SlideShare a Scribd company logo
1 of 7
Download to read offline
This ESG Solution Showcase was commissioned by Veritas and is distributed under license from ESG.
© 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved.
Introduction
Arguably, nothing in the last decade has been more transformative to how IT is delivered than server virtualization. As
Figure 1 illustrates, the industry has evolved from simply installing hypervisors on traditional servers, through deploying
blades and chassis, and most recently, to leveraging what many consider epitomes of the IT infrastructure building block:
the hyperconverged appliance and the converged-systems rack architecture.
FIGURE 1. The Evolution of Server Virtualization Infrastructure
Source: Enterprise Strategy Group, 2016
But the journey toward a more agile, virtualized state isn’t complete. Increasing the use of server virtualization remains one
of the most-cited IT spending priorities among ESG survey respondents (see Figure 2).1
1 Source: ESG Research Report, 2016 IT Spending Intentions Survey, to be published.
Data Protection Considerations for Converged
Infrastructure – and the Veritas Solution
Date: February 2016 Author: Jason Buffington, Principal Analyst
Abstract: “When you modernize production, you must modernize protection.” That claim is true in most IT
transformational discussions. But it’s especially true when you’re trying to determine how your data protection
strategies and methods should evolve as you embrace converged infrastructure and hyperconverged (CI/HC) systems.
Solution Showcase
Enterprise Strategy Group | Getting to the bigger truth.™
Solution Showcase: Data Protection Considerations for Converged and Hyperconverged Systems 2
© 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved.
As Figure 2 also shows, improving backup and recovery is another consistently top-cited priority. In fact, in ESG’s 2012,
2013, 2014, and 2015 IT spending intentions research, increasing server virtualization and improving backup were both
always in the top-five most-cited IT priorities lists.
FIGURE 2. Top Ten IT Spending Priorities for 2016
Source: Enterprise Strategy Group, 2016
When You Modernize Production, You Must Modernize Protection
If your environment is only 20% virtualized, you can likely protect it with any mediocre backup approach you might still
have running. When you’re 50% virtualized, you may start feeling encumbered by those older backup approaches. By the
time you’re 70% or more virtualized, mediocre approaches to backup will probably hinder your virtualization
infrastructure. Said another way, as the density of virtual machines per host increases, such approaches to backup will
negatively impact the VMs being protected and the underlying hosts and storage systems. This assertion is not conjecture;
it reflects a difference in architectural approach known to affect IT systems significantly:
ď‚· Legacy-style, agent-based technologies running within each OS (physical or virtual) responsible for gathering and
transmitting data to and from the backup server create significant spikes in CPU and storage within the OS when
backup operations are in progress. Physical servers are often underutilized and therefore tolerate the spikes without
ramifications. OSs within virtual servers do not have spare capacity. In dense environments such as converged or
hyperconverged (C/HC) systems, CPU, storage, and memory can be oversubscribed because the underlying resources
allocate and share them dynamically. Spikes that rapidly require resources within one VM can strain the remaining
available resources for all other VMs in that host, as well as the host’s own resources.
 Modern host-based technologies protect VMs from the host’s perspective instead. By interacting with mature APIs
within the host hypervisor—i.e., VMware vSphere API for Data Protection (VADP) or Microsoft Hyper-V Volume
Shadow Copy Services (VSS)—VMs can be reliably protected without creating huge spikes that impact the
environment. Some kind of agent, helper, or assistance module running in each VM may still be required to ensure
that the data in the VM is ready to be backed up (often invoking VSS calls within each VM or other application-centric
operation). The difference centers on whether the data is then transmitted from within the virtualized OS using an
agent approach (“bad agent”) or the VM is protected as a whole from the host’s APIs (“good agent”).
18%
19%
20%
20%
20%
20%
21%
22%
23%
37%
Business continuity/disaster recovery programs
Improving collaboration capabilities
Desktop virtualization
Increasing use of server virtualization
Major application deployments or upgrades
Improving data backup and recovery
Data integration
Managing data growth
Business intelligence/data analytics initiatives
Cybersecurity initiatives
Top 10 most important IT priorities over the next 12 months. (Percent of respondents,
N=633, ten responses accepted)
Solution Showcase: Data Protection Considerations for Converged and Hyperconverged Systems 3
© 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved.
To Be Clear, You Will Modernize Your Protection
Unless you are using a version of a unified data protection solution that is currently shipping (i.e., with a shipping date of
2014 or later), you will almost undoubtedly be updating your data protection solution as part of your embrace of C/HC
systems. The only two questions are when and how.
Proactive protection modernization means that selecting and modernizing your data protection tools supports your
broader IT strategy—enacted as part of modernizing your production infrastructure. Being proactive enables vAdmins,
backup specialists, and IT architects to communicate and collaborate on what SLAs are required and what kinds of recovery
agility are needed by the business units. Once those specifications are identified, a plan is developed and executed, which
includes deploying data protection solution(s) as part of the virtualization infrastructure deployment.
Reactive protection modernization is when an organization attempts to use its mediocre outdated backup solution for its
highly virtualized environment, causing significant I/O impact among the VMs and dissatisfaction among the vAdmins, IT
architects, and end-users. IT is then forced to deal with that issue via a hastily upgraded backup implementation, which can
affect other data protection scenarios until the entire environment is upgraded to a new solution. Considering the urgency
and the anxiety likely present across the broader IT team, an organization may find itself faced with two drastic choices:
ď‚· Option 1: Upgrade the mediocre outdated backup solution to its currently shipping version, which almost certainly
utilizes the modern VADP and VSS APIs that enable reliable backups of VMs from their hosts.
ď‚· Option 2: Deploy a VM-specific data protection tool to complement the existing unified protection tool.
Each of the reactionary tactics has its own set of challenges and benefits:
ď‚· Option 1 (upgrade the unified solution) enables the IT team to continue to use the framework and solution
architecture that it is familiar with, leveraging whatever scale, agility, or heterogeneous considerations that originally
drove it to adopt that platform. However, it may cause “change control” or other unseen aftereffects throughout the
environment depending on both the hardware and software being used.
ď‚· Option 2 (deploy a VM-specific solution) introduces a separate UI, toolset, schedule, and storage scenario(s), but the
efficiency impact will vary based on who is managing the VM backups, e.g., vAdmin versus backup admin, and
performance may vary based on how much the environment is virtualized
For many organizations with potentially aging unified solutions today, the best possible option is the proactive one.
What to Look for in Modern Virtualization Protection
According to recent ESG research, five of the top six reported challenges in protecting virtualized environments are
visibility related (see Figure 3).2
The implication is that many data protection tools (mostly those using antiquated
approaches) are not virtualization savvy.
Aside from the most-mentioned challenge (recoverability of data), the next five most-cited challenges appear to indicate
that many backup tools can’t discern whether backup/recovery operations are successful or not. They can’t see where
problems are occurring. Or they can’t depict how the backups are affecting the virtual infrastructure (and vice versa).
2 Source: ESG Research Report, Trends in Protecting Virtualized Environments, August 2015.
.
Solution Showcase: Data Protection Considerations for Converged and Hyperconverged Systems 4
© 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved.
In other words, even if the VMs are being backed up successfully, IT operators won’t know it, and therefore they’ll have
doubts. Those doubts will eventually lead them to replace the solution with one that not only performs better, but also
communicates its effectiveness.
FIGURE 3. Top Ten Challenges in Protecting Virtual Environments
Source: Enterprise Strategy Group, 2016
A key differentiator to look for is the VM/host savviness of the backup policies, dashboard, and workflow integration with
whichever hypervisor or systems management framework(s) is in use or planned.
ESG research (see Figure 4) also reveals the most important virtualization-specific features sought by responding
organizations assessing new data protection solutions, including unified solutions and VM-specific solutions.3
3 ibid.
29%
29%
30%
31%
31%
32%
32%
39%
39%
45%
6%
8%
6%
5%
6%
6%
7%
8%
9%
15%
0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50%
Ensuring application consistency
Response time for troubleshooting backup failures, policy
violations, etc.
Gaps in protection
Understanding the impact of backup operations on the
performance of applications sharing physical resources
Simplified views across virtual infrastructure
Tracking capacity trends and consumption
Identifying inefficiencies and bottlenecks in the backup
process
Validating recovery success
Validating backup success
Recoverability of data
Primary virtual
server data
protection
challenge
All virtual server
data protection
challenges
Which of the following would you characterize as challenges for protecting your organization’s virtual
server environment? Which would you consider to be your organization’s primary virtual server data
protection challenge? (Percent of respondents, N=375)
Solution Showcase: Data Protection Considerations for Converged and Hyperconverged Systems 5
© 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved.
FIGURE 4. Primary VM-specific Capabilities Important for Choosing a New Data Protection Product
Source: Enterprise Strategy Group, 2016
Interestingly, both the top-cited challenge protecting virtualized environments (shown in Figure 3) and the most-cited
important feature for choosing a data protection product (shown in Figure 4) relate to recovery of data.
In contrast, the next five most-cited challenges relate to management/monitoring, which can cause dissatisfaction. But the
next five most-cited sought-after features all deal with functionality (i.e., cloud integration, replication, deduplication, and
overall efficiency). Pragmatically speaking, Figure 4 provides some of the key features to look for:
 Instant or Rapid VM Recovery—gone are the days when business leaders would wait for “restores” before IT could
begin to “recover” the business process.
 Ability to Use Cloud Services—for data survivability in non-regulated industries, BC/DR preparedness, etc.
 More Continuous Protection—to reduce data loss between backup windows. It is often achieved by combining
snapshot, replication, and backup policies under a single management framework.
11%
13%
13%
14%
14%
14%
15%
16%
17%
17%
18%
19%
22%
27%
29%
0% 5% 10% 15% 20% 25% 30% 35%
Granular recovery of data objects (e.g. SharePoint/Exchange)
from VM-backup
Granular recovery of files from within VM-based backups
Ability to recover one hypervisor’s VM into a different
hypervisor
Integration with hardware-based deduplication arrays
Integrated protection with storage-snapshots
Ability to protect IaaS-hosted VMs (e.g. Amazon or Microsoft
Azure)
Ability to use tape for long-term retention of VM-centric data
Management of backups/recoveries from within Hyper-
V/SysCtr UIs
Management of backups/recoveries from within vCenter
management UIs
Application consistency within VMs
Ability to use cloud-services for BC/DR (e.g. DRaaS)
Built-in software-based deduplication
Continuous or near-continuous data protection (i.e.,
journaling/replication)
Ability to use cloud services for offsite protection
“Instant” or rapid recovery of VMs directly from the backup
server/appliance
Which virtual machine-specific protection capabilities are primary factors for choosing new data
protection product considerations? (Percent of respondents, N=375, three responses accepted)
Solution Showcase: Data Protection Considerations for Converged and Hyperconverged Systems 6
© 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved.
These features align with the broader data protection mandates set by IT leadership in 2015 as reported by ESG survey
respondents (see Figure 5).4
FIGURE 5. Top Five Data Protection Mandates from IT Leadership in 2015
Source: Enterprise Strategy Group, 2016
How Veritas NetBackup Addresses Protection and Recovery of CI/HC Environments
Veritas, one of the long-standing leader brands in enterprise data protection, continues to address the needs of
organizations that demand heterogeneous protection and recovery at true enterprise scale. By fully utilizing the VMware
APIs for Data Protection (VADP), Microsoft Volume ShadowCopy Services (VSS), and the Microsoft System Center Virtual
Machine Manager (SCVMM), NetBackup 7.7 continues Veritas’ vision to ensure that all IT platforms are protected with the
same rigor for data retention and recoverability. Additionally, it continues to still ensure an optimized (VMware) platform
experience that should assure both vAdmins and data protection specialists that their VMs are as well protected and
reliably recoverable as the rest of the heterogeneous enterprise (see Figure 6).5
FIGURE 6. Overview of Veritas NetBackup 7.7 Backup Mechanisms Utilizing VMware VADP
Source: Veritas, 2016
4 Source: ESG Research Report, Trends in Protecting Virtualized Environments, August 2015.
5
ibid.
18%
20%
22%
23%
28%
0% 5% 10% 15% 20% 25% 30%
Reduce data protection software costs
Improve long-term retention (using tape, disk or cloud)
Increase speed or frequency of backups
Increase speed/agility of recoveries
Increase reliability of backups or recoveries
What are the top data protection mandates from your organization’s IT leadership?
(Percent of respondents, N=375, three responses accepted)
Solution Showcase: Data Protection Considerations for Converged and Hyperconverged Systems 7
© 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved.
The Veritas NetBackup platform is designed to leverage the same VADP mechanisms that some VM-only solutions utilize,
while still providing the same NetBackup policy/management framework, diverse media options, and enterprise-scale
catalog, deduplication, and monitoring benefits that NetBackup users are accustomed to. That being said, NetBackup 7.7
does boast several VM-specific capabilities, including:
ď‚· Live protection of both Windows VMs (utilizing VSS) and Linux VMs (using SYMCquiesce).
ď‚· Granular recovery of data from within VMware VM virtual disks.
ď‚· Deduplication at both the backup host and within the NetBackup Media Server to significantly reduce storage
requirements when protecting numerous, yet similar, virtual machines.
ď‚· Integrated use of VMware Change Block Tracking to significantly reduce backup times, while still ensuring flexible
recovery via synthetic full backups, utilizing NetBackup Accelerator.
 Rapid resumption of functionality by using Veritas’ Instant Recovery for VMware (IRV) to mount VMs from within
the NetBackup storage and then utilize VMware Storage vMotion to relocate the running, restored VM to a
production host after the users have resumed productivity.
Additional benefits of the Veritas NetBackup platform are its Appliance offerings, which enable a turnkey solution for
efficient, storage-optimized data protection for the data center, remote offices, and virtual environments. The NetBackup
Platform and Appliances ensure that organizations have modern data protection for their converged infrastructure or
hyperconverged environment.
The Bigger Truth
Improving data protection continues to be one of the most commonly cited IT spending priorities among IT decision
makers, year after year—it is a priority often spurred by the deployment of new IT workloads that demand modern
protection and recovery approaches. One of the key drivers for a “new” level of data protection is server virtualization.
Virtualization (storage, compute, and networking) is often best achieved through converged or hyperconverged platforms
because of their pre-integration, ease and consistency of deployment, and their ability to increase the VM density,
resulting in more efficiency and agility.
Virtualization’s transformative impact on IT cannot be overstated. But the same virtualization mechanisms that boost the
agility of production IT environments can create unreliability or hinder backup and recovery endeavors. The answer to this
problem is to proactively plan on modernizing protection mechanisms and strategies as part of the larger planning and
implementation effort to create a modern production infrastructure.
All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group
(ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change. This publication is copyrighted by
The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to
persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an
action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at 508.482.0188.
www.esg-global.com contact@esg-global.com P. 508.482.0188
Enterprise Strategy Group is an IT analyst, research, validation, and strategy firm that provides market
intelligence and actionable insight to the global IT community.
© 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved.

More Related Content

What's hot

3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDICitrix
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesHyTrust
 
Trends in Cloud Computing
Trends in Cloud ComputingTrends in Cloud Computing
Trends in Cloud Computingawais mushtaq
 
Optimized Desktop, Mdop And Windows 7
Optimized Desktop, Mdop And Windows 7Optimized Desktop, Mdop And Windows 7
Optimized Desktop, Mdop And Windows 7Louis Göhl
 
Asset Metrix Win98 Analysis Asset Labs Edition
Asset Metrix Win98 Analysis    Asset Labs EditionAsset Metrix Win98 Analysis    Asset Labs Edition
Asset Metrix Win98 Analysis Asset Labs Editionsteve.ohalloran
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Using Cisco’s VMDC to help facilitate PCI compliance
Using Cisco’s VMDC to help facilitate PCI complianceUsing Cisco’s VMDC to help facilitate PCI compliance
Using Cisco’s VMDC to help facilitate PCI complianceCisco Service Provider
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011Atlantic Security Conference
 
USING SOFTWARE-DEFINED DATA CENTERS TO ENABLE CLOUD BUILDERS
USING SOFTWARE-DEFINED DATA CENTERS TO ENABLE CLOUD BUILDERSUSING SOFTWARE-DEFINED DATA CENTERS TO ENABLE CLOUD BUILDERS
USING SOFTWARE-DEFINED DATA CENTERS TO ENABLE CLOUD BUILDERSJuniper Networks
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital ForensicIRJET Journal
 
A guide to modern it disaster recovery
A guide to modern it disaster recoveryA guide to modern it disaster recovery
A guide to modern it disaster recoveryJohn Brouillard
 
Hdcs Overview Final
Hdcs Overview FinalHdcs Overview Final
Hdcs Overview Finalrjt01
 
Microsoft System Center Essentials Overview
Microsoft System Center Essentials OverviewMicrosoft System Center Essentials Overview
Microsoft System Center Essentials Overviewbutest
 
PCI DSS & Virtualization
 PCI DSS & Virtualization PCI DSS & Virtualization
PCI DSS & VirtualizationTobyRobinson13
 
Renovo Ce It White Paper Ism
Renovo Ce It White Paper IsmRenovo Ce It White Paper Ism
Renovo Ce It White Paper IsmAnne Granum
 

What's hot (19)

3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
 
Trends in Cloud Computing
Trends in Cloud ComputingTrends in Cloud Computing
Trends in Cloud Computing
 
Optimized Desktop, Mdop And Windows 7
Optimized Desktop, Mdop And Windows 7Optimized Desktop, Mdop And Windows 7
Optimized Desktop, Mdop And Windows 7
 
Asset Metrix Win98 Analysis Asset Labs Edition
Asset Metrix Win98 Analysis    Asset Labs EditionAsset Metrix Win98 Analysis    Asset Labs Edition
Asset Metrix Win98 Analysis Asset Labs Edition
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Using Cisco’s VMDC to help facilitate PCI compliance
Using Cisco’s VMDC to help facilitate PCI complianceUsing Cisco’s VMDC to help facilitate PCI compliance
Using Cisco’s VMDC to help facilitate PCI compliance
 
Business Disaster Recovery by Clients First
Business Disaster Recovery by Clients FirstBusiness Disaster Recovery by Clients First
Business Disaster Recovery by Clients First
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011
 
USING SOFTWARE-DEFINED DATA CENTERS TO ENABLE CLOUD BUILDERS
USING SOFTWARE-DEFINED DATA CENTERS TO ENABLE CLOUD BUILDERSUSING SOFTWARE-DEFINED DATA CENTERS TO ENABLE CLOUD BUILDERS
USING SOFTWARE-DEFINED DATA CENTERS TO ENABLE CLOUD BUILDERS
 
network-host-reconciliation
network-host-reconciliationnetwork-host-reconciliation
network-host-reconciliation
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
A guide to modern it disaster recovery
A guide to modern it disaster recoveryA guide to modern it disaster recovery
A guide to modern it disaster recovery
 
Hdcs Overview Final
Hdcs Overview FinalHdcs Overview Final
Hdcs Overview Final
 
Microsoft System Center Essentials Overview
Microsoft System Center Essentials OverviewMicrosoft System Center Essentials Overview
Microsoft System Center Essentials Overview
 
PCI DSS & Virtualization
 PCI DSS & Virtualization PCI DSS & Virtualization
PCI DSS & Virtualization
 
Renovo Ce It White Paper Ism
Renovo Ce It White Paper IsmRenovo Ce It White Paper Ism
Renovo Ce It White Paper Ism
 

Viewers also liked

Muf Results Presentation_20151120
Muf Results Presentation_20151120Muf Results Presentation_20151120
Muf Results Presentation_20151120mosurban
 
Sociales 4
Sociales 4Sociales 4
Sociales 4Katniss10
 
Annies Landing Angle Plan
Annies Landing Angle Plan Annies Landing Angle Plan
Annies Landing Angle Plan Ellenbrook
 
Harley Davidson
Harley DavidsonHarley Davidson
Harley DavidsonBalcon60
 
IOL power calculation formulae
IOL power calculation formulaeIOL power calculation formulae
IOL power calculation formulaepujarai
 

Viewers also liked (10)

Muf Results Presentation_20151120
Muf Results Presentation_20151120Muf Results Presentation_20151120
Muf Results Presentation_20151120
 
Cristi Chelciov
Cristi ChelciovCristi Chelciov
Cristi Chelciov
 
Genograma
GenogramaGenograma
Genograma
 
Sociales 4
Sociales 4Sociales 4
Sociales 4
 
SP eCOM People_Apr2016
SP eCOM People_Apr2016SP eCOM People_Apr2016
SP eCOM People_Apr2016
 
Acc 205-ashford
Acc 205-ashfordAcc 205-ashford
Acc 205-ashford
 
Annies Landing Angle Plan
Annies Landing Angle Plan Annies Landing Angle Plan
Annies Landing Angle Plan
 
Harley Davidson
Harley DavidsonHarley Davidson
Harley Davidson
 
Presentatie Rittal - EPLAN
Presentatie Rittal - EPLANPresentatie Rittal - EPLAN
Presentatie Rittal - EPLAN
 
IOL power calculation formulae
IOL power calculation formulaeIOL power calculation formulae
IOL power calculation formulae
 

Similar to Esg solution showcase considerations for protecting converged systems and the veritas solution

Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backupPdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backuplverb
 
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...benzfire
 
VMSDeploymentGuide_Extract1a
VMSDeploymentGuide_Extract1aVMSDeploymentGuide_Extract1a
VMSDeploymentGuide_Extract1aTom - Creed
 
Primendi Visiooniseminar 2014 - Simplivity Omnicube
Primendi Visiooniseminar 2014 - Simplivity OmnicubePrimendi Visiooniseminar 2014 - Simplivity Omnicube
Primendi Visiooniseminar 2014 - Simplivity OmnicubePrimend
 
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response TeamWHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response TeamSymantec
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxsarah david
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfsarah david
 
TECHNICAL BRIEFâ–¶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEFâ–¶ NetBackup 7.6 VMware Virtual Machine Intelligent PolicyTECHNICAL BRIEFâ–¶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEFâ–¶ NetBackup 7.6 VMware Virtual Machine Intelligent PolicySymantec
 
Different types of virtualisation
Different types of virtualisationDifferent types of virtualisation
Different types of virtualisationAlessandro Guli
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSIRJET Journal
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assignRonald Jackson, Jr
 
Magic Quadrant For Enterprise Backup/Recovery Software
Magic Quadrant For Enterprise Backup/Recovery SoftwareMagic Quadrant For Enterprise Backup/Recovery Software
Magic Quadrant For Enterprise Backup/Recovery SoftwareNetApp
 
CURRENT EVENT CLOUD COMPUTING
CURRENT EVENT CLOUD COMPUTING                                  CURRENT EVENT CLOUD COMPUTING
CURRENT EVENT CLOUD COMPUTING OllieShoresna
 
Virtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationVirtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationEMC
 
Connect July-Aug 2014
Connect July-Aug 2014Connect July-Aug 2014
Connect July-Aug 2014Glenn Garrahan
 
IDC Spotlight: PBBAs Tap into Key Data Protection Trends to Drive Strong Mar...
IDC Spotlight:  PBBAs Tap into Key Data Protection Trends to Drive Strong Mar...IDC Spotlight:  PBBAs Tap into Key Data Protection Trends to Drive Strong Mar...
IDC Spotlight: PBBAs Tap into Key Data Protection Trends to Drive Strong Mar...Symantec
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesSymantec
 
Running Head VIRTUALIZATION 1VIRTUALIZATION 1Virt.docx
Running Head VIRTUALIZATION 1VIRTUALIZATION 1Virt.docxRunning Head VIRTUALIZATION 1VIRTUALIZATION 1Virt.docx
Running Head VIRTUALIZATION 1VIRTUALIZATION 1Virt.docxrtodd599
 
Cloud Technology and VirtualizationProject Deli.docx
Cloud Technology and VirtualizationProject Deli.docxCloud Technology and VirtualizationProject Deli.docx
Cloud Technology and VirtualizationProject Deli.docxmonicafrancis71118
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudPaaSword EU Project
 

Similar to Esg solution showcase considerations for protecting converged systems and the veritas solution (20)

Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backupPdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
 
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...
 
VMSDeploymentGuide_Extract1a
VMSDeploymentGuide_Extract1aVMSDeploymentGuide_Extract1a
VMSDeploymentGuide_Extract1a
 
Primendi Visiooniseminar 2014 - Simplivity Omnicube
Primendi Visiooniseminar 2014 - Simplivity OmnicubePrimendi Visiooniseminar 2014 - Simplivity Omnicube
Primendi Visiooniseminar 2014 - Simplivity Omnicube
 
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response TeamWHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
TECHNICAL BRIEFâ–¶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEFâ–¶ NetBackup 7.6 VMware Virtual Machine Intelligent PolicyTECHNICAL BRIEFâ–¶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEFâ–¶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
 
Different types of virtualisation
Different types of virtualisationDifferent types of virtualisation
Different types of virtualisation
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
Magic Quadrant For Enterprise Backup/Recovery Software
Magic Quadrant For Enterprise Backup/Recovery SoftwareMagic Quadrant For Enterprise Backup/Recovery Software
Magic Quadrant For Enterprise Backup/Recovery Software
 
CURRENT EVENT CLOUD COMPUTING
CURRENT EVENT CLOUD COMPUTING                                  CURRENT EVENT CLOUD COMPUTING
CURRENT EVENT CLOUD COMPUTING
 
Virtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationVirtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of Virtualization
 
Connect July-Aug 2014
Connect July-Aug 2014Connect July-Aug 2014
Connect July-Aug 2014
 
IDC Spotlight: PBBAs Tap into Key Data Protection Trends to Drive Strong Mar...
IDC Spotlight:  PBBAs Tap into Key Data Protection Trends to Drive Strong Mar...IDC Spotlight:  PBBAs Tap into Key Data Protection Trends to Drive Strong Mar...
IDC Spotlight: PBBAs Tap into Key Data Protection Trends to Drive Strong Mar...
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
 
Running Head VIRTUALIZATION 1VIRTUALIZATION 1Virt.docx
Running Head VIRTUALIZATION 1VIRTUALIZATION 1Virt.docxRunning Head VIRTUALIZATION 1VIRTUALIZATION 1Virt.docx
Running Head VIRTUALIZATION 1VIRTUALIZATION 1Virt.docx
 
Cloud Technology and VirtualizationProject Deli.docx
Cloud Technology and VirtualizationProject Deli.docxCloud Technology and VirtualizationProject Deli.docx
Cloud Technology and VirtualizationProject Deli.docx
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
 

Recently uploaded

Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 

Recently uploaded (20)

Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 

Esg solution showcase considerations for protecting converged systems and the veritas solution

  • 1. This ESG Solution Showcase was commissioned by Veritas and is distributed under license from ESG. © 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved. Introduction Arguably, nothing in the last decade has been more transformative to how IT is delivered than server virtualization. As Figure 1 illustrates, the industry has evolved from simply installing hypervisors on traditional servers, through deploying blades and chassis, and most recently, to leveraging what many consider epitomes of the IT infrastructure building block: the hyperconverged appliance and the converged-systems rack architecture. FIGURE 1. The Evolution of Server Virtualization Infrastructure Source: Enterprise Strategy Group, 2016 But the journey toward a more agile, virtualized state isn’t complete. Increasing the use of server virtualization remains one of the most-cited IT spending priorities among ESG survey respondents (see Figure 2).1 1 Source: ESG Research Report, 2016 IT Spending Intentions Survey, to be published. Data Protection Considerations for Converged Infrastructure – and the Veritas Solution Date: February 2016 Author: Jason Buffington, Principal Analyst Abstract: “When you modernize production, you must modernize protection.” That claim is true in most IT transformational discussions. But it’s especially true when you’re trying to determine how your data protection strategies and methods should evolve as you embrace converged infrastructure and hyperconverged (CI/HC) systems. Solution Showcase Enterprise Strategy Group | Getting to the bigger truth.™
  • 2. Solution Showcase: Data Protection Considerations for Converged and Hyperconverged Systems 2 © 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved. As Figure 2 also shows, improving backup and recovery is another consistently top-cited priority. In fact, in ESG’s 2012, 2013, 2014, and 2015 IT spending intentions research, increasing server virtualization and improving backup were both always in the top-five most-cited IT priorities lists. FIGURE 2. Top Ten IT Spending Priorities for 2016 Source: Enterprise Strategy Group, 2016 When You Modernize Production, You Must Modernize Protection If your environment is only 20% virtualized, you can likely protect it with any mediocre backup approach you might still have running. When you’re 50% virtualized, you may start feeling encumbered by those older backup approaches. By the time you’re 70% or more virtualized, mediocre approaches to backup will probably hinder your virtualization infrastructure. Said another way, as the density of virtual machines per host increases, such approaches to backup will negatively impact the VMs being protected and the underlying hosts and storage systems. This assertion is not conjecture; it reflects a difference in architectural approach known to affect IT systems significantly: ď‚· Legacy-style, agent-based technologies running within each OS (physical or virtual) responsible for gathering and transmitting data to and from the backup server create significant spikes in CPU and storage within the OS when backup operations are in progress. Physical servers are often underutilized and therefore tolerate the spikes without ramifications. OSs within virtual servers do not have spare capacity. In dense environments such as converged or hyperconverged (C/HC) systems, CPU, storage, and memory can be oversubscribed because the underlying resources allocate and share them dynamically. Spikes that rapidly require resources within one VM can strain the remaining available resources for all other VMs in that host, as well as the host’s own resources. ď‚· Modern host-based technologies protect VMs from the host’s perspective instead. By interacting with mature APIs within the host hypervisor—i.e., VMware vSphere API for Data Protection (VADP) or Microsoft Hyper-V Volume Shadow Copy Services (VSS)—VMs can be reliably protected without creating huge spikes that impact the environment. Some kind of agent, helper, or assistance module running in each VM may still be required to ensure that the data in the VM is ready to be backed up (often invoking VSS calls within each VM or other application-centric operation). The difference centers on whether the data is then transmitted from within the virtualized OS using an agent approach (“bad agent”) or the VM is protected as a whole from the host’s APIs (“good agent”). 18% 19% 20% 20% 20% 20% 21% 22% 23% 37% Business continuity/disaster recovery programs Improving collaboration capabilities Desktop virtualization Increasing use of server virtualization Major application deployments or upgrades Improving data backup and recovery Data integration Managing data growth Business intelligence/data analytics initiatives Cybersecurity initiatives Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)
  • 3. Solution Showcase: Data Protection Considerations for Converged and Hyperconverged Systems 3 © 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved. To Be Clear, You Will Modernize Your Protection Unless you are using a version of a unified data protection solution that is currently shipping (i.e., with a shipping date of 2014 or later), you will almost undoubtedly be updating your data protection solution as part of your embrace of C/HC systems. The only two questions are when and how. Proactive protection modernization means that selecting and modernizing your data protection tools supports your broader IT strategy—enacted as part of modernizing your production infrastructure. Being proactive enables vAdmins, backup specialists, and IT architects to communicate and collaborate on what SLAs are required and what kinds of recovery agility are needed by the business units. Once those specifications are identified, a plan is developed and executed, which includes deploying data protection solution(s) as part of the virtualization infrastructure deployment. Reactive protection modernization is when an organization attempts to use its mediocre outdated backup solution for its highly virtualized environment, causing significant I/O impact among the VMs and dissatisfaction among the vAdmins, IT architects, and end-users. IT is then forced to deal with that issue via a hastily upgraded backup implementation, which can affect other data protection scenarios until the entire environment is upgraded to a new solution. Considering the urgency and the anxiety likely present across the broader IT team, an organization may find itself faced with two drastic choices: ď‚· Option 1: Upgrade the mediocre outdated backup solution to its currently shipping version, which almost certainly utilizes the modern VADP and VSS APIs that enable reliable backups of VMs from their hosts. ď‚· Option 2: Deploy a VM-specific data protection tool to complement the existing unified protection tool. Each of the reactionary tactics has its own set of challenges and benefits: ď‚· Option 1 (upgrade the unified solution) enables the IT team to continue to use the framework and solution architecture that it is familiar with, leveraging whatever scale, agility, or heterogeneous considerations that originally drove it to adopt that platform. However, it may cause “change control” or other unseen aftereffects throughout the environment depending on both the hardware and software being used. ď‚· Option 2 (deploy a VM-specific solution) introduces a separate UI, toolset, schedule, and storage scenario(s), but the efficiency impact will vary based on who is managing the VM backups, e.g., vAdmin versus backup admin, and performance may vary based on how much the environment is virtualized For many organizations with potentially aging unified solutions today, the best possible option is the proactive one. What to Look for in Modern Virtualization Protection According to recent ESG research, five of the top six reported challenges in protecting virtualized environments are visibility related (see Figure 3).2 The implication is that many data protection tools (mostly those using antiquated approaches) are not virtualization savvy. Aside from the most-mentioned challenge (recoverability of data), the next five most-cited challenges appear to indicate that many backup tools can’t discern whether backup/recovery operations are successful or not. They can’t see where problems are occurring. Or they can’t depict how the backups are affecting the virtual infrastructure (and vice versa). 2 Source: ESG Research Report, Trends in Protecting Virtualized Environments, August 2015. .
  • 4. Solution Showcase: Data Protection Considerations for Converged and Hyperconverged Systems 4 © 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved. In other words, even if the VMs are being backed up successfully, IT operators won’t know it, and therefore they’ll have doubts. Those doubts will eventually lead them to replace the solution with one that not only performs better, but also communicates its effectiveness. FIGURE 3. Top Ten Challenges in Protecting Virtual Environments Source: Enterprise Strategy Group, 2016 A key differentiator to look for is the VM/host savviness of the backup policies, dashboard, and workflow integration with whichever hypervisor or systems management framework(s) is in use or planned. ESG research (see Figure 4) also reveals the most important virtualization-specific features sought by responding organizations assessing new data protection solutions, including unified solutions and VM-specific solutions.3 3 ibid. 29% 29% 30% 31% 31% 32% 32% 39% 39% 45% 6% 8% 6% 5% 6% 6% 7% 8% 9% 15% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Ensuring application consistency Response time for troubleshooting backup failures, policy violations, etc. Gaps in protection Understanding the impact of backup operations on the performance of applications sharing physical resources Simplified views across virtual infrastructure Tracking capacity trends and consumption Identifying inefficiencies and bottlenecks in the backup process Validating recovery success Validating backup success Recoverability of data Primary virtual server data protection challenge All virtual server data protection challenges Which of the following would you characterize as challenges for protecting your organization’s virtual server environment? Which would you consider to be your organization’s primary virtual server data protection challenge? (Percent of respondents, N=375)
  • 5. Solution Showcase: Data Protection Considerations for Converged and Hyperconverged Systems 5 © 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved. FIGURE 4. Primary VM-specific Capabilities Important for Choosing a New Data Protection Product Source: Enterprise Strategy Group, 2016 Interestingly, both the top-cited challenge protecting virtualized environments (shown in Figure 3) and the most-cited important feature for choosing a data protection product (shown in Figure 4) relate to recovery of data. In contrast, the next five most-cited challenges relate to management/monitoring, which can cause dissatisfaction. But the next five most-cited sought-after features all deal with functionality (i.e., cloud integration, replication, deduplication, and overall efficiency). Pragmatically speaking, Figure 4 provides some of the key features to look for: ď‚· Instant or Rapid VM Recovery—gone are the days when business leaders would wait for “restores” before IT could begin to “recover” the business process. ď‚· Ability to Use Cloud Services—for data survivability in non-regulated industries, BC/DR preparedness, etc. ď‚· More Continuous Protection—to reduce data loss between backup windows. It is often achieved by combining snapshot, replication, and backup policies under a single management framework. 11% 13% 13% 14% 14% 14% 15% 16% 17% 17% 18% 19% 22% 27% 29% 0% 5% 10% 15% 20% 25% 30% 35% Granular recovery of data objects (e.g. SharePoint/Exchange) from VM-backup Granular recovery of files from within VM-based backups Ability to recover one hypervisor’s VM into a different hypervisor Integration with hardware-based deduplication arrays Integrated protection with storage-snapshots Ability to protect IaaS-hosted VMs (e.g. Amazon or Microsoft Azure) Ability to use tape for long-term retention of VM-centric data Management of backups/recoveries from within Hyper- V/SysCtr UIs Management of backups/recoveries from within vCenter management UIs Application consistency within VMs Ability to use cloud-services for BC/DR (e.g. DRaaS) Built-in software-based deduplication Continuous or near-continuous data protection (i.e., journaling/replication) Ability to use cloud services for offsite protection “Instant” or rapid recovery of VMs directly from the backup server/appliance Which virtual machine-specific protection capabilities are primary factors for choosing new data protection product considerations? (Percent of respondents, N=375, three responses accepted)
  • 6. Solution Showcase: Data Protection Considerations for Converged and Hyperconverged Systems 6 © 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved. These features align with the broader data protection mandates set by IT leadership in 2015 as reported by ESG survey respondents (see Figure 5).4 FIGURE 5. Top Five Data Protection Mandates from IT Leadership in 2015 Source: Enterprise Strategy Group, 2016 How Veritas NetBackup Addresses Protection and Recovery of CI/HC Environments Veritas, one of the long-standing leader brands in enterprise data protection, continues to address the needs of organizations that demand heterogeneous protection and recovery at true enterprise scale. By fully utilizing the VMware APIs for Data Protection (VADP), Microsoft Volume ShadowCopy Services (VSS), and the Microsoft System Center Virtual Machine Manager (SCVMM), NetBackup 7.7 continues Veritas’ vision to ensure that all IT platforms are protected with the same rigor for data retention and recoverability. Additionally, it continues to still ensure an optimized (VMware) platform experience that should assure both vAdmins and data protection specialists that their VMs are as well protected and reliably recoverable as the rest of the heterogeneous enterprise (see Figure 6).5 FIGURE 6. Overview of Veritas NetBackup 7.7 Backup Mechanisms Utilizing VMware VADP Source: Veritas, 2016 4 Source: ESG Research Report, Trends in Protecting Virtualized Environments, August 2015. 5 ibid. 18% 20% 22% 23% 28% 0% 5% 10% 15% 20% 25% 30% Reduce data protection software costs Improve long-term retention (using tape, disk or cloud) Increase speed or frequency of backups Increase speed/agility of recoveries Increase reliability of backups or recoveries What are the top data protection mandates from your organization’s IT leadership? (Percent of respondents, N=375, three responses accepted)
  • 7. Solution Showcase: Data Protection Considerations for Converged and Hyperconverged Systems 7 © 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved. The Veritas NetBackup platform is designed to leverage the same VADP mechanisms that some VM-only solutions utilize, while still providing the same NetBackup policy/management framework, diverse media options, and enterprise-scale catalog, deduplication, and monitoring benefits that NetBackup users are accustomed to. That being said, NetBackup 7.7 does boast several VM-specific capabilities, including: ď‚· Live protection of both Windows VMs (utilizing VSS) and Linux VMs (using SYMCquiesce). ď‚· Granular recovery of data from within VMware VM virtual disks. ď‚· Deduplication at both the backup host and within the NetBackup Media Server to significantly reduce storage requirements when protecting numerous, yet similar, virtual machines. ď‚· Integrated use of VMware Change Block Tracking to significantly reduce backup times, while still ensuring flexible recovery via synthetic full backups, utilizing NetBackup Accelerator. ď‚· Rapid resumption of functionality by using Veritas’ Instant Recovery for VMware (IRV) to mount VMs from within the NetBackup storage and then utilize VMware Storage vMotion to relocate the running, restored VM to a production host after the users have resumed productivity. Additional benefits of the Veritas NetBackup platform are its Appliance offerings, which enable a turnkey solution for efficient, storage-optimized data protection for the data center, remote offices, and virtual environments. The NetBackup Platform and Appliances ensure that organizations have modern data protection for their converged infrastructure or hyperconverged environment. The Bigger Truth Improving data protection continues to be one of the most commonly cited IT spending priorities among IT decision makers, year after year—it is a priority often spurred by the deployment of new IT workloads that demand modern protection and recovery approaches. One of the key drivers for a “new” level of data protection is server virtualization. Virtualization (storage, compute, and networking) is often best achieved through converged or hyperconverged platforms because of their pre-integration, ease and consistency of deployment, and their ability to increase the VM density, resulting in more efficiency and agility. Virtualization’s transformative impact on IT cannot be overstated. But the same virtualization mechanisms that boost the agility of production IT environments can create unreliability or hinder backup and recovery endeavors. The answer to this problem is to proactively plan on modernizing protection mechanisms and strategies as part of the larger planning and implementation effort to create a modern production infrastructure. All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at 508.482.0188. www.esg-global.com contact@esg-global.com P. 508.482.0188 Enterprise Strategy Group is an IT analyst, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community. © 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved.