SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
Symantec Backup and Recovery Technical Brief
Feature Description – Virtual Machine Intelligent Policy (VIP)
Historically backups have been defined and referenced by the hostname of the physical system
being protected. This has worked well when the relationship between the physical host and the
operating system was a direct, one to one relationship. Backup processing impact was limited to
each physical client and the biggest concern was saturating the network with backup traffic. This
was easily managed by limiting the number of simultaneous client backups via a simple setting
within the NetBackup policy.
Virtual machine technologies have changed this physical hardware dynamic. Dozens of operating
systems (virtual machines) can now reside on a single physical (ESX) host connected to a single
storage LUN with network access through a single NIC. When using traditional policy configurations,
backup processing randomly occurs with no regard to the physical location of each virtual machine. As backups progress, a subset of
ESX servers can be heavily impacted with active backups while other ESX systems sit idly waiting for their virtual machines to be
protected. The effect of this is that backups tend to be slower than they need to be and backup processing impact on the ESX servers
tends to be random and lopsided. Standard backup policy definitions simply do not translate well into virtual environments.
The NetBackup Virtual machine Intelligent Policy (VIP) feature is designed to solve this problem and more. With Virtual machine
Intelligent Policy, backup processing can be automatically load balanced across the entire virtual machine environment. No ESX
server is unfairly taxed with excessive backup processing and backups can be significantly faster. Once configured, this load balancing
automatically detects changes in the virtual machine environment and automatically compensates backup processing based on these
changes. Virtual machine Intelligent Policy places virtual machine backups on autopilot.
NetBackup Overview
The NetBackup Platform is a complete backup and recovery solution that is optimised for virtually any workload, whether physical,
virtual, arrays, or big data, and delivers truly flexible target storage options, whether tape, 3rd party disk, appliances, including the
NetBackup Deduplication Appliances and Integrated Backup Appliances, or cloud. Symantec NetBackup 7.6 with V-Ray Technology
delivers the performance, automation, and manageability necessary to protect virtualised deployments at scale – where thousands of
Virtual Machines and petabytes of data are the norm today, and where software-defined data centres and IT-as-a-service become the
norm tomorrow. Enterprises trust Symantec.
 Comprehensive – As a single solution to protect all of your data assets, NetBackup provides support for virtually every
popular server, storage, hypervisor, database, and application platform used in the enterprise today.
• Scalable – High performance, elastic automation, and centralised management based on a flexible, multitier architecture
enables NetBackup to adapt to the growing needs of a fast-paced, modern enterprise data centre.
• Integrated – From backup appliances to big data platforms, NetBackup integrates at every point in the technology stack to
improve reliability and performance. OpenStorage Technology (OST) provides even tighter integration with third-party
storage and snapshot solutions.
 Innovative – With hundreds of patents awarded in areas including backup, recovery, virtualisation, deduplication, and
snapshot management, NetBackup continues a long tradition of bringing advanced technologies to market first.
 Proven – For over a decade, NetBackup has led the industry as the most popular enterprise data protection software by
market share and is used by many of the largest enterprises on the planet. When you need your data back, you can trust
NetBackup.
Key Features
 One platform, one console unifies virtual and physical global data protection
 Unified global management of snapshots, replicated snapshots, backup, and recovery
 Scalable, global deduplication across virtual and physical infrastructures
 V-Ray one pass backup, instant image and single file restore for virtual and physical
 Automated virtual data protection and load balanced backup performance
Key Benefits
 Virtual Machine Auto
Discovery
 Virtual Machine Logical
Definitions
 Faster Backups
 Load Balancing Backup
Processing across entire
vSphere environment
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
Symantec Backup and Recovery Technical Brief
Key Benefits
 Unified, enterprise-class virtual and physical data protection eliminates point products, offers better visibility, leverages
resources, and reduces cost, complexity, and risk when virtualising mission-critical applications
 V-Ray technology lets you search and recover a single file from an image backup in minutes instead of a manual mount,
search, and restore that can take hours or even days
 Simplified management and faster recovery of snapshots and replicated snapshots from anywhere in the backup
environment
 “Always on” protection of new, moved, or cloned VMs eliminates uncertainty and overloading of hosts during backups
 NetBackup intelligent deduplication reduces storage costs with deduplication rates as high as 98% while optimising backup
performance and resources with flexible “end-to-end” deployment options
Business Value
Virtual machine Intelligent Policy automatically load balances backup processing across the largest of virtual machine
environments. Besides reducing the impact that backups have on the ESX server, Virtual machine Intelligent Policy
provides other significant advantages as well. These include:
 Virtual machine auto discovery. Newly introduced virtual machines can be automatically selected and protected.
This includes virtual machines that have been cloned, created from template or have been migrated into the
VMware environment.
 Storage affinity. With the advent of advanced VMware storage technologies such as Storage VMotion, virtual
machines can not only be moved across ESX servers but they can also be moved from datastore to datastore.
Virtual machine Intelligent Policy can automatically detect this movement and adjust backup processing
accordingly.
 Protecting advanced VMware technologies. VMware has created sophisticated virtual machine technologies
such as VMware high availability (HA), cluster pools, resource pools, vApps, distributed resource scheduling (DRS),
VMotion and many others. Virtual machine Intelligent Policy can be configured to automatically detect and
protect virtual machines based on any combination of these VMware-specific designations.
 Virtual machine logical definitions. Virtual machines can also be automatically selected for backup by logical
definitions including VMware datacenters, folders, resource pools, virtual machine power state and more. Simply
associate a virtual machine to one of these attributes and it is automatically backed up. This provides the ability
to automatically prioritize virtual machine backups based on a specific or mission critical VMware attribute.
 Faster backups. By spreading the backup load evenly across the physical VMware environment backup
processing can be much faster because more simultaneous backups can be safely applied without unduly
impacting any physical component.
 Resource Limits. You can control the number of simultaneous backups that can be performed on a VMware
resource type. Resource Limit screen applies only to policies that use automatic selection of virtual machines
(Query Builder). Figure 3 shows how to apply the setting.
 vCloud Director integration. The NetBackup Virtual Machine Intelligent Policy Query builder has been enhanced
to be able to enter keywords to search for vCloud Director Objects. Also, the NetBackup VIP and vCloud Director
integration allows for the vApp or Virtual Application metadata to be collected.
These are just a few of the selection methods that can be used to protect virtual machines. Virtual machines can be
selected for backup based on over 34 different VMware attributes.
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
Symantec Backup and Recovery Technical Brief
Underlying Principles
Recent studies have indicated that the number of systems and applications running on virtual machines will soon eclipse
those running on physical hardware. This change mandates that backup applications adjust to the physical and logical
changes that virtual machine environments introduce. Standard backup designs do not translate well with virtual
machine backups. Virtual machine Intelligent Policy is designed specifically for virtual machine environments but is also
engineered to take advantage of new backup opportunities that virtual machine technologies offer.
Before the virtual machine backup policy begins, Virtual machine Intelligent Policy queries the vCenter server and obtains
a detailed and current snapshot of the virtual machine environment. Any changes to the environment that may have
occurred since the previous backup run are automatically detected. Once collected, Virtual machine Intelligent Policy
uses this information to determine which virtual machines will be protected. If a virtual machine has been added, moved
or changed in any way, these changes are detected and virtual machine backups are automatically adjusted to take this
new information into account. Virtual machine Intelligent Policy automatically adjusts for any other changes that
VMware technologies such as Distributed Resource Scheduling (DRS), VMotion, Storage VMotion, etc. have made to every
virtual machine.
Virtual machine Intelligent Policy also throttles and evenly distributes backup jobs across the entire ESX environment.
This works for environments with either single or multiple vCenter servers. When each backup job is initiated, Virtual
machine Intelligent Policy automatically limits backups based on six different VMware objects including the vCenter
server, ESX server, ESX datastore and VMware cluster.
By defining simple backup instructions, virtual machines are automatically selected and backup processing is evenly
distributed across large and complex VMware environments. Backup load on each ESX server is minimized yet overall
backup performance is maximized. Fewer backup servers can protect more virtual machines in shorter backup windows.
Test Drive
Virtual machine Intelligent Policy (VIP), available starting in version 7.1, appears in the NetBackup clients policy tab
(Figure 1). Virtual machines can either be statically selected for backup or automatically selected using Virtual machine
Intelligent Policy.
Figure 1 - VIP Query
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
Symantec Backup and Recovery Technical Brief
If automatic selection is desired, the user defines a query that specifies the virtual machine selection criteria. Virtual
machines can automatically be selected for backup based on 34 different VMware, vCenter, virtual machine and ESX
server attributes. This powerful query generator walks you through the entire process.
Once the query is defined, it can be tested to ensure that it is working properly and the correct virtual machines are
selected for backup. The “Test Query” button (Figure 2) initiates a search based on the previously defined selection
criteria and provides a list of virtual machines that will be selected for backup using that query. If necessary, adjustments
to the query can be made before actual backup processing is initiated.
Figure 2 – VIP Test Query Report
Global resource or backup processing limits can be set as shown in Figure 3. Six different VMware resource types can be
individually used or defined in combination to ensure that the backup process is both fast and efficient. These resource
limits ensure that no single virtual machine object is unfairly impacted by backup processing.
Figure 3 - VIP Resource Limit Properties
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
Symantec Backup and Recovery Technical Brief
Summary
The NetBackup Virtual Machine Intelligent Policy (VIP) is a very useful tool for both VMWare and Backup Administrators
to use. This tool provides various benefits and capabilities to ensure the Virtual Machine backup and recovery
environment is adequately protected.
For more Information on VIP
Description Link
NetBackup Requirements for Automatic Virtual machine Selection http://www.symantec.com/doc
s/HOWTO70976
NetBackup for VMWare Administrator’s Guide http://www.symantec.com/doc
s/DOC6461
For More Information on NetBackup
Link Description
http://www.netbackup.com/ NetBackup Home Page
http://www.symantec.com/docs/TECH59978 NetBackup Compatibility Information
http://www.symantec.com/docs/DOC6488 NetBackup Documentation
http://www.symantec.com/support Symantec Support Portal

Weitere ähnliche Inhalte

Was ist angesagt?

VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backupjpo1974
 
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...Symantec
 
Symantec Backup Exec 2010 and NetBackup 7
Symantec Backup Exec 2010 and NetBackup 7Symantec Backup Exec 2010 and NetBackup 7
Symantec Backup Exec 2010 and NetBackup 7Symantec
 
Presentation deduplication backup software and system
Presentation   deduplication backup software and systemPresentation   deduplication backup software and system
Presentation deduplication backup software and systemxKinAnx
 
VMware Backups That Work—Lessons Learned From VADP Performance Benchmark Testing
VMware Backups That Work—Lessons Learned From VADP Performance Benchmark TestingVMware Backups That Work—Lessons Learned From VADP Performance Benchmark Testing
VMware Backups That Work—Lessons Learned From VADP Performance Benchmark TestingSymantec
 
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMPEMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMPEMC
 
Avamar Run Book - 5-14-2015_v3
Avamar Run Book - 5-14-2015_v3Avamar Run Book - 5-14-2015_v3
Avamar Run Book - 5-14-2015_v3Bill Oliver
 
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...ljaquet
 
Datasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media serverDatasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media serverFernando Alves
 
Emc data domain® boost integration guide
Emc data domain® boost integration guideEmc data domain® boost integration guide
Emc data domain® boost integration guideArvind Varade
 
-bheritas5fundamentals-
-bheritas5fundamentals--bheritas5fundamentals-
-bheritas5fundamentals-raryal
 
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...Paula Koziol
 
Dell data protection & performance management solutions
Dell data protection & performance management solutionsDell data protection & performance management solutions
Dell data protection & performance management solutionsDell Data Protection Software
 
SYMANTEC Backup Exec 2014 - infographic
SYMANTEC Backup Exec 2014 - infographicSYMANTEC Backup Exec 2014 - infographic
SYMANTEC Backup Exec 2014 - infographicMZERMA Amine
 
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large InstallationsTECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large InstallationsSymantec
 
IBM Spectrum Protect and IBM Spectrum Protect Plus - What's new! June '18
IBM Spectrum Protect and IBM Spectrum Protect Plus - What's new! June '18IBM Spectrum Protect and IBM Spectrum Protect Plus - What's new! June '18
IBM Spectrum Protect and IBM Spectrum Protect Plus - What's new! June '18Pawel Maczka
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage VirtualizationMehul Jariwala
 
ExaGrid and Symantec NetBackup: Optimizing Data Protection Webinar
ExaGrid  and Symantec NetBackup: Optimizing Data Protection WebinarExaGrid  and Symantec NetBackup: Optimizing Data Protection Webinar
ExaGrid and Symantec NetBackup: Optimizing Data Protection WebinarBill Hobbib
 

Was ist angesagt? (20)

VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backup
 
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
 
Symantec Backup Exec 2010 and NetBackup 7
Symantec Backup Exec 2010 and NetBackup 7Symantec Backup Exec 2010 and NetBackup 7
Symantec Backup Exec 2010 and NetBackup 7
 
Presentation deduplication backup software and system
Presentation   deduplication backup software and systemPresentation   deduplication backup software and system
Presentation deduplication backup software and system
 
Avamar 7 2010
Avamar 7 2010Avamar 7 2010
Avamar 7 2010
 
VMware Backups That Work—Lessons Learned From VADP Performance Benchmark Testing
VMware Backups That Work—Lessons Learned From VADP Performance Benchmark TestingVMware Backups That Work—Lessons Learned From VADP Performance Benchmark Testing
VMware Backups That Work—Lessons Learned From VADP Performance Benchmark Testing
 
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMPEMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
 
Avamar Run Book - 5-14-2015_v3
Avamar Run Book - 5-14-2015_v3Avamar Run Book - 5-14-2015_v3
Avamar Run Book - 5-14-2015_v3
 
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
 
Datasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media serverDatasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media server
 
Emc data domain
Emc data domainEmc data domain
Emc data domain
 
Emc data domain® boost integration guide
Emc data domain® boost integration guideEmc data domain® boost integration guide
Emc data domain® boost integration guide
 
-bheritas5fundamentals-
-bheritas5fundamentals--bheritas5fundamentals-
-bheritas5fundamentals-
 
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
 
Dell data protection & performance management solutions
Dell data protection & performance management solutionsDell data protection & performance management solutions
Dell data protection & performance management solutions
 
SYMANTEC Backup Exec 2014 - infographic
SYMANTEC Backup Exec 2014 - infographicSYMANTEC Backup Exec 2014 - infographic
SYMANTEC Backup Exec 2014 - infographic
 
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large InstallationsTECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
 
IBM Spectrum Protect and IBM Spectrum Protect Plus - What's new! June '18
IBM Spectrum Protect and IBM Spectrum Protect Plus - What's new! June '18IBM Spectrum Protect and IBM Spectrum Protect Plus - What's new! June '18
IBM Spectrum Protect and IBM Spectrum Protect Plus - What's new! June '18
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
ExaGrid and Symantec NetBackup: Optimizing Data Protection Webinar
ExaGrid  and Symantec NetBackup: Optimizing Data Protection WebinarExaGrid  and Symantec NetBackup: Optimizing Data Protection Webinar
ExaGrid and Symantec NetBackup: Optimizing Data Protection Webinar
 

Ähnlich wie TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy

Solution-Brief-Backup-and-Recovery (1)
Solution-Brief-Backup-and-Recovery (1)Solution-Brief-Backup-and-Recovery (1)
Solution-Brief-Backup-and-Recovery (1)Tyler Livingstone
 
Solution Brief - Backup and Recovery
Solution Brief - Backup and RecoverySolution Brief - Backup and Recovery
Solution Brief - Backup and RecoveryRohan Prakash
 
Symantec Netbackup Appliance Family
Symantec Netbackup Appliance FamilySymantec Netbackup Appliance Family
Symantec Netbackup Appliance FamilySymantec
 
Storage Strategies Now- Virtualizaing Busines Critical applications
Storage Strategies Now- Virtualizaing Busines Critical applicationsStorage Strategies Now- Virtualizaing Busines Critical applications
Storage Strategies Now- Virtualizaing Busines Critical applicationsDataCore Software
 
Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperSymantec
 
Net App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution SheetNet App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution SheetMichael Hudak
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMwareJJDiGeronimo
 
Four Main Types of Virtualization
Four Main Types of VirtualizationFour Main Types of Virtualization
Four Main Types of VirtualizationHTS Hosting
 
Software defined storage rev. 2.0
Software defined storage rev. 2.0 Software defined storage rev. 2.0
Software defined storage rev. 2.0 TTEC
 
SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...
SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...
SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...Wellington Monaco
 
Discovering New Horizons in Virtualization Solutions | The Enterprise World
Discovering New Horizons in Virtualization Solutions | The Enterprise WorldDiscovering New Horizons in Virtualization Solutions | The Enterprise World
Discovering New Horizons in Virtualization Solutions | The Enterprise WorldTEWMAGAZINE
 
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...Symantec
 
New Features For Your Software Defined Storage
New Features For Your Software Defined StorageNew Features For Your Software Defined Storage
New Features For Your Software Defined StorageDataCore Software
 
When Availability Matters the Most
When Availability Matters the MostWhen Availability Matters the Most
When Availability Matters the MostNeverfail Group
 
When availability matters the most
When availability matters the mostWhen availability matters the most
When availability matters the mostJosh Mazgelis
 
Benefits of VMware Monitoring Tools
Benefits of VMware Monitoring ToolsBenefits of VMware Monitoring Tools
Benefits of VMware Monitoring Toolstiresomerat7000
 
Techarex networks introduces disaster recovery as a service (draas) in united...
Techarex networks introduces disaster recovery as a service (draas) in united...Techarex networks introduces disaster recovery as a service (draas) in united...
Techarex networks introduces disaster recovery as a service (draas) in united...Techarex Networks
 
Efficiently protect-virtual-machines
Efficiently protect-virtual-machinesEfficiently protect-virtual-machines
Efficiently protect-virtual-machinesIcomm Technologies
 

Ähnlich wie TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy (20)

Solution-Brief-Backup-and-Recovery (1)
Solution-Brief-Backup-and-Recovery (1)Solution-Brief-Backup-and-Recovery (1)
Solution-Brief-Backup-and-Recovery (1)
 
Solution Brief - Backup and Recovery
Solution Brief - Backup and RecoverySolution Brief - Backup and Recovery
Solution Brief - Backup and Recovery
 
ds-2972
ds-2972ds-2972
ds-2972
 
Symantec Netbackup Appliance Family
Symantec Netbackup Appliance FamilySymantec Netbackup Appliance Family
Symantec Netbackup Appliance Family
 
Storage Strategies Now- Virtualizaing Busines Critical applications
Storage Strategies Now- Virtualizaing Busines Critical applicationsStorage Strategies Now- Virtualizaing Busines Critical applications
Storage Strategies Now- Virtualizaing Busines Critical applications
 
Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paper
 
Net App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution SheetNet App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution Sheet
 
Ibm spectrum protect
Ibm spectrum protect Ibm spectrum protect
Ibm spectrum protect
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMware
 
Four Main Types of Virtualization
Four Main Types of VirtualizationFour Main Types of Virtualization
Four Main Types of Virtualization
 
Software defined storage rev. 2.0
Software defined storage rev. 2.0 Software defined storage rev. 2.0
Software defined storage rev. 2.0
 
SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...
SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...
SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...
 
Discovering New Horizons in Virtualization Solutions | The Enterprise World
Discovering New Horizons in Virtualization Solutions | The Enterprise WorldDiscovering New Horizons in Virtualization Solutions | The Enterprise World
Discovering New Horizons in Virtualization Solutions | The Enterprise World
 
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...
 
New Features For Your Software Defined Storage
New Features For Your Software Defined StorageNew Features For Your Software Defined Storage
New Features For Your Software Defined Storage
 
When Availability Matters the Most
When Availability Matters the MostWhen Availability Matters the Most
When Availability Matters the Most
 
When availability matters the most
When availability matters the mostWhen availability matters the most
When availability matters the most
 
Benefits of VMware Monitoring Tools
Benefits of VMware Monitoring ToolsBenefits of VMware Monitoring Tools
Benefits of VMware Monitoring Tools
 
Techarex networks introduces disaster recovery as a service (draas) in united...
Techarex networks introduces disaster recovery as a service (draas) in united...Techarex networks introduces disaster recovery as a service (draas) in united...
Techarex networks introduces disaster recovery as a service (draas) in united...
 
Efficiently protect-virtual-machines
Efficiently protect-virtual-machinesEfficiently protect-virtual-machines
Efficiently protect-virtual-machines
 

Mehr von Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Mehr von Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Kürzlich hochgeladen

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Kürzlich hochgeladen (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy

  • 1. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 Symantec Backup and Recovery Technical Brief Feature Description – Virtual Machine Intelligent Policy (VIP) Historically backups have been defined and referenced by the hostname of the physical system being protected. This has worked well when the relationship between the physical host and the operating system was a direct, one to one relationship. Backup processing impact was limited to each physical client and the biggest concern was saturating the network with backup traffic. This was easily managed by limiting the number of simultaneous client backups via a simple setting within the NetBackup policy. Virtual machine technologies have changed this physical hardware dynamic. Dozens of operating systems (virtual machines) can now reside on a single physical (ESX) host connected to a single storage LUN with network access through a single NIC. When using traditional policy configurations, backup processing randomly occurs with no regard to the physical location of each virtual machine. As backups progress, a subset of ESX servers can be heavily impacted with active backups while other ESX systems sit idly waiting for their virtual machines to be protected. The effect of this is that backups tend to be slower than they need to be and backup processing impact on the ESX servers tends to be random and lopsided. Standard backup policy definitions simply do not translate well into virtual environments. The NetBackup Virtual machine Intelligent Policy (VIP) feature is designed to solve this problem and more. With Virtual machine Intelligent Policy, backup processing can be automatically load balanced across the entire virtual machine environment. No ESX server is unfairly taxed with excessive backup processing and backups can be significantly faster. Once configured, this load balancing automatically detects changes in the virtual machine environment and automatically compensates backup processing based on these changes. Virtual machine Intelligent Policy places virtual machine backups on autopilot. NetBackup Overview The NetBackup Platform is a complete backup and recovery solution that is optimised for virtually any workload, whether physical, virtual, arrays, or big data, and delivers truly flexible target storage options, whether tape, 3rd party disk, appliances, including the NetBackup Deduplication Appliances and Integrated Backup Appliances, or cloud. Symantec NetBackup 7.6 with V-Ray Technology delivers the performance, automation, and manageability necessary to protect virtualised deployments at scale – where thousands of Virtual Machines and petabytes of data are the norm today, and where software-defined data centres and IT-as-a-service become the norm tomorrow. Enterprises trust Symantec.  Comprehensive – As a single solution to protect all of your data assets, NetBackup provides support for virtually every popular server, storage, hypervisor, database, and application platform used in the enterprise today. • Scalable – High performance, elastic automation, and centralised management based on a flexible, multitier architecture enables NetBackup to adapt to the growing needs of a fast-paced, modern enterprise data centre. • Integrated – From backup appliances to big data platforms, NetBackup integrates at every point in the technology stack to improve reliability and performance. OpenStorage Technology (OST) provides even tighter integration with third-party storage and snapshot solutions.  Innovative – With hundreds of patents awarded in areas including backup, recovery, virtualisation, deduplication, and snapshot management, NetBackup continues a long tradition of bringing advanced technologies to market first.  Proven – For over a decade, NetBackup has led the industry as the most popular enterprise data protection software by market share and is used by many of the largest enterprises on the planet. When you need your data back, you can trust NetBackup. Key Features  One platform, one console unifies virtual and physical global data protection  Unified global management of snapshots, replicated snapshots, backup, and recovery  Scalable, global deduplication across virtual and physical infrastructures  V-Ray one pass backup, instant image and single file restore for virtual and physical  Automated virtual data protection and load balanced backup performance Key Benefits  Virtual Machine Auto Discovery  Virtual Machine Logical Definitions  Faster Backups  Load Balancing Backup Processing across entire vSphere environment
  • 2. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 Symantec Backup and Recovery Technical Brief Key Benefits  Unified, enterprise-class virtual and physical data protection eliminates point products, offers better visibility, leverages resources, and reduces cost, complexity, and risk when virtualising mission-critical applications  V-Ray technology lets you search and recover a single file from an image backup in minutes instead of a manual mount, search, and restore that can take hours or even days  Simplified management and faster recovery of snapshots and replicated snapshots from anywhere in the backup environment  “Always on” protection of new, moved, or cloned VMs eliminates uncertainty and overloading of hosts during backups  NetBackup intelligent deduplication reduces storage costs with deduplication rates as high as 98% while optimising backup performance and resources with flexible “end-to-end” deployment options Business Value Virtual machine Intelligent Policy automatically load balances backup processing across the largest of virtual machine environments. Besides reducing the impact that backups have on the ESX server, Virtual machine Intelligent Policy provides other significant advantages as well. These include:  Virtual machine auto discovery. Newly introduced virtual machines can be automatically selected and protected. This includes virtual machines that have been cloned, created from template or have been migrated into the VMware environment.  Storage affinity. With the advent of advanced VMware storage technologies such as Storage VMotion, virtual machines can not only be moved across ESX servers but they can also be moved from datastore to datastore. Virtual machine Intelligent Policy can automatically detect this movement and adjust backup processing accordingly.  Protecting advanced VMware technologies. VMware has created sophisticated virtual machine technologies such as VMware high availability (HA), cluster pools, resource pools, vApps, distributed resource scheduling (DRS), VMotion and many others. Virtual machine Intelligent Policy can be configured to automatically detect and protect virtual machines based on any combination of these VMware-specific designations.  Virtual machine logical definitions. Virtual machines can also be automatically selected for backup by logical definitions including VMware datacenters, folders, resource pools, virtual machine power state and more. Simply associate a virtual machine to one of these attributes and it is automatically backed up. This provides the ability to automatically prioritize virtual machine backups based on a specific or mission critical VMware attribute.  Faster backups. By spreading the backup load evenly across the physical VMware environment backup processing can be much faster because more simultaneous backups can be safely applied without unduly impacting any physical component.  Resource Limits. You can control the number of simultaneous backups that can be performed on a VMware resource type. Resource Limit screen applies only to policies that use automatic selection of virtual machines (Query Builder). Figure 3 shows how to apply the setting.  vCloud Director integration. The NetBackup Virtual Machine Intelligent Policy Query builder has been enhanced to be able to enter keywords to search for vCloud Director Objects. Also, the NetBackup VIP and vCloud Director integration allows for the vApp or Virtual Application metadata to be collected. These are just a few of the selection methods that can be used to protect virtual machines. Virtual machines can be selected for backup based on over 34 different VMware attributes.
  • 3. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 Symantec Backup and Recovery Technical Brief Underlying Principles Recent studies have indicated that the number of systems and applications running on virtual machines will soon eclipse those running on physical hardware. This change mandates that backup applications adjust to the physical and logical changes that virtual machine environments introduce. Standard backup designs do not translate well with virtual machine backups. Virtual machine Intelligent Policy is designed specifically for virtual machine environments but is also engineered to take advantage of new backup opportunities that virtual machine technologies offer. Before the virtual machine backup policy begins, Virtual machine Intelligent Policy queries the vCenter server and obtains a detailed and current snapshot of the virtual machine environment. Any changes to the environment that may have occurred since the previous backup run are automatically detected. Once collected, Virtual machine Intelligent Policy uses this information to determine which virtual machines will be protected. If a virtual machine has been added, moved or changed in any way, these changes are detected and virtual machine backups are automatically adjusted to take this new information into account. Virtual machine Intelligent Policy automatically adjusts for any other changes that VMware technologies such as Distributed Resource Scheduling (DRS), VMotion, Storage VMotion, etc. have made to every virtual machine. Virtual machine Intelligent Policy also throttles and evenly distributes backup jobs across the entire ESX environment. This works for environments with either single or multiple vCenter servers. When each backup job is initiated, Virtual machine Intelligent Policy automatically limits backups based on six different VMware objects including the vCenter server, ESX server, ESX datastore and VMware cluster. By defining simple backup instructions, virtual machines are automatically selected and backup processing is evenly distributed across large and complex VMware environments. Backup load on each ESX server is minimized yet overall backup performance is maximized. Fewer backup servers can protect more virtual machines in shorter backup windows. Test Drive Virtual machine Intelligent Policy (VIP), available starting in version 7.1, appears in the NetBackup clients policy tab (Figure 1). Virtual machines can either be statically selected for backup or automatically selected using Virtual machine Intelligent Policy. Figure 1 - VIP Query
  • 4. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 Symantec Backup and Recovery Technical Brief If automatic selection is desired, the user defines a query that specifies the virtual machine selection criteria. Virtual machines can automatically be selected for backup based on 34 different VMware, vCenter, virtual machine and ESX server attributes. This powerful query generator walks you through the entire process. Once the query is defined, it can be tested to ensure that it is working properly and the correct virtual machines are selected for backup. The “Test Query” button (Figure 2) initiates a search based on the previously defined selection criteria and provides a list of virtual machines that will be selected for backup using that query. If necessary, adjustments to the query can be made before actual backup processing is initiated. Figure 2 – VIP Test Query Report Global resource or backup processing limits can be set as shown in Figure 3. Six different VMware resource types can be individually used or defined in combination to ensure that the backup process is both fast and efficient. These resource limits ensure that no single virtual machine object is unfairly impacted by backup processing. Figure 3 - VIP Resource Limit Properties
  • 5. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 Symantec Backup and Recovery Technical Brief Summary The NetBackup Virtual Machine Intelligent Policy (VIP) is a very useful tool for both VMWare and Backup Administrators to use. This tool provides various benefits and capabilities to ensure the Virtual Machine backup and recovery environment is adequately protected. For more Information on VIP Description Link NetBackup Requirements for Automatic Virtual machine Selection http://www.symantec.com/doc s/HOWTO70976 NetBackup for VMWare Administrator’s Guide http://www.symantec.com/doc s/DOC6461 For More Information on NetBackup Link Description http://www.netbackup.com/ NetBackup Home Page http://www.symantec.com/docs/TECH59978 NetBackup Compatibility Information http://www.symantec.com/docs/DOC6488 NetBackup Documentation http://www.symantec.com/support Symantec Support Portal