Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Migrating to the Virtual Data Centre with Symantec

1,130 views

Published on

The virtual data centre, making the migration and how Symantec Data Centre Security Solutions can help.

Published in: Technology
  • Be the first to comment

Migrating to the Virtual Data Centre with Symantec

  1. 1. Migrating to the Virtual Data Centre with Symantec Chris Collier Presales Specialist E: Chris.Collier@arrowecs.co.uk
  2. 2. Agenda • The Virtual Data Centre • Making the Migration • Symantec Data Centre Security Solutions • Summary • Q&A 2
  3. 3. The Virtual Data Centre
  4. 4. The SDDC (Software Defined Data Centre) Info taken from http://www.techrepublic.com/article/enterprise-spend-shifting-to-software-defined-data-centers/# – A software defined data centre has three basic stages that can be characterized as: Agile Automated Adaptable
  5. 5. Making The Migration
  6. 6. • Convert a backup to a Virtual Machine (Hyper-V or VMware) • This can be done… – Simultaneous with the backup (parallel) or – After/Subsequent to the backup (serial) (for example: backup on Monday, convert on Friday) Backup Exec/Netbackup Server HypervisorProtected server Parallel option Serial option Backup Backup Convert Convert Symantec V-Ray™ Physical to Virtual Conversions
  7. 7. Integrated Bare Metal Disaster Recovery (DR) – Stop managing multiple solutions–DR is now included in Backup Exec & Netbackup – Built into the backup process–one backup job gives you data and system protection – Restore to same hardware or dissimilar hardware Backup Exec/NetBackup Server Server protected Server fails Server recovered Symantec Srd Recovery disk Note: Not currently available for Windows Server 2012.
  8. 8. Symantec Data Centre Security Solutions
  9. 9. Symantec Endpoint Protection
  10. 10. • Virtualization Adoption • VDI Growth • AV, IPS and proactive detection growth The Scan Storm The Problem Growth of Virtual Endpoints and Threat Landscape
  11. 11. 11 Built for Virtual Environments Virtual Client Tagging Virtual Image Exception Shared Insight Cache Resource Leveling Together – up to 90% reduction in disk IO
  12. 12. 12 Built for Virtualisation – Virtual Image Exception – Allows customers to exclude all files on a baseline image from scanning. – Shared Insight Cache – A stand alone server that enables clients to share scan results. This allows clients to skip scanning files that have already been scanned by another client. – Virtual Client Tagging – Makes the clients virtualisation aware and sends back the hypervisor vendor to SEPM. That data can be used in client searching and reporting. – Offline Image Scanner – A stand alone tool developed by STAR that can scan offline VMware image (VMDK )files..
  13. 13. Critical System Protection
  14. 14. Symantec Data Centre Security Solutions 14 Symantec Critical System Protection secures physical and virtual servers. Proactively safeguard server environments • Restrict application and OS behavior • Protect against zero day threats • Monitor approved applications Granular, policy- based controls Defends physical and virtual servers. • Monitor and protect physical and virtual data centers • Provide granular, policy-based controls • Use host-based intrusion detection (HIDS), intrusion prevention (HIPS), and least-privilege access control
  15. 15. OS Support – Microsoft Windows – Sun Solaris® – Red Hat® Linux – SUSE Linux – HP-UX® – IBM AIX® – VMware ESX Console OS 15
  16. 16. Summary
  17. 17. – Most extensive portfolio of business protection solutions available – More experience – 30+ years of protecting the world’s systems and information – Comprehensive and up-to-date protection against the latest threats – Market leadership - in both security and data protection – Trusted technology - Symantec protects 99% of the Fortune 500 Symantec Protects More Businesses Information ProtectionPreemptive Security Alerts Threat Triggered Actions Global Scope and ScaleWorldwide Coverage 24x7 Event Logging Rapid Detection Threat Activity • 240,000 sensors • 200+ countries Malcode Intelligence • 130M client, server, gateways • Global coverage Vulnerabilities • 32,000+ vulnerabilities • 11,000 vendors • 72,000 technologies Spam/Phishing •2.5M decoy accounts •8B+ email messages/daily •1B+ web requests/daily
  18. 18. Q&A

×