Vector Databases 101 - An introduction to the world of Vector Databases
Présentation VERITAS Backup Exec 16
1. Aymen MAMI
Technical Account Manager
aymenm@rfc.com.tn
Vous accompagner dans votre
Transformation Numérique !
WWW.RFC.COM.TN
WWW.RFC.COM.TN
Présentation de RFC
2. Notre Activité
Consulting Formation
Réalisation de
Projets
Assistance &
Support
Service global
de la stratégie à
l'implémentation
technologique au
support
Activité
Commerciale
WWW.RFC.COM.TN
WWW.RFC.COM.TN
16. EDUCATION SERVICES
Reduce the time and resources spent backing up and
recovering data. Restore individual items from database
and virtual backups
Granular Restore Technology
40. 40
Minimize Downtime With Virtual Conversions
Virtualize with Confidence
Migration Accelerator – P2V, B2V & V2P
Process diagram
Hyper-V or VMware HostBackup Exec 16 ServerPhysical Server
Minimize Downtime
Reduce Management
Time and Set-up
Virtualize
Accelerate Move to
Virtualized Environment
High Speed
Dramatically Reduce
System Downtime
VM VM VMVM
VM VM VMVM
Parallel Option
Serial Option
Backup
Backup
Convert
Convert
61. Bénéfice Client
Mise en place de la solution de sauvegarde Backup Exec depuis
10 ans avec mise à niveau de version (12.5, 2010, 2014, 15, 16)
Problème de gestion des sauvegardes et de l’externalisation
des données hors site
Fiabilité et efficacité des restauration à
plusieurs reprises (Fichier, Base SQL, Base
Oracle, Serveur virtuel, etc…)
Optimisation du stockage de sauvegarde et
duplication sur bande/intersites
Facilité d’utilisation avec une console
conviviale et intuitive et un reporting clair
et efficace
Solution RFC
Problématiques
MG est une chaîne de supermarchés tunisienne qui existe
depuis plus de 100 ans.
Témoignage Magasin Général
Existant
Système d’information assez complexe
Plusieurs technologies utilisées
Bechir DAHMEN
Responsable Infrastructure système
Veritas Backup Exec™ 16 is the trusted recovery solution for millions of businesses worldwide. With increasingly complex infrastructures and evolving IT needs, it’s vital that your business has a dynamic, unified solution that will deliver high performance, reliability and simplicity – from planning through to execution. Your business needs backup and recovery that adapts to your environment; that works with your budget, not against it. Your business needs Backup Exec™ 16.
Key take-aways from Spiceworks Data
Nearly half data is still in physical systems …. Cloud is growing rapidly
In 3 years still 1/3 of data in physical
B&R is #1 cloud use case, but not all data can be sent to the cloud
Average of 4.1 DP solutions / customer … more data in future
Clear preference expressed in survey for Unified DP solution
Mid-Market organizations need a DP solution that is powerful, flexible, trusted
Powerful:
Rapid backup and restore of virtual machines: Instant GRT and Instant Recovery
Use “Any S3” cloud connector to back up to any S3-compatible data store
Flexible:
One backup system for all virtual, physical and cloud data
Backup Exec supports the widest range of storage devices of any other backup solution
Trusted
Veritas is committed to Backup Exec:
we have dedicated sales and marketing teams, we have improved partner profitability programs
Part of the trust is knowing ongoing version commitment (next slide)
Here is the Backup Exec customer value proposition: One Backup to Rule them All
You have physical, you have virtual, you are moving to the cloud. You’ll continue to do so. Backup Exec covers it all. One Backup to Rule them All means reliable data protection that looks to the future without forgetting the present. It means cost savings on licensing, maintenance, hardware and training as you consolidate backup solutions. It means a faster, more secure and reliable recovery solution.
Flexible Storage Options
Backup Exec 16 supports a wide variety of storage options, allowing customers and partners important flexibility as they match the right storage device or device combination to the needs of a specific environment.
Disk Storage Devices
Most local and network disk devices can be utilized by Backup Exec for backup data storage. This includes local disk devices accessed via SATA or SAS adapters, shared storage devices accessed through Fiber Channel adapters or iSCSI initiator software, as well as network disk storage resources accessed through network protocols as UNC locations or CIFS shares. High-performance local storage can be promoted to a Deduplication Storage Device, allowing backup data stored to that device to be optimized using Backup Exec’s built-in deduplication technology.
Tape Storage Devices
In addition to disk storage, Backup Exec supports a wide variety of tape drives and tape libraries. Backup Exec also includes support for virtual tape libraries, allowing a disk resource to emulate a tape drive and be used in the same way.
Appliance Storage Options
Many 3rd-party appliances can also be used by Backup Exec as remote storage devices. Advanced functionality can be leveraged against 3rd-party appliances that have developed an OpenStorage (OST) plug-in, allowing Backup Exec to leverage the advanced data management capabilities that the OST API unlocks.
Cloud Storage Options
Backup Exec 16 also continues to expand it’s cloud capabilities. In addition to Backup Exec’s Private Cloud Services capability, Backup Exec 16 also supports the Quantum Q-cloud gateway solution, allowing customers flexible cloud options as an alternative or additional storage resources.
Overall, Backup Exec supports an amazing number of backup storage devices that very few competitors can even come close to matching. Symantec provides regularly updated documents that provide authoritative, current information about what specific software and hardware options are supported by Backup Exec. These are known as the Backup Exec hardware and software compatibility lists and are available to anyone via the Symantec knowledge base system.
Fully Integrated Deduplication Technology
Backup Exec continues to refine and polish its integrated data deduplication technology, which is built-in directly to the Backup Exec server and the Agent for Windows and the Agent for Linux. This technology allows the Backup Exec server to host a deduplication storage device on a local disk, to which any or all backup streams can be saved. Backups saved to the deduplication storage device are scanned and optimized using variable-length segmenting, removing block redundancies from the backups and greatly reducing the amount of disk backup space consumed by deduplicated backups.
Backup Exec’s deduplication technology also includes advanced stream handlers for both VMware and Hyper-V backups, allowing for greater optimization of virtual machine backups.
The integrated deduplication technology within Backup Exec can be configured in several ways depending upon the environment in which deduplication is being used. This includes client deduplication, server deduplication, and appliance deduplication.
Highlight:
In the past: You were restricted to physical data center locations
Today: You are adopting 1 or more clouds
In the future: Imaging trying to control hundreds or thousands of business applications and data across these multiple clouds.
Focus: Reduce costs, Increase productivity and profitability, Speed to market, Meet Varied SLAs
Problem: Inflexibility in moving back from the cloud or moving between clouds
A move to a public cloud often occurs to drive down capital expenditures. If it is a public cloud where you will be running applications that you have to size for performance, there are some skillsets you will want to invest in before you make the move.
Monitoring
Security & Compliance
Orchestration & Automation
Security never sleeps.
Security is an integral part of any IT infrastructure. OUR job is to bring our leading technologies to every endpoint, every device, every enterprise.
Every stage requires capabilities and compliance.
Our mission is to protect and defend against any threat in any environment. We mean business.
First lets look at how attack methodology works. What are the phases, what are the important points of protection? Attackers are systematic, usually following…
Initial reconnaissance: seeing what’s out there
Incursion: What’s the actual incursion or break in point?
Discovery: Where they start looking at information – confidential, sensitive information.
Capture: The stage where they capture the information and assemble it.
Exfiltrate: Where information gets pushed out of the organisation, into the hands of the hackers or criminals.
The Backup Exec database stores sensitive information such as:
Logon Accounts for jobs,
Device access passwords, and
Data backup encryption keys.
Prior to BE 16, these columns were encrypted. Backup Exec 16 now provides a second layer of encryption using the AES 256 symmetric encryption algorithm.