This presentation shares information about PHD Virtual's Image-based backup for Citrix XenServer environments. This solution is a simple and cost effective alternative to those who are still wrestling with agents and writing scripts to perform backups.
Five things virtualization has changed in your dr planJosh Mazgelis
Are you still rolling with the changes? Virtualization has made a huge impact on the way we deploy our computer workloads, and with that it has also changed the ways in which we protect them. The business continuity plans in place for IT even just five years ago look very different than what many companies have in place today. Keeping on top of these changes will help you understand your recovery capabilities, and your limitations as well. Join us with our friends at Neverfail and make sure you're keeping your IT business continuity plans spicy and fresh!
VMworld 2013: Virtualize Active Directory ‒ The Right Way!VMworld
VMworld 2013
Deji Akomolafe, VMware
Alex Fontana, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
12 best practices for virtualizing active directory DCsVeeam Software
Why consider virtualizing Active Directory domain controllers (AD DCs)?
The challenges of virtualized AD DCs
12 Expert’s Best Practices for smart AD DCs virtualization
http://www.veeam.com/whitepapers.html
Five things virtualization has changed in your dr planJosh Mazgelis
Are you still rolling with the changes? Virtualization has made a huge impact on the way we deploy our computer workloads, and with that it has also changed the ways in which we protect them. The business continuity plans in place for IT even just five years ago look very different than what many companies have in place today. Keeping on top of these changes will help you understand your recovery capabilities, and your limitations as well. Join us with our friends at Neverfail and make sure you're keeping your IT business continuity plans spicy and fresh!
VMworld 2013: Virtualize Active Directory ‒ The Right Way!VMworld
VMworld 2013
Deji Akomolafe, VMware
Alex Fontana, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
12 best practices for virtualizing active directory DCsVeeam Software
Why consider virtualizing Active Directory domain controllers (AD DCs)?
The challenges of virtualized AD DCs
12 Expert’s Best Practices for smart AD DCs virtualization
http://www.veeam.com/whitepapers.html
There are many ways to reduce costs in IT. Consolidation is one of these ways. Many IT managers thinking only about virtualization when consider consolidation. Multi-instancing is very legitimate and effective way too. Managers and DBAs have to understand benefits and pitfalls, difference from virtualization. Presentation is unveiling real-world practice and experience of support of over 70 servers with at least 6 instances on each with over 2500 databases. This presentation can be helpful for infrastructure managers, system architects, and DBAs .
The Path to Streamlining and Automating Data Center OperationsVMware
The Taneja Group polled over 300 VMware customer organizations about their IT priorities, challenges, and adopted capabilities to determine effective paths to streamlining and automating data center operations.
Disaster Recovery Planning using Azure Site RecoveryNitin Agarwal
Disaster recovery and business continuity solutions have been historically expensive and time consuming. Microsoft Azure Site Recovery (ASR) makes Disaster Recovery (DR) planning and implementation simpler and affordable for all types of organizations.
Join our team of cloud experts for a walk through of DR and ASR basics. We'll highlight best practices for ASR deployments and help you get a sense of the costs for implementing a solution.
PHD Virtual: Optimizing Backups for Any StorageMark McHenry
Learn about the differences between virtual full, and traditional full and incremental backup modes, and which mode works best depending on the type of storage.
Onsite and Offsite Backup of Citrix XenServerMark McHenry
Joint webinar between Citrix and PHD Virtual, a Unitrends company. the webinar included slides, a demo, and Q&A about onsite backups of Citrix XenServer, and backing up to the cloud.
There are many ways to reduce costs in IT. Consolidation is one of these ways. Many IT managers thinking only about virtualization when consider consolidation. Multi-instancing is very legitimate and effective way too. Managers and DBAs have to understand benefits and pitfalls, difference from virtualization. Presentation is unveiling real-world practice and experience of support of over 70 servers with at least 6 instances on each with over 2500 databases. This presentation can be helpful for infrastructure managers, system architects, and DBAs .
The Path to Streamlining and Automating Data Center OperationsVMware
The Taneja Group polled over 300 VMware customer organizations about their IT priorities, challenges, and adopted capabilities to determine effective paths to streamlining and automating data center operations.
Disaster Recovery Planning using Azure Site RecoveryNitin Agarwal
Disaster recovery and business continuity solutions have been historically expensive and time consuming. Microsoft Azure Site Recovery (ASR) makes Disaster Recovery (DR) planning and implementation simpler and affordable for all types of organizations.
Join our team of cloud experts for a walk through of DR and ASR basics. We'll highlight best practices for ASR deployments and help you get a sense of the costs for implementing a solution.
PHD Virtual: Optimizing Backups for Any StorageMark McHenry
Learn about the differences between virtual full, and traditional full and incremental backup modes, and which mode works best depending on the type of storage.
Onsite and Offsite Backup of Citrix XenServerMark McHenry
Joint webinar between Citrix and PHD Virtual, a Unitrends company. the webinar included slides, a demo, and Q&A about onsite backups of Citrix XenServer, and backing up to the cloud.
Even though users and application owners are demanding it, the Always-On Data Center seems unrealistic to most IT professionals. Overcoming the cost and complexity of an Always-On environment while delivering consistent results is almost too much to ask. But the reality is that data centers of all sizes can affordably meet this expectation. The Always-On environment requires a holistic approach, counting on a highly virtualized infrastructure, flexible data protection software and purpose built protection storage.
Listen in as experts from Storage Switzerland, Veeam and ExaGrid architect a data availability and protection infrastructure that can meet and even exceed the Always-On expectations of an Always-On organization.
VMworld 2013: vSphere Data Protection 5.5 Advanced VMware Backup and Recovery...VMworld
VMworld Europe 2013
Mauricio Barra, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Jeff Hunter, VMware
Windows Server 2012 R2 at VMUG.org in LeedsSimon May
A brief overview of what's coming in Windows Server 2012 R2 that I delivered at VMUG recently. Details on virtualisation improvements, storage improvements, VDI and much more
Are your backups are too big, and do they take too long? Are you worried you won’t get all of your data back? Do you waste hours managing complicated, temperamental backup implementations? Join is as we discuss innovative ways to improve your backups, make them more predictable, shrink backup windows, over-perform on SLAs, and reliably recover your data—every time, on time. Hear how other organizations are developing smarter backup strategies that align their recovery requirements to their business objectives, reduce stored data by up to 95% while boosting backup speeds as much as 200%.
VMworld 2013: Virtualization Rookie or Pro: Why vSphere is Your Best ChoiceVMworld
VMworld 2013
Eric Horschman, VMware
Jeff Margolese, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Similar to PHD Virtual Image-based Backup for Citrix XenServer (20)
What's New in PHD Virtual ReliableDR v3.3Mark McHenry
Ian Jones presents the new features and characteristics of PHD Virtual ReliableDR v3.3 disaster recovery assurance software. This award-wining software enables automated failover and failback testing of your VMware, virtual environments.
Performing manual tasks to test your DR can drain IT resources and it leaves you prone to human error. Find out how you can automate some of these processes for more efficient and reliable testing. Join this webinar to learn more about:
• Guaranteed recovery with 100% automated DR failover, and testing
• Automatic certification that RPOs and RTOs will be achieved
• Fully automating DR testing as often as you want
• Ensuring immediate detection and alerting of deviations
• Guaranteed failover of virtualized applications and business services
PHD Virtual: Recovering SharePoint and Exchange Server DataMark McHenry
Troy Ronning of Kroll Ontrack is the featured speaker joining the PHD Virtual team to describe how to recover SharePoint and Exchange Server Data. PHD Virtual has partnered with Kroll Ontrack and offers Kroll's granular Sharepoint and Exchange server recovery in the enterprise edition of PHD Virtual v6.5.
Twelve Mistakes to Avoid When Implemneting VirtualizationMark McHenry
This presentation includes common mistakes to avoid when implementing virtualization including VM sprawl, and neglecting backup considerations and benefits of shared storage.
PHD Virtual Backup v6 5 and ReliableDR v3.2Mark McHenry
This presentation shares information about PHD virtual Backup v6.5 and PHD ReliableDR v3.2. Learn how these products provide an easy and affordable way to back up virtual environments and automate disaster recovery testing at a very granular level. If you are looking for a solution to backup and recover VMs including Sharepoint and Exchange servers, you will definitely want to check out this presentation and more information on www.phdvirtual.com
This presentation focuses on how you can automate much of your disaster recovery testing for VMware environments so you can assure your failovers, and assure your VMs will be recovered within your RTO's.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
3. Who We Are
Best value in data protection and recovery
assurance for virtual & cloud environments
• Reduce the cost of assuring data, application and
business service restoration within SLAs
Experiencing record growth
• 13 quarters of record growth
• 6000+ customers
Industry leadership
• Two-time winner Best of VMworld
• Only backup DR company Citrix has invested in
• Product of the year: Search Server Virtualization
• Reader’s choice award: Virtualization Admin.com
• Highest rated product: InfoTech
• Fastest growing start-up: Storage.com
Who
We
Serve
4. What Makes PHD Virtual Unique?
Unmatched Value:
Effective products:
• Powerful and scalable
• Value evident out-of-the-box
Easier to use:
• Easy to download, install and use
Lower cost:
• Priced at a fraction of the cost of competitors
Ultimate Fan Club!
“I can’t afford to spend much time managing backups.
PHD makes the process a piece of cake. How they put so much functionality into such
an easy to use product, I don’t know, but they did”.
- Marek Friedl, Hardt Equipment
“PHD Virtual allows you to easily deploy multiple Virtual Backup Appliances that
create unprecedented scalability, without the cost and complexity of other solutions.”
- Virtualization Blogger, Roy Mikes
6. PHD Virtual Backup & Replication
• Supports Citrix XenServer v6.1, v6.0 and
earlier versions
• Installs and configures in 10 minutes and
requires no training
• Rollback Recovery
• Performs 3 to 5 times faster on incremental
backups
• Uses less storage than any competitor
• Unique Virtual Backup Appliance plugs into
the XenServer Hypervisor; scales quicker
and easier
• Requires no physical machines, 3rd party
OS or software
7. Image-based Comparison
Agent-based Image-based
Expensive Inexpensive
Difficult to deploy Easy to deploy
Limited Flexibility Supports almost all OS and databases
Works in physical and virtual
environments
Works in virtual environments
8. Backup Storage
Primary Storage
The VBA Architecture Advantage
Virtual Backup Appliance
100% Virtual Footprint
No Physical Servers
No Additional Software
Backup / Proxy Server
Physical Server
Operating System
Backup Software
SAN Attach (HBA)
Maintenance
Backup Storage
Primary Storage
VIRTUAL BACKUP APPLIANCE
OTHER PRODUCTS
VS.
Backup /
Proxy Server
9. PHD TrueDeDupe™ Technology
True Source Side Data Deduplication
Deduplicated Backup Data
Virtualization Host
• VBA processes and dedupes data before leaving host
• Unique data compressed & written to backup storage
• Customers regularly see 25:1 dedupe ratios
• Reduces backup storage requirements by 96%
• Reduces network impact and optimizes data transfer
10. Full and Incremental Backup Mode
Full FullInc Inc Inc Inc Inc Inc Inc Inc Inc Inc
Ideal Targets
Cloud
Network
(CIFS)
Dedupe
Tape
Virtual Full
Initial V Full V Full V Full V Full V Full V Full V Full V Full V Full V Full V Full V Full
Full &
Incremental
Attached
Virtual
Disk
11. Application Aware
• Small application installed in the guest (PHD Guest Tools)
• Ensures application consistency
• Performs Microsoft Exchange Log Truncation
– Combined with Digiscope email recovery, provides a complete
data protection story for virtualized Exchange
• Executes additional scripts for other applications, such as
SQL server
– Before and after a snapshot
– After a backup
12. E0008DD3.
log
E0008DD2.
log
E0008DD4.
log
PHD Tools
Application Aware Backups – Exchange Log
Truncation
1. Snapshot is taken and PHDVBA communicates with the PHD Tools
2. PHDVBA performs the backup of your Exchange VM
3. PHDVBA communicates to the PHD Tools to truncate the Exchange logs.
13. PHD Virtual Dynamic Recovery
Dynamic Recovery Technology
• Quickly Restore Full VM
- Standard or Rollback
• Quickly Restore Virtual Disk
• Instantly Recover App Object
• Instantly Recover File or Folder
Specific Data,
Faster
All VM Data,
Longer
Recovery Time
Recover the Right Level of Data Quickly and Efficiently
No Additional Physical or Virtual Infrastructure Required
14. PHD TrueRestore™ Technology
Backup
Storage
Deduplicated
Backup Data
TrueRestore™ Technology
TrueRestore™ Technology – Confidence in Restore
• Backup data integrity checked during backup process
• Data integrity checked during restore process
• Ensures restored data matches original source data
• Increases confidence in your ability to restore
15. Virtual Machine Replication
• Replicate Virtual Machines for DR
– Single pass backup and replication
• No additional snapshots for replication
• Replicate without impacting production
– Intelligent Data Replication
– Replication Seeding
– Verify Replicated VM’s with Test Mode
16. Virtual Machine Replication
1 2
Virtual Machine Replication
1. Replication VBA Reads Backups
from PHD Backup Storage and
Rehydrates VM’s
2. Replication VBA Restores VM’s to
the Replicated VM Storage in a
“powered down” state.
Production
Host
Replication
Host
Production
Storage
Replicated
Storage
Backup Storage
De-duped & Compressed
Replicate VM’s for DR
Replicate From Backup Storage
No Additional Snapshots
Intelligent Data Replication
Optimized Virtual Machine Replication
17. PHD Virtual Open Export
PHD Virtual Open Export
1. PHD Virtual Open Exporter converts
Backups to compressed OVF Files.
2. (Optional) Tape backup software
sweeps OVF Files to tape storage. Tape
Storage
PHD Backup Storage
De-duped & Compressed
Windows
Tape Server
Temporary
Storage
1 2
Export Backups to Standard OVF
Backup Faster to Tape Storage
Archive Backups Offsite
Restore Without Any Software
Optimized Portability of Backup Data
Lets get started by helping you understand a little more about our company…PHD Virtual provides the absolute best value in backup & disaster recovery assurance virtual and cloud environments.We help customers dramatically reduce the costs and risk of recovery within SLAsMore than 6,000 customers worldwide rely on our products (our customers are a who’s who among the Fortune 500 and we serve 1000s of mid-market companies too)Thanks to the amazing reception we have had from customers we have had 13 consecutive quarters of record revenue growth – This makes us one of the fastest growing software companies around the globeAnd, as you can imagine, our company has been recognized as standing out from our peers by receiving numerous awards as well as a direct investment by Citrix
Have you ever sat through a presentation and struggled to understand how that company is different from competitive alternatives? We believe its very important that we help you understand what sets PHD Virtual apart.Our approach for delivering unmatched value can be summed up in 3 simple differentiators:We deliver effective data protection and infrastructure monitoring products that are powerful, scalable and deliver value in minutesOur products are exceptionally easy to use – you’ll never need to read a manual, take a training course and you can install and be fully configured in less than 10 minutes – what Apple is to consumer electronics – we are to virtualization managementOur products are priced at a fraction of the cost of competitive alternatives – great technology shouldn’t be so expensiveIts why our customers represent our ultimate fan club… read quote
Its also why we’ve experienced amazing growth – and we fully expect the growth to continue
Lets turn to our award winning products and start with our Data Protection product called PHD Virtual Backup and ReplicationPHD Virtual Backup and Replicationprovides advanced data protection powered by our unique Virtual Backup Appliance architecture. It is the #1 Virtual Backup solution and supports both VMware and Citrix.Let me start by covering few key items before we give you an overview of specific capabilities and how it compares against competitorsLike all PHD products, its super easy to use, it installs and configures in minutes, requires no training and you can literally set-it- and forget itFor most customers its all about time to recovery and you’ll find no one is faster – and no product performs faster – We know that backup windows are short – so you need a product that moves at the pace of your businessYou’ll find we use significantly less storage than any other alternative because of our powerful source-side de-duplication capabilities and incremental back-ups which store only changesOne of the key differentiators of our product is our Virtual Backup Appliance architecture. This patented capability is our secret sauceThe VBA plugs directly into the hypervisor Offers the most effective virtual backup at the lowest cost – because our unique VBA architecture requires no physical machines or 3rd party software - lets take a look at how it in more detail…
The VBA is truly unique. The best way to describe this is to help you understand how it compares to architecture delivered by our competitors – Competitive alternatives:Add complexity and cost:They require separate physical servers and 3rd party software deployed outside the virtual environment (Veeam for example requires a separate windows based proxy server –and you'll have to maintain this –patch it upgrade it, secure it…what a hassle! And you’’ need an adapter (HBA) for the storage)Load balancing and solving for fault tolerance is more complex tooHarder to scale: Ease and speed of scaling is a primary driver of virtualization –your backup product should never limit this benefitTo scale you'll need to deploy and manage multiple physical serversLets contrast the this approach to the PHD’s VBA:Simple and less expensive:The VBA has a 100% virtualized footprint. This means it deploys as a virtual appliance, is managed directly from the v-sphere or XenServer hypervisor and requires no physical servers or additional softwareAdditional VBAs are easily deployed which enables you to quickly meet your organizations performance requirements or fault tolerance needsScales Quickly and easily: You can quickly deploy VBAs to scale and meet to meet enterprise needs – and its all done seamlessly within your virtual environment