Digital reference architecture in hybrid cloudDavide Veronese
This document contains the high-level description of a Reference Architecture including infrastructure and applications concepts/solutions in a Hybrid Cloud context for the FS enterprises.
I describe how:
app modernization
data architecture modernization
APIs
DevOps
Digital and Open banking
Cloud-ready operating model
Can be aligned in a unique target architecture
This one-hour presentation covers the tools and techniques for migrating SQL Server databases and data to Azure SQL DB or SQL Server on VM. Includes SSMA, DMA, DMS, and more.
Digital reference architecture in hybrid cloudDavide Veronese
This document contains the high-level description of a Reference Architecture including infrastructure and applications concepts/solutions in a Hybrid Cloud context for the FS enterprises.
I describe how:
app modernization
data architecture modernization
APIs
DevOps
Digital and Open banking
Cloud-ready operating model
Can be aligned in a unique target architecture
This one-hour presentation covers the tools and techniques for migrating SQL Server databases and data to Azure SQL DB or SQL Server on VM. Includes SSMA, DMA, DMS, and more.
Jade Global’s RightStart ServiceNow Discovery package is a rapid implementation service for designing and configuring ServiceNow Discovery to automatically populate ONLY the scoped Configuration Item (CI) classes and CI relationships.
Enriching your CMDB data
Automated population of the CMDB
Straightening out the Product Catalog with Normalization
Reconciliation tips and performance tuning
Benefits
Database migration from Sybase ASE to PostgreSQL @2013.pgconf.eualdaschwede80
The talk explains some differences between Sybase ASE and PostgreSQL and shows two different migration strategies - the dump reload process and replication.
E’ un’estensione di VMware vCenter che fornisce ai professionisti IT la possibilità di disaster recovery, migrazione di siti e funzionalità di test non distruttive.
Five Connectivity and Security Use Cases for Azure VNetsKhash Nakhostin
As you complete your plans for moving IT infrastructure and application workloads to Azure, it’s important to understand what connectivity and security services Microsoft includes by default – and what’s missing. Though Azure comes with baseline capabilities, it’s still up to you to choose judiciously among many Azure-native and third-party options to address unique requirements. This session explores use cases, such as encrypting traffic between VNets holding sensitive data, remote user access to VNets, multi-cloud connectivity, and filtering egress traffic to the Internet.
We cover the questions you should be asking: what are the key issues that matter, what does Microsoft provide, and what’s missing? We address these questions for each of the five most common use cases:
On-prem to VNet
VNet to VNet
VNet to Internet (Egress)
User to VNet
VNet to AWS VPC
We then demonstrate how a software-defined approach can deliver simplified and unified control over cloud routing, embracing both Azure-native and third-party services.
Cloud Migration Patterns: A Multi-Cloud Architectural PerspectivePooyan Jamshidi
Cloud migration requires an engineering, verifiable, measurable, transparent and repeatable approach rather than an ad-hoc approach based on trial and error.
We describe a comprehensive set of (multi-)cloud migration patterns from an architectural perspective. In this work, we focus on application components and their migration to the multi-cloud environments. We define and characterize the patterns with concrete usage scenario. We also describe the process for migration pattern selection, composition and extension.
Remote IT Infra - lower cost & higher efficiencyAbimanyu V
Why should your business consider remote IT infrastructure management services in 2014 ?
Your IT infrastructure costs you too much ?
Did you know, many companies revenue growth is limited by their IT infrastructure expenses ?
This short video should answer your pain areas.
In an era when many IT organizations are transforming themselves from cost centers into business enablers, the maturity of an organization’s approach to infrastructure monitoring becomes critical. The IT operations team must move beyond ad hoc monitoring and embrace an approach that actively optimizes the infrastructure for business innovation and agility. A maturity model for infrastructure monitoring offers enterprises guidance on how to achieve that goal.
These slides - baesd on the webinar featuring Shamus McGillicuddy, senior analyst at leading IT analyst firm Enterprise Management Associates (EMA), and Scott Frymire, director of marketing at SevOne - examine:
- The functional capabilities that are required of a mature monitoring platform
- The cultural and process-oriented aspects of a mature IT operations team
- SevOne’s product-agnostic, five-stage maturity model for infrastructure monitoring
Power BI & SAP - Integration Options and possible PifallsJJDE
Dein Unternehmen setzt als ERP/BI-System auf SAP? Und du suchst nach den besten Möglichkeiten, um alle SAP BW / HANA-Daten in Microsoft Power BI zu integrieren und das Beste aus beiden Welten zu nutzen? Dann ist diese Session für dich! Du erhältst einen Überblick über die verschiedenen Integrationsoptionen und -Überlegungen, die du berücksichtigen solltest.
English Version:
Your Company's ERP and/or BI-System is SAP? And you are looking for the best options to get all your SAP BW/HANA Data to Microsoft (Power) BI and leverage the best of both worlds? Then this session is for you! You will get an overview of the several integration options and considerations you should be aware. The session will be hold in german language but of course we can switch to English as needed.
Jade Global’s RightStart ServiceNow Discovery package is a rapid implementation service for designing and configuring ServiceNow Discovery to automatically populate ONLY the scoped Configuration Item (CI) classes and CI relationships.
Enriching your CMDB data
Automated population of the CMDB
Straightening out the Product Catalog with Normalization
Reconciliation tips and performance tuning
Benefits
Database migration from Sybase ASE to PostgreSQL @2013.pgconf.eualdaschwede80
The talk explains some differences between Sybase ASE and PostgreSQL and shows two different migration strategies - the dump reload process and replication.
E’ un’estensione di VMware vCenter che fornisce ai professionisti IT la possibilità di disaster recovery, migrazione di siti e funzionalità di test non distruttive.
Five Connectivity and Security Use Cases for Azure VNetsKhash Nakhostin
As you complete your plans for moving IT infrastructure and application workloads to Azure, it’s important to understand what connectivity and security services Microsoft includes by default – and what’s missing. Though Azure comes with baseline capabilities, it’s still up to you to choose judiciously among many Azure-native and third-party options to address unique requirements. This session explores use cases, such as encrypting traffic between VNets holding sensitive data, remote user access to VNets, multi-cloud connectivity, and filtering egress traffic to the Internet.
We cover the questions you should be asking: what are the key issues that matter, what does Microsoft provide, and what’s missing? We address these questions for each of the five most common use cases:
On-prem to VNet
VNet to VNet
VNet to Internet (Egress)
User to VNet
VNet to AWS VPC
We then demonstrate how a software-defined approach can deliver simplified and unified control over cloud routing, embracing both Azure-native and third-party services.
Cloud Migration Patterns: A Multi-Cloud Architectural PerspectivePooyan Jamshidi
Cloud migration requires an engineering, verifiable, measurable, transparent and repeatable approach rather than an ad-hoc approach based on trial and error.
We describe a comprehensive set of (multi-)cloud migration patterns from an architectural perspective. In this work, we focus on application components and their migration to the multi-cloud environments. We define and characterize the patterns with concrete usage scenario. We also describe the process for migration pattern selection, composition and extension.
Remote IT Infra - lower cost & higher efficiencyAbimanyu V
Why should your business consider remote IT infrastructure management services in 2014 ?
Your IT infrastructure costs you too much ?
Did you know, many companies revenue growth is limited by their IT infrastructure expenses ?
This short video should answer your pain areas.
In an era when many IT organizations are transforming themselves from cost centers into business enablers, the maturity of an organization’s approach to infrastructure monitoring becomes critical. The IT operations team must move beyond ad hoc monitoring and embrace an approach that actively optimizes the infrastructure for business innovation and agility. A maturity model for infrastructure monitoring offers enterprises guidance on how to achieve that goal.
These slides - baesd on the webinar featuring Shamus McGillicuddy, senior analyst at leading IT analyst firm Enterprise Management Associates (EMA), and Scott Frymire, director of marketing at SevOne - examine:
- The functional capabilities that are required of a mature monitoring platform
- The cultural and process-oriented aspects of a mature IT operations team
- SevOne’s product-agnostic, five-stage maturity model for infrastructure monitoring
Power BI & SAP - Integration Options and possible PifallsJJDE
Dein Unternehmen setzt als ERP/BI-System auf SAP? Und du suchst nach den besten Möglichkeiten, um alle SAP BW / HANA-Daten in Microsoft Power BI zu integrieren und das Beste aus beiden Welten zu nutzen? Dann ist diese Session für dich! Du erhältst einen Überblick über die verschiedenen Integrationsoptionen und -Überlegungen, die du berücksichtigen solltest.
English Version:
Your Company's ERP and/or BI-System is SAP? And you are looking for the best options to get all your SAP BW/HANA Data to Microsoft (Power) BI and leverage the best of both worlds? Then this session is for you! You will get an overview of the several integration options and considerations you should be aware. The session will be hold in german language but of course we can switch to English as needed.
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...Netgear Italia
Demo di una soluzione di Disaster Recovery e Backup per sistemi di virtualizzazione. L'ambiente utilizzato contempla l'utilizzo di un hypervisor vmware con Acronis per Vmware, 2 ReadyDATA ( 1 RDD516 ed 1 RD5200) come soluzioni di storage per i datastore, quali repository del backup e soluzione per il disaster recovery.
Improved Efficiency through Workload Optimisationianmasters
Improving company efficiency through a dynamic infrastructure and workload optimisation. Reduce downtime associated with migrations, maintenance or unplanned events. Centralise backup procedures, perform more reliable recoveries, recover to any-point-time, and flexibly run your server and desktop infrastrucure from centralised images.
Le soluzioni tecnologiche a supporto del mondo OpenStack e ContainerJürgen Ambrosi
L’interesse da parte delle aziende verso soluzioni come i Containers e cloud-based come OpenStack è ampiamente confermato dal trend positivo rilevato dagli analisti. I benefici derivanti dall’adozione di tali soluzioni nell’ambito IT sono rappresentati dalla possibitità di realizzare architetture maggiormente agili, scalabili ed economiche in grado di soddisfare le sempre piu’ stingenti esigenze di business ed affrontare le pressioni competitive. Veritas presenta le proprie soluzioni software defined storage Veritas ™ HyperScale per OpenStack e Veritas ™ HyperScale for Containers quali piattaforme abilitanti all’introduzione di tali nuove soluzioni tecnologiche garantendo altresì un livello di affidabilità Enterprise-class.
Comprehensive and Simplified Management for VMware vSphere Environments - now...Hitachi Vantara
Learn how to build out a robust private cloud infrastructure with the assurance that all the underlying server, storage, and network resources are in place and aligned to the appropriate service levels.
See how to achieve predictable reliability based on business needs in a robust, enterprise-class cloud platform – Hitachi Unified Compute Platform Pro for VMware vSphere.
We’ll take you through the latest updates to this industry-leading solution that is deeply integrated with vSphere, including HDS servers and storage, Brocade Fibre Channel, your choice of Cisco or Brocade Ethernet networking. We’ll also talk about software updates that include bare-metal support, improved monitoring and performance tuning, federated management, and non-disruptive firmware upgrades.
Azure en Nutanix: your journey to the hybrid cloudICT-Partners
Op zoek naar oplossingen voor een flexibel, schaalbaar, kostenefficiënt en toekomstvast datacenter? Ontdek dan nu de kracht van Microsoft Azure & Nutanix: twee moderne platformen waarmee u de voordelen van uw on-premise infrastructuur kunt combineren met de voordelen van de public cloud.
Presentatie van 30 april 2015
Webinar NETGEAR - Acronis e Netgear - Soluzione per le AziendeNetgear Italia
Introduzione alle soluzioni di protezione di dati e sistemi per l'Azienda. DEMO live di configurazione delle policy di Backup dei sistemi e del processo di Replica dei repository su storage off site.
Attendees in this session will enhance their skills and job relevancy by gaining new knowledge and skills using the Oracle Public Cloud within their job role through actual use cases .
Will detail how backup to the cloud can be used to meet different needs of their organization and how to justify use of new technology within their business. Learn how to create a storage container, setup OS secure authentication and configure RMAN to use the Oracle Cloud. Perform a backup to the Oracle Cloud and recover from it back to your on-premise server. Learn how to migrate from an on-premise Oracle Database 12c to a pluggable Oracle Database 12c (PDB) in the Oracle Cloud. Then move a PDB in which Developers have completed their work in the Oracle Cloud back on-premise and into production
Pivotal Container Service (PKS) at SF Cloud Foundry Meetupcornelia davis
Overview of Pivotal Container Service (PKS), built on the open source Cloud Foundry Container Runtime (CFCR). Covers what Kubernetes is, how PKS presents a complete platform that includes Kubernetes and much more, and key cloud principles.
Presented at the San Francisco-Bay Area Cloud Foundry meetup.
Microsoft Azure Bringing Cloud to Your EnterpriseCA Technologies
Take a look at scenarios to get started with Microsoft Azure.
For more information on Management Cloud solutions from CA Technologies, please visit: http://bit.ly/1wEnPhz
Similar to Présentation VERITAS Backup Exec 16 (20)
Xpress azure - Extension of Azure in TunisiaAymen Mami
Presentation of Xpress Azure, the first extension of Microsoft Azure in Tunisia. Based on Microsoft Azure Stack in partnership with Cisco. For more informations, dont hesitate to contact me
Cisco & Microsoft Converged InfrastructureAymen Mami
Cisco & Microsoft Converged Infrastructure workshop @ Cisco Regional Summit Tunisia 2017
What is Cisco UCS Offering
Cisco partnership with SAN storage manufacturers
Cisco partnership with Microsoft for private cloud
Integration between Microsoft System center & Cisco UCS manager
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
Présentation VERITAS Backup Exec 16
1. Aymen MAMI
Technical Account Manager
aymenm@rfc.com.tn
Vous accompagner dans votre
Transformation Numérique !
WWW.RFC.COM.TN
WWW.RFC.COM.TN
Présentation de RFC
2. Notre Activité
Consulting Formation
Réalisation de
Projets
Assistance &
Support
Service global
de la stratégie à
l'implémentation
technologique au
support
Activité
Commerciale
WWW.RFC.COM.TN
WWW.RFC.COM.TN
16. EDUCATION SERVICES
Reduce the time and resources spent backing up and
recovering data. Restore individual items from database
and virtual backups
Granular Restore Technology
40. 40
Minimize Downtime With Virtual Conversions
Virtualize with Confidence
Migration Accelerator – P2V, B2V & V2P
Process diagram
Hyper-V or VMware HostBackup Exec 16 ServerPhysical Server
Minimize Downtime
Reduce Management
Time and Set-up
Virtualize
Accelerate Move to
Virtualized Environment
High Speed
Dramatically Reduce
System Downtime
VM VM VMVM
VM VM VMVM
Parallel Option
Serial Option
Backup
Backup
Convert
Convert
61. Bénéfice Client
Mise en place de la solution de sauvegarde Backup Exec depuis
10 ans avec mise à niveau de version (12.5, 2010, 2014, 15, 16)
Problème de gestion des sauvegardes et de l’externalisation
des données hors site
Fiabilité et efficacité des restauration à
plusieurs reprises (Fichier, Base SQL, Base
Oracle, Serveur virtuel, etc…)
Optimisation du stockage de sauvegarde et
duplication sur bande/intersites
Facilité d’utilisation avec une console
conviviale et intuitive et un reporting clair
et efficace
Solution RFC
Problématiques
MG est une chaîne de supermarchés tunisienne qui existe
depuis plus de 100 ans.
Témoignage Magasin Général
Existant
Système d’information assez complexe
Plusieurs technologies utilisées
Bechir DAHMEN
Responsable Infrastructure système
Veritas Backup Exec™ 16 is the trusted recovery solution for millions of businesses worldwide. With increasingly complex infrastructures and evolving IT needs, it’s vital that your business has a dynamic, unified solution that will deliver high performance, reliability and simplicity – from planning through to execution. Your business needs backup and recovery that adapts to your environment; that works with your budget, not against it. Your business needs Backup Exec™ 16.
Key take-aways from Spiceworks Data
Nearly half data is still in physical systems …. Cloud is growing rapidly
In 3 years still 1/3 of data in physical
B&R is #1 cloud use case, but not all data can be sent to the cloud
Average of 4.1 DP solutions / customer … more data in future
Clear preference expressed in survey for Unified DP solution
Mid-Market organizations need a DP solution that is powerful, flexible, trusted
Powerful:
Rapid backup and restore of virtual machines: Instant GRT and Instant Recovery
Use “Any S3” cloud connector to back up to any S3-compatible data store
Flexible:
One backup system for all virtual, physical and cloud data
Backup Exec supports the widest range of storage devices of any other backup solution
Trusted
Veritas is committed to Backup Exec:
we have dedicated sales and marketing teams, we have improved partner profitability programs
Part of the trust is knowing ongoing version commitment (next slide)
Here is the Backup Exec customer value proposition: One Backup to Rule them All
You have physical, you have virtual, you are moving to the cloud. You’ll continue to do so. Backup Exec covers it all. One Backup to Rule them All means reliable data protection that looks to the future without forgetting the present. It means cost savings on licensing, maintenance, hardware and training as you consolidate backup solutions. It means a faster, more secure and reliable recovery solution.
Flexible Storage Options
Backup Exec 16 supports a wide variety of storage options, allowing customers and partners important flexibility as they match the right storage device or device combination to the needs of a specific environment.
Disk Storage Devices
Most local and network disk devices can be utilized by Backup Exec for backup data storage. This includes local disk devices accessed via SATA or SAS adapters, shared storage devices accessed through Fiber Channel adapters or iSCSI initiator software, as well as network disk storage resources accessed through network protocols as UNC locations or CIFS shares. High-performance local storage can be promoted to a Deduplication Storage Device, allowing backup data stored to that device to be optimized using Backup Exec’s built-in deduplication technology.
Tape Storage Devices
In addition to disk storage, Backup Exec supports a wide variety of tape drives and tape libraries. Backup Exec also includes support for virtual tape libraries, allowing a disk resource to emulate a tape drive and be used in the same way.
Appliance Storage Options
Many 3rd-party appliances can also be used by Backup Exec as remote storage devices. Advanced functionality can be leveraged against 3rd-party appliances that have developed an OpenStorage (OST) plug-in, allowing Backup Exec to leverage the advanced data management capabilities that the OST API unlocks.
Cloud Storage Options
Backup Exec 16 also continues to expand it’s cloud capabilities. In addition to Backup Exec’s Private Cloud Services capability, Backup Exec 16 also supports the Quantum Q-cloud gateway solution, allowing customers flexible cloud options as an alternative or additional storage resources.
Overall, Backup Exec supports an amazing number of backup storage devices that very few competitors can even come close to matching. Symantec provides regularly updated documents that provide authoritative, current information about what specific software and hardware options are supported by Backup Exec. These are known as the Backup Exec hardware and software compatibility lists and are available to anyone via the Symantec knowledge base system.
Fully Integrated Deduplication Technology
Backup Exec continues to refine and polish its integrated data deduplication technology, which is built-in directly to the Backup Exec server and the Agent for Windows and the Agent for Linux. This technology allows the Backup Exec server to host a deduplication storage device on a local disk, to which any or all backup streams can be saved. Backups saved to the deduplication storage device are scanned and optimized using variable-length segmenting, removing block redundancies from the backups and greatly reducing the amount of disk backup space consumed by deduplicated backups.
Backup Exec’s deduplication technology also includes advanced stream handlers for both VMware and Hyper-V backups, allowing for greater optimization of virtual machine backups.
The integrated deduplication technology within Backup Exec can be configured in several ways depending upon the environment in which deduplication is being used. This includes client deduplication, server deduplication, and appliance deduplication.
Highlight:
In the past: You were restricted to physical data center locations
Today: You are adopting 1 or more clouds
In the future: Imaging trying to control hundreds or thousands of business applications and data across these multiple clouds.
Focus: Reduce costs, Increase productivity and profitability, Speed to market, Meet Varied SLAs
Problem: Inflexibility in moving back from the cloud or moving between clouds
A move to a public cloud often occurs to drive down capital expenditures. If it is a public cloud where you will be running applications that you have to size for performance, there are some skillsets you will want to invest in before you make the move.
Monitoring
Security & Compliance
Orchestration & Automation
Security never sleeps.
Security is an integral part of any IT infrastructure. OUR job is to bring our leading technologies to every endpoint, every device, every enterprise.
Every stage requires capabilities and compliance.
Our mission is to protect and defend against any threat in any environment. We mean business.
First lets look at how attack methodology works. What are the phases, what are the important points of protection? Attackers are systematic, usually following…
Initial reconnaissance: seeing what’s out there
Incursion: What’s the actual incursion or break in point?
Discovery: Where they start looking at information – confidential, sensitive information.
Capture: The stage where they capture the information and assemble it.
Exfiltrate: Where information gets pushed out of the organisation, into the hands of the hackers or criminals.
The Backup Exec database stores sensitive information such as:
Logon Accounts for jobs,
Device access passwords, and
Data backup encryption keys.
Prior to BE 16, these columns were encrypted. Backup Exec 16 now provides a second layer of encryption using the AES 256 symmetric encryption algorithm.