Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza


Published on

Virtualise with Confidence
soluzioni data protection di Symantec

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza

  1. 1. Virtualise with Confidence SYMC Solutions For The Virtual World Symantec Corporation
  2. 2. What is Driving Virtualization Next Phase of Virtual Infrastructure The End of the Beginning Challenges Combining Physical and Virtual Manageability of Virtual Complexity 2
  3. 3. We are living in extraordinary times . . . More text messages are sent daily than the population of the planet (6.75Bn) There are over 3,5 Billion Google searches performed every month! It is estimated we will create over 230 Exabytes of data this year, worldwide The amount of new technical information is doubling every year The fast-growing corners of the digital universe include data centres supporting “cloud computing,” and social networks 400 Million PC will be sold by the end of this year Laptops represent 60% of the worlds PCs A company can expect to lose 5% of their laptops each year 3
  4. 4. It’s about the Information Secure Manage Information Custom Clients eMail and Apps ERP/CRM Collaboration 4
  5. 5. Strategic Focus for 2009 and beyond Top 10 Strategic Technology Areas for 2009/10*1 Today’s Focus: • Virtualization + Green • Flexibility & Cost 1. Virtualization 2. Cloud Computing 3. Servers: Beyond Blades 4. Web-Oriented Architectures Tomorrow’s Focus: 5. Datacenter Optimization • First Cloud Services 6. Specialized Systems • Workspace Virtualization 7. Social Software and Social Networking 8. Unified Communications 9. Business Intelligence 10. Green IT Future Focus: *1 Gartner IT Symposium • Cloud Computing • Web Oriented Architecture Courtesy: Gartner IT Symposium Fall, 2008 5
  6. 6. Virtualization and Service Levels • Storage Virtualization • Server Virtualization • Endpoint Virtualization Storage & Data Disaster Security & Server Mgmt Protection Recovery Compliance 6
  7. 7. Standardized Infrastructure for Physical/Virtual Production Environment Physical Environment Virtual Environment Storage & Data Disaster Security & Server Mgmt Protection Recovery Compliance 7
  8. 8. Managing Virtual and Physical Sprawl VM VM VM Perception: Virtual Machines are easy to File CUS IIS create and use Hypervisor Result: VM Sprawl is a serious problem Reality: Virtual Machines have real server management costs  Administration  Control  Optimization  Lifecycle Mgmt  Security 8
  9. 9. Challenges of Data Protection in virtualized Data Centre New backup challenges are introduced with Virtual Machine deployment because: Backup processing is very I/O and CPU intensive, and simultaneous backups in multiple VMs can overload the ESX server Proliferation of servers (“VM sprawl”) increases storage requirements “VM sprawl” makes backup configuration more time- consuming 9
  10. 10. Data Protection and Virtualization Challenges Innovations • Performance • Off-host Backup Architecture • Management • Automated Setup/Discovery • Recovery • Granular Recovery • Data Deduplication 1
  11. 11. The World’s Most Comprehensive Solution for VMware Protection Flexible Virtual Machine protection methods…. VMware VCB VMware Deduplication/Standard Off-Host Backup Incrementals Client-Based Backup Backup Server & Storage A A A ESX Server C C C D D D Shared ESX Server Storage ESX Server NetBackup for Backup Server & Storage ESX Server ESX Server VMware VM Discovery via Granular Virtual Center Automated Restore via VMware A Recovery Backup Server Converter D D D VM & Storage ESX Server Replication — or — Vault Backup Server object & Storage Auto-Discovery Deduplication Datacenter …coupled with unique enabling technologies 1
  12. 12. Feature richness of Netbackup 6.5 1 Integrated 2 VMware 3 Exchange & 4 Improved 5 Integrated Deduplication Protection SharePoint 2007 Efficiency & HA BMR at No Protection Additional Cost A D D D ! ESX Server ! • PureDisk dedupe • Full VCB support • Granular recovery • Backup jobs are load • Part of standard client for NetBackup from a single backup balanced • VMware Granular • Downed servers • Multi-platform • Dedupe with any disk Recovery • 2003 & 2007 versions eliminated from pool • Completely integrated 6 Industry’s- 7 Operations 8 Recovery 9 New, Flexible 10 Direct Best Disk Support Management Solutions for Per-TB Pricing Upgrade From 5.x & Reporting Critical Applications 6.5 $ 5.1 • Flexible disk option • Integrated, free ops • RealTime (CDP) • Pay for backup based • Already partially EoS management (NOM) on data protected • OpenStorage API • SAN client • Fully EoS by end of • VBR for reporting • Simple to track 2008 • PureDisk integration • Snapshot client 1
  13. 13. The Next Phase of Virtual Infrastructure • Assume heterogeneity • Avoid creating silos • Standardize service level processes where you can • Start planning future-state client computing architecture 1
  14. 14. How do you realize the Full Benefits of Virtualization? Challenge: Answer: Deploy new virtualization technologies without Build IT architecture making existing IT around information operations tasks even more difficult Not Specific Systems or platforms Use infrastructure to separate all of the information that matters 1
  15. 15. Virtualization Summary And creates new opportunities for Symantec innovation Virtualization • Novel forms of security through amplifies these virtualization challenges • Storage management specialization for virtual environments • Reduces everything to • Expanded uses of software data, and Symantec is the virtualization leader in data and Symantec addresses information protection and core IT challenges integrity • Storage management • Multiplies complexity • High availability • Creates new IT policy • Server management compliance issues • Compliance • Security • Reduce cost by managing complexity 1
  16. 16. Thank You! Questions and Answers Copyright © 2008 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.