4. The SDDC (Software Defined Data Centre)
Info taken from http://www.techrepublic.com/article/enterprise-spend-shifting-to-software-defined-data-centers/#
– A software defined data centre has three basic stages that can be characterized
as:
Agile Automated Adaptable
6. • Convert a backup to a Virtual Machine (Hyper-V or VMware)
• This can be done…
– Simultaneous with the backup (parallel) or
– After/Subsequent to the backup (serial) (for example: backup on Monday, convert
on Friday)
Backup Exec/Netbackup
Server
HypervisorProtected server
Parallel option
Serial option Backup
Backup
Convert
Convert
Symantec V-Ray™
Physical to Virtual Conversions
7. Integrated Bare Metal Disaster Recovery (DR)
– Stop managing multiple solutions–DR is now included in Backup Exec & Netbackup
– Built into the backup process–one backup job gives you data and system protection
– Restore to same hardware or dissimilar hardware
Backup
Exec/NetBackup
Server
Server protected Server fails Server recovered
Symantec
Srd
Recovery disk
Note: Not currently available for Windows Server 2012.
10. • Virtualization Adoption
• VDI Growth
• AV, IPS and proactive detection
growth
The Scan Storm
The Problem
Growth of Virtual Endpoints and Threat Landscape
11. 11
Built for Virtual Environments
Virtual Client
Tagging
Virtual Image
Exception
Shared Insight
Cache
Resource
Leveling
Together – up to 90% reduction in disk IO
12. 12
Built for Virtualisation
– Virtual Image Exception – Allows customers to exclude all files on a
baseline image from scanning.
– Shared Insight Cache – A stand alone server that enables clients to
share scan results. This allows clients to skip scanning files that have
already been scanned by another client.
– Virtual Client Tagging – Makes the clients virtualisation aware and
sends back the hypervisor vendor to SEPM. That data can be used in
client searching and reporting.
– Offline Image Scanner – A stand alone tool developed by STAR that
can scan offline VMware image (VMDK )files..
14. Symantec Data Centre Security Solutions
14
Symantec Critical System Protection secures physical and virtual
servers.
Proactively
safeguard server
environments
• Restrict application and OS behavior
• Protect against zero day threats
• Monitor approved applications
Granular, policy-
based controls
Defends physical and virtual servers.
• Monitor and protect physical and virtual data centers
• Provide granular, policy-based controls
• Use host-based intrusion detection (HIDS), intrusion
prevention (HIPS), and least-privilege access control
15. OS Support
– Microsoft Windows
– Sun Solaris®
– Red Hat® Linux
– SUSE Linux
– HP-UX®
– IBM AIX®
– VMware ESX Console OS
15
17. – Most extensive portfolio of business
protection solutions available
– More experience – 30+ years of protecting
the world’s systems and information
– Comprehensive and up-to-date protection
against the latest threats
– Market leadership - in both security and data protection
– Trusted technology - Symantec protects 99% of the Fortune 500
Symantec Protects More Businesses
Information ProtectionPreemptive Security Alerts Threat Triggered Actions
Global Scope and ScaleWorldwide Coverage 24x7 Event Logging
Rapid Detection
Threat Activity
• 240,000 sensors
• 200+ countries
Malcode Intelligence
• 130M client, server,
gateways
• Global coverage
Vulnerabilities
• 32,000+ vulnerabilities
• 11,000 vendors
• 72,000 technologies
Spam/Phishing
•2.5M decoy accounts
•8B+ email messages/daily
•1B+ web requests/daily
The agile stage implies that the majority of the data centre’s compute resources are composed of a consolidated, standardized, and virtualized pool of resources that can be provisioned and re-provisioned at will.The automated stage provides enhanced scalability, exact repeatability, mitigates human error, and can improve security and access management.The adaptable stage employs policy-based governance that uses a rules-based system to manage service levels and potentially to respond automatically to changes in demand and business requirements as they fluctuate over time.
New! Integrated Bare Metal RecoveryAnother key enhancement in Backup Exec 2012 is the integration of bare metal restore capabilities. Leveraging the powerful Symantec Recovery Disk, also used in the Symantec System Recovery product, administrators can easily restore critical business servers from a bare metal state. Bare metal restore operations can be performed using backups stored to either disk or tape storage, including backups that have been stored in deduplicated format. When performing a bare metal restore operation from a backup set stored in a deduplication storage folder, the restore must be done using backup data stored on a remote Backup Exec 2012 server. The Backup Exec 2012 server performs rehydration tasks against the data to be restored, which is then transmitted to the remote server to be restored.Bare metal restore capabilities come as a part of the Backup Exec 2012 product; no additional license is necessary.In order to enable bare metal recovery for a protected server, the backup job must be configured for full system protection. This feature is known as Simplified System Protection. Simplified System Protection ensures that the backup set contains all the critical operating system components needed to perform a bare metal recovery. By default, backup jobs in Backup Exec 2012 are enabled for Simplified System Protection.
Symantec helps consumers and organizations secure and manage their information-driven world. Symantec’s teams around the world are developing technologies and building solutions to help your customers secure and manage their information. The company has a robust portfolio and a long history of technology leadership.Symantec is a global leader in providing security, storage and systems management solutions to help your customers – from consumers and small businesses to the largest global organizations – secure and manage their information against more risks at more points, more completely and efficiently than any other company. Symantec's unique focus is to eliminate risks to information, technology and processes, independent of the device, platform, interaction or location.With Symantec, your customers can protect more of their information and technology infrastructure, in greater depth, wherever information is stored or used. From securing a consumer’s online identity and interactions to protecting an organization’s mission-critical data, Symantec offers the leading and best-of-breed security, backup and recovery, data availability and data loss prevention products.