1: 14 days Copy 2: 21 days Copy 3: 60 days OST Optimized Duplication OST Copy 1: 14 days Copy 2: 21 days OST=OpenStorage Appliance (e.g., Data Domain) 28

Improve Backup Operations With NetBackup OpsCenter and OpsCenter Analytics Monitoring, Reporting & Alerts Across Sites Consolidate Backup & Archive Reports NetBackup, Backup Exec, & Enterprise Vault OpsCenter Analytics Turn on SLAs, forecasting with a key IMPROVED USABILITY 29

NetBackup 7 Other Enhancements Full Support for New Windows Platforms and Applications Full support for Windows Server 2008 R2 Full support for Exchange 2010 and Enterprise Vault 8 Oracle Cloning Use a backup to reduce the impact of cloning on production databases Simplified Licensing License Virtual Machines Protection per physical host (no OS distinction) New Terabyte Based Licensing Model that includes clients 30

FileStore 5.5 31

FileStore Continues Symantec s File System Leadership File System 1991 Clustered File System 2000 2008 FileStore App App App / Clustered NFS App SF SF CFS FileStore Storage Foundation First journaled UNIX file system CFS Mission critical transactional apps (RAC, SAP, Tibco) FileStore Enterprise and high performance file serving 32

FTP Clients CIFS NFS A Scalable Architecture FileStore NAS Storage Arrays FC-SAN / SAS / iscsi LAN / WAN / Cloud FileStore Core Technology ( up to 16 nodes) Veritas Cluster File System Veritas Cluster Volume Mgr Veritas Cluster Server 33

Delivery Options FileStore can be delivered in two ways: 1 Soft-appliance: A software package that can be installed on off-the-shelf hardware. Reference configurations available for major hardware vendors. 2 OEM: System vendors offer storage solutions based on Symantec FileStore products. 34

Exceptional Scaling of Both Performance and Capacity Performance Scaling: Industry-leading performance Up to 16 nodes serving a common set of data Excellent small and large file performance Capacity Scaling: 256TB file systems 200 million files per file system 2PB clusters Availability: <20sec failover times SPECsfs 2008 IOPS Ranking #1 FileStore 176,728 ops/sec #2 BlueArc 146K ops/sec #3 HP 135K ops/sec (using VxFS) #5 NetApp FAS6080 120K ops/sec Linear scaling 35 35

Drive Price An Information Services Platform Dynamic Storage Tiering Intelligently move data to low-cost disk (and back) Anti-Virus Reduce costs with native virus scanning SSD SAS SATA AV Symantec AV FileStore Backup Decrease backup windows with embedded NetBackup Higher performance Simpler administration Fewer servers required 36

Performance Requirement A Flexible NAS Platform That Fits Many Workloads FileStore Customers * Regional Hospital (PACS) * Internet Game (Live Game Sessions) * University (Document Library) * Top-3 Mobile Provider (Media Delivery) * Top-10 Internet Retailer (Online Images) Why is FileStore used so broadly? Performance/feature benefits across workloads. Easy scaling from small to large workloads. Best in class price / performance 10TB Scale Requirement 2PB 37

Appendix 38

Account Manager Jan Harald Østbye janharald_ostbye@symantec.com DDI: +47 6783 8907 Mobile: +47 4801 8907 Specialist Sales Endpoint Management/Security Roger Ison-Haug roger_isonhaug@symantec.com Tlf: 4801 8914 Symantec Services Ulf Trapp ulf_trapp@symantec.com Tlf: 4801 8904 Technical Support Tlf: +47 23 16 21 23 enterprise_support@symantec.com http://mysupport.symantec.com Customer Care Tlf: +47 23 16 21 22 emea_customercare@symantec.com Presales Manager, Datacenter Kåre Juvkam kare_juvkam@symantec.com Tlf: 4801 8922 Security Gunnar Kopperud gunnar_kopperud@symantec.com Tlf: 4801 8908 ILM/GRC Paul-Christian Garpe paulchristian_garpe@symantec.com Tlf: 4801 8903 39

Source: Industry Recognition 1 IDC, Worldwide Endpoint Security Software 2007-2011 Forecast and 2006 Vendor Shares: How Suite It Is, Kolodgy, December 2007 2 Based on new license revenue, Gartner Dataquest, Market Share: Security Software, Worldwide, 2006, Latimer-Livingston, July 2007 3 IDC, Worldwide Secure Content and Threat Management 2007-2011 Forecast and 2006 Vendor Shares:1+1=4, #207523, June 2007 4 IDC, Worldwide Data Protection and Recovery Software 2006 Vendor Shares, Doc # 209653, December 2007 5 Gartner Report, Market Share: Storage Management Software, Worldwide, 2006, Alan Dayley, January, 1, 2006 6 IDC, Worldwide Messaging Security 2007 2011 Forecast and 2006 Vendor Shares: DLP, Encryption, and Hosted Services Heating Up, Dec. 2007 7 IDC, Worldwide Email Archiving Applications 2007-2011 Forecast and 2006 Vendor Shares, May 2007 8 IDC, Worldwide Software Distribution 2007 2011 Forecast and 2006 Vendor Shares, Broussard, December 2007 Doc #210004 9 IDC, Worldwide Security and Vulnerability Management Software 2007 2011 Forecast and Analysis, Kolodgy-Ryan, Aug 2 007 Doc #207658 10 Gartner, Magic Quadrant for Endpoint Protection Platforms, Firstbrook, Hallawell, Girard, MacDonald, December 21, 2007 11 Gartner, Magic Quadrant for E-Mail Active Archiving, 2006; Carolyn DiCenzo & Kenneth Chin; May 12, 2006 12 Gartner, Magic Quadrant for Content Monitoring and Filtering for Data Loss Prevention Q4 2007, April 2007 13 Gartner, Magic Quadrant for E-mail Security Boundary, 2006; Peter Firstbrook, Arabella Hallawell Sept 25, 2006 14 Gartner, Magic Quadrant for PC Life Cycle Configuration Management, 2007; Terrence Cosgrove & Ronni J. Colville; December 21, 2007 15 Gartner, Magic Quadrant for Storage Services, 2Q07; Adam Couture & Robert E. Passmore; May 16, 2007 16 Gartner, Magic Quadrant for Security Information and Event Management, 1Q07; Mark Nicolett & Kelly Kavangh; May 9, 2007 17 Gartner, Magic Quadrant for MSSPs, North America, 1H07, Kelly M. Kavanagh, John Pescatore, August 2007 18 The Forrester Wave : Enterprise Database Auditing And Real-Time Protection, Q4 2007, October 26, 2007 19 The Forrester Wave : Client Management Suites, Q3 2007, July 24, 2007 20 The Forrester Wave : Enterprise Security Information Management, Dec, 2006 21 The Forrester Wave : Information Leak Prevention Q4, Dec. 15, 2006 22 The Forrester Wave : IT Asset Management, Q3 2006, August 4, 2006 23 The Forrester Wave : Message Archiving Software, Q1 2008, February 14, 2008 * The Magic Quadrant is copyrighted by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. 40

Protection Technology Comparison Enterprise Solutions Symantec Trend Micro McAfee Total Protection Protection Technology 1 Endpoint Protection Protection Suite EE Neat Suite Advanced Client Server Messaging Endpoint Essential Endpoint Endpoint Advanced Secure Business Endpoint Security Antivirus / Antispyware Desktop Firewall Intrusion Prevention 2 Generic Exploit Blocking 3 Device & Application Control Antivirus for Mac 4 Antivirus for Linux 4 Antivirus for Mobile Network Access Control Self Enforcement Messaging & Web Security Antivirus/Antispam/Antiphishing E/D/G/IM E/D/G/ - E/-/-/- E/D/-/- E/D/-/- E/D/G/- Reputation-based spam filtering Global/Local Global/ - Global/- Content Filtering / Compliance E/D/G/IM E/D/G/- E/-/-/- E/D/-/- E/D/-/- E/D/G- Data Loss Prevention MS Exchange Lotus Domino Messaging Gateway software subscription Web Gateway software subscription Backup and Recovery Backup Live Desktops & Laptops Restore to any Hardware Threat Driven Backups Legend: E = Available for Microsoft Exchange D = Available on Domino G = Available as gateway or hosted solution IM = Available for Instant Messaging

FileStore Storage Tiering Single name space: one filesystem. dual storage tiers. Administrator defines policy on when to relocate files based on access time. 30 / 60 / 90 / #x day policy options for time. Place files in secondary tiers and promote to primary based on I/O throughput. Manually move files/folders as needed. Files go where they should when they should automatically and transparently. /one_file_system /sales /financial /development /current /forecast /2005 /2004 /new_app /history FC Attach Storage TIER 1 SSD / FC FC TIER 2 SATA SATA 42

FileStore NFS connection Management NFS Clients DNS based load balancing VIP failover by VCS Round Robin DNS provides balanced access to nodes. VIP1 VIP2 VIP3 VIP4 VIP5 VIP6 VIP7 VIP8 VIP9 VIP10 VIP11 VIP12 VIP13 VIP14 VIP15 VIP16 Evenly allocate Virtual IP addresses across active nodes FS Node n FS Node n FS Node n FS Node n FS Node n FS Node n VCS Monitored Resources FS Node n FS Node n Administrator can move VIPs to new nodes Always-on NFS/CIFS serving IP addresses Cluster File System NFS shares export on all nodes creating a single namespace /vx/nfs_share 43