SlideShare a Scribd company logo
1 of 25
The Last Mile…




Darren Thomson
CTO, Symantec EMEA
Today’s Objectives




Make Clear Our Product Strategy
Give Insight Into Our Experiences In The Virtualization Space
Share Our Approach & Value Proposition In Virtualization




                                                                2
The Need for a More Information-centric Approach




       System-Centric       Information-Centric

        • Transactional        • Collaborative
        • Structured Data      • Unstructured
        • On-premise           • Distributed



                                                   3
The Symantec Strategic “Blueprint”
An Information-Centric Model


          Policy        Compliance                              Reporting
                                      Identity    Remediation




       Classification      Threats   Encryption   Ownership     Discovery




                                                                            4
Symantec Architectural Blueprinting



         Policy        Compliance                              Reporting
                                     Identity    Remediation




      Classification      Threats   Encryption   Ownership     Discovery




                                                                           5
The Virtualization Journey
                                                                         Cloud
                                                          Business-
                                                         critical Apps
                                               Line of
                                              Business                           Increasing…
                                                Apps                             • IT Confidence
                          File, Print, D
                                                                                 • Quality of Service
                                NS
                                                                                 • Resiliency and
     Test & Dev                                                                    Compliance
                                                                                 • Business Agility



                 The road to the Cloud goes straight through
                 business-critical virtualization…

Virtualizing Business-critical Applications                                                             6
IT Agility
The Promise of Virtualization

Virtual
Infrastructure


                                              IT Costs



Virtualizing Business-critical Applications                7
A Recipe For Good IT Strategy




       “Improve operational efficiency
      whilst maintaining an appropriate
                risk posture”
Challenges of Business-critical
Virtualization

                                              Performance
                                              Availability
         Modernizing for high-
        density environments..                Security
            …across virtual and               Storage Mgmt
                 physical




Virtualizing Business-critical Applications                   9
Symantec and VMware


  Collaborative partnership delivering critical solutions:


                                                 • Data Protection
                                                 • High Availability


      +
                                                 • Storage Management
                                                 • Security
                                                 • Systems Management
                                                 • Endpoint Security
           Business-critical                     • NFS File Storage
            Virtualization

   Virtualizing Business-critical Applications                          10
Hybrid Cloud
Evolving from Silos to
Hybrid Cloud


Key Strategies:
1. Virtualize more application                Silos of Application
                                              Infrastructure
   infrastructure
2. Consolidate application silos to a
   service delivery platform
3. Increase automation



Virtualizing Business-critical Applications                                   11
Virtualizing Business-critical Applications   12
Symantec Solutions for Business-critical Virtualization


                                                        Endpoint
                                                      Virtualization
    Data Protection                                                    Security




          Storage                                                      HA/DR
        Management
                                                         Storage
                                                      Virtualization


Symantec Business-critical Virtualization Solutions                               13
Symantec Solutions for Business-critical Virtualization


                                                        Endpoint
                                                      Virtualization
    Data Protection                                                    Security




          Storage                                                      HA/DR
        Management
                                                         Storage
                                                      Virtualization


Symantec Business-critical Virtualization Solutions                               14
High Availability Modernized for Business-
critical Virtualization
• Advanced monitoring for
  multi-tier applications                     Symantec ApplicationHA
                                               Exchange     Sharepoint
• Integrated with VMware
                                              Custom Apps    Web Logic
  vCenter console
                                                Oracle      SQL*Server
• Policy-driven restart                           IIS          SAP
  coordinated with VMware HA
  and vMotion




Virtualizing Business-critical Applications                              15
Virtualization High Availability Challenges




                                                     Business-
                                                      critical
                                                       SLA’s

                                                       …. With
                                              Virtual Business Services

Virtualizing Business-critical Applications                               16
Virtual Business Services
    Billing

         Web server          Service           Service
                             Group
                              Web
                                               Group
                                                Web
                                                            Veritas Operations Manager

                              VM                   VM       Billing Virtual Business Service
                                  ApplicationHA
         Application                     Service
                                         Group
                                             App
                                                                   Web Server SG
                app   app   app


                                              IP               Application Server SG
                                         VCS

         Database                            Service
                                             Group
                                                                    Database SG
                                               DB

                                        IP             FS
                                                                   Start/Stop Order
                                              VVR
                                                               Inter-cluster fault policy
                                             VCS


Business Critical Applications' Journey to the Cloud                                           17
Symantec Solutions for Business-critical Virtualization


                                                        Endpoint
                                                      Virtualization
    Data Protection                                                    Security




          Storage                                                      HA/DR
        Management
                                                         Storage
                                                      Virtualization


Symantec Business-critical Virtualization Solutions                               18
The Virtualization Security Challenge




• Threat landscape constantly evolving– and more toxic than ever
• Security solutions can’t compromise run-time performance
• High density increases operational complexity
• Security model predicted on physical hardware have to change
Virtualizing Business-critical Applications                        19
Advanced Security for VMware Endpoints

• Symantec Endpoint
  Protection                                                     Virtual
                                                                  Image
 • Eliminates “AV storms”                                       Exception

 • Improves performance resulting
    in a 10x increase in VM density Resource                                      Shared
                                                                                   Insight
                                               Leveling
                                                                Disk I/O
                                                                Powered           Cache
                                                                ↓ by up
                                                                   by
                                                                 to 90%
                                                                 Insight
 Maximizes performance
  and density without                                 Offline
                                                                             Virtual
                                                                             Client
   sacrificing security                               Image                 Tagging
                                                     Scanner



 Virtualizing Business-critical Applications                                            20
Security for VMware
Best Protection



                                                 12%
                                                 4%                40%

                                                                                  Compromised
               100%                                                               Neutralized
                                                 84%
                                                                                  Defended
                                                                   60%




   Symantec Endpoint                          Trend Micro    McAfee MOVE +
      Protection                              OfficeScan    HIPS + Site Advisor


Virtualizing Business-critical Applications                                                 21
Symantec™ Global Intelligence Network
  Identifies more threats, takes action faster & prevents impact



                  Calgary, Alberta                               Dublin, Ireland



                                                                                                                                              Tokyo, Japan
     San Francisco, CA
      Mountain View, CA              Austin, TX                                                                    Chengdu, China
           Culver City, CA
                                                                                                                                    Taipei, Taiwan
                                                                                                              Chennai, India
                                                                                                Pune, India




               Worldwide Coverage                            Global Scope and Scale                      24x7 Event Logging

                                                                  Rapid Detection

Attack Activity                                   Malware Intelligence             Vulnerabilities                             Spam/Phishing
• 240,000 sensors               • 133M                          • 40,000+ vulnerabilities        • 5M decoy accounts
• 200+ countries                  client, server, gateways      • 14,000 vendors                 • 8B+ email messages/day
                                  monitored                     • 105,000 technologies           • 1B+ web requests/day
                                • Global coverage
           Preemptive Security Alerts              Information Protection                 Threat Triggered Actions

  Virtualizing Business-critical Applications                                                                                                        22
Symantec Solutions for Business-critical Virtualization


                                                        Endpoint
                                                      Virtualization
    Data Protection                                                    Security




          Storage                                                      HA/DR
        Management
                                                         Storage
                                                      Virtualization


Symantec Business-critical Virtualization Solutions                               23
The Journey to the Cloud Goes
Straight through Business-
critical Virtualization                                                   Public                   Cloud
                                                                          Saas, PaaS, IaaS         Storage, Security, Backu
                                                                          Clouds                   p, DR


                                                                                                         Cloud Workload
                                                                                                         Management
                                                                        Hybrid Cloud
                                                 Resiliency
                                                     &
                                                Compliance
                                                                                                 Virtual Private/ Community
                                                                                                 Clouds
                         Consolidation
                         & Automation

    Virtualization                                            • Evolve from server virtualization to hybrid cloud
                                                                service delivery
                                                              • Leverage public cloud services with confidence

                                              IT as a Service: Get There with Fujitsu & Symantec.

Virtualizing Business-critical Applications                                                                         24
Thank you.


Virtualizing Business-critical Applications   25

More Related Content

What's hot

DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDenis Gundarev
 
IBM BP Kickoff 2013 VDI Solutions
IBM BP Kickoff 2013    VDI SolutionsIBM BP Kickoff 2013    VDI Solutions
IBM BP Kickoff 2013 VDI SolutionsIBM Danmark
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15finalMahmoud Moustafa
 
Running SagePFW in a Private Cloud
Running SagePFW in a Private CloudRunning SagePFW in a Private Cloud
Running SagePFW in a Private CloudVertical Solutions
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntelAPAC
 
Nimbus ninjas final 2012 berkeley
Nimbus ninjas final 2012 berkeleyNimbus ninjas final 2012 berkeley
Nimbus ninjas final 2012 berkeleyStanford University
 
Having the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should CareHaving the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should CarePeter Coffee
 
Fujitsu 23feb2012
Fujitsu 23feb2012Fujitsu 23feb2012
Fujitsu 23feb2012Agora Group
 
Best practices for Vblock Monitoring with FusionStorm and Nimsoft
Best practices for Vblock Monitoring with FusionStorm and NimsoftBest practices for Vblock Monitoring with FusionStorm and Nimsoft
Best practices for Vblock Monitoring with FusionStorm and NimsoftCA Nimsoft
 
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Enterprise
 
Go Bigger! Manage Data Center Technologies
Go Bigger! Manage Data Center TechnologiesGo Bigger! Manage Data Center Technologies
Go Bigger! Manage Data Center Technologiesdoan_slideshares
 
Day 2 p2 - business services management
Day 2   p2 - business services managementDay 2   p2 - business services management
Day 2 p2 - business services managementLilian Schaffer
 
Enterprise Content Management and Microsoft Office SharePoint Server 2007 - U...
Enterprise Content Management and Microsoft Office SharePoint Server 2007 - U...Enterprise Content Management and Microsoft Office SharePoint Server 2007 - U...
Enterprise Content Management and Microsoft Office SharePoint Server 2007 - U...Dave Healey
 
IBM Service Management Extensions for Hybrid Cloud
IBM Service Management Extensions for Hybrid CloudIBM Service Management Extensions for Hybrid Cloud
IBM Service Management Extensions for Hybrid CloudIBM India Smarter Computing
 
Intel Cloud Summit 2012 ODCA + NAB
Intel Cloud Summit 2012 ODCA + NABIntel Cloud Summit 2012 ODCA + NAB
Intel Cloud Summit 2012 ODCA + NABIntelAPAC
 

What's hot (18)

DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat Messaoud
 
IBM BP Kickoff 2013 VDI Solutions
IBM BP Kickoff 2013    VDI SolutionsIBM BP Kickoff 2013    VDI Solutions
IBM BP Kickoff 2013 VDI Solutions
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
Running SagePFW in a Private Cloud
Running SagePFW in a Private CloudRunning SagePFW in a Private Cloud
Running SagePFW in a Private Cloud
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
Nimbus ninjas final 2012 berkeley
Nimbus ninjas final 2012 berkeleyNimbus ninjas final 2012 berkeley
Nimbus ninjas final 2012 berkeley
 
Having the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should CareHaving the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should Care
 
Fujitsu 23feb2012
Fujitsu 23feb2012Fujitsu 23feb2012
Fujitsu 23feb2012
 
Best practices for Vblock Monitoring with FusionStorm and Nimsoft
Best practices for Vblock Monitoring with FusionStorm and NimsoftBest practices for Vblock Monitoring with FusionStorm and Nimsoft
Best practices for Vblock Monitoring with FusionStorm and Nimsoft
 
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
 
Go Bigger! Manage Data Center Technologies
Go Bigger! Manage Data Center TechnologiesGo Bigger! Manage Data Center Technologies
Go Bigger! Manage Data Center Technologies
 
Day 2 p2 - business services management
Day 2   p2 - business services managementDay 2   p2 - business services management
Day 2 p2 - business services management
 
Cloud Update
Cloud UpdateCloud Update
Cloud Update
 
Enterprise Content Management and Microsoft Office SharePoint Server 2007 - U...
Enterprise Content Management and Microsoft Office SharePoint Server 2007 - U...Enterprise Content Management and Microsoft Office SharePoint Server 2007 - U...
Enterprise Content Management and Microsoft Office SharePoint Server 2007 - U...
 
IBM Service Management Extensions for Hybrid Cloud
IBM Service Management Extensions for Hybrid CloudIBM Service Management Extensions for Hybrid Cloud
IBM Service Management Extensions for Hybrid Cloud
 
Dataplex Company Overview
Dataplex Company OverviewDataplex Company Overview
Dataplex Company Overview
 
Enterprise virtual machine on IBM Cloud
Enterprise virtual machine on IBM CloudEnterprise virtual machine on IBM Cloud
Enterprise virtual machine on IBM Cloud
 
Intel Cloud Summit 2012 ODCA + NAB
Intel Cloud Summit 2012 ODCA + NABIntel Cloud Summit 2012 ODCA + NAB
Intel Cloud Summit 2012 ODCA + NAB
 

Similar to Virtualizing Business cCritical Applications_ Darren Thomson

The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMwareOpSource
 
VMware vCloud Director 1.5 - What's New
VMware vCloud Director 1.5  - What's NewVMware vCloud Director 1.5  - What's New
VMware vCloud Director 1.5 - What's New1CloudRoad.com
 
Closing the cloud gap by mike donaldson, vp of hosting dot com
Closing the cloud gap by mike donaldson, vp of hosting dot comClosing the cloud gap by mike donaldson, vp of hosting dot com
Closing the cloud gap by mike donaldson, vp of hosting dot comKhazret Sapenov
 
Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Azlan NL
 
IBM Software Day 2013. Unleash business innovation with the next generation o...
IBM Software Day 2013. Unleash business innovation with the next generation o...IBM Software Day 2013. Unleash business innovation with the next generation o...
IBM Software Day 2013. Unleash business innovation with the next generation o...IBM (Middle East and Africa)
 
Lax breakfast forum_developing_your_cloud_strategy_05_10_2012
Lax breakfast forum_developing_your_cloud_strategy_05_10_2012Lax breakfast forum_developing_your_cloud_strategy_05_10_2012
Lax breakfast forum_developing_your_cloud_strategy_05_10_2012Internap
 
Worklight nitin nm
Worklight nitin nmWorklight nitin nm
Worklight nitin nmNitin Gaur
 
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...Vincent Kwon
 
Nyc lunch and learn 03 15 2012 final
Nyc lunch and learn   03 15 2012 finalNyc lunch and learn   03 15 2012 final
Nyc lunch and learn 03 15 2012 finalInternap
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud StrategyInternap
 
It infrastructure cost reduction vision v5 customer
It infrastructure cost reduction vision v5   customerIt infrastructure cost reduction vision v5   customer
It infrastructure cost reduction vision v5 customerddeschenes99
 
Intel Cloud Summit ODCA - NAB Customer presentation
Intel Cloud Summit ODCA - NAB Customer presentationIntel Cloud Summit ODCA - NAB Customer presentation
Intel Cloud Summit ODCA - NAB Customer presentationIntelAPAC
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaAsheem Chandna
 
Cloud computing in south africa reality or fantasy
Cloud computing in south africa   reality or fantasyCloud computing in south africa   reality or fantasy
Cloud computing in south africa reality or fantasySamantha James
 
Cloud connect - Delivering Enterprise Scale Applications on Cloud
Cloud connect - Delivering Enterprise Scale Applications on CloudCloud connect - Delivering Enterprise Scale Applications on Cloud
Cloud connect - Delivering Enterprise Scale Applications on Cloudaravindajju
 
Unleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud ComputingUnleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud ComputingSam Garforth
 
Desktop Virtualization and the Consumerization of IT
Desktop Virtualization and the Consumerization of ITDesktop Virtualization and the Consumerization of IT
Desktop Virtualization and the Consumerization of ITInnoTech
 

Similar to Virtualizing Business cCritical Applications_ Darren Thomson (20)

The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 
VMware vCloud Director 1.5 - What's New
VMware vCloud Director 1.5  - What's NewVMware vCloud Director 1.5  - What's New
VMware vCloud Director 1.5 - What's New
 
Closing the cloud gap by mike donaldson, vp of hosting dot com
Closing the cloud gap by mike donaldson, vp of hosting dot comClosing the cloud gap by mike donaldson, vp of hosting dot com
Closing the cloud gap by mike donaldson, vp of hosting dot com
 
Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2
 
Webinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility StrategyWebinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility Strategy
 
IBM Software Day 2013. Unleash business innovation with the next generation o...
IBM Software Day 2013. Unleash business innovation with the next generation o...IBM Software Day 2013. Unleash business innovation with the next generation o...
IBM Software Day 2013. Unleash business innovation with the next generation o...
 
Lax breakfast forum_developing_your_cloud_strategy_05_10_2012
Lax breakfast forum_developing_your_cloud_strategy_05_10_2012Lax breakfast forum_developing_your_cloud_strategy_05_10_2012
Lax breakfast forum_developing_your_cloud_strategy_05_10_2012
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Worklight nitin nm
Worklight nitin nmWorklight nitin nm
Worklight nitin nm
 
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...
 
Nyc lunch and learn 03 15 2012 final
Nyc lunch and learn   03 15 2012 finalNyc lunch and learn   03 15 2012 final
Nyc lunch and learn 03 15 2012 final
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud Strategy
 
It infrastructure cost reduction vision v5 customer
It infrastructure cost reduction vision v5   customerIt infrastructure cost reduction vision v5   customer
It infrastructure cost reduction vision v5 customer
 
Intel Cloud Summit ODCA - NAB Customer presentation
Intel Cloud Summit ODCA - NAB Customer presentationIntel Cloud Summit ODCA - NAB Customer presentation
Intel Cloud Summit ODCA - NAB Customer presentation
 
Stream 3 - Cloud Computing
Stream 3 - Cloud ComputingStream 3 - Cloud Computing
Stream 3 - Cloud Computing
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - Chandna
 
Cloud computing in south africa reality or fantasy
Cloud computing in south africa   reality or fantasyCloud computing in south africa   reality or fantasy
Cloud computing in south africa reality or fantasy
 
Cloud connect - Delivering Enterprise Scale Applications on Cloud
Cloud connect - Delivering Enterprise Scale Applications on CloudCloud connect - Delivering Enterprise Scale Applications on Cloud
Cloud connect - Delivering Enterprise Scale Applications on Cloud
 
Unleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud ComputingUnleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud Computing
 
Desktop Virtualization and the Consumerization of IT
Desktop Virtualization and the Consumerization of ITDesktop Virtualization and the Consumerization of IT
Desktop Virtualization and the Consumerization of IT
 

More from Arrow ECS UK

Grow your future with leasing.
Grow your future with leasing.Grow your future with leasing.
Grow your future with leasing.Arrow ECS UK
 
Arrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education PartnerArrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education PartnerArrow ECS UK
 
Arrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training CentreArrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training CentreArrow ECS UK
 
Arrow Live Class Link
Arrow Live Class LinkArrow Live Class Link
Arrow Live Class LinkArrow ECS UK
 
Arrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS UK
 
2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internetArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow ECS UK
 
Arrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow ECS UK
 
Arrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow ECS UK
 
Helping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMHelping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMArrow ECS UK
 
Arrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow ECS UK
 
IBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewIBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewArrow ECS UK
 
Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Arrow ECS UK
 
IBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateIBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateArrow ECS UK
 
How to Win against the Competition
How to Win against the CompetitionHow to Win against the Competition
How to Win against the CompetitionArrow ECS UK
 
Align IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersAlign IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersArrow ECS UK
 
Working with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelWorking with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelArrow ECS UK
 

More from Arrow ECS UK (20)

Grow your future with leasing.
Grow your future with leasing.Grow your future with leasing.
Grow your future with leasing.
 
Arrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education PartnerArrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education Partner
 
Arrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training CentreArrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training Centre
 
Arrow Live Class Link
Arrow Live Class LinkArrow Live Class Link
Arrow Live Class Link
 
Arrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business Partners
 
2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
 
Arrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart Simmons
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
 
Arrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian French
 
Arrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David Fearne
 
Arrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete Story
 
Helping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMHelping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBM
 
Arrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV Jam
 
IBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewIBM Business Analytics Marketing Overview
IBM Business Analytics Marketing Overview
 
Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...
 
IBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateIBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan template
 
How to Win against the Competition
How to Win against the CompetitionHow to Win against the Competition
How to Win against the Competition
 
Align IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersAlign IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business Partners
 
Working with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelWorking with the IBM Business Analytics Channel
Working with the IBM Business Analytics Channel
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Virtualizing Business cCritical Applications_ Darren Thomson

  • 1. The Last Mile… Darren Thomson CTO, Symantec EMEA
  • 2. Today’s Objectives Make Clear Our Product Strategy Give Insight Into Our Experiences In The Virtualization Space Share Our Approach & Value Proposition In Virtualization 2
  • 3. The Need for a More Information-centric Approach System-Centric Information-Centric • Transactional • Collaborative • Structured Data • Unstructured • On-premise • Distributed 3
  • 4. The Symantec Strategic “Blueprint” An Information-Centric Model Policy Compliance Reporting Identity Remediation Classification Threats Encryption Ownership Discovery 4
  • 5. Symantec Architectural Blueprinting Policy Compliance Reporting Identity Remediation Classification Threats Encryption Ownership Discovery 5
  • 6. The Virtualization Journey Cloud Business- critical Apps Line of Business Increasing… Apps • IT Confidence File, Print, D • Quality of Service NS • Resiliency and Test & Dev Compliance • Business Agility The road to the Cloud goes straight through business-critical virtualization… Virtualizing Business-critical Applications 6
  • 7. IT Agility The Promise of Virtualization Virtual Infrastructure IT Costs Virtualizing Business-critical Applications 7
  • 8. A Recipe For Good IT Strategy “Improve operational efficiency whilst maintaining an appropriate risk posture”
  • 9. Challenges of Business-critical Virtualization Performance Availability Modernizing for high- density environments.. Security …across virtual and Storage Mgmt physical Virtualizing Business-critical Applications 9
  • 10. Symantec and VMware Collaborative partnership delivering critical solutions: • Data Protection • High Availability + • Storage Management • Security • Systems Management • Endpoint Security Business-critical • NFS File Storage Virtualization Virtualizing Business-critical Applications 10
  • 11. Hybrid Cloud Evolving from Silos to Hybrid Cloud Key Strategies: 1. Virtualize more application Silos of Application Infrastructure infrastructure 2. Consolidate application silos to a service delivery platform 3. Increase automation Virtualizing Business-critical Applications 11
  • 13. Symantec Solutions for Business-critical Virtualization Endpoint Virtualization Data Protection Security Storage HA/DR Management Storage Virtualization Symantec Business-critical Virtualization Solutions 13
  • 14. Symantec Solutions for Business-critical Virtualization Endpoint Virtualization Data Protection Security Storage HA/DR Management Storage Virtualization Symantec Business-critical Virtualization Solutions 14
  • 15. High Availability Modernized for Business- critical Virtualization • Advanced monitoring for multi-tier applications Symantec ApplicationHA Exchange Sharepoint • Integrated with VMware Custom Apps Web Logic vCenter console Oracle SQL*Server • Policy-driven restart IIS SAP coordinated with VMware HA and vMotion Virtualizing Business-critical Applications 15
  • 16. Virtualization High Availability Challenges Business- critical SLA’s …. With Virtual Business Services Virtualizing Business-critical Applications 16
  • 17. Virtual Business Services Billing Web server Service Service Group Web Group Web Veritas Operations Manager VM VM Billing Virtual Business Service ApplicationHA Application Service Group App Web Server SG app app app IP Application Server SG VCS Database Service Group Database SG DB IP FS Start/Stop Order VVR Inter-cluster fault policy VCS Business Critical Applications' Journey to the Cloud 17
  • 18. Symantec Solutions for Business-critical Virtualization Endpoint Virtualization Data Protection Security Storage HA/DR Management Storage Virtualization Symantec Business-critical Virtualization Solutions 18
  • 19. The Virtualization Security Challenge • Threat landscape constantly evolving– and more toxic than ever • Security solutions can’t compromise run-time performance • High density increases operational complexity • Security model predicted on physical hardware have to change Virtualizing Business-critical Applications 19
  • 20. Advanced Security for VMware Endpoints • Symantec Endpoint Protection Virtual Image • Eliminates “AV storms” Exception • Improves performance resulting in a 10x increase in VM density Resource Shared Insight Leveling Disk I/O Powered Cache ↓ by up by to 90% Insight Maximizes performance and density without Offline Virtual Client sacrificing security Image Tagging Scanner Virtualizing Business-critical Applications 20
  • 21. Security for VMware Best Protection 12% 4% 40% Compromised 100% Neutralized 84% Defended 60% Symantec Endpoint Trend Micro McAfee MOVE + Protection OfficeScan HIPS + Site Advisor Virtualizing Business-critical Applications 21
  • 22. Symantec™ Global Intelligence Network Identifies more threats, takes action faster & prevents impact Calgary, Alberta Dublin, Ireland Tokyo, Japan San Francisco, CA Mountain View, CA Austin, TX Chengdu, China Culver City, CA Taipei, Taiwan Chennai, India Pune, India Worldwide Coverage Global Scope and Scale 24x7 Event Logging Rapid Detection Attack Activity Malware Intelligence Vulnerabilities Spam/Phishing • 240,000 sensors • 133M • 40,000+ vulnerabilities • 5M decoy accounts • 200+ countries client, server, gateways • 14,000 vendors • 8B+ email messages/day monitored • 105,000 technologies • 1B+ web requests/day • Global coverage Preemptive Security Alerts Information Protection Threat Triggered Actions Virtualizing Business-critical Applications 22
  • 23. Symantec Solutions for Business-critical Virtualization Endpoint Virtualization Data Protection Security Storage HA/DR Management Storage Virtualization Symantec Business-critical Virtualization Solutions 23
  • 24. The Journey to the Cloud Goes Straight through Business- critical Virtualization Public Cloud Saas, PaaS, IaaS Storage, Security, Backu Clouds p, DR Cloud Workload Management Hybrid Cloud Resiliency & Compliance Virtual Private/ Community Clouds Consolidation & Automation Virtualization • Evolve from server virtualization to hybrid cloud service delivery • Leverage public cloud services with confidence IT as a Service: Get There with Fujitsu & Symantec. Virtualizing Business-critical Applications 24

Editor's Notes

  1. Walk-in Slide. [Executive SummaryThe ability to harness technology to deliver new customer services, operate more efficiently, and facilitate collaboration that leads to innovation is a key attribute of successful organizations. Server virtualization has transformed the IT industry through its ability to both reduce hardware and operating costs and increase IT agility and responsiveness. Most organizations today have virtualized some of their application workloads and are planning to virtualize more. As they do so, they typically progress from virtualizing less important applications to increasingly critical applications that are the backbone of their organizations. Virtualizing these business-critical applications can deliver significant strategic benefits, and, along with consolidation, is a key stepping-stone on the way to a cloud model of IT service delivery. But it also presents unique challenges in the areas of security, resiliency, performance, and operational efficiency. Symantec solutions for business-critical virtualization are optimized for the leading virtualization platforms, and provide the advanced security, availability, and storage management capabilities required to virtualize business-critical applications with confidence. ]
  2. IT Must Evolve to Meet New Demands We see a significant change in the role of IT in enterprises from system-centric to information-centric. To date, IT has brought significant productivity benefits to organizations by automating key business processes and driving efficiencies. This landscape was characterized by various business applications working centralized databases, supported by physical infrastructure. A lot of what IT departments did was focused on managing systems, including PCs, servers, storage, and networks. Today, the role of IT is starting look very different. Organizations are looking for the next level of productivity and business agility by improving collaboration and knowledge sharing. They are looking to better connect their employees, teams, business partners and customers to each other. This is changing the nature of data into highly distributed, largely unstructured information. The infrastructure is moving virtual within the company or turning into an external cloud. Instead of focusing of physical systems management, the role of IT is transforming into more information-centric tasks with governance, policies, risks, and controls. This evolution is also apparent in how applications are being designed. Historically, the entire ‘stack’ from database, OS, server, storage were defined per application. Today applications are being written to run on virtually any platform and by design will be agile to move from one system to another based on events (performance, availability, workload, etc). This balance of ‘keeping the lights on’ and innovating continues be true as IT organizations look to reduce complexity and increase efficiency so a larger portion of the IT budget can be devoted to embracing the consumerization of IT and enabling the business.
  3. Most organizations follow a similar adoption path as they deploy virtualization and gain experience with the technology. Initial virtualization projects often focus on internal IT applications such as test and development environments. Early wins in these areas are often followed by virtualization of IT production resources such as file, print, and domain name servers. As organizations gain experience with virtualization and their confidence grows, the next phase of adoption is typically centered on business production applications.It is at this point in the journey that quality of service and resiliency become increasingly important. Most organizations tend to start first with less critical departmental business applications and then progress to virtualizing more important applications with increasingly stringent SLAs. Along the way, they need to address a number of technical and operational challenges as they adopt the new approaches to high availability, disaster recovery, security, and related service-level processes that virtualization requires. While most mid-to-large enterprises are at different stages of their own virtualization journeys, most also want to aggressively increase the adoption of virtualization in their environments as a way to gain further cost savings and to progress toward the more strategic objective of transforming their IT service delivery capabilities. In December of 2010, the analyst firm Gartner estimated that, globally, about 20-25% of application workloads had been virtualized. They predicted that this would grow to 75% by 2014. These numbers reflect the fact, that, while server virtualization is clearly a mainstream technology, there remains much to be done to realize its full benefits, and most enterprises are today dealing with the challenges of making the next wave of virtualization adoption a reality. Strategic IT thinkersalso view virtualization as a foundational technology for evolving their data centers to a cloud model of IT service delivery. Indeed, virtualization, when properly implemented, makes it possible to consolidate and automate IT infrastructure and processes in a way that has been difficult or impossible with less flexible infrastructure technologies and architectural approaches. The right virtualization strategy can help an IT organization evolve its data center from islands of disparate application infrastructure to a consolidated, highly automated, mission-critical IT service delivery platform. This model of IT as a service, or private cloud, also facilitates more rapid, cost-effective, and secure adoption of external cloud services, including SaaS application and public and virtual private platform and infrastructure as a service solutions (PaaS and IaaS). It’s for this reason that we like to say that “the road to the Cloud goes straight through business-critical virtualization.”.
  4. Before we go too far, its worth stepping back and thinking about the promise of virtualization, and what most organizations are hoping to achieve with server virtualization technology in particular. Today, most IT organizations are already leveraging server virtualization to reduce infrastructure costs and to make it easier to provision and manage servers and the applications that run on them. Many of them have realized significant benefits as a result, including a reduction in both capex from server consolidation,and opex expenditures, through easier patching, a reduction in the amount of downtime, and faster delivery of new applications as a result of more efficient test and development processes. But while the ROI from server consolidation and easier provisioning and management are significant, the promise of virtualization goes much further. Beyond tactical cost savings, virtualization is an enabling technology that has the potential to transform IT service delivery by dramatically improving service levels, improving IT’s ability to respond to changing business requirements, and at the same time reducing the costs of developing, deploying, and managing application infrastructure and operations. Strategic IT leaders also see virtualization as a foundational technology for evolving their data centers to a cloud model of IT service delivery. The right virtualization strategy can help an IT organization evolve its data center from islands of disparate application infrastructure to a consolidated, highly automated, mission-critical IT service delivery platform. Virtualization, when properly implemented, can make it possible to standardize, consolidate, and automate IT infrastructure and processes in a way that has been difficult or impossible with less flexible infrastructure technologies and architectural approaches.
  5. Challenges in Virtualizing Business-critical ApplicationsBusiness-critical applications include a wide range of services that line of business and IT users rely on to collaborate and get their jobs done and which the organization depends on to interact with customers and partners and transact business. They include things like email, content management, e-commerce systems, process control systems, and database applications such as ERP, CRM, and supply-chain management. They can be off-the-shelf or custom built, and they often have multi-tier architectures that involve complex dependency chains with different processes running on different servers, including mixed environments of physical and virtual servers. For example, database applications such as SAP, Oracle, and SQL*Server are often deployed across different server tiers, with the middleware tier running on one set of servers and the database tier on another. So why take on the additional challenges of virtualizing these more complex and important applications? Well, as discussed previously, many organizations seek to virtualize more of their infrastructure to derive more cost savings and operational efficiencies from their existing investments. Well-known benefits of virtualization such as server consolidation, easier patching and upgrades, and eliminating planned downtime are just as important for business production apps as they are for IT production apps, if not more so. And, as we’ve seen, virtualizing more application workloads is a critical strategy to reach the critical mass necessary for true IT transformation. Processor architectures have also matured to make these projects more feasible than ever before. For example, multi-core processing in x86 platforms has matured, offering better access to on-chip memory and I/O, and providing better workload resource balancing.The benefits of virtualizing business-critical applications are many, but doing so also introduces additional challenges that must be addressed, including complexity, storage costs, availability, security, and performance.The dynamic nature and high density of virtual environments introduce new management and governance challenges. Particularly when virtualizing business-critical applications, these challenges must be overcome to meet the service level requirements typical of such applications, and to ensure adherence to internal and external policies.
  6. [Note to presenters: In the regular flow, this slide follows our solutions slide. When co-presenting with VMware, it can be used as the last slide and serve as the“walk-up” slide when introducing and handing off to the VMware speaker. ]Another thing we’ve done to optimize our solutions for business-critical virtualization is to partner closely with VMware. Symantec and VMware have had a close partnership for many years now, and it has become increasingly important for both of our respective organizations as virtualization has matured and is increasingly being used for more important applications and data, where service-level issues such as security, backup and recovery, HA/DR, storage, and governance are so important.Symantec and VMware engineering teams have partnered in a number of areas to drive API-level integration, optimize performance, and deliver complementary solutions to our joint customers.
  7. So let’s talk about the big picture, and how IT teams who are thinking about real transformation, not just tactical cost savings, are thinking about evolving their IT operations. IT organizations seeking to achieve the strategic promise of virtualization and to build a foundation for cloud computing differ in their near-term tactics and project priorities, but they tend to follow three broad strategic objectives: * Virtualize more of the infrastructure* Consolidate application silos to shared pools of compute resources* Automate provisioning and service-level processesVirtualize More of the InfrastructureTransforming the data center to operate with the level of scale, automation, elasticity, and cost-effectiveness promised by virtualization and cloud computing means virtualizing more applications. It is important to reach critical mass in the amount of virtualized infrastructure to be able to fully realize the agility and cost saving benefits that virtualization can provide. Increasing the overall percentage of virtualization requires organizations to deal with the challenges of virtualizing even the most critical applications that have the most demanding service-level requirements. Indeed, for most organizations, the road to the hybrid cloud runs straight through business-critical virtualization. Consolidate application infrastructure onto Shared Resource PoolsVirtualizing silos of application infrastructure will provide tactical hardware savings and operational efficiencies, but real transformation requires more. To achieve true data center transformation, leading organizations are creating consolidated pools of server, network, and storage capacity that can be leveraged for a variety of different application workloads and utilization requirements. When properly implemented, this type of consolidated private cloud architecture enables the maximum flexibility to rapidly provision new servers, dynamically allocate storage on demand, and dial up CPU capacity and transactional throughput in response to changing business requirements such as spikes in demand for an e-commerce application. The sort of shared services model can also reduce costs by increasing utilization rates and avoiding the over-provisioning that plagues more traditional IT architectures based on separate silos of application infrastructure. IncreaseAutomationIncreased virtualization and consolidation make possible the most important transformation of all, which is to dramatically increase the level of automation in the environment. Automation is the key to driving down opex costs, but also dramatically increasing IT’s ability to respond to the requirements of the business. It’s also key to increasing “agility” and accelerating the time it takes to launch new services, re-allocate resources where they’re needed most, and so on. So with these key strategies in mind, let’s drill down now on what it takes to make them a reality…
  8. Another thing we’ve focused on is increasing operational visibility, which is essential for knowing what’s going on, where the risks are, and staying in control. Visibility in high-density server farms can be a real challenge. The dynamic, fluid nature of virtualized environments make it very easy to spin up new servers, move VMs from one server to another. While this flexibility offers a lot of benefits, it also creates challenges for things like monitoring and managing storage allocations, maintaining secure server zones, instrumenting backup processes, and so on. To address these types of challenges, we’ve introduced a set of technologies and new features that increase visibility in virtual environments. We call these capabilites V-Ray, and, as the name suggests, they are designed to provide increased levels of visibility so that you can more effectively manage business-critical virtual infrastructure. For example, V-Ray technologies can auto-detect new VMs in the environment and apply appropriate backup protections in accordance with policy, or flag security exposures that might be a problem in an application that is subject to regulatory compliance issues. They can provide insight and visibility into what’s really going on with the state of an application that spans physical and virtual server tiers, and they can provide visibility and control over complex storage mappings and allocations. - See inside a VM to monitor the heartbeat of application processes for complex multi-tier apps. - Understand storage allocations and utilization from the app running in a virtual machine all the way to the spindle in the array. - Get visibility across multiple sets of deduplicated data to pinpoint and retrieve individual files. - Scan offline VMDK files for security risks before you instantiate them in your production server environment. - …and on and on.
  9. To help address the challenges of business-critical virtualization, Symantec has focused a great deal of R&D innovation around optimizing our solutions to help you take virtualization as far as it can go. Symantec Solutions for Business-critical VirtualizationSymantec solutions for business-critical virtualization are optimized for VMware and provide the advanced security, availability, and storage management capabilities you need to virtualize business-critical applications with confidence. With Symantec solutions, you can instrument the virtual data center and orchestrate service-level processes in response to dynamic changes in resource allocation. Automate the discovery of virtual machines and enforce existing security, backup, and storage allocation policies. Symantec solutions help reduce the risks of increased virtual attack surface by extending your existing security policies and with easy deployments and centralized management. Auto-detect rogue virtual machines and scan offline virtual machines to detect vulnerabilities before they cause a problem. Symantec’s advanced storage management solutions put you in control. Leverage point-and-click deduplication everywhere. Reclaim orphaned storage. Virtualize pooled storage and leverage dynamic tiering and provisioning across heterogeneous arrays. Deliver storage as a service and make chargebacks a reality. With Symantec’s advanced technologies, you’ll gain the visibility and control required to automate service level processes, accelerate server and desktop virtualization deployments, and reduce the cost and complexity of managing and protecting high-density virtual and physical infrastructure.
  10. To help address the challenges of business-critical virtualization, Symantec has focused a great deal of R&D innovation around optimizing our solutions to help you take virtualization as far as it can go. Symantec Solutions for Business-critical VirtualizationSymantec solutions for business-critical virtualization are optimized for VMware and provide the advanced security, availability, and storage management capabilities you need to virtualize business-critical applications with confidence. With Symantec solutions, you can instrument the virtual data center and orchestrate service-level processes in response to dynamic changes in resource allocation. Automate the discovery of virtual machines and enforce existing security, backup, and storage allocation policies. Symantec solutions help reduce the risks of increased virtual attack surface by extending your existing security policies and with easy deployments and centralized management. Auto-detect rogue virtual machines and scan offline virtual machines to detect vulnerabilities before they cause a problem. Symantec’s advanced storage management solutions put you in control. Leverage point-and-click deduplication everywhere. Reclaim orphaned storage. Virtualize pooled storage and leverage dynamic tiering and provisioning across heterogeneous arrays. Deliver storage as a service and make chargebacks a reality. With Symantec’s advanced technologies, you’ll gain the visibility and control required to automate service level processes, accelerate server and desktop virtualization deployments, and reduce the cost and complexity of managing and protecting high-density virtual and physical infrastructure.
  11. Lets talk about availability challenges in a virtual environments, especially for the kinds of business-critical apps we’ve been talking about today. This slide here shows survey results from an IDC survey that asked about key challenges in managing virtualized servers. The #1 issue highlighted was “Ensuring Application Availability”. Now, many of you might be thinking, “wait a minute…virtualization improves availability.” And that’s absolutely true. Virtualization opens up a whole bunch of new ways to provide HA and DR, with things like physical to virtual failover, virtual-to-virtual, and so on. And virtualization is a great way to significantly reduce both planned AND unplanned downtime. But what many users are finding is that when they set out to virtualize business-critical apps, they’ve still been hitting some significant challenges. Things like e-Commerce store fronts running on Web Logic and Oracle, or SQL*Server apps, Exchange, Sharepoint, Oracle apps and SAP. These types of applications typically have stringent SLAs and complex, multi-tier architectures. To virtualize more complex business-critical applications, though, the native capabilities of virtualization itself fall short of providing a complete solution for high availability and disaster recovery. Additional steps are required to ensure high availability for applications such as Microsoft Exchange and Sharepoint, Oracle Financials, SAP, and Weblogic. For example, when a physical server goes down, VM’s running on that server can be gracefully failed over to another without service interruption. However, business-critical apps consist of complex groups of processes, all of which are running inside virtual machines. Any one of these processes might go down, thus causing the entire app to be unavailable, even though the guest and physical server on which they are deployed are still running. High availability solutions must address these challenges, and the consolidation of critical IT assets on fewer servers means makes ensuring HA and DR an imperative for avoiding the risks of unplanned downtime. To address these issues, some intrepid architects have tried to do things like recreate clustering solutions by running things like MS cluster server inside VMs. But this sort of thing is brittle, and error-prone, and it has to be fixed and static to work, so negates all the flexibility that virtualization inherently provides. These challenges of monitoring applications and ensuring high availability are something that Symantec has many years of experience with. Our solutions like Veritas Cluster Server have been the gold standard for clustering and automated HA and DR for many years. So we set out to work with VMware to come up with a solution to the challenges of HA for business-critical apps. The result of that collaboration is a new solution that we came out with last year called Symantec ApplicationHA.
  12. As we saw in the previous slide, each of the application components have been made Highly Available and we can view each of these components through VOM as individual Service Groups. All we are going to do now is to create a new Virtual Business Service through VOM and pull in these service groups into the Service. Define the order in which they need to be started up – db first, app next and web last. Additionally, define how you want your App to behave when there’s a HA event in the DB tier and how you want the web server to behave when there’s an event in the App tier. And that’s it your VBS is defined, configured and ready to simplify the management of the multi-tier application! Again through VOM, you can now view the Virtual Business Service as one single tier.
  13. To help address the challenges of business-critical virtualization, Symantec has focused a great deal of R&D innovation around optimizing our solutions to help you take virtualization as far as it can go. Symantec Solutions for Business-critical VirtualizationSymantec solutions for business-critical virtualization are optimized for VMware and provide the advanced security, availability, and storage management capabilities you need to virtualize business-critical applications with confidence. With Symantec solutions, you can instrument the virtual data center and orchestrate service-level processes in response to dynamic changes in resource allocation. Automate the discovery of virtual machines and enforce existing security, backup, and storage allocation policies. Symantec solutions help reduce the risks of increased virtual attack surface by extending your existing security policies and with easy deployments and centralized management. Auto-detect rogue virtual machines and scan offline virtual machines to detect vulnerabilities before they cause a problem. Symantec’s advanced storage management solutions put you in control. Leverage point-and-click deduplication everywhere. Reclaim orphaned storage. Virtualize pooled storage and leverage dynamic tiering and provisioning across heterogeneous arrays. Deliver storage as a service and make chargebacks a reality. With Symantec’s advanced technologies, you’ll gain the visibility and control required to automate service level processes, accelerate server and desktop virtualization deployments, and reduce the cost and complexity of managing and protecting high-density virtual and physical infrastructure.
  14. Network performance is boosted by eliminating up to 90% of scan volume.
  15. Recent testing performed by Dennis Labs demonstrates that Symantec Endpoint Protection 12 running in a VDI environment defended against more real-world threats than comparable solutions from McAfee and Trend Micro.
  16. To help address the challenges of business-critical virtualization, Symantec has focused a great deal of R&D innovation around optimizing our solutions to help you take virtualization as far as it can go. Symantec Solutions for Business-critical VirtualizationSymantec solutions for business-critical virtualization are optimized for VMware and provide the advanced security, availability, and storage management capabilities you need to virtualize business-critical applications with confidence. With Symantec solutions, you can instrument the virtual data center and orchestrate service-level processes in response to dynamic changes in resource allocation. Automate the discovery of virtual machines and enforce existing security, backup, and storage allocation policies. Symantec solutions help reduce the risks of increased virtual attack surface by extending your existing security policies and with easy deployments and centralized management. Auto-detect rogue virtual machines and scan offline virtual machines to detect vulnerabilities before they cause a problem. Symantec’s advanced storage management solutions put you in control. Leverage point-and-click deduplication everywhere. Reclaim orphaned storage. Virtualize pooled storage and leverage dynamic tiering and provisioning across heterogeneous arrays. Deliver storage as a service and make chargebacks a reality. With Symantec’s advanced technologies, you’ll gain the visibility and control required to automate service level processes, accelerate server and desktop virtualization deployments, and reduce the cost and complexity of managing and protecting high-density virtual and physical infrastructure.
  17. So to wrap up, Virtualization has lots of tactical benefits, but the promise of virtualization goes much further. It is a strategic enabling technology that can literally transform IT service delivery. It also is an important foundational technology for cloud computing. Organizations that are thinking strategically are trying to 1) virtualize more of their infrastructure, 2) drive consolidation on shared server and storage resources, and 3) automate more of their provisioning and service-level processes. - Getting the most out of virtualization means virtualizing business-critical applications. And that means addressing some of the challenges so that you can get the most from your virtualization benefits. Challenges like storage management, security, resiliency, and compliance. Symantec and VMware are partnering to help customers achieve their strategic objectives. To transform data centers and lay the foundation for adoption of a wide range of cloud-based services that can reduce operating costs, and drive more IT agility.