VMware and Symantec have partnered to deliver ApplicationHA, which provides high availability of applications running in virtual machines. The new release of ApplicationHA integrates with VMware Site Recovery Manager to ensure application awareness during disaster recovery between sites. It also includes enhancements like monitoring hundreds of applications from a single dashboard and supporting additional guest operating systems and applications.
Mobile to mainframe - The Challenges and Best Practices of Enterprise DevOps IBM UrbanCode Products
Delivering software is complex. Systems being developed are made up of multiple components, which in turn interact with other systems, services, application servers, data sources and invocations of 3rd party systems. In an Enterprise this complexity is further enhanced by the cross-platform nature of the infrastructure typical enterprises have. While the customers may be interacting with Systems of Engagement using Mobile and Web Apps, the core capabilities of the enterprise that the customers access are in Systems of Record that are running on large datacenters and more than likely Mainframe systems. Keeping these complex systems up and running and constantly updated with the latest capabilities is a task that requires constant coordination between the lines of business, various cross-platform development, QA and operations teams.
DevOps addresses these development and deployment challenges. The goal of DevOps is to align Dev and Ops by introducing a set of principles and practices such as continuous integration and continuous delivery. Cross-platform enterprise Systems take the need for these practices up a level due to their inherent complexity and distributed nature. Such systems need even more care in applying DevOps principles as there are multiple platforms to be targeted, in a coordinated manner, each with its own requirements, quirks, and nuanced needs. This talk takes a look at the DevOps challenges specific to Cross-platform Enterprise Systems and present Best Practices to address them.
Enterprise management – solution suite overview msArrow ECS UK
Enterprise Management – Solution Suite Overview
A look at each new solution suite and how they can be used in harmony to make strides towards delivering IT as a service.
Mark Stockham, Enterprise Management Specialist
Mobile to mainframe - The Challenges and Best Practices of Enterprise DevOps IBM UrbanCode Products
Delivering software is complex. Systems being developed are made up of multiple components, which in turn interact with other systems, services, application servers, data sources and invocations of 3rd party systems. In an Enterprise this complexity is further enhanced by the cross-platform nature of the infrastructure typical enterprises have. While the customers may be interacting with Systems of Engagement using Mobile and Web Apps, the core capabilities of the enterprise that the customers access are in Systems of Record that are running on large datacenters and more than likely Mainframe systems. Keeping these complex systems up and running and constantly updated with the latest capabilities is a task that requires constant coordination between the lines of business, various cross-platform development, QA and operations teams.
DevOps addresses these development and deployment challenges. The goal of DevOps is to align Dev and Ops by introducing a set of principles and practices such as continuous integration and continuous delivery. Cross-platform enterprise Systems take the need for these practices up a level due to their inherent complexity and distributed nature. Such systems need even more care in applying DevOps principles as there are multiple platforms to be targeted, in a coordinated manner, each with its own requirements, quirks, and nuanced needs. This talk takes a look at the DevOps challenges specific to Cross-platform Enterprise Systems and present Best Practices to address them.
Enterprise management – solution suite overview msArrow ECS UK
Enterprise Management – Solution Suite Overview
A look at each new solution suite and how they can be used in harmony to make strides towards delivering IT as a service.
Mark Stockham, Enterprise Management Specialist
Today’s IT organizations operate in an increasingly more complex environment. Resources are limited, operating costs are soaring and service interruptions are unacceptable.
This session covered:
Manage applications and a wide variety of technologies including vmWare and Unified Communications environments
Collect service level and capacity management data to measure and maintain performance in both virtual and non-virtual environments
Manage applications' performance to meet user demands
Keep monitoring current with policies in fast-changing virtualized environments
IBM PureApplication System - Application platform system with integrated expertise. It consolidates workloads, simplifies infrastructure and delivers services rapidly using built-in expertise.
Centralized systems management: Dell Management Plug-In for VMware vCenter vs...Principled Technologies
Leveraging the power of the Lifecycle Controller 2 and Dell Management Plug-In for VMware vCenter, Dell made server management simpler and faster in our test scenarios. In our tests, using Dell vCenter integration saved time and required fewer steps when compared to using similar HP vCenter integration solutions. Dell’s approach can potentially offer an organization dramatic savings in time and effort over the server lifecycle.
Learn about Monitoring process to keep eye on systems or scheduled activities, to obtain real-time information to ease the overview or action in certain cases.For more information, visit http://ibm.co/PNo9Cb.
Presentation at Impact 2012 Mumbai:
This IBM PureSystems presentation was presented by Amol B Mahamuni, Program Director ISL, IBM PureApplication System Product Management
Radware Alteon VA for IBM PureFlex System ensures
24×7 uptime and effective disaster recovery (DR) for local
and globally dispersed applications, at all times. By utilizing
advanced health checks, traffic redirection, persistency, and
content modification capabilities, it guarantees transaction
completion through real-time identification and bypassing
of any faulty element along the transaction path. In addition,
Radware’s global server load balancing (GSLB) service ensures
the global availability of all applications.
Symantec Corp. announced the publication of its June 2011 Symantec Intelligence Report, the first Symantec report to combine the best research and analysis from the Symantec.cloud MessageLabs Intelligence Report and the Symantec State of Spam & Phishing Report. This month's analysis reveals that spam is currently at the lowest level it has been since the takedown of McColo, a California based ISP which hosted command and control channels for a number of major botnets, in November 2008.
Today’s IT organizations operate in an increasingly more complex environment. Resources are limited, operating costs are soaring and service interruptions are unacceptable.
This session covered:
Manage applications and a wide variety of technologies including vmWare and Unified Communications environments
Collect service level and capacity management data to measure and maintain performance in both virtual and non-virtual environments
Manage applications' performance to meet user demands
Keep monitoring current with policies in fast-changing virtualized environments
IBM PureApplication System - Application platform system with integrated expertise. It consolidates workloads, simplifies infrastructure and delivers services rapidly using built-in expertise.
Centralized systems management: Dell Management Plug-In for VMware vCenter vs...Principled Technologies
Leveraging the power of the Lifecycle Controller 2 and Dell Management Plug-In for VMware vCenter, Dell made server management simpler and faster in our test scenarios. In our tests, using Dell vCenter integration saved time and required fewer steps when compared to using similar HP vCenter integration solutions. Dell’s approach can potentially offer an organization dramatic savings in time and effort over the server lifecycle.
Learn about Monitoring process to keep eye on systems or scheduled activities, to obtain real-time information to ease the overview or action in certain cases.For more information, visit http://ibm.co/PNo9Cb.
Presentation at Impact 2012 Mumbai:
This IBM PureSystems presentation was presented by Amol B Mahamuni, Program Director ISL, IBM PureApplication System Product Management
Radware Alteon VA for IBM PureFlex System ensures
24×7 uptime and effective disaster recovery (DR) for local
and globally dispersed applications, at all times. By utilizing
advanced health checks, traffic redirection, persistency, and
content modification capabilities, it guarantees transaction
completion through real-time identification and bypassing
of any faulty element along the transaction path. In addition,
Radware’s global server load balancing (GSLB) service ensures
the global availability of all applications.
Symantec Corp. announced the publication of its June 2011 Symantec Intelligence Report, the first Symantec report to combine the best research and analysis from the Symantec.cloud MessageLabs Intelligence Report and the Symantec State of Spam & Phishing Report. This month's analysis reveals that spam is currently at the lowest level it has been since the takedown of McColo, a California based ISP which hosted command and control channels for a number of major botnets, in November 2008.
Symantec's August 2011 Intelligence Report reveals that once more spammers are seeking to benefit from fluctuations in the turbulent financial markets, most notably by sending large volumes of spam relating to certain “pink sheets” stocks in an attempt to “pump” the value of these stocks before “dumping” them at a profit.
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
At Mobile World Congress 2012, Symantec announced significant advances in core areas of its enterprise mobility strategy across Android, iOS and Windows Phone 7 platforms. These advances help customers secure mobile data and enable business productivity across both corporate managed and personally owned unmanaged devices by providing cross-platform, multi-application protection.
The Pan-European IT Outsourcing Intelligence Report 2011 presents the summary of the All-European IT Outsourcing and In-House Software Development research conducted between February and December 2011. In the course of the research the following European countries were surveyed (in alphabetical order): Austria, Cyprus, Denmark, Finland, Malta, Norway, Sweden, Switzerland, Netherlands and United Kingdom.
The key goal of the Report is to identify the differences and similarities in the ways how companies from the above listed countries behave in terms of:
Overall adoption of IT / software development outsourcing services
Choosing their IT outsourcing destinations
Choosing their IT outsourcing service providers
Responding to the most critical outsourcing challenges
Managing their vendor relationships
Cost saving
Planning their future adoption of IT / software development outsourcing services
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...Symantec
Advanced persistent threats (APTs) pose serious challenges for organizations of all sizes. Challenges related to advanced persistent threats include cyber attacks that are designed to do anything from steal sensitive data for financial gain, corporate espionage, etc., to sabotage of critical infrastructure. These attacks are specifically targeted and are often carried out using sophisticated malware. The effectiveness of traditional file-based antivirus scanning technology is not by itself sufficient protection because a given malware associated with an APT will have extremely low prevalence, that is, will not be widely seen on the Internet. Traditional antivirus signature-based scanning is reactive in that a signature can only be written to detect a threat that has already been seen.
Symantec Endpoint Protection 12.1 (SEP 12.1) includes protection technologies that go beyond traditional antivirus scanning to provide effective protection of endpoints against the sophisticated malware used by APTs. This paper provides guidelines on how to ensure that SEP protection technologies are enabled and functioning in order to provide best protection for endpoints.
The challenge of Advanced Persistent Threats
Advanced persistent threats often use malware that is difficult to detect using traditional antivirus scanning and are designed specifically to run for long periods of time without being noticed. These threats are targeted and as such do not have wide distribution on the Internet. They are generally intended for specific targets and designed to evade detection in order to steal data. The type of data that is targeted for attacks varies by attacker and target, (financial gain, usernames/passwords, intellectual property, etc.)
Even though the motives and targets used by APTs can vary greatly, they often operate in stages that are common across attacks. They are: Incursion, Discovery, Capture, and Exfiltration and are briefly described in the illustration below:
Symantec Endpoint Protection (SEP 12.1) offers advanced protection by using multiple technologies to combat many targeted attack methods that are prevalent in the current threat landscape. While this document details the configurations and best practices in the use of SEP 12.1 against modern threat vectors, these details are only part of an overall security strategy. Many organizations have some sort of endpoint security solution installed and deployed. Breaches and intrusions can occur when these technology-based safeguards are not supported by sound, realistic, and effective security processes and procedures.
Announcing Symantec & Microsoft’s Azure Cloud Disaster Recovery as a Service ...Symantec
Symantec today announced it will extend Symantec’s Storage Foundation High Availability for Windows and Veritas Volume replicator disaster recovery (DR) software solution to the Windows Azure cloud platform. Symantec’s solution will allow organizations of any size to recover business critical applications and their associated data in Windows Azure in the event of a local failure or site disaster. The solution will expand the ability of Symantec’s existing business continuity solutions for Microsoft Corp., providing on-premise-to-cloud disaster recovery as a service (DRaaS).
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
Virtual appliances are the wave of the future, declares IDC, because appliances dramatically simplify application deployment and accelerate the shift to cloud computing. Learn how the landmark strategic partnership between Novell and VMware is delivering innovative appliance versions of VMware products running on SUSE Linux Enterprise Server, and how it can help you move your applications to the cloud. See an exciting demonstration of Novell's award-winning SUSE Studio appliance construction tool, used by software vendors to build appliances in minutes for on-premise and cloud environments, and by enterprises to quickly create optimized Linux image builds. The session will also cover Novell's industry-leading lifecycle management capabilities for appliances. If you're a software vendor, you will leave this session with new ideas on how to simplify delivery of your software, perform appliance lifecycle management and extend your applications to the cloud. If you're an end-user organization, you will learn how to reduce the time spent creating and updating core OS images by 90 percent or more.
Storage Management and High Availability 6.0 LaunchSymantec
Symantec announced version 6.0 of the company’s storage management and high availability products. With this release, Symantec enables IT organizations to build resilient private clouds by transforming their existing infrastructure. Organizations can manage entire business services end-to-end with built in resiliency, even if the business service is run across multiple virtualization technologies, operating systems, and storage platforms. This release spans multiple products in Symantec’s portfolio including its flagship Veritas Storage Foundation 6.0, Veritas Cluster Server 6.0, and Veritas Operations Manager 4.1, all tightly integrated to help IT organizations move confidently to a private cloud architecture.
At VMworld 2012, Symantec announced new solutions and technical integrations with VMware across its entire product portfolio to ensure higher levels of protection for virtualized environments. Together, Symantec and VMware enable SMBs and enterprises to use the benefits of virtualization without compromising protection.
Symantec Enterprise Security Products are now part of BroadcomSymantec
Symantec Enterprise Security Products are now part of Broadcom. The consumer division of Symantec Corp. is now NortonLifeLock Inc. -- a standalone company dedicated to consumer cyber safety.
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
Youth in foster care face unique risks to their identity.In this webinar we discuss the risks, as well as tips for better protection. Watch on demand here: https://symc.ly/2N8cELV.
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
Learn how to protect your data during Symantec's National Cyber Security Awareness Month webinar with the Identity Theft Resource Center and Infolock.To watch on demand https://symc.ly/2VMMWQX.
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
Symantec, TechSoup and the Michigan Small Business Development Center share how to apply added layers of security to your devices and online accounts. Watch on-demand recording here: https://symc.ly/33ifcxo.
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
View this webinar from Symantec and NCSAM partners, the National PTA, Connect Safety and the National Cyber Security Alliance, to learn how to protect the devices you use day to day.
Watch on demand here: https://symc.ly/2nLyXyB
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
On January 1, 2020, one of the strictest privacy laws in the US, the California Consumer Privacy Act (CCPA), will come into effect. What should governance, risk and compliance executives know in order to prepare for CCPA? Watch the on demand recording here: https://symc.ly/2Pn7tvW.
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
Experts from Symantec and MITRE explore the latest research and best practices for detecting targeted ransomware in your environment.
Watch on-demand webinar here: https://symc.ly/2L7ESFI.
This webinar will explore the less-discussed topics of a mobile security strategy that everyone should understand – before it’s too late. Watch on-demand here: https://symc.ly/2z6hUsM.
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
There is an art to securely using cloud apps and services, including SaaS, PaaS, and IaaS. In this Symantec webcast, hear from Steve Riley, a Gartner senior director analyst who focuses on public cloud security, and Eric Andrews, Symantec’s vice president of cloud security, as they share best practices with practical tips for deploying CASB. Watch here: https://symc.ly/2QTyUec.
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
This webinar to shares insight into how an Advanced Threat Assessment does root analysis to uncover unknown, unique threats happening in your environment. Watch here: https://symc.ly/2W52MoA
Learn if you’ve got the right security strategy, and investment plan, to protect your organization and ensure regulatory compliance with the General Data Protection Regulation (GDPR). Watch now here: https://symc.ly/2VMNHIm
2019 Symantec Internet Security Threat Report (ISTR): The New Threat Landscape presented by Kevin Haley, Director Product Management, Security Technology & Response, Symantec. Watch webinar recording here: https://symc.ly/2FJ9T18.
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
Gain valuable insight whether you’re well on your way to Zero Trust implementation or are just considering it. Watch the original webinar here https://www.symantec.com/about/webcasts?commid=347274.
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
First-hand insights on the newest cloud-delivered endpoint security solutions. Hear from Joakim Liallias, Symantec and special guest speakers Sundeep Vijeswarapu from PayPal and top industry analyst Fernando Montenegro, 451 Research. Listen here: https://symc.ly/2UY2TlS.
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
Learn how Symantec Endpoint Protection & Response (EDR) and the MITRE ATT&CK framework can expose and thwart persistent adversaries like APT28 otherwise known as Fancy Bear. Watch Webinar here: https://symc.ly/2WyPD8I
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec ApplicationHA June 2011
1. VMware and Symantec’s strategic
partnership to deliver ApplicationHA gives
our customers the ability to react to
infrastructure and application failures
without the loss of desirable functionality
they expect. New ApplicationHA integration
with VMware vCenter Site Recovery
Manager helps ensure high availability of
applications regardless of which site is
running the virtual machine,
– Parag Patel, VP Global Strategic
Alliances at VMware
Symantec ApplicationHA:
Virtualize Business Critical Applications with Confidence
Press Briefing
Don Angspatt, VP Product Management
June 27, 2011
ApplicationHA 1
2. Symantec ApplicationHA
• ApplicationHA (Launched in September 2010)
– Joint partnership with VMware to address “Application Awareness” in a
VM
– Virtualizes business-critical applications with confidence
– Monitors applications in VMs and automate recovery
– Managed within vCenter
• What’s new in this release?
– Application aware Disaster Recovery solution with VMware Site Recovery
Manager (SRM) integration
– Monitor hundreds of virtualized applications with new dashboard
– Broader application, OS, and vSphere support
ApplicationHA 2
3. Application availability a key requirement for
virtualization of critical apps
Key challenges in managing virtualized servers1
(% of respondents)
tier3 tier2 tier1
Ensuring Application Availability 51%
Virtualization adoption
Coordinating new deployments 41%
IIS WebLogic SQL, Oracle and upgrades
Apache WebSphere SAP
Managing unanticipated cost
Print File Exchange 42%
increases
Overcoming existing allocation, 29%
purchasing and budget practices
Compensating for the lack of 32%
integrated management tools
Criticality of applications
• VM up ≠ Application up • Application processes up ≠ Application
functional
• VM boot up or recovered ≠ Application
started or recovered • VM boot up order ≠ Application startup
order
ApplicationHA 3
1. Source: IDC, October 2009. Choosing Storage for Virtualized Servers. For companies with > 1,000 employees.
4. Current tools and processes force challenging trade-offs
Ensure everything
O/S based clustering in the guest
• Prevents use of vMotion,
DRS, DPM
• Increases cost + complexity
Minimize Ensure App Monitoring tool + scripting
Application admin
Complexity Availability
• Longer RCA and recovery time
Infrastructure admin • Burden to maintain scripts
Exploit
Virtualization
Delay virtualization
• Slows down virtualization
initiatives
• Increases operational
complexity
Virtualize everything
ApplicationHA 4
5. Symantec ApplicationHA + VMware HA: Virtualize
without compromise
VM1 VM2 VM2
Symantec App c1 c1
Components c1 c3
ApplicationHA
protect c2 c3 c2 c2 c4
application Application
components Resources
OS OS OS OS
VMware HA
VMware ESX
VM
protect
infrastructure
components ESX Server
Site
ApplicationHA 5
6. Coordinated recovery between ApplicationHA and
VMware HA
• App monitoring
VM1 VM2 VM1 VM2
– Show health status
– Detect app failures ORA SQL ORA SQL
• Coordinated recovery Application
HA
Application
HA
OS OS OS OS
– Restart applications
– Trigger VMware HA VMware HA VMware HA
for further recovery VMware ESX VMware ESX
– Integration via App
Monitoring API
• Protects against wide
range of failures
– Infrastructure failures – VM recovers after a server failure but app doesn’t
– VM is up but app is down – App is up but not functional
ApplicationHA 6
7. What’s new in this release? June 27th Release
A Application Awareness in Disaster Recovery Solution
Site A Site B
• Provide application awareness for SRM environments
ApplicationHA ApplicationHA
• Provide application monitoring on both the protected
and the recovery sites
SRM SRM • Report application status in the audit trail
B Monitor & Control Hundreds of Applications
• Improve customer experience in large scale deployment
through providing:
• Dashboard provides overview for application health
• Resource dependency graph
• Integrated within vCenter
• Soft reboot of virtual machines
C Broader Platform and Application Support
• Improve guest platform support to include:
• SLES 11 SP1
• Oracle Enterprise Linux 5.x
• Win32 (Custom app support)
SLES Win32 OEL • vSphere 4.0, 4.1, 4.1 U1 support
ApplicationHA 7
8. ApplicationHA-SRM Integration Value Propositions
Application Monitoring on Both Sites During Test and Real Recovery
Site B
Test Recovery
• Automatic application monitoring enabled on both sites
• Automatic establishment of communication with VMware
Site A
HA on recovery site
• Dashboard view on both sites with secured
Real Recovery communication
Application awareness in SRM audit trail
• Report application status in SRM audit trail
• Proof to auditors and/or management
ApplicationHA 8
9. Dashboard for Visualizing Application Status and
Controlling Applications
Batch Operations
for Maintenance
Summary of Detailed Status
Application Health
ApplicationHA 9
* ApplicationHA 5.1 SP2 feature.
10. ApplicationHA Key-Takeaways
1. Addresses key challenge to “last mile” of virtualization
2. Continued, strong partnership with VMware
3. Operationally simple
a. Integration in vCenter and Symantec management tools
4. Built off industry-leading VCS technology
5. Now provides:
a. Deeper, recovery with Site Recovery Manager (SRM) integration
b. Monitor hundreds of virtualized applications at once
ApplicationHA 10
12. Platform and Application Coverage
ApplicationHA Console
• Windows Server 2008 & R2 (all x64 only)
ApplicationHA Guest
• Windows Server 2003, 2003 R2, 2008, 2008 R2 (all • Linux x64 (RHEL 5, SLES 11 SP1*, OEL 5*)
x64) • Oracle 10gR1, 10gR2, 11gR1 , 11gR2
• SQL Server 2005*, 2008, SQL Server 2008 R2
• Exchange Server 2007, 2010 • Weblogic 9, 10
• IIS 6.0, 7.0, 7.5 • SAP Netweaver 7.0 (NW04)
• Sharepoint 2010 • IBM Websphere Application Server and MQ
• SAP Netweaver 7.0 (NW04) • IBM HTTP Server
• FileShare
• Custom Application
• PrintShare*
• ApplicationHA Console Server
• Custom Application
• Windows Server 2003, 2003 R2 (32 bit)*
• Custom Application
• FileShare
• SQL Server 2008
More applications on more platforms to be added in future releases
ApplicationHA
* ApplicationHA 5.1 SP2 feature.
13. Symantec ApplicationHA and VMware Site Recovery
Manager Integration
VMware SRM recovers
virtual machines on a
remote site in case of
disaster.
Replication of virtual
machines enabled by
array vendors on a per
protection group level.
Recovery Plans are
configured on the
remote site for test and
real recoveries.
ApplicationHA 13
* ApplicationHA 5.1 SP2 feature.