the next phase of virtual infrastructure kevin bailey director - product marketing emea symantec...
TRANSCRIPT
The Next Phase of Virtual Infrastructure
Kevin BaileyDirector - Product Marketing EMEASymantec Corporation
The End of the Beginning
The End of the Beginning
3
Virtualization and Service Levels
Storage & Server Mgmt
Data Protection
Security &Compliance
DisasterRecovery
• Storage Virtualization
• Server Virtualization
• Endpoint Virtualization
Best Practices: Getting the ROI from Virtualization
4
Considerations
Hypervisor strategy?
Which applications?
Availability?
Storage?
Security?
Challenges
Increased complexity
Service-level impacts
Resource tracking
Process fragmentation
5
Production Environment
The Next Phase: Standardized Infrastructure for Physical/Virtual
Physical Environment
Storage & Server Mgmt
Data Protection
Security &Compliance
DisasterRecovery
Virtual Environment
6
Data Protection and Virtualization
Innovations
Off-host Backup Architecture
Automated Setup/Discovery
Granular Recovery
Challenges
Performance
Management
Recovery
Storage and VirtualizationToward a Service Delivery Model
Eff
icie
ncy
Time
Drive Up Utilization
Improve Your Operations
Deliver Storage as a Service
Understand Your Current Environment1
2
3
4
Data Center Architecture Has Evolved
8
Virtualization
Virtualization
T O D A Y S A R C H I T E C T U R EL E G A C Y A R C H I T E C T U R E
O/S
App
O/S
App
Monolithic Apps
Static Environment
Big Servers
Static Storage
Storage Management and Virtualization
9
Innovations
Automated dependency tracking
Virtualization-aware mgmt
Integrated hypervisor/storage mgmt
Challenges
Server/Storage Mapping
Resource Visibility
Block-based storage
Disaster Recovery and Virtualization
10
Innovations
• Virtualization-aware clustering• Application awareness• App/Server/Storage• Non-disruptive DR Testing
Challenges
• Local and WAN• P2P, P2V, V2V, V2P• Visibility and Dependency
Tracking
Need for HA/DR is Increasing
Regulatory requirements mean DR is no longer
optional
Virtualization and consolidation is amplifying risk
20% increase in mission critical apps
this year.
Legacy Approach to Clustering Breaks
12
O/S
App
O/S
App
Limitations
Complex
Doesn’t scale
Heavy-weight
Re-active
Introducing an HA/DR Platform for the Modern Data Center
13
Architected for scale Simplifies clustering
Symantec VCS One
Leverages VCS DNA
VCS One Architecture
WEB WEB WEB WEB WEB WEB
DB DB APP APP APP WEB
DB DB WEB WEB APP
APP APP APP
DB
DB
DB DB APP APP
DB
DB
DB DB DB
APP APP APP
DB DB
DB
DB
WEB
APPAPP
WEB
VCS OnePolicy Master
• Client/server,
• No-kernel impact
• Heterogeneous O/S
Scaleable Infrastructure
• Roles based
• Grouping
• Policy
Centralized Management
WEB WEB WEB
APP APP
DB
WEB
WEB
DB
DB
APPAPP
14
Driving Operational Efficiency
Active Active DR
PRODUCTION
DEV/TEST
Capex
Scale-out Control
Opex
Multi-tier HA/DR
DB
APP
WEB
Availability
Getting Started: VCS for VMware
VCS HA/DR
VMware ESX
Hardware (x86)
SF
VM A VM B
SF
SQL
VCS HA/DR
VMware ESX
Hardware (x86)
VM B
SF
SQL
SF
VM C
IIS
SF
VM D
16
17
Client Computing and Endpoint Virtualization
Innovations
Desktop Virtualization
Application Streaming
Presentation Services
Local/Remote Execution
Portable workspaces
Challenges
Device Proliferation
Configuration Mgmt
Application Management
Security
User Experience
Endpoint Virtualization: Transform Client Computing
Portable UserExperience
Centralized App Management
ComprehensiveEndpoint
Protection & Control
app app app app
os os os os
app app app app
os os os os
Improve the end-user experience and lower the cost of managing endpoint devices
Best Practices: Security
19
Best Practices
Establish Zones of Trust
Match VMs to physical servers
Document everything
User privs and ports
Challenges
Hypervisor architectures
Configuration Mgmt
Process ownership
20
The Next Phase of Virtual Infrastructure
• Assume heterogeneity
• Avoid creating silos
• Standardize service level processes where you can
• Start planning future-state client computing architecture
21
Thank You!
© 2008 Symantec Corporation. All rights reserved.
THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY AND IS NOT INTENDED AS ADVERTISING. ALL WARRANTIES RELATING TO THE INFORMATION IN THIS DOCUMENT, EITHER EXPRESS OR IMPLIED, ARE DISCLAIMED TO THE MAXIMUM EXTENT ALLOWED BY LAW. THE INFORMATION IN THIS DOCUMENT IS SUBJECT TO CHANGE WITHOUT NOTICE.
Presenter’s Name
Presenter’s Email
Presenter’s Phone
Presenter’s Name
Presenter’s Email
Presenter’s Phone
For more information on Symantec’s Virtualization Offerings
www.symantec.com/virtualization
www.symantec.com/vmware