SlideShare a Scribd company logo
1 of 14
Download to read offline
Symantec ApplicationHA & VirtualStore


    August 2010


Symantec Confidential                       1
Introducing Symantec ApplicationHA & VirtualStore


• ApplicationHA
    – Virtualize business-critical applications with confidence
    – Monitor applications in VMs and automate recovery
    – Manage within vCenter


• VirtualStore
    – Reduce storage costs caused by virtual sprawl
    – Provision VMs and virtual desktops faster
    – Manage within vCenter



Symantec Confidential                                             2
The Last Mile: Virtualizing Business Critical Applications
                          Introducing Symantec ApplicationHA

                            tier3             tier2          tier1
Virtualization adoption




                                                                                 Virtualization widely-adopted
                            IIS            WebLogic       SQL, Oracle
                                                                                  for non-critical applications
                            Apache         WebSphere      SAP
                            Print          File           Exchange               Increased pressure to continue
                                                                                  virtualizing

                                                                                 Business critical applications
                                                                                  are infrequently virtualized
                                                  Criticality of applications




                          Symantec Confidential                                                                    3
Why is the last mile so tough?
       Need for Availability

       Key challenges in managing virtualized servers1                                      “Customers have issues with apps failing
                                                                                            inside the guest… The market is lacking a
                                             (% of respondents)
                                                                                            solution”
        Ensuring Application Availability                           51%                          – joint Symantec-VMware partner


        Coordinating new deployments                             41%
                        and upgrades                                                        Today’s Solutions are Not Enough
           Managing unanticipated cost                           42%                              – Protection for physical, not
                             increases
                                                                                                    application failures
         Overcoming existing allocation,
        purchasing and budget practices                    29%                                    – Workarounds eliminate vMotion
                                                                                                    and DRS
          Compensating for the lack of
                                                            32%                                   – Do nothing no longer is an
         integrated management tools
                                                                                                    option



                How do you confidently virtualize business critical applications?

       Symantec Confidential                                                                                                            4

1. Source: IDC, October 2009. Choosing Storage for Virtualized Servers. For companies with > 1,000 employees.
Confidently Virtualize Business Critical Applications
Extend virtualization benefits

         VM1       VM2    VM1      VM2

         App        SQL   App      SQL




          OS        OS     OS       OS

          VMware HA       VMware HA
           VMware ESX      VMware ESX




  • VMware HA may be good enough for
    some workloads
  • But, it ONLY works for physical server
    failures




Symantec Confidential                                   5
Confidently Virtualize Business Critical Applications
Extend virtualization benefits

                          VM1      VM2                  VM1         VM2

                                                         App             SQL
                          App      SQL
                                                      Application   Application
                                                         HA            HA

                                                         OS              OS
                           OS       OS

          VMware HA       VMware HA                         VMware HA
           VMware ESX      VMware ESX                       VMware ESX




  • VMware HA may be good enough for         • Business critical workloads require
    some workloads                             application monitoring and recovery
  • But, it ONLY works for physical server   • Coming in September – an integrated
    failures                                   HA solution for mission critical
                                               applications by Symantec & VMware


Symantec Confidential                                                                6
ApplicationHA: Strong VMware–Symantec Partnership
• Joint solution development                 • Launch at VMworld US
    – Joint customer research including        – Joint session at VMworld 2010 - US and
      VMware customer councils                   EMEA
    – Design and mockup reviews                – vExpert briefings
    – Weekly PM & Engineering sync-up.         – Symantec Key Note session with VMware
                                                 on ApplicationHA
    – Beta testing at VMware internal IT &
      Symantec internal IT                     – Joint solution white papers
                                               – Joint PR/AR activities




Symantec Confidential                                                                     7
ApplicationHA Key-Takeaways
• Addresses key challenge to “last mile” of virtualization
• Strong partnership with VMware
• Operationally simple
    – Integration in vCenter and Symantec management tools
• Built off industry-leading Veritas Cluster Server technology




Symantec Confidential                                            8
Symantec VirtualStore



Symantec Confidential       9
Why is the last mile so tough?
       Need for Efficient Storage Management

       Key challenges in managing virtualized servers1
                                             (% of respondents)
                                                                                            Today’s Solutions are Not Enough
        Ensuring Application Availability                           51%
                                                                                                  – Inefficient storage use
        Coordinating new deployments                             41%                              – Poor I/O performance
                        and upgrades
                                                                                                  – Limited visibility
           Managing unanticipated cost                           42%
                             increases

         Overcoming existing allocation,
        purchasing and budget practices                    29%


          Compensating for the lack of
                                                            32%
         integrated management tools




       Symantec Confidential                                                                                                   10

1. Source: IDC, October 2009. Choosing Storage for Virtualized Servers. For companies with > 1,000 employees.
Virtualization Can Create Storage Challenges

               Inefficient Storage Use             Poor I/O Performance




                                                 VMware



• Scaling the number of VMs means         • End user experience degrades when VDI
  scaling the number of VM images           users log-in en masse
• Data in each image is duplicated        • Improving performance is expensive and
• Growing storage capacity is expensive     complicated
  and complicated


VirtualStore                                                                     11
Optimize Your Storage in VMware Environments
VirtualStore
  Improve Performance              Reduce Storage Costs                 Manage Easily




• Scale performance easily and   • Scale storage easily with      • Manage storage from
  cost effectively                 existing or commodity            vCenter and eliminate the
• Provision virtual machines       storage                          need for additional
  faster                         • Store space optimized            management tools
• Improve boot-up times for        VM/VD snapshots
  virtual desktops               • Deploy thin provisioning and
                                   storage tiering


                                                                                                12
VirtualStore Overview
   Scale-out NAS Solution for VMware
• Scalable, high performance Clustered NAS      ESX Servers

  solution running on Solaris, Solaris x86 or
                                                    NFS
  RHEL 5
• File serving performance scales linearly
  with each VirtualStore head                             …
• Patented cache optimization packs more
                                                VirtualStore
  virtual machines into a single NAS head to
  deliver faster boot times and improved
  user experience                                  SAN
• Space optimized snapshots reduce storage
  footprint by only capturing iterations to
  original VM/virtual desktop image
• Supports major storage platforms to
  enable commodity or multiple vendor
  storage strategies
• Centrally managed through VMware
  vCenter

VirtualStore                                                   13
Thank you!




SYMANTEC PROPRIETARY/CONFIDENTIAL – INTERNAL USE ONLY
Copyright © 2010 Symantec Corporation. All rights reserved.




                                                              Symantec Confidential   14

More Related Content

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Symantec ApplicationHA and VirtualStore

  • 1. Symantec ApplicationHA & VirtualStore August 2010 Symantec Confidential 1
  • 2. Introducing Symantec ApplicationHA & VirtualStore • ApplicationHA – Virtualize business-critical applications with confidence – Monitor applications in VMs and automate recovery – Manage within vCenter • VirtualStore – Reduce storage costs caused by virtual sprawl – Provision VMs and virtual desktops faster – Manage within vCenter Symantec Confidential 2
  • 3. The Last Mile: Virtualizing Business Critical Applications Introducing Symantec ApplicationHA tier3 tier2 tier1 Virtualization adoption  Virtualization widely-adopted IIS WebLogic SQL, Oracle for non-critical applications Apache WebSphere SAP Print File Exchange  Increased pressure to continue virtualizing  Business critical applications are infrequently virtualized Criticality of applications Symantec Confidential 3
  • 4. Why is the last mile so tough? Need for Availability Key challenges in managing virtualized servers1 “Customers have issues with apps failing inside the guest… The market is lacking a (% of respondents) solution” Ensuring Application Availability 51% – joint Symantec-VMware partner Coordinating new deployments 41% and upgrades Today’s Solutions are Not Enough Managing unanticipated cost 42% – Protection for physical, not increases application failures Overcoming existing allocation, purchasing and budget practices 29% – Workarounds eliminate vMotion and DRS Compensating for the lack of 32% – Do nothing no longer is an integrated management tools option How do you confidently virtualize business critical applications? Symantec Confidential 4 1. Source: IDC, October 2009. Choosing Storage for Virtualized Servers. For companies with > 1,000 employees.
  • 5. Confidently Virtualize Business Critical Applications Extend virtualization benefits VM1 VM2 VM1 VM2 App SQL App SQL OS OS OS OS VMware HA VMware HA VMware ESX VMware ESX • VMware HA may be good enough for some workloads • But, it ONLY works for physical server failures Symantec Confidential 5
  • 6. Confidently Virtualize Business Critical Applications Extend virtualization benefits VM1 VM2 VM1 VM2 App SQL App SQL Application Application HA HA OS OS OS OS VMware HA VMware HA VMware HA VMware ESX VMware ESX VMware ESX • VMware HA may be good enough for • Business critical workloads require some workloads application monitoring and recovery • But, it ONLY works for physical server • Coming in September – an integrated failures HA solution for mission critical applications by Symantec & VMware Symantec Confidential 6
  • 7. ApplicationHA: Strong VMware–Symantec Partnership • Joint solution development • Launch at VMworld US – Joint customer research including – Joint session at VMworld 2010 - US and VMware customer councils EMEA – Design and mockup reviews – vExpert briefings – Weekly PM & Engineering sync-up. – Symantec Key Note session with VMware on ApplicationHA – Beta testing at VMware internal IT & Symantec internal IT – Joint solution white papers – Joint PR/AR activities Symantec Confidential 7
  • 8. ApplicationHA Key-Takeaways • Addresses key challenge to “last mile” of virtualization • Strong partnership with VMware • Operationally simple – Integration in vCenter and Symantec management tools • Built off industry-leading Veritas Cluster Server technology Symantec Confidential 8
  • 10. Why is the last mile so tough? Need for Efficient Storage Management Key challenges in managing virtualized servers1 (% of respondents) Today’s Solutions are Not Enough Ensuring Application Availability 51% – Inefficient storage use Coordinating new deployments 41% – Poor I/O performance and upgrades – Limited visibility Managing unanticipated cost 42% increases Overcoming existing allocation, purchasing and budget practices 29% Compensating for the lack of 32% integrated management tools Symantec Confidential 10 1. Source: IDC, October 2009. Choosing Storage for Virtualized Servers. For companies with > 1,000 employees.
  • 11. Virtualization Can Create Storage Challenges Inefficient Storage Use Poor I/O Performance VMware • Scaling the number of VMs means • End user experience degrades when VDI scaling the number of VM images users log-in en masse • Data in each image is duplicated • Improving performance is expensive and • Growing storage capacity is expensive complicated and complicated VirtualStore 11
  • 12. Optimize Your Storage in VMware Environments VirtualStore Improve Performance Reduce Storage Costs Manage Easily • Scale performance easily and • Scale storage easily with • Manage storage from cost effectively existing or commodity vCenter and eliminate the • Provision virtual machines storage need for additional faster • Store space optimized management tools • Improve boot-up times for VM/VD snapshots virtual desktops • Deploy thin provisioning and storage tiering 12
  • 13. VirtualStore Overview Scale-out NAS Solution for VMware • Scalable, high performance Clustered NAS ESX Servers solution running on Solaris, Solaris x86 or NFS RHEL 5 • File serving performance scales linearly with each VirtualStore head … • Patented cache optimization packs more VirtualStore virtual machines into a single NAS head to deliver faster boot times and improved user experience SAN • Space optimized snapshots reduce storage footprint by only capturing iterations to original VM/virtual desktop image • Supports major storage platforms to enable commodity or multiple vendor storage strategies • Centrally managed through VMware vCenter VirtualStore 13
  • 14. Thank you! SYMANTEC PROPRIETARY/CONFIDENTIAL – INTERNAL USE ONLY Copyright © 2010 Symantec Corporation. All rights reserved. Symantec Confidential 14