SlideShare a Scribd company logo
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
SymantecBackupandRecovery TechnicalBrief
NetBackup5330 Resiliency/HighAvailability Attributes
NetBackup5330 Resiliency and High Availability Attributes
NetBackup Appliances Family
The NetBackup Appliancefamily offerscomplementary solutionsto meetthe data protectionneeds
of modern enterprises,and includes solutionssuch as the NetBackup 5230 and NetBackup 5330
Appliances.
NetBackup 5230 Appliance
The NetBackup 5230Backup Applianceincludes master and mediacapabilities, alongside storage
and deduplication features that will meet the needs of small, mid-size, and even some large
enterprises.
NetBackup 5330 Appliance
The NetBackup 5330applianceoffersmediaservercapabilities,and is designed to meet the needs
of largeenterprisecustomers with demandingperformanceand scalability requirements across
virtual and physical infrastructures.
The NetBackup 5330 Appliance is designed to supplement the NetBackup Appliance family by
offeringkey enterprisecustomersalarge-scaleand performantoffering. Thisincludes sustainable
performanceover timeand scale,predictablejobsuccessrates under heavy loads, and powerful
deduplication capabilities.
Figure 1: NetBackup 5330 Server Node Hardware and I/O Connections
Data protectionarchitecturesare,by necessity,complex innatureasthey involveso many complex factors. There cannot be a “one
sizefits all”approach to dataprotectionbecausetheoperationalrequirementsof eachorganization dictatehowdataisused,and the
local risk assessment process dictates to some extent how it will be protected.
Confidence with NetBackup Appliances
NetBackup Appliances aredesigned to ensurecustomerscan beconfidentthattheir data isfully protected againstdisaster. Symantec
builds systemsthatarethe“lastlineof defense”for our customers and they are counting on us to recover the data and files they
need to maintain their company’s operation when unexpected events occur.
KeyBenefits
 Designed for scale and
performance
 Addresses high availability,
optimum performance, and
usable capacity challenges
 Very low probability of data loss
through volume group
distribution across disks
 MSDP Volume is duplicated on
2 different drawers
 Smaller volume groups provide
faster rebuild times
 Full Configuration of 60 drives
provides 6 Data Volumes, Half
Configuration of 33 drives
provides 3 Data Volumes
 Both Configurations provide 1
MSDP Volume, and 2 Global
Hot Spares
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
SymantecBackupandRecovery TechnicalBrief
NetBackup5330 Resiliency/HighAvailability Attributes
NetBackup AppliancestightlyintegrateNetBackup dataprotection softwarewith a highly optimized hardware platform. NetBackup
appliancedeploymentconsists of the complete installation and configuration of all appliance components to create a backup
environment that is ready to use.
TNetBackup Appliancesprovidea number of software and hardwarefeaturesto ensureintegrity forthedata protected by appliances.
Key Features
 DirectvSphereBackup;no proxyserversrequired
 Up to 100x faster backupswithNetBackup Accelerator
 Intelligentend-to-end deduplication;up to 36x faster thantargetDedupesolutions
 Up to 148 TBusablestorage,up to 144 TBDedupepool
 Built-in protection againstzero day attacksand maliciousinsider threats
 Embedded WANOptimization:up to 10x faster replication and backupsto cloud
 LeveragenewNetBackup 7.6 featuresincludingNetBackupAccelerator forVMwareandReplication Directorfor VMware
Configuration Options
The NetBackup 5330applianceisoffered ina variety of I/Oconfigurationoptions. Thisincludes the five choices shown below, with
their varying assortment of fiber channel and 10GbE expansion card configuration options.
Two of thePCIeslotson theNetBackup5330server node(slots1 and 4 asshown inthediagram) are reserved for connecting to the
primary storage tray, and are not available for client data transport.
Figure 2: NetBackup 5330 Server Node Configuration Options
Advanced Appliance Monitoring – Early Detection of Data Integrity Issues
The NetBackup Appliancescontinuously monitorsallhardwarecomponentswithintheappliance –includingall storage subsystems,
to ensure prompt detection of any storage hardware errors that could cause data integrity issues.
If a storagehardwareerrorisdetected,theuser isimmediately alerted viaan email,SNMP event and notification in the NetBackup
Applianceweb console.Userscan then takeimmediatecorrective action to ensure continuous availability of data on NetBackup
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
SymantecBackupandRecovery TechnicalBrief
NetBackup5330 Resiliency/HighAvailability Attributes
Appliances.Thisearlynotification of storagehardware errors is extremely useful when coupled with the RAID6 disk redundanc y
systemutilized by theNetBackup Appliancestoragedisks.RAID 6 ensuresdata availability despitethe occurrence of two concurrent
drivefailuresto storagedisks.NetBackup ApplianceMonitoringwill immediatelyalertusersof any drivefailuresto allowusersto take
correctiveactionbeforemorethan 2 concurrentdrivesfail.Thisearly detection systemhelpsprevent data loss caused by multiple,
simultaneous drive failures.
Symantec Critical System Protection – IDS and IPS
The NetBackup 5330ApplianceoffersbothIPS (Intrusion Prevention)andIDP(Intrusion Detection) through SymantecCritical System
Protection. This security solution monitors and acts on “normal state” and which provides Real-Time Proactive Enforcement,
Intrusion/MalwarePrevention,OS Hardening,ApplicationControl,Privileged Useraccesscontrol, Vulnerability & Patch Mitigation,
Real-timeMonitoring& Auditing,HostIntrusion Detection,FileIntegrity Monitoring,Configuration Monitoring, Track and Monitor
user access and Logging and Event Reporting.
Figure 3: NetBackup 5330 SCSP Features
Deduplication Storage System Data Integrity
The deduplicationsoftwareon NetBackupAppliancesis an extremely mature, robust and reliable data protection solution. Data
integrity of data stored inthededuplication storagesystemisof primary concern in the storage system design. The data integrity
protection provided is a full end-to-end solution, ensuring data integrity of all parts of the deduplication storage system.
Figure 4: NetBackup 5330 Deduplication Pool
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
SymantecBackupandRecovery TechnicalBrief
NetBackup5330 Resiliency/HighAvailability Attributes
When data isstored in theDeduplication pool in NetBackup Appliances, catalog objects, reference count objects and data stor e
objects are created in the Deduplication Pool. These objects are linked together using internal pointers/references in the
Deduplication Pool.Thesumof theseinternal objectsand thepointers/references between them represent the backup data in the
Deduplication Pool.
The deduplicationstoragesystemperformsatwice-daily onlinedata integrity check of all catalogobjects,referencecountobjectsand
data storeobjects.Thedata integritycheckalsochecksall theinternal pointersand referencesbetween them.Any missingobjects or
pointerscould indicatecompromised data.Theonlineintegrity checkingisrun asa backgroundmaintenancetask thatdoesnotaffect
data protection activitieslikebackups,restoresandduplication updates to the deduplication storage system. This separation of
maintenancetasksand dataprotection tasksalsoallowsdataintegritychecksto be run simultaneously with data protection tasks
without jeopardizing performance.
In addition to verifyingthepresenceand internalrelationshipsof allobjects,thededuplication storage system continuousl y runs a
CRC patrol readthatvalidatestheidentity of theobjectsby comparingCRC checksumvaluesof theobjectsatwritetimewith the CRC
valuecomputed duringtheCRC patrol read.Thisensuresthatthedata contained in thededuplication storage system has not been
unintentionally altered or corrupted in any way.
In mostcases,theonlinedataintegrity check isableto self-correctanydataintegrityissues itfinds.In caseswherean unrecoverable
data integrityissueisdetected,a warningissentto theNetBackup Administration Console UI informing the user of compromised
data.SincetheNetBackupappliance is tightly integrated with NetBackup, the warning messages provide information on which
backup point-in-time,clientand policyisaffected and suggestsimmediateremediation steps –which include re-running backups of
affected clientsand policies.Thiswill adequatelyrepopulatethecorrupted portionsof the deduplication storage system to restore
any previously un-recoverable data.
Additionally,thededuplicationstoragesystemarchitectureallowsforanyunrecoverableportionsof thededuplication storagesystem
to beimmediately isolated fromtherestof theconsistently correctstoragesystem.Unrecoverablesegmentsaremarkedfor deletion
and are essentially ejected from the deduplication storage system.
In thediagrams below the FP3 Data Store Segment has been compromised due to a filesystem or disk error. The deduplication
storagesystemimmediately isolatestheerror fromtheData Storeby markingitfor deletionand removes the FP3 segment from the
FingerprintStore.ThispreventstheFP3 segment from being referred to again for any future backup jobs. This two-step process
isolates any compromised data from the rest of the functioning data in the deduplication storage system.
Figure 5: FP3 Data Store Segment has been compromised due to a filesystem or disk error
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
SymantecBackupandRecovery TechnicalBrief
NetBackup5330 Resiliency/HighAvailability Attributes
Oncean additional backupor backups occur and the FP3 Data Segment is seen in another backed up file, a new FP3 segment is
created in the Data Store, completely ignoring the compromised data segment.
Figure 6: New FP3 segment created ignoring the compromised data segment.
Compromiseddataisolationiscritical for deduplicationstoragesystemsasduplicatedatacan continue to be referenced as backups
continue.If compromised segmentsarecontinuously referenced,datacorruption couldcontinueto spreadwithin the deduplication
pool,further worseningtheimpactof thecorruption.As mentionedpreviously, a warning will be sent to NetBackup with detailed
remediationstepsto allowtheuserto repopulatethededuplicationstoragesystemwith anycompromised data. This increases the
robustness of the storage system, allowing it to be continuously functional even when a portion of it is compromised.
Hardware Design Data Integrity
“HardwareDesignDataIntegrity”inNetBackup Appliances takean approach of isolatingpotential hardwareissuesby using separate
components in the data flow rather than a monolithic configuration traditionally used by some Deduplication Appliances.
Data in flightthrough thesystemhasthreerequirements:speed,availability and accuracy. Symantecusesa solution thatbalances all
of the requirements.Themostdemandingactivity of thesystemCPUsistheDeduplication handling of the backup data. Symantec
Appliancesusea discreteRAID controllerto do theRAID calculationandtransferof thedata to thenear linediskdrives. Since all the
calculation is done “off CPU” the CPU is free to do the main jobs of the integra ted backup appliance.
NetBackup Appliancesutilizea RAID 6 storagesolution. With this solution, there can be two concurrent drives in ether failure or
rebuild mode.Thisisvital aswith theever-increasingsizeof disk drives,therebuild timespresent a higher chanceof concurrentdrive
failures. Symantec also provides a hot spare for every RAID set that automatically takes the place of a failed drive.
Sincedisk drivesareoneof thefewcomponents thataremechanical innatureandarethemostnumerouscomponentin the system,
they arethe mostfrequentpartthatfails. When thereisa failure,theRAID controller will start the rebuild of the RAID set using the
hotsparedrive.DuringtherebuildtheRAID controllercalculatestheinformationthatwill resideon the hot spare and then writes it
to thedrive.However,sincetherebuildcan belengthybecause of the drive size, it is likely the normal operations of backup and
restorewill berequiredduringtherebuild. By usingadiscreteRAID controller,rather thana “softwareRAID”thatutilizes the system
CPUs to do theparity and XORcalculation,assome Deduplication Appliances use, NetBackup appliances are better equipped to
providethecombined speed,accuracy and availability expected. With two computeintensiveoperations, backup/Deduplication or
restore/re-hydrationandRAID restorehappeningatthesametime,itisa bestpractice to segregate the operations so that neither
function is adversely affected, especially in a high rate of Deduplication operation.
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
SymantecBackupandRecovery TechnicalBrief
NetBackup5330 Resiliency/HighAvailability Attributes
To ensurespeed in anIntegrated BackupApplianceitisimportantthatthe use of cache in the data path be used. This frees up the
CPUs for backup,Deduplication and restoreoperations. NetBackupappliancesutilizecacheon theRAID controller forboth reads and
writes.Theuseof cacheinwriteoperationshasonefailurescenario:a power failureduringwritewherethedata to bewritten to disk
still residein thecacheduringthepower failure. Thisscenarioisknown asan“incompletewrite”.NetBackup utilizes a Maintenance
FreeBackup Unitto guard againstsuch a scenario. TheMaintenanceFreeBackupUnitutilizesa combination “Super-capacitor” and
NVRAM configuration. In the event of a power loss, the data in the RAID controller cache is transferred to the NVRAM. Upon
restoration of power,thedataintheNVRAMis then transferred back to the cache and the data is then written to the disk dr ives.
Cacheisalsoavailableon disk drives. Symantec configuresthedrivessothatwritecacheon thedrivesisnotused,butthatread cache
is.In theeventof the power failurescenario noted earlier,thereisno protection of thedrive cache. Once power is removed from a
disk drive,thedata inthecacheisgone. Sincewedo notenablewritecacheon thedrivesthereisno danger of incomplete writes. In
the case of the read cache, since the source of the data is the disk drive, that data can be resent when power is restored.
AutoSupport
Figure 7: NetBackup Appliances AutoSupport Overview
Symantec Backup and Recovery Product Family
The Symantec Backup and Recovery productfamily offersmarket-leadingbackup and disasterrecoverysolutionsfor criticalcustomer
ITresources.Thisincludes Symantec NetBackupandSymantec BackupExec, leadingsolutionsfor enterprise, mid-market and small
business customers
NetBackup Platform
The NetBackup Platformisa completebackup and recovery solution thatisoptimised forvirtually any workload, whether physi cal,
virtual,arrays,or bigdata,anddeliverstrulyflexibletargetstorageoptions,whether tape,3rd party disk, appliances, including the
NetBackup Deduplication Appliancesand Integrated Backup Appliances,or cloud. Symantec NetBackup 7.6 with V-Ray Technology
deliverstheperformance, automation,and manageability necessary to protectvirtualised deploymentsatscale –wherethousandsof
Virtual Machinesand petabytesof dataarethenormtoday,andwheresoftware-defined datacentresand IT-as-a-servicebecome the
norm tomorrow. Enterprises trust Symantec.
 Comprehensive –As a singlesolution to protect all of your data assets, NetBackup provides support for virtually every
popular server, storage, hypervisor, database, and application platform used in the enterprise today.
Appliance Registration: Users can register theirAppliance and contact details on the
Symantec support website.
Issue Correlation: Symantec support uses registrationinformation when resolving any
issues reported by thecorresponding user.
Downtime Minimization: Streamlines overall support process allowing Symantec support
to minimize downtime.
Proactive Support Model: Enables Symantec support to provide a more proactive
approach to support.
CallHome Feature: Uploads data required for troubleshooting from the Appliance to the
Symantec AutoSupport server.
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
SymantecBackupandRecovery TechnicalBrief
NetBackup5330 Resiliency/HighAvailability Attributes
• Scalable–High performance,elasticautomation,andcentralised management based on a flexible, multitier architecture
enables NetBackup to adapt to the growing needs of a fast-paced, modern enterprise data centre.
• Integrated –Frombackupappliancesto bigdataplatforms,NetBackup integrates at every point in the technology stack to
improvereliability and performance. OpenStorage Technology (OST) provides even tighter integration with third-party
storage and snapshot solutions.
 Innovative–With hundredsof patentsawarded in areas including backup, recovery, virtualisation, deduplication, and
snapshot management, NetBackup continues a long tradition of bringing advanced technologies to market first.
 Proven –For over a decade,NetBackuphasled the industry as the most popular enterprise data protection software by
marketshareandisused by many of thelargestenterprises on the planet. When you need your data back, you can trust
NetBackup.
Key Benefits
 Unified,enterprise-classvirtualandphysical dataprotection eliminates point products, offers better visibility, leverages
resources, and reduces cost, complexity, and risk when virtualising mission-critical applications
 V-Ray technology lets yousearchandrecover a single file from an image backup in minutes instead of a manual mount,
search, and restore that can take hours or even days
 Simplified management and faster recovery of snapshots and replicated snapshots from anywhere in the backup
environment
 “Always on”protectionof new,moved,or cloned VMs eliminates uncertainty and overloading of hosts during backups
 NetBackup intelligentdeduplication reducesstoragecostswith deduplication ratesashighas98%while optimising backup
performance and resources with flexible “end-to-end” deployment options
Summary
Symantec hastakena balanced approach to data integrity, focusing both software and hardware optimized designs that are the
benefitof decadesof engineeringexperience. Welook atdata integrityasanexpected attributeof our backup systems rather than a
feature. Customers can rest assured their information is correct and accessible when needed.
The NetBackup 5330isperformance-tuned forworkloadsandrestoresthroughscalablecapacity,greater performanceandresiliency.
Ithas improvements fordisaster and instantrecovery aswell asreplication performance. The Media Server Deduplication (MSDP)
improvementsinclude:fingerprintlookup performance,restoreperformance,on-line and off-line protection and catalog integrity
offeringdisaster recovery for MSDP.Theaddition of vSANsupportandthevCenter Plug-In together with VMware Instant Recovery
offers VMwareenhanced managementand recovery capabilities.VMwareInstantRecoveryrecoversvirtual machines directly from
the backupdisklocation,then usesvMotion to movetheVMback to primary storage.Even very largeVMs canbeonlinewithin just a
few minutes.
The Symantec Backup and Recovery productfamily offersmarket-leadingbackup and disasterrecoverysolutionsfor criticalcustomer
ITresources.Thisincludes Symantec NetBackupandSymantec BackupExec,leadingsolutionsfor enterprise, mid-market and small
business customers.
Feedback
Pleasetakea minuteto providefeedback on thisdocumentby clickingon this FEEDBACKLINK.Thiswill redirectyouto AdobeForms
whereyou can fill outa very shortform.Thiswill takelessthan a minuteand helpusimproveour documentation.
For More Information
Link Description
http://www.netbackup.com/ NetBackup Home Page
http://www.symantec.com/docs/TECH59978 NetBackup Compatibility Information
http://www.symantec.com/docs/DOC6488 NetBackup Documentation
http://www.symantec.com/support Symantec Support Portal

More Related Content

What's hot

EMC Data domain advanced features and functions
EMC Data domain advanced features and functionsEMC Data domain advanced features and functions
EMC Data domain advanced features and functions
solarisyougood
 
Presentation deduplication backup software and system
Presentation   deduplication backup software and systemPresentation   deduplication backup software and system
Presentation deduplication backup software and system
xKinAnx
 
Avamar 7 2010
Avamar 7 2010Avamar 7 2010
Avamar 7 2010
Phani Kumar
 
EMC Deduplication Fundamentals
EMC Deduplication FundamentalsEMC Deduplication Fundamentals
EMC Deduplication Fundamentals
emcbaltics
 
Novinky v NetBackup 7.7
Novinky v NetBackup 7.7Novinky v NetBackup 7.7
Novinky v NetBackup 7.7
MarketingArrowECS_CZ
 
Naprostá bezpečnost vašich dat díky jednoduchému, škálovatelnému, flexibilním...
Naprostá bezpečnost vašich dat díky jednoduchému, škálovatelnému, flexibilním...Naprostá bezpečnost vašich dat díky jednoduchému, škálovatelnému, flexibilním...
Naprostá bezpečnost vašich dat díky jednoduchému, škálovatelnému, flexibilním...
MarketingArrowECS_CZ
 
Data Domain Architecture
Data Domain ArchitectureData Domain Architecture
Data Domain Architecture
koesteruk22
 
Emc data domain
Emc data domainEmc data domain
Emc data domain
solarisyougood
 
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
IBM India Smarter Computing
 
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...ljaquet
 
Data Protection overview presentation
Data Protection overview presentationData Protection overview presentation
Data Protection overview presentation
Andrey Karpov
 
Datasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media serverDatasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media server
Fernando Alves
 
EV9 & NBU5000
EV9 & NBU5000EV9 & NBU5000
EV9 & NBU5000
Symantec
 
Emc data domain® boost integration guide
Emc data domain® boost integration guideEmc data domain® boost integration guide
Emc data domain® boost integration guide
Arvind Varade
 
Accel - EMC - Data Domain Series
Accel - EMC - Data Domain SeriesAccel - EMC - Data Domain Series
Accel - EMC - Data Domain Seriesaccelfb
 
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
CTI Group
 
Omniback for the system administrator
Omniback for the system administratorOmniback for the system administrator
Omniback for the system administrator
Laxman J
 
Symantec Backup Exec 2010 and NetBackup 7
Symantec Backup Exec 2010 and NetBackup 7Symantec Backup Exec 2010 and NetBackup 7
Symantec Backup Exec 2010 and NetBackup 7
Symantec
 
Webinar NETGEAR - Storagecraft e Netgear: soluzioni per il backup e il disast...
Webinar NETGEAR - Storagecraft e Netgear: soluzioni per il backup e il disast...Webinar NETGEAR - Storagecraft e Netgear: soluzioni per il backup e il disast...
Webinar NETGEAR - Storagecraft e Netgear: soluzioni per il backup e il disast...
Netgear Italia
 
New Features For Your Software Defined Storage
New Features For Your Software Defined StorageNew Features For Your Software Defined Storage
New Features For Your Software Defined Storage
DataCore Software
 

What's hot (20)

EMC Data domain advanced features and functions
EMC Data domain advanced features and functionsEMC Data domain advanced features and functions
EMC Data domain advanced features and functions
 
Presentation deduplication backup software and system
Presentation   deduplication backup software and systemPresentation   deduplication backup software and system
Presentation deduplication backup software and system
 
Avamar 7 2010
Avamar 7 2010Avamar 7 2010
Avamar 7 2010
 
EMC Deduplication Fundamentals
EMC Deduplication FundamentalsEMC Deduplication Fundamentals
EMC Deduplication Fundamentals
 
Novinky v NetBackup 7.7
Novinky v NetBackup 7.7Novinky v NetBackup 7.7
Novinky v NetBackup 7.7
 
Naprostá bezpečnost vašich dat díky jednoduchému, škálovatelnému, flexibilním...
Naprostá bezpečnost vašich dat díky jednoduchému, škálovatelnému, flexibilním...Naprostá bezpečnost vašich dat díky jednoduchému, škálovatelnému, flexibilním...
Naprostá bezpečnost vašich dat díky jednoduchému, škálovatelnému, flexibilním...
 
Data Domain Architecture
Data Domain ArchitectureData Domain Architecture
Data Domain Architecture
 
Emc data domain
Emc data domainEmc data domain
Emc data domain
 
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
 
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
 
Data Protection overview presentation
Data Protection overview presentationData Protection overview presentation
Data Protection overview presentation
 
Datasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media serverDatasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media server
 
EV9 & NBU5000
EV9 & NBU5000EV9 & NBU5000
EV9 & NBU5000
 
Emc data domain® boost integration guide
Emc data domain® boost integration guideEmc data domain® boost integration guide
Emc data domain® boost integration guide
 
Accel - EMC - Data Domain Series
Accel - EMC - Data Domain SeriesAccel - EMC - Data Domain Series
Accel - EMC - Data Domain Series
 
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
 
Omniback for the system administrator
Omniback for the system administratorOmniback for the system administrator
Omniback for the system administrator
 
Symantec Backup Exec 2010 and NetBackup 7
Symantec Backup Exec 2010 and NetBackup 7Symantec Backup Exec 2010 and NetBackup 7
Symantec Backup Exec 2010 and NetBackup 7
 
Webinar NETGEAR - Storagecraft e Netgear: soluzioni per il backup e il disast...
Webinar NETGEAR - Storagecraft e Netgear: soluzioni per il backup e il disast...Webinar NETGEAR - Storagecraft e Netgear: soluzioni per il backup e il disast...
Webinar NETGEAR - Storagecraft e Netgear: soluzioni per il backup e il disast...
 
New Features For Your Software Defined Storage
New Features For Your Software Defined StorageNew Features For Your Software Defined Storage
New Features For Your Software Defined Storage
 

Similar to TECHNICAL WHITE PAPER▶NetBackup 5330 Resiliency/High Availability Attributes

Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paper
Symantec
 
ESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
ESG Labs Testing and Performance Audit of the NetBackup 5330 ApplianceESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
ESG Labs Testing and Performance Audit of the NetBackup 5330 ApplianceSymantec
 
Net App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution SheetNet App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution Sheet
Michael Hudak
 
Data Guard25 August
Data Guard25 AugustData Guard25 August
Data Guard25 August
Guenadi JILEVSKI
 
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM India Smarter Computing
 
DataCore Software with Cisco UCS Complete Unification of the Data Center Ser...
 DataCore Software with Cisco UCS Complete Unification of the Data Center Ser... DataCore Software with Cisco UCS Complete Unification of the Data Center Ser...
DataCore Software with Cisco UCS Complete Unification of the Data Center Ser...
WELLNEXT® (formerly Nature's Products, Inc.)
 
Data guard architecture
Data guard architectureData guard architecture
Data guard architectureVimlendu Kumar
 
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2
Mario Redón Luz
 
Ransomware Defense and Remediation with Pure Storage.
Ransomware Defense and Remediation with Pure Storage.Ransomware Defense and Remediation with Pure Storage.
Ransomware Defense and Remediation with Pure Storage.
SoulStoneBR
 
Catching the Software Defined Storage Wave
Catching the Software Defined Storage WaveCatching the Software Defined Storage Wave
Catching the Software Defined Storage Wave
DataCore Software
 
What's Your Data Worth?
What's Your Data Worth?What's Your Data Worth?
What's Your Data Worth?
InteractiveNEC
 
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3Bloombase
 
Workload Backup Solution Guide(Uk)
Workload Backup Solution Guide(Uk)Workload Backup Solution Guide(Uk)
Workload Backup Solution Guide(Uk)ianmasters
 
Mirroring vs Replication vs Clustering: A Data Protection Comparison
Mirroring vs Replication vs Clustering: A Data Protection ComparisonMirroring vs Replication vs Clustering: A Data Protection Comparison
Mirroring vs Replication vs Clustering: A Data Protection Comparison
MaryJWilliams2
 
Sample_Blueprint-Fault_Tolerant_NAS
Sample_Blueprint-Fault_Tolerant_NASSample_Blueprint-Fault_Tolerant_NAS
Sample_Blueprint-Fault_Tolerant_NASMike Alvarado
 
FOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptxFOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptx
ssuser20fcbe
 
SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...
SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...
SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...
Wellington Monaco
 
Study notes for CompTIA Certified Advanced Security Practitioner
Study notes for CompTIA Certified Advanced Security PractitionerStudy notes for CompTIA Certified Advanced Security Practitioner
Study notes for CompTIA Certified Advanced Security Practitioner
David Sweigert
 
Enabling data integrity protection in regenerating coding-based cloud storage...
Enabling data integrity protection in regenerating coding-based cloud storage...Enabling data integrity protection in regenerating coding-based cloud storage...
Enabling data integrity protection in regenerating coding-based cloud storage...
Papitha Velumani
 

Similar to TECHNICAL WHITE PAPER▶NetBackup 5330 Resiliency/High Availability Attributes (20)

Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paper
 
ESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
ESG Labs Testing and Performance Audit of the NetBackup 5330 ApplianceESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
ESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
 
Net App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution SheetNet App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution Sheet
 
Data Guard25 August
Data Guard25 AugustData Guard25 August
Data Guard25 August
 
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
 
DataCore Software with Cisco UCS Complete Unification of the Data Center Ser...
 DataCore Software with Cisco UCS Complete Unification of the Data Center Ser... DataCore Software with Cisco UCS Complete Unification of the Data Center Ser...
DataCore Software with Cisco UCS Complete Unification of the Data Center Ser...
 
Data guard architecture
Data guard architectureData guard architecture
Data guard architecture
 
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2
 
Ransomware Defense and Remediation with Pure Storage.
Ransomware Defense and Remediation with Pure Storage.Ransomware Defense and Remediation with Pure Storage.
Ransomware Defense and Remediation with Pure Storage.
 
Catching the Software Defined Storage Wave
Catching the Software Defined Storage WaveCatching the Software Defined Storage Wave
Catching the Software Defined Storage Wave
 
What's Your Data Worth?
What's Your Data Worth?What's Your Data Worth?
What's Your Data Worth?
 
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
 
Workload Backup Solution Guide(Uk)
Workload Backup Solution Guide(Uk)Workload Backup Solution Guide(Uk)
Workload Backup Solution Guide(Uk)
 
Data Guard Architecture & Setup
Data Guard Architecture & SetupData Guard Architecture & Setup
Data Guard Architecture & Setup
 
Mirroring vs Replication vs Clustering: A Data Protection Comparison
Mirroring vs Replication vs Clustering: A Data Protection ComparisonMirroring vs Replication vs Clustering: A Data Protection Comparison
Mirroring vs Replication vs Clustering: A Data Protection Comparison
 
Sample_Blueprint-Fault_Tolerant_NAS
Sample_Blueprint-Fault_Tolerant_NASSample_Blueprint-Fault_Tolerant_NAS
Sample_Blueprint-Fault_Tolerant_NAS
 
FOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptxFOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptx
 
SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...
SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...
SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...
 
Study notes for CompTIA Certified Advanced Security Practitioner
Study notes for CompTIA Certified Advanced Security PractitionerStudy notes for CompTIA Certified Advanced Security Practitioner
Study notes for CompTIA Certified Advanced Security Practitioner
 
Enabling data integrity protection in regenerating coding-based cloud storage...
Enabling data integrity protection in regenerating coding-based cloud storage...Enabling data integrity protection in regenerating coding-based cloud storage...
Enabling data integrity protection in regenerating coding-based cloud storage...
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
Symantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
Symantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
Symantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
Symantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
Symantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

TECHNICAL WHITE PAPER▶NetBackup 5330 Resiliency/High Availability Attributes

  • 1. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 SymantecBackupandRecovery TechnicalBrief NetBackup5330 Resiliency/HighAvailability Attributes NetBackup5330 Resiliency and High Availability Attributes NetBackup Appliances Family The NetBackup Appliancefamily offerscomplementary solutionsto meetthe data protectionneeds of modern enterprises,and includes solutionssuch as the NetBackup 5230 and NetBackup 5330 Appliances. NetBackup 5230 Appliance The NetBackup 5230Backup Applianceincludes master and mediacapabilities, alongside storage and deduplication features that will meet the needs of small, mid-size, and even some large enterprises. NetBackup 5330 Appliance The NetBackup 5330applianceoffersmediaservercapabilities,and is designed to meet the needs of largeenterprisecustomers with demandingperformanceand scalability requirements across virtual and physical infrastructures. The NetBackup 5330 Appliance is designed to supplement the NetBackup Appliance family by offeringkey enterprisecustomersalarge-scaleand performantoffering. Thisincludes sustainable performanceover timeand scale,predictablejobsuccessrates under heavy loads, and powerful deduplication capabilities. Figure 1: NetBackup 5330 Server Node Hardware and I/O Connections Data protectionarchitecturesare,by necessity,complex innatureasthey involveso many complex factors. There cannot be a “one sizefits all”approach to dataprotectionbecausetheoperationalrequirementsof eachorganization dictatehowdataisused,and the local risk assessment process dictates to some extent how it will be protected. Confidence with NetBackup Appliances NetBackup Appliances aredesigned to ensurecustomerscan beconfidentthattheir data isfully protected againstdisaster. Symantec builds systemsthatarethe“lastlineof defense”for our customers and they are counting on us to recover the data and files they need to maintain their company’s operation when unexpected events occur. KeyBenefits  Designed for scale and performance  Addresses high availability, optimum performance, and usable capacity challenges  Very low probability of data loss through volume group distribution across disks  MSDP Volume is duplicated on 2 different drawers  Smaller volume groups provide faster rebuild times  Full Configuration of 60 drives provides 6 Data Volumes, Half Configuration of 33 drives provides 3 Data Volumes  Both Configurations provide 1 MSDP Volume, and 2 Global Hot Spares
  • 2. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 SymantecBackupandRecovery TechnicalBrief NetBackup5330 Resiliency/HighAvailability Attributes NetBackup AppliancestightlyintegrateNetBackup dataprotection softwarewith a highly optimized hardware platform. NetBackup appliancedeploymentconsists of the complete installation and configuration of all appliance components to create a backup environment that is ready to use. TNetBackup Appliancesprovidea number of software and hardwarefeaturesto ensureintegrity forthedata protected by appliances. Key Features  DirectvSphereBackup;no proxyserversrequired  Up to 100x faster backupswithNetBackup Accelerator  Intelligentend-to-end deduplication;up to 36x faster thantargetDedupesolutions  Up to 148 TBusablestorage,up to 144 TBDedupepool  Built-in protection againstzero day attacksand maliciousinsider threats  Embedded WANOptimization:up to 10x faster replication and backupsto cloud  LeveragenewNetBackup 7.6 featuresincludingNetBackupAccelerator forVMwareandReplication Directorfor VMware Configuration Options The NetBackup 5330applianceisoffered ina variety of I/Oconfigurationoptions. Thisincludes the five choices shown below, with their varying assortment of fiber channel and 10GbE expansion card configuration options. Two of thePCIeslotson theNetBackup5330server node(slots1 and 4 asshown inthediagram) are reserved for connecting to the primary storage tray, and are not available for client data transport. Figure 2: NetBackup 5330 Server Node Configuration Options Advanced Appliance Monitoring – Early Detection of Data Integrity Issues The NetBackup Appliancescontinuously monitorsallhardwarecomponentswithintheappliance –includingall storage subsystems, to ensure prompt detection of any storage hardware errors that could cause data integrity issues. If a storagehardwareerrorisdetected,theuser isimmediately alerted viaan email,SNMP event and notification in the NetBackup Applianceweb console.Userscan then takeimmediatecorrective action to ensure continuous availability of data on NetBackup
  • 3. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 SymantecBackupandRecovery TechnicalBrief NetBackup5330 Resiliency/HighAvailability Attributes Appliances.Thisearlynotification of storagehardware errors is extremely useful when coupled with the RAID6 disk redundanc y systemutilized by theNetBackup Appliancestoragedisks.RAID 6 ensuresdata availability despitethe occurrence of two concurrent drivefailuresto storagedisks.NetBackup ApplianceMonitoringwill immediatelyalertusersof any drivefailuresto allowusersto take correctiveactionbeforemorethan 2 concurrentdrivesfail.Thisearly detection systemhelpsprevent data loss caused by multiple, simultaneous drive failures. Symantec Critical System Protection – IDS and IPS The NetBackup 5330ApplianceoffersbothIPS (Intrusion Prevention)andIDP(Intrusion Detection) through SymantecCritical System Protection. This security solution monitors and acts on “normal state” and which provides Real-Time Proactive Enforcement, Intrusion/MalwarePrevention,OS Hardening,ApplicationControl,Privileged Useraccesscontrol, Vulnerability & Patch Mitigation, Real-timeMonitoring& Auditing,HostIntrusion Detection,FileIntegrity Monitoring,Configuration Monitoring, Track and Monitor user access and Logging and Event Reporting. Figure 3: NetBackup 5330 SCSP Features Deduplication Storage System Data Integrity The deduplicationsoftwareon NetBackupAppliancesis an extremely mature, robust and reliable data protection solution. Data integrity of data stored inthededuplication storagesystemisof primary concern in the storage system design. The data integrity protection provided is a full end-to-end solution, ensuring data integrity of all parts of the deduplication storage system. Figure 4: NetBackup 5330 Deduplication Pool
  • 4. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 SymantecBackupandRecovery TechnicalBrief NetBackup5330 Resiliency/HighAvailability Attributes When data isstored in theDeduplication pool in NetBackup Appliances, catalog objects, reference count objects and data stor e objects are created in the Deduplication Pool. These objects are linked together using internal pointers/references in the Deduplication Pool.Thesumof theseinternal objectsand thepointers/references between them represent the backup data in the Deduplication Pool. The deduplicationstoragesystemperformsatwice-daily onlinedata integrity check of all catalogobjects,referencecountobjectsand data storeobjects.Thedata integritycheckalsochecksall theinternal pointersand referencesbetween them.Any missingobjects or pointerscould indicatecompromised data.Theonlineintegrity checkingisrun asa backgroundmaintenancetask thatdoesnotaffect data protection activitieslikebackups,restoresandduplication updates to the deduplication storage system. This separation of maintenancetasksand dataprotection tasksalsoallowsdataintegritychecksto be run simultaneously with data protection tasks without jeopardizing performance. In addition to verifyingthepresenceand internalrelationshipsof allobjects,thededuplication storage system continuousl y runs a CRC patrol readthatvalidatestheidentity of theobjectsby comparingCRC checksumvaluesof theobjectsatwritetimewith the CRC valuecomputed duringtheCRC patrol read.Thisensuresthatthedata contained in thededuplication storage system has not been unintentionally altered or corrupted in any way. In mostcases,theonlinedataintegrity check isableto self-correctanydataintegrityissues itfinds.In caseswherean unrecoverable data integrityissueisdetected,a warningissentto theNetBackup Administration Console UI informing the user of compromised data.SincetheNetBackupappliance is tightly integrated with NetBackup, the warning messages provide information on which backup point-in-time,clientand policyisaffected and suggestsimmediateremediation steps –which include re-running backups of affected clientsand policies.Thiswill adequatelyrepopulatethecorrupted portionsof the deduplication storage system to restore any previously un-recoverable data. Additionally,thededuplicationstoragesystemarchitectureallowsforanyunrecoverableportionsof thededuplication storagesystem to beimmediately isolated fromtherestof theconsistently correctstoragesystem.Unrecoverablesegmentsaremarkedfor deletion and are essentially ejected from the deduplication storage system. In thediagrams below the FP3 Data Store Segment has been compromised due to a filesystem or disk error. The deduplication storagesystemimmediately isolatestheerror fromtheData Storeby markingitfor deletionand removes the FP3 segment from the FingerprintStore.ThispreventstheFP3 segment from being referred to again for any future backup jobs. This two-step process isolates any compromised data from the rest of the functioning data in the deduplication storage system. Figure 5: FP3 Data Store Segment has been compromised due to a filesystem or disk error
  • 5. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 SymantecBackupandRecovery TechnicalBrief NetBackup5330 Resiliency/HighAvailability Attributes Oncean additional backupor backups occur and the FP3 Data Segment is seen in another backed up file, a new FP3 segment is created in the Data Store, completely ignoring the compromised data segment. Figure 6: New FP3 segment created ignoring the compromised data segment. Compromiseddataisolationiscritical for deduplicationstoragesystemsasduplicatedatacan continue to be referenced as backups continue.If compromised segmentsarecontinuously referenced,datacorruption couldcontinueto spreadwithin the deduplication pool,further worseningtheimpactof thecorruption.As mentionedpreviously, a warning will be sent to NetBackup with detailed remediationstepsto allowtheuserto repopulatethededuplicationstoragesystemwith anycompromised data. This increases the robustness of the storage system, allowing it to be continuously functional even when a portion of it is compromised. Hardware Design Data Integrity “HardwareDesignDataIntegrity”inNetBackup Appliances takean approach of isolatingpotential hardwareissuesby using separate components in the data flow rather than a monolithic configuration traditionally used by some Deduplication Appliances. Data in flightthrough thesystemhasthreerequirements:speed,availability and accuracy. Symantecusesa solution thatbalances all of the requirements.Themostdemandingactivity of thesystemCPUsistheDeduplication handling of the backup data. Symantec Appliancesusea discreteRAID controllerto do theRAID calculationandtransferof thedata to thenear linediskdrives. Since all the calculation is done “off CPU” the CPU is free to do the main jobs of the integra ted backup appliance. NetBackup Appliancesutilizea RAID 6 storagesolution. With this solution, there can be two concurrent drives in ether failure or rebuild mode.Thisisvital aswith theever-increasingsizeof disk drives,therebuild timespresent a higher chanceof concurrentdrive failures. Symantec also provides a hot spare for every RAID set that automatically takes the place of a failed drive. Sincedisk drivesareoneof thefewcomponents thataremechanical innatureandarethemostnumerouscomponentin the system, they arethe mostfrequentpartthatfails. When thereisa failure,theRAID controller will start the rebuild of the RAID set using the hotsparedrive.DuringtherebuildtheRAID controllercalculatestheinformationthatwill resideon the hot spare and then writes it to thedrive.However,sincetherebuildcan belengthybecause of the drive size, it is likely the normal operations of backup and restorewill berequiredduringtherebuild. By usingadiscreteRAID controller,rather thana “softwareRAID”thatutilizes the system CPUs to do theparity and XORcalculation,assome Deduplication Appliances use, NetBackup appliances are better equipped to providethecombined speed,accuracy and availability expected. With two computeintensiveoperations, backup/Deduplication or restore/re-hydrationandRAID restorehappeningatthesametime,itisa bestpractice to segregate the operations so that neither function is adversely affected, especially in a high rate of Deduplication operation.
  • 6. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 SymantecBackupandRecovery TechnicalBrief NetBackup5330 Resiliency/HighAvailability Attributes To ensurespeed in anIntegrated BackupApplianceitisimportantthatthe use of cache in the data path be used. This frees up the CPUs for backup,Deduplication and restoreoperations. NetBackupappliancesutilizecacheon theRAID controller forboth reads and writes.Theuseof cacheinwriteoperationshasonefailurescenario:a power failureduringwritewherethedata to bewritten to disk still residein thecacheduringthepower failure. Thisscenarioisknown asan“incompletewrite”.NetBackup utilizes a Maintenance FreeBackup Unitto guard againstsuch a scenario. TheMaintenanceFreeBackupUnitutilizesa combination “Super-capacitor” and NVRAM configuration. In the event of a power loss, the data in the RAID controller cache is transferred to the NVRAM. Upon restoration of power,thedataintheNVRAMis then transferred back to the cache and the data is then written to the disk dr ives. Cacheisalsoavailableon disk drives. Symantec configuresthedrivessothatwritecacheon thedrivesisnotused,butthatread cache is.In theeventof the power failurescenario noted earlier,thereisno protection of thedrive cache. Once power is removed from a disk drive,thedata inthecacheisgone. Sincewedo notenablewritecacheon thedrivesthereisno danger of incomplete writes. In the case of the read cache, since the source of the data is the disk drive, that data can be resent when power is restored. AutoSupport Figure 7: NetBackup Appliances AutoSupport Overview Symantec Backup and Recovery Product Family The Symantec Backup and Recovery productfamily offersmarket-leadingbackup and disasterrecoverysolutionsfor criticalcustomer ITresources.Thisincludes Symantec NetBackupandSymantec BackupExec, leadingsolutionsfor enterprise, mid-market and small business customers NetBackup Platform The NetBackup Platformisa completebackup and recovery solution thatisoptimised forvirtually any workload, whether physi cal, virtual,arrays,or bigdata,anddeliverstrulyflexibletargetstorageoptions,whether tape,3rd party disk, appliances, including the NetBackup Deduplication Appliancesand Integrated Backup Appliances,or cloud. Symantec NetBackup 7.6 with V-Ray Technology deliverstheperformance, automation,and manageability necessary to protectvirtualised deploymentsatscale –wherethousandsof Virtual Machinesand petabytesof dataarethenormtoday,andwheresoftware-defined datacentresand IT-as-a-servicebecome the norm tomorrow. Enterprises trust Symantec.  Comprehensive –As a singlesolution to protect all of your data assets, NetBackup provides support for virtually every popular server, storage, hypervisor, database, and application platform used in the enterprise today. Appliance Registration: Users can register theirAppliance and contact details on the Symantec support website. Issue Correlation: Symantec support uses registrationinformation when resolving any issues reported by thecorresponding user. Downtime Minimization: Streamlines overall support process allowing Symantec support to minimize downtime. Proactive Support Model: Enables Symantec support to provide a more proactive approach to support. CallHome Feature: Uploads data required for troubleshooting from the Appliance to the Symantec AutoSupport server.
  • 7. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 SymantecBackupandRecovery TechnicalBrief NetBackup5330 Resiliency/HighAvailability Attributes • Scalable–High performance,elasticautomation,andcentralised management based on a flexible, multitier architecture enables NetBackup to adapt to the growing needs of a fast-paced, modern enterprise data centre. • Integrated –Frombackupappliancesto bigdataplatforms,NetBackup integrates at every point in the technology stack to improvereliability and performance. OpenStorage Technology (OST) provides even tighter integration with third-party storage and snapshot solutions.  Innovative–With hundredsof patentsawarded in areas including backup, recovery, virtualisation, deduplication, and snapshot management, NetBackup continues a long tradition of bringing advanced technologies to market first.  Proven –For over a decade,NetBackuphasled the industry as the most popular enterprise data protection software by marketshareandisused by many of thelargestenterprises on the planet. When you need your data back, you can trust NetBackup. Key Benefits  Unified,enterprise-classvirtualandphysical dataprotection eliminates point products, offers better visibility, leverages resources, and reduces cost, complexity, and risk when virtualising mission-critical applications  V-Ray technology lets yousearchandrecover a single file from an image backup in minutes instead of a manual mount, search, and restore that can take hours or even days  Simplified management and faster recovery of snapshots and replicated snapshots from anywhere in the backup environment  “Always on”protectionof new,moved,or cloned VMs eliminates uncertainty and overloading of hosts during backups  NetBackup intelligentdeduplication reducesstoragecostswith deduplication ratesashighas98%while optimising backup performance and resources with flexible “end-to-end” deployment options Summary Symantec hastakena balanced approach to data integrity, focusing both software and hardware optimized designs that are the benefitof decadesof engineeringexperience. Welook atdata integrityasanexpected attributeof our backup systems rather than a feature. Customers can rest assured their information is correct and accessible when needed. The NetBackup 5330isperformance-tuned forworkloadsandrestoresthroughscalablecapacity,greater performanceandresiliency. Ithas improvements fordisaster and instantrecovery aswell asreplication performance. The Media Server Deduplication (MSDP) improvementsinclude:fingerprintlookup performance,restoreperformance,on-line and off-line protection and catalog integrity offeringdisaster recovery for MSDP.Theaddition of vSANsupportandthevCenter Plug-In together with VMware Instant Recovery offers VMwareenhanced managementand recovery capabilities.VMwareInstantRecoveryrecoversvirtual machines directly from the backupdisklocation,then usesvMotion to movetheVMback to primary storage.Even very largeVMs canbeonlinewithin just a few minutes. The Symantec Backup and Recovery productfamily offersmarket-leadingbackup and disasterrecoverysolutionsfor criticalcustomer ITresources.Thisincludes Symantec NetBackupandSymantec BackupExec,leadingsolutionsfor enterprise, mid-market and small business customers. Feedback Pleasetakea minuteto providefeedback on thisdocumentby clickingon this FEEDBACKLINK.Thiswill redirectyouto AdobeForms whereyou can fill outa very shortform.Thiswill takelessthan a minuteand helpusimproveour documentation. For More Information Link Description http://www.netbackup.com/ NetBackup Home Page http://www.symantec.com/docs/TECH59978 NetBackup Compatibility Information http://www.symantec.com/docs/DOC6488 NetBackup Documentation http://www.symantec.com/support Symantec Support Portal