Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza
-
Upload
walter-moriconi -
Category
Technology
-
view
1.028 -
download
2
description
Transcript of Dal Desktop Al Disco Parte 2 - Virtualizzazione E Sicurezza
Virtualise with Confidence SYMC Solutions For The Virtual World
Symantec Corporation
The End of the Beginning
What is Driving Virtualization
Next Phase of Virtual Infrastructure
Challenges Combining Physical and Virtual
Manageability of Virtual Complexity
2
We are living in extraordinary times . . .
More text messages are sent daily than the population of the planet (6.75Bn)
There are over 3,5 Billion Google searches performed every month!
It is estimated we will create over 230 Exabytes of data this year, worldwide
The amount of new technical information is doubling every year
The fast-growing corners of the digital universe include data centres supporting “cloud computing,” and social networks
400 Million PC will be sold by the end of this yearLaptops represent 60% of the worlds PCs
A company can expect to lose 5% of their laptops each year
3
It’s about the Information
4
InformationCustomApps
ERP/CRMeMail and Collaboration
Clients
Secure Manage
Strategic Focus for 2009 and beyond
Top 10 Strategic TechnologyAreas for 2009/10*1
1. Virtualization2. Cloud Computing3. Servers: Beyond Blades4. Web-Oriented Architectures5. Datacenter Optimization6. Specialized Systems7. Social Software and Social
Networking8. Unified Communications9. Business Intelligence10. Green IT
*1 Gartner IT Symposium
Today’s Focus:• Virtualization + Green• Flexibility & Cost
Tomorrow’s Focus:
• First Cloud Services• Workspace Virtualization
Future Focus:
• Cloud Computing• Web Oriented Architecture
Courtesy: Gartner IT Symposium Fall, 2008 5
Virtualization and Service Levels
Storage & Server Mgmt
Data Protection
Security &Compliance
DisasterRecovery
• Storage Virtualization
• Server Virtualization
• Endpoint Virtualization
6
Standardized Infrastructure for Physical/Virtual
Production EnvironmentPhysical Environment
Storage & Server Mgmt
Data Protection
Security &Compliance
DisasterRecovery
Virtual Environment
7
Managing Virtual and Physical Sprawl
VM VM VM
File CUS IIS
Hypervisor
Reality: Virtual Machines have real server management costs
Administration
Control
Optimization
Lifecycle Mgmt
Security
Perception: Virtual Machines are easy to create and use
Result: VM Sprawl is a serious problem
8
New backup challenges are introduced with Virtual Machine deployment because:
Backup processing is very I/O and CPU intensive, and simultaneous backups in multiple VMs can overload the ESX server
Proliferation of servers (“VM sprawl”) increases storage requirements
“VM sprawl” makes backup configuration more time-consuming
9
Challenges of Data Protection in virtualized Data Centre
Data Protection and Virtualization
Innovations
• Off-host Backup Architecture• Automated Setup/Discovery• Granular Recovery• Data Deduplication
Challenges
• Performance• Management• Recovery
10
The World’s Most Comprehensive Solutionfor VMware Protection
VMwareGranular Recovery
Backup Server & Storage
VM
— or —
object
Auto-Discovery
ESX Server
Backup Server
& Storage
VM Discovery viaVirtual Center
Automated Restorevia VMware Converter
ESX Server
Deduplication
ESX Server
DD D
A
Replication
Datacenter
VaultBackup Server
& Storage
VMwareIncrementals
ESX Server
C C
A
C
Deduplication/Standard
Client-Based Backup
ESX Server
DD D
A
VMware VCB
Off-Host Backup
ESX Server
A
Backup Server
& Storage
Shared
Storage
NetBackup for
Flexible Virtual Machine protection methods….
…coupled with unique enabling technologies
11
Feature richness of Netbackup 6.5
Industry’s-Best Disk Support
6
• Flexible disk option
• OpenStorage API
• PureDisk integration
Integrated
Deduplication
1
• PureDisk dedupefor NetBackup
• Dedupe with any disk
VMware
Protection
2
• Full VCB support
• VMware Granular Recovery
ESX Server
DD D
A
Exchange &
SharePoint 2007
Protection
3
• Granular recoveryfrom a single backup
• 2003 & 2007 versions
Integrated
BMR at No
Additional Cost
5
• Part of standard client
• Multi-platform
• Completely integrated
!
Improved
Efficiency & HA
4
• Backup jobs are load balanced
• Downed servers eliminated from pool
!
Operations
Management
& Reporting
7
• Integrated, free ops management (NOM)
• VBR for reporting
Recovery
Solutions for
Critical Applications
8
• RealTime (CDP)
• SAN client
• Snapshot client
New, Flexible
Per-TB Pricing
9
• Pay for backup basedon data protected
• Simple to track
$
Direct
Upgrade From 5.x
10
• Already partially EoS
• Fully EoS by end of2008
6.55.1
12
The Next Phase of Virtual Infrastructure
• Assume heterogeneity
• Avoid creating silos
• Standardize service level processes where you can
• Start planning future-state client computing architecture
13
How do you realize the Full Benefitsof Virtualization?
Challenge:
Deploy new virtualization technologies without
making existing IT operations tasks even
more difficult
Answer:
Build IT architecture around information
Not Specific Systems or platforms
Use infrastructure to separate all of the
information that matters
14
Virtualization Summary
Symantec addresses core IT challenges
• Storage management
• High availability
• Server management
• Compliance
• Security
• Reduce cost by managing complexity
Virtualization amplifies these challenges
• Reduces everything to data, and Symantec is the leader in data and information protection and integrity
• Multiplies complexity
• Creates new IT policy compliance issues
And creates new opportunities for Symantec innovation
• Novel forms of security through virtualization
• Storage management specialization for virtual environments
• Expanded uses of software virtualization
15
Thank You!
Copyright © 2008 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Copyright © 2008 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Questions and Answers