SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
1
VeritasTM
Resiliency Platform
DATA SHEET: DISASTER RECOVERY
Innovate IT with confidence
Businesses are rapidly expanding beyond their traditional data
center boundaries into the cloud, with hybrid cloud architectures
becoming the new norm. As business-critical workloads and
data get increasingly run on diverse platforms across multiple
data centers, private and public clouds, it is imperative
for IT business continuity solutions to keep pace with the
transformation and to continue meeting business Service Level
Agreements (SLAs).
Veritas™ Resiliency Platform makes it simple for organizations
to innovate without compromising on critical business
SLAs. Organizations can confidently adopt hybrid cloud
architectures and predictably meet critical SLAs in spite of
growing IT complexity. With a unified approach to IT Service
Continuity, Resiliency Platform enables IT operations to deliver
predictable service levels to the business while ensuring location
independence, platform choice, and operational simplicity.
Key Benefits
•	 Gain visibility into global IT health
•	 Consistently deliver predictable SLAs to the business
•	 Automate orchestration across complex multi tier IT
services
•	 Integrate into existing environments with simplicity
Gain visibility into global IT health
Competitive business demands dictate the need for IT business
continuity strategies that don’t leave the business vulnerable,
including round-the-clock visibility into health of all applications
and data. Many IT organizations lack tools that provide a global
view of their IT health across critical services thereby preventing
them from implementing the right levels of protection for those
business services. Reliance on virtual machine mobility solutions
doesn’t provide insight into the most important asset—
the application.
Resiliency Platform delivers real-time visibility into the health of
all IT services across globally dispersed environments, keeping
applications and data in focus. Organizations can now keep
an eye on how well their applications are tracking to defined
availability SLAs, with insight into Recovery Point Objectives
(RPOs) and Recovery Time Objectives (RTOs). Making informed
business decisions based on the health of critical IT services just
got easier.
Key Features
•	 Single dashboard for management of multisite
business services
•	 Summary view of resiliency risks and real-time health
across all data centers
•	 End-to-end visibility for status of applications, virtual
machines, multitier business services, and data movers
A unified solution for IT service continuity
across physical, virtual, and cloud
Figure 1. Resiliency Platform web-based
dashboard showing a global view of IT
service continuity health.
Recovery Point
Objectives for critical
business applications
Detailed information on
applications, virtual machines, and
service groups just a click away
Visibility into health
of all applications and
virtual machines
DATA SHEET: DISASTER RECOVERY
VeritasTM
Resiliency Platform
2
Consistently deliver predictable SLAs to the business
Predictably meeting SLAs is the most critical aspect of an
organization’s business continuity strategy. Resiliency Platform
delivers complete confidence in meeting critical RTOs and RPOs.
Migration is simple, with a single-click for 1000’s of applications,
virtual machines, or an entire data center between sites or to the
cloud–consistently. Resiliency Platform ensures smooth failover
and failback of services across sites for continuity of business.
The Resiliency Plan feature provides customizable run book
automation for all recovery scenarios locally and across sites.
This allows IT organizations to pro-actively control recovery
operations and reduce complexities at run time. Resiliency
Platform also monitors for downtime risks in real-time such as
data inconsistency across sites, and proactively notifies the
business, so risks can be corrected before they cause a costly
outage.
It is critical that organizations stay prepared for the unknown
and predictably know how quickly they can get back to normal
operations. Resiliency Platform allows for disaster simulations
so business continuity preparedness can be reliably tested using
zero-downtime recovery rehearsals. No complicated, manual
cleanups are required and audit reports can be automatically
generated to keep stakeholders informed. With zero-downtime
recovery rehearsals from Resiliency Platform, businesses can
make resource-intensive weekend drills a thing of the past.
Key Features
•	 Recovery at granularity of choice–application, virtual
machine, multitier business service, or entire site
•	 Single-click, site failover, and failback operations including
customizable run book automation for recovery
•	 Cross-site resiliency risk monitoring and notifications
including diagnostics
•	 Zero-downtime recovery rehearsals with automated clean
up and audit reports
Automate orchestration across complex multitier IT services
IT services are increasingly distributed across different tiers to
best meet performance, scale, and agility expectations–each
individual service component may be running on a different
physical or virtual platform, or may even be a cloud-delivered
Software-as-a-Service (SaaS) application. Resiliency Platform
provides Virtual Business Services to simplify management of
multitier IT services with automated start/stop orchestration
and recovery even across sites. IT organizations no longer need
multiple teams involved in painstaking manual management
of inter-tier dependencies. Resiliency Platform captures and
automatically enforces these dependencies when the multitier
service needs to be started or stopped. This saves organizations
time and effort in managing uptime for complex multitier
applications locally and across sites, so IT teams can work on
what’s really important for the business.
Key Features
•	 Automated start and stop orchestration between
application tiers
•	 Recover workloads locally, across sites, or to the cloud
•	 Enable collaboration across teams by exposing
orchestration workflows
Figure 2. Multitier IT service automation with start and stop ordering.
Figure 3. Automated workflows for
maintaining IT resiliency across sites.
Simplified and automated
orchestration of multi-
tier IT services
Figure 4. One-stop shop for audit reporting.
RTO and RPO auto
computed and reported
Comprehensive reports
for business needs
Schedule reports to run
at required intervals
Migrate, takeover, or
rehearse with single clicks
DATA SHEET: DISASTER RECOVERY
VeritasTM
Resiliency Platform
3
Integrate into existing environments with simplicity
Resiliency Platform delivers a unified solution across physical,
virtual, and cloud simplifying IT service continuity for the
enterprise. Organizations get the flexibility to design their data
centers with the platforms of their choice, without experiencing
expensive vendor lock-in. Businesses can maintain existing
CAPEX and OPEX investments and avoid a rip and replace with
out of the box support for leading data movers and availability
solutions. Resiliency Platform lets businesses deliver the same
levels of protection for leading enterprise applications and
in-house applications through easy to use wizards.
Key Features
•	 Single solution for IT service continuity across physical,
virtual, and cloud
•	 Out-of-box support for leading data movers and local
availability solutions
•	 Resiliency for all business IT services: enterprise
applications and in-house applications
IT landscapes are changing and businesses need to stay agile
in order to grow and compete effectively. Resiliency Platform
gives organizations a simple, reliable, and effective IT service
continuity strategy to ensure that their business is always up
and running, delivering total satisfaction to your internal and
external customers.
Supported systems
Operating systems
•	 Windows®
•	 Red Hat®
Enterprise Linux®
Hypervisors
•	 VMware®
vSphere™
•	 Microsoft Hyper-V®
for Windows Server
Applications
•	 Oracle®
•	 Microsoft SQL Server®
on Windows
•	 Custom applications
Replication
•	 EMC®
SRDF
•	 NetApp®
SnapMirror®
•	 Microsoft Hyper-V®
Replica
Education services
To learn more about how to use Veritas products, visit
http://go.veritas.com/elibrary. Register and receive free access
to hundreds of regularly updated on-demand web-based training
modules covering the breadth and depth of Veritas products.
More Information
Visit our website
http://enterprise.symantec.com
To speak with a Product Specialist in the U.S.
Call toll-free 1 (800) 745 6054
To speak with a Product Specialist outside the U.S.
For specific country offices and contact numbers,
please visit our website.
About Symantec
Symantec Corporation (NASDAQ: SYMC) is an information
protection expert that helps people, businesses, and
governments seeking the freedom to unlock the opportunities
technology brings—anytime, anywhere. Founded in April 1982,
Symantec, a Fortune 500 company operating one of the largest
global data intelligence networks, has provided leading security,
backup, and availability solutions for where vital information is
stored, accessed, and shared. The company’s more than 20,000
employees reside in more than 50 countries. Ninety-nine percent
of Fortune 500 companies are Symantec customers. In fiscal
2014, it recorded revenue of $6.7 billion. To learn more go to
www.symantec.com or connect with Symantec at:
www.go.symantec.com/socialmedia.
Symantec World Headquarters
350 Ellis St. | Mountain View, CA 94043 USA
+1 (650) 527 8000 | 1 (800) 721 3934 | www.symantec.com
© 2015 Symantec Corporation. All rights reserved. Veritas and the Veritas Logo are trademarks
or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries.
Other names may be trademarks of their respective owners. 21350161 04/15

Weitere ähnliche Inhalte

Was ist angesagt?

how to secure web applications with owasp - isaca sep 2009 - for distribution
how to secure web applications  with owasp - isaca sep 2009 - for distributionhow to secure web applications  with owasp - isaca sep 2009 - for distribution
how to secure web applications with owasp - isaca sep 2009 - for distributionSantosh Satam
 
Simplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security ControlsSimplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security ControlsIvanti
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataIBM Security
 
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...Symantec
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHKirill Kertsenbaum
 
PT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product briefPT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product briefValery Boronin
 
Vmware’s move to a digital workspace
Vmware’s move to a digital workspaceVmware’s move to a digital workspace
Vmware’s move to a digital workspacesporta72
 
Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to IvantiIvanti
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperMohd Anwar Jamal Faiz
 
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...Jürgen Ambrosi
 
New Patch Automation Capabilities in EPM 2020.1
New Patch Automation Capabilities in EPM 2020.1New Patch Automation Capabilities in EPM 2020.1
New Patch Automation Capabilities in EPM 2020.1Ivanti
 
AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution OverviewProyet Kft
 
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...Kenny Buntinx
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesSymantec
 
Ivanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications Array Networks
 

Was ist angesagt? (20)

Ambesh
AmbeshAmbesh
Ambesh
 
how to secure web applications with owasp - isaca sep 2009 - for distribution
how to secure web applications  with owasp - isaca sep 2009 - for distributionhow to secure web applications  with owasp - isaca sep 2009 - for distribution
how to secure web applications with owasp - isaca sep 2009 - for distribution
 
Simplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security ControlsSimplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security Controls
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
 
Bsm mw10
Bsm mw10Bsm mw10
Bsm mw10
 
PT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product briefPT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product brief
 
Anajli_Synopsis
Anajli_SynopsisAnajli_Synopsis
Anajli_Synopsis
 
Vmware’s move to a digital workspace
Vmware’s move to a digital workspaceVmware’s move to a digital workspace
Vmware’s move to a digital workspace
 
Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to Ivanti
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
 
New Patch Automation Capabilities in EPM 2020.1
New Patch Automation Capabilities in EPM 2020.1New Patch Automation Capabilities in EPM 2020.1
New Patch Automation Capabilities in EPM 2020.1
 
AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution Overview
 
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
 
Ivanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified IT
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 

Ähnlich wie Veritas Resiliency Platform

VMware: Innovate and Thrive in the Mobile-Cloud Era
VMware: Innovate and Thrive in the Mobile-Cloud EraVMware: Innovate and Thrive in the Mobile-Cloud Era
VMware: Innovate and Thrive in the Mobile-Cloud EraVMware
 
Agility Whitepaper
Agility WhitepaperAgility Whitepaper
Agility WhitepaperLinda Wales
 
EMEA Tech Summit Dublin - Winning with SolidFire
EMEA Tech Summit Dublin - Winning with SolidFire EMEA Tech Summit Dublin - Winning with SolidFire
EMEA Tech Summit Dublin - Winning with SolidFire NetApp
 
Le soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuityLe soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuityJürgen Ambrosi
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld
 
Powering IT Transformation For Any Business
Powering IT Transformation For Any BusinessPowering IT Transformation For Any Business
Powering IT Transformation For Any BusinessePlus
 
A Better Solution Corporate Presentation
A Better Solution Corporate PresentationA Better Solution Corporate Presentation
A Better Solution Corporate PresentationDean Jennings
 
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...iland Cloud
 
A Complete Guide to Select your Virtual Data Center Virtual
A Complete Guide to Select your Virtual Data Center Virtual A Complete Guide to Select your Virtual Data Center Virtual
A Complete Guide to Select your Virtual Data Center Virtual Go4hosting Web Hosting Provider
 
Ipm executive-summary-vi-federal
Ipm executive-summary-vi-federalIpm executive-summary-vi-federal
Ipm executive-summary-vi-federalJohn McDonald
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recoveryVMware_EMEA
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetindradipg
 
Managing the move to virtualization and cloud
Managing the move to virtualization and cloudManaging the move to virtualization and cloud
Managing the move to virtualization and cloudBhaskar Jayaraman
 
Securing the Cloud Native Stack
Securing the Cloud Native StackSecuring the Cloud Native Stack
Securing the Cloud Native StackApcera
 
M.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comM.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comArun Somu Panneerselvam
 
Securing the Cloud Native stack
Securing the Cloud Native stackSecuring the Cloud Native stack
Securing the Cloud Native stackHector Tapia
 
Introduction to Cloud Native Computing
Introduction to Cloud Native ComputingIntroduction to Cloud Native Computing
Introduction to Cloud Native ComputingSaju Thomas
 

Ähnlich wie Veritas Resiliency Platform (20)

VMware: Innovate and Thrive in the Mobile-Cloud Era
VMware: Innovate and Thrive in the Mobile-Cloud EraVMware: Innovate and Thrive in the Mobile-Cloud Era
VMware: Innovate and Thrive in the Mobile-Cloud Era
 
Agility Whitepaper
Agility WhitepaperAgility Whitepaper
Agility Whitepaper
 
Introducing VMware vRealize Suite - Purpose Built for the Hybrid Cloud
Introducing VMware vRealize Suite - Purpose Built for the Hybrid Cloud Introducing VMware vRealize Suite - Purpose Built for the Hybrid Cloud
Introducing VMware vRealize Suite - Purpose Built for the Hybrid Cloud
 
EMEA Tech Summit Dublin - Winning with SolidFire
EMEA Tech Summit Dublin - Winning with SolidFire EMEA Tech Summit Dublin - Winning with SolidFire
EMEA Tech Summit Dublin - Winning with SolidFire
 
Le soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuityLe soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuity
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
 
Powering IT Transformation For Any Business
Powering IT Transformation For Any BusinessPowering IT Transformation For Any Business
Powering IT Transformation For Any Business
 
A Better Solution Corporate Presentation
A Better Solution Corporate PresentationA Better Solution Corporate Presentation
A Better Solution Corporate Presentation
 
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...
 
A Complete Guide to Select your Virtual Data Center
A Complete Guide to Select your Virtual Data CenterA Complete Guide to Select your Virtual Data Center
A Complete Guide to Select your Virtual Data Center
 
A Complete Guide to Select your Virtual Data Center Virtual
A Complete Guide to Select your Virtual Data Center Virtual A Complete Guide to Select your Virtual Data Center Virtual
A Complete Guide to Select your Virtual Data Center Virtual
 
Ipm executive-summary-vi-federal
Ipm executive-summary-vi-federalIpm executive-summary-vi-federal
Ipm executive-summary-vi-federal
 
IMS Brochure
IMS BrochureIMS Brochure
IMS Brochure
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recovery
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internet
 
Managing the move to virtualization and cloud
Managing the move to virtualization and cloudManaging the move to virtualization and cloud
Managing the move to virtualization and cloud
 
Securing the Cloud Native Stack
Securing the Cloud Native StackSecuring the Cloud Native Stack
Securing the Cloud Native Stack
 
M.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comM.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.com
 
Securing the Cloud Native stack
Securing the Cloud Native stackSecuring the Cloud Native stack
Securing the Cloud Native stack
 
Introduction to Cloud Native Computing
Introduction to Cloud Native ComputingIntroduction to Cloud Native Computing
Introduction to Cloud Native Computing
 

Mehr von Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Mehr von Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Veritas Resiliency Platform

  • 1. 1 VeritasTM Resiliency Platform DATA SHEET: DISASTER RECOVERY Innovate IT with confidence Businesses are rapidly expanding beyond their traditional data center boundaries into the cloud, with hybrid cloud architectures becoming the new norm. As business-critical workloads and data get increasingly run on diverse platforms across multiple data centers, private and public clouds, it is imperative for IT business continuity solutions to keep pace with the transformation and to continue meeting business Service Level Agreements (SLAs). Veritas™ Resiliency Platform makes it simple for organizations to innovate without compromising on critical business SLAs. Organizations can confidently adopt hybrid cloud architectures and predictably meet critical SLAs in spite of growing IT complexity. With a unified approach to IT Service Continuity, Resiliency Platform enables IT operations to deliver predictable service levels to the business while ensuring location independence, platform choice, and operational simplicity. Key Benefits • Gain visibility into global IT health • Consistently deliver predictable SLAs to the business • Automate orchestration across complex multi tier IT services • Integrate into existing environments with simplicity Gain visibility into global IT health Competitive business demands dictate the need for IT business continuity strategies that don’t leave the business vulnerable, including round-the-clock visibility into health of all applications and data. Many IT organizations lack tools that provide a global view of their IT health across critical services thereby preventing them from implementing the right levels of protection for those business services. Reliance on virtual machine mobility solutions doesn’t provide insight into the most important asset— the application. Resiliency Platform delivers real-time visibility into the health of all IT services across globally dispersed environments, keeping applications and data in focus. Organizations can now keep an eye on how well their applications are tracking to defined availability SLAs, with insight into Recovery Point Objectives (RPOs) and Recovery Time Objectives (RTOs). Making informed business decisions based on the health of critical IT services just got easier. Key Features • Single dashboard for management of multisite business services • Summary view of resiliency risks and real-time health across all data centers • End-to-end visibility for status of applications, virtual machines, multitier business services, and data movers A unified solution for IT service continuity across physical, virtual, and cloud Figure 1. Resiliency Platform web-based dashboard showing a global view of IT service continuity health. Recovery Point Objectives for critical business applications Detailed information on applications, virtual machines, and service groups just a click away Visibility into health of all applications and virtual machines
  • 2. DATA SHEET: DISASTER RECOVERY VeritasTM Resiliency Platform 2 Consistently deliver predictable SLAs to the business Predictably meeting SLAs is the most critical aspect of an organization’s business continuity strategy. Resiliency Platform delivers complete confidence in meeting critical RTOs and RPOs. Migration is simple, with a single-click for 1000’s of applications, virtual machines, or an entire data center between sites or to the cloud–consistently. Resiliency Platform ensures smooth failover and failback of services across sites for continuity of business. The Resiliency Plan feature provides customizable run book automation for all recovery scenarios locally and across sites. This allows IT organizations to pro-actively control recovery operations and reduce complexities at run time. Resiliency Platform also monitors for downtime risks in real-time such as data inconsistency across sites, and proactively notifies the business, so risks can be corrected before they cause a costly outage. It is critical that organizations stay prepared for the unknown and predictably know how quickly they can get back to normal operations. Resiliency Platform allows for disaster simulations so business continuity preparedness can be reliably tested using zero-downtime recovery rehearsals. No complicated, manual cleanups are required and audit reports can be automatically generated to keep stakeholders informed. With zero-downtime recovery rehearsals from Resiliency Platform, businesses can make resource-intensive weekend drills a thing of the past. Key Features • Recovery at granularity of choice–application, virtual machine, multitier business service, or entire site • Single-click, site failover, and failback operations including customizable run book automation for recovery • Cross-site resiliency risk monitoring and notifications including diagnostics • Zero-downtime recovery rehearsals with automated clean up and audit reports Automate orchestration across complex multitier IT services IT services are increasingly distributed across different tiers to best meet performance, scale, and agility expectations–each individual service component may be running on a different physical or virtual platform, or may even be a cloud-delivered Software-as-a-Service (SaaS) application. Resiliency Platform provides Virtual Business Services to simplify management of multitier IT services with automated start/stop orchestration and recovery even across sites. IT organizations no longer need multiple teams involved in painstaking manual management of inter-tier dependencies. Resiliency Platform captures and automatically enforces these dependencies when the multitier service needs to be started or stopped. This saves organizations time and effort in managing uptime for complex multitier applications locally and across sites, so IT teams can work on what’s really important for the business. Key Features • Automated start and stop orchestration between application tiers • Recover workloads locally, across sites, or to the cloud • Enable collaboration across teams by exposing orchestration workflows Figure 2. Multitier IT service automation with start and stop ordering. Figure 3. Automated workflows for maintaining IT resiliency across sites. Simplified and automated orchestration of multi- tier IT services Figure 4. One-stop shop for audit reporting. RTO and RPO auto computed and reported Comprehensive reports for business needs Schedule reports to run at required intervals Migrate, takeover, or rehearse with single clicks
  • 3. DATA SHEET: DISASTER RECOVERY VeritasTM Resiliency Platform 3 Integrate into existing environments with simplicity Resiliency Platform delivers a unified solution across physical, virtual, and cloud simplifying IT service continuity for the enterprise. Organizations get the flexibility to design their data centers with the platforms of their choice, without experiencing expensive vendor lock-in. Businesses can maintain existing CAPEX and OPEX investments and avoid a rip and replace with out of the box support for leading data movers and availability solutions. Resiliency Platform lets businesses deliver the same levels of protection for leading enterprise applications and in-house applications through easy to use wizards. Key Features • Single solution for IT service continuity across physical, virtual, and cloud • Out-of-box support for leading data movers and local availability solutions • Resiliency for all business IT services: enterprise applications and in-house applications IT landscapes are changing and businesses need to stay agile in order to grow and compete effectively. Resiliency Platform gives organizations a simple, reliable, and effective IT service continuity strategy to ensure that their business is always up and running, delivering total satisfaction to your internal and external customers. Supported systems Operating systems • Windows® • Red Hat® Enterprise Linux® Hypervisors • VMware® vSphere™ • Microsoft Hyper-V® for Windows Server Applications • Oracle® • Microsoft SQL Server® on Windows • Custom applications Replication • EMC® SRDF • NetApp® SnapMirror® • Microsoft Hyper-V® Replica Education services To learn more about how to use Veritas products, visit http://go.veritas.com/elibrary. Register and receive free access to hundreds of regularly updated on-demand web-based training modules covering the breadth and depth of Veritas products. More Information Visit our website http://enterprise.symantec.com To speak with a Product Specialist in the U.S. Call toll-free 1 (800) 745 6054 To speak with a Product Specialist outside the U.S. For specific country offices and contact numbers, please visit our website. About Symantec Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses, and governments seeking the freedom to unlock the opportunities technology brings—anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company operating one of the largest global data intelligence networks, has provided leading security, backup, and availability solutions for where vital information is stored, accessed, and shared. The company’s more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2014, it recorded revenue of $6.7 billion. To learn more go to www.symantec.com or connect with Symantec at: www.go.symantec.com/socialmedia. Symantec World Headquarters 350 Ellis St. | Mountain View, CA 94043 USA +1 (650) 527 8000 | 1 (800) 721 3934 | www.symantec.com © 2015 Symantec Corporation. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 21350161 04/15