SlideShare uma empresa Scribd logo
1 de 10
Demystifying Virtualization for
Demystifying                for
Small Businesses
Executive Brief
White Paper: Demystifying Virtualization for Small Businesses


Demystifying Virtualization for Small Businesses
Demystifying                for
Executive Brief


      Contents

      Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

      What Is Virtualization? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

      What Are the Benefits?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

      Managing a Virtualized Environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

      Security and Backup Considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

      How Do You Start Implementing Virtualization? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

      What Are Other Small Businesses Doing? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

      Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Demystifying Virtualization for Small Businesses
    Executive Brief



           Introduction
           Virtualization is not new. Most businesses have heard about it and the rate of adoption has been growing rapidly for years.
           In fact, analysts predict the adoption rate of virtualization among small to medium-sized businesses will double in the next
           two years, making virtualization technology relatively mainstream.1



           What Is Virtualization?
           There are different types of virtualization: server, desktop, data, operating system, and storage levels.

           The term “virtualization” usually refers to server virtualization, which is dividing a single physical server into multiple
           virtual servers, each running its own operating system and associated workload. Since different virtual machines can run
           different operating systems and multiple applications, they allow for a more efficient use of existing software and
           hardware resources.

           Hypervisor software, or a virtualization manager, makes server virtualization possible by decoupling the operating system
           and applications from the hardware. For example, perhaps a records management company has a business application
           that requires one type of operating system and related configuration and another application that requires a different
           configuration. Hypervisor software allows these applications to run on two different operating system environments within
           a single server.

           Desktop, or endpoint, virtualization enables a centralized server to deliver and manage individual desktops remotely.
           While users enjoy full access to their systems, IT staff can provision, manage, upgrade, and patch them virtually, instead of
           physically. This also means that users can access files and applications on a central server. Companies might also opt for a
           hybrid scenario where users can access some applications through a central virtualized server and others through their
           local computers.



           What Are the Benefits?
           For small businesses with only one or two servers, virtualization is probably not needed. However, for growing businesses
           who find themselves with first two servers, then four, and an increasingly complex network infrastructure, virtualization
           should be considered. Benefits include:

           Greater efficiency: Virtualization allows you to reduce, reuse, and retire existing server platforms. It greatly simplifies the
           physical IT structure, allowing you to manage, secure, and upgrade desktop and laptop computers centrally. Because less
           time is spent completing routine administrative tasks, IT can become more responsive to business needs. Virtual
           environments are also ideal for testing new operating systems, service packs, applications, and configurations before
           rolling them out for production. Finally, if done correctly, virtualization ensures business continuity by reducing the risk of
           IT outages and data loss. Backup and disaster recovery is much simpler and faster, assuming you have solutions in place
           to address storage growth, eliminate backup and recovery bottlenecks, and ensure disaster recovery in case of an
           application failure.



         1-From "Is Your Business Ready for Virtualization? July 13, 2010, http://learning.allcovered.com/category/virtualization/




1
Demystifying Virtualization for Small Businesses
Executive Brief


      Reduced cost: Companies often run just one application per server because they fear an application crash will bring down
      another application on the same machine. As a result, most servers are severely under-utilized, with some estimates
      indicating that most are running at only 10-15 percent of total capacity. With virtualization, you can turn one server from
      single purpose into multi-purpose or turn multiple servers into a flexible computing pool that can adapt to changing
      workloads. Virtualization enables each server to be used at its fullest potential, resulting in fewer physical servers and
      decreasing maintenance costs and time.

      Redundancy/Security: Virtualization provides a more robust infrastructure in case of failures. Because a virtual server
      can be represented by a file (including its operating system, applications, and data), copies of the servers themselves can
      be stored remotely for disaster recovery. In an emergency, a company’s entire virtualized environment can be remotely
      archived, and the backup virtual server accessed by end users, with little or no downtime. In addition, deploying new
      applications and moving application workloads dynamically has never been easier, provided storage management
      considerations have been take into account. Tracking the dependencies between applications deployed on virtual servers
      and their underlying storage resources can be difficult. Automating this process is an essential step in realizing the agility
      benefits that virtualization promises. On the security front, a virtual environment is just as vulnerable to unauthorized
      access as a non-virtual environment and must be protected.



      Managing a Virtualized Environment
      Once you have established a virtual environment, you can control and monitor both virtual and physical servers from a
      single, centralized console. You can easily move existing virtual machines, or “VMs,” to other server platforms, helping you
      pool and share your storage assets, simplifying resource management, and increasing utilization. You can simulate future
      usage patterns to prepare for upcoming changes, track workloads, specify workloads to automatically access spare
      capacity, and transfer usage rights from offline servers during planned and unplanned downtimes. All of these features
      ensure that you maintain service levels for key business applications necessary to keep the business running smoothly.

      While a virtualized environment offers many benefits, it can also bring unintended consequences, including storage
      growth, virtual server sprawl, and problem identification issues.


      Storage management
      The proliferation of easy-to-create virtual machines can result in duplication of data and make backup less efficient if not
      planned properly. Virtualization actually increases the complexities of storage management related to monitoring,
      reporting, and managing a virtual environment. However, storage management solutions improve storage utilization,
      reducing storage backup consumption by deduplicating your data (backing up only what you need by storing a single
      image), and ensuring you can back up once and recover everything.


      Virtual server sprawl
      Virtualization can reduce physical server sprawl, but it actually increases virtual server sprawl because it is so easy and
      fast to provision new virtual machines. You can overcome these obstacles by leveraging tools that provide end-to-end
      visibility of your virtual and physical environment so that you increase storage utilization and reclaim over-provisioned but
      under-used storage.




                                                                                                                                       2
Demystifying Virtualization for Small Businesses
    Executive Brief


          Problem isolation
          Virtualization makes problem isolation challenging. Virtualization encapsulates application components (operating
          system, database, middleware, drivers, network gateways, and so forth) to make it easier to move application workloads
          between servers. However, this also reduces visibility into the state of those components, which can make the
          identification and remediation of disaster recovery issues challenging.

          All of these obstacles can be overcome by leveraging management tools that provide end-to-end visibility of your virtual
          and physical environments.



          Security and Backup Considerations
          Virtualization can pay off big dividends for small businesses, but security remains a concern. You still need to protect your
          business from malicious threats and data loss. Since virtualization makes it easier and faster to deploy new systems, it is
          not uncommon to forgo the security best practices you worked so hard to establish in your physical environment. However,
          it is important to understand that to take full advantage of virtualization, you must still protect your physical and virtual
          environments.

          Virtualization, as effective as it is for maximizing server utilization, can create problems for data protection. For example,
          the proliferation of servers can make backup configuration more time-consuming, increase storage requirements, and add
          complexity to backups and restores. In addition, the consolidation of multiple backup processes onto fewer systems also
          increases the amount of processing power required per server. Backup solutions help small businesses get the most out of
          their virtualization efforts by automatically running backup and restore processes to protect your data.

          Virtualization by itself is not a panacea for disaster recovery. In a disaster recovery scenario, recovering the application is
          one part of the equation, and recovering and restoring access to the application data is the other. Disaster recovery
          solutions for virtual environments have to be data replication aware so that in the event of a failure, applications are
          automatically failed over and remounted to the underlying storage and data on which they depend.

          You’ll need to address the following in your virtual infrastructure:

                1. Make sure you have a good high availability and disaster recovery solution that supports storage recovery in
                     virtual environments to ensure business continuity. Don’t risk leaving information uncontrolled, unprotected,
                     and unmanaged.
                2. Select tools that automate the detection of failures and the recovery of application components across any
                     combination of physical and virtual servers and over any distance.
                3. Check your security best practices. It can be easy to overlook security requirements, leaving some virtual
                     machines and endpoints at risk. Automate this process to ensure that you will meet your compliance
                     requirements and keep your business secure. Make your security policies virtualization-aware through
                     techniques such as randomized scan times or sending patch updates at different times rather than all at once.
                4. Ensure all remote users authenticate when attempting to connect to a server to prevent the intrusion of viruses
                     and malware.




3
Demystifying Virtualization for Small Businesses
Executive Brief


               5. Check your server’s security settings, which dictate security for network traffic to and from the host server.
                   Secure servers (and other devices) with strong passwords, endpoint/antivirus software, intrusion detection
                   systems, and properly configured firewalls.


      Design & Source has 16 employees. With the help of New Jersey-based Symantec™ Partner Baroan Technologies, the
      company upgraded their infrastructure to a virtualized environment, converting five servers to one and significantly
      reducing their power consumption. They also deployed Symantec Backup Exec™ System Recovery to add another layer of
      data protection and provide for more robust disaster recovery for its virtual environment. Backup Exec System Recovery
      takes snapshots every two hours of the company’s three most critical servers: the main administrative server, the server
      hosting the Microsoft® SQL Server-based CRM system, and the image library. Together, they have close to a terabyte of data.
      In the event of a server failure, these snapshots can be used to quickly restore the servers—even to dissimilar hardware. The
      solution also provides deduplication to identify and remove duplicate data that often accrues through attachments sent via
      email.

      Read the full story: http://www.symantec.com/business/confident_smb/article.jsp?aid=march10_cover



      How Do You Start Implementing Virtualization?
      Before virtualization, businesses had to operate separate servers for incompatible platform-specific applications, easily
      doubling the amount of hardware needed. With virtualization, a single server can run multiple, different operating systems
      at once, supporting a variety of business applications. To get started,

               1. Talk to an IT consultant or Value Added Reseller (VAR) who can review your current business processes, growth
                   plans, and IT infrastructure. This contact should be an expert in virtualization and should have implemented
                   several virtualization projects. The consultant should also know how to secure and back up these environments
                   to avoid potential challenges.
               2. Inventory your current IT infrastructure to understand how the environment will be affected by a virtual
                   solution. Think about how you are using your current servers, whether you want to streamline processes, and
                   current usage patterns. Figure out the number of users accessing your virtualized solution and current network
                   traffic patterns.
               3. Determine which hardware and software to virtualize. Older servers, infrequently used servers, and
                   multiprocessor servers dedicated to single-processor applications are good candidates for virtualization.
                   Applications to virtualize might include those in a development or test environment, using a single processor, or
                   those with low usage rates.
               4. Test and deploy the virtualized installation. After building or repurposing old server hardware, assembling
                   necessary component hardware, and integrating networking and storage systems, install the virtualization
                   software and then migrate existing applications to their virtual realms. Before rolling out virtualization
                   company-wide, test it so issues are surfaced and addressed before they impact your users and productivity.




                                                                                                                                       4
Demystifying Virtualization for Small Businesses
    Executive Brief



          What Are Other Small Businesses Doing?
          Small businesses are realizing key benefits from virtualization. In a recent article, David Papp, president of Microtek
          Corporation in Canada, recalled a typical example.2 A client’s server was running on unreliable aging hardware that was
          rapidly running out of disk space. By virtualizing the environment, the company immediately experienced faster and
          smoother performance. Backups became easier and more reliable. Important customer data could be accessed securely
          from remote locations, and a robust disaster recovery plan was implemented. The revamped network and equipment will
          ensure trouble-free operation for the next three to five years.

          Pekham Inc. is a Lansing, Michigan-based non-profit that provides job training and employment opportunities to persons
          with disabilities. The organization’s local IT consultant, Corporate Technologies, helped them migrate their users’ desktops
          to a virtual environment. Instead of accessing applications and files on their individual desktops, users can now access
          their “virtual” desktops from any computer on the network. Instead of buying users new computers, this desktop
          virtualization enabled the organization to use existing computers while still boosting end user performance.

          According to Michael Scalisi, an IT manager in Atlanta, one practical reason for implementing virtualization is to use one
          new server to do the work that might now be done by several older, slower computers. For example, in some small
          businesses, an entire computer is dedicated to serve as a print server, another is running an application such as an
          accounting program, and yet another is being used as a file and email server. With virtualization, one or two servers can
          manage all of these tasks. If one of the virtual environments crashes, it won’t affect the other running environments.

          These are just a few examples to help you think about virtualization. If you have the right tools to protect and manage your
          virtual and physical environments, you can reap significant benefits from virtualization. Security and backup solutions
          designed for the virtual environment ensure that information is controlled, protected, and managed. The benefits are
          proven. Now, it is just a matter of carefully implementing the solution in your business.



          Summary
          Implementing protected virtualization in a business is not difficult or expensive. Many businesses are successfully
          deploying virtual environments and benefiting from them. These businesses are saving money, enjoying increased
          flexibility for growth, and finding it easier to maintain their overall IT infrastructure. However, it is important not to lose
          sight of security and backup considerations. Solutions exist that enable small businesses to take full advantage of
          virtualization while preserving best practices for data protection, storage management, and disaster recovery. By
          protecting and managing your physical and virtual information infrastructure from desktop to data center across any
          server, storage, or virtual machine, you can reap the significant benefits of server and endpoint virtualization. If you’re
          managing a growing business with an expanding pool of servers, applications, and IT demands, you can’t afford not to
          consider virtualization for your business.




         2-http://www.pcworld.com/businesscenter/article/187391/how_a_virtualized_server_saved_one_small_business.html




5
About Symantec
Symantec is a global leader in providing security,
storage, and systems management solutions to help
consumers and organizations secure and manage
their information-driven world. Our software and
services protect against more risks at more points,
more completely and efficiently, enabling
confidence wherever information is used or stored.
Headquartered in Mountain View, Calif., Symantec
has operations in 40 countries. More information is
available at www.symantec.com.




                                                                  Symantec helps organizations secure and manage
For specific country offices        Symantec World Headquarters   their information-driven world with endpoint
                                                                  virtualization, server virtualization, and application
and contact numbers, please         350 Ellis St.                 virtualization.

                                                                  Copyright © 2011 Symantec Corporation. All rights
visit our website.                  Mountain View, CA 94043 USA   reserved. Symantec, the Symantec Logo, and the
                                                                  Checkmark Logo are trademarks or registered
                                    +1 (650) 527 8000             trademarks of Symantec Corporation or its affiliates
                                                                  in the U.S. and other countries. Other names may be
                                                                  trademarks of their respective owners.
                                    1 (800) 721 3934              5/2011 21190853


                                    www.symantec.com

Mais conteúdo relacionado

Destaque

Symantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection StudySymantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection StudySymantec
 
2011 Wintel Targeted Attacks and a Post-Windows Environment APT Toolset
2011 Wintel Targeted Attacks and a Post-Windows Environment APT Toolset2011 Wintel Targeted Attacks and a Post-Windows Environment APT Toolset
2011 Wintel Targeted Attacks and a Post-Windows Environment APT ToolsetKurt Baumgartner
 
Cost of a Data Breach
Cost of a Data BreachCost of a Data Breach
Cost of a Data BreachSymantec
 
The Future does not need Translators. Or does it?- Jean Senellart
The Future does not need Translators. Or does it?- Jean SenellartThe Future does not need Translators. Or does it?- Jean Senellart
The Future does not need Translators. Or does it?- Jean SenellartTAUS - The Language Data Network
 

Destaque (13)

Symantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection StudySymantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection Study
 
2011 Wintel Targeted Attacks and a Post-Windows Environment APT Toolset
2011 Wintel Targeted Attacks and a Post-Windows Environment APT Toolset2011 Wintel Targeted Attacks and a Post-Windows Environment APT Toolset
2011 Wintel Targeted Attacks and a Post-Windows Environment APT Toolset
 
Cost of a Data Breach
Cost of a Data BreachCost of a Data Breach
Cost of a Data Breach
 
2.fraction
2.fraction2.fraction
2.fraction
 
The Future does not need Translators. Or does it?- Jean Senellart
The Future does not need Translators. Or does it?- Jean SenellartThe Future does not need Translators. Or does it?- Jean Senellart
The Future does not need Translators. Or does it?- Jean Senellart
 
Wild perú (material de soporte) - Capítulo Salud
Wild perú (material de soporte) - Capítulo SaludWild perú (material de soporte) - Capítulo Salud
Wild perú (material de soporte) - Capítulo Salud
 
Como evitar enfermarse
Como evitar enfermarseComo evitar enfermarse
Como evitar enfermarse
 
Como evitar enfermarse
Como evitar enfermarseComo evitar enfermarse
Como evitar enfermarse
 
Como evitar enfermarse
Como evitar enfermarseComo evitar enfermarse
Como evitar enfermarse
 
Como evitar enfermarse
Como evitar enfermarseComo evitar enfermarse
Como evitar enfermarse
 
Como evitar enfermarse
Como evitar enfermarseComo evitar enfermarse
Como evitar enfermarse
 
Como evitar enfermarse
Como evitar enfermarseComo evitar enfermarse
Como evitar enfermarse
 
Como evitar enfermarse
Como evitar enfermarseComo evitar enfermarse
Como evitar enfermarse
 

Mais de Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Mais de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Último

Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Último (20)

Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

Demystifying Virtualization for Small Businesses

  • 1. Demystifying Virtualization for Demystifying for Small Businesses Executive Brief
  • 2.
  • 3. White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Demystifying for Executive Brief Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 What Is Virtualization? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 What Are the Benefits?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Managing a Virtualized Environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Security and Backup Considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 How Do You Start Implementing Virtualization? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 What Are Other Small Businesses Doing? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
  • 4. Demystifying Virtualization for Small Businesses Executive Brief Introduction Virtualization is not new. Most businesses have heard about it and the rate of adoption has been growing rapidly for years. In fact, analysts predict the adoption rate of virtualization among small to medium-sized businesses will double in the next two years, making virtualization technology relatively mainstream.1 What Is Virtualization? There are different types of virtualization: server, desktop, data, operating system, and storage levels. The term “virtualization” usually refers to server virtualization, which is dividing a single physical server into multiple virtual servers, each running its own operating system and associated workload. Since different virtual machines can run different operating systems and multiple applications, they allow for a more efficient use of existing software and hardware resources. Hypervisor software, or a virtualization manager, makes server virtualization possible by decoupling the operating system and applications from the hardware. For example, perhaps a records management company has a business application that requires one type of operating system and related configuration and another application that requires a different configuration. Hypervisor software allows these applications to run on two different operating system environments within a single server. Desktop, or endpoint, virtualization enables a centralized server to deliver and manage individual desktops remotely. While users enjoy full access to their systems, IT staff can provision, manage, upgrade, and patch them virtually, instead of physically. This also means that users can access files and applications on a central server. Companies might also opt for a hybrid scenario where users can access some applications through a central virtualized server and others through their local computers. What Are the Benefits? For small businesses with only one or two servers, virtualization is probably not needed. However, for growing businesses who find themselves with first two servers, then four, and an increasingly complex network infrastructure, virtualization should be considered. Benefits include: Greater efficiency: Virtualization allows you to reduce, reuse, and retire existing server platforms. It greatly simplifies the physical IT structure, allowing you to manage, secure, and upgrade desktop and laptop computers centrally. Because less time is spent completing routine administrative tasks, IT can become more responsive to business needs. Virtual environments are also ideal for testing new operating systems, service packs, applications, and configurations before rolling them out for production. Finally, if done correctly, virtualization ensures business continuity by reducing the risk of IT outages and data loss. Backup and disaster recovery is much simpler and faster, assuming you have solutions in place to address storage growth, eliminate backup and recovery bottlenecks, and ensure disaster recovery in case of an application failure. 1-From "Is Your Business Ready for Virtualization? July 13, 2010, http://learning.allcovered.com/category/virtualization/ 1
  • 5. Demystifying Virtualization for Small Businesses Executive Brief Reduced cost: Companies often run just one application per server because they fear an application crash will bring down another application on the same machine. As a result, most servers are severely under-utilized, with some estimates indicating that most are running at only 10-15 percent of total capacity. With virtualization, you can turn one server from single purpose into multi-purpose or turn multiple servers into a flexible computing pool that can adapt to changing workloads. Virtualization enables each server to be used at its fullest potential, resulting in fewer physical servers and decreasing maintenance costs and time. Redundancy/Security: Virtualization provides a more robust infrastructure in case of failures. Because a virtual server can be represented by a file (including its operating system, applications, and data), copies of the servers themselves can be stored remotely for disaster recovery. In an emergency, a company’s entire virtualized environment can be remotely archived, and the backup virtual server accessed by end users, with little or no downtime. In addition, deploying new applications and moving application workloads dynamically has never been easier, provided storage management considerations have been take into account. Tracking the dependencies between applications deployed on virtual servers and their underlying storage resources can be difficult. Automating this process is an essential step in realizing the agility benefits that virtualization promises. On the security front, a virtual environment is just as vulnerable to unauthorized access as a non-virtual environment and must be protected. Managing a Virtualized Environment Once you have established a virtual environment, you can control and monitor both virtual and physical servers from a single, centralized console. You can easily move existing virtual machines, or “VMs,” to other server platforms, helping you pool and share your storage assets, simplifying resource management, and increasing utilization. You can simulate future usage patterns to prepare for upcoming changes, track workloads, specify workloads to automatically access spare capacity, and transfer usage rights from offline servers during planned and unplanned downtimes. All of these features ensure that you maintain service levels for key business applications necessary to keep the business running smoothly. While a virtualized environment offers many benefits, it can also bring unintended consequences, including storage growth, virtual server sprawl, and problem identification issues. Storage management The proliferation of easy-to-create virtual machines can result in duplication of data and make backup less efficient if not planned properly. Virtualization actually increases the complexities of storage management related to monitoring, reporting, and managing a virtual environment. However, storage management solutions improve storage utilization, reducing storage backup consumption by deduplicating your data (backing up only what you need by storing a single image), and ensuring you can back up once and recover everything. Virtual server sprawl Virtualization can reduce physical server sprawl, but it actually increases virtual server sprawl because it is so easy and fast to provision new virtual machines. You can overcome these obstacles by leveraging tools that provide end-to-end visibility of your virtual and physical environment so that you increase storage utilization and reclaim over-provisioned but under-used storage. 2
  • 6. Demystifying Virtualization for Small Businesses Executive Brief Problem isolation Virtualization makes problem isolation challenging. Virtualization encapsulates application components (operating system, database, middleware, drivers, network gateways, and so forth) to make it easier to move application workloads between servers. However, this also reduces visibility into the state of those components, which can make the identification and remediation of disaster recovery issues challenging. All of these obstacles can be overcome by leveraging management tools that provide end-to-end visibility of your virtual and physical environments. Security and Backup Considerations Virtualization can pay off big dividends for small businesses, but security remains a concern. You still need to protect your business from malicious threats and data loss. Since virtualization makes it easier and faster to deploy new systems, it is not uncommon to forgo the security best practices you worked so hard to establish in your physical environment. However, it is important to understand that to take full advantage of virtualization, you must still protect your physical and virtual environments. Virtualization, as effective as it is for maximizing server utilization, can create problems for data protection. For example, the proliferation of servers can make backup configuration more time-consuming, increase storage requirements, and add complexity to backups and restores. In addition, the consolidation of multiple backup processes onto fewer systems also increases the amount of processing power required per server. Backup solutions help small businesses get the most out of their virtualization efforts by automatically running backup and restore processes to protect your data. Virtualization by itself is not a panacea for disaster recovery. In a disaster recovery scenario, recovering the application is one part of the equation, and recovering and restoring access to the application data is the other. Disaster recovery solutions for virtual environments have to be data replication aware so that in the event of a failure, applications are automatically failed over and remounted to the underlying storage and data on which they depend. You’ll need to address the following in your virtual infrastructure: 1. Make sure you have a good high availability and disaster recovery solution that supports storage recovery in virtual environments to ensure business continuity. Don’t risk leaving information uncontrolled, unprotected, and unmanaged. 2. Select tools that automate the detection of failures and the recovery of application components across any combination of physical and virtual servers and over any distance. 3. Check your security best practices. It can be easy to overlook security requirements, leaving some virtual machines and endpoints at risk. Automate this process to ensure that you will meet your compliance requirements and keep your business secure. Make your security policies virtualization-aware through techniques such as randomized scan times or sending patch updates at different times rather than all at once. 4. Ensure all remote users authenticate when attempting to connect to a server to prevent the intrusion of viruses and malware. 3
  • 7. Demystifying Virtualization for Small Businesses Executive Brief 5. Check your server’s security settings, which dictate security for network traffic to and from the host server. Secure servers (and other devices) with strong passwords, endpoint/antivirus software, intrusion detection systems, and properly configured firewalls. Design & Source has 16 employees. With the help of New Jersey-based Symantec™ Partner Baroan Technologies, the company upgraded their infrastructure to a virtualized environment, converting five servers to one and significantly reducing their power consumption. They also deployed Symantec Backup Exec™ System Recovery to add another layer of data protection and provide for more robust disaster recovery for its virtual environment. Backup Exec System Recovery takes snapshots every two hours of the company’s three most critical servers: the main administrative server, the server hosting the Microsoft® SQL Server-based CRM system, and the image library. Together, they have close to a terabyte of data. In the event of a server failure, these snapshots can be used to quickly restore the servers—even to dissimilar hardware. The solution also provides deduplication to identify and remove duplicate data that often accrues through attachments sent via email. Read the full story: http://www.symantec.com/business/confident_smb/article.jsp?aid=march10_cover How Do You Start Implementing Virtualization? Before virtualization, businesses had to operate separate servers for incompatible platform-specific applications, easily doubling the amount of hardware needed. With virtualization, a single server can run multiple, different operating systems at once, supporting a variety of business applications. To get started, 1. Talk to an IT consultant or Value Added Reseller (VAR) who can review your current business processes, growth plans, and IT infrastructure. This contact should be an expert in virtualization and should have implemented several virtualization projects. The consultant should also know how to secure and back up these environments to avoid potential challenges. 2. Inventory your current IT infrastructure to understand how the environment will be affected by a virtual solution. Think about how you are using your current servers, whether you want to streamline processes, and current usage patterns. Figure out the number of users accessing your virtualized solution and current network traffic patterns. 3. Determine which hardware and software to virtualize. Older servers, infrequently used servers, and multiprocessor servers dedicated to single-processor applications are good candidates for virtualization. Applications to virtualize might include those in a development or test environment, using a single processor, or those with low usage rates. 4. Test and deploy the virtualized installation. After building or repurposing old server hardware, assembling necessary component hardware, and integrating networking and storage systems, install the virtualization software and then migrate existing applications to their virtual realms. Before rolling out virtualization company-wide, test it so issues are surfaced and addressed before they impact your users and productivity. 4
  • 8. Demystifying Virtualization for Small Businesses Executive Brief What Are Other Small Businesses Doing? Small businesses are realizing key benefits from virtualization. In a recent article, David Papp, president of Microtek Corporation in Canada, recalled a typical example.2 A client’s server was running on unreliable aging hardware that was rapidly running out of disk space. By virtualizing the environment, the company immediately experienced faster and smoother performance. Backups became easier and more reliable. Important customer data could be accessed securely from remote locations, and a robust disaster recovery plan was implemented. The revamped network and equipment will ensure trouble-free operation for the next three to five years. Pekham Inc. is a Lansing, Michigan-based non-profit that provides job training and employment opportunities to persons with disabilities. The organization’s local IT consultant, Corporate Technologies, helped them migrate their users’ desktops to a virtual environment. Instead of accessing applications and files on their individual desktops, users can now access their “virtual” desktops from any computer on the network. Instead of buying users new computers, this desktop virtualization enabled the organization to use existing computers while still boosting end user performance. According to Michael Scalisi, an IT manager in Atlanta, one practical reason for implementing virtualization is to use one new server to do the work that might now be done by several older, slower computers. For example, in some small businesses, an entire computer is dedicated to serve as a print server, another is running an application such as an accounting program, and yet another is being used as a file and email server. With virtualization, one or two servers can manage all of these tasks. If one of the virtual environments crashes, it won’t affect the other running environments. These are just a few examples to help you think about virtualization. If you have the right tools to protect and manage your virtual and physical environments, you can reap significant benefits from virtualization. Security and backup solutions designed for the virtual environment ensure that information is controlled, protected, and managed. The benefits are proven. Now, it is just a matter of carefully implementing the solution in your business. Summary Implementing protected virtualization in a business is not difficult or expensive. Many businesses are successfully deploying virtual environments and benefiting from them. These businesses are saving money, enjoying increased flexibility for growth, and finding it easier to maintain their overall IT infrastructure. However, it is important not to lose sight of security and backup considerations. Solutions exist that enable small businesses to take full advantage of virtualization while preserving best practices for data protection, storage management, and disaster recovery. By protecting and managing your physical and virtual information infrastructure from desktop to data center across any server, storage, or virtual machine, you can reap the significant benefits of server and endpoint virtualization. If you’re managing a growing business with an expanding pool of servers, applications, and IT demands, you can’t afford not to consider virtualization for your business. 2-http://www.pcworld.com/businesscenter/article/187391/how_a_virtualized_server_saved_one_small_business.html 5
  • 9.
  • 10. About Symantec Symantec is a global leader in providing security, storage, and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Headquartered in Mountain View, Calif., Symantec has operations in 40 countries. More information is available at www.symantec.com. Symantec helps organizations secure and manage For specific country offices Symantec World Headquarters their information-driven world with endpoint virtualization, server virtualization, and application and contact numbers, please 350 Ellis St. virtualization. Copyright © 2011 Symantec Corporation. All rights visit our website. Mountain View, CA 94043 USA reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered +1 (650) 527 8000 trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 1 (800) 721 3934 5/2011 21190853 www.symantec.com