Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza

16
Virtualise with Confidence SYMC Solutions For The Virtual World Symantec Corporation

description

Virtualise with Confidence soluzioni data protection di Symantec

Transcript of Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza

Page 1: Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza

Virtualise with Confidence SYMC Solutions For The Virtual World

Symantec Corporation

Page 2: Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza

The End of the Beginning

What is Driving Virtualization

Next Phase of Virtual Infrastructure

Challenges Combining Physical and Virtual

Manageability of Virtual Complexity

2

Page 3: Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza

We are living in extraordinary times . . .

More text messages are sent daily than the population of the planet (6.75Bn)

There are over 3,5 Billion Google searches performed every month!

It is estimated we will create over 230 Exabytes of data this year, worldwide

The amount of new technical information is doubling every year

The fast-growing corners of the digital universe include data centres supporting “cloud computing,” and social networks

400 Million PC will be sold by the end of this yearLaptops represent 60% of the worlds PCs

A company can expect to lose 5% of their laptops each year

3

Page 4: Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza

It’s about the Information

4

InformationCustomApps

ERP/CRMeMail and Collaboration

Clients

Secure Manage

Page 5: Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza

Strategic Focus for 2009 and beyond

Top 10 Strategic TechnologyAreas for 2009/10*1

1. Virtualization2. Cloud Computing3. Servers: Beyond Blades4. Web-Oriented Architectures5. Datacenter Optimization6. Specialized Systems7. Social Software and Social

Networking8. Unified Communications9. Business Intelligence10. Green IT

*1 Gartner IT Symposium

Today’s Focus:• Virtualization + Green• Flexibility & Cost

Tomorrow’s Focus:

• First Cloud Services• Workspace Virtualization

Future Focus:

• Cloud Computing• Web Oriented Architecture

Courtesy: Gartner IT Symposium Fall, 2008 5

Page 6: Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza

Virtualization and Service Levels

Storage & Server Mgmt

Data Protection

Security &Compliance

DisasterRecovery

• Storage Virtualization

• Server Virtualization

• Endpoint Virtualization

6

Page 7: Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza

Standardized Infrastructure for Physical/Virtual

Production EnvironmentPhysical Environment

Storage & Server Mgmt

Data Protection

Security &Compliance

DisasterRecovery

Virtual Environment

7

Page 8: Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza

Managing Virtual and Physical Sprawl

VM VM VM

File CUS IIS

Hypervisor

Reality: Virtual Machines have real server management costs

Administration

Control

Optimization

Lifecycle Mgmt

Security

Perception: Virtual Machines are easy to create and use

Result: VM Sprawl is a serious problem

8

Page 9: Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza

New backup challenges are introduced with Virtual Machine deployment because:

Backup processing is very I/O and CPU intensive, and simultaneous backups in multiple VMs can overload the ESX server

Proliferation of servers (“VM sprawl”) increases storage requirements

“VM sprawl” makes backup configuration more time-consuming

9

Challenges of Data Protection in virtualized Data Centre

Page 10: Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza

Data Protection and Virtualization

Innovations

• Off-host Backup Architecture• Automated Setup/Discovery• Granular Recovery• Data Deduplication

Challenges

• Performance• Management• Recovery

10

Page 11: Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza

The World’s Most Comprehensive Solutionfor VMware Protection

VMwareGranular Recovery

Backup Server & Storage

VM

— or —

object

Auto-Discovery

ESX Server

Backup Server

& Storage

VM Discovery viaVirtual Center

Automated Restorevia VMware Converter

ESX Server

Deduplication

ESX Server

DD D

A

Replication

Datacenter

VaultBackup Server

& Storage

VMwareIncrementals

ESX Server

C C

A

C

Deduplication/Standard

Client-Based Backup

ESX Server

DD D

A

VMware VCB

Off-Host Backup

ESX Server

A

Backup Server

& Storage

Shared

Storage

NetBackup for

Flexible Virtual Machine protection methods….

…coupled with unique enabling technologies

11

Page 12: Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza

Feature richness of Netbackup 6.5

Industry’s-Best Disk Support

6

• Flexible disk option

• OpenStorage API

• PureDisk integration

Integrated

Deduplication

1

• PureDisk dedupefor NetBackup

• Dedupe with any disk

VMware

Protection

2

• Full VCB support

• VMware Granular Recovery

ESX Server

DD D

A

Exchange &

SharePoint 2007

Protection

3

• Granular recoveryfrom a single backup

• 2003 & 2007 versions

Integrated

BMR at No

Additional Cost

5

• Part of standard client

• Multi-platform

• Completely integrated

!

Improved

Efficiency & HA

4

• Backup jobs are load balanced

• Downed servers eliminated from pool

!

Operations

Management

& Reporting

7

• Integrated, free ops management (NOM)

• VBR for reporting

Recovery

Solutions for

Critical Applications

8

• RealTime (CDP)

• SAN client

• Snapshot client

New, Flexible

Per-TB Pricing

9

• Pay for backup basedon data protected

• Simple to track

$

Direct

Upgrade From 5.x

10

• Already partially EoS

• Fully EoS by end of2008

6.55.1

12

Page 13: Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza

The Next Phase of Virtual Infrastructure

• Assume heterogeneity

• Avoid creating silos

• Standardize service level processes where you can

• Start planning future-state client computing architecture

13

Page 14: Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza

How do you realize the Full Benefitsof Virtualization?

Challenge:

Deploy new virtualization technologies without

making existing IT operations tasks even

more difficult

Answer:

Build IT architecture around information

Not Specific Systems or platforms

Use infrastructure to separate all of the

information that matters

14

Page 15: Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza

Virtualization Summary

Symantec addresses core IT challenges

• Storage management

• High availability

• Server management

• Compliance

• Security

• Reduce cost by managing complexity

Virtualization amplifies these challenges

• Reduces everything to data, and Symantec is the leader in data and information protection and integrity

• Multiplies complexity

• Creates new IT policy compliance issues

And creates new opportunities for Symantec innovation

• Novel forms of security through virtualization

• Storage management specialization for virtual environments

• Expanded uses of software virtualization

15

Page 16: Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza

Thank You!

Copyright © 2008 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Copyright © 2008 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Questions and Answers