Migrating to the Virtual Data Centre with Symantec


Published on

The virtual data centre, making the migration and how Symantec Data Centre Security Solutions can help.

Published in: Technology
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • The agile stage implies that the majority of the data centre’s compute resources are composed of a consolidated, standardized, and virtualized pool of resources that can be provisioned and re-provisioned at will.The automated stage provides enhanced scalability, exact repeatability, mitigates human error, and can improve security and access management.The adaptable stage employs policy-based governance that uses a rules-based system to manage service levels and potentially to respond automatically to changes in demand and business requirements as they fluctuate over time.
  • New! Integrated Bare Metal RecoveryAnother key enhancement in Backup Exec 2012 is the integration of bare metal restore capabilities. Leveraging the powerful Symantec Recovery Disk, also used in the Symantec System Recovery product, administrators can easily restore critical business servers from a bare metal state. Bare metal restore operations can be performed using backups stored to either disk or tape storage, including backups that have been stored in deduplicated format. When performing a bare metal restore operation from a backup set stored in a deduplication storage folder, the restore must be done using backup data stored on a remote Backup Exec 2012 server. The Backup Exec 2012 server performs rehydration tasks against the data to be restored, which is then transmitted to the remote server to be restored.Bare metal restore capabilities come as a part of the Backup Exec 2012 product; no additional license is necessary.In order to enable bare metal recovery for a protected server, the backup job must be configured for full system protection. This feature is known as Simplified System Protection. Simplified System Protection ensures that the backup set contains all the critical operating system components needed to perform a bare metal recovery. By default, backup jobs in Backup Exec 2012 are enabled for Simplified System Protection.
  • Symantec helps consumers and organizations secure and manage their information-driven world. Symantec’s teams around the world are developing technologies and building solutions to help your customers secure and manage their information. The company has a robust portfolio and a long history of technology leadership.Symantec is a global leader in providing security, storage and systems management solutions to help your customers – from consumers and small businesses to the largest global organizations – secure and manage their information against more risks at more points, more completely and efficiently than any other company. Symantec's unique focus is to eliminate risks to information, technology and processes, independent of the device, platform, interaction or location.With Symantec, your customers can protect more of their information and technology infrastructure, in greater depth, wherever information is stored or used. From securing a consumer’s online identity and interactions to protecting an organization’s mission-critical data, Symantec offers the leading and best-of-breed security, backup and recovery, data availability and data loss prevention products.
  • Migrating to the Virtual Data Centre with Symantec

    1. 1. Migrating to the Virtual Data Centre with Symantec Chris Collier Presales Specialist E: Chris.Collier@arrowecs.co.uk
    2. 2. Agenda • The Virtual Data Centre • Making the Migration • Symantec Data Centre Security Solutions • Summary • Q&A 2
    3. 3. The Virtual Data Centre
    4. 4. The SDDC (Software Defined Data Centre) Info taken from http://www.techrepublic.com/article/enterprise-spend-shifting-to-software-defined-data-centers/# – A software defined data centre has three basic stages that can be characterized as: Agile Automated Adaptable
    5. 5. Making The Migration
    6. 6. • Convert a backup to a Virtual Machine (Hyper-V or VMware) • This can be done… – Simultaneous with the backup (parallel) or – After/Subsequent to the backup (serial) (for example: backup on Monday, convert on Friday) Backup Exec/Netbackup Server HypervisorProtected server Parallel option Serial option Backup Backup Convert Convert Symantec V-Ray™ Physical to Virtual Conversions
    7. 7. Integrated Bare Metal Disaster Recovery (DR) – Stop managing multiple solutions–DR is now included in Backup Exec & Netbackup – Built into the backup process–one backup job gives you data and system protection – Restore to same hardware or dissimilar hardware Backup Exec/NetBackup Server Server protected Server fails Server recovered Symantec Srd Recovery disk Note: Not currently available for Windows Server 2012.
    8. 8. Symantec Data Centre Security Solutions
    9. 9. Symantec Endpoint Protection
    10. 10. • Virtualization Adoption • VDI Growth • AV, IPS and proactive detection growth The Scan Storm The Problem Growth of Virtual Endpoints and Threat Landscape
    11. 11. 11 Built for Virtual Environments Virtual Client Tagging Virtual Image Exception Shared Insight Cache Resource Leveling Together – up to 90% reduction in disk IO
    12. 12. 12 Built for Virtualisation – Virtual Image Exception – Allows customers to exclude all files on a baseline image from scanning. – Shared Insight Cache – A stand alone server that enables clients to share scan results. This allows clients to skip scanning files that have already been scanned by another client. – Virtual Client Tagging – Makes the clients virtualisation aware and sends back the hypervisor vendor to SEPM. That data can be used in client searching and reporting. – Offline Image Scanner – A stand alone tool developed by STAR that can scan offline VMware image (VMDK )files..
    13. 13. Critical System Protection
    14. 14. Symantec Data Centre Security Solutions 14 Symantec Critical System Protection secures physical and virtual servers. Proactively safeguard server environments • Restrict application and OS behavior • Protect against zero day threats • Monitor approved applications Granular, policy- based controls Defends physical and virtual servers. • Monitor and protect physical and virtual data centers • Provide granular, policy-based controls • Use host-based intrusion detection (HIDS), intrusion prevention (HIPS), and least-privilege access control
    15. 15. OS Support – Microsoft Windows – Sun Solaris® – Red Hat® Linux – SUSE Linux – HP-UX® – IBM AIX® – VMware ESX Console OS 15
    16. 16. Summary
    17. 17. – Most extensive portfolio of business protection solutions available – More experience – 30+ years of protecting the world’s systems and information – Comprehensive and up-to-date protection against the latest threats – Market leadership - in both security and data protection – Trusted technology - Symantec protects 99% of the Fortune 500 Symantec Protects More Businesses Information ProtectionPreemptive Security Alerts Threat Triggered Actions Global Scope and ScaleWorldwide Coverage 24x7 Event Logging Rapid Detection Threat Activity • 240,000 sensors • 200+ countries Malcode Intelligence • 130M client, server, gateways • Global coverage Vulnerabilities • 32,000+ vulnerabilities • 11,000 vendors • 72,000 technologies Spam/Phishing •2.5M decoy accounts •8B+ email messages/daily •1B+ web requests/daily
    18. 18. Q&A