making your business-critical application ready for virtualization and the cloud
DESCRIPTION
Service-level issues have kept most organizations from realizing the benefits of virtualization for the business-critical applications with the most demanding SLA’s. Darren Thomson, the CTO at Symantec, shares strategies for addressing the availability, storage, data protection, and security challenges that must be overcome to get the full benefits of virtualization for Tier-1 applications. He shares some real-world best practices and break-through technologies that can prepare companies to take virtualization as far as it can go.TRANSCRIPT
Transforming the Transforming the Data CenterData Center
Room 13a
Transforming the Data Center – Room 13a
Reshaping IT Making Your Business Critical Application Ready for Virtualization and the Cloud
Darren ThomsonDarren ThomsonCTOSymantec
14:00 h
2
14:00 h
3
Going the Distance…
Darren ThomsonCTO, Symantec EMEA, y
T d ’ Obj tiToday’s Objectives
Make Clear Our Product Strategy
Give Insight Into Our Experiences In The Virtualization Space
Share Our Approach & Value Proposition In Virtualization
5
Our Partnership Promise
Creation of a networked society
that is rewarding an secure.
People work and play freely
in a connected world.
• 3rd largest global IT Services Provider ($23B)
• 5th in global server revenue
• 4th largest software company
• #1 market position in 10 security, storage and data protection markets• Customers include over half of F500
• >34.000 patents
storage and data protection markets
• 1000+ global patents
Fujitsu and Symantec are joining forces to offer solutions that meet customer needs in a simpler more affordable way.
Customers expect the two companies toCustomers expect the two companies to offer secure and highly integrated data centre,
managed services and cloud solutions.
Virtualizing Business‐critical Applications
g
6
The Need for a More Information-centric Approach
S t C t i I f ti C t iSystem-Centric Information-Centric
• Transactional• Structured Data
• Collaborative
• Unstructured• On-premise • Unstructured• Distributed
7
The Symantec Strategic “Blueprint”An Information-Centric ModelAn Information Centric Model
ComplianceCompliance ReportingReportingRemediationRemediationPolicyPolicy Identity Identity
ClassificationClassification OwnershipOwnershipThreatsThreats DiscoveryDiscoveryEncryptionEncryption
8
Symantec Architectural Blueprinting
ComplianceCompliance ReportingReportingRemediationRemediationPolicyPolicy Identity Identity
ClassificationClassification OwnershipOwnershipThreatsThreats DiscoveryDiscoveryEncryptionEncryption
9
IT Agility
The Promise of Virtualization
VirtualVirtual Infrastructure
IT Costs
Virtualizing Business‐critical Applications 10
A Recipe For Good IT Strategy
“Allow organisations “Allow organisations to to improve improve ti l ffi i hil tti l ffi i hil toperational efficiency whilst operational efficiency whilst
maintaining an appropriate risk maintaining an appropriate risk posture”posture”postureposture
11
Th Vi t li ti JThe Virtualization JourneyCloud
Increasing…Increasing…Increasing…Increasing…Line of Line of Business Business Line of Line of Business Business
BusinessBusiness‐‐critical Appscritical AppsBusinessBusiness‐‐
critical Appscritical Apps
•• IT ConfidenceIT Confidence
•• Quality of ServiceQuality of Service
•• Resiliency and Resiliency and C liC li
•• IT ConfidenceIT Confidence
•• Quality of ServiceQuality of Service
•• Resiliency and Resiliency and C liC li
File, Print, File, Print, DNSDNS
File, Print, File, Print, DNSDNS
AppsAppsAppsApps
ComplianceCompliance
•• Business AgilityBusiness Agility
ComplianceCompliance
•• Business AgilityBusiness AgilityTest & DevTest & DevTest & DevTest & Dev
The road to the Cloud goes straight through business‐critical virtualization…
Virtualizing Business‐critical Applications 12
Evolving from Silos to Hybrid Cloud
Hybrid Cloud
Key Strategies:1 Virtualize more application Silos of ApplicationSilos of Application1. Virtualize more application
infrastructure
2. Consolidate application silos to a
Silos of Application Silos of Application InfrastructureInfrastructure
2. Consolidate application silos to a service delivery platform
3. Increase automation
Virtualizing Business‐critical Applications 13
Challenges of Business‐critical Virtualization
PerformancePerformance
AvailabilityModernizing for high‐density environments..
i t l d
Security
St M t…across virtual and physical
Storage Mgmt
Virtualizing Business‐critical Applications 14
Symantec and VMware
Collaborative partnership delivering critical Collaborative partnership delivering critical solutions:solutions:
• Data Protection• High Availability
+• Storage Management
• SecurityS t M t
Business‐critical
• Systems Management
• Endpoint Security• NFS File Storage
VirtualizationNFS File Storage
Virtualizing Business-critical Applications 1515
Symantec Solutions for Business-critical Virtualization
Data Protection
Endpoint Virtualization
SecurityData Protection Security
St
Storage Management
HA/DR
Storage Virtualization
Symantec Business‐critical Virtualization Solutions 16
Virtualizing Business‐critical Applications 17
Automation across Virtual and Physical Infrastructure
Virtualizing Business‐critical Applications 18
Virtualization High Availability Challenges
BusinessBusiness‐‐criticalcriticalcritical critical SLA’sSLA’s
Virtualizing Business‐critical Applications 19
High Availability Modernized for Business‐critical Virtualization
• Advanced monitoring for S t A li ti HAS t A li ti HA
gmulti‐tier applications
• Integrated with VMware
Symantec ApplicationHASymantec ApplicationHA
Web LogicWeb Logic
ExchangeExchange SharepointSharepoint
Custom AppsCustom AppsvCenter console
• Policy‐driven restart di t d ith VM HA
SQL*ServerSQL*Server
Web LogicWeb Logic
OracleOracle
SAPSAPIISIIS
Custom AppsCustom Apps
coordinated with VMware HA and vMotion
Virtualizing Business‐critical Applications 20
The Virtualization Security Challenge
• Threat landscape constantly evolving– and more toxic than ever
• Security solutions can’t compromise run‐time performance
• High density increases operational complexity
Virtualizing Business‐critical Applications 21
Security for VMwareB t P t ti
•Symantec Endpoint Protection now with
Best Protection
•Symantec Endpoint Protection, now with…• Insight
• Advanced malware protection with unique cloud-based reputation technology
• Full Protection Stack for Each VM• Network, File, Reputation and Behavior
Virtualizing Business‐critical Applications 22
Security for VMwareBest Protection
12%4% 40%
Compromised100%
84%60%
pNeutralizedDefended
60%
Symantec Endpoint Protection
Trend Micro OfficeScan
McAfee MOVE + HIPS + Site Advisor
Virtualizing Business‐critical Applications 23
Security for VMwareE h d P fEnhanced Performance
7165
2744
54337165
Average Per-VM Disk I/O (Kbps)
2744
Symantec Trend Micro Trend Micro DeepSymantec Endpoint Protection
Trend Micro OfficeScan
Trend Micro Deep Security
Virtualizing Business‐critical Applications 24
Advanced Security for VMware Endpoints
• Symantec Endpoint Vi t lProtection
• Eliminates “AV storms”
VirtualImage
Exception
• Improves performance resultingin a 10x increase in VM density
Disk I/OShared InsightC h
ResourceLeveling PoweredPoweredDisk I/O
↓ by up to 90%
CacheLeveling Powered Powered by by
Insight Insight Maximizes performance
and density without ifi i it
VirtualClientOffline
gg
sacrificing security Client TaggingImage
Scanner
Virtualizing Business‐critical Applications 25
The Virtualization Data Protection Challenge
• More data to protect (and store!)p ( )
• Recovery must span physical and virtual
• Can’t compromise run‐time or operational performance• Can t compromise run‐time or operational performance
• Need multiple recovery options…files, servers, applications
Virtualizing Business‐critical Applications 26
Data Protection Modernized for VirtualizationPrivate Clouds
Symantec Symantec NetBackupNetBackup and Backup Exec with Deduplication Everywhereand Backup Exec with Deduplication Everywhere
Virtual‐aware data protection Reduce storage consumption withDeduplication at the source,Virtual aware data protection and recovery
Reduce storage consumption with single backup, two recovery options
Deduplication at the source, media server, or target
Virtualizing Business‐critical Applications 27
Symantec Redefines Backup and Recovery
V Ray for Data DowntimeV‐Ray for Virtualization
Data Reduction
DowntimeRemediation
The End of Integration Complexity
Symantec Information Management Group ‐ Backup Exec & NetBackup 28
Symantec Endpoint In the Data CenterIn the Data CenterVirtualization Solutions
• Storage optimization and HA
In the Data CenterIn the Data Center
g pwith rapid VM provisioning
• Workspace virtualization and streaming
• Rule‐based license l d h
Supported Client ModelsSupported Client Models
Workspace Virtualizationcompliance and harvesting
• Personalized workspaces for i
p
Workspace Streaming
roaming usersWorkspace Connection Brokering
Virtualizing Business‐critical Applications 29
The Journey to the Cloud Goes Straight through Business‐
Public Saas, PaaS, IaaS Clouds
Cloud Storage, Security, Backup, DR
critical VirtualizationCloud Workload Management
Virtual Private/ Community
g
Hybrid CloudResiliencyResiliency
&&ResiliencyResiliency
&&Virtual Private/ Community Clouds
Consolidation Consolidation & Automation& AutomationConsolidation Consolidation & Automation& Automation
ComplianceComplianceComplianceCompliance
• Evolve from server virtualization to hybrid cloud service delivery
• Leverage public cloud services with confidence
VirtualizationVirtualizationVirtualizationVirtualization
Leverage public cloud services with confidence
IT as a Service: Get There with VMware and Symantec.IT as a Service: Get There with VMware and Symantec.
Virtualizing Business‐critical Applications 30
Thank you.Thank you.
Virtualizing Business‐critical Applications 31
Thank you.Thank you.