be fundamental and comparison guide

57
The Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio Backup Exec 2012 Fundamental Guide Who should read this paper Who should read this paper Anyone who needs a quick reference to the capabilities of Backup Exec 2012 from sales managers to consultants and technical pre-sales managers. This publication is designed to offer readers an overview of Backup Exec 2012 and Symantec System Recovery 2011. PARTNER BRIEF: FUNDAMENTAL GUIDE – BACKUP EXEC 2012 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SYMANTEC PROPRIETARY/CONFIDENTIAL—INTERNAL & PARTNERS UNDER NDA USE ONLY. This document contains confidential and privileged information. It is intended for use by Symantec Partners to help evaluate Symantec solutions provided such Partners have signed an agreement with the appropriate confidentiality provisions.

Upload: sai-kumar

Post on 24-Oct-2015

49 views

Category:

Documents


2 download

DESCRIPTION

Backup Exec Guide

TRANSCRIPT

Page 1: BE Fundamental and Comparison Guide

The Fundamental Guide to Symantec Backup Exec and System Recovery Data ProtectionPortfolio

Backup Exec 2012 Fundamental GuideWho should read this paperWho should read this paper

Anyone who needs a quick reference to the capabilities of Backup Exec2012 from sales managers to consultants and technical pre-salesmanagers. This publication is designed to offer readers an overview ofBackup Exec 2012 and Symantec System Recovery 2011.

PAR

TNER

BR

IEF:FU

ND

AM

ENTA

L GU

IDE – B

ACKU

P EXEC 2012

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

SYMANTEC PROPRIETARY/CONFIDENTIAL—INTERNAL & PARTNERS UNDER NDA USE ONLY.This document contains confidential and privileged information. It is intended for use by SymantecPartners to help evaluate Symantec solutions provided such Partners have signed an agreementwith the appropriate confidentiality provisions.

Page 2: BE Fundamental and Comparison Guide
Page 3: BE Fundamental and Comparison Guide

Content

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Data Protection and Archiving - Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

BE 2012 Agents and Options - Quick View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

Backup Exec 2012 Core Products. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

Backup Exec 2012 Core Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

Agents for Virtual Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Backup Exec 2012 Agent for Applications and Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

Backup Exec 2012 Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

Disaster Recovery Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

Virtual Infrastructure Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Storage Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Application Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

Disaster Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

For more information visit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

Glossary of some Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

Page 4: BE Fundamental and Comparison Guide

Introduction

This paper is aimed at all Professionals who work with Symantec Backup Exec and Symantec System Recovery who can leverage this guide to

improve general knowledge of Symantec’s Data Protection strategy and wider Information Management capabilities. Professionals can use

this document to build availability solutions and data protection strategies – based upon Backup Exec – for all types of organizations.

The publication in broken down into a number of sections that focus on the following:

• The Information Management Group, Symantec

• Virtual Infrastructure Protection

• Storage Management

• Application Protection

• Disaster Recovery Solutions

Each section looks at specific products or services and explains, as simply as possible, what it does and how it fits into a backup strategy

without going into great technical detail. This publication should be of use to the following:

• Anyone who needs to gain a high level view of what Symantec Backup Exec and Symantec System recovery products offer

• Anyone who is responsible for developing sales and marketing strategies for data protection or application/system recovery

• Anyone who needs to understand the requirements or offerings around protecting information and IT systems

• Anyone who wants to understand more about backing up data to protect businesses

Integrated products and solutions should give flexibility, a key factor in successful project design. Flexibility also helps ensure that the

solution can be deployed successfully when the time comes. This publication is intended to help readers become more informed about

Symantec Backup Exec and Symantec System Recovery, and how these solutions can be leveraged to implement data protection and disaster

recovery solutions that meet the challenges resulting from modern data and storage management problems.

This guide is not meant to be read from cover-to-cover; rather, it is meant to act as a reference guide that can be referred to as needed

depending upon topic and context.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

1

Page 5: BE Fundamental and Comparison Guide

Data Protection and Archiving - Overview

Competition is intense in every industry; consequently, in today’s world the window of opportunity, whether it’s to enter a new market,

launch a new product, or increase customer satisfaction, is small. As a result, technology innovations, driven by pervasive connectivity, have

fueled new capabilities and business models to speed up processes and routes to market. More and more businesses are using Web services

for delivery, and numerous organizations are outsourcing non-core functions in order to concentrate on processes that help create a

competitive advantage.

To make matters more incestuous, organizations are bringing outside businesses inside by collaborating with other organizations in the

supply chain ecosystem, utilizing cloud capabilities and driving change throughout and across the extended business, to enable businesses

to interact more with customers, partners, and suppliers. Although these technologies are driving operations costs down, speed remains the

ultimate competitive differentiator and winning requires companies to innovate more and move faster than the competition.

So, with companies racing to get to market with new services and products, it is now even more important for organizations to be agile and

proactive, to think creatively, and to push the boundaries of what’s possible to create, and to deliver to their existing as well as new and

undiscovered markets. If IT has transitioned from being a business support function to being a driver of business innovation, then businesses

are looking to IT to grow commerce, looking to IT to grow the business, looking to IT to facilitate growth by improving business unit efficiency

with innovative operational tools, looking to IT to improve the manageability of IT systems and business requirements, and thereby grow top

line revenue and bottom line profitability. Given this requirement, it is even more important for IT departments to control costs, manage

complexity and ensure adherence to regulations; a task that remains challenging with data growth continuing to double each year and

organizations’ environments continuing to become more complex.

As organizations become more collaborative, more people have access to the infrastructure and the applications the infrastructure supports.

Information is more distributed and accessible than ever before. Businesses need access to information anytime, anywhere. That means that

critical business systems must be up and running at all times. This requires a broader approach to the protection of data and IT systems.

Businesses need to protect both the physical and the virtual components of their IT systems, the hardware, networks, storage, servers,

operating systems, as well as the databases and the applications, across all tiers of the network.

IT needs to protect a broad range of information, generated in a plethora of ways, through multiple applications used by billions of

individuals around the world. Organizations not only need to protect their information and IT infrastructure, but need to be aware of how the

infrastructure facilitates the sharing and use of the information used by the organization between, not just connections among colleagues,

but linking businesses, from businesses to consumers, as well as between consumers themselves. In other words, all the collaborative

environments, and the movement of data while in use.

The IT world is now required to protect the infrastructure, the data and ultimately the business and that mean creating an IT environment

that is free of risks of data loss, reducing the danger of interrupted systems. That’s were Symantec Backup Exec can help.

Symantec can help organizations manage data protection complexity across their IT estate and to sustain the availability of information,

systems, and applications, and can help organizations protect the entire IT infrastructure, from client to storage. This is done through

standardized software solutions that enable improved productivity, greater agility, reduced costs, lowered risk of failure and downtime, and

better service.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

2

Page 6: BE Fundamental and Comparison Guide

Symantec has no operating system agenda, no database agenda, and no application agenda, giving organizations the flexibility they need to

be aligned with the business. Symantec’s long term objective is to help organizations build an IT machine that ultimately delivers IT simply,

with policy-driven management and reporting capabilities that dynamically improve backup, archiving and infrastructure utilization,

automates routine tasks, and helps maintain service levels. Symantec can help organizations optimize the operation of their information from

end-to-end; Backup Exec streamlines and automates the management of data within storage and servers, while also enhancing the

performance of applications.

IT organizations use Backup Exec to build the solution that’s right for them. From a quick and easy pick and mix menu of agents and options,

IT professionals can standardize on a common software information management infrastructure layer, whether the protected resource is

virtual or physical, and solve one of IT’s biggest headaches – the protection of its most critical asset - data.

About Backup

Simply put, backup is the ability to take an electronic copy of a piece of data and put it somewhere else just in case something should go

wrong with the original copy – knowing that things go wrong all the time.

Sounds pretty simple doesn’t it? Sadly over time things always become more complicated – not so much the backup solution as the amount

of data and the complexity of the IT infrastructure. The days have gone where we had the time to turn off our systems in order to back them

up. With increasing amounts of data that’s being received, created, analyzed and stored, the time it takes to backup servers and the

associated storage is growing.

• How much data could you get on 3 ½” floppy disk? (1.44MB) (Mid 1990s)

• One CD ROM (650MB) is equivalent to about 450 floppies (Early 2000s)

• One DVD (4.7GB) to around 3000 floppies (Mid 2000s)

• One 64GB memory stick is the same as 45,508 floppies (2012)

And our servers and systems keep expanding to keep up with our data storage needs, new systems arrive on a frequent basis and are

installed and up and running with new applications - creating and manipulating data.

However, traditional backup solutions require the application to be shut down and tend to use all available network resources for the backup

to occur as quickly as possible, hence backups used to be done after everyone went home – a luxury we no longer have. The art of backing up

an application while it is still running is called a ‘hot backup’ and it’s tough because you need to ensure that the data doesn’t become

corrupted or inconsistent at any time. So, the backup solution needs to be able to integrate with the applications you are using.

What happens when your data becomes too big? Backup applications need to understand the complexities of applications with big data sets.

There are a number of ways of dealing with “Big Data”. This could be block-level incremental backup or imaged based backups, which either

backup just the changes that have taken place or take a snapshot image of the data. The options for different types of storage can be

extremely complex. IT systems can include virtualized storage or servers, Storage Area Networks (SAN), or Network Data Management

Protocol (NDMP) devices, running Fiber Channel over Ethernet (FCoE). Regardless of the storage system being used, you will need a backup

solution that can cope with what you have, so all servers and storage can be backed up.

The change in disk capacity has opened up a whole new world to backup – why use tape when you could use disk? Disk is faster, lots of

people can access it at the same time, and it can be easily updated and overwritten. Looks like a great solution, right?

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

3

Page 7: BE Fundamental and Comparison Guide

It is. Backup solutions can both backup to disk and then, after a period of time, copy data to a tape as well. There are lots of benefits to this

hybrid disk + tape approach. Firstly, the backups are quicker because writing to disk is faster than writing to tape. Secondly, the backups can

be online so users can readily ask for their data back without the need to involve tapes, tape libraries and IT people, to recover a file that they

lost. In the ideal world, the recovery of data will be from disk rather than tape. In the real world, there will always be data required from

longer ago than the disk backup system can provide, so having longer term copies on tape is invaluable.

As was mentioned earlier, it’s all about flexibility, which is perhaps one of Backup Exec’s greatest attributes. Whether the target environment

includes virtual or physical resources, whether the storage system includes disk or tape devices, whether the servers are running Windows or

Linux platforms, and whether the infrastructure is simple or complex, Backup Exec can ensure the applications and data within the IT

infrastructure are properly protected and always available for recovery.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

4

Page 8: BE Fundamental and Comparison Guide

BE 2012 Agents and Options - Quick View

Core Products

• Symantec Backup Exec™2012

• Symantec Backup Exec™ 2012 Small Business Edition

• Symantec Backup Exec™ 2012 V-Ray Edition

• Symantec Backup Exec™ 2012 Capacity Edition

• Symantec Backup Exec™ 3600 Appliance

• Symantec Backup Exec™ Desktop and Laptop Option

• Symantec Backup Exec™ System Recovery 2011 Server Edition

• Symantec Backup Exec™ Recovery 2011 Desktop Edition

• Symantec Backup Exec™ Recovery 2011 Small Business Server Edition

Agents and Options

AgentsAgents

• Backup Exec™ 2012 Agent for Windows® Systems (AWS)

• Backup Exec™ 2012 Agent for Applications and Databases

⁃ for Microsoft® Exchange Server

⁃ for Microsoft SQL Server®

⁃ for Microsoft SharePoint®

⁃ for Windows Active Directory®

⁃ for Lotus Domino®

⁃ for Oracle®

⁃ for Enterprise Vault

• Backup Exec™ 2012 Agent for VMware and Hyper-V

⁃ for VMware

⁃ for Microsoft Hyper-V

• Backup Exec™ 2012 Agent for Linux® Servers

• Backup Exec™ 2012 Remote Media Agent for Linux Servers

• Backup Exec™ 2012 Agent for Macintosh® Servers

OpOptionstions

• Backup Exec™ 2012 Enterprise Server Option – includes:

⁃ Central Administration Server Option & Advanced Disk Backup Option

• Backup Exec™ 2012 Deduplication Option

• Backup Exec™ 2012 Exchange Mailbox Archiving Option 1-10

• Backup Exec™ 2012 File System Archiving Option

• Backup Exec™ 2012 VTL Unlimited Drive Option

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

5

Page 9: BE Fundamental and Comparison Guide

• Backup Exec™ 2012 Library Expansion Option

• Backup Exec™ 2012 NDMP Option

Backup Exec 2012 Core Products

Symantec Backup Exec™ 2012 Family

The Symantec Backup Exec product family offers market-leading backup and disaster recovery solutions for critical customer IT resources.

This includes Backup Exec 2012, Symantec System Recovery 2011, the BE 3600 Appliance, a virtual-only V-Ray Edition, Capacity licensing,

BE.cloud, and the Small Business Edition.

Backup Exec 2012

Symantec Backup Exec 2012 has dramatically re-engineered its range of offerings and user interface to deliver even more comprehensive

and reliable backup and recovery for any IT environment. The new, modern range of Backup Exec solutions are designed to adapt for any

business. Organizations can easily protect increasing amounts of data, in either virtual or physical, environments with integrated VMware

and Hyper-V protection, while reducing storage and management costs through integrated deduplication and archiving technology; reduce

customer business downtime through integrated bare metal and dissimilar hardware recovery features and backup to virtual (B2V) and

convert to virtual (P2V) capabilities, and ensure critical information on virtual or physical systems is always protected and can be restored in

seconds.

Key Features

• Market-leading data and application protection for physical and virtual server environments

⁃ A redesigned administration console eliminate complexity and reduce time managing backups

• Support for the latest virtual platforms, such as Hyper-V 2008 R2 and vSphere 5.0

• First-to-market granular recovery for virtual applications from a single-pass backup

• Block-level data deduplication reduces storage costs associated with backup processes

• Integrated bare metal and dissimilar hardware recovery make disaster recovery painless

• B2V and P2V features leverage virtual technology for migration and virtual fail over

• Backup Exec 3600 Appliance offers the reliability of Backup Exec software on optimized hardware

These powerful capabilities in Backup Exec 2012 allow Businesses to protect more customer data while reducing storage and management

costs, optimize network utilization across physical and virtual environments, automate storage management savings with efficient archiving

and backup, and enable all types of recovery for both virtual and physical resources, all through a single product and console.

Symantec Backup Exec 2012 provides technologies that offer multiple opportunities to ensure that backup and recovery strategies are kept

up to date. Backup Exec 2012’s market-leading archiving and disaster recovery capabilities ensure that IT infrastructures are fully protected.

Our integrated deduplication and archiving technologies, plus first-to-market granular application recovery for virtual environments, help IT

improve backup performance and reduce storage and administration costs.

Symantec Backup Exec 2012 delivers reliable Windows, Linux, Macintosh, ESX, vSphere and Hyper-V server backup and recovery. Backup

Exec enables the automated protection of critical data with advanced automated protection of applications such as Microsoft Exchange,

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

6

Page 10: BE Fundamental and Comparison Guide

Microsoft SQL Server, Active Directory and Oracle, simplifying routine network administration. Coupled with Backup Exec’s flexible Agents

and Options, Backup Exec 2012 provides:

• Integrated and adaptable deduplication - helps reduce storage costs while optimizing network utilization across physical and virtual

environments. Reduces the amount of data you have to backup and store on disk.

• Unified backup and archiving - automates storage and management savings through efficient data lifecycle management. Reduces the

data held on primary storage for either Exchange or file system by archiving off older data – instead of backing up the same data over and

over again.

• Granular application and database recovery of virtual and physical servers from a single-pass backups (you only need to run one backup

instead of two); reduces costs with fewer backups. Restores individual items with no impact on the end user environment no matter

whether in virtual or physical environment.

• Choose the leading backup and recovery technology for the latest Windows® systems and mixed O/S environments that customers have

relied on for over three decades. Dependable and sturdy - why make the mistake of using anything inferior?

• Supports disk and tape, virtual and physical maintains productivity, profits, and confidence – one solution for every IT environment.

⁃ Centralized management reduces administration time and effort ensures that a distributed backup environment is protected with ease.

Backup ExBackup Exec Serec Server Licensever License

This is the core Backup Exec product. This license enables a server to act as the central backup “brain” for your backup strategy. The Backup

Exec console run from this server allows the administrator to manage each agent or option that is added to a backup solution. It automates

the processes and capabilities of data protection and acts as a central location for monitoring success rates. The BE 2012 Backup Exec Server

License provides a new streamlined administration console (user interface) making it easier to set up backups, manage backup policies,

perform disaster recovery, and convert backups of servers to virtual machines for instant disaster recovery or for migration. It includes

defaults for backup and recovery that can be leveraged to protect data and applications with minimal effort. The Backup Exec Server License

also includes integrated bare metal recovery and dissimilar hardware recovery capabilities called Simplified Disaster Recovery which is used

to rebuild the failed server and restore it to a functional state. By adding agents and options to your solution you can enhance and customize

the backup and restore process for specific systems, applications, databases, or file systems as well as improve storage management and

disaster recovery capabilities.

Backup ExBackup Exec 2012 Small Business Eec 2012 Small Business Edition (BESBE)dition (BESBE)

The Backup Exec™ 2012 Small Business Edition (BESBE) is an all-in-one package for small businesses that replaces previous Backup Exec

Microsoft Small Business Server (BE SBS) Editions. Microsoft has recently reviewed and changed its licensing for the Microsoft Small

Business Server, operating system and application software, due to more customers wanting to take advantage of server virtualization

technologies. To simplify the whole licensing process Symantec have replaced Backup Exec SBS with Backup Exec Small Business Edition (BE

2012 SBE). Not only does BE 2012 SBE support Microsoft operating systems (SBS or the full version of Microsoft), it also supports Linux and

Mac O/S. The new BE SBE to three servers (whether physical or virtual), one license of BE 2012 SBE supports a single physical box. For any

additional physical box (to a maximum of 3) you will need a BE 2012 SBE O/S agent (Agent for Windows, Agent for Linux or Agent for Mac)

and/or an application agent (Backup Exec Small Business Agent) to protect additional physical machines running Microsoft Applications. BE

2012 SBE and Backup Exec Small Business Agent supports Active Directory, Exchange, SQL, SharePoint and Hyper-V. Included with the BE

2012 SBE is Microsoft Application support, Bare Metal Recovery with Simplified Disaster Recovery technology, B2V, P2V support for Hyper-V,

as well as being upgradeable to the full versions of Backup Exec.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

7

Page 11: BE Fundamental and Comparison Guide

Backup ExBackup Exec 2012 Vec 2012 V-Ra-Ray Ey Editiondition

Extensive virtualization is just a fact of life in IT today. Driving down cost and increasing IT agility are the primary drivers behind going

“virtual”. With an increasing number of complex workloads wrapped up in virtual machines (VMs), enterprises are challenged to maintain the

same degree of security and protection they enjoy for their physical environment in their virtual infrastructure, and also leverage benefits

brought by virtualization as a technology. Attaining the service levels for these business systems requires a high degree of visibility into

virtual environments. Without this visibility, VM managers have no way to answer crucial questions such as:

• How can I protect both my virtualized and physical environments?

• How quickly can I recover or discover data within my virtualized environments?

• Am I running VM backups on huge amounts of wasteful redundant data?

• How many virtual machines are running in my environment?

Symantec helps IT administrators solve the problem of visibility into virtualized infrastructures through a technology known as V-Ray.

Symantec V-Ray technology provides visibility across your virtual environments and is delivered in across of Symantec products for virtual

environments: security, storage, backup, etc. because virtual machines should be protected just as effectively and as well as physical

machines. Symantec’s V-Ray technology provides the visibility needed to peer inside VMs and understand how to protect these systems and

run them at the highest possible service level.

Symantec Backup Exec™ 2012 V-Ray Edition is a separate edition of Backup Exec named for V-Ray and designed to completely protect

VMware or Hyper-V virtual environments – including critical virtualized applications. With agent-less or agent-based virtual protection, the V-

Ray Edition lets organizations optimize protection for virtual machine performance and recoverability. The V-Ray Edition gives you granular

recovery of entire virtual machines, single files, Active Directory® objects, Exchange emails, SQL databases, or SharePoint® documents from a

single-pass backup. Backup Exec 2012 V-Ray Edition is part of Symantec’s leading portfolio for virtualized environments. With integrated

deduplication and site-to-site replication, the V-Ray Edition is easy to use, and represents complete protection for VMware and Hyper-V

environments.

Included in the Backup Exec 2012 V-Ray Edition:

• Backup Exec Server

• Agent for VMware and Hyper-V

• Agent for Applications and Databases

⁃ Exchange

⁃ SQL

⁃ SharePoint

⁃ Active Directory

⁃ Oracle

⁃ Lotus Domino

⁃ Enterprise Vault

⁃ Deduplication Option

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

8

Page 12: BE Fundamental and Comparison Guide

Backup ExBackup Exec 2012 Capacitec 2012 Capacity Ey Editiondition

Over the last few years a number of organizations have found traditional methods of software licensing, commonly based upon the total

numbers of applications, CPUs, servers or some combination thereof, more difficult to manage. They are looking for simplified, capacity-

based software licensing models where they get all the backup software features available and then only pay a fixed fee based upon the total

amount of front-end data being protected.

The Backup Exec family now offers a new capacity-based licensing model that provides easier purchasing and maintenance. This is realized

through the new Backup Exec Capacity Edition which uses this licensing model. The Backup Exec 2012 Capacity Edition licensing is based on

the aggregate amount of uncompressed data residing on the “front end” production systems to be protected. Depending on the situation, a

capacity-based licensing model, instead of an “a la carte” agent and option based model, may be dramatically easier and cheaper.

Traditionally, organizations buy per-server licenses, per-agent licenses, and per-option licenses. This can get complex with different renewal

dates for a host of agents and options required for complex environments.

With one single product, or one single unit, priced per Terabyte (pricing start at 2TB), the new Backup Exec 2012 Capacity Edition gives an

unlimited numbers of agents and options, and it is just the total amount of data to be backed up that needs to be licensed.

Backup Exec users can expand the feature rich capabilities of Backup Exec (without increasing costs) via the capacity model due to the all-

inclusive benefits. Backup Exec continues to offer flexibility with multiple licensing strategies.

• Single SKU Protects an entire site

• Metered per “front end” TB

• Includes:

⁃ Symantec Backup Exec™ 2012 Server License – Includes:

◦ New User Interface

◦ Simplified Disaster Recovery

◦ P2V and B2V

◦ Unlimited Agent for Windows®

◦ Unlimited Agent for Linux®

◦ Deduplication Option

◦ Unlimited Agent for Applications and Databases,

◦ Unlimited Agent for VMware® and Hyper-V®

◦ Agent for Mac®

◦ All Storage Options

◦ All Management Options

DLO is not included.

Backup ExBackup Exec 3600 Applianceec 3600 Appliance

The Backup Exec 3600 Appliance is an all in one solution. It’s a backup server, a 5.5TB storage device, and a deduplication appliance at the

same time. The Backup Exec 3600 Appliance delivers complete data and application protection out of the box, reducing the problems of

complexity, cost, and risk associated with traditional backup solutions by delivering a combined hardware and software solution in a single

package. It is ideal for growing VMware and Hyper-V virtual environments and fully supports the protection of physical server environments,

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

9

Page 13: BE Fundamental and Comparison Guide

all using one consolidated appliance solution. Using the Backup Exec 3600 Appliance IT administrators can protect all server resources in

their environment and avoid the unnecessary costs and headaches associated with implementing and managing multiple backup solutions.

Simple and easy to use and install, the 3600 Appliance has all the appropriate agents and options already installed and ready to go.

SSymantec Desktop and Lapymantec Desktop and Laptop Optop Optiontion

Symantec Desktop and Laptop Option is a standalone product that protects the data held on desktop and laptop computers. With the

majority of business-critical information residing outside the data centre or off corporate servers, protection for desktops and laptops is a

must. Symantec Desktop and Laptop Option delivers data protection to desktops and laptops whether in the office or on the road. Not only

improving data protection and efficiency, this option enables users to restore their own files and maintains synchronization between multiple

desktops and laptops so the most up-to-date file versions are available on all of a user's computers. Because the Desktop and Laptop Option

does not require a dedicated stand-alone server as competing products do, it easily integrates into existing IT infrastructure and policies,

helping lower the total cost of ownership. The push-install functionality from within either Backup Exec or NetBackup centralizes deployment.

Symantec Desktop and Laptop Option includes support for Windows 7, Windows Vista, Windows XP 64-bit OS.

SSymantec Symantec Sysystem Recovertem Recovery 2011 Sery 2011 Server Ever Editiondition

Symantec System Recovery 2011 combines the speed and reliability of disk-based, bare-metal Windows® System Recovery with revolutionary

technologies for hardware-independent restoration and lights-out operation. The result is unparalleled freedom to restore systems anytime,

from anywhere, to virtually any device without affecting the performance of the systems. It is a simple, cost-effective backup and recovery

solution for any businesses that requires simple disaster recovery capability. It helps minimize downtime and avoid disaster by easily

recovering the individual data files/folders or complete Windows systems in minutes. Doesn’t matter if the IT systems are virtual or physical,

System Recovery can restore systems anytime, from anywhere, to virtually any device, storing virtual or physical systems in virtual or physical

environments with the ability to convert physical system images to virtual environments. It is the perfect standalone solution for anyone

running any other backup solution.

SSymantec Symantec Sysystem Recovertem Recovery 2011 Desktop Ey 2011 Desktop Editiondition

System Recovery Desktop Edition is a reliable system recovery solution designed to quickly recover failed Windows-based desktop PCs and

remote laptop systems back to an operative state. It allows organizations to recover desktop data, files, operating systems and applications,

or complete a bare metal restore (bare metal means hardware with no software on it) in minutes as opposed to manually rebuilding systems,

which could take hours or even days (especially if IT has loads of them to do). With this disk-based system recovery solution (disk is faster

than tape), users can capture the entire desktop including the operating system, applications, files, system configurations, and personal user

settings in one easy-to-manage file, without interrupting productivity or application usage. This “image” can be saved on CD, DVD, USB,

FireWire, another system or a network drive in case of device failure. It creates real-time ‘while you work’ recovery points, reducing

bandwidth needed to create a recovery point to improve performance as well as allowing users to restore desktops remotely.

SSymantec Symantec Sysystem Recovertem Recovery 2011 Small Business Sery 2011 Small Business Serverver

This is the System Recovery product built for Microsoft Small Business Server, designed for organizations that require a simple system and

data recovery solution for SBS. Like its big brothers, System Recovery Small Business Server Edition is a disk based disaster recovery solution

that can quickly restore failed systems to a specified point-in-time without taking hours to manually rebuild and restore from traditional

methods or reinstalling from scratch. It adjusts system usage performance in scheduled jobs creating scheduled/automated recovery points

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

10

Page 14: BE Fundamental and Comparison Guide

so that the impact on the end user is unnoticed. System and data images can be stored more or less anywhere including USBs, FireWire, CD/

DVD or FTP sites as well as traditional SAN, NAS, or RAID arrays.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

11

Page 15: BE Fundamental and Comparison Guide

Backup Exec 2012 Core Agents

Backup Exec Agents – an agent provides backup/recovery for systems, applications, databases or file systems. Each one is designed to

enhance feature support for environments, very much depending on what environments, platforms, applications or databases need

protection.

Agents fAgents for Operating Sor Operating Sysystem Platftem Platformsorms

Agent fAgent for Windowsor Windows

The Agent for Windows provides the standard platform required for Backup Exec for all application and database backups on Windows

servers. It does, however, provide other benefits such as open file protection and direct recovery of granular file and folder data directly back

to the Windows server from which it was backed up.

The Agent for Windows optimizes data transfers for 32-bit and 64-bit Windows servers. Special Agent Accelerator technology helps increase

backup and recovery performance by compressing data at the source and intelligently managing distributed environment backups at the

client.

Agent fAgent for Mac®or Mac®

The Symantec Backup Exec 2012 Agent for Mac provides support for on-line, non-disruptive backup of Macintosh OS X 10.5, 10.6 and 10.7

operating systems. Coupled with application agents you can broaden the data protection offering for Backup Exec.

Agent fAgent for Linuxor Linux

This agent extends Backup Exec software's advanced agent technology to provide high-performance network wide data protection and

recovery for 32-bit and 64-bit Linux servers with support for both Intel and AMD 32-bit and 64-bit processors. This agent meets the needs of

business applications on Linux operating systems offering full or incremental, or differential, backup and restore and client-side

deduplication for supported distributions of Linux. Note: client-side deduplication requires the Deduplication Option to be licensed on the

Backup Exec Server.

RemoRemote Media Agent fte Media Agent for Linuxor Linux

If you need enhanced storage capabilities using Linux based systems then this is the agent for you! The Backup Exec 2012 Remote Media

Agent for Linux provides additional storage flexibility enabling IT administrators to add a storage device to a remote Linux server as well as

increasing bandwidth (actually reducing bandwidth requirements) for backup jobs on remote Linux servers. The Linux-based backup server

must be managed by the primary Backup Exec server console.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

12

Page 16: BE Fundamental and Comparison Guide

Agents for Virtual Environments

Symantec Backup Exec™ 2012 Agent for VMware and Hyper-V

For VMware

One license of the Agent for VMware and Hyper-V enables the protection of all VMs on a VMware host – irrespective of how many VMs are

installed on the host. This includes full VM recovery capabilities as well as granular file and folder recovery capabilities. Symantec has been a

partner with VMware for over 10 years – longer than any other vendor – and as a result of this relationship Backup Exec 2012 is VMware

ready. Backup Exec 2012 delivers complete disk-to-disk-to-tape based data protection for VMware virtual environments. You don’t need

another backup solution; you don’t need to add any complexity to your environment; the Agent for VMware and Hyper-V automatically

discovers VM instances giving you all the benefits of backup Exec: Granular Recovery, restoring individual files, and folders from a single

image-level backup.

If you already use Backup Exec there is no need to rip out and replace – just add the Agent for VMware and Hyper-V to your infrastructure

and begin protecting virtual machines. If you are running both physical and virtual systems there is no issue, add the Agent for VMware and

Hyper-V to the new virtual servers and manage both environments through one flexible console.

Remember:

• One agent delivers comprehensive data protection to an unlimited number of VMware virtual guest systems

• Comprehensive backup for virtual systems and legacy physical systems supporting disk and tape storage environments

• Integration with vStorage to maximize backup and recovery performance

• FREE plug-in for VMware allows you to manage Backup Exec 2012 from the vCenter or vStorage interface

• Granular data recovery for VMware Infrastructures saves time and lowers cost

• Supports disk and tape storage environments

• Granular recovery of Exchange, SQL, Active Directory, and SharePoint virtual machines can be enabled through the addition of the Agent

for Applications and Databases

For Microsoft Hyper-V

The improved support for Hyper-V environments in the Backup Exec 2012 Agent for VMware and Hyper-V provides a single agent to support

an unlimited number of virtual guests running on a Windows Server 2008 R2 Hyper-V host while protecting existing physical server files and

Windows applications. Backup Exec 2012 has a virtual stream handler included that improves backups and deduplication rates across Hyper-

V environments. It enables granular restore of individual virtual files, folders and items from a single image-level backup - eliminating the

time and storage requirements of a second file level backup giving you all the benefits you would get from a physical environment.

• Single, comprehensive backup application for virtual systems and legacy physical systems supporting disk and tape storage environments

• Complete Windows data protection for new Windows Server 2008 R2 Hyper-V systems including Cluster Shared Volumes and

LiveMigration

• One agent delivering affordable data protection to an unlimited number of Microsoft virtual systems

• Granular recovery of Exchange, SQL, Active Directory, and SharePoint virtual machines can be enabled through the addition of the Agent

for Applications and Databases

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

13

Page 17: BE Fundamental and Comparison Guide

Backup Exec 2012 Agent for Applications and Databases

For Microsoft® Exchange Server

Exchange is the most prevalent messaging system on the planet. The Agent for Applications and Databases is built to revolutionize data

protection for Exchange and supports Exchange 2003, 2007, 2010 SP2. The Agent for Applications and Databases enables Backup Exec to

run a single backup job for Exchange without the need to run an additional mailbox job (MAPI) whilst still allowing granular recovery of

individual emails or mailboxes – in other words the Agent for Applications and Databases can granularly recover from a single full backup

while the application is still online. This significantly reduces the number of backups and time required to protect Exchange.

FFor Lor Lootus Dominotus Domino®®

The Agent for Applications and Databases provides data protection of vital Lotus Domino 7.x, 8 and 8.5 messaging and collaboration

databases as an integrated part of your daily backup activities. The Agent for Applications and Databases supports both 32-bit and 64-bit

versions of Lotus Domino including partitioned and clustered Lotus Domino servers and new support for Domino Attachment Object Service

(DAOS) store and associated NLO files. Put differently, no matter how your Domino server is set up, this agent’s API’s help provides non-

disruptive data protection of the databases and transaction logs as well as flexible restore options including database redirection and point-

in-time "rollback" recovery of databases or transaction logs. So you can restore to an alternative location as well as roll the database back to

a previous point in time.

FFor Microor Microsofsoft SharePt SharePoint®oint®

With over 100 million SharePoint licenses sold worldwide Microsoft SharePoint is becoming part of our business lives. With the Agent for

Applications and Databases recovery of data is made simple - individual files or whole systems. It supports all versions of Microsoft Office

SharePoint Server as well as Windows SharePoint Services 2.0/3.0. Using a 32-bit or 64-bit Backup Exec 2012 media server, the Agent for

Applications and Databases can protect 32-bit or 64-bit MOSS-2007 and 2010 servers deployed either on a Single-Server or within a Multi-

Server Farm. The Agent for Applications and Databases offers Granular Recovery Technology (GRT) which enables users to restore individual

documents, sites and list items in a simple straightforward way from single Pass backups (one backup), either directly back into the original

document library in the SharePoint farm or redirecting it to an alternative file system.

FFor Microor Microsofsoft SQL Sert SQL Server®ver®

The Agent for Applications and Databases gives IT administrators the ability to recover SQL databases to destinations other than from where

they originated, flexible recovery options, directing a copy of the actual data streams being sent to media by a SQL database to a local

directory if needed. With the Agent for Applications and Databases SQL Server 2008 snapshots are integrated into the Backup Exec catalog

for a consolidated look at all data copies available, which can be recovered instantly. This Agent for Applications and Databases provides SQL

Server 2008, 2005, and 2000 users with granular protection on 32-bit and 64-bit systems down to the individual database or file group.

FFor Windows Active Directoror Windows Active Directory®y®

Most of us forget about Active Directory (AD), but it is the database that runs so many of our Microsoft systems – without Active Directory

most companies would come to a grinding halt. Should anything go wrong with this replicated database, a small fault can become a major

catastrophe. The Agent for Applications and Databases solves all these issues by dramatically reducing the time to recover either individual

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

14

Page 18: BE Fundamental and Comparison Guide

items in AD or individual user accounts, organizational units, even whole individual records from a single pass backup (only one backup)

while Active Directory remains online – with no reboots. Anyone who has ever tried to manually restore AD will appreciate the significance of

being able to alleviate the aggravation associated with traditional Active Directory protection and recovery. Our Granular Recovery

Technology (GRT) once again gives IT Administrators the ability to:

• Restore objects without rebooting AD Domain Controllers

• Single pass backups for complete AD or object level recovery

• Support for 2008 Active Directory Domain Services

• Centralized System State and Active Directory protection

FFor Oracleor Oracle®®

If you need to protect Oracle then the Agent for Applications and Databases will give you integrated non-disruptive data protection for Oracle

11g, 10g, and 9i databases. The advanced features (GRT) provide protection of individual table spaces or a complete application/database

backup as well as the protection of archived redo logs and control files, without ever taking them offline. Integrated with Oracle's Recovery

Manager (RMAN) users used to Backup Exec can manage backup and recovery whilst the Oracle administrator is out of the office. You can

initiate backups or recovery either through Backup Exec or the Oracle RMAN console. Multi-Streaming can be used for improved performance

during backups and restores. The Agent for Applications and Databases supports Intel Xeon EMT64, Intel Pentium EMT64, AMD Athlon, and

AMD Opteron processors as well as Red Hat and SUSE Linux, and Oracle RAC on Windows and Linux servers.

FFor Enterprise Vor Enterprise Vaultault

Backup Exec and Enterprise Vault are part of the same business unit within Symantec which makes it pretty straightforward to interweave

the technologies; in fact, the archiving option within Backup Exec is built on Enterprise Vault technology. The Backup Exec 2012 Agent for

Applications and Databases provides integrated backup protection for Symantec Enterprise Vault archives with full application protection for

its directory databases, partitions, or vault stores and indexes. All backup and recovery jobs are managed though the Backup Exec console

which allows users to select some or all of the Enterprise Vault resources they wish to backup. Our Granular Technology (GRT) gives the

ability to browse and select the Enterprise Vault components for recovery, including individual partition files and indexes.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

15

Page 19: BE Fundamental and Comparison Guide

Backup Exec 2012 Options

Backup Exec Options extend functionality of Backup Exec and include features like data deduplication, additional management, all of which

scale with a business.

Enterprise SerEnterprise Server Opver Optiontion

The new Enterprise Server Option combines the management capabilities of the Central Administration Server Option (CASO) together with

the storage management expansion capabilities of the Advanced Disk Based Option (ADBO) and SAN Storage Option (SSO). Now as one

agent, CASO, ADBO and SSO are provided together helping organizations manage larger storage environments.

The Backup Exec 2012 Enterprise Server Option is designed to help IT administrators and Managed Service Providers meet the backup

protection needs of growing companies. The Enterprise Server Option includes the tools they need to scale their backup infrastructure and

management capabilities alongside the needs of a growing environment. The Enterprise Server Option includes three components:

1. Central Admin Server Option (CASO)

2. Advanced Disk Backup Option (ADBO)

3. SAN Shared Storage Option

Both CASO and ADBO are optional components that can be leveraged to expand and scale the capabilities of a Backup Exec 2012

environment.

Central Admin Server Option (CASO) simplifies backup management of multiple Backup Exec servers. Centralized management that can scale

to manage media servers across the network provides concise information including load balancing of backup jobs, the management of

distributed catalogs – backup reports which enable the restore process, bandwidth throttling - which regulates network traffic and minimizes

bandwidth congestion, fault tolerance – which enables a system to continue operation rather than failing altogether, as well as monitoring

and reporting for a number of Backup Exec servers in a Windows data centre, distributed throughout a network or at remote offices. If you

are running a growing backup environment the Central Admin Server Option can help you manage that growth.

Advanced Disk-Based Backup Option speeds both backup and restore processes through Synthetic, Off-Host backup, and True Image restore

functionality. Synthetic backup reduces backup windows and network bandwidth requirements using incremental backups to create a full

“Synthetic” backup by merging the previous full backup and all the incremental together. Off host backups remove the bulk of the backup

‘burden’ from the server being protected and move it to the backup server. This is done through the usage of snapshot technology.

Snapshots are created of volumes that are being backed up, and these snapshots are imported to the backup server enabling the backup

server to perform the backup operation. Once the backup completes, the snapshot is released. True image restore restores data sets in the

correct order which simplifies the process of restoring data sets.

Enterprise Server Option makes the whole backup process faster and easier to manage in larger environments. It is a LAN-free backup

solution (a LAN-free backup is a backup of server data to a shared, central storage device (SAN) without sending the data over the local area

network (LAN), it allows multiple distributed backup servers to backup to storage devices that are connected over a switched fabric or iSCSI

SAN. It provides more efficient and better backup performance without interrupting normal LAN activity. It load balances backup job activity

across shared devices from multiple Backup Exec servers. The centralized management of media helps to lower the total cost of management

across larger high-end storage environments.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

16

Page 20: BE Fundamental and Comparison Guide

Note: If you already have either ADBO and do not want the full functionality of the new ESO then you can simply extend your maintenance on

either ADBO.

Deduplication OpDeduplication Optiontion

Backing up the same – often duplicate -- data every day can exponentially increase backup storage requirements, can have an adverse effect

on bandwidth consumption, and can increase the length of time it takes to carry out daily backups. The Deduplication Option only backs up

unique data blocks that have not previously been captured rather than backing up everything – again - and significantly reduces the amount

of backup data stored to disk. The Deduplication Option is conveniently licensed per backup server. The Deduplication Option helps to reduce

backup data storage costs and improves network utilization across physical and virtual environments. Integrated into Backup Exec, the

Deduplication Option gives you the choice to carry out deduplication either at source or remote server (sometimes called client

deduplication), at the backup server (at the point of backup), or appliance deduplication (integrates with OpenStorage deduplication

appliances – OST, see the Backup Exec hardware compatibility list for a full list of compatible appliances).

• Client or Remote Office Deduplication – reduces the amount of data you are sending over the network

• Backup Server Deduplication – suitable for higher-speed network connections

• Appliance Deduplication – integrated logging means that Backup Exec can manage any restore through the appliance

ExExchange Mailbochange Mailbox Archiving Opx Archiving Optiontion

Integrated archiving for Exchange can reduce the data you hold on your Exchange servers speeding up the backup process and helping to

reduce the amount of time it takes to backup (reducing the backup window). Reduce the amount of old data sitting on your exchange servers

by archiving untouched email (by setting up a policy) to a separate location and then delete the original email from the Exchange server. This

frees up storage space and dramatically reduces backup times as well as giving you a much better idea of your real storage growth and

storage requirements. End users can retrieve archived emails straight from Outlook or administrators can retrieve archived data through the

Backup Exec console. Each license of the Exchange Mailbox Archiving Option enables archiving of 10 user mailboxes and supports Exchange

2007 & 2010 (it also requires an Exchange Agent for each Exchange Server).

File SFile Sysystem Archiving Optem Archiving Optiontion

Integrated archiving for Windows file systems helps to reduce the data you hold on your file servers. This helps to speed up the backup

process (reducing the backup window). Reduce the amount of old data sitting on your file servers by archiving untouched data (by setting up

a policy) to a separate location and then deleting the original file the File server. This frees up storage space and dramatically reduces backup

times as well as giving you a much better idea of your real storage growth and storage requirements. Data can still be retrieved through

indexing (tagging) data through the Backup Exec Retrieve Google-like web UI or administrators can retrieve archived data through the Backup

Exec console. Supports Windows, Windows 2003, Windows 2008 and Windows 2008 R2, is licensed per protected/archived server and

requires an Agent for Windows Systems for each archived server.

Virtual TVirtual Tape Librarape Library Unlimited Drive Opy Unlimited Drive Optiontion

A virtual tape library (VTL) is a storage virtualization technology that makes a storage component (usually disk) look like a tape library or tape

drives. By virtualising the disk storage it lets you consolidate storage and improve the data restore processes. With Backup Exec’s Virtual

Tape Library Unlimited Drive Option you can use up to 80 drives per Virtual Tape Library (VTL), providing unlimited (80) Library Expansion

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

17

Page 21: BE Fundamental and Comparison Guide

Options per VTL device. It is a simple and cost effective way to integrate a VTL storage virtualization environment that can both behave as a

tape as well as erase data that has reached its expiration data in order to reclaim storage space for more crucial data.

LibrarLibrary Expansion Opy Expansion Optiontion

The Library Expansion Option means you can add additional drives within multi-drive tape or optical autoloader/library storage systems –

thereby growing storage systems. It has Advanced Device and Media Management (ADAMM) technology which provides additional

configuration and management capabilities – these include lights-out backup and restore operations (this is a way of restoring an entire

system from a built-in recovery environment) and barcode reader and portal support for both SCSI and Fibre attached devices which allow

administrators to partition slots within a library to target backup jobs to a specific slot or library location.

NDMP OpNDMP Optiontion

Network Data Management Protocol (NDMP) is a protocol which enables the transport data between NAS (Network Attached Storage) devices

and backup devices. This removes the need for transporting the data through the backup media server itself and can enhance the speed of

the backup and reduce the load on the backup server. This option supports the backup and restore of NDMP NetApp (Data ONTAP 7.0 or

later), EMC Celerra (with DART 5.5 or later) and IBM N-Series storage (with tape devices attached). It can also protect NDMP devices at

remote locations including in a Storage Area Network (SAN) as well as NDMP filer data duplication to tape.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

18

Page 22: BE Fundamental and Comparison Guide

Disaster Recovery Capabilities

Simplified Disaster Recovery

Backup Exec 2012 now offers a new, integrated solution to help businesses prepare for and overcome the problem of server failure and

downtime. The new version of Backup Exec 2012 includes integrated bare metal recovery and dissimilar hardware recovery – also known as

hardware discovery - capabilities. These new features make full server recovery easy, and are offered as a no charge, built-in element of

Backup Exec 2012. Now, using Backup Exec 2012, a single protection policy for a server can protect it against all types of disaster or failure,

and enable all of the following types of recovery:

• Server Recovery

⁃ Bare metal recovery

⁃ Dissimilar hardware recovery

• Application Recovery (agent for Applications and Databases required)

• Granular Application Recovery (agent for Applications and Databases required)

• File and Folder Recovery

All of these recovery capabilities are offered in a single product and solution, Backup Exec 2012.

SSymantec Backup Exymantec Backup Exec™ Desktop and Lapec™ Desktop and Laptop Optop Optiontion

For data held on desktops and laptops, the Symantec Desktop and Laptop Option can be deployed to save end users time and money by

protecting and recovery restoring critical data contained on desktop and laptop systems. With the majority of business-critical information

residing on desktops and laptops, the Symantec Desktop and Laptop Option is a must. Whether in the office or on the road, the Desktop and

Laptop Option can improve data protection and efficiency, and even enables users to restore their own files without costly administrator

intervention. The Symantec Desktop and Laptop Option maintains synchronization between multiple desktops and laptops so the most up-to-

date file versions are available on all of a user's computers. Because the Desktop and Laptop Option does not require a dedicated stand-alone

server as competing products do, it easily integrates into existing IT infrastructures and policies, helping lower the total cost of ownership.

The Symantec Desktop and Laptop Option includes support for Windows 7, Windows Vista, Windows XP 64-bit OS.

SSymantec™ Symantec™ Sysystem Recovertem Recovery Sery Server Ever Editiondition

Symantec System Recovery 2011 combines the speed and reliability of disk-based, bare-metal Windows® System Recovery with revolutionary

technologies for hardware-independent restoration and lights-out operation. The result is unparalleled freedom to restore systems anytime,

from anywhere, to virtually any device without affecting the performance of Windows systems. It is a simple, cost-effective backup and

recovery solution for any business that requires simple disaster recovery for windows systems. It helps minimize downtime and avoid disaster

by easily recovering individual data files/folders or complete Windows systems in minutes. No matter if the IT systems are virtual or physical,

System Recovery can restore systems anytime, from anywhere, to virtually any device, storing virtual or physical systems in virtual or physical

environments with the ability to convert physical system images to virtual environments. It is the perfect standalone solution for anyone

running any other backup solution.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

19

Page 23: BE Fundamental and Comparison Guide

SSymantec™ Symantec™ Sysystem Recovertem Recovery Desktop Ey Desktop Editiondition

System Recovery 2011 Desktop Edition is a reliable system recovery solution designed to quickly recover failed Windows-based desktop PCs

and remote laptop systems back to an operative state. It allows organizations to recover desktop data, files, operating systems and

applications, or complete a bare metal restore (bare metal means hardware with no software on it) in minutes as opposed to manually

rebuilding systems, which could take hours or even days (especially if IT has loads of them to do). With this disk-based system recovery

solution (disk is faster than tape), users can capture the entire desktop including the operating system, applications, files, system

configurations, and personal user settings in one easy-to-manage file, without interrupting productivity or application usage. This “image”

can be saved on CD, DVD, USB, FireWire, another system or a network drive in case of device failure. It creates real-time ‘while you work’

recovery points, reducing bandwidth needed to create a recovery point to improve performance as well as allowing users to restore desktops

remotely.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

20

Page 24: BE Fundamental and Comparison Guide

Virtual Infrastructure Protection

Overview

Virtualization means adding a layer of abstraction to simplify the administration, or increase utilization, of a system or device so that the

applications are unaware of what is going on underneath them – and, for that matter, cares not what is going on beneath them. Virtualization

is ultimately about business benefits, such as the following:

• Enabling IT to manage the infrastructure without affecting the business’s applications, so they can work on the server, network or storage

layers without effecting the application

• Move or change the storage, or move the application from server to server transparently

Any kind of virtualization is just another part of an overall trend in creating abstraction layers in the IT infrastructure. Virtualization all comes

together to make more efficient use of resources, reduce total cost of ownership, improve availability, assist in disaster recovery, testing and

development, centralize data centre administration, and do away with server sprawl to provide businesses with an efficient and agile IT

environment.

The virtual server environment is made up of software that divides one physical server into multiple isolated virtual environments; or, to put

it another way, the virtual server foundation is leveraged to allow multiple virtual machines, with heterogeneous operating systems, to run in

isolation, side by side, on the same physical machine.

By being able to abstract the physical hardware from the O/S, server virtualization allows organizations to run multiple operating systems on

the same hardware, isolate virtual machines to run specific applications, and speed up the process of provisioning machines from one server

to another for workload management, consolidation, or maintenance.

Having made the decision to virtualise your systems, you will be faced with a number of potential challenges, such as the following:

• V-Server Sprawl

The danger is that “server virtualization” is backing organizations into the situation they were trying to escape by using virtualization in the

first place. Cloning is so easy – ‘right click, clone machine’ and, voila you have another machine. Using server virtualization can create

complexity and v-sprawl or v-mess. Organizations need to be able to track what they have in their virtual environment, what dependencies

they have, how these devices are connected to the storage infrastructure in order not to lose control of the server environment again.

• Lack of Visibility

Understanding all the dependencies in a virtual environment is made tricky because you can't necessarily find virtual machines with a

physical asset check, you have to have a tool that can audit the network, whether they are online or not.

• Complexity

Management complexity is the major issue with virtual environments. IT sometimes has difficulty finding or applying adequate monitoring

and management tools that work across both virtual and physical landscapes. Other issues can include support, integration and compatibility

of different operating systems on the multivendor hardware being virtualized.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

21

Page 25: BE Fundamental and Comparison Guide

• IT Storms

Bandwidth problems can also be a challenge and are caused by co-locating multiple workloads onto a single system with one network path.

In a physical server environment, each application runs on a separate box with a dedicated network interface card. But in a virtual

environment, multiple workloads share a single NIC, and possibly one router or switch as well. This setup can increase the network traffic

through this single path, resulting in problems with bandwidth availability and throughput.

Achieving the promised agility and cost savings of virtualization requires modernizing and automating service-level processes – including the

backup process.

Backing it all up

How do you make sure that your backup application protects, and where possible, takes advantage of all the changes and new technologies

available in a virtualized environment? Although the data protection process constantly changes, organizations often overlook the re-

assessment of their backup strategies on a regular basis – or when things change. We are in an age of application updates, virtual and

physical mixed environments as well as and a whole new set of data deduplication-enabled target devices.

How you use server virtualization makes a difference to how you backup virtual machines. Backup applications need to understand a little

more about virtual machines and the virtual machine image to back them up efficiently. Having an integrated solution that can manage both

physical and virtual environments helps to reduce the number of tools required to protect and manage information and applications spread

across physical and virtual systems in both data centers and disaster recovery sites. An integrated solution that can manage both physical

and virtual environments also helps control storage growth by enhancing visibility into the virtual environment and associated storage

consumption, by using deduplication and archiving, and by stopping unnecessary backup operations. This helps eliminate bottlenecks and

application impact associated with backup, using optimized snapshot and off-host technologies, without sacrificing file or disaster recovery

capability.

Organizations should be concerned about the risk of downtime when altering production systems, as well as the fear of managing a complex

virtualized environment. This is specifically where Symantec can help. By taking a strategic approach to reducing the complexity of managing

a virtualized environment organizations are able to streamline their backup environment, cutting costs and improving manageability.

Backup Exec 2012 supports both VMware vSphere 4.0/5.0 environments as well as Microsoft Server 2008 R2 Hyper-V environments, and

helps to reduce the time and cost of managing separate backup solutions for your virtual systems. With Backup Exec 2012 you can manage

both virtual and physical backups.

Data deduplication is ideal for VMware environments:

• It reduces the backup window and helps achieving faster backups (including remote sites)

• It reduces the amount of storage required for data backup

• It increases bandwidth efficiency from remote sites

• Ideal for WAN, LAN or SAN based environments

• Allows users to adopt 3rd party Open Storage (OST) deduplication disk devices

• Reduces overall storage cost

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

22

Page 26: BE Fundamental and Comparison Guide

Backup Exec 2012 Agent for VMware and Hyper-V: VMware Environments

• Support for VMware vSphere, vCenter, and vStorage

• Stage-less backup and restore (no proxy server)

• Single-pass, image-based virtual machine backups

• Block Optimization (skipping of empty space within a virtual machine)

• Backup over SAN support

• vSphere block level Differential/Incremental backup

• Virtual Machine Template File Backups

• Deduplication optimized for VMware backups

• Dynamic inclusion of new virtual machines

• Full virtual machine recovery

• Individual file and folder recovery

• Application Granular Recovery (Exchange, SQL, SharePoint, AD)

• Redirected restore - Support for Folders and Resource pools

• VMware Storage Distributed Resource Scheduling support

Backup Exec 2012 Agent for VMware and Hyper-V: Hyper-V Environments

• Complete protection for Hyper-V 2008 R2, including Cluster Shared Volumes (CSV)

• Single agent protects the entire Hyper-V host and all Windows and Linux Guest virtual machines

• Protection of Live Migration-enabled virtual machines

• Stage-less backup and restore (no proxy server)

• Single-pass, image-based virtual machine backups

• Block Optimization (skipping of empty space within a virtual machine)

• Hyper-V block level Differential/Incremental backup

• Optional deduplication support of virtual machines

• Virtual Application Granular Recovery Technology support for object level recovery of virtualized applications SQL, Exchange, and Active

Directory

• Single Pass Backups for complete virtual machine recovery or individual file/folder level recovery

What you could consider fWhat you could consider for Virtual machine proor Virtual machine protection:tection:

Backup Exec Media Server License

This is the core Backup Exec product. This license enables a server to act as the backup media for your backup strategy and manages each

agent or option that you add to your backup solution.

Agent for Windows Systems

This agent provides the platform for all application and database backup on Windows O/S.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

23

Page 27: BE Fundamental and Comparison Guide

or Agent for Linux Servers

This agent provides high-performance network wide data protection and recovery for 32-bit and 64-bit remote Linux servers.

Symantec System Recovery Server Edition

This is a simple, cost-effective backup and recovery solution for any businesses that requires simple disaster recovery for windows systems.

Agent for VMware and Hyper-V

This agent delivers complete disk-to-disk-to-tape based data protection for VMware virtual environments or Windows Server 2008 R2 running

Hyper-V. A single agent provides support for an unlimited number of virtual guests running on a machine while protecting existing physical

server files and Windows applications.

Deduplication Option

This option only backs up unique data blocks rather than backing up everything – again - and reduces the amount of backup data stored to

disk.

Exchange Mailbox Archiving Option 1-10

This option frees up storage space for Exchange and dramatically reduces backup times as well as giving you a much better idea of your real

storage growth and storage requirements.

And/or the appropriate number of Backup Exec 2012 Agent for Application and Databases

• for Microsoft® Exchange Server

• for Microsoft SQL Server®

• for Microsoft SharePoint®

• for Windows Active Directory®

• for Lotus Domino®

• for Oracle®

• for Enterprise Vault

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

24

Page 28: BE Fundamental and Comparison Guide

Storage Management

Overview

Storage management used to be all about where to put your backup tapes. Things have moved on since then and operations can no longer

afford to ignore the need for a sound storage and server management systems. The System Administrator’s role conjures up images of IT

staff running themselves ragged. With manual systems, Data Centre Management is fraught with error, and inevitably costly and labor

intensive. At the same time, the amount of data the IT Manager is trying to manage is growing exponentially. With apparently no help on the

horizon, how are they going to keep the whole process of data centre management under control? Storage management has become costly

and an unwieldy process. It can leave other areas of a business vulnerable, simply because of the lack of resources available. So what is the

answer?

Backing up the same data day after day

Backing up data day after day just adds to the problem – the amount of data being backed up is now at such levels that it is becoming

impossible to sustain. We are currently in the midst of a shift from assembling standard systems in a custom data centre out of physical

components based on standard designs, to assembling a data centre out of virtual components based on designs using modeling techniques.

The watch word is integration, integration, integration. Once, client server data centers were isolated pockets of computing resources, but

now they're integral, mission-critical components of businesses and their success. Cloud computing, virtualization and mobile computing are

all turning IT on its head. But now more than ever data has become a valuable, critical, virtual pool of business resources.

Drive down costs and drive efficiency up

As computing environments evolve into the future, IT organizations need to focus on how to maximize cost efficiencies while planning and

implementing an infrastructure that can incorporate the powerful new business technologies available today; the business needs to stay

competitive. The challenge is how IT can drive down IT costs, improve time to market, and increase utilization across both the server to

storage environment. Virtualization can help drive down the cost of the data centre and reduce the time to get a configuration online,

providing greater capability through the dynamic assembly of lower cost processors into massive networks of computing capability. But the

pull through of data is even greater – thereby increasing the problem.

Increased Complexity

Until now, data centre complexity was managed using the most flexible tool available - people. With virtualization and the increase in

processor count and speed, size of storage and speed of network, the data centre environment of the future will be too complex for an

individual (on their own) to comprehend. The decision to re-architect your data centre to a new environment is a challenging one, but one

that does not necessarily mean huge operational and financial impact. Organizations can build the new IT infrastructure using stepping stone

tools, making the data centre of the future more of a value network centre, pulling together its resources, adding value to organizations

through its flexible and powerful capabilities. Its limits will be on our understanding of how to gain benefit from it. Where the data centre is

located and who owns the hardware within it will be of less concern than the advantage it provides to the business. Even with all this

automation, it will be the people and their understanding of the business that will make the difference.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

25

Page 29: BE Fundamental and Comparison Guide

Storage Management revolves around what you don’t have to manage, not what you do

Optimizing storage to reduce overall storage capacity can be done through integrated archiving and deduplication. Archiving moves old data

off of expensive, primary storage to a separate store so you don’t have to backup the same data day-in, day-out - forever. Deduplication only

backs up data (at a block level) once, using a pointer to the unique data. You can reduce the backup window dramatically with both archiving

and data deduplication. Reduce backup data storage costs and optimize network utilization across physical and virtual environments

providing a solution that will adapt to any environment. Integrated and customizable deduplication offering client deduplication

(deduplicates data at source or remote server - allowing users to deduplicate data from remote offices to headquarters), or at the media

server deduplication (deduplicates data at the point of backup), or through 3rd party appliance (integrates with OpenStorage deduplication

appliances). The options File System & Exchange Mailbox Archiving Options provide unified backup and archiving for growing File Systems

and Exchange environments by archiving data from the backup copy rather than separately pulling data from the source. The archive options

can free up storage space by reducing redundant data from the File Systems and Exchange server sources, and enables the indexing of data

and set retention periods to efficiently manage data lifecycles.

What you could consider fWhat you could consider for opor optimiztimized Storage Management:ed Storage Management:

Backup Exec Server License

This is the core Backup Exec product. This license enables a server to act as the backup media for your backup strategy and manages each

agent or option that you add to your backup solution.

Agent for Windows Systems

This agent provides the platform for all application and database backup on Windows O/S.

or Agent for Mac® Systems

If you are running Mac Systems then you will need this agent, it provides support for on-line non-disruptive backup of Macintosh OS X OS X

10.5, 10.6 and 10.7 operating systems.

or Agent for Linux Servers

This agent provides high-performance network wide data protection and recovery for 32-bit and 64-bit remote Linux servers.

Deduplication Option

This option only backs up unique data blocks rather than backing up everything – again - and reduces the amount of backup data stored to

disk.

Advanced Disk-Based Backup Option

This option speeds both the backup and restore processes using Synthetic and Off-Host backup and True Image restore functionality.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

26

Page 30: BE Fundamental and Comparison Guide

Exchange Mailbox Archiving Option

This option frees up storage space for Exchange and dramatically reduces backup times as well as giving you a much better idea of your real

storage growth and storage requirements.

File System Archiving Option

This option frees up storage space and dramatically reduces backup times as well as giving you a much better idea of your real storage

growth and storage requirements.

VTL Unlimited Drive Option

This option lets you consolidate storage and improve the data restore processes using up to 80 drives per Virtual Tape Library.

Library Expansion Option

The Library Expansion Option means you can add additional drives within multi-drive tape or optical autoloader/library storage systems –

thereby help to grow storage systems.

NDMP Option

This removes the need for transporting the data through the backup media server itself and can enhance the speed of the backup and reduce

the load on the backup server.

With a proven track record spanning over 20 years, Symantec offers an unmatched combination of solutions for storage management

environments based on the industry’s leading data protection technologies as well as world-class partner services and support programs.

Reduce the complexity in your data centre without compromise. Whatever is in your data centre, take control of IT.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

27

Page 31: BE Fundamental and Comparison Guide

Application Recovery

Overview

Not only is the Windows operating system one of the most prevalent business operating systems available, it, together with the applications

that sit on the Windows platform, can create huge amounts of unstructured, unmanaged information in the data centre and on remote

mobile devices. Organizations have to manage the Windows environment and at the same time ensure continuity of operations, the layers of

the infrastructure, the discovery of all IT assets the protection of the infrastructure, the information contained on all devices and the

thousands of business interactions that take place on a daily basis. IT needs to have the tools to protect the business at every level.

The protection, tracking, management, and retrieval of content, is most logically and effectively implemented by IT. As the leader in data

protection and management on the Windows platform, Symantec is ideally placed as a key asset in your efforts to strengthen and streamline

your IT initiatives.

Business Dependence

Today’s organizations depend on IT-wide applications used by everyone from employees and customers to suppliers and partners. Numerous

applications support key business processes such as e-commerce and business intelligence, but they also create a mountain of information

that must be successfully harnessed, securely stored and continually accessible. Organizations that fail to protect application data, or fail to

have a comprehensive data protection plan, are under threat from short- and long-term data loss, with all the revenue, customer loyalty,

share value, brand equity and market share implications it represents. But the protection of data is only a part of the story; the only reason

we backup is to be able to recover.

Test, Test, Test

To backup data without testing the recovery process to make sure that everything works has to be the definition of madness. But as

organizations become more reliant on the rapid, continual availability of information and as data is increasing at such a rapid rate, the means

of achieving both backup and recovery are becoming more complex. Although server and storage hardware continue to improve, IT

infrastructures are growing more complex, adding new potential points of failure. Organizations require rapid, secure and continual

information availability and integrity. Watertight data protection, therefore, is a critical strategy for every organization.

Non-stop, 24-hour operations

Businesses today require data protection solutions to deliver robust, scalable storage management, backup, and recovery, from desktop to

data centre, for both virtual and physical environments through streamlining, scaling, and automating backup throughout the organization.

Organizations need a solution that is fast, flexible, fully automated, and integrated with the storage and data protection architecture.

Modern, Universal Data Protection Solutions

Symantec offers businesses an unmatched combination of affordable solutions that help organizations fully protect their Windows

environment, keeping information available, and manageable; helping to provide Modern, Universal Data Protection Solutions for any

environment as well as disaster recovery, application and data availability and storage management.

• Make sure that your data is safe (from user error)

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

28

Page 32: BE Fundamental and Comparison Guide

• Protect your email - the lifeblood of your business

• Protect your data from system failure (disk does fail)

• Ensure fast data recovery from any disaster

• Be prepared when data growth gets explosive

• Make sure you can recover – to anywhere

Comprehensive Adaptable Solutions

Backup Exec provides multiple methods for data protection for various recovery purposes: single data item corruption, dataset corruption,

storage, server failures, and disaster recovery. Typically media copies that are kept for extended periods of time (for example the monthly or

quarterly full backups), are repurposed as archival versions. Both Backup Exec and the Archiving Option focus on specific data retention and

all aspects of Windows near-term and long-term data preservation across a variety of media and media technology generations. Archival key

functions include: data organization, navigation, search, retrieval, export, collections/grouping, and co-location management, data quality

management: security, integrity, immutability, and disposal. Integrated archiving in Backup Exec helps to control, manage and protect the

data generated by organizations.

Applications and Data

Data does actually create itself, but it is the applications we run that certainly help. The increase amounts of data we are trying to manage,

store, retrieve, or delete are running management costs skyward. Regardless of how robust, configurable, and flexible your solution may be it

must be automated, fast, and unobtrusive. With the number of IT assets you have to juggle, failure to provide automated processes leads to

IT resources being unnecessarily diverted from other priorities, leaving you and your business exposed to performance degradation and

reduced availability. The company that recognizes this and identifies the best automated solution clearly has a competitive edge. Backup

Exec provides extensive storage management tools to make sure you proactively safeguard your local and remote data and systems from

external and internal threats, helping you achieve greater levels of application protection.

Application and System Disaster Recovery in 10 Minutes

Symantec System Recovery enables IT organizations to combine the speed and reliability of disk-based, bare-metal Windows system recovery

with revolutionary technologies for hardware-independent restoration and lights-out recovery. The result is the ability to restore systems and

applications, or even data anytime, from anywhere, to virtually any device. Businesses can now help dramatically minimize downtime for

critical IT services by rapidly recovering entire systems to dissimilar hardware platforms or to, or from, virtual environments.

What you could consider fWhat you could consider for Application Recoveror Application Recovery:y:

Backup Exec Server License

This is the core Backup Exec product. This license enables a server to act as the backup media for your backup strategy and manages each

agent or option that you add to your backup solution.

Agent for Windows Systems

This agent provides the platform for all application and database backup on Windows O/S.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

29

Page 33: BE Fundamental and Comparison Guide

or Agent for Mac® Systems

If you are running Mac Systems then you will need this agent. It provides support for on-line non-disruptive backup of Macintosh OS X 10.5,

10.6 and 10.7 operating systems.

or Agent for Linux Servers

This agent provides high-performance network wide data protection and recovery for 32-bit and 64-bit remote Linux servers.

Agent for Applications and Databases:

• For Microsoft® Exchange Server - The Exchange Agent can granularly recover from a single full backup while the application is still

online. If you have Exchange you will need the Agent for Active Directory.

• For Microsoft SQL Server® - This agent give you continuous protection of SQL databases, removing the need for a daily backup window

for SQL server and enables recovery of database transactions right up to the time of the system failure.

• For Microsoft SharePoint® - This agent enables users to restore individual documents, sites and list items from a single Pass backup

(one backup), either directly back into the original document library or to an alternative file system. If you have SharePoint you will need

the Agent for Active Directory.

• For Windows Active Directory® - This Agent reduces the time to recover individual items in AD and individual user accounts, or

organizational units, even whole individual records from a single pass backup (only one backup) while AD remains online – with no

reboots. If you have Exchange or SharePoint you will need this agent.

• For Lotus Domino® - The agent supports both 32-bit and 64-bit versions of Lotus Domino including partitioned and clustered Lotus

Domino servers and new support for Domino Attachment Object Service (DAOS) store and associated NLO files.

• For Oracle® - The Oracle agent provides protection of individual table spaces or a complete application/database backup as well as the

protection of archived redo logs and control files, without ever taking them offline.

• For Enterprise Vault - This agent provides integrated backup protection for Symantec Enterprise Vault archives with full application

protection for its directory databases, partitions, or vault stores and indexes.

Exchange Mailbox Archiving Option

This option frees up storage space and dramatically reduces backup times as well as giving you a much better idea of your real storage

growth and storage requirements.

Backup Exec 2012 Small Business Edition

Backup Exec 2012 Small Business Edition (BESBE) is an all-in-one package for small businesses that replaces all Backup Exec Microsoft

Small Business Server (BE SBS) Editions and protects up to 3 virtual or physical servers.

Symantec System Recovery 2011 Server Edition

This is a simple, cost-effective backup and recovery solution for any businesses that requires simple disaster recovery for windows systems.

Symantec Desktop and Laptop Option

This option delivers data protection to desktops and laptops whether in the office or on the road.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

30

Page 34: BE Fundamental and Comparison Guide

Symantec System Recovery 2011 Desktop Edition

This is a reliable system recovery solution designed to quickly recover failed Windows-based desktop PCs and remote laptop systems back to

an operative state.

With a proven track record spanning over 20 years, Symantec offers an unmatched combination of business solutions for the Windows

environment based on the industry’s leading data protection technologies as well as world-class partner services and support programs.

Reduce the complexity in your data centre without compromise. Whatever is in your data centre, take control of IT.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

31

Page 35: BE Fundamental and Comparison Guide

Disaster Recovery

Overview

Business leaders are faced with the challenge of keeping their business running and growing, no matter what. This requires planning to

mitigate against the risk or impact of a planned or unplanned disruption on the organization’s staff, facilities, processes, reputation, brand,

customer relationships, applications, data, IT infrastructure, and value-creating activities.

There are numerous figures that have been published over the past few years, showing this loss and that, for minutes, days, and weeks of

outage for differing vertical business sectors. And yet, there seems as if there is no one formula to fit all. No one is able to come up with a set

of rules to explain the impact of downtime to an organization. Granted, calculating an organization’s total financial loss due to network and

system downtime is not a simple undertaking. There are many tangible and intangible impacts that must be factored into the equation.

The simple equation is easy and most of us can do it in our heads. Income, multiplied by time, but that is merely a superficial formula. Lost

revenue is the most obvious, most visible and most easily identified cost of downtime, and the calculation above is a reasonable ballpark

figure of that loss (notwithstanding sale fluctuations, calendar and time). But this simple calculation is also grossly inadequate and only

touches lightly on the real costs to the organization.

When we talk about the impact system failure can have on a business we usually think of loss of revenue during downtime. However, the

impact is far greater than the inability to carry out transactions. The true effect to a business should be measured in terms of operations,

financials, regulatory and legal implications. If a business is forced to operate without its systems for a significant period of time, the day-to-

day information we are used to extracting at the touch of a button will require tedious research and manual labor. Transactions that would

normally take place automatically will cease, staff will be unemployed without these systems, personnel and operating regulations will be

more difficult to adhere to and subsequently the efficiency of a business will suffer and management will be faced with making vital decisions

to carry the operation through the crisis.

Protecting information

Information comes in many forms and through a multitude of different channels. One of the great business challenges is to gather all of that

information and to create a useful integrated resource that can become a part of the corporate knowledge and be shared amongst those that

have a need to access it. If you get it right, the end result is a more agile business with much improved intelligence.

As the information-driven organization evolves, the demands placed upon the data storage infrastructure become stronger. Accepted wisdom

indicates that the basic storage requirement for organizations doubles every one or two years. This is increased further as the need to take

backup copies, mirrors and replicas is taken into account. As the volume of data stored increases and as the importance of information to the

organization grows, an unacceptable burden of management is placed onto the organization.

Should any of the fundamental functions within a business be disrupted then inevitably the lack of cash flow will prevent the company from

deploying capital to keep the business running. The ultimate risk is that credit ratings suffer, shares go down, the business is unable to fulfill

the legal requirements of suppliers’ contracts, customers lose faith and may never return, and significant costs can be associated with

restoring servers and systems. What is required is a solution that is simple and easy to install and manage, given that integration is so

difficult and time consuming. This presents the greatest challenge to the success of continuity and recovery. The more integrated the IT

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

32

Page 36: BE Fundamental and Comparison Guide

infrastructure application environment is, the harder it is to recover, no matter what the process. This is because so much more must be

available simultaneously.

So when looking at the most appropriate data protection solution for your business, the business contingency planner needs to identify the

critical functions within the business and estimate the loss for an outage and the effect time has on the impact. Once you have determined

the impact of an incident on a business function, you can determine the recommended recovery timeframe for the function. Once the critical

and necessary business functions have been identified, the next step is to establish the resources that are required to continue to perform

those functions.

When something goes wrong, the two most important questions that every company has to answer are:

• How much data can I afford to lose (this is called the Recovery Point Objective)?

⁃ How quickly must my systems be back on-line (this is called the Recovery Time Objective)?

RPO and RTO

These are the two most critical questions to answer and vary from business to business. The Recovery Point Objective is the amount of data

loss the application and business can sustain. Vaulting is archived data on tape and tends to be days old. Backup can restore from disk and is

therefore quicker and the loss of data is only hours old. Replication is usually almost continuous so the loss of data is minimal. Recovery Time

Objective is the length of time it takes to get the application back on line and everybody working again. Restoring from tape can be time

consuming: tapes need to be returned from an off-site location, and tape restores take longer than disk. Clustering keeps applications

available almost continuously; therefore, the return to normal business can be made in seconds.

Smaller businesses cannot afford solutions that offer higher levels of technology sophistication and may choose simply to backup their data

to tape. The choices vary from business to business and application to application.

Critical applications can be identified in a number of ways:

• List all functions performed

• Interview business functional managers

• Conducting surveys with employees

⁃ Using a questionnaire with the functional managers

There are two routes available to manage the disaster recovery requirements of your company.

Symantec Backup Exec 2012 delivers reliable backup and recovery. It can protect more data and systems as well as reducing storage costs

and improving backup performance through integrated deduplication and archiving technology. If backup is purely for disaster recovery, you

can to take advantage of automated policy capabilities to delete backups that are no longer required based on age. Reduce business

downtime with technology designed to recover critical Microsoft applications and VMware or Microsoft Hyper-V virtual environments and

restore an entire application or down to a granular email or individual file/folder. You can simply meet your recovery point objectives with

continuous data protection technology and easily manage both Windows and non-Windows systems through a single console.

Backup Exec 2012 now offers a new integrated solution in the core product in to help businesses prepare for and overcome the problem of

server failure and downtime. The new version of Backup Exec 2012 includes integrated bare metal recovery and dissimilar hardware recovery

– also known as hardware discovery - capabilities. These new features make full server recovery easy, and offer it as a built-in element of

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

33

Page 37: BE Fundamental and Comparison Guide

Backup Exec 2012 data and application protection practices. Now, using Backup Exec 2012, a single protection policy for server can protect

it against all types of disaster or failure, and enable all of the following types of recovery:

• Server Recovery

⁃ Bare metal recovery

⁃ Dissimilar hardware recovery

⁃ Application Recovery (agent for Applications and Databases required)

⁃ Granular Application Recovery (agent for Applications and Databases required)

⁃ File and Folder Recovery

All of these recovery capabilities are offered in a single product and solution, Backup Exec 2012.

Alternatively Symantec System Recovery offers a complete, disk-based system recovery solution for Microsoft® Windows®- based servers,

desktops, and laptops. It allows businesses to recover from system loss or disasters quickly and simply to dissimilar hardware platforms,

virtual environments, or in remote, unattended locations. Symantec System Recovery supports VMware, Hyper-V and Citrix and is a quick way

to make individual servers DR ready.

What you could consider fWhat you could consider for Disasor Disaster Recoverter Recovery:y:

Backup Exec Server License

This is the core Backup Exec product. This license enables a server to act as the backup media for your backup strategy and manages each

agent or option that you add to your backup solution.

Agent for Windows Systems

This agent provides the platform for all application and database backup on Windows O/S.

Or Agent for Mac® Systems

If you are running Mac Systems then you will need this agent, it provides support for on-line non-disruptive backup of Macintosh OS X 10.5,

10.6 and 10.7 operating systems.

Or Remote Agent for Linux Servers

This agent provides high-performance network wide data protection and recovery for 32-bit and 64-bit remote Linux servers.

And/or Agent for VMware and Hyper-V

This agent delivers complete disk-to-disk-to-tape based data protection for VMware virtual environments. This agent provides a single agent

to support an unlimited number of virtual guests running on a Windows Server 2008 R2 machine while protecting existing physical server

files and Windows applications.

Backup Exec 2012 Small Business Edition

Backup Exec™ 2012 Small Business Edition (BESBE) is an all-in-one package for small businesses that replaces all Backup Exec Microsoft

Small Business Server (BE SBS) Editions and protects up to 3 virtual or physical servers.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

34

Page 38: BE Fundamental and Comparison Guide

Symantec Desktop and Laptop Option

The Desktop and Laptop Option delivers data protection to desktops and laptops whether in the office or on the road.

For simple imaged based DR you could consider:

Backup Exec System Recovery 2011 Server Edition

This is a simple, cost-effective backup and recovery solution for any businesses that requires simple disaster recovery for windows systems.

Backup Exec System Recovery 2011 Desktop Edition

This is a reliable system recovery solution designed to quickly recover failed Windows-based desktop PCs and remote laptop systems back to

an operative state.

Backup Exec System Recovery 2011 Small Business Server

This is the System Recovery product built for Microsoft Small Business Server, designed for organizations that require a simple system and

data recovery solution for SBS.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

35

Page 39: BE Fundamental and Comparison Guide

Link Description

www.backupexec.com Backup Exec Website

www.backupexec.com/beguide Backup Exec Agent and Option Guide

https://support.veritas.com/docs/304175 Backup Exec in Large Environments

www.backupexec.com/new What’s New in Backup Exec 2012

www.backupexec.com/wpapers Backup Exec 2012 White Papers

https://partnernet.symantec.com/ PartnerNet

www.backupexec.com/collateral Backup Exec Datasheets, Solution Briefs and FAQs

www.backupexec.com/compatibility Backup Exec Software and Hardware Compatibility Documentation

www.symantecsystemrecovery.com Symantec System Recovery Website

www.backupexec.com/skugenerator Backup Exec SKU Generator

For more information visit

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

36

Page 40: BE Fundamental and Comparison Guide

Glossary of some Terms

A

Active Directory - Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture

ActiveX - ActiveX controls are software modules based on Microsoft's Component Object Model (COM) architecture

ADO (ActiveX Data Objects) - Microsoft ADO is a Component object model object for accessing data sources It provides a layer between

programming languages and databases, which allows a developer to write programs which access data, without knowing how the database is

implemented

AES (Advanced Encryption Standard) - Encryption method using 128 up to 256 bits

AIT (Advanced Intelligent Tape) - A tape device and media technology introduced by Sony Corporation

ANSI (American National Standards Institute) - A coordinating organization for voluntary standards in the United States

Appliance - An intelligent device programmed to perform a single well-defined function, such as providing file, web, or print services

Archive - A consistent copy of a collection of data, usually taken for the purpose of maintaining a long-term durable record of a business or

application state

Archiving - The act of creating an archive

ARP (Address Resolution Protocol) - The protocol used by an IP networking layer to map IP addresses to lower level hardware (i.e., MAC)

addresses

Array – Disk storage device

ASP(Active Server Pages) - A specification for a dynamically created Web page with a ASP extension that utilises ActiveX scripting

ASPNET - is used to create Web pages and Web services and is an integral part of Microsoft's NET vision

Asynchronous - A type of two-way communication that occurs with a time delay, allowing participants to respond at their own convenience

ATA (Advanced Technology Attachment) - ATA interface is used to connect storage devices, such as hard disc drives, DVDs and CD-R/Ws

ATAPI (AT Attachment Packet Interface) - ATAPI is the protocol by which CD-ROM drives communicate with a computer system over an IDE

interface

Audit trail - A chronological record of system resource usage This includes user login, file access, other various activities, and whether any

actual or attempted security violations occurred, legitimate and unauthorized

Authentication - A security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an

individual's authorisation to receive information

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

37

Page 41: BE Fundamental and Comparison Guide

Authorisation - The limiting of usage of information system resources to authorised users, programs, processes or other systems

Availability - The amount of time that a system is available during those time periods when it is expected to be available

B

Backup - A collection of data stored on (usually removable) non-volatile storage media for purposes of recovery in case the original copy of

data is lost or becomes inaccessible

Backup window - An interval of time during which a set of data can be backed up without seriously affecting applications that use the data

Bandwidth - The difference in Hertz between the highest and the lowest frequency in a transmission

Biometric Authentication - A method of generating authentication information for a person by digitizing measurements of a physical

characteristic, such as a fingerprint, a hand shape, a retina pattern…

BIOS (Basic Input Output System) - The part of the operating system that provides the lowest level interface to peripheral devices The BIOS is

stored in the ROM on the computer's motherboard

Block - The atomic unit in which data is stored and retrieved on disk and tape devices

Boot Sector - the first sector, or sectors, on any disk, usually containing programming necessary for the boot process

BOOTP (BOOTstrap Protocol) - A protocol that is used by a network node to determine the IP address of its Ethernet interfaces, in order to

effect network booting

Bot (Robot) - Short for Robot, - the term describes little programs designed to perform automated tasks on the Internet such as indexing,

looking/watching for message contents

Broadcast - The simultaneous transmission of a message to all receivers (ports) connected to a communication facility

BSA (Business Software Alliance) - The BSA is a group of software vendors dedicated to fighting software piracy, educating computer users

about software copyrights and cyber-security

Buffer – (usually known as Data Buffer) is a region of memory used to temporarily hold data while it is being moved from one place to

another.

Buffer overflow - Common program logic error in which input is not checked for length so the data over runs the buffer causing erratic

application behavior

Business Continuity - The ability of an organization to continue to function even after a disastrous event, accomplished through the

deployment of redundant hardware and software

Business Continuity Planning - Prepared (and tested) measures for protection of critical business operations from the effects of a loss,

damage or other failure of operational facilities providing crucial functions

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

38

Page 42: BE Fundamental and Comparison Guide

C

Cache - A high speed memory or storage device used to reduce the effective time required to read data from or write data to a lower speed

memory or device

Cache poisoning - Cache poisoning, also called domain name system (DNS) poisoning or DNS cache poisoning, is the corruption of an

Internet server's domain name system table by replacing an Internet address with that of another, rogue address

CAS (Content Addressed Storage) - A storage methodology designed for rapid access to fixed content

Cascading - The process of connecting two or more Fibre Channel hubs or switches together to increase the number of ports or extend

distances

Catalog - A stored list of backed up files and directories and the locations of the backup copies

CCRC (Computer Crime Research Center) - US organization, the mission of the CCRC is to research and warn of unlawful acts involving

computer and information technologies, including computer crimes, internet fraud and cyber terrorism

CDP (Continuous Data Protection) - Storage system in which all the data in an enterprise is backed up whenever any change is made

CERT (Computer Emergency Readiness Team) - Established in 1988, the CERT® Coordination Centre (CERT/CC) is a centre of Internet security

expertise, located at the Software Engineering Institute, a federally funded research and development centre operated by Carnegie Mellon

University

Certificate (Digital certificate) - An electronic document attached to a public-key by a trusted third party, which provides proof that the

public-key belongs to a legitimate owner and has not been compromised

Certification - Endorsement of information by a trusted entity

CGI (Common Gateway Interface) - CGI is a programming method of passing information between a Web site and an applications program

and back again

Checkpoint - The recorded state of an application at an instant of time, including data, in-memory variables, program counter, and all other

context that would be required to resume application execution from the recorded state

CIFS (Common Internet File System) - A network file system access protocol originally designed and implemented by Microsoft Corporation

under the name Server Message Block protocol, and primarily used by Windows clients to communicate file access requests to Windows

servers

Cipher - The core algorithm used to encrypt data A cipher transforms regular data (plaintext) into a coded set of data (ciphertext) that is not

reversible without a key For example, AES and DES are examples of secret key block ciphers

Client – end-user, or application that runs on an end-user personal computer

Cluster - A collection of computers that are interconnected (typically at high-speeds) for the purpose of improving reliability, availability,

serviceability and/or performance

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

39

Page 43: BE Fundamental and Comparison Guide

Compliance - In the storage context, compliance refers to a whole bundle of legislation, rules and conventions which impact the way that data

is stored, archived, retrieved and encrypted

Compression - The process of encoding data to reduce its size

Consolidation - Cost reduction process to optimize IT resources by locating them in a central location

Contingency Planning - The development of a management plan that uses alternative strategies to ensure project success if specified risk

events occur

CRC (cyclic redundancy check) - A scheme for checking the correctness of data that has been transmitted or stored and retrieved

Cryptography - A single means of encryption or decryption

CSI (Computer Security Institute) - CSI is a membership organization specifically dedicated to serving and training the information, computer

and network security professionals

Cylinder - Structure data organization on a disk drive

D

D2D2T - An approach to computer storage backup and archiving in which data is initially copied to backup storage on a disk storage system

and then periodically copied again to a tape storage system

DAS (Direct Attached Storage) - DAS is storage that is directly connected to a server by connectivity media such as parallel SCSI cables

Data Protection - Solutions used to protect Data

DBMS (Database Management System) - An set of computer programs with a user and/or programming interface that supports the definition

of the format of a database, and the creation of and access to its data

Defragmentation - Operation performed on a disk drive to group files in order to optimize access time

DES (Data Encryption Standard) - A cryptographic data protection algorithm published by the National Institute of Standards and Technology

Digital Signature - The digital equivalent of a written signature, providing cryptographic evidence that the original document is authentic,

unaltered, not forged, and non-repudiable, almost always using a public-key algorithm

Disaster Recovery - The ability to recover from the loss of a complete site, whether due to natural disaster or malicious intent Disaster

recovery strategies include replication and backup/restore

Disaster Recovery Plan - A plan to describe all processes to recover after a disaster

Disk array - A set of disks from one or more commonly accessible disk subsystems, combined with a body of control software

DLT (Digital Linear Tape) - A family of tape device and media technologies developed by Quantum Corporation

DMA (Direct Memory Access) - Direct memory access between microprocessor and a peripheral

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

40

Page 44: BE Fundamental and Comparison Guide

DMTF (Distributed Management Taskforce) - An industry organization that develops management standards for computer system and

enterprise environments

DMZ (De Militarized Zone) - A security zone between internet and the internal network

DNS (Domain Name Services) - A computer program that converts between IP addresses and symbolic names for nodes on a network

DRM (Digital Right Management) - Any technology used to protect the interests of owners of content and services

E

ECC (Error Correction Code) - A scheme for checking the correctness of data that has been stored and retrieved, and correcting it if necessary

Encryption - The conversion of plaintext to encrypted text with the intent that it only be accessible to authorised users who have the

appropriate decryption key

ESM – Enterprise Storage Management

F

Fabric - A Fibre Channel switch or more Fibre Channel switches interconnected

Failover - The automatic substitution of a functionally equivalent system component for a failed one Failover applies both to clustering and to

multiple paths to storage

FAT32 - 32 bit File Allocation Table A method of storing information on a hard disk FAT32 supports drives up to 2 terabytes and pathnames

greater that 256 characters

FCAL - A form of Fibre Channel network in which up to 126 nodes are connected in a loop topology

Fibre Channel - Fibre-Channel is an interface standard for connecting computers to mass storage devices such as disk drives and tape

libraries

Fragmentation - The state of having a file scattered around a disk in pieces rather than existing in one contiguous area of the disk

Fragmented files are slower to read than unfragmented files

FTP (File Transfer Protocol) - The File Transfer Protocol is an application program which moves files between computers connected to the

Internet independent of machine type or operating systems

Full backup - A backup in which all of a defined set of data objects are copied, regardless of whether they have been modified since the last

backup

G

Garbage collector - a particular class of strategies for dynamically but transparently reallocating computer memory in running applications

GB/s - A throughput of 1 Billion bits per seconds

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

41

Page 45: BE Fundamental and Comparison Guide

GBIC (GigaBit Interface Converter) - An interface module which converts the light stream from a Fibre channel cable into electronic signals for

use by the network interface card

H

HBA (Host Bus Adapter) - An interface card which plugs into the computer's bus and connects it to the network

Host – Servers, or a device that houses, applications or data

Holographic storage - Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions

Hotfix - A single cumulative package composed of one or more files used to address a problem in a product

HTML (Hypertext Mark-up Language) - The set of tags or “mark-up" codes that describe how a document is displayed by a web browser

HTTP (Hypertext Transfer Protocol) - An application level protocol, usually run over TCP/IP that enables the exchange of files via the World

Wide Web

I

ICMP - A control protocol strongly related to IP and TCP, and used to convey a variety of control and error indications

IDE (Integrated Drive Electronics) - This is a commonly used interface for hard disk drives and CD-ROM drives

ILM (Information Lifecycle Management) - The process of managing information growth, storage, and retrieval over time, based on its value

to the organization

Imap 4 (Internet Message Access Protocol)

Imap 4 is an application layer Internet protocol used for accessing email on a remote server from a local client

In band (Virtualisation) - Virtualisation functions or services that are in the data path In a system that implements in-band virtualisation,

virtualisation services such as address mapping are performed by the same functional components used to read or write data

Inode - A persistent data structure in a UNIX or UNIX-like file system that describes the location of some or all of the disk blocks allocated to

the file

Integrity (information) - Information integrity is the trustworthiness of information It is a state of information that collectively describes the

accuracy, consistency and reliability of the information

IP tunneling - An encapsulating network protocol that enables one network to send its data inside another network's connection

IPv6 - A generation of the Internet Protocol, designed not only to extend the address space (to cope with growth in Internet usage) but also to

take advantage of concepts like multicast and the quality of service

iSCSI - iSCSI is a software package which emulates SCSI protocols, but the connection method is via an IP network instead of a direct SCSI

compatible cable

ISO (International Standards Organisation) - The international standards body

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

42

Page 46: BE Fundamental and Comparison Guide

J

J2EE - A platform-independent, Java-centric environment from Sun for developing, building and deploying Web-based enterprise applications

online

Java - Java is an applications programming language which was developed by SUN Microsystems now owned and developed by Oracle –

alternatively is rather nice coffee

JavaBeans - JavaBeans architecture provides a way of designing reusable software components that can be visually manipulated in builder

tools

JavaScript - Java Script is an interpreted scripting language

JBOD (Just a Bunch of Disks) - A group of disks housed in its own box JBOD differs from RAID in not having any storage controller intelligence

or data redundancy capabilities

JDBC (Java Database Connectivity) - JDBC is a Java API that enables Java programs to execute SQL statements This allows Java programs to

interact with any SQL-compliant database

JVM (Java Virtual Machine) - The Java virtual machine executes instructions that a Java compiler generates This run time environment, or

JVM, is embedded in various products, such as web browsers, servers, and operating systems

K

kB -The kilobyte is a multiple of the unit byte for digital information. k- stands for kilo, meaning 1,000, while Ki- stands for kilobinary ("kibi-"),

meaning 1,024. The standardized binary prefixes such as Ki- were relatively recently introduced and still face low adoption. K- is often used

to mean 1,024, especially in KB, the kilobyte.

Suffix: b vs B

b stands for bit and B stands for byte. In the context of data rate units, one byte refers to 8 bits. For example, when a 1 Mbps connection is

advertised, it usually means that the maximum achievable download bandwidth is 1 megabit/s (million bits per second), which is actually

0.125 MB/s (megabyte per second), or about 0.1192 MiB/s (mebibyte per second)

Kernel - In computing, the kernel is the main component of most computer operating systems; it is a bridge between applications and the

actual data processing done at the hardware level.

KVM –Kernel-based Virtual Machine (KVM) is a virtualization infrastructure for the Linux kernel.

KVM switch - A KVM switch (with KVM being an abbreviation for keyboard, video or visual display unit, mouse) is a hardware device that

allows a user to control multiple computers from a single keyboard, video monitor and mouse.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

43

Page 47: BE Fundamental and Comparison Guide

L

LAN – Local Area Network, most LANs are confined to a single building or group of buildings

LBA (Logical Block Addressing) - The address of a logical block

LDAP (Lightweight Directory Access Protocol) - An LDAP server centralizes network user information

LDM (Logical Disk Manager) - A name for the volume management control software in the Windows operating system

Library, Tape – Magnetic tape storage device

Logical Unit - The entity within a SCSI target that executes I/O commands Tape drives and array controllers may incorporate multiple logical

units to which I/O commands can be addressed

LTO (Linear Tape Open) - Technology was developed jointly by HP, IBM and Seagate to provide a clear and viable choice in an increasingly

complex array of tape storage options

LUN (Logical Unit Number) - A logical unit is a division of a storage disk or a set of disks

LUN Masking - A method to restrict server access to storage not specifically allocated to that server

LVD (Low Voltage Differential) - Low Voltage Differential technology is used for the production of special cables and circuitry used on the

newer SCSI hard drives which deliver data at very high speeds

M

MAC (Media Access Control) - Algorithms that control access to physical media, especially in shared media networks

MAN – Metropolitan Area Network is a data network designed for a town or city. In terms of geographic breadth, MANs are larger than local-

area networks (LANs), but smaller than wide-area networks (WANs). MANs are usually characterized by very high-speed connections using

fiber optical cable or other digital media.

Mapi (Messaging Application programming - A standard Windows interface for messaging that enables different mail programs and other

mail-aware applications like word processors and spreadsheets to exchange messages and attachments with each other

MBR (Master Boot Record) - Data present on the first sector of an hard drive, containing information needed to load operating system

Memory leak - A bug in a program that prevents it from freeing discarded memory and causes it to use increasing amounts of memory

Message Digest (MD) - A number that is derived from a message If you change a single character in the message, it will have a different

message digest

Mirroring - A form of storage array in which two or more identical copies of data are maintained on separate media

Multimode - A fiber optic cabling specification that allows up to 500 meter distances between devices

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

44

Page 48: BE Fundamental and Comparison Guide

Multipathing - Multipathing is the use of redundant storage network components responsible for transfer of data between the server and

storage

Multi-threading - Used to described processes in computer systems

Multi-streaming - Multistreaming is a backup method by which a client sends multiple data streams simultaneously.

N

NAS (Network Attached Storage) - Term used for RAID, tape and other mass storage systems which have an integral network connection such

as Ethernet or Fibre-channel

NAT (Network Address Translation) - NAT is a technique in which the source and/or destination addresses of IP packets are rewritten as they

pass through a router or firewall

NCSC (National Computer Security Center) - The arm of the US National Security Agency that defines criteria for trusted computer products

NDMP (Network Data Management Protocol) - A communications protocol that allows intelligent devices on which data is stored, robotic

library devices, and backup applications to intercommunicate for the purpose of performing backups

NFS (Network File System) - A distributed file system and its associated network protocol originally developed by Sun Microsystems

Computer Corporation and commonly implemented in UNIX systems

NTFS (NT File System) - The file system for the Windows NT/2000/XP Operating System NTFS cannot be accessed by other Operating Systems

such as DOS It provides increase reliability and security in comparison to FAT

O

ODBC (Open Database Connect) - This is an interface developed by Microsoft, X/Open, and others that allows applications to access diverse

databases with a single, flexible interface

Offline backup - A form of backup in which the data being backed up is not accessed by applications for the duration of the backup

O/S – the Operating System is the most important programme that runs on a computer. Every general-purpose computer must have an

operating system to run other programs

Off-Host – not installed on the server, usually in the fabric or switch

Out of band (Virtualisation) - Virtualisation functions or services that are not in the data path

P

Partition - A partition is the portion of a physical disk or LUN that functions as though it were a physically separate disk

Patching - A method of updating a file that replaces only the parts being changed, rather than the entire file

Peer to peer - A network that allows two or more computers to share their resources

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

45

Page 49: BE Fundamental and Comparison Guide

Petabyte - A Petabyte is 1,024 Terabytes

PHP (Hypertext Pre-processor) - PHP is an open source, server-side, HTML embedded scripting language used to create dynamic Web pages

PING (Packet Internet Groper) - 'Ping' stands for Packet Internet (or Inter-Network) Groper and is a packet (small message) sent to test the

validity / availability of an IP address on a network

Ping of death - A ping request that crashes the target computer, it is caused by an invalid packet size value in the packet header

PKI (Public Key Infrastructure) - A framework encompassing the laws, policies, standards, hardware, and software to provide and manage the

use of public key cryptography on public networks

PPP (Point to Point Protocol) - PPP is a protocol for communication between two computers using a serial interface, typically a personal

computer connected by phone line to a server

Provisioning - The process enabling administrators to assign system resources and privileges to users

Proxy server - A proxy server is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can

ensure security, administrative control, and caching service

PST (Personal folder Store) - This is the file/files where the Microsoft Exchange server delivers messages on local computer for offline usage

Public key - One of two keys in public key encryption

Public key encryption - A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key

Q

QOS (Quality of Service) - A set of quality assurance standards and mechanisms for data transmission

R

R/3 - Release 3 of SAP ERP application

RAM - Stands for "Random Access Memory," and is pronounced like the male sheep. RAM is made up of small memory chips that form a

memory module. These modules are installed in the RAM slots on the motherboard of your computer.

Radius (Remote Authentication Dial In User- Radius is a protocol used by Remote Access Server's for user Authentication

RAID (Redundant Array of Independent Disk) - A way of storing the same data over multiple physical disks to ensure that if a hard disk fails a

redundant copy of the data can be accessed instead

RAID 0 (stripping) - This technique has striping but no redundancy of data It offers the best performance but no fault-tolerance

RAID 1 (Mirroring) - Mirroring consists of at least two drives that duplicate the storage of data There is no striping

RAID 4 - A form of parity RAID in which the disks operate independently and all parity check data is stored on one disk

RAID 5 - A form of parity RAID in which the disks operate independently, and parity check data is distributed across the array's disks

RARP (Reverse Address Resolution Protocol) - RARP is a method of mapping the physical Ethernet address to the IP address of the host

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

46

Page 50: BE Fundamental and Comparison Guide

Raw partition - A disk partition not managed by a volume manager

Replica - A general term for a copy of a collection of data

Registry - This is a database used by Microsoft Windows to store configuration information about the software installed on a computer. This

information includes things like the desktop background, program settings, and file extension associations.

Replication - Replication is the process of duplicating mission critical data from one highly available site to another

Replication (asynchronous) - After data has been written to the primary storage site, new writes to that site can be accepted, without having

to wait for the secondary (remote) storage site to also finish its writes

Replication (synchronous) - In synchronous replication, each write to the primary disk and the secondary disk must be complete before the

next write can begin

Retention period - The length of time that a backup image should be kept

Router - An interconnection device that connects individual Local Area Networks (LANs)

RSA -Acronym for both a public key algorithm and a corporation in the business of algorithm design, derived from the names of the founders

(Rivest, Shamir & Adelman)

Restore - The word "restore" means to return something to its former condition. Therefore, when you restore a computer or other electronic

device, you return it to a previous state. This may be a previous system backup or the original factory settings.

S

SAIT (Super Advanced Intelligent Tape) - SAIT (Super AIT) uses half-inch cartridges with native capacities of 500GB (SAIT-1) and 1TB (SAIT-2)

Both formats use the helical scan recording method and employ advanced metal evaporated tape

SAN (Storage Area Network) - A network whose primary purpose is the transfer of data between computer systems and storage elements and

among storage elements

SCSI (Small Computer System Interface) - A high performance parallel interface for connected mass storage devices such as disk drives to a

computer

SCSI 3 - Uses a 16-bit bus and supports data rates of 40 MB/sec Also called Ultra Wide SCSI

SDLT (Super DLT) – Super DLT (SDLT) provides native capacities of 110GB (SDLT 220), 160GB (SDLT 320) and 300GB (SDLT 600) SDLT drives

can read DLT IV cartridges

Sector - The unit in which data is physically stored and protected against errors on a fixed block architecture disk

Serial ATA (Serial Advanced Technology - SATA is a computer bus primarily designed for transfer of data to and from a hard disk, it is the

successor to the legacy ATA

S-HTTP - An extension to HTTP that uses encryption and digital signatures to provide security in each transaction

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

47

Page 51: BE Fundamental and Comparison Guide

SLA (Service Level Agreement) - An agreement between a service provider, such as an IT department, an internet services provider, or an

intelligent device acting as a server, and a service consumer

SMI-S (Storage Management Initiative) - An interface standard that enables interoperability in both hardware and software between storage

products from different vendors to simplify the management of SAN environment

SMTP (Simple Mail transport Protocol) - The Internet standard protocol for transferring electronic mail messages from one computer to

another SMTP specifies how two mail systems interact and the format of control messages they exchange to transfer mail

SNIA (Storage Networking Industry Association) - An association of producers and consumers of storage networking products whose goal is

to further storage networking technology and applications

SNMP (Simple Network Management Protocol) - An IETF protocol for monitoring and managing systems and devices in a network

SQL (Structured query language) - Structured Query Language or SQL is a type of programming language used to interact with a database

SRM (Storage Resource Management) - Management of physical and logical storage resources, including storage elements, storage devices,

appliances, virtual devices, disk volume and file resources

SSL (Secure Socket Layer) - A protocol that provides secure data communication through data encryption

Striping - A mapping technique in which fixed-size consecutive ranges of virtual disk data addresses are mapped to successive array

members in a cyclic pattern, also known as RAID

Switch - Is a device that joins, filters and forwards packets between LAN segments. Switches operate at the data link layer and sometimes the

network layer and support any packet protocol.

T

TFTP (Trivial File Transfer Protocol) - A simplified version of FTP that transfers files but does not provide password protection or user-

directory capability

Tiered storage - Tiered storage is the assignment of different categories of data (like levels of protection needed, performance requirements,

frequency of use) to different types of storage media to reduce total storage cost

Track - The part of a disk which passes under one read/write head while the head is stationary

Triple DES - any of a number of variations on the DES algorithm - A cryptographic data protection algorithm published by the National

Institute of Standards and Technology

Two-phase commit - A feature of transaction processing systems that enables databases to be returned to the pre-transaction state if some

error condition occurs

Thick Client - Thick clients, also called heavy clients, are full-featured computers that are connected to a network.

Thin Client - Thin clients function as regular PCs, but lack hard drives and typically do not have extra I/O ports or other unnecessary features.

Since they do not have hard drives, thin clients do not have any software installed on them. Instead, they run programs and access data from

a server.

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

48

Page 52: BE Fundamental and Comparison Guide

Throughput - Throughput refers to how much data can be transferred from one location to another in a given amount of time. It is used to

measure the performance of hard drives and RAM, as well as Internet and network connections.

Token - In networking, a token is a series of bits that circulate on a token-ring network. When one of the systems on the network has the

"token," it can send information to the other computers. Since there is only one token for each token-ring network, only one computer can

send data at a time.

In programming, a token is a single element of a programming language.

In security systems, a hard token is small card that displays an identification code used to log into a network.

TTL - "Time To Live” TTL is used when a "ping," or a request for a response, is sent to another computer, such as a server. The TTL represents

the number of hops, or servers in different locations, the request can travel to before returning a failed attempt message.

U

Ultra ATA - A version of the AT Attachment (ATA) standard that supports burst mode data transfer rates of 333 MBps

Ultra DMA/33 - Ultra DMA is a protocol for transferring data between a hard disk drive through the computer's data paths (or bus) to the

computer's random access memory (RAM)

Ultra SCSI - A form of SCSI capable of 20 MB/s

Ultra2 SCSI - A form of SCSI capable of 40 MB/s

Ultra3 SCSI - A form of SCSI capable of 80 MB/s

Ultrium - The high-capacity implementation of LTO technology

V

Virtual machine - A computer that hosts two or more different operating systems or multiple copies of the same operating system with each

instance of the operating system runs its own applications

Virtualization - Virtualization is a means by which multiple physical devices are viewed as a single logical unit

VLAN (Virtual LAN) - Group of devices on one or more LANs that are configured (using management software) so that they can communicate

as if they were attached to the same wire, when in fact they are located on a number of different LAN segments

Volume - Synonym for virtual disk Used to denote virtual disks created by a volume manager control software

VPN (Virtual Private Network) - The extension of a private network that provides encapsulated, encrypted, and authenticated logical links

across shared or public networks

VSS (Volume Shadow Copy Services) - In Windows NET Server 2003 VSS enables heterogeneous interoperation and cooperation between

storage hardware, storage software and business applications

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

49

Page 53: BE Fundamental and Comparison Guide

VTL (Virtual Tape Library) - Storage system that includes a disk, a processor, and software to emulate tape or a tape library

W

WAFS (Wide Area File Services) - WAFS is a storage technology that makes it possible to access a remote data centre as though it were local

WAN – Wide Area Network is a computer network that spans a relatively large geographical area, typically, a WAN consists of two or more

local-area networks (LANs)

WDM (Wave Division Multiplexing) - The splitting of light into a series of “colors” for the purpose of carrying simultaneous traffic over the

same physical fiber

WEP (Wired Equivalent Privacy) - local area networks (WLANs) defined in the 80211b standard

Wide SCSI - Any form of SCSI using a 16-bit data path

Wi-Fi (Wireless Fidelity) - Wi-Fi is a term for certain types of wireless local area network (WLAN) that use specifications in the 80211 family

WORM (Write Once, Read Many) - A non-magnetic disk where, once data had been written to the disk, it could not be deleted, changed, or any

more data added, but could be read, or copied to other media, as many times as required

X

XML (eXtensible Markup Language) - A universal format for structured documents and data on the World Wide Web

Z

Zoning - A method of subdividing a storage area network into disjoint zones, or subsets of nodes on the network

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

50

Page 54: BE Fundamental and Comparison Guide
Page 55: BE Fundamental and Comparison Guide

About Symantec

Symantec is a global leader in providing security,

storage, and systems management solutions to help

consumers and organizations secure and manage

their information-driven world. Our software and

services protect against more risks at more points,

more completely and efficiently, enabling

confidence wherever information is used or stored.

Headquartered in Mountain View, Calif., Symantec

has operations in 40 countries. More information is

available at www.symantec.com.

For specific country offices

and contact numbers, please

visit our website.

Symantec World Headquarters

350 Ellis St.

Mountain View, CA 94043 USA

+1 (650) 527 8000

1 (800) 721 3934

www.symantec.com

Symantec helps organizations secure and manage theirinformation-driven world with data backup andrecovery software.

Copyright © 2012 Symantec Corporation. All rightsreserved. Symantec, the Symantec Logo, and theCheckmark Logo are trademarks or registeredtrademarks of Symantec Corporation or its affiliates inthe U.S. and other countries.Windows is a registeredtrademark of Microsoft Corporation in the United Statesand other countries. Macintosh, Mac, and Mac OS aretrademarks of Apple Inc., registered in the United Statesand other countries. Linux is the registered trademarkof Linus Torvalds in the U.S. and other countries. UNIX®is a trademark of the Open Group. Other names may betrademarks of their respective owners.4/2012 21245173

Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio

Page 56: BE Fundamental and Comparison Guide

Are you looking for: Hosted, cloud-based backup Backup software

Backup software and storage appliance

Symantec Backup Exec.cloud™Symantec Backup Exec™ 2012

Small Business EditionSymantec Backup Exec™ 2012

V-Ray Edition Symantec Backup Exec™ 2012Symantec Backup Exec™ 3600

Appliance

Ideal for businesses withThree or fewer servers and/or

mobile PCs One to three serversVMware® or Microsoft®

Hyper-V®–centric environments Three or more servers 15 or more servers

Overview

Cloud-based backup for servers and PCs • No storage hardware required • Easy-to-use Web-based administration console • Predictable subscription licensing • Easily expands to support Symantec™ Endpoint Protection.cloud

Complete setup in less than 10 minutes • Easy to maintain • One license covers Windows® systems, SQL®, Exchange, SharePoint®, Active Directory®, and Hyper-V • Complete disaster recovery

Designed and licensed for VMware & Hyper-V–centric environments • Agentless VM backup • Integrated deduplication • Full VM, application, file/folder, and granular recovery from single-pass backup

Physical and virtual protection through one console • Complete disaster recovery and integrated deduplication and flexible, granular recovery • Expandable through agents and options or capacity licensing

Integrated data protection software & hardware in one device • Easy to install & configure • Physical and virtual protection through one console • Complete disaster recovery and integrated deduplication and flexible, granular recovery

Licensing

Per server ü ü

Capacity-based ü ü Up to 5.5 TB usable storage space

Licensed per socket-hosting virtual machines ü

Subscription-based licensing ü Service Provider (ExSP)licensing program

Service Provider (ExSP)licensing program

Service Provider (ExSP)licensing program

Service Provider (ExSP)licensing program

Data protection requirements

Optimized for server recovery ü ü ü ü ü

Optimized for server and desktop protection ü

Host and guest level protection for virtual server environments Hyper-V only ü ü ü

Only guest level protection for virtual machines ü

Optimized for pure virtual environments VMware and Hyper-V

Centralized management console ü ü ü ü ü

Centralized Web-based management ü

Optimized for limited IT staff ü ü ü

Data protection for three or fewer servers ü ü

Integrated software, hardware backup, and storage solution ü

Remote office backup ü ü ü

Support for on-premise software using your current storage hardware ü ü ü

Support for hosted backup with no additional storage hardware requirement

ü

Application protection Exchange, SQL only ü ü ü ü

Integrated deduplication ü ü ü

Backup

File level backup ü ü ü ü ü

Incremental backup ü ü ü ü ü

Differential backup ü ü ü ü

To tape ü ü ü ü

Symantec Backup Exec™ Portfolio Comparison Guide

Functionality by Product

Page 57: BE Fundamental and Comparison Guide

Are you looking for: Hosted, cloud-based backup Backup software

Backup software and storage appliance

Symantec Backup Exec.cloud™Symantec Backup Exec™ 2012

Small Business EditionSymantec Backup Exec™ 2012

V-Ray Edition Symantec Backup Exec™ 2012Symantec Backup Exec™ 3600

Appliance

Ideal for businesses withThree or fewer servers and/or

mobile PCs One to three serversVMware® or Microsoft®

Hyper-V®–centric environments Three or more servers 15 or more servers

Overview

Cloud-based backup for servers and PCs • No storage hardware required • Easy-to-use Web-based administration console • Predictable subscription licensing • Easily expands to support Symantec™ Endpoint Protection.cloud

Complete setup in less than 10 minutes • Easy to maintain • One license covers Windows® systems, SQL®, Exchange, SharePoint®, Active Directory®, and Hyper-V • Complete disaster recovery

Designed and licensed for VMware & Hyper-V–centric environments • Agentless VM backup • Integrated deduplication • Full VM, application, file/folder, and granular recovery from single-pass backup

Physical and virtual protection through one console • Complete disaster recovery and integrated deduplication and flexible, granular recovery • Expandable through agents and options or capacity licensing

Integrated data protection software & hardware in one device • Easy to install & configure • Physical and virtual protection through one console • Complete disaster recovery and integrated deduplication and flexible, granular recovery

To disk ü ü ü ü

To cloud Symantec Cloud Third-party cloud* Third-party cloud* Third-party cloud* Third-party cloud*

Recovery

File and folder recovery ü ü ü ü ü

Bare metal recovery ü ü ü ü

Dissimilar hardware recovery ü ü ü ü

Granular recovery of Microsoft Exchange, SQL, Active Directory, and SharePoint applications on physical servers

ü ü ü ü

Granular recovery of Microsoft Exchange, SQL, Active Directory, and SharePoint applications on VMware and Hyper-V servers

Hyper-V only ü ü ü

Centralized search and recovery of stored data ü ü ü ü ü

End-user recovery of backup files ü

Physical to virtual conversion ü Remote agent for physical required

ü ü

Supports recovery to a new machine using system image and operating system

ü

Operating system support

Microsoft servers ü ü ü ü ü

Microsoft desktops ü ü ü ü ü

Linux® ü ü ü ü

Mac® OS ü ü ü ü

Microsoft Hyper-V Guest only ü ü ü ü

VMware ESX®/vSphere™ Guest only ü ü ü ü

Citrix® XenServer® Guest only Guest only Guest only Guest only Guest only

*Third-party cloud support via Nirvanix® (www.nirvanix.com) today and more coming tomorrow

For additional information on desktop only backup and recovery: Symantec Desktop and Laptop Option www.symantec.com/business/products/agents_options.jsp?pcid=pcat_business_cont&pvid=57_1

For additional information on system imaging software: Symantec™ System Recovery www.symantec.com/business/system-recovery-server-edition

To learn more about data protection compatibility, configuration, and installation, visit www.backupexec.com/compatibility

Copyright © 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, and Backup Exec are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 21224408 02/12

Symantec Backup Exec™ Portfolio Comparison Guide

Functionality by Product