SlideShare a Scribd company logo
1 of 14
Download to read offline
Symantec ApplicationHA & VirtualStore


    August 2010


Symantec Confidential                       1
Introducing Symantec ApplicationHA & VirtualStore


• ApplicationHA
    – Virtualize business-critical applications with confidence
    – Monitor applications in VMs and automate recovery
    – Manage within vCenter


• VirtualStore
    – Reduce storage costs caused by virtual sprawl
    – Provision VMs and virtual desktops faster
    – Manage within vCenter



Symantec Confidential                                             2
The Last Mile: Virtualizing Business Critical Applications
                          Introducing Symantec ApplicationHA

                            tier3             tier2          tier1
Virtualization adoption




                                                                                 Virtualization widely-adopted
                            IIS            WebLogic       SQL, Oracle
                                                                                  for non-critical applications
                            Apache         WebSphere      SAP
                            Print          File           Exchange               Increased pressure to continue
                                                                                  virtualizing

                                                                                 Business critical applications
                                                                                  are infrequently virtualized
                                                  Criticality of applications




                          Symantec Confidential                                                                    3
Why is the last mile so tough?
       Need for Availability

       Key challenges in managing virtualized servers1                                      “Customers have issues with apps failing
                                                                                            inside the guest… The market is lacking a
                                             (% of respondents)
                                                                                            solution”
        Ensuring Application Availability                           51%                          – joint Symantec-VMware partner


        Coordinating new deployments                             41%
                        and upgrades                                                        Today’s Solutions are Not Enough
           Managing unanticipated cost                           42%                              – Protection for physical, not
                             increases
                                                                                                    application failures
         Overcoming existing allocation,
        purchasing and budget practices                    29%                                    – Workarounds eliminate vMotion
                                                                                                    and DRS
          Compensating for the lack of
                                                            32%                                   – Do nothing no longer is an
         integrated management tools
                                                                                                    option



                How do you confidently virtualize business critical applications?

       Symantec Confidential                                                                                                            4

1. Source: IDC, October 2009. Choosing Storage for Virtualized Servers. For companies with > 1,000 employees.
Confidently Virtualize Business Critical Applications
Extend virtualization benefits

         VM1       VM2    VM1      VM2

         App        SQL   App      SQL




          OS        OS     OS       OS

          VMware HA       VMware HA
           VMware ESX      VMware ESX




  • VMware HA may be good enough for
    some workloads
  • But, it ONLY works for physical server
    failures




Symantec Confidential                                   5
Confidently Virtualize Business Critical Applications
Extend virtualization benefits

                          VM1      VM2                  VM1         VM2

                                                         App             SQL
                          App      SQL
                                                      Application   Application
                                                         HA            HA

                                                         OS              OS
                           OS       OS

          VMware HA       VMware HA                         VMware HA
           VMware ESX      VMware ESX                       VMware ESX




  • VMware HA may be good enough for         • Business critical workloads require
    some workloads                             application monitoring and recovery
  • But, it ONLY works for physical server   • Coming in September – an integrated
    failures                                   HA solution for mission critical
                                               applications by Symantec & VMware


Symantec Confidential                                                                6
ApplicationHA: Strong VMware–Symantec Partnership
• Joint solution development                 • Launch at VMworld US
    – Joint customer research including        – Joint session at VMworld 2010 - US and
      VMware customer councils                   EMEA
    – Design and mockup reviews                – vExpert briefings
    – Weekly PM & Engineering sync-up.         – Symantec Key Note session with VMware
                                                 on ApplicationHA
    – Beta testing at VMware internal IT &
      Symantec internal IT                     – Joint solution white papers
                                               – Joint PR/AR activities




Symantec Confidential                                                                     7
ApplicationHA Key-Takeaways
• Addresses key challenge to “last mile” of virtualization
• Strong partnership with VMware
• Operationally simple
    – Integration in vCenter and Symantec management tools
• Built off industry-leading Veritas Cluster Server technology




Symantec Confidential                                            8
Symantec VirtualStore



Symantec Confidential       9
Why is the last mile so tough?
       Need for Efficient Storage Management

       Key challenges in managing virtualized servers1
                                             (% of respondents)
                                                                                            Today’s Solutions are Not Enough
        Ensuring Application Availability                           51%
                                                                                                  – Inefficient storage use
        Coordinating new deployments                             41%                              – Poor I/O performance
                        and upgrades
                                                                                                  – Limited visibility
           Managing unanticipated cost                           42%
                             increases

         Overcoming existing allocation,
        purchasing and budget practices                    29%


          Compensating for the lack of
                                                            32%
         integrated management tools




       Symantec Confidential                                                                                                   10

1. Source: IDC, October 2009. Choosing Storage for Virtualized Servers. For companies with > 1,000 employees.
Virtualization Can Create Storage Challenges

               Inefficient Storage Use             Poor I/O Performance




                                                 VMware



• Scaling the number of VMs means         • End user experience degrades when VDI
  scaling the number of VM images           users log-in en masse
• Data in each image is duplicated        • Improving performance is expensive and
• Growing storage capacity is expensive     complicated
  and complicated


VirtualStore                                                                     11
Optimize Your Storage in VMware Environments
VirtualStore
  Improve Performance              Reduce Storage Costs                 Manage Easily




• Scale performance easily and   • Scale storage easily with      • Manage storage from
  cost effectively                 existing or commodity            vCenter and eliminate the
• Provision virtual machines       storage                          need for additional
  faster                         • Store space optimized            management tools
• Improve boot-up times for        VM/VD snapshots
  virtual desktops               • Deploy thin provisioning and
                                   storage tiering


                                                                                                12
VirtualStore Overview
   Scale-out NAS Solution for VMware
• Scalable, high performance Clustered NAS      ESX Servers

  solution running on Solaris, Solaris x86 or
                                                    NFS
  RHEL 5
• File serving performance scales linearly
  with each VirtualStore head                             …
• Patented cache optimization packs more
                                                VirtualStore
  virtual machines into a single NAS head to
  deliver faster boot times and improved
  user experience                                  SAN
• Space optimized snapshots reduce storage
  footprint by only capturing iterations to
  original VM/virtual desktop image
• Supports major storage platforms to
  enable commodity or multiple vendor
  storage strategies
• Centrally managed through VMware
  vCenter

VirtualStore                                                   13
Thank you!




SYMANTEC PROPRIETARY/CONFIDENTIAL – INTERNAL USE ONLY
Copyright © 2010 Symantec Corporation. All rights reserved.




                                                              Symantec Confidential   14

More Related Content

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Symantec ApplicationHA and VirtualStore

  • 1. Symantec ApplicationHA & VirtualStore August 2010 Symantec Confidential 1
  • 2. Introducing Symantec ApplicationHA & VirtualStore • ApplicationHA – Virtualize business-critical applications with confidence – Monitor applications in VMs and automate recovery – Manage within vCenter • VirtualStore – Reduce storage costs caused by virtual sprawl – Provision VMs and virtual desktops faster – Manage within vCenter Symantec Confidential 2
  • 3. The Last Mile: Virtualizing Business Critical Applications Introducing Symantec ApplicationHA tier3 tier2 tier1 Virtualization adoption  Virtualization widely-adopted IIS WebLogic SQL, Oracle for non-critical applications Apache WebSphere SAP Print File Exchange  Increased pressure to continue virtualizing  Business critical applications are infrequently virtualized Criticality of applications Symantec Confidential 3
  • 4. Why is the last mile so tough? Need for Availability Key challenges in managing virtualized servers1 “Customers have issues with apps failing inside the guest… The market is lacking a (% of respondents) solution” Ensuring Application Availability 51% – joint Symantec-VMware partner Coordinating new deployments 41% and upgrades Today’s Solutions are Not Enough Managing unanticipated cost 42% – Protection for physical, not increases application failures Overcoming existing allocation, purchasing and budget practices 29% – Workarounds eliminate vMotion and DRS Compensating for the lack of 32% – Do nothing no longer is an integrated management tools option How do you confidently virtualize business critical applications? Symantec Confidential 4 1. Source: IDC, October 2009. Choosing Storage for Virtualized Servers. For companies with > 1,000 employees.
  • 5. Confidently Virtualize Business Critical Applications Extend virtualization benefits VM1 VM2 VM1 VM2 App SQL App SQL OS OS OS OS VMware HA VMware HA VMware ESX VMware ESX • VMware HA may be good enough for some workloads • But, it ONLY works for physical server failures Symantec Confidential 5
  • 6. Confidently Virtualize Business Critical Applications Extend virtualization benefits VM1 VM2 VM1 VM2 App SQL App SQL Application Application HA HA OS OS OS OS VMware HA VMware HA VMware HA VMware ESX VMware ESX VMware ESX • VMware HA may be good enough for • Business critical workloads require some workloads application monitoring and recovery • But, it ONLY works for physical server • Coming in September – an integrated failures HA solution for mission critical applications by Symantec & VMware Symantec Confidential 6
  • 7. ApplicationHA: Strong VMware–Symantec Partnership • Joint solution development • Launch at VMworld US – Joint customer research including – Joint session at VMworld 2010 - US and VMware customer councils EMEA – Design and mockup reviews – vExpert briefings – Weekly PM & Engineering sync-up. – Symantec Key Note session with VMware on ApplicationHA – Beta testing at VMware internal IT & Symantec internal IT – Joint solution white papers – Joint PR/AR activities Symantec Confidential 7
  • 8. ApplicationHA Key-Takeaways • Addresses key challenge to “last mile” of virtualization • Strong partnership with VMware • Operationally simple – Integration in vCenter and Symantec management tools • Built off industry-leading Veritas Cluster Server technology Symantec Confidential 8
  • 10. Why is the last mile so tough? Need for Efficient Storage Management Key challenges in managing virtualized servers1 (% of respondents) Today’s Solutions are Not Enough Ensuring Application Availability 51% – Inefficient storage use Coordinating new deployments 41% – Poor I/O performance and upgrades – Limited visibility Managing unanticipated cost 42% increases Overcoming existing allocation, purchasing and budget practices 29% Compensating for the lack of 32% integrated management tools Symantec Confidential 10 1. Source: IDC, October 2009. Choosing Storage for Virtualized Servers. For companies with > 1,000 employees.
  • 11. Virtualization Can Create Storage Challenges Inefficient Storage Use Poor I/O Performance VMware • Scaling the number of VMs means • End user experience degrades when VDI scaling the number of VM images users log-in en masse • Data in each image is duplicated • Improving performance is expensive and • Growing storage capacity is expensive complicated and complicated VirtualStore 11
  • 12. Optimize Your Storage in VMware Environments VirtualStore Improve Performance Reduce Storage Costs Manage Easily • Scale performance easily and • Scale storage easily with • Manage storage from cost effectively existing or commodity vCenter and eliminate the • Provision virtual machines storage need for additional faster • Store space optimized management tools • Improve boot-up times for VM/VD snapshots virtual desktops • Deploy thin provisioning and storage tiering 12
  • 13. VirtualStore Overview Scale-out NAS Solution for VMware • Scalable, high performance Clustered NAS ESX Servers solution running on Solaris, Solaris x86 or NFS RHEL 5 • File serving performance scales linearly with each VirtualStore head … • Patented cache optimization packs more VirtualStore virtual machines into a single NAS head to deliver faster boot times and improved user experience SAN • Space optimized snapshots reduce storage footprint by only capturing iterations to original VM/virtual desktop image • Supports major storage platforms to enable commodity or multiple vendor storage strategies • Centrally managed through VMware vCenter VirtualStore 13
  • 14. Thank you! SYMANTEC PROPRIETARY/CONFIDENTIAL – INTERNAL USE ONLY Copyright © 2010 Symantec Corporation. All rights reserved. Symantec Confidential 14