SlideShare una empresa de Scribd logo
1 de 21
Enable Symantec Backup Exec ™  to store and retrieve backup data to Cloud storage using CloudArray ™  software For virtualized and physical server environments
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
Example Environment  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Backup Targets Tape and/or D2D Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center D2D Tape Host n SAN LAN Offsite Tape  Backup Storage Typical backup solution using  Backup Exec  VM and PS  Data backup VM and PS  Data restore (CIFS) VM=virtual machine, PS=physical server Backup Exec Backup target
Backup Targets Tape and/or D2D Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center D2D Tape Host n SAN LAN Offsite Tape  Backup Storage VM and PS  Data backup VM and PS  Data restore (CIFS) VM=virtual machine, PS=physical server Backup Exec Backup target ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Backup Targets Tape and/or D2D Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center D2D Tape Host n SAN LAN Offsite Tape  Backup Storage VM and PS  Data backup VM and PS  Data restore (CIFS) VM=virtual machine, PS=physical server Backup Exec Backup target ,[object Object],[object Object],[object Object]
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec Backup target Backup Target Storing backup data for recovery in the Cloud offers many benefits, but how do we inexpensively connect Backup Exec to a Cloud provider of our choice?
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec Backup target Backup Target … with CloudArray software!  CloudArray
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec Backup target TwinStrata.com CloudArray ESX CloudArray Virtual  Appliance CloudArray operates as a virtual appliance  It presents iSCSI volumes to physical and virtual servers Volumes are block-based and replicate data to cloud storage providers It’s local cache allows fast access to data
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec Backup target TwinStrata.com CloudArray ESX CloudArray Virtual  Appliance Provision CloudArray volume(s) using local storage as a cache or a full local copy
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec Backup target TwinStrata.com CloudArray ESX CloudArray Virtual  Appliance Cloud Storage  Providers WAN CloudArray volume(s) are mapped to your choice of Cloud storage service providers with pricing as low as $0.15/GB per month
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual  Appliance Cloud Storage  Providers WAN CloudArray Vol mapped To VCB Proxy Server Present CloudArray volume to Windows Proxy Server running Backup Exec.  Backup Target
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual  Appliance Cloud Storage  Providers WAN CloudArray Vol mapped To VCB Proxy Server Proxy Server installs NTFS on vol. and mounts drive Backup Target=  mapped CloudArray volume with NTFS
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual  Appliance Cloud Storage  Providers WAN CloudArray Vol mapped To VCB Proxy Server Backup Target=  mapped CloudArray volume with NTFS In Backup Exec config window, create backup-to-disk folder and point it to CloudArray volume on Proxy Server.
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual  Appliance Cloud Storage  Providers WAN CloudArray Vol mapped To VCB Proxy Server Backup Target [drive letter:] =  mapped CloudArray volume with NTFS From the Backup Exec window, add VMs and physical hosts to be backed up to the Backup Exec database by selecting it from the resources tab  Select destination folder in [drive letter:] where backup sources will reside Initiate backup
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual  Appliance Cloud Storage  Providers WAN CloudArray Vol mapped To VCB Proxy Server Backup Target [drive letter:] =  mapped CloudArray volume with NTFS The backup data set is written to CloudArray local cache
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual  Appliance Cloud Storage  Providers WAN CloudArray Vol mapped To VCB Proxy Server Backup Target [drive letter:] =  mapped CloudArray volume with NTFS The data set is asynchronously replicated to one or more Cloud storage providers of your choice Encryption,  Compression,
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual  Appliance Cloud Storage  Providers WAN CloudArray Vol mapped To VCB Proxy Server Backup Target [drive letter:] =  mapped CloudArray volume with NTFS A restore operation from Backup Exec  retrieves data from CloudArray local cache and Cloud storage provider(s)
CloudArray vs. Existing Backup & Replication Solutions: 5 TB Environment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3 yr-TCO for CloudArray vs. Existing  Backup and Replication Solutions
Feature / Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Eval of CloudArray is Available Now ,[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Colvin RMAN New Features
Colvin RMAN New FeaturesColvin RMAN New Features
Colvin RMAN New Features
Enkitec
 
Quick-and-Easy Deployment of a Ceph Storage Cluster with SLES
Quick-and-Easy Deployment of a Ceph Storage Cluster with SLESQuick-and-Easy Deployment of a Ceph Storage Cluster with SLES
Quick-and-Easy Deployment of a Ceph Storage Cluster with SLES
Jan Kalcic
 
Terror & Hysteria: Cost Effective Scaling of Time Series Data with Cassandra ...
Terror & Hysteria: Cost Effective Scaling of Time Series Data with Cassandra ...Terror & Hysteria: Cost Effective Scaling of Time Series Data with Cassandra ...
Terror & Hysteria: Cost Effective Scaling of Time Series Data with Cassandra ...
DataStax
 

La actualidad más candente (19)

RAIDZ on-disk format vs. small blocks
RAIDZ on-disk format vs. small blocksRAIDZ on-disk format vs. small blocks
RAIDZ on-disk format vs. small blocks
 
caching2012.pdf
caching2012.pdfcaching2012.pdf
caching2012.pdf
 
Colvin RMAN New Features
Colvin RMAN New FeaturesColvin RMAN New Features
Colvin RMAN New Features
 
Gruter TECHDAY 2014 Realtime Processing in Telco
Gruter TECHDAY 2014 Realtime Processing in TelcoGruter TECHDAY 2014 Realtime Processing in Telco
Gruter TECHDAY 2014 Realtime Processing in Telco
 
Ceph - High Performance Without High Costs
Ceph - High Performance Without High CostsCeph - High Performance Without High Costs
Ceph - High Performance Without High Costs
 
Aerospike DB and Storm for real-time analytics
Aerospike DB and Storm for real-time analyticsAerospike DB and Storm for real-time analytics
Aerospike DB and Storm for real-time analytics
 
Apache Con NA 2013 - Cassandra Internals
Apache Con NA 2013 - Cassandra InternalsApache Con NA 2013 - Cassandra Internals
Apache Con NA 2013 - Cassandra Internals
 
Performance Tuning
Performance TuningPerformance Tuning
Performance Tuning
 
Quick-and-Easy Deployment of a Ceph Storage Cluster with SLES
Quick-and-Easy Deployment of a Ceph Storage Cluster with SLESQuick-and-Easy Deployment of a Ceph Storage Cluster with SLES
Quick-and-Easy Deployment of a Ceph Storage Cluster with SLES
 
HBaseCon 2012 | Learning HBase Internals - Lars Hofhansl, Salesforce
HBaseCon 2012 | Learning HBase Internals - Lars Hofhansl, SalesforceHBaseCon 2012 | Learning HBase Internals - Lars Hofhansl, Salesforce
HBaseCon 2012 | Learning HBase Internals - Lars Hofhansl, Salesforce
 
Native erasure coding support inside hdfs presentation
Native erasure coding support inside hdfs presentationNative erasure coding support inside hdfs presentation
Native erasure coding support inside hdfs presentation
 
Your first ClickHouse data warehouse
Your first ClickHouse data warehouseYour first ClickHouse data warehouse
Your first ClickHouse data warehouse
 
Introduction to Apache Tajo: Data Warehouse for Big Data
Introduction to Apache Tajo: Data Warehouse for Big DataIntroduction to Apache Tajo: Data Warehouse for Big Data
Introduction to Apache Tajo: Data Warehouse for Big Data
 
ClickHouse Introduction by Alexander Zaitsev, Altinity CTO
ClickHouse Introduction by Alexander Zaitsev, Altinity CTOClickHouse Introduction by Alexander Zaitsev, Altinity CTO
ClickHouse Introduction by Alexander Zaitsev, Altinity CTO
 
Latest performance changes by Scylla - Project optimus / Nolimits
Latest performance changes by Scylla - Project optimus / Nolimits Latest performance changes by Scylla - Project optimus / Nolimits
Latest performance changes by Scylla - Project optimus / Nolimits
 
PostgreSQL Replication High Availability Methods
PostgreSQL Replication High Availability MethodsPostgreSQL Replication High Availability Methods
PostgreSQL Replication High Availability Methods
 
Aerospike & GCE (LSPE Talk)
Aerospike & GCE (LSPE Talk)Aerospike & GCE (LSPE Talk)
Aerospike & GCE (LSPE Talk)
 
Terror & Hysteria: Cost Effective Scaling of Time Series Data with Cassandra ...
Terror & Hysteria: Cost Effective Scaling of Time Series Data with Cassandra ...Terror & Hysteria: Cost Effective Scaling of Time Series Data with Cassandra ...
Terror & Hysteria: Cost Effective Scaling of Time Series Data with Cassandra ...
 
Build an High-Performance and High-Durable Block Storage Service Based on Ceph
Build an High-Performance and High-Durable Block Storage Service Based on CephBuild an High-Performance and High-Durable Block Storage Service Based on Ceph
Build an High-Performance and High-Durable Block Storage Service Based on Ceph
 

Similar a Enable Symantec Backup Exec™ to store and retrieve backup data to Cloud storage using CloudArray™ software

www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualization
webhostingguy
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualization
webhostingguy
 
PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMware
Devansh Chowdhary
 
Virtualize Your Disaster! Customer Use Cases & Scenarios
Virtualize Your Disaster! Customer Use Cases & ScenariosVirtualize Your Disaster! Customer Use Cases & Scenarios
Virtualize Your Disaster! Customer Use Cases & Scenarios
Emirates Computers
 

Similar a Enable Symantec Backup Exec™ to store and retrieve backup data to Cloud storage using CloudArray™ software (20)

Backup / Restore to Cloud Storage with Veeam and CloudArray software
Backup / Restore to Cloud Storage with Veeam and CloudArray softwareBackup / Restore to Cloud Storage with Veeam and CloudArray software
Backup / Restore to Cloud Storage with Veeam and CloudArray software
 
VMUG - Falconstor Presentation
VMUG - Falconstor PresentationVMUG - Falconstor Presentation
VMUG - Falconstor Presentation
 
Efficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environmentsEfficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environments
 
Double-Take Software
Double-Take SoftwareDouble-Take Software
Double-Take Software
 
Nakivo overview
Nakivo overviewNakivo overview
Nakivo overview
 
NICConf 2015 - azure disaster recovery in 60min
NICConf 2015 -  azure disaster recovery in 60minNICConf 2015 -  azure disaster recovery in 60min
NICConf 2015 - azure disaster recovery in 60min
 
10215 A 10
10215 A 1010215 A 10
10215 A 10
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualization
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualization
 
Expertslive azure site recovery
  Expertslive   azure site recovery  Expertslive   azure site recovery
Expertslive azure site recovery
 
Private Cloud Academy: Backup and DPM 2010
Private Cloud Academy: Backup and DPM 2010Private Cloud Academy: Backup and DPM 2010
Private Cloud Academy: Backup and DPM 2010
 
Azure Backup component matrix
Azure Backup component matrixAzure Backup component matrix
Azure Backup component matrix
 
PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMware
 
Guaranteeing Storage Performance by Mike Tutkowski
Guaranteeing Storage Performance by Mike TutkowskiGuaranteeing Storage Performance by Mike Tutkowski
Guaranteeing Storage Performance by Mike Tutkowski
 
Veeam Backup Essentials v9 Overview
Veeam Backup Essentials v9 OverviewVeeam Backup Essentials v9 Overview
Veeam Backup Essentials v9 Overview
 
Virtualize Your Disaster! Customer Use Cases & Scenarios
Virtualize Your Disaster! Customer Use Cases & ScenariosVirtualize Your Disaster! Customer Use Cases & Scenarios
Virtualize Your Disaster! Customer Use Cases & Scenarios
 
What’s New in Backup Exec 16 FP2 Solution Brief
What’s New in Backup Exec 16 FP2 Solution Brief  What’s New in Backup Exec 16 FP2 Solution Brief
What’s New in Backup Exec 16 FP2 Solution Brief
 
Best Practices for Backup and Recovery: Windows Workload on AWS
Best Practices for Backup and Recovery: Windows Workload on AWS Best Practices for Backup and Recovery: Windows Workload on AWS
Best Practices for Backup and Recovery: Windows Workload on AWS
 
Introducing CloudBacko cloud / local backup software
Introducing CloudBacko cloud / local backup softwareIntroducing CloudBacko cloud / local backup software
Introducing CloudBacko cloud / local backup software
 
Building Disaster Recovery as a Service:
Building Disaster Recovery as a Service:Building Disaster Recovery as a Service:
Building Disaster Recovery as a Service:
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Enable Symantec Backup Exec™ to store and retrieve backup data to Cloud storage using CloudArray™ software

  • 1. Enable Symantec Backup Exec ™ to store and retrieve backup data to Cloud storage using CloudArray ™ software For virtualized and physical server environments
  • 2.
  • 3.
  • 4. Backup Targets Tape and/or D2D Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center D2D Tape Host n SAN LAN Offsite Tape Backup Storage Typical backup solution using Backup Exec VM and PS Data backup VM and PS Data restore (CIFS) VM=virtual machine, PS=physical server Backup Exec Backup target
  • 5.
  • 6.
  • 7. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec Backup target Backup Target Storing backup data for recovery in the Cloud offers many benefits, but how do we inexpensively connect Backup Exec to a Cloud provider of our choice?
  • 8. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec Backup target Backup Target … with CloudArray software! CloudArray
  • 9. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec Backup target TwinStrata.com CloudArray ESX CloudArray Virtual Appliance CloudArray operates as a virtual appliance It presents iSCSI volumes to physical and virtual servers Volumes are block-based and replicate data to cloud storage providers It’s local cache allows fast access to data
  • 10. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec Backup target TwinStrata.com CloudArray ESX CloudArray Virtual Appliance Provision CloudArray volume(s) using local storage as a cache or a full local copy
  • 11. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec Backup target TwinStrata.com CloudArray ESX CloudArray Virtual Appliance Cloud Storage Providers WAN CloudArray volume(s) are mapped to your choice of Cloud storage service providers with pricing as low as $0.15/GB per month
  • 12. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual Appliance Cloud Storage Providers WAN CloudArray Vol mapped To VCB Proxy Server Present CloudArray volume to Windows Proxy Server running Backup Exec. Backup Target
  • 13. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual Appliance Cloud Storage Providers WAN CloudArray Vol mapped To VCB Proxy Server Proxy Server installs NTFS on vol. and mounts drive Backup Target= mapped CloudArray volume with NTFS
  • 14. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual Appliance Cloud Storage Providers WAN CloudArray Vol mapped To VCB Proxy Server Backup Target= mapped CloudArray volume with NTFS In Backup Exec config window, create backup-to-disk folder and point it to CloudArray volume on Proxy Server.
  • 15. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual Appliance Cloud Storage Providers WAN CloudArray Vol mapped To VCB Proxy Server Backup Target [drive letter:] = mapped CloudArray volume with NTFS From the Backup Exec window, add VMs and physical hosts to be backed up to the Backup Exec database by selecting it from the resources tab Select destination folder in [drive letter:] where backup sources will reside Initiate backup
  • 16. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual Appliance Cloud Storage Providers WAN CloudArray Vol mapped To VCB Proxy Server Backup Target [drive letter:] = mapped CloudArray volume with NTFS The backup data set is written to CloudArray local cache
  • 17. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual Appliance Cloud Storage Providers WAN CloudArray Vol mapped To VCB Proxy Server Backup Target [drive letter:] = mapped CloudArray volume with NTFS The data set is asynchronously replicated to one or more Cloud storage providers of your choice Encryption, Compression,
  • 18. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual Appliance Cloud Storage Providers WAN CloudArray Vol mapped To VCB Proxy Server Backup Target [drive letter:] = mapped CloudArray volume with NTFS A restore operation from Backup Exec retrieves data from CloudArray local cache and Cloud storage provider(s)
  • 19.
  • 20.
  • 21.

Notas del editor

  1. In-house vs web 2.0 apps
  2. In-house vs web 2.0 apps
  3. In-house vs web 2.0 apps
  4. In-house vs web 2.0 apps
  5. In-house vs web 2.0 apps
  6. In-house vs web 2.0 apps
  7. In-house vs web 2.0 apps
  8. In-house vs web 2.0 apps
  9. In-house vs web 2.0 apps
  10. In-house vs web 2.0 apps
  11. In-house vs web 2.0 apps
  12. In-house vs web 2.0 apps
  13. In-house vs web 2.0 apps
  14. In-house vs web 2.0 apps
  15. In-house vs web 2.0 apps