Making Your Business-critical Application Ready for Virtualization and the Cloud
 

Making Your Business-critical Application Ready for Virtualization and the Cloud

on

  • 2,450 views

Service-level issues have kept most organizations from realizing the benefits of virtualization for the business-critical applications with the most demanding SLA’s. ...

Service-level issues have kept most organizations from realizing the benefits of virtualization for the business-critical applications with the most demanding SLA’s.

Darren Thomson, the CTO at Symantec, shares strategies for addressing the availability, storage, data protection, and security challenges that must be overcome to get the full benefits of virtualization for Tier-1 applications. He shares some real-world best practices and break-through technologies that can prepare companies to take virtualization as far as it can go.

Statistics

Views

Total Views
2,450
Slideshare-icon Views on SlideShare
748
Embed Views
1,702

Actions

Likes
0
Downloads
12
Comments
0

6 Embeds 1,702

http://blog.ts.fujitsu.com 1623
http://tollkuehn.biz 74
http://translate.googleusercontent.com 2
http://207.46.192.232 1
http://www.netvibes.com 1
http://www.zoominfo.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Making Your Business-critical Application Ready for Virtualization and the Cloud Making Your Business-critical Application Ready for Virtualization and the Cloud Presentation Transcript

    • Transforming theData Center Room 13a
    • Transforming the Data Center – Room 13aReshaping IT Making Your Business Critical Application Ready for Virtualization and the Cloud Darren Thomson CTO Symantec 14:00 h 2
    • 3
    • Going the Distance… Darren ThomsonCTO, Symantec EMEA , y
    • T d ’ Obj tiToday’s ObjectivesMake Clear Our Product Strategy Give Insight Into Our Experiences In The Virtualization SpaceShare Our Approach & Value Proposition In Virtualization 5
    • Our Partnership Promise Creation of a networked society  People work and play freely  that is rewarding an secure. in a connected world. • 3rd largest global IT Services Provider ($23B) • 4th largest software company • 5th in global server revenue  • #1 market position in 10 security,  • Customers include over half of F500 storage and data protection markets  storage and data protection markets • >34.000 patents • 1000+ global patents Fujitsu and Symantec are joining forces to offer solutions  that meet customer needs in a simpler more affordable way. Customers expect the two companies to  Customers expect the two companies to offer secure and highly integrated data centre,  managed services  and cloud solutions. gVirtualizing Business‐critical Applications 6
    • The Need for a More Information-centric Approach System-Centric S t C ti Information-Centric I f ti C ti • Transactional • Collaborativ e • Structured Data • Unstructured • On-premise • Distributed 7
    • The Symantec Strategic “Blueprint”An Information-Centric Model Information Centric Policy Compliance Reporting Identity Remediation Classification Threats Encryption Ownership Discovery 8
    • Symantec Architectural Blueprinting Policy Compliance Reporting Identity Remediation Classification Threats Encryption Ownership Discovery 9
    • IT AgilityThe Promise of VirtualizationVirtual VirtualInfrastructure IT CostsVirtualizing Business‐critical Applications 10
    • A Recipe For Good IT Strategy “Allow organisations to improve operational efficiency whilst ti l ffi i hil t maintaining an appropriate risk posture posture” 11
    • Th Vi t li ti JThe Virtualization Journey Cloud Business‐ Business‐ critical Apps Line of  Business  Increasing… Apps • IT  Confidence File, Print,  • Quality of Service DNS • Resiliency and  Test & Dev C li Compliance • Business Agility The road to the Cloud goes straight through  business‐critical virtualization…Virtualizing Business‐critical Applications 12
    • Hybrid Cloud Evolving from Silos to Hybrid CloudKey Strategies:1. Virtualize more application 1 Virtualize more application Silos of Application  Silos of Application Infrastructure infrastructure2. Consolidate application silos to a Consolidate application silos to a  service delivery platform3. Increase automation Virtualizing Business‐critical Applications 13
    • Challenges of Business‐critical Virtualization Performance Availability Modernizing for high‐ density environments..  Security …across virtual and  it l d Storage Mgmt St M t physicalVirtualizing Business‐critical Applications 14
    • Symantec and VMware Collaborative partnership delivering critical solutions: • Data Protection • High Availability + • Storage Management • Security •S t Systems Management M t • Endpoint Security Business‐critical • NFS File Storage NFS File Storage Virtualization Virtualizing Business-critical Applications 15 15
    • Symantec Solutions for Business-critical Virtualization Endpoint Virtualization Data Protection Security Storage HA/DR Management Storage St VirtualizationSymantec Business‐critical Virtualization Solutions 16
    • Virtualizing Business‐critical Applications 17
    • Automation across Virtual and Physical InfrastructureVirtualizing Business‐critical Applications 18
    • Virtualization High Availability Challenges Business‐ Business‐ critical  critical SLA’sVirtualizing Business‐critical Applications 19
    • High Availability Modernized for Business‐critical Virtualization g• Advanced monitoring for  multi‐tier applications Symantec ApplicationHA S t A li ti HA Exchange Sharepoint• Integrated with VMware  Custom Apps Custom Apps Web Logic Web Logic vCenter console Oracle SQL*Server• Policy‐driven restart  IIS SAP di t d ith VM HA coordinated with VMware HA  and vMotionVirtualizing Business‐critical Applications 20
    • The Virtualization Security Challenge  • Threat landscape constantly evolving– and more toxic than ever• Security solutions can’t compromise run‐time performance• High density increases operational complexityVirtualizing Business‐critical Applications 21
    • Security for VMwareBest P t tiB t Protection•Symantec Endpoint Protection now with Protection, with… • Insight • Advanced malware protection with unique cloud-based reputation technology • Full Protection Stack for Each VM • Network, File, Reputation and BehaviorVirtualizing Business‐critical Applications 22
    • Security for VMwareBest Protection 12% 4% 40% Compromised p 100% Neutralized 84% Defended 60% Symantec Endpoint Trend Micro McAfee MOVE + Protection OfficeScan HIPS + Site AdvisorVirtualizing Business‐critical Applications 23
    • Security for VMwareEnhanced P fE h d Performance 7165 5433 Average Per-VM Disk I/O (Kbps) 2744 Symantec Trend Micro Trend Micro Deep Endpoint OfficeScan Security ProtectionVirtualizing Business‐critical Applications 24
    • Advanced Security for VMware Endpoints• Symantec Endpoint Protection Virtual Vi t l Image • Eliminates “AV storms” Exception • Improves performance resulting in a 10x increase in VM density Resource Shared Insight Leveling Disk I/O Powered Cache C h ↓ by up by to 90% Insight g Maximizes performance and density without Offline Virtual Client sacrificing security ifi i it Image Tagging Scanner Virtualizing Business‐critical Applications 25
    • The Virtualization Data Protection Challenge p ( )• More data to protect (and store!)• Recovery must span physical and virtual• Can’t compromise run‐time or operational performance Can t compromise run‐time or operational performance• Need multiple recovery options…files, servers, applicationsVirtualizing Business‐critical Applications 26
    • Private CloudsData Protection Modernized for Virtualization Symantec NetBackup Symantec NetBackup and Backup Exec with Deduplication Everywhere Virtual aware data protection  Virtual‐aware data protection Deduplication at the source,  Deduplication at the source, Reduce storage consumption with  Reduce storage consumption with and recovery media server, or target single backup, two recovery optionsVirtualizing Business‐critical Applications 27
    • Symantec Redefines Backup and Recovery V‐Ray for  V Ray for Data  Data Downtime Virtualization  Reduction  Remediation The End of Integration ComplexitySymantec Information Management Group ‐ Backup Exec & NetBackup 28
    • Symantec Endpoint  In the Data CenterVirtualization Solutions g p• Storage optimization and HA  with rapid VM provisioning• Workspace virtualization and  streaming Supported Client Models• Rule‐based license  Workspace Virtualization p compliance and harvesting l dh• Personalized workspaces for  Workspace Streaming roaming users i Workspace Connection  BrokeringVirtualizing Business‐critical Applications 29
    • The Journey to the Cloud Goes  Public Saas, PaaS,  Cloud Storage, Security, Straight through Business‐ IaaS Clouds Backup, DRcritical Virtualization Cloud Workload  Management g Hybrid Cloud Resiliency & Compliance Virtual Private/ Community  Virtual Private/ Community Clouds Consolidation  & Automation Virtualization • Evolve from server virtualization to hybrid cloud  service delivery • Leverage public cloud services with confidence IT as a Service: Get There with VMware and Symantec.Virtualizing Business‐critical Applications 30
    • Thank you.Virtualizing Business‐critical Applications 31
    • Thank you.