SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
Symantec Backup and Recovery Technical Brief
NDMP Backups with Symantec Backup Exec 2014
The Symantec Backup and Recovery Product Family
The Symantec Backup and Recovery product family offers market-leading backup and disaster recovery
solutions for critical customer IT resources. This includes Symantec Backup Exec and Symantec NetBackup,
leading solutions for enterprise, mid-market and small business customers.
Introduction and overview
The network data management protocol (NDMP) is an industry-standard programming interface that provides
best practice backup and recovery for NAS systems. An NDMP-approach enables a backup server to
communicate directly with a NAS filer and to transmit data to the specified backup storage device. NDMP
eliminates the need for backup vendors to write device-specific code for NAS devices to facilitate backup.
The Challenge of Protecting NDMP Filers
NDMP Filers, or NAS devices, reside on the network with the primary purpose of providing file services. NAS
devices that use standard operating systems (for example, Windows-powered NAS devices) support the
installation of backup agents, and can therefore be backed up like any other file server. However, some NAS
devices use a custom operating system that does not support third party backup agents. A standard backup
interface for NAS devices exists in the form of the network data management protocol (NDMP), which is a
backup standard for NAS devices that do not support installation of a backup agent.
Many customers are confronting the confusing number of options and configurations when it comes to backing up and restoring their network
attached storage (NAS) servers. Most NAS vendors and data protection providers (such as Symantec) have multiple options for protecting your NAS
environment. This technical brief will help you make sense of the options available to you for NAS backup and restore in Backup Exec.
Backup Exec and NDMP
Backup Exec provides a comprehensive data protection solution that supports a wide range of platforms and applications found in today’s data
centers. It includes centralized administration and reporting, media management, automated backups, and restores.
The Backup Exec NDMP option extends the capabilities of Backup Exec to include native backup and restore of NAS appliances. Supported versions of
software for these vendors’ NAS appliances are listed on the Backup Exec Hardware Compatibility List (HCL). This allows you to create backups of
data on an NAS without interrupting client access to the data. Backup Exec incorporates the protection of NDMP-enabled NAS into a single solution
by enabling tape/VTL library sharing, drive sharing, direct access recovery, and auto configuration.
The following is an overview of the feature set provided by the NDMP option in Backup Exec:
Feature Description Benefit
Multiple Backup/Restore
Methods
Provides full and varying levels of incremental backups: Backup
at the directory level and restore at the file level.
Flexible methods ensure that backups occur
during the backup window and reduce tape
and disk resources.
Backup/Restore Access
Control Lists
Allows backup of the access control lists during the backup,
which contain the users’ or groups’ access rights to each share.
Ensures that security rights can be retained
during a restore.
Verify Backup/Restore
Allows Backup Exec to verify the integrity of the data without
actually restoring the data.
Helps ensure that your NDMP data is truly
protected and recoverable.
Direct Access Restore
Uses Direct Access Restore (DAR) during the restore job. With
DAR-enabled recovery, Backup Exec can specify the exact
location of a file in a backup data stream. This allows the
NDMP server to read the data applicable to the file being
restored.
Significantly reduces the recovery time by
decreasing the amount of information that is
processed.
File History Control
Prevents the generation of file history data; backup times are
not unnecessarily increased.
By enabling file history, recovery is optimized for selected
subsets of data in the backup image. If the file history is
unavailable and you must later restore data, you can restore
the entire backup image.
Improve backup time
Improve granular recovery of files
Key Benefits
• Flexible methods of backup
and restore
• Significantly reduces recovery
time with Direct Access
Restore
• Reduced backup management
• Greatly expanded NDMP
device support over the
previous of Backup Exec
• Automated NDMP filer data
duplication to tape
• Support for NDMP device that
greatly expands the number of
disk targets that can be
selected for disk-based data
protection
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
Symantec Backup and Recovery Technical Brief
NDMP Backups with Symantec Backup Exec 2014
How it works
The Network Data Management Protocol is a standardized protocol for controlling backup and recovery data between primary and secondary
storage devices such as filers and tape libraries. By enabling NDMP protocol support on a NetApp Filer, the filer can carry out communications with
NDMP-enabled backup applications (data management applications, or DMAs) such as Backup Exec 2014.
NDMP backup architecture
NDMP architecture consists of three entities:
Data management application (DMA) Backup Exec 2014 in our case is the DMA, which controls the NDMP session
NDMP data server Transfers data between primary storage (e.g. disks) and the data connection
NDMP tape server Transfers data between secondary storage (e.g. tape) and the data connection
The Backup Exec 2014 NDMP Option supports the following NDMP backup topologies: A tape device directly attached to a NAS device (direct-
attached), a tape device directly attached to another NAS device of the same brand (NAS device-to-NAS device), and a tape device attached to a
backup server (NAS device-to-server).
Direct NDMP (tape device directly attached to a NAS device)
Direct NDMP backup is identical in practice to local NDMP backup, but differs in the implementation with sharing of SAN tape drives in a library with
a Backup Exec server. With the Enterprise Server Option Shared Storage Option (SSO), Backup Exec can share tape resources between the media
servers and NAS. This requires the NDMP host to be SAN-attached and zoned to see the tape library. The Backup Exec server controls access to the
tape device.
Figure 1: NDMP – Direct Attached
Remote NDMP
Remote NDMP backup incorporates the same tape device support as direct backup, but sends the data stream over the network and through a
Backup Exec server. This can provide a few advantages; one such notable feature is support for writing backup data to disk with the introduction of
Backup Exec. This can also result in some disadvantages, such as slower network transfer speeds.
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
Symantec Backup and Recovery Technical Brief
NDMP Backups with Symantec Backup Exec 2014
Figure 2: Remote NDMP
3-Way NDMP (Filer-to-filer-to-tape backup topology)
In a three-way backup or restore, data is sent from an NDMP host over a LAN to a storage device that is attached to another NDMP host. This backup
contrasts with local NDMP backup or restore where the data is sent directly to a storage device attached to the NDMP host.
An additional option for protecting NAS devices is to utilize file sharing protocols such as CIFS or NFS and “walking” the file system to back it up.
While this may be an effective architecture for smaller NAS environments, it typically is not appropriate for most enterprise-class NAS devices and
therefore is not discussed in this document.
Note: Backup Exec requires that both the participating NDMP servers must be from the same vendor.
Figure 3: 3-way NDMP
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
Symantec Backup and Recovery Technical Brief
NDMP Backups with Symantec Backup Exec 2014
System Requirements
To use the NDMP Option, the Backup Exec server must have the following items installed:
• Backup Exec must be installed on a server running Windows Server 2003 R2/2008/ 2008 R2/2012/2012 R2 operating systems.
• The network-attached storage NDMP server must run version 4 of the Network Data Management Protocol.
• The NDMP server has the Network Data Management Protocol enabled.
• You can find a list of compatible types of storage at the following URL:
http://www.symantec.com/business/support/library/BUSINESS/xCL/TECH214803/be_2014_hcl.html#ndmp_platforms
Note: The NDMP Option is installed locally on the Backup Exec server as a separate add-on component of Backup Exec. No files are
copied to the NDMP server.
Supported NDMP Platforms
The NDMP platform support information is listed below. This information is organized by vendor manufacturer/model(s). Refer to the Backup Exec
2014 Hardware Compatibility List for minimum software required method of connection, and any other important notes or information relevant to
the hardware and its compatibility.
Figure 4: Supported NDMP Platforms
Summary
Backup Exec 2014 protection for NDMP Filers is designed to be flexible and easy-to-use. With Backup Exec NDMP Option, NDMP Filer data can be
protected for immediate recovery or long-term storage. IT Administrators can leverage their investment in Backup Exec to protect NetApp Filers,
centralizing management and reducing overall administration costs. The NDMP Option not only helps ensure the quality of backups, but it
significantly reduces backup and recovery time with its Direct Access Restore and:
• Supports the backup and restore of NDMP NAS servers including NDMP NetApp, EMC Celerra, IBM N-Series storage configurations with
tape devices attached.
• Protection for NDMP devices residing in remote locations including in a Storage Area Network (SAN) configurations.
• Automated NDMP filer data duplication to tape.
• Overall support for NDMP devices that greatly expands the number of disk targets that can be selected for disk-based data protection.
By combining NDMP platform with Backup Exec, businesses will have confidence that their critical data is harnessing the gold standard in Windows
data recovery.
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
Symantec Backup and Recovery Technical Brief
NDMP Backups with Symantec Backup Exec 2014
For More Information
Link Description
www.backupexec.com BE Home Page
http://ww.ndmp.org NDMP Standards Organization
www.backupexec.com/knowledge Backup Exec Knowledge Base
https://partnernet.symantec.com/Partnercontent/Login.jsp PartnerNet
www.symantec.com/business/products/datasheets.jsp?pcid=2244&pvid=57_1 BE Datasheets, Feature Briefs
www.symantec.com/training Backup Exec training courses
www.backupexec.com/compatibility Compatibility Docs
www.backupexec.com/support Backup Exec support website
www.backupexec.com/trybe 60-day trialware for Backup Exec
To speak with a Product Specialist in the U.S.
Call toll-free 1 (800) 745 6054
To speak with a Product Specialist outside the U.S.
For specific country offices and contact numbers, please visit our website.
About Symantec
Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses, and governments seeking the freedom
to unlock the opportunities technology brings—anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company operating one of the
largest global data-intelligence networks, has provided leading security, backup, and availability solutions for where vital information is stored,
accessed, and shared. The company’s more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500
companies are Symantec customers. In fiscal 2013, it recorded revenues of $6.9 billion. To learn more go to www.symantec.com or connect with
Symantec at: go.symantec.com/socialmedia.
Symantec World Headquarters
350 Ellis St.
Mountain View, CA 94043 USA
+1 (650) 527 8000
1 (800) 721 3934
www.symantec.com

Más contenido relacionado

La actualidad más candente

Presentation data domain advanced features and functions
Presentation   data domain advanced features and functionsPresentation   data domain advanced features and functions
Presentation data domain advanced features and functionsxKinAnx
 
Data Domain Architecture
Data Domain ArchitectureData Domain Architecture
Data Domain Architecturekoesteruk22
 
03 backup-and-recovery
03 backup-and-recovery03 backup-and-recovery
03 backup-and-recoveryhunny garg
 
Backup policy template julie bozzi oregon
Backup policy template   julie bozzi oregonBackup policy template   julie bozzi oregon
Backup policy template julie bozzi oregonJulie Bozzi, PfPM, PMP
 
Omniback for the system administrator
Omniback for the system administratorOmniback for the system administrator
Omniback for the system administratorLaxman J
 
Oaklands college: Protecting your data.
Oaklands college: Protecting your data.Oaklands college: Protecting your data.
Oaklands college: Protecting your data.JISC RSC Eastern
 
Backup And Recovery
Backup And RecoveryBackup And Recovery
Backup And RecoveryWynthorpe
 
Data backup and disaster recovery
Data backup and disaster recoveryData backup and disaster recovery
Data backup and disaster recoverycatacutanjcsantos
 
VDI storage and storage virtualization
VDI storage and storage virtualizationVDI storage and storage virtualization
VDI storage and storage virtualizationSisimon Soman
 
Emc data domain® boost integration guide
Emc data domain® boost integration guideEmc data domain® boost integration guide
Emc data domain® boost integration guideArvind Varade
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesSpiceworks
 
Performance Tuning
Performance TuningPerformance Tuning
Performance TuningJannet Peetz
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyTehmina Gulfam
 
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recoverydhawal mehta
 
White Paper: EMC VNXe File Deduplication and Compression
White Paper: EMC VNXe File Deduplication and Compression   White Paper: EMC VNXe File Deduplication and Compression
White Paper: EMC VNXe File Deduplication and Compression EMC
 
Database Administration & Management - 01
Database Administration & Management - 01Database Administration & Management - 01
Database Administration & Management - 01FaisalMashood
 

La actualidad más candente (20)

Presentation data domain advanced features and functions
Presentation   data domain advanced features and functionsPresentation   data domain advanced features and functions
Presentation data domain advanced features and functions
 
Data Domain Architecture
Data Domain ArchitectureData Domain Architecture
Data Domain Architecture
 
03 backup-and-recovery
03 backup-and-recovery03 backup-and-recovery
03 backup-and-recovery
 
Backup policy template julie bozzi oregon
Backup policy template   julie bozzi oregonBackup policy template   julie bozzi oregon
Backup policy template julie bozzi oregon
 
Omniback for the system administrator
Omniback for the system administratorOmniback for the system administrator
Omniback for the system administrator
 
Oaklands college: Protecting your data.
Oaklands college: Protecting your data.Oaklands college: Protecting your data.
Oaklands college: Protecting your data.
 
Select enterprise backup software
Select enterprise backup softwareSelect enterprise backup software
Select enterprise backup software
 
Backup And Recovery
Backup And RecoveryBackup And Recovery
Backup And Recovery
 
Data backup and disaster recovery
Data backup and disaster recoveryData backup and disaster recovery
Data backup and disaster recovery
 
VDI storage and storage virtualization
VDI storage and storage virtualizationVDI storage and storage virtualization
VDI storage and storage virtualization
 
Emc data domain® boost integration guide
Emc data domain® boost integration guideEmc data domain® boost integration guide
Emc data domain® boost integration guide
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
Backup strategy
Backup strategyBackup strategy
Backup strategy
 
Performance Tuning
Performance TuningPerformance Tuning
Performance Tuning
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
 
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recovery
 
Data Recovery
Data RecoveryData Recovery
Data Recovery
 
White Paper: EMC VNXe File Deduplication and Compression
White Paper: EMC VNXe File Deduplication and Compression   White Paper: EMC VNXe File Deduplication and Compression
White Paper: EMC VNXe File Deduplication and Compression
 
Network data storage
Network data storageNetwork data storage
Network data storage
 
Database Administration & Management - 01
Database Administration & Management - 01Database Administration & Management - 01
Database Administration & Management - 01
 

Destacado

Avamar weekly webcast
Avamar weekly webcastAvamar weekly webcast
Avamar weekly webcaststefriche0199
 
Storage Devices And Backup Media
Storage Devices And Backup MediaStorage Devices And Backup Media
Storage Devices And Backup MediaTyrone Turner
 
SCSI Protocol
SCSI ProtocolSCSI Protocol
SCSI ProtocolRakesh T
 
Using VMware Infrastructure for Backup and Restore
Using VMware Infrastructure for Backup and RestoreUsing VMware Infrastructure for Backup and Restore
Using VMware Infrastructure for Backup and Restorewebhostingguy
 
Understanding das-nas-san
Understanding das-nas-sanUnderstanding das-nas-san
Understanding das-nas-sanAshwin Pawar
 
Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)
Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)
Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)Raid Data Recovery
 

Destacado (6)

Avamar weekly webcast
Avamar weekly webcastAvamar weekly webcast
Avamar weekly webcast
 
Storage Devices And Backup Media
Storage Devices And Backup MediaStorage Devices And Backup Media
Storage Devices And Backup Media
 
SCSI Protocol
SCSI ProtocolSCSI Protocol
SCSI Protocol
 
Using VMware Infrastructure for Backup and Restore
Using VMware Infrastructure for Backup and RestoreUsing VMware Infrastructure for Backup and Restore
Using VMware Infrastructure for Backup and Restore
 
Understanding das-nas-san
Understanding das-nas-sanUnderstanding das-nas-san
Understanding das-nas-san
 
Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)
Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)
Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)
 

Similar a TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014

Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperSymantec
 
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMPEMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMPEMC
 
Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?EMC
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - NotesKranthi
 
Net App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution SheetNet App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution SheetMichael Hudak
 
Datasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media serverDatasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media serverFernando Alves
 
Fundamentals of storage Unit III Backup and Recovery.ppt
Fundamentals of storage Unit III Backup and Recovery.pptFundamentals of storage Unit III Backup and Recovery.ppt
Fundamentals of storage Unit III Backup and Recovery.pptRahul Borate
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backupsDell World
 
Corporate Laptop Backup and Recovery
Corporate Laptop Backup and RecoveryCorporate Laptop Backup and Recovery
Corporate Laptop Backup and RecoveryJaspreet Singh
 
NetBackup Appliance Family presentation
NetBackup Appliance Family presentationNetBackup Appliance Family presentation
NetBackup Appliance Family presentationSymantec
 
Netbackup advantages features and benefits Netbackup classes may help hands o...
Netbackup advantages features and benefits Netbackup classes may help hands o...Netbackup advantages features and benefits Netbackup classes may help hands o...
Netbackup advantages features and benefits Netbackup classes may help hands o...Vidhyalive
 
Streamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup AppliancesStreamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup AppliancesMaryJWilliams2
 
TECHNICAL WHITE PAPER▶NetBackup 5330 Resiliency/High Availability Attributes
TECHNICAL WHITE PAPER▶NetBackup 5330 Resiliency/High Availability AttributesTECHNICAL WHITE PAPER▶NetBackup 5330 Resiliency/High Availability Attributes
TECHNICAL WHITE PAPER▶NetBackup 5330 Resiliency/High Availability AttributesSymantec
 
Joe Graziano – Challenge 2 Design Solution - Syncsort dpx 411
Joe Graziano – Challenge 2 Design Solution  - Syncsort dpx 411Joe Graziano – Challenge 2 Design Solution  - Syncsort dpx 411
Joe Graziano – Challenge 2 Design Solution - Syncsort dpx 411tovmug
 
[NetApp] Simplified HA:DR Using Storage Solutions
[NetApp] Simplified HA:DR Using Storage Solutions[NetApp] Simplified HA:DR Using Storage Solutions
[NetApp] Simplified HA:DR Using Storage SolutionsPerforce
 

Similar a TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014 (20)

Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paper
 
AMANDA
AMANDAAMANDA
AMANDA
 
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMPEMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
 
Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?
 
Backup Exec 21
Backup Exec 21Backup Exec 21
Backup Exec 21
 
Emc World Keynote Slootman
Emc World Keynote SlootmanEmc World Keynote Slootman
Emc World Keynote Slootman
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Net App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution SheetNet App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution Sheet
 
Datasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media serverDatasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media server
 
Fundamentals of storage Unit III Backup and Recovery.ppt
Fundamentals of storage Unit III Backup and Recovery.pptFundamentals of storage Unit III Backup and Recovery.ppt
Fundamentals of storage Unit III Backup and Recovery.ppt
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
Corporate Laptop Backup and Recovery
Corporate Laptop Backup and RecoveryCorporate Laptop Backup and Recovery
Corporate Laptop Backup and Recovery
 
NetBackup Appliance Family presentation
NetBackup Appliance Family presentationNetBackup Appliance Family presentation
NetBackup Appliance Family presentation
 
Netbackup advantages features and benefits Netbackup classes may help hands o...
Netbackup advantages features and benefits Netbackup classes may help hands o...Netbackup advantages features and benefits Netbackup classes may help hands o...
Netbackup advantages features and benefits Netbackup classes may help hands o...
 
Streamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup AppliancesStreamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup Appliances
 
TECHNICAL WHITE PAPER▶NetBackup 5330 Resiliency/High Availability Attributes
TECHNICAL WHITE PAPER▶NetBackup 5330 Resiliency/High Availability AttributesTECHNICAL WHITE PAPER▶NetBackup 5330 Resiliency/High Availability Attributes
TECHNICAL WHITE PAPER▶NetBackup 5330 Resiliency/High Availability Attributes
 
ds-2972
ds-2972ds-2972
ds-2972
 
Generic RLM White Paper
Generic RLM White PaperGeneric RLM White Paper
Generic RLM White Paper
 
Joe Graziano – Challenge 2 Design Solution - Syncsort dpx 411
Joe Graziano – Challenge 2 Design Solution  - Syncsort dpx 411Joe Graziano – Challenge 2 Design Solution  - Syncsort dpx 411
Joe Graziano – Challenge 2 Design Solution - Syncsort dpx 411
 
[NetApp] Simplified HA:DR Using Storage Solutions
[NetApp] Simplified HA:DR Using Storage Solutions[NetApp] Simplified HA:DR Using Storage Solutions
[NetApp] Simplified HA:DR Using Storage Solutions
 

Más de Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Más de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Último

%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...masabamasaba
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in sowetomasabamasaba
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...chiefasafspells
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Bert Jan Schrijver
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...masabamasaba
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024VictoriaMetrics
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxAnnaArtyushina1
 

Último (20)

%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 

TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014

  • 1. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 Symantec Backup and Recovery Technical Brief NDMP Backups with Symantec Backup Exec 2014 The Symantec Backup and Recovery Product Family The Symantec Backup and Recovery product family offers market-leading backup and disaster recovery solutions for critical customer IT resources. This includes Symantec Backup Exec and Symantec NetBackup, leading solutions for enterprise, mid-market and small business customers. Introduction and overview The network data management protocol (NDMP) is an industry-standard programming interface that provides best practice backup and recovery for NAS systems. An NDMP-approach enables a backup server to communicate directly with a NAS filer and to transmit data to the specified backup storage device. NDMP eliminates the need for backup vendors to write device-specific code for NAS devices to facilitate backup. The Challenge of Protecting NDMP Filers NDMP Filers, or NAS devices, reside on the network with the primary purpose of providing file services. NAS devices that use standard operating systems (for example, Windows-powered NAS devices) support the installation of backup agents, and can therefore be backed up like any other file server. However, some NAS devices use a custom operating system that does not support third party backup agents. A standard backup interface for NAS devices exists in the form of the network data management protocol (NDMP), which is a backup standard for NAS devices that do not support installation of a backup agent. Many customers are confronting the confusing number of options and configurations when it comes to backing up and restoring their network attached storage (NAS) servers. Most NAS vendors and data protection providers (such as Symantec) have multiple options for protecting your NAS environment. This technical brief will help you make sense of the options available to you for NAS backup and restore in Backup Exec. Backup Exec and NDMP Backup Exec provides a comprehensive data protection solution that supports a wide range of platforms and applications found in today’s data centers. It includes centralized administration and reporting, media management, automated backups, and restores. The Backup Exec NDMP option extends the capabilities of Backup Exec to include native backup and restore of NAS appliances. Supported versions of software for these vendors’ NAS appliances are listed on the Backup Exec Hardware Compatibility List (HCL). This allows you to create backups of data on an NAS without interrupting client access to the data. Backup Exec incorporates the protection of NDMP-enabled NAS into a single solution by enabling tape/VTL library sharing, drive sharing, direct access recovery, and auto configuration. The following is an overview of the feature set provided by the NDMP option in Backup Exec: Feature Description Benefit Multiple Backup/Restore Methods Provides full and varying levels of incremental backups: Backup at the directory level and restore at the file level. Flexible methods ensure that backups occur during the backup window and reduce tape and disk resources. Backup/Restore Access Control Lists Allows backup of the access control lists during the backup, which contain the users’ or groups’ access rights to each share. Ensures that security rights can be retained during a restore. Verify Backup/Restore Allows Backup Exec to verify the integrity of the data without actually restoring the data. Helps ensure that your NDMP data is truly protected and recoverable. Direct Access Restore Uses Direct Access Restore (DAR) during the restore job. With DAR-enabled recovery, Backup Exec can specify the exact location of a file in a backup data stream. This allows the NDMP server to read the data applicable to the file being restored. Significantly reduces the recovery time by decreasing the amount of information that is processed. File History Control Prevents the generation of file history data; backup times are not unnecessarily increased. By enabling file history, recovery is optimized for selected subsets of data in the backup image. If the file history is unavailable and you must later restore data, you can restore the entire backup image. Improve backup time Improve granular recovery of files Key Benefits • Flexible methods of backup and restore • Significantly reduces recovery time with Direct Access Restore • Reduced backup management • Greatly expanded NDMP device support over the previous of Backup Exec • Automated NDMP filer data duplication to tape • Support for NDMP device that greatly expands the number of disk targets that can be selected for disk-based data protection
  • 2. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 Symantec Backup and Recovery Technical Brief NDMP Backups with Symantec Backup Exec 2014 How it works The Network Data Management Protocol is a standardized protocol for controlling backup and recovery data between primary and secondary storage devices such as filers and tape libraries. By enabling NDMP protocol support on a NetApp Filer, the filer can carry out communications with NDMP-enabled backup applications (data management applications, or DMAs) such as Backup Exec 2014. NDMP backup architecture NDMP architecture consists of three entities: Data management application (DMA) Backup Exec 2014 in our case is the DMA, which controls the NDMP session NDMP data server Transfers data between primary storage (e.g. disks) and the data connection NDMP tape server Transfers data between secondary storage (e.g. tape) and the data connection The Backup Exec 2014 NDMP Option supports the following NDMP backup topologies: A tape device directly attached to a NAS device (direct- attached), a tape device directly attached to another NAS device of the same brand (NAS device-to-NAS device), and a tape device attached to a backup server (NAS device-to-server). Direct NDMP (tape device directly attached to a NAS device) Direct NDMP backup is identical in practice to local NDMP backup, but differs in the implementation with sharing of SAN tape drives in a library with a Backup Exec server. With the Enterprise Server Option Shared Storage Option (SSO), Backup Exec can share tape resources between the media servers and NAS. This requires the NDMP host to be SAN-attached and zoned to see the tape library. The Backup Exec server controls access to the tape device. Figure 1: NDMP – Direct Attached Remote NDMP Remote NDMP backup incorporates the same tape device support as direct backup, but sends the data stream over the network and through a Backup Exec server. This can provide a few advantages; one such notable feature is support for writing backup data to disk with the introduction of Backup Exec. This can also result in some disadvantages, such as slower network transfer speeds.
  • 3. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 Symantec Backup and Recovery Technical Brief NDMP Backups with Symantec Backup Exec 2014 Figure 2: Remote NDMP 3-Way NDMP (Filer-to-filer-to-tape backup topology) In a three-way backup or restore, data is sent from an NDMP host over a LAN to a storage device that is attached to another NDMP host. This backup contrasts with local NDMP backup or restore where the data is sent directly to a storage device attached to the NDMP host. An additional option for protecting NAS devices is to utilize file sharing protocols such as CIFS or NFS and “walking” the file system to back it up. While this may be an effective architecture for smaller NAS environments, it typically is not appropriate for most enterprise-class NAS devices and therefore is not discussed in this document. Note: Backup Exec requires that both the participating NDMP servers must be from the same vendor. Figure 3: 3-way NDMP
  • 4. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 Symantec Backup and Recovery Technical Brief NDMP Backups with Symantec Backup Exec 2014 System Requirements To use the NDMP Option, the Backup Exec server must have the following items installed: • Backup Exec must be installed on a server running Windows Server 2003 R2/2008/ 2008 R2/2012/2012 R2 operating systems. • The network-attached storage NDMP server must run version 4 of the Network Data Management Protocol. • The NDMP server has the Network Data Management Protocol enabled. • You can find a list of compatible types of storage at the following URL: http://www.symantec.com/business/support/library/BUSINESS/xCL/TECH214803/be_2014_hcl.html#ndmp_platforms Note: The NDMP Option is installed locally on the Backup Exec server as a separate add-on component of Backup Exec. No files are copied to the NDMP server. Supported NDMP Platforms The NDMP platform support information is listed below. This information is organized by vendor manufacturer/model(s). Refer to the Backup Exec 2014 Hardware Compatibility List for minimum software required method of connection, and any other important notes or information relevant to the hardware and its compatibility. Figure 4: Supported NDMP Platforms Summary Backup Exec 2014 protection for NDMP Filers is designed to be flexible and easy-to-use. With Backup Exec NDMP Option, NDMP Filer data can be protected for immediate recovery or long-term storage. IT Administrators can leverage their investment in Backup Exec to protect NetApp Filers, centralizing management and reducing overall administration costs. The NDMP Option not only helps ensure the quality of backups, but it significantly reduces backup and recovery time with its Direct Access Restore and: • Supports the backup and restore of NDMP NAS servers including NDMP NetApp, EMC Celerra, IBM N-Series storage configurations with tape devices attached. • Protection for NDMP devices residing in remote locations including in a Storage Area Network (SAN) configurations. • Automated NDMP filer data duplication to tape. • Overall support for NDMP devices that greatly expands the number of disk targets that can be selected for disk-based data protection. By combining NDMP platform with Backup Exec, businesses will have confidence that their critical data is harnessing the gold standard in Windows data recovery.
  • 5. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 Symantec Backup and Recovery Technical Brief NDMP Backups with Symantec Backup Exec 2014 For More Information Link Description www.backupexec.com BE Home Page http://ww.ndmp.org NDMP Standards Organization www.backupexec.com/knowledge Backup Exec Knowledge Base https://partnernet.symantec.com/Partnercontent/Login.jsp PartnerNet www.symantec.com/business/products/datasheets.jsp?pcid=2244&pvid=57_1 BE Datasheets, Feature Briefs www.symantec.com/training Backup Exec training courses www.backupexec.com/compatibility Compatibility Docs www.backupexec.com/support Backup Exec support website www.backupexec.com/trybe 60-day trialware for Backup Exec To speak with a Product Specialist in the U.S. Call toll-free 1 (800) 745 6054 To speak with a Product Specialist outside the U.S. For specific country offices and contact numbers, please visit our website. About Symantec Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses, and governments seeking the freedom to unlock the opportunities technology brings—anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company operating one of the largest global data-intelligence networks, has provided leading security, backup, and availability solutions for where vital information is stored, accessed, and shared. The company’s more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2013, it recorded revenues of $6.9 billion. To learn more go to www.symantec.com or connect with Symantec at: go.symantec.com/socialmedia. Symantec World Headquarters 350 Ellis St. Mountain View, CA 94043 USA +1 (650) 527 8000 1 (800) 721 3934 www.symantec.com