SlideShare una empresa de Scribd logo
1 de 24
Descargar para leer sin conexión
Symantec Backup Exec Blueprints 1
Symantec Backup Exec Blueprints
Blueprint for Deduplication
Backup Exec Technical Services
Backup & Recovery Technical Education Services
Symantec Backup Exec Blueprints 2
Notice
This Backup Exec Blueprint presentation includes example diagrams that contain objects
that represent applications and platforms from other companies such as Microsoft and
VMware. These diagrams may or may not match or resemble actual implementations
found in end user environments. Any likeness or similarity to actual end user
environments is completely by coincidence.
The goal of the diagrams included in this blueprint presentation is not to recommend
specific ways in which to implement applications and platforms from other companies
such as Microsoft and VMware, but rather to illustrate Backup Exec best practices only.
For guidelines and best practices on installing and configuring applications and
platforms from other companies, please refer to best practice documentation and other
resources provided by those companies.
Symantec Backup Exec Blueprints
Preface/disclaimer
Symantec Backup Exec Blueprints 3
Backup Exec Blueprints: How to Use
Getting the most out of Backup Exec blueprints
• These Blueprints are designed to show customer challenges and how Backup
Exec solves these challenges.
• Each Blueprint consists of:
‒ Pain Points: What challenges customers face
‒ Whiteboard: Shows how Backup Exec solves the customer challenges
‒ Recommended Configuration: Shows recommended installation
‒ Dos: Gives detailed configurations suggested by Symantec
‒ Don'ts: What configurations & pitfalls customers should avoid
‒ Advantages: Summarizes the Backup Exec advantages
• Use these Blueprints to:
‒ Understand the customer challenges and how Backup Exec solves them
‒ Present the Backup Exec best practice solution
Pain Points
4Symantec Backup Exec Blueprints
Symantec Backup Exec Blueprints 5
Backup Exec Blueprints: Deduplication
Modern storage challenges associated with data growth
• Increased Storage Costs
• Expanding Backup Windows
• Difficulty Meeting SLAs
• Duplicate Data Across Storage Infrastructure
• Challenges of Remote Office Protection
• Costs Associated with Managing Tape
• Managing Legacy Architectures
• Complex Backup Processes
• Virtualization Platforms and Requirements
Use Cases and Recommendations
6Symantec Backup Exec Blueprints
Symantec Backup Exec Blueprints 7
Backup Exec Blueprints: Deduplication
Flexible deduplication configuration choices
• Server Deduplication
– Full backup stream transmitted to backup server
– Data deduplicated at backup server
• Client Deduplication
– Data deduplicated at client, before transmission
– Only unique blocks transmitted
• Appliance Deduplication
– Deduplication appliance handles deduplication
Client
Server
Appliance
OST
Plug-in
Symantec Backup Exec Blueprints 8
Backup Exec Blueprints: Deduplication
Server deduplication architecture
SYSTEM/DATA DRIVE
PDDE/Deduplication Engine
Backup Exec
PDDE/Deduplication Engine
Data Server
AGENT FOR WINDOWS
Deduplicated data
PDDE/Deduplication Engine
Tape Server
OST
Non Deduplicated Data
Non Deduplicated Data
Backup Exec Server Deduplication - High-level Best Practices
A 64-bit Backup Exec server with a minimum of 4 cores processor.
Symantec recommends 8 cores.
•For 64 TB of stored deduplicated data, 8 cores are required.
Minimum of 8 GB of available memory on Backup Exec server
Run Backup Exec deduplication assessment tool to analyze the
available data and expected deduplication ratio
Enough space for deduplication engine database and for its backup
copy
Symantec Backup Exec Blueprints 9
Backup Exec Blueprints: Deduplication
Server deduplication use case recommendations
• Full Backup Stream Sent to Backup Exec Server
• Backup Exec Server Only Stores Unique Blocks
• Data Stored to Deduplication Disk Device on Backup Exec server
• Preferable for VMware Backups, Servers with High Utilization
Symantec Backup Exec Blueprints 10
Backup Exec Blueprints: Deduplication
Client deduplication architecture
SYSTEM/DATA DRIVE
PDDE/Deduplication Engine
Backup Exec
REMOTE WINDOWS SERVER
AGENT FOR WINDOWS
PDDE/Deduplication Engine
Data Server
Tape Server
OST
AGENT FOR WINDOWS
Deduplicated data
1
2
3
Backup Exec Client Deduplication - High-level Best Practices
At least of 1.5GB of physical memory on each protected client for client
side deduplication
Each protected client should have at least 1 dual core processor
Expect at least 75% CPU utilization during backup operation
Symantec Backup Exec Blueprints 11
Backup Exec Blueprints: Deduplication
Client deduplication use case recommendations
• Client Deduplication Can Simplify Remote Office Protection
• Scenario 1: Direct Backup
– Backups transmitted from remote office servers to Backup Exec server at
central location
– Remote office servers use Client Deduplication
• Scenario 2: “Store and Forward”
– Backups stored to Backup Exec server at remote office
– Deduplicated blocks transferred from remote office Backup Exec server
to central Backup Exec server
– Remote office Backup Exec server acts as “client” to central Backup Exec
server
– Requires CASO
Symantec Backup Exec Blueprints 12
Backup Exec Blueprints: Deduplication
Appliance deduplication use case recommendations
• Some Customers Have Invested in Deduplication Appliances
• Appliance Deduplication Can Be Leveraged
– Deduplication appliance handles all aspects of deduplication
– Requires OST plug-in
• Enables Intelligent Replication Tracking
– Backup Exec server tracks deduplicated backup data replicated to
additional deduplication appliances
– Can restore from replication target appliances
Symantec Backup Exec Blueprints 13
Backup Exec Blueprints: Deduplication
Tape recommendations
• Server and Client Deduplication Backups Stored to Disk First
• Can Be Copied to Tape Devices
– Just add tape stage in backup workflow
• Deduplicated Data “Rehydrated” Before Being Stored to Tape
– “Rehydrated” = restoring original data from deduplicated blocks
Backup Exec ServerProtected Client
Tape Device
Data is “rehydrated” before it is
transferred to tape
Symantec Backup Exec Blueprints 14
Backup Exec Blueprints: Deduplication
Disk recommendations
• Symantec recommends the following as minimum disk speeds
per individual read, write, or verify operation:
– Up to 32 TBs of storage:
• 130 MB per second
• 200 MB per second for enterprise-level performance
• 32 to 48 TBs of storage: 200 MB per second
• 48 to 64 TBs of storage: 250 MB per second
• The above recommendations are for the performance of a
single operation. You may need more capability depending on
your objectives for writing to and reading from disk.
Note: You should be aware of the effects that computer disk speeds have on
deduplication performance.
Symantec Backup Exec Blueprints 15
Backup Exec Blueprints: Deduplication
Use case recommendations chart
Use Case Description
Client
Deduplication
Server
Deduplication
Appliance
Deduplication
Remote Windows Servers 
Remote Linux Servers 
Remote Mac Servers  
Applications on Physical Windows Servers 
Applications on Linux (SAP, Oracle, etc.) 
VMware Virtual Machine Backups 
Hyper-V Virtual Machine Backups 
Off-Host VMware Virtual Machine Backups (SAN) 
Remote Office Backups without Local Storage 
Remote Office Backups with Local Storage * 
Investment in Deduplication Appliance 
*It is recommended that Client Deduplication be used to store backups of servers located in a remote office to a Backup Exec server
also located in the same remote office, in conjunction with the use of Optimized Duplication to copy deduplicated backup data from
the remote Backup Exec server to a Backup Exec server at a central office location.
Whiteboards and Diagrams
16Symantec Backup Exec Blueprints
Example Diagram: Deduplication
Backup Exec with Deduplication Option
Symantec Backup Exec Blueprints 17
Deduplication Appliance
Disk Based Storage
Deduplication Engine
Tape Library
FILE SERVER
VIRTIUAL
SERVER
APPLICATION
SERVER DATABASE SERVER
SAN DISK STORAGE
LAN
SAN
Backup Exec
Backup Exec Deduplication Option - High-level Best Practices
 A Backup Exec server with a minimum of 4 cores (Symantec
recommends 8 cores)
 For 64 TB of stored deduplicated data, 8 cores are required
 Minimum of 8 GB of available memory on Backup Exec server
 At least of 1.5 GB of physical memory on each protected client for
client side deduplication
 Each protected client should have at least 1 dual core processor
 Run Backup Exec deduplication assessment tool to analyze the
available data and expected deduplication ratio
DISK TO DISK TO TAPE
Do…
18Symantec Backup Exec Blueprints
Symantec Backup Exec Blueprints 19
Best Practices: Deduplication
Do the following…
• Deduplication Database Sizing
– Roughly 6-8 GB of database size per 1 TB of stored deduplicated data.
– Maintenance routines make a backup copy of the database
– Additional space required for database backup copy
– Use a dynamic volume that can grow as needed
• Processor Utilization
– At least 75% processor utilization for that processor core for the duration
– Minimum: Backup Exec server should have at least one four cores processor;
(for 64 TB of stored deduplicated data, 8 cores are required)
– Recommended: 8 cores
• Agent for VMware and Hyper-V
– Image-level backups of VMware virtual machines require server deduplication
Symantec Backup Exec Blueprints 20
Best Practices: Deduplication
Do the following…
• Physical Memory on Backup Exec Server
– 8 GB of free physical system RAM for up to 5 TB of deduplicated data
– For more than 5 TB of data, use the following:
• 1.5 GB x N, where N = the number of TBs of deduplicated data to be stored
• Physical Memory on Client
– 1.5 GB of free physical memory on each client that uses client
• Use Dedicated Logon Account for Deduplication Disk Device
• Changing Backup Exec Logon Account Password
– If you change Backup Exec logon account password, use the spauser.exe
utility to update it
Do not…
21Symantec Backup Exec Blueprints
Symantec Backup Exec Blueprints 22
Best Practices: Deduplication
Do not do the following…
• RAID Caching
– Do not enable RAID caching on disk hosting deduplication disk storage device
• Verifying Backups
– Verify with the duplication job
• Client Deduplication
– Do not use client deduplication if remote system has heavy processing load;
use server-side deduplication
• WAN Considerations
– Do not use server deduplication with backups over WAN
– Remote office protection without local storage should use client
deduplication
• You cannot create a deduplication storage folder in a storage path
that contains double-byte characters
Symantec Backup Exec Blueprints 23
Backup Exec Deduplication: Final Thoughts
One solution for any environment
• Reduce Data Backup Storage by 10:1
• Optimize network utilization
• Deduplicate Across Physical and Virtual Backups
• Comprehensive Support for Virtual and Physical Servers
• Flexible Deduplication Options
– Client deduplication
– Server deduplication
– Appliance deduplication
• VMware VADP Integration
• Cross-platform (Windows and Linux) Deduplication Support
• Single License Unlocks All Deduplication Options
Symantec Backup Exec Blueprints 24
Thank You!
Backup Exec Product Management

Más contenido relacionado

La actualidad más candente

Performance Tuning
Performance TuningPerformance Tuning
Performance TuningJannet Peetz
 
TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015
TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015
TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015Symantec
 
Disaster Recovery: Is Your iSeries Recoverable?
Disaster Recovery: Is Your iSeries Recoverable?Disaster Recovery: Is Your iSeries Recoverable?
Disaster Recovery: Is Your iSeries Recoverable?WTS
 
Performance case studies Common Europe june 2012
Performance case studies Common Europe june 2012Performance case studies Common Europe june 2012
Performance case studies Common Europe june 2012COMMON Europe
 
IBM i Job wait accounting job watcher june 2012
IBM i Job wait accounting job watcher june 2012IBM i Job wait accounting job watcher june 2012
IBM i Job wait accounting job watcher june 2012COMMON Europe
 
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330Symantec
 
VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backupjpo1974
 
Backup & recovery for exadata
Backup & recovery for exadataBackup & recovery for exadata
Backup & recovery for exadatasolarisyougood
 
Presentazione VMware @ VMUGIT UserCon 2015
Presentazione VMware @ VMUGIT UserCon 2015Presentazione VMware @ VMUGIT UserCon 2015
Presentazione VMware @ VMUGIT UserCon 2015VMUG IT
 
Nov 2014 2 blu pointe continuity cloudrar-master
Nov 2014 2 blu pointe continuity cloudrar-master Nov 2014 2 blu pointe continuity cloudrar-master
Nov 2014 2 blu pointe continuity cloudrar-master Ron_Roberts
 
High availability and disaster recovery in IBM PureApplication System
High availability and disaster recovery in IBM PureApplication SystemHigh availability and disaster recovery in IBM PureApplication System
High availability and disaster recovery in IBM PureApplication SystemScott Moonen
 
Veeam Webinar - Case study: building bi-directional DR
Veeam Webinar - Case study: building bi-directional DRVeeam Webinar - Case study: building bi-directional DR
Veeam Webinar - Case study: building bi-directional DRJoep Piscaer
 
Software Snapshots FTW? Practical Experiences of Software Snapshots with TSM ...
Software Snapshots FTW? Practical Experiences of Software Snapshots with TSM ...Software Snapshots FTW? Practical Experiences of Software Snapshots with TSM ...
Software Snapshots FTW? Practical Experiences of Software Snapshots with TSM ...David McClelland
 
VMware Site Recovery Manager
VMware Site Recovery ManagerVMware Site Recovery Manager
VMware Site Recovery ManagerJürgen Ambrosi
 
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...Symantec
 
Fast Back Sales Enablement V1 2
Fast Back Sales Enablement V1 2Fast Back Sales Enablement V1 2
Fast Back Sales Enablement V1 2petchpaitoon
 
VMworld 2014: Site Recovery Manager and Stretched Storage
VMworld 2014: Site Recovery Manager and Stretched StorageVMworld 2014: Site Recovery Manager and Stretched Storage
VMworld 2014: Site Recovery Manager and Stretched StorageVMworld
 
White Paper: Understanding EMC Avamar with EMC Data Protection Advisor — Appl...
White Paper: Understanding EMC Avamar with EMC Data Protection Advisor — Appl...White Paper: Understanding EMC Avamar with EMC Data Protection Advisor — Appl...
White Paper: Understanding EMC Avamar with EMC Data Protection Advisor — Appl...EMC
 
SRM versus Stretched Clusters: Choosing the Right Solution
SRM versus Stretched Clusters: Choosing the Right SolutionSRM versus Stretched Clusters: Choosing the Right Solution
SRM versus Stretched Clusters: Choosing the Right SolutionScott Lowe
 
Emc sql server 2012 overview
Emc sql server 2012 overviewEmc sql server 2012 overview
Emc sql server 2012 overviewsolarisyougood
 

La actualidad más candente (20)

Performance Tuning
Performance TuningPerformance Tuning
Performance Tuning
 
TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015
TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015
TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015
 
Disaster Recovery: Is Your iSeries Recoverable?
Disaster Recovery: Is Your iSeries Recoverable?Disaster Recovery: Is Your iSeries Recoverable?
Disaster Recovery: Is Your iSeries Recoverable?
 
Performance case studies Common Europe june 2012
Performance case studies Common Europe june 2012Performance case studies Common Europe june 2012
Performance case studies Common Europe june 2012
 
IBM i Job wait accounting job watcher june 2012
IBM i Job wait accounting job watcher june 2012IBM i Job wait accounting job watcher june 2012
IBM i Job wait accounting job watcher june 2012
 
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330
 
VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backup
 
Backup & recovery for exadata
Backup & recovery for exadataBackup & recovery for exadata
Backup & recovery for exadata
 
Presentazione VMware @ VMUGIT UserCon 2015
Presentazione VMware @ VMUGIT UserCon 2015Presentazione VMware @ VMUGIT UserCon 2015
Presentazione VMware @ VMUGIT UserCon 2015
 
Nov 2014 2 blu pointe continuity cloudrar-master
Nov 2014 2 blu pointe continuity cloudrar-master Nov 2014 2 blu pointe continuity cloudrar-master
Nov 2014 2 blu pointe continuity cloudrar-master
 
High availability and disaster recovery in IBM PureApplication System
High availability and disaster recovery in IBM PureApplication SystemHigh availability and disaster recovery in IBM PureApplication System
High availability and disaster recovery in IBM PureApplication System
 
Veeam Webinar - Case study: building bi-directional DR
Veeam Webinar - Case study: building bi-directional DRVeeam Webinar - Case study: building bi-directional DR
Veeam Webinar - Case study: building bi-directional DR
 
Software Snapshots FTW? Practical Experiences of Software Snapshots with TSM ...
Software Snapshots FTW? Practical Experiences of Software Snapshots with TSM ...Software Snapshots FTW? Practical Experiences of Software Snapshots with TSM ...
Software Snapshots FTW? Practical Experiences of Software Snapshots with TSM ...
 
VMware Site Recovery Manager
VMware Site Recovery ManagerVMware Site Recovery Manager
VMware Site Recovery Manager
 
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
 
Fast Back Sales Enablement V1 2
Fast Back Sales Enablement V1 2Fast Back Sales Enablement V1 2
Fast Back Sales Enablement V1 2
 
VMworld 2014: Site Recovery Manager and Stretched Storage
VMworld 2014: Site Recovery Manager and Stretched StorageVMworld 2014: Site Recovery Manager and Stretched Storage
VMworld 2014: Site Recovery Manager and Stretched Storage
 
White Paper: Understanding EMC Avamar with EMC Data Protection Advisor — Appl...
White Paper: Understanding EMC Avamar with EMC Data Protection Advisor — Appl...White Paper: Understanding EMC Avamar with EMC Data Protection Advisor — Appl...
White Paper: Understanding EMC Avamar with EMC Data Protection Advisor — Appl...
 
SRM versus Stretched Clusters: Choosing the Right Solution
SRM versus Stretched Clusters: Choosing the Right SolutionSRM versus Stretched Clusters: Choosing the Right Solution
SRM versus Stretched Clusters: Choosing the Right Solution
 
Emc sql server 2012 overview
Emc sql server 2012 overviewEmc sql server 2012 overview
Emc sql server 2012 overview
 

Similar a Backup Exec Blueprints▶ Deduplication

TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - Optimized Duplic...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - Optimized Duplic...TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - Optimized Duplic...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - Optimized Duplic...Symantec
 
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...Symantec
 
NetBackup Appliance Family presentation
NetBackup Appliance Family presentationNetBackup Appliance Family presentation
NetBackup Appliance Family presentationSymantec
 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Rubal Sagwal
 
NICConf 2015 - azure disaster recovery in 60min
NICConf 2015 -  azure disaster recovery in 60minNICConf 2015 -  azure disaster recovery in 60min
NICConf 2015 - azure disaster recovery in 60minPeter De Tender
 
PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMwareDevansh Chowdhary
 
Sample Solution Blueprint
Sample Solution BlueprintSample Solution Blueprint
Sample Solution BlueprintMike Alvarado
 
Architecting with power vm
Architecting with power vmArchitecting with power vm
Architecting with power vmCharlie Cler
 
Cinder enhancements-for-replication-using-stateless-snapshots
Cinder enhancements-for-replication-using-stateless-snapshotsCinder enhancements-for-replication-using-stateless-snapshots
Cinder enhancements-for-replication-using-stateless-snapshotsCaitlin Bestler
 
5 Ways Your Backup Design Can Impact Virtualized Data Protection
5 Ways Your Backup Design Can Impact Virtualized Data Protection5 Ways Your Backup Design Can Impact Virtualized Data Protection
5 Ways Your Backup Design Can Impact Virtualized Data ProtectionStorage Switzerland
 
Security Grade Servers and Storage - Quantifying Value
Security Grade Servers and Storage - Quantifying ValueSecurity Grade Servers and Storage - Quantifying Value
Security Grade Servers and Storage - Quantifying ValueJan Robin
 
Why Security-Grade Servers and Storage?
Why Security-Grade Servers and Storage?Why Security-Grade Servers and Storage?
Why Security-Grade Servers and Storage?Jan Robin
 
Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperSymantec
 
Cloud computing 3702
Cloud computing 3702Cloud computing 3702
Cloud computing 3702Jess Coburn
 
How to achieve better backup with Symantec
How to achieve better backup with SymantecHow to achieve better backup with Symantec
How to achieve better backup with SymantecArrow ECS UK
 
Sql disaster recovery
Sql disaster recoverySql disaster recovery
Sql disaster recoverySqlperfomance
 
Sdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint FinalSdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint FinalStephen Rose
 

Similar a Backup Exec Blueprints▶ Deduplication (20)

TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - Optimized Duplic...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - Optimized Duplic...TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - Optimized Duplic...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - Optimized Duplic...
 
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
 
NetBackup Appliance Family presentation
NetBackup Appliance Family presentationNetBackup Appliance Family presentation
NetBackup Appliance Family presentation
 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation
 
NICConf 2015 - azure disaster recovery in 60min
NICConf 2015 -  azure disaster recovery in 60minNICConf 2015 -  azure disaster recovery in 60min
NICConf 2015 - azure disaster recovery in 60min
 
PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMware
 
Sample Solution Blueprint
Sample Solution BlueprintSample Solution Blueprint
Sample Solution Blueprint
 
Architecting with power vm
Architecting with power vmArchitecting with power vm
Architecting with power vm
 
Cinder enhancements-for-replication-using-stateless-snapshots
Cinder enhancements-for-replication-using-stateless-snapshotsCinder enhancements-for-replication-using-stateless-snapshots
Cinder enhancements-for-replication-using-stateless-snapshots
 
5 Ways Your Backup Design Can Impact Virtualized Data Protection
5 Ways Your Backup Design Can Impact Virtualized Data Protection5 Ways Your Backup Design Can Impact Virtualized Data Protection
5 Ways Your Backup Design Can Impact Virtualized Data Protection
 
Security Grade Servers and Storage - Quantifying Value
Security Grade Servers and Storage - Quantifying ValueSecurity Grade Servers and Storage - Quantifying Value
Security Grade Servers and Storage - Quantifying Value
 
Why Security-Grade Servers and Storage?
Why Security-Grade Servers and Storage?Why Security-Grade Servers and Storage?
Why Security-Grade Servers and Storage?
 
Expertslive azure site recovery
  Expertslive   azure site recovery  Expertslive   azure site recovery
Expertslive azure site recovery
 
MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12
 
Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paper
 
Cloud computing 3702
Cloud computing 3702Cloud computing 3702
Cloud computing 3702
 
How to achieve better backup with Symantec
How to achieve better backup with SymantecHow to achieve better backup with Symantec
How to achieve better backup with Symantec
 
Sql disaster recovery
Sql disaster recoverySql disaster recovery
Sql disaster recovery
 
Azure based development for SharePoint 2013
Azure based development for SharePoint 2013Azure based development for SharePoint 2013
Azure based development for SharePoint 2013
 
Sdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint FinalSdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint Final
 

Más de Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Más de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Último

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 

Último (20)

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 

Backup Exec Blueprints▶ Deduplication

  • 1. Symantec Backup Exec Blueprints 1 Symantec Backup Exec Blueprints Blueprint for Deduplication Backup Exec Technical Services Backup & Recovery Technical Education Services
  • 2. Symantec Backup Exec Blueprints 2 Notice This Backup Exec Blueprint presentation includes example diagrams that contain objects that represent applications and platforms from other companies such as Microsoft and VMware. These diagrams may or may not match or resemble actual implementations found in end user environments. Any likeness or similarity to actual end user environments is completely by coincidence. The goal of the diagrams included in this blueprint presentation is not to recommend specific ways in which to implement applications and platforms from other companies such as Microsoft and VMware, but rather to illustrate Backup Exec best practices only. For guidelines and best practices on installing and configuring applications and platforms from other companies, please refer to best practice documentation and other resources provided by those companies. Symantec Backup Exec Blueprints Preface/disclaimer
  • 3. Symantec Backup Exec Blueprints 3 Backup Exec Blueprints: How to Use Getting the most out of Backup Exec blueprints • These Blueprints are designed to show customer challenges and how Backup Exec solves these challenges. • Each Blueprint consists of: ‒ Pain Points: What challenges customers face ‒ Whiteboard: Shows how Backup Exec solves the customer challenges ‒ Recommended Configuration: Shows recommended installation ‒ Dos: Gives detailed configurations suggested by Symantec ‒ Don'ts: What configurations & pitfalls customers should avoid ‒ Advantages: Summarizes the Backup Exec advantages • Use these Blueprints to: ‒ Understand the customer challenges and how Backup Exec solves them ‒ Present the Backup Exec best practice solution
  • 5. Symantec Backup Exec Blueprints 5 Backup Exec Blueprints: Deduplication Modern storage challenges associated with data growth • Increased Storage Costs • Expanding Backup Windows • Difficulty Meeting SLAs • Duplicate Data Across Storage Infrastructure • Challenges of Remote Office Protection • Costs Associated with Managing Tape • Managing Legacy Architectures • Complex Backup Processes • Virtualization Platforms and Requirements
  • 6. Use Cases and Recommendations 6Symantec Backup Exec Blueprints
  • 7. Symantec Backup Exec Blueprints 7 Backup Exec Blueprints: Deduplication Flexible deduplication configuration choices • Server Deduplication – Full backup stream transmitted to backup server – Data deduplicated at backup server • Client Deduplication – Data deduplicated at client, before transmission – Only unique blocks transmitted • Appliance Deduplication – Deduplication appliance handles deduplication Client Server Appliance OST Plug-in
  • 8. Symantec Backup Exec Blueprints 8 Backup Exec Blueprints: Deduplication Server deduplication architecture SYSTEM/DATA DRIVE PDDE/Deduplication Engine Backup Exec PDDE/Deduplication Engine Data Server AGENT FOR WINDOWS Deduplicated data PDDE/Deduplication Engine Tape Server OST Non Deduplicated Data Non Deduplicated Data Backup Exec Server Deduplication - High-level Best Practices A 64-bit Backup Exec server with a minimum of 4 cores processor. Symantec recommends 8 cores. •For 64 TB of stored deduplicated data, 8 cores are required. Minimum of 8 GB of available memory on Backup Exec server Run Backup Exec deduplication assessment tool to analyze the available data and expected deduplication ratio Enough space for deduplication engine database and for its backup copy
  • 9. Symantec Backup Exec Blueprints 9 Backup Exec Blueprints: Deduplication Server deduplication use case recommendations • Full Backup Stream Sent to Backup Exec Server • Backup Exec Server Only Stores Unique Blocks • Data Stored to Deduplication Disk Device on Backup Exec server • Preferable for VMware Backups, Servers with High Utilization
  • 10. Symantec Backup Exec Blueprints 10 Backup Exec Blueprints: Deduplication Client deduplication architecture SYSTEM/DATA DRIVE PDDE/Deduplication Engine Backup Exec REMOTE WINDOWS SERVER AGENT FOR WINDOWS PDDE/Deduplication Engine Data Server Tape Server OST AGENT FOR WINDOWS Deduplicated data 1 2 3 Backup Exec Client Deduplication - High-level Best Practices At least of 1.5GB of physical memory on each protected client for client side deduplication Each protected client should have at least 1 dual core processor Expect at least 75% CPU utilization during backup operation
  • 11. Symantec Backup Exec Blueprints 11 Backup Exec Blueprints: Deduplication Client deduplication use case recommendations • Client Deduplication Can Simplify Remote Office Protection • Scenario 1: Direct Backup – Backups transmitted from remote office servers to Backup Exec server at central location – Remote office servers use Client Deduplication • Scenario 2: “Store and Forward” – Backups stored to Backup Exec server at remote office – Deduplicated blocks transferred from remote office Backup Exec server to central Backup Exec server – Remote office Backup Exec server acts as “client” to central Backup Exec server – Requires CASO
  • 12. Symantec Backup Exec Blueprints 12 Backup Exec Blueprints: Deduplication Appliance deduplication use case recommendations • Some Customers Have Invested in Deduplication Appliances • Appliance Deduplication Can Be Leveraged – Deduplication appliance handles all aspects of deduplication – Requires OST plug-in • Enables Intelligent Replication Tracking – Backup Exec server tracks deduplicated backup data replicated to additional deduplication appliances – Can restore from replication target appliances
  • 13. Symantec Backup Exec Blueprints 13 Backup Exec Blueprints: Deduplication Tape recommendations • Server and Client Deduplication Backups Stored to Disk First • Can Be Copied to Tape Devices – Just add tape stage in backup workflow • Deduplicated Data “Rehydrated” Before Being Stored to Tape – “Rehydrated” = restoring original data from deduplicated blocks Backup Exec ServerProtected Client Tape Device Data is “rehydrated” before it is transferred to tape
  • 14. Symantec Backup Exec Blueprints 14 Backup Exec Blueprints: Deduplication Disk recommendations • Symantec recommends the following as minimum disk speeds per individual read, write, or verify operation: – Up to 32 TBs of storage: • 130 MB per second • 200 MB per second for enterprise-level performance • 32 to 48 TBs of storage: 200 MB per second • 48 to 64 TBs of storage: 250 MB per second • The above recommendations are for the performance of a single operation. You may need more capability depending on your objectives for writing to and reading from disk. Note: You should be aware of the effects that computer disk speeds have on deduplication performance.
  • 15. Symantec Backup Exec Blueprints 15 Backup Exec Blueprints: Deduplication Use case recommendations chart Use Case Description Client Deduplication Server Deduplication Appliance Deduplication Remote Windows Servers  Remote Linux Servers  Remote Mac Servers   Applications on Physical Windows Servers  Applications on Linux (SAP, Oracle, etc.)  VMware Virtual Machine Backups  Hyper-V Virtual Machine Backups  Off-Host VMware Virtual Machine Backups (SAN)  Remote Office Backups without Local Storage  Remote Office Backups with Local Storage *  Investment in Deduplication Appliance  *It is recommended that Client Deduplication be used to store backups of servers located in a remote office to a Backup Exec server also located in the same remote office, in conjunction with the use of Optimized Duplication to copy deduplicated backup data from the remote Backup Exec server to a Backup Exec server at a central office location.
  • 16. Whiteboards and Diagrams 16Symantec Backup Exec Blueprints
  • 17. Example Diagram: Deduplication Backup Exec with Deduplication Option Symantec Backup Exec Blueprints 17 Deduplication Appliance Disk Based Storage Deduplication Engine Tape Library FILE SERVER VIRTIUAL SERVER APPLICATION SERVER DATABASE SERVER SAN DISK STORAGE LAN SAN Backup Exec Backup Exec Deduplication Option - High-level Best Practices  A Backup Exec server with a minimum of 4 cores (Symantec recommends 8 cores)  For 64 TB of stored deduplicated data, 8 cores are required  Minimum of 8 GB of available memory on Backup Exec server  At least of 1.5 GB of physical memory on each protected client for client side deduplication  Each protected client should have at least 1 dual core processor  Run Backup Exec deduplication assessment tool to analyze the available data and expected deduplication ratio DISK TO DISK TO TAPE
  • 19. Symantec Backup Exec Blueprints 19 Best Practices: Deduplication Do the following… • Deduplication Database Sizing – Roughly 6-8 GB of database size per 1 TB of stored deduplicated data. – Maintenance routines make a backup copy of the database – Additional space required for database backup copy – Use a dynamic volume that can grow as needed • Processor Utilization – At least 75% processor utilization for that processor core for the duration – Minimum: Backup Exec server should have at least one four cores processor; (for 64 TB of stored deduplicated data, 8 cores are required) – Recommended: 8 cores • Agent for VMware and Hyper-V – Image-level backups of VMware virtual machines require server deduplication
  • 20. Symantec Backup Exec Blueprints 20 Best Practices: Deduplication Do the following… • Physical Memory on Backup Exec Server – 8 GB of free physical system RAM for up to 5 TB of deduplicated data – For more than 5 TB of data, use the following: • 1.5 GB x N, where N = the number of TBs of deduplicated data to be stored • Physical Memory on Client – 1.5 GB of free physical memory on each client that uses client • Use Dedicated Logon Account for Deduplication Disk Device • Changing Backup Exec Logon Account Password – If you change Backup Exec logon account password, use the spauser.exe utility to update it
  • 21. Do not… 21Symantec Backup Exec Blueprints
  • 22. Symantec Backup Exec Blueprints 22 Best Practices: Deduplication Do not do the following… • RAID Caching – Do not enable RAID caching on disk hosting deduplication disk storage device • Verifying Backups – Verify with the duplication job • Client Deduplication – Do not use client deduplication if remote system has heavy processing load; use server-side deduplication • WAN Considerations – Do not use server deduplication with backups over WAN – Remote office protection without local storage should use client deduplication • You cannot create a deduplication storage folder in a storage path that contains double-byte characters
  • 23. Symantec Backup Exec Blueprints 23 Backup Exec Deduplication: Final Thoughts One solution for any environment • Reduce Data Backup Storage by 10:1 • Optimize network utilization • Deduplicate Across Physical and Virtual Backups • Comprehensive Support for Virtual and Physical Servers • Flexible Deduplication Options – Client deduplication – Server deduplication – Appliance deduplication • VMware VADP Integration • Cross-platform (Windows and Linux) Deduplication Support • Single License Unlocks All Deduplication Options
  • 24. Symantec Backup Exec Blueprints 24 Thank You! Backup Exec Product Management