Your SlideShare is downloading. ×
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Virtualizing Business cCritical Applications_ Darren Thomson
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Virtualizing Business cCritical Applications_ Darren Thomson

346

Published on

Presented at the Arrow ECS Accelerate your Virtualisation Business with Symantec and VMware event, 18th January 2012 at Williams F1 Conference Centre

Presented at the Arrow ECS Accelerate your Virtualisation Business with Symantec and VMware event, 18th January 2012 at Williams F1 Conference Centre

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
346
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Walk-in Slide. [Executive SummaryThe ability to harness technology to deliver new customer services, operate more efficiently, and facilitate collaboration that leads to innovation is a key attribute of successful organizations. Server virtualization has transformed the IT industry through its ability to both reduce hardware and operating costs and increase IT agility and responsiveness. Most organizations today have virtualized some of their application workloads and are planning to virtualize more. As they do so, they typically progress from virtualizing less important applications to increasingly critical applications that are the backbone of their organizations. Virtualizing these business-critical applications can deliver significant strategic benefits, and, along with consolidation, is a key stepping-stone on the way to a cloud model of IT service delivery. But it also presents unique challenges in the areas of security, resiliency, performance, and operational efficiency. Symantec solutions for business-critical virtualization are optimized for the leading virtualization platforms, and provide the advanced security, availability, and storage management capabilities required to virtualize business-critical applications with confidence. ]
  • IT Must Evolve to Meet New Demands We see a significant change in the role of IT in enterprises from system-centric to information-centric. To date, IT has brought significant productivity benefits to organizations by automating key business processes and driving efficiencies. This landscape was characterized by various business applications working centralized databases, supported by physical infrastructure. A lot of what IT departments did was focused on managing systems, including PCs, servers, storage, and networks. Today, the role of IT is starting look very different. Organizations are looking for the next level of productivity and business agility by improving collaboration and knowledge sharing. They are looking to better connect their employees, teams, business partners and customers to each other. This is changing the nature of data into highly distributed, largely unstructured information. The infrastructure is moving virtual within the company or turning into an external cloud. Instead of focusing of physical systems management, the role of IT is transforming into more information-centric tasks with governance, policies, risks, and controls. This evolution is also apparent in how applications are being designed. Historically, the entire ‘stack’ from database, OS, server, storage were defined per application. Today applications are being written to run on virtually any platform and by design will be agile to move from one system to another based on events (performance, availability, workload, etc). This balance of ‘keeping the lights on’ and innovating continues be true as IT organizations look to reduce complexity and increase efficiency so a larger portion of the IT budget can be devoted to embracing the consumerization of IT and enabling the business.
  • Most organizations follow a similar adoption path as they deploy virtualization and gain experience with the technology. Initial virtualization projects often focus on internal IT applications such as test and development environments. Early wins in these areas are often followed by virtualization of IT production resources such as file, print, and domain name servers. As organizations gain experience with virtualization and their confidence grows, the next phase of adoption is typically centered on business production applications.It is at this point in the journey that quality of service and resiliency become increasingly important. Most organizations tend to start first with less critical departmental business applications and then progress to virtualizing more important applications with increasingly stringent SLAs. Along the way, they need to address a number of technical and operational challenges as they adopt the new approaches to high availability, disaster recovery, security, and related service-level processes that virtualization requires. While most mid-to-large enterprises are at different stages of their own virtualization journeys, most also want to aggressively increase the adoption of virtualization in their environments as a way to gain further cost savings and to progress toward the more strategic objective of transforming their IT service delivery capabilities. In December of 2010, the analyst firm Gartner estimated that, globally, about 20-25% of application workloads had been virtualized. They predicted that this would grow to 75% by 2014. These numbers reflect the fact, that, while server virtualization is clearly a mainstream technology, there remains much to be done to realize its full benefits, and most enterprises are today dealing with the challenges of making the next wave of virtualization adoption a reality. Strategic IT thinkersalso view virtualization as a foundational technology for evolving their data centers to a cloud model of IT service delivery. Indeed, virtualization, when properly implemented, makes it possible to consolidate and automate IT infrastructure and processes in a way that has been difficult or impossible with less flexible infrastructure technologies and architectural approaches. The right virtualization strategy can help an IT organization evolve its data center from islands of disparate application infrastructure to a consolidated, highly automated, mission-critical IT service delivery platform. This model of IT as a service, or private cloud, also facilitates more rapid, cost-effective, and secure adoption of external cloud services, including SaaS application and public and virtual private platform and infrastructure as a service solutions (PaaS and IaaS). It’s for this reason that we like to say that “the road to the Cloud goes straight through business-critical virtualization.”.
  • Before we go too far, its worth stepping back and thinking about the promise of virtualization, and what most organizations are hoping to achieve with server virtualization technology in particular. Today, most IT organizations are already leveraging server virtualization to reduce infrastructure costs and to make it easier to provision and manage servers and the applications that run on them. Many of them have realized significant benefits as a result, including a reduction in both capex from server consolidation,and opex expenditures, through easier patching, a reduction in the amount of downtime, and faster delivery of new applications as a result of more efficient test and development processes. But while the ROI from server consolidation and easier provisioning and management are significant, the promise of virtualization goes much further. Beyond tactical cost savings, virtualization is an enabling technology that has the potential to transform IT service delivery by dramatically improving service levels, improving IT’s ability to respond to changing business requirements, and at the same time reducing the costs of developing, deploying, and managing application infrastructure and operations. Strategic IT leaders also see virtualization as a foundational technology for evolving their data centers to a cloud model of IT service delivery. The right virtualization strategy can help an IT organization evolve its data center from islands of disparate application infrastructure to a consolidated, highly automated, mission-critical IT service delivery platform. Virtualization, when properly implemented, can make it possible to standardize, consolidate, and automate IT infrastructure and processes in a way that has been difficult or impossible with less flexible infrastructure technologies and architectural approaches.
  • Challenges in Virtualizing Business-critical ApplicationsBusiness-critical applications include a wide range of services that line of business and IT users rely on to collaborate and get their jobs done and which the organization depends on to interact with customers and partners and transact business. They include things like email, content management, e-commerce systems, process control systems, and database applications such as ERP, CRM, and supply-chain management. They can be off-the-shelf or custom built, and they often have multi-tier architectures that involve complex dependency chains with different processes running on different servers, including mixed environments of physical and virtual servers. For example, database applications such as SAP, Oracle, and SQL*Server are often deployed across different server tiers, with the middleware tier running on one set of servers and the database tier on another. So why take on the additional challenges of virtualizing these more complex and important applications? Well, as discussed previously, many organizations seek to virtualize more of their infrastructure to derive more cost savings and operational efficiencies from their existing investments. Well-known benefits of virtualization such as server consolidation, easier patching and upgrades, and eliminating planned downtime are just as important for business production apps as they are for IT production apps, if not more so. And, as we’ve seen, virtualizing more application workloads is a critical strategy to reach the critical mass necessary for true IT transformation. Processor architectures have also matured to make these projects more feasible than ever before. For example, multi-core processing in x86 platforms has matured, offering better access to on-chip memory and I/O, and providing better workload resource balancing.The benefits of virtualizing business-critical applications are many, but doing so also introduces additional challenges that must be addressed, including complexity, storage costs, availability, security, and performance.The dynamic nature and high density of virtual environments introduce new management and governance challenges. Particularly when virtualizing business-critical applications, these challenges must be overcome to meet the service level requirements typical of such applications, and to ensure adherence to internal and external policies.
  • [Note to presenters: In the regular flow, this slide follows our solutions slide. When co-presenting with VMware, it can be used as the last slide and serve as the“walk-up” slide when introducing and handing off to the VMware speaker. ]Another thing we’ve done to optimize our solutions for business-critical virtualization is to partner closely with VMware. Symantec and VMware have had a close partnership for many years now, and it has become increasingly important for both of our respective organizations as virtualization has matured and is increasingly being used for more important applications and data, where service-level issues such as security, backup and recovery, HA/DR, storage, and governance are so important.Symantec and VMware engineering teams have partnered in a number of areas to drive API-level integration, optimize performance, and deliver complementary solutions to our joint customers.
  • So let’s talk about the big picture, and how IT teams who are thinking about real transformation, not just tactical cost savings, are thinking about evolving their IT operations. IT organizations seeking to achieve the strategic promise of virtualization and to build a foundation for cloud computing differ in their near-term tactics and project priorities, but they tend to follow three broad strategic objectives: * Virtualize more of the infrastructure* Consolidate application silos to shared pools of compute resources* Automate provisioning and service-level processesVirtualize More of the InfrastructureTransforming the data center to operate with the level of scale, automation, elasticity, and cost-effectiveness promised by virtualization and cloud computing means virtualizing more applications. It is important to reach critical mass in the amount of virtualized infrastructure to be able to fully realize the agility and cost saving benefits that virtualization can provide. Increasing the overall percentage of virtualization requires organizations to deal with the challenges of virtualizing even the most critical applications that have the most demanding service-level requirements. Indeed, for most organizations, the road to the hybrid cloud runs straight through business-critical virtualization. Consolidate application infrastructure onto Shared Resource PoolsVirtualizing silos of application infrastructure will provide tactical hardware savings and operational efficiencies, but real transformation requires more. To achieve true data center transformation, leading organizations are creating consolidated pools of server, network, and storage capacity that can be leveraged for a variety of different application workloads and utilization requirements. When properly implemented, this type of consolidated private cloud architecture enables the maximum flexibility to rapidly provision new servers, dynamically allocate storage on demand, and dial up CPU capacity and transactional throughput in response to changing business requirements such as spikes in demand for an e-commerce application. The sort of shared services model can also reduce costs by increasing utilization rates and avoiding the over-provisioning that plagues more traditional IT architectures based on separate silos of application infrastructure. IncreaseAutomationIncreased virtualization and consolidation make possible the most important transformation of all, which is to dramatically increase the level of automation in the environment. Automation is the key to driving down opex costs, but also dramatically increasing IT’s ability to respond to the requirements of the business. It’s also key to increasing “agility” and accelerating the time it takes to launch new services, re-allocate resources where they’re needed most, and so on. So with these key strategies in mind, let’s drill down now on what it takes to make them a reality…
  • Another thing we’ve focused on is increasing operational visibility, which is essential for knowing what’s going on, where the risks are, and staying in control. Visibility in high-density server farms can be a real challenge. The dynamic, fluid nature of virtualized environments make it very easy to spin up new servers, move VMs from one server to another. While this flexibility offers a lot of benefits, it also creates challenges for things like monitoring and managing storage allocations, maintaining secure server zones, instrumenting backup processes, and so on. To address these types of challenges, we’ve introduced a set of technologies and new features that increase visibility in virtual environments. We call these capabilites V-Ray, and, as the name suggests, they are designed to provide increased levels of visibility so that you can more effectively manage business-critical virtual infrastructure. For example, V-Ray technologies can auto-detect new VMs in the environment and apply appropriate backup protections in accordance with policy, or flag security exposures that might be a problem in an application that is subject to regulatory compliance issues. They can provide insight and visibility into what’s really going on with the state of an application that spans physical and virtual server tiers, and they can provide visibility and control over complex storage mappings and allocations. - See inside a VM to monitor the heartbeat of application processes for complex multi-tier apps. - Understand storage allocations and utilization from the app running in a virtual machine all the way to the spindle in the array. - Get visibility across multiple sets of deduplicated data to pinpoint and retrieve individual files. - Scan offline VMDK files for security risks before you instantiate them in your production server environment. - …and on and on.
  • To help address the challenges of business-critical virtualization, Symantec has focused a great deal of R&D innovation around optimizing our solutions to help you take virtualization as far as it can go. Symantec Solutions for Business-critical VirtualizationSymantec solutions for business-critical virtualization are optimized for VMware and provide the advanced security, availability, and storage management capabilities you need to virtualize business-critical applications with confidence. With Symantec solutions, you can instrument the virtual data center and orchestrate service-level processes in response to dynamic changes in resource allocation. Automate the discovery of virtual machines and enforce existing security, backup, and storage allocation policies. Symantec solutions help reduce the risks of increased virtual attack surface by extending your existing security policies and with easy deployments and centralized management. Auto-detect rogue virtual machines and scan offline virtual machines to detect vulnerabilities before they cause a problem. Symantec’s advanced storage management solutions put you in control. Leverage point-and-click deduplication everywhere. Reclaim orphaned storage. Virtualize pooled storage and leverage dynamic tiering and provisioning across heterogeneous arrays. Deliver storage as a service and make chargebacks a reality. With Symantec’s advanced technologies, you’ll gain the visibility and control required to automate service level processes, accelerate server and desktop virtualization deployments, and reduce the cost and complexity of managing and protecting high-density virtual and physical infrastructure.
  • To help address the challenges of business-critical virtualization, Symantec has focused a great deal of R&D innovation around optimizing our solutions to help you take virtualization as far as it can go. Symantec Solutions for Business-critical VirtualizationSymantec solutions for business-critical virtualization are optimized for VMware and provide the advanced security, availability, and storage management capabilities you need to virtualize business-critical applications with confidence. With Symantec solutions, you can instrument the virtual data center and orchestrate service-level processes in response to dynamic changes in resource allocation. Automate the discovery of virtual machines and enforce existing security, backup, and storage allocation policies. Symantec solutions help reduce the risks of increased virtual attack surface by extending your existing security policies and with easy deployments and centralized management. Auto-detect rogue virtual machines and scan offline virtual machines to detect vulnerabilities before they cause a problem. Symantec’s advanced storage management solutions put you in control. Leverage point-and-click deduplication everywhere. Reclaim orphaned storage. Virtualize pooled storage and leverage dynamic tiering and provisioning across heterogeneous arrays. Deliver storage as a service and make chargebacks a reality. With Symantec’s advanced technologies, you’ll gain the visibility and control required to automate service level processes, accelerate server and desktop virtualization deployments, and reduce the cost and complexity of managing and protecting high-density virtual and physical infrastructure.
  • Lets talk about availability challenges in a virtual environments, especially for the kinds of business-critical apps we’ve been talking about today. This slide here shows survey results from an IDC survey that asked about key challenges in managing virtualized servers. The #1 issue highlighted was “Ensuring Application Availability”. Now, many of you might be thinking, “wait a minute…virtualization improves availability.” And that’s absolutely true. Virtualization opens up a whole bunch of new ways to provide HA and DR, with things like physical to virtual failover, virtual-to-virtual, and so on. And virtualization is a great way to significantly reduce both planned AND unplanned downtime. But what many users are finding is that when they set out to virtualize business-critical apps, they’ve still been hitting some significant challenges. Things like e-Commerce store fronts running on Web Logic and Oracle, or SQL*Server apps, Exchange, Sharepoint, Oracle apps and SAP. These types of applications typically have stringent SLAs and complex, multi-tier architectures. To virtualize more complex business-critical applications, though, the native capabilities of virtualization itself fall short of providing a complete solution for high availability and disaster recovery. Additional steps are required to ensure high availability for applications such as Microsoft Exchange and Sharepoint, Oracle Financials, SAP, and Weblogic. For example, when a physical server goes down, VM’s running on that server can be gracefully failed over to another without service interruption. However, business-critical apps consist of complex groups of processes, all of which are running inside virtual machines. Any one of these processes might go down, thus causing the entire app to be unavailable, even though the guest and physical server on which they are deployed are still running. High availability solutions must address these challenges, and the consolidation of critical IT assets on fewer servers means makes ensuring HA and DR an imperative for avoiding the risks of unplanned downtime. To address these issues, some intrepid architects have tried to do things like recreate clustering solutions by running things like MS cluster server inside VMs. But this sort of thing is brittle, and error-prone, and it has to be fixed and static to work, so negates all the flexibility that virtualization inherently provides. These challenges of monitoring applications and ensuring high availability are something that Symantec has many years of experience with. Our solutions like Veritas Cluster Server have been the gold standard for clustering and automated HA and DR for many years. So we set out to work with VMware to come up with a solution to the challenges of HA for business-critical apps. The result of that collaboration is a new solution that we came out with last year called Symantec ApplicationHA.
  • As we saw in the previous slide, each of the application components have been made Highly Available and we can view each of these components through VOM as individual Service Groups. All we are going to do now is to create a new Virtual Business Service through VOM and pull in these service groups into the Service. Define the order in which they need to be started up – db first, app next and web last. Additionally, define how you want your App to behave when there’s a HA event in the DB tier and how you want the web server to behave when there’s an event in the App tier. And that’s it your VBS is defined, configured and ready to simplify the management of the multi-tier application! Again through VOM, you can now view the Virtual Business Service as one single tier.
  • To help address the challenges of business-critical virtualization, Symantec has focused a great deal of R&D innovation around optimizing our solutions to help you take virtualization as far as it can go. Symantec Solutions for Business-critical VirtualizationSymantec solutions for business-critical virtualization are optimized for VMware and provide the advanced security, availability, and storage management capabilities you need to virtualize business-critical applications with confidence. With Symantec solutions, you can instrument the virtual data center and orchestrate service-level processes in response to dynamic changes in resource allocation. Automate the discovery of virtual machines and enforce existing security, backup, and storage allocation policies. Symantec solutions help reduce the risks of increased virtual attack surface by extending your existing security policies and with easy deployments and centralized management. Auto-detect rogue virtual machines and scan offline virtual machines to detect vulnerabilities before they cause a problem. Symantec’s advanced storage management solutions put you in control. Leverage point-and-click deduplication everywhere. Reclaim orphaned storage. Virtualize pooled storage and leverage dynamic tiering and provisioning across heterogeneous arrays. Deliver storage as a service and make chargebacks a reality. With Symantec’s advanced technologies, you’ll gain the visibility and control required to automate service level processes, accelerate server and desktop virtualization deployments, and reduce the cost and complexity of managing and protecting high-density virtual and physical infrastructure.
  • Network performance is boosted by eliminating up to 90% of scan volume.
  • Recent testing performed by Dennis Labs demonstrates that Symantec Endpoint Protection 12 running in a VDI environment defended against more real-world threats than comparable solutions from McAfee and Trend Micro.
  • To help address the challenges of business-critical virtualization, Symantec has focused a great deal of R&D innovation around optimizing our solutions to help you take virtualization as far as it can go. Symantec Solutions for Business-critical VirtualizationSymantec solutions for business-critical virtualization are optimized for VMware and provide the advanced security, availability, and storage management capabilities you need to virtualize business-critical applications with confidence. With Symantec solutions, you can instrument the virtual data center and orchestrate service-level processes in response to dynamic changes in resource allocation. Automate the discovery of virtual machines and enforce existing security, backup, and storage allocation policies. Symantec solutions help reduce the risks of increased virtual attack surface by extending your existing security policies and with easy deployments and centralized management. Auto-detect rogue virtual machines and scan offline virtual machines to detect vulnerabilities before they cause a problem. Symantec’s advanced storage management solutions put you in control. Leverage point-and-click deduplication everywhere. Reclaim orphaned storage. Virtualize pooled storage and leverage dynamic tiering and provisioning across heterogeneous arrays. Deliver storage as a service and make chargebacks a reality. With Symantec’s advanced technologies, you’ll gain the visibility and control required to automate service level processes, accelerate server and desktop virtualization deployments, and reduce the cost and complexity of managing and protecting high-density virtual and physical infrastructure.
  • So to wrap up, Virtualization has lots of tactical benefits, but the promise of virtualization goes much further. It is a strategic enabling technology that can literally transform IT service delivery. It also is an important foundational technology for cloud computing. Organizations that are thinking strategically are trying to 1) virtualize more of their infrastructure, 2) drive consolidation on shared server and storage resources, and 3) automate more of their provisioning and service-level processes. - Getting the most out of virtualization means virtualizing business-critical applications. And that means addressing some of the challenges so that you can get the most from your virtualization benefits. Challenges like storage management, security, resiliency, and compliance. Symantec and VMware are partnering to help customers achieve their strategic objectives. To transform data centers and lay the foundation for adoption of a wide range of cloud-based services that can reduce operating costs, and drive more IT agility.
  • Transcript

    • 1. The Last Mile…Darren ThomsonCTO, Symantec EMEA
    • 2. Today’s ObjectivesMake Clear Our Product StrategyGive Insight Into Our Experiences In The Virtualization SpaceShare Our Approach & Value Proposition In Virtualization 2
    • 3. The Need for a More Information-centric Approach System-Centric Information-Centric • Transactional • Collaborative • Structured Data • Unstructured • On-premise • Distributed 3
    • 4. The Symantec Strategic “Blueprint”An Information-Centric Model Policy Compliance Reporting Identity Remediation Classification Threats Encryption Ownership Discovery 4
    • 5. Symantec Architectural Blueprinting Policy Compliance Reporting Identity Remediation Classification Threats Encryption Ownership Discovery 5
    • 6. The Virtualization Journey Cloud Business- critical Apps Line of Business Increasing… Apps • IT Confidence File, Print, D • Quality of Service NS • Resiliency and Test & Dev Compliance • Business Agility The road to the Cloud goes straight through business-critical virtualization…Virtualizing Business-critical Applications 6
    • 7. IT AgilityThe Promise of VirtualizationVirtualInfrastructure IT CostsVirtualizing Business-critical Applications 7
    • 8. A Recipe For Good IT Strategy “Improve operational efficiency whilst maintaining an appropriate risk posture”
    • 9. Challenges of Business-criticalVirtualization Performance Availability Modernizing for high- density environments.. Security …across virtual and Storage Mgmt physicalVirtualizing Business-critical Applications 9
    • 10. Symantec and VMware Collaborative partnership delivering critical solutions: • Data Protection • High Availability + • Storage Management • Security • Systems Management • Endpoint Security Business-critical • NFS File Storage Virtualization Virtualizing Business-critical Applications 10
    • 11. Hybrid CloudEvolving from Silos toHybrid CloudKey Strategies:1. Virtualize more application Silos of Application Infrastructure infrastructure2. Consolidate application silos to a service delivery platform3. Increase automationVirtualizing Business-critical Applications 11
    • 12. Virtualizing Business-critical Applications 12
    • 13. Symantec Solutions for Business-critical Virtualization Endpoint Virtualization Data Protection Security Storage HA/DR Management Storage VirtualizationSymantec Business-critical Virtualization Solutions 13
    • 14. Symantec Solutions for Business-critical Virtualization Endpoint Virtualization Data Protection Security Storage HA/DR Management Storage VirtualizationSymantec Business-critical Virtualization Solutions 14
    • 15. High Availability Modernized for Business-critical Virtualization• Advanced monitoring for multi-tier applications Symantec ApplicationHA Exchange Sharepoint• Integrated with VMware Custom Apps Web Logic vCenter console Oracle SQL*Server• Policy-driven restart IIS SAP coordinated with VMware HA and vMotionVirtualizing Business-critical Applications 15
    • 16. Virtualization High Availability Challenges Business- critical SLA’s …. With Virtual Business ServicesVirtualizing Business-critical Applications 16
    • 17. Virtual Business Services Billing Web server Service Service Group Web Group Web Veritas Operations Manager VM VM Billing Virtual Business Service ApplicationHA Application Service Group App Web Server SG app app app IP Application Server SG VCS Database Service Group Database SG DB IP FS Start/Stop Order VVR Inter-cluster fault policy VCSBusiness Critical Applications Journey to the Cloud 17
    • 18. Symantec Solutions for Business-critical Virtualization Endpoint Virtualization Data Protection Security Storage HA/DR Management Storage VirtualizationSymantec Business-critical Virtualization Solutions 18
    • 19. The Virtualization Security Challenge• Threat landscape constantly evolving– and more toxic than ever• Security solutions can’t compromise run-time performance• High density increases operational complexity• Security model predicted on physical hardware have to changeVirtualizing Business-critical Applications 19
    • 20. Advanced Security for VMware Endpoints• Symantec Endpoint Protection Virtual Image • Eliminates “AV storms” Exception • Improves performance resulting in a 10x increase in VM density Resource Shared Insight Leveling Disk I/O Powered Cache ↓ by up by to 90% Insight Maximizes performance and density without Offline Virtual Client sacrificing security Image Tagging Scanner Virtualizing Business-critical Applications 20
    • 21. Security for VMwareBest Protection 12% 4% 40% Compromised 100% Neutralized 84% Defended 60% Symantec Endpoint Trend Micro McAfee MOVE + Protection OfficeScan HIPS + Site AdvisorVirtualizing Business-critical Applications 21
    • 22. Symantec™ Global Intelligence Network Identifies more threats, takes action faster & prevents impact Calgary, Alberta Dublin, Ireland Tokyo, Japan San Francisco, CA Mountain View, CA Austin, TX Chengdu, China Culver City, CA Taipei, Taiwan Chennai, India Pune, India Worldwide Coverage Global Scope and Scale 24x7 Event Logging Rapid DetectionAttack Activity Malware Intelligence Vulnerabilities Spam/Phishing• 240,000 sensors • 133M • 40,000+ vulnerabilities • 5M decoy accounts• 200+ countries client, server, gateways • 14,000 vendors • 8B+ email messages/day monitored • 105,000 technologies • 1B+ web requests/day • Global coverage Preemptive Security Alerts Information Protection Threat Triggered Actions Virtualizing Business-critical Applications 22
    • 23. Symantec Solutions for Business-critical Virtualization Endpoint Virtualization Data Protection Security Storage HA/DR Management Storage VirtualizationSymantec Business-critical Virtualization Solutions 23
    • 24. The Journey to the Cloud GoesStraight through Business-critical Virtualization Public Cloud Saas, PaaS, IaaS Storage, Security, Backu Clouds p, DR Cloud Workload Management Hybrid Cloud Resiliency & Compliance Virtual Private/ Community Clouds Consolidation & Automation Virtualization • Evolve from server virtualization to hybrid cloud service delivery • Leverage public cloud services with confidence IT as a Service: Get There with Fujitsu & Symantec.Virtualizing Business-critical Applications 24
    • 25. Thank you.Virtualizing Business-critical Applications 25

    ×