SlideShare a Scribd company logo
1 of 7
Download to read offline
Not Sluggish: Five Use Cases 
for the Agile Data Center 
Contents 
• Data Governance for Agility and Efficiency................................................................................... 2 
• Securing the Virtual Resources and Infrastructure....................................................................... 3 
• Protecting Enterprise Data............................................................................................................ 4 
• Adopting the Latest Storage Technologies.................................................................................... 5 
• Protecting Applications Wherever They Live.................................................................................. 6 
• Delivering the Right Services in the Right Way............................................................................. 7 
A TECHTARGET WHITE PAPER 
Brought to you compliments of Organizations need fast, reliable and responsive service delivery 
from their IT departments. To meet today’s requirements, the data 
center can’t be slow or unable to make adjustments quickly based 
on the needs of the business. Here are five examples of being ready, 
willing and able to deliver the right services in the right way.
Enterprise technologies are changing—think about the cloud, Software-as-a-Service, smartphones 
and tablets, virtualization, big data and Bring Your Own Device policies. Those new technologies 
directly enable new business opportunities, such as mobile delivery of services, or the use of analytics 
to personalize product offerings and optimize the supply chain. Technology also exposes challenges 
to established business models, and the worry that a nimble competitor might grab your hard-won 
market share—or redefine the market to eliminate your offerings. 
New technologies, new opportunities, new business models and new competitive threats. All of these 
require an active response from business leaders. Implementing those responses requires ensuring 
that IT is agile in terms of both systems and information management. Whether the focus is on 
extending on-premises data centers or on leveraging cloud-based service providers, Symantec offers 
tools and services to help enable an agile IT transformation. 
This paper describes five use cases where offerings from Symantec can help IT move from a sluggish 
environment to one that is more agile and able to respond strategically and tactically to emerging 
technologies, opportunities, business models and competitive threats. 
Data Governance for Agility and Efficiency 
Unstructured data is growing at a phenomenal rate, consuming petabytes of storage on dozens or 
hundreds of file servers. How much of that storage is wasted? What’s the capacity and utilization 
of that storage? What type of data is being stored on corporate assets, and is it appropriate for the 
organization’s business purposes? 
Some of that data may be payroll records or bank transactions that require retention for years in case 
of an audit or regulatory request. Some of that may be customer or inventory records being used every 
second by an employee, or shown to consumers online or via a mobile app. Inevitably, some of the 
storage space is wasted or misallocated. Or worse, part of the capacity may be allocated to a former 
employee’s vast array of MP4 movies that violate copyright infringement laws. 
Considering the vast amount of unstructured data being created and the growth rates that are 
expected, how does all this get managed? 
Sluggish IT: The killer app is the spreadsheet. You’ve seen them: Rows and columns indicate storage 
arrays, raw capacity, current utilization, perhaps the names of users, groups or departments and 
budget codes. An admin may also track utilization over time, allowing for rudimentary, future 
storage projections. 
2 www.symantec.com
Updating those spreadsheets is a daunting task, but a necessary one, since automated storage 
discovery must be conducted within the confines of each vendor’s proprietary tool set. Going beyond the 
basics, such as to discover orphaned or inappropriate data (like those MP4 movie files) is extremely 
difficult. It can also be hard to know who owns data: Perhaps a set of documents was created by Sally, 
but when she left the company, responsibility for those documents fell to Bob, making it very difficult 
to manage the infrastructure where the data resides. 
Agile IT: Symantec™ Data Insight helps organizations improve unstructured data governance 
through actionable intelligence into data ownership, usage and access controls. The reporting, 
analytics, and visualization capabilities in Data Insight help organizations drive efficiency and cost 
reduction across the data lifecycle, improve protection of sensitive data and achieve compliance. 
Organizations that have automated visibility and control can manage their data efficiently and have 
the right information to make agile decisions on how to oversee the storage environment. 
Securing the Virtual Resources and Infrastructure 
Virtualized resources can be scaled, moved, allocated and reallocated, as often as necessary. 
Sometimes resources are created and provisioned by administrators through easy-to-use self-service 
consoles. Increasingly, virtual resources can also be brought online and deployed through intelligent 
automation. The load virtual servers in Southeast Asia are exceeding policy-set parameters and 
affecting application response time? Let’s spool up some new virtual CPUs and storage arrays and 
adjust the virtualized load balancer. Problem solved. 
Problem solved … maybe. Is everything secure? As virtual resources expand and contract, virtual 
server operating systems, applications, firewalls, user access control lists, privacy policies and more 
are affected. Some of those may be in virtual images that are copied onto the new virtual machines 
(VMs); others are external, such as in the physical network router’s virtual private network and 
virtual Local Area Network (LAN) settings or virtualized application delivery controller’s configuration. 
Antivirus, intrusion detection, intrusion prevention, secure configuration, firewall, lockdown of insecure 
ports, application and protected whitelisting, and file system and admin lockdown are just some of the 
hardening practices that must be enabled and up and running before virtual resources go live. 
Sluggish IT: An army of IT professionals leaps into action when a new virtual resource must be 
provisioned. Emails go out, alerting the team that the routers and firewalls must be updated, the 
operating system on the virtual server must be updated with the latest patches, the antivirus software 
on the virtual server must be installed and updated with the latest malware profiles, and the access 
control list must be synced with the corporate ACLs. Those changes, and more, may require operating 
3 www.symantec.com
dozens of tools and controls from that many vendors. In many instances, there is a significant lag 
between the time new virtual resources are created (which could be done in minutes or a few hours) 
and the time it takes security and IT operations to sync up and apply the appropriate security policies 
(days and weeks) to the newly created resources. 
If a new vulnerability is discovered, the army of IT professionals must leap into action again, this 
time discovering which systems may be affected, and then manually applying the patches or bringing 
systems offline until patches become available. 
Agile IT: Symantec™ Data Center Security provides tools for setting and applying security 
policies against physical and virtual resources. From Windows to Linux, from application whitelisting 
to targeted prevention policies, from real-time configuration monitoring to centralized management, 
it’s all covered. Data Center Security supports elasticity by applying security policies to new virtual 
resources as they are created. It also constantly monitors resources and infrastructure to detect 
vulnerabilities, and can apply automation rules to respond quickly to challenges, such as by applying 
hot patches or moving affected servers into a quarantine zone for further investigation. It can even 
detect unauthorized access or configuration changes, and apply countermeasures via workflow. With 
this approach, policy-based automation and intelligence enable security to orchestrate a timely 
response to changes in the data center. 
Protecting Enterprise Data 
Data must be protected. Documents that were inadvertently destroyed need to be restored for 
a panicking end user. Financial hedge-fund records might be intentionally destroyed, violating 
compliance requirements. Someone might trip over a power cord, unplugging a server and corrupting 
the fragile ones and zeros in an important SQL database, which then need to be restored from backup. 
A flood might wipe out a data center, meaning that the disaster recovery plan must be activated either 
manually or automatically in accordance with a carefully rehearsed workflow. 
The most sophisticated data backup and disaster recovery systems are only as good as the 
implementation of those policies. If backups are accidentally turned off or a software update breaks 
the policy, data is at risk—and the business is at risk, too, for lost productivity or even legal liabilities. 
This is especially true with virtual servers, which may be created, provisioned, administered, moved to 
other physical hosts, moved again, and then shut down without a human administrator ever logging 
into its management console. This represents a challenge for data protection. 
Sluggish IT: When new servers, virtual or physical, are brought online, a human backup administrator 
is notified via email. Of course, that assumes that the backup administrator receives the message. The 
4 www.symantec.com
admin installs a backup agent onto the server, and tests that the backup will work. (Making life 
more complicated, different tools are used for configuring backups on physical and virtual servers.) 
The backup data is written to a tape drive that’s usually close, or fairly close, to the host for the 
virtual server. Since virtual servers tend to move around from one physical host to another, kicking 
off a backup job of multiple virtual servers at the same time could over load the host server’s 
resources, failing the backup. And since backup policies are manually applied to each virtual server, 
the chance that a VM comes online without a backup policy is very high. This could lead to data 
being left unprotected, which could have major risk, cost and even legal liability consequences for 
the organization. 
Agile IT: The administrator uses a unified backup management platform, Symantec NetBackup™ 
with V-Ray technology, to efficiently protect all of the organization’s data across both physical 
and virtual infrastructures, as well as the cloud. NetBackup automatically applies backup policies to 
the servers and virtual data centers alike in an automated fashion, ensuring that the organization’s 
data is never left unprotected—even that critical metadata layer needed to restore software-defined 
infrastructures. The solution is truly enterprise-class, offering a unified portal with physical and virtual 
machine detection and protection, as well as unmatched scalability for protecting environments in the 
multiple petabyte range, with literally thousands upon thousands of virtual machines. 
Furthermore, NetBackup offers granular recovery from a single-pass backup, which means an 
administrator—or a user through self-service recovery—can easily restore files, folders or whatever 
is required, without inefficient post processes. Eliminate full backups forever, instantly recover virtual 
machines and deploy data protection in software or appliance form factor to suit even the most 
demanding data center needs. 
Adopting the Latest Storage Technologies 
To effectively compete in business, IT needs the capability to seamlessly adopt new technologies. The 
ability to quickly deploy the latest technology for higher performance, better availability or lower costs 
can result in competitive advantages that provide faster or improved services through the data center, 
to the business. However, adopting new technologies is not always a simple proposition. Oftentimes, 
the new technology does not have all the required functionality or reliability that enterprise-class data 
centers require. 
One use case to consider is the storage environment. Storage Area Networks (SANs) are the core 
storage systems in many data centers. SANs aren’t new; they’ve been around for many years, and have 
provided solid performance and availability in the data center. However, SAN technology as we know it 
5 www.symantec.com
has reached a tipping point in terms of performance. The spinning hard drives that comprise storage 
arrays simply cannot exceed 15K rpm, which has created a performance bottleneck. 
To address this, IT organizations are testing and implementing new technologies such as solid-state 
devices (SSDs) to alleviate the performance limitations of the spinning disk. Flash/SSDs have no 
moving parts, and can be deployed in various form factors such as on the SAN, as all-flash arrays 
or in the server. SSDs offer input/output (I/O) performance substantially faster than even the fastest 
hard drives. However, there is a downside: server-class SSDs are perceived to be more expensive than 
rotating hard drives, and individual units have smaller capacity and less reliability. Additionally, 
certain functionality, such as snapshots, data replication and tiering necessary for enterprise-class 
data centers are not available natively on the SSD. How can SSD technology be incorporated and 
adopted in a data center storage environment to provide competitive advantage for the organization? 
Sluggish IT: Administrators continue to focus on SANs based on standard hard drives, not only because 
there is already a tremendous investment in this technology, but also because on a cost-per-terabyte 
basis, it is the most affordable. SSDs are used as point solutions—installed internally to some 
particularly performance-sensitive servers, perhaps. 
Agile IT: To be agile, IT needs to be able to take advantage of new SSD technology. The high capacity 
of hard drives and high performance of SSDs can be combined into a hybrid storage system using 
Symantec™ Storage Foundation. Whether in a physical server environment or when using 
virtual machines, SmartIO in Storage Foundation includes intelligence to understand the usage 
patterns of data, and provides a cache on the SSD for substantially better performance than 
traditional SANs or raw SSDs can provide. Storage Foundation has advanced storage features that 
enable IT to use SSDs as a tier in the allocation of data and will reflect new writes to other nodes 
within the cluster to provide data protection even if a drive fails. What’s more, Storage Foundation also 
provides Flexible Storage Sharing, which enables a “shared nothing” architecture. This removes the 
need for expensive SAN infrastructure, allowing IT to take advantage of inexpensive, direct-attached 
storage to keep costs in check as new SSDs are adopted. 
Protecting Applications Wherever They Live 
In today’s data center, services are typically deployed via a multi-tiered architecture. For example, the 
Web layer resides on virtual machines, connected to the application tier running on Linux, interfacing 
with a back-end database running on legacy Unix. Critical applications or business services running 
on such complex multi-tiered architectures need to be protected against the smallest failures, as well 
as wide area outages and disasters. Protecting these services can be a challenge, especially when the 
business expects constant availability. 
6 www.symantec.com
In a 24/7 global economy, agility means the capability to do business from anywhere at any time—if 
not, organizations may lose not only today’s business, but future business as well. And depending on 
the public profile of the service, an outage of more than a couple of minutes might begin “trending” 
on Twitter or even go viral, creating broad external knowledge of an internal IT setback. Knowing that 
servers and services do go down, how can you ensure that they are managed appropriately? 
Sluggish IT: IT organizations use native tools provided by vendors such as VMware®, Red Hat®, SUSE, 
Microsoft®, Oracle®, Dell®, IBM® and others to monitor and remediate service disruptions caused by 
virtual machines, physical machines and applications. All of these native tools have their own unique 
strengths and weaknesses, but in a complex, multi-tiered stack, IT administrators are forced to use 
multiple point tools to remediate the problems and recover. Using multiple tools is sluggish and will 
result in elongated downtime, producing a negative impact on revenue, brand reputation, customer 
loyalty or employee productivity. 
Agile IT: Symantec™ Cluster Server provides a strongly unified solution for keeping critical 
services running. Cluster Server works across multi-vendor physical and virtual platforms right out of 
the box, with support for all major applications, databases and replication technologies in the data 
center. Whether the fault is a simple application or hardware component failure or a wide-area outage, 
detection is quick, and is followed by automated recovery and orchestration, reconnecting all tiers of 
the business service locally, or to a disaster recovery facility owned by the organization or a third-party 
cloud deployment. Keeping applications and business services available at all times is a function of 
the agile data center. Additionally, tight integration with leading virtual platforms such as VMware can 
often mean recovery without rebooting the virtual machine, less downtime and even a common tool to 
view and manage health of your multi-tier business services. 
Delivering the Right Services in the Right Way 
IT must be agile in order to respond to changing technologies, business opportunities and business 
challenges. That means ensuring the delivery of vital services to employees and customers, protecting 
data, enabling scalability and elasticity, boosting application performance and responsiveness, and 
maximizing the utilization of important resources. Thanks to solutions from Symantec, the agile data 
center is ready for whatever the market can throw at it today and tomorrow. 
7 © TechTarget 2014

More Related Content

More from Symantec

Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantSymantec
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...Symantec
 

More from Symantec (20)

Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators Want
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 Webinar
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
 

Recently uploaded

WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024VictoriaMetrics
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in sowetomasabamasaba
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benonimasabamasaba
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...masabamasaba
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxAnnaArtyushina1
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Bert Jan Schrijver
 

Recently uploaded (20)

WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 

WHITE PAPER▶Not Sluggish: Five Use Cases for the Agile Data Center

  • 1. Not Sluggish: Five Use Cases for the Agile Data Center Contents • Data Governance for Agility and Efficiency................................................................................... 2 • Securing the Virtual Resources and Infrastructure....................................................................... 3 • Protecting Enterprise Data............................................................................................................ 4 • Adopting the Latest Storage Technologies.................................................................................... 5 • Protecting Applications Wherever They Live.................................................................................. 6 • Delivering the Right Services in the Right Way............................................................................. 7 A TECHTARGET WHITE PAPER Brought to you compliments of Organizations need fast, reliable and responsive service delivery from their IT departments. To meet today’s requirements, the data center can’t be slow or unable to make adjustments quickly based on the needs of the business. Here are five examples of being ready, willing and able to deliver the right services in the right way.
  • 2. Enterprise technologies are changing—think about the cloud, Software-as-a-Service, smartphones and tablets, virtualization, big data and Bring Your Own Device policies. Those new technologies directly enable new business opportunities, such as mobile delivery of services, or the use of analytics to personalize product offerings and optimize the supply chain. Technology also exposes challenges to established business models, and the worry that a nimble competitor might grab your hard-won market share—or redefine the market to eliminate your offerings. New technologies, new opportunities, new business models and new competitive threats. All of these require an active response from business leaders. Implementing those responses requires ensuring that IT is agile in terms of both systems and information management. Whether the focus is on extending on-premises data centers or on leveraging cloud-based service providers, Symantec offers tools and services to help enable an agile IT transformation. This paper describes five use cases where offerings from Symantec can help IT move from a sluggish environment to one that is more agile and able to respond strategically and tactically to emerging technologies, opportunities, business models and competitive threats. Data Governance for Agility and Efficiency Unstructured data is growing at a phenomenal rate, consuming petabytes of storage on dozens or hundreds of file servers. How much of that storage is wasted? What’s the capacity and utilization of that storage? What type of data is being stored on corporate assets, and is it appropriate for the organization’s business purposes? Some of that data may be payroll records or bank transactions that require retention for years in case of an audit or regulatory request. Some of that may be customer or inventory records being used every second by an employee, or shown to consumers online or via a mobile app. Inevitably, some of the storage space is wasted or misallocated. Or worse, part of the capacity may be allocated to a former employee’s vast array of MP4 movies that violate copyright infringement laws. Considering the vast amount of unstructured data being created and the growth rates that are expected, how does all this get managed? Sluggish IT: The killer app is the spreadsheet. You’ve seen them: Rows and columns indicate storage arrays, raw capacity, current utilization, perhaps the names of users, groups or departments and budget codes. An admin may also track utilization over time, allowing for rudimentary, future storage projections. 2 www.symantec.com
  • 3. Updating those spreadsheets is a daunting task, but a necessary one, since automated storage discovery must be conducted within the confines of each vendor’s proprietary tool set. Going beyond the basics, such as to discover orphaned or inappropriate data (like those MP4 movie files) is extremely difficult. It can also be hard to know who owns data: Perhaps a set of documents was created by Sally, but when she left the company, responsibility for those documents fell to Bob, making it very difficult to manage the infrastructure where the data resides. Agile IT: Symantec™ Data Insight helps organizations improve unstructured data governance through actionable intelligence into data ownership, usage and access controls. The reporting, analytics, and visualization capabilities in Data Insight help organizations drive efficiency and cost reduction across the data lifecycle, improve protection of sensitive data and achieve compliance. Organizations that have automated visibility and control can manage their data efficiently and have the right information to make agile decisions on how to oversee the storage environment. Securing the Virtual Resources and Infrastructure Virtualized resources can be scaled, moved, allocated and reallocated, as often as necessary. Sometimes resources are created and provisioned by administrators through easy-to-use self-service consoles. Increasingly, virtual resources can also be brought online and deployed through intelligent automation. The load virtual servers in Southeast Asia are exceeding policy-set parameters and affecting application response time? Let’s spool up some new virtual CPUs and storage arrays and adjust the virtualized load balancer. Problem solved. Problem solved … maybe. Is everything secure? As virtual resources expand and contract, virtual server operating systems, applications, firewalls, user access control lists, privacy policies and more are affected. Some of those may be in virtual images that are copied onto the new virtual machines (VMs); others are external, such as in the physical network router’s virtual private network and virtual Local Area Network (LAN) settings or virtualized application delivery controller’s configuration. Antivirus, intrusion detection, intrusion prevention, secure configuration, firewall, lockdown of insecure ports, application and protected whitelisting, and file system and admin lockdown are just some of the hardening practices that must be enabled and up and running before virtual resources go live. Sluggish IT: An army of IT professionals leaps into action when a new virtual resource must be provisioned. Emails go out, alerting the team that the routers and firewalls must be updated, the operating system on the virtual server must be updated with the latest patches, the antivirus software on the virtual server must be installed and updated with the latest malware profiles, and the access control list must be synced with the corporate ACLs. Those changes, and more, may require operating 3 www.symantec.com
  • 4. dozens of tools and controls from that many vendors. In many instances, there is a significant lag between the time new virtual resources are created (which could be done in minutes or a few hours) and the time it takes security and IT operations to sync up and apply the appropriate security policies (days and weeks) to the newly created resources. If a new vulnerability is discovered, the army of IT professionals must leap into action again, this time discovering which systems may be affected, and then manually applying the patches or bringing systems offline until patches become available. Agile IT: Symantec™ Data Center Security provides tools for setting and applying security policies against physical and virtual resources. From Windows to Linux, from application whitelisting to targeted prevention policies, from real-time configuration monitoring to centralized management, it’s all covered. Data Center Security supports elasticity by applying security policies to new virtual resources as they are created. It also constantly monitors resources and infrastructure to detect vulnerabilities, and can apply automation rules to respond quickly to challenges, such as by applying hot patches or moving affected servers into a quarantine zone for further investigation. It can even detect unauthorized access or configuration changes, and apply countermeasures via workflow. With this approach, policy-based automation and intelligence enable security to orchestrate a timely response to changes in the data center. Protecting Enterprise Data Data must be protected. Documents that were inadvertently destroyed need to be restored for a panicking end user. Financial hedge-fund records might be intentionally destroyed, violating compliance requirements. Someone might trip over a power cord, unplugging a server and corrupting the fragile ones and zeros in an important SQL database, which then need to be restored from backup. A flood might wipe out a data center, meaning that the disaster recovery plan must be activated either manually or automatically in accordance with a carefully rehearsed workflow. The most sophisticated data backup and disaster recovery systems are only as good as the implementation of those policies. If backups are accidentally turned off or a software update breaks the policy, data is at risk—and the business is at risk, too, for lost productivity or even legal liabilities. This is especially true with virtual servers, which may be created, provisioned, administered, moved to other physical hosts, moved again, and then shut down without a human administrator ever logging into its management console. This represents a challenge for data protection. Sluggish IT: When new servers, virtual or physical, are brought online, a human backup administrator is notified via email. Of course, that assumes that the backup administrator receives the message. The 4 www.symantec.com
  • 5. admin installs a backup agent onto the server, and tests that the backup will work. (Making life more complicated, different tools are used for configuring backups on physical and virtual servers.) The backup data is written to a tape drive that’s usually close, or fairly close, to the host for the virtual server. Since virtual servers tend to move around from one physical host to another, kicking off a backup job of multiple virtual servers at the same time could over load the host server’s resources, failing the backup. And since backup policies are manually applied to each virtual server, the chance that a VM comes online without a backup policy is very high. This could lead to data being left unprotected, which could have major risk, cost and even legal liability consequences for the organization. Agile IT: The administrator uses a unified backup management platform, Symantec NetBackup™ with V-Ray technology, to efficiently protect all of the organization’s data across both physical and virtual infrastructures, as well as the cloud. NetBackup automatically applies backup policies to the servers and virtual data centers alike in an automated fashion, ensuring that the organization’s data is never left unprotected—even that critical metadata layer needed to restore software-defined infrastructures. The solution is truly enterprise-class, offering a unified portal with physical and virtual machine detection and protection, as well as unmatched scalability for protecting environments in the multiple petabyte range, with literally thousands upon thousands of virtual machines. Furthermore, NetBackup offers granular recovery from a single-pass backup, which means an administrator—or a user through self-service recovery—can easily restore files, folders or whatever is required, without inefficient post processes. Eliminate full backups forever, instantly recover virtual machines and deploy data protection in software or appliance form factor to suit even the most demanding data center needs. Adopting the Latest Storage Technologies To effectively compete in business, IT needs the capability to seamlessly adopt new technologies. The ability to quickly deploy the latest technology for higher performance, better availability or lower costs can result in competitive advantages that provide faster or improved services through the data center, to the business. However, adopting new technologies is not always a simple proposition. Oftentimes, the new technology does not have all the required functionality or reliability that enterprise-class data centers require. One use case to consider is the storage environment. Storage Area Networks (SANs) are the core storage systems in many data centers. SANs aren’t new; they’ve been around for many years, and have provided solid performance and availability in the data center. However, SAN technology as we know it 5 www.symantec.com
  • 6. has reached a tipping point in terms of performance. The spinning hard drives that comprise storage arrays simply cannot exceed 15K rpm, which has created a performance bottleneck. To address this, IT organizations are testing and implementing new technologies such as solid-state devices (SSDs) to alleviate the performance limitations of the spinning disk. Flash/SSDs have no moving parts, and can be deployed in various form factors such as on the SAN, as all-flash arrays or in the server. SSDs offer input/output (I/O) performance substantially faster than even the fastest hard drives. However, there is a downside: server-class SSDs are perceived to be more expensive than rotating hard drives, and individual units have smaller capacity and less reliability. Additionally, certain functionality, such as snapshots, data replication and tiering necessary for enterprise-class data centers are not available natively on the SSD. How can SSD technology be incorporated and adopted in a data center storage environment to provide competitive advantage for the organization? Sluggish IT: Administrators continue to focus on SANs based on standard hard drives, not only because there is already a tremendous investment in this technology, but also because on a cost-per-terabyte basis, it is the most affordable. SSDs are used as point solutions—installed internally to some particularly performance-sensitive servers, perhaps. Agile IT: To be agile, IT needs to be able to take advantage of new SSD technology. The high capacity of hard drives and high performance of SSDs can be combined into a hybrid storage system using Symantec™ Storage Foundation. Whether in a physical server environment or when using virtual machines, SmartIO in Storage Foundation includes intelligence to understand the usage patterns of data, and provides a cache on the SSD for substantially better performance than traditional SANs or raw SSDs can provide. Storage Foundation has advanced storage features that enable IT to use SSDs as a tier in the allocation of data and will reflect new writes to other nodes within the cluster to provide data protection even if a drive fails. What’s more, Storage Foundation also provides Flexible Storage Sharing, which enables a “shared nothing” architecture. This removes the need for expensive SAN infrastructure, allowing IT to take advantage of inexpensive, direct-attached storage to keep costs in check as new SSDs are adopted. Protecting Applications Wherever They Live In today’s data center, services are typically deployed via a multi-tiered architecture. For example, the Web layer resides on virtual machines, connected to the application tier running on Linux, interfacing with a back-end database running on legacy Unix. Critical applications or business services running on such complex multi-tiered architectures need to be protected against the smallest failures, as well as wide area outages and disasters. Protecting these services can be a challenge, especially when the business expects constant availability. 6 www.symantec.com
  • 7. In a 24/7 global economy, agility means the capability to do business from anywhere at any time—if not, organizations may lose not only today’s business, but future business as well. And depending on the public profile of the service, an outage of more than a couple of minutes might begin “trending” on Twitter or even go viral, creating broad external knowledge of an internal IT setback. Knowing that servers and services do go down, how can you ensure that they are managed appropriately? Sluggish IT: IT organizations use native tools provided by vendors such as VMware®, Red Hat®, SUSE, Microsoft®, Oracle®, Dell®, IBM® and others to monitor and remediate service disruptions caused by virtual machines, physical machines and applications. All of these native tools have their own unique strengths and weaknesses, but in a complex, multi-tiered stack, IT administrators are forced to use multiple point tools to remediate the problems and recover. Using multiple tools is sluggish and will result in elongated downtime, producing a negative impact on revenue, brand reputation, customer loyalty or employee productivity. Agile IT: Symantec™ Cluster Server provides a strongly unified solution for keeping critical services running. Cluster Server works across multi-vendor physical and virtual platforms right out of the box, with support for all major applications, databases and replication technologies in the data center. Whether the fault is a simple application or hardware component failure or a wide-area outage, detection is quick, and is followed by automated recovery and orchestration, reconnecting all tiers of the business service locally, or to a disaster recovery facility owned by the organization or a third-party cloud deployment. Keeping applications and business services available at all times is a function of the agile data center. Additionally, tight integration with leading virtual platforms such as VMware can often mean recovery without rebooting the virtual machine, less downtime and even a common tool to view and manage health of your multi-tier business services. Delivering the Right Services in the Right Way IT must be agile in order to respond to changing technologies, business opportunities and business challenges. That means ensuring the delivery of vital services to employees and customers, protecting data, enabling scalability and elasticity, boosting application performance and responsiveness, and maximizing the utilization of important resources. Thanks to solutions from Symantec, the agile data center is ready for whatever the market can throw at it today and tomorrow. 7 © TechTarget 2014