SlideShare a Scribd company logo
1 of 14
Download to read offline
Symantec Information Management Group
Announces…
Backup Exec 2010
Protect More, Store Less, Save More
*Available Feb. 1, 2010

NetBackup 7
Complete Protection for Information Driven Enterprise
*Available Feb. 1, 2010
An Urgent Problem, Getting Worse


                  400%

                  300%




50%
                  200%

                  100%

                   0%
                          Digital IT Budgets IT Staff
                         Universe




 EXPLODING                  BUDGET                        RECOVERY &             DATA CENTER
  VOLUMES                  PRESSURE                        DISCOVERY             REVOLUTION


 Volume +50-          Storage growth                    Halting information    Server virtualization
  60%/year*         outpacing IT budget                  flow halts business     / consolidation
Slower disaster           & staff                       Data losses are “CNN         & Cloud
   recovery                                                  Moments”                         *Source: IDC
Symantec Information Management


         Protect           Deduplication            Delete                 Discover
       Completely           Everywhere            Confidently             Efficiently




                                     XX

     Backup, archive and   Eliminate redundancy   Delete by default   Proactive archive, index
      prevent data loss     close to the source                             and search


NBU 7 / BE 2010                                                                                  3
Complete Protection For Any Size Organization
                                                                                       NetBackup

                                                                                       • 500+ employees
                                                                                       • >$150m revenue
                                                                                       • 50- 1000s of servers
                                         Backup Exec                                   • Specialized backup team
                                                                                       • Data center focus
                                         • 100-999 employees
Backup Exec System                       • $50-$150m revenue
Recovery                                 • 3-100 s of servers
                                         • 1-2 general IT staff
• 10-99 employees
                                         • Windows server focus
• <$50m revenue
                                                                                                                   Offsite/ Vault
• 1-4 servers
• No IT staff
• Windows desktop & server
                                                                                                   Data Center       Data Center




                                                                  Main/Remote Office               Remote Office    Remote Office




                      Server, Desktops       Servers, Desktops        Desktops &                   Desktops &         Desktops &
                         & Laptops               & Laptops             Laptops                      Laptops            Laptops

NBU 7 / BE 2010                                                                                                                     4
Deduplication Everywhere



     1
         Clients / Source   1. At the source – Faster backups, less
                                bandwidth, less storage
     2
                            2. At the media server – For CPU-sensitive
          Backup Media          servers and prior to client upgrades
             Server
                            3. OpenStorage dedupe appliances –
     3                          View, control & manage backups from within
                                Backup Exec or NetBackup
      3rd Party Appliance



NBU 7 / BE 2010                                                              5
Protect More, Store Less, Save More
                                                   Backup Exec 2010

                      Branch office
                                                                         Virtual Servers



     Branch office                 Branch office




                                                                          VMware/Hyper-V


                     Main office




      Deduplication                                      Unified      Virtualize with
       Everywhere                                       Archiving      Confidence
NBU 7 / BE 2010                                                                            6
Deduplication Everywhere
                                                   Backup Exec 2010

                      Branch office

                                                      • Storage and Cost Savings
     Branch office                 Branch office      • Operational Simplicity
                                                      • Adaptable To Your
                                                        Environment
                     Main office




                     Protect More, Store Less, Save More
NBU 7 / BE 2010                                                                    7
Unified Archiving (powered by Enterprise Vault)
                           Backup Exec 2010


                              • Easily Automate Savings
                              • Reduce Backup Management
                                Resources
                              • Optimize Exchange and File
                                Server Performance


                  Protect More, Store Less, Save More
NBU 7 / BE 2010                                              8
Virtualize with Confidence
                              Backup Exec 2010


           Virtual Servers       • First-to-Market Granular
                                   Recovery for Applications
                                 • Deduplicate VMware Backups
             VMware/Hyper-V      • Protect the Latest Virtual
                                   Environments


                  Protect More, Store Less, Save More
NBU 7 / BE 2010                                                 9
Complete Protection for Information Driven Enterprise
                    NetBackup 7




      Deduplication     Simple &         Better Disaster
      Everywhere,     Complete Virtual   Recovery with
      Closer to the      Machine          Global Data
         Source         Protection         Protection
NBU 7 / BE 2010                                         10
Deduplication Everywhere, Closer to the Source
                         NetBackup 7

    Fully Integrated –
    Easy to Configure
                                    NetBackup Client Deduplication



     Cost Effective &                                    SAN/ DAS
         Flexible                     NetBackup 7


                                                                Site 2
                           Site 1        Replication
            Proven
                               SAN/
          Technology            DAS
                         NetBackup 7                   PureDisk Storage NetBackup 7


NBU 7 / BE 2010                                                                       11
Simple & Comprehensive Protection for Virtual Machines
                                           NetBackup 7

                     old
     Shorten
     Backup                                • Faster backups with client-side deduplication
                             90%
     Time by                  new          • Disaster recovery ready in less time
     50-90%
                     Recovery
      Find &         VM    File 1..
                           File 2..
     Recover                               • Simple recovery process - Guided VM recovery
       Files           VM                  • Instant file recovery from any backup – disk or tape
    Instantly      Backup Storage




     Greater         VM      VM       VM   • Store less with deduplication across physical & virtual
     Storage
    Efficiency         Hypervisor          • Store less with VMware block optimization


 NBU 7 / BE 2010                                                                                       12
Better Disaster Recovery for Global Data Protection
                    NetBackup 7


                     • One Console To Monitor Global
                       Backup Information
                     • Replicate & Store Up to 80% Less
                       Data
                     • Recover Terabytes of Data In
                       Seconds From Anywhere




NBU 7 / BE 2010                                           13
Thank you!




    Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


NBU 7 / BE 2010                                                                                                                                                                             14

More Related Content

What's hot

Symantec Netbackup Appliance Family
Symantec Netbackup Appliance FamilySymantec Netbackup Appliance Family
Symantec Netbackup Appliance FamilySymantec
 
Prueba para postear un ppt
Prueba para postear un pptPrueba para postear un ppt
Prueba para postear un pptGerardo Lema
 
Veeam Presentation
Veeam PresentationVeeam Presentation
Veeam Presentationcvaleze
 
EVault Endpoint Protection
EVault Endpoint Protection EVault Endpoint Protection
EVault Endpoint Protection EVault
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization1CloudRoad.com
 
Veeam Backup & Replication Tips and Tricks
Veeam Backup & Replication Tips and TricksVeeam Backup & Replication Tips and Tricks
Veeam Backup & Replication Tips and TricksVeeam Software
 
IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...
IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...
IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...IBM India Smarter Computing
 
The 5 Keys to Virtual Backup Excellence
The 5 Keys to Virtual Backup ExcellenceThe 5 Keys to Virtual Backup Excellence
The 5 Keys to Virtual Backup ExcellenceBill Hobbib
 
What’s new in Veeam Availability Suite v9
What’s new in Veeam Availability Suite v9What’s new in Veeam Availability Suite v9
What’s new in Veeam Availability Suite v9Digicomp Academy AG
 
Integration with EMC VNX and VNXe hybrid storage arrays
Integration with EMC VNX and VNXe hybrid storage arraysIntegration with EMC VNX and VNXe hybrid storage arrays
Integration with EMC VNX and VNXe hybrid storage arraysVeeam Software
 
Veritas Storage Foundation
Veritas Storage FoundationVeritas Storage Foundation
Veritas Storage FoundationSymantec
 
on the most suitable storage architecture for virtualization
on the most suitable storage architecture for virtualizationon the most suitable storage architecture for virtualization
on the most suitable storage architecture for virtualizationJordi Moles Blanco
 
Webinář: Dell VRTX - datacentrum vše-v-jednom za skvělou cenu / 7.10.2013
Webinář: Dell VRTX - datacentrum vše-v-jednom za skvělou cenu / 7.10.2013Webinář: Dell VRTX - datacentrum vše-v-jednom za skvělou cenu / 7.10.2013
Webinář: Dell VRTX - datacentrum vše-v-jednom za skvělou cenu / 7.10.2013Jaroslav Prodelal
 
-bheritas5fundamentals-
-bheritas5fundamentals--bheritas5fundamentals-
-bheritas5fundamentals-raryal
 
IBM Tivoli Storage Manager Data Protection for VMware - PCTY 2011
IBM Tivoli Storage Manager Data Protection for VMware - PCTY 2011IBM Tivoli Storage Manager Data Protection for VMware - PCTY 2011
IBM Tivoli Storage Manager Data Protection for VMware - PCTY 2011IBM Sverige
 

What's hot (17)

Symantec Netbackup Appliance Family
Symantec Netbackup Appliance FamilySymantec Netbackup Appliance Family
Symantec Netbackup Appliance Family
 
Prueba para postear un ppt
Prueba para postear un pptPrueba para postear un ppt
Prueba para postear un ppt
 
Veeam Presentation
Veeam PresentationVeeam Presentation
Veeam Presentation
 
EVault Endpoint Protection
EVault Endpoint Protection EVault Endpoint Protection
EVault Endpoint Protection
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization
 
Veeam Backup & Replication Tips and Tricks
Veeam Backup & Replication Tips and TricksVeeam Backup & Replication Tips and Tricks
Veeam Backup & Replication Tips and Tricks
 
Webinar presentation
Webinar presentationWebinar presentation
Webinar presentation
 
IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...
IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...
IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...
 
The 5 Keys to Virtual Backup Excellence
The 5 Keys to Virtual Backup ExcellenceThe 5 Keys to Virtual Backup Excellence
The 5 Keys to Virtual Backup Excellence
 
Veeam backup and_replication_whats_new_in_v7
Veeam backup and_replication_whats_new_in_v7Veeam backup and_replication_whats_new_in_v7
Veeam backup and_replication_whats_new_in_v7
 
What’s new in Veeam Availability Suite v9
What’s new in Veeam Availability Suite v9What’s new in Veeam Availability Suite v9
What’s new in Veeam Availability Suite v9
 
Integration with EMC VNX and VNXe hybrid storage arrays
Integration with EMC VNX and VNXe hybrid storage arraysIntegration with EMC VNX and VNXe hybrid storage arrays
Integration with EMC VNX and VNXe hybrid storage arrays
 
Veritas Storage Foundation
Veritas Storage FoundationVeritas Storage Foundation
Veritas Storage Foundation
 
on the most suitable storage architecture for virtualization
on the most suitable storage architecture for virtualizationon the most suitable storage architecture for virtualization
on the most suitable storage architecture for virtualization
 
Webinář: Dell VRTX - datacentrum vše-v-jednom za skvělou cenu / 7.10.2013
Webinář: Dell VRTX - datacentrum vše-v-jednom za skvělou cenu / 7.10.2013Webinář: Dell VRTX - datacentrum vše-v-jednom za skvělou cenu / 7.10.2013
Webinář: Dell VRTX - datacentrum vše-v-jednom za skvělou cenu / 7.10.2013
 
-bheritas5fundamentals-
-bheritas5fundamentals--bheritas5fundamentals-
-bheritas5fundamentals-
 
IBM Tivoli Storage Manager Data Protection for VMware - PCTY 2011
IBM Tivoli Storage Manager Data Protection for VMware - PCTY 2011IBM Tivoli Storage Manager Data Protection for VMware - PCTY 2011
IBM Tivoli Storage Manager Data Protection for VMware - PCTY 2011
 

Similar to Symantec Backup Exec 2010 and NetBackup 7

Xo Managed Backup Customer Presentation
Xo Managed Backup Customer PresentationXo Managed Backup Customer Presentation
Xo Managed Backup Customer PresentationSimonZXu
 
Xo Managed Backup Customer Presentation
Xo Managed Backup Customer PresentationXo Managed Backup Customer Presentation
Xo Managed Backup Customer PresentationSimonZXu
 
Avamar weekly webcast
Avamar weekly webcastAvamar weekly webcast
Avamar weekly webcaststefriche0199
 
Symantec Endpoint Virtualization Suite
Symantec Endpoint Virtualization SuiteSymantec Endpoint Virtualization Suite
Symantec Endpoint Virtualization SuitePipeline Srl
 
Symantec Appliances Strategy Launch
Symantec Appliances Strategy LaunchSymantec Appliances Strategy Launch
Symantec Appliances Strategy LaunchSymantec
 
Distributed Block-level Storage Management for OpenStack, by Danile lee
Distributed Block-level Storage Management for OpenStack, by Danile leeDistributed Block-level Storage Management for OpenStack, by Danile lee
Distributed Block-level Storage Management for OpenStack, by Danile leeHui Cheng
 
Danile lee -open stackblocklevelstorage
Danile lee -open stackblocklevelstorageDanile lee -open stackblocklevelstorage
Danile lee -open stackblocklevelstorageOpenCity Community
 
SQL Server 2008 para Implementar Biztalk
SQL Server 2008 para Implementar BiztalkSQL Server 2008 para Implementar Biztalk
SQL Server 2008 para Implementar BiztalkEduardo Castro
 
CTI Group- Blue power technology storwize technical training for customer - p...
CTI Group- Blue power technology storwize technical training for customer - p...CTI Group- Blue power technology storwize technical training for customer - p...
CTI Group- Blue power technology storwize technical training for customer - p...Tri Susilo
 
IBM Storage Virtualization
IBM Storage VirtualizationIBM Storage Virtualization
IBM Storage VirtualizationIBM Danmark
 
Windows Server 2012 - Dynamische opslag met Storage Pools
Windows Server 2012 - Dynamische opslag met Storage PoolsWindows Server 2012 - Dynamische opslag met Storage Pools
Windows Server 2012 - Dynamische opslag met Storage PoolsCompuTrain. De IT opleider.
 
Ibm virtualization techday v2.0 final
Ibm virtualization techday v2.0 finalIbm virtualization techday v2.0 final
Ibm virtualization techday v2.0 finalAbhed
 
Online backup with netwise hosting
Online backup with netwise hostingOnline backup with netwise hosting
Online backup with netwise hostingNetwise Hosting
 
Vfm v mware vdi tco and roi framework
Vfm v mware vdi tco and roi frameworkVfm v mware vdi tco and roi framework
Vfm v mware vdi tco and roi frameworkvfmindia
 
FarStone Drive Clone Enterprise Presentation
FarStone Drive Clone Enterprise PresentationFarStone Drive Clone Enterprise Presentation
FarStone Drive Clone Enterprise Presentationquestar
 
FileStore 5.7
FileStore 5.7FileStore 5.7
FileStore 5.7Symantec
 

Similar to Symantec Backup Exec 2010 and NetBackup 7 (20)

Xo Managed Backup Customer Presentation
Xo Managed Backup Customer PresentationXo Managed Backup Customer Presentation
Xo Managed Backup Customer Presentation
 
Xo Managed Backup Customer Presentation
Xo Managed Backup Customer PresentationXo Managed Backup Customer Presentation
Xo Managed Backup Customer Presentation
 
Avamar weekly webcast
Avamar weekly webcastAvamar weekly webcast
Avamar weekly webcast
 
Ronnie Oomen (EMC)
Ronnie Oomen (EMC)Ronnie Oomen (EMC)
Ronnie Oomen (EMC)
 
Avamar presales 1.0
Avamar presales 1.0Avamar presales 1.0
Avamar presales 1.0
 
Symantec Endpoint Virtualization Suite
Symantec Endpoint Virtualization SuiteSymantec Endpoint Virtualization Suite
Symantec Endpoint Virtualization Suite
 
Succor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackupSuccor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackup
 
About NAKIVO
About NAKIVOAbout NAKIVO
About NAKIVO
 
Symantec Appliances Strategy Launch
Symantec Appliances Strategy LaunchSymantec Appliances Strategy Launch
Symantec Appliances Strategy Launch
 
Distributed Block-level Storage Management for OpenStack, by Danile lee
Distributed Block-level Storage Management for OpenStack, by Danile leeDistributed Block-level Storage Management for OpenStack, by Danile lee
Distributed Block-level Storage Management for OpenStack, by Danile lee
 
Danile lee -open stackblocklevelstorage
Danile lee -open stackblocklevelstorageDanile lee -open stackblocklevelstorage
Danile lee -open stackblocklevelstorage
 
SQL Server 2008 para Implementar Biztalk
SQL Server 2008 para Implementar BiztalkSQL Server 2008 para Implementar Biztalk
SQL Server 2008 para Implementar Biztalk
 
CTI Group- Blue power technology storwize technical training for customer - p...
CTI Group- Blue power technology storwize technical training for customer - p...CTI Group- Blue power technology storwize technical training for customer - p...
CTI Group- Blue power technology storwize technical training for customer - p...
 
IBM Storage Virtualization
IBM Storage VirtualizationIBM Storage Virtualization
IBM Storage Virtualization
 
Windows Server 2012 - Dynamische opslag met Storage Pools
Windows Server 2012 - Dynamische opslag met Storage PoolsWindows Server 2012 - Dynamische opslag met Storage Pools
Windows Server 2012 - Dynamische opslag met Storage Pools
 
Ibm virtualization techday v2.0 final
Ibm virtualization techday v2.0 finalIbm virtualization techday v2.0 final
Ibm virtualization techday v2.0 final
 
Online backup with netwise hosting
Online backup with netwise hostingOnline backup with netwise hosting
Online backup with netwise hosting
 
Vfm v mware vdi tco and roi framework
Vfm v mware vdi tco and roi frameworkVfm v mware vdi tco and roi framework
Vfm v mware vdi tco and roi framework
 
FarStone Drive Clone Enterprise Presentation
FarStone Drive Clone Enterprise PresentationFarStone Drive Clone Enterprise Presentation
FarStone Drive Clone Enterprise Presentation
 
FileStore 5.7
FileStore 5.7FileStore 5.7
FileStore 5.7
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Symantec Backup Exec 2010 and NetBackup 7

  • 1. Symantec Information Management Group Announces… Backup Exec 2010 Protect More, Store Less, Save More *Available Feb. 1, 2010 NetBackup 7 Complete Protection for Information Driven Enterprise *Available Feb. 1, 2010
  • 2. An Urgent Problem, Getting Worse 400% 300% 50% 200% 100% 0% Digital IT Budgets IT Staff Universe EXPLODING BUDGET RECOVERY & DATA CENTER VOLUMES PRESSURE DISCOVERY REVOLUTION Volume +50- Storage growth Halting information Server virtualization 60%/year* outpacing IT budget flow halts business / consolidation Slower disaster & staff Data losses are “CNN & Cloud recovery Moments” *Source: IDC
  • 3. Symantec Information Management Protect Deduplication Delete Discover Completely Everywhere Confidently Efficiently XX Backup, archive and Eliminate redundancy Delete by default Proactive archive, index prevent data loss close to the source and search NBU 7 / BE 2010 3
  • 4. Complete Protection For Any Size Organization NetBackup • 500+ employees • >$150m revenue • 50- 1000s of servers Backup Exec • Specialized backup team • Data center focus • 100-999 employees Backup Exec System • $50-$150m revenue Recovery • 3-100 s of servers • 1-2 general IT staff • 10-99 employees • Windows server focus • <$50m revenue Offsite/ Vault • 1-4 servers • No IT staff • Windows desktop & server Data Center Data Center Main/Remote Office Remote Office Remote Office Server, Desktops Servers, Desktops Desktops & Desktops & Desktops & & Laptops & Laptops Laptops Laptops Laptops NBU 7 / BE 2010 4
  • 5. Deduplication Everywhere 1 Clients / Source 1. At the source – Faster backups, less bandwidth, less storage 2 2. At the media server – For CPU-sensitive Backup Media servers and prior to client upgrades Server 3. OpenStorage dedupe appliances – 3 View, control & manage backups from within Backup Exec or NetBackup 3rd Party Appliance NBU 7 / BE 2010 5
  • 6. Protect More, Store Less, Save More Backup Exec 2010 Branch office Virtual Servers Branch office Branch office VMware/Hyper-V Main office Deduplication Unified Virtualize with Everywhere Archiving Confidence NBU 7 / BE 2010 6
  • 7. Deduplication Everywhere Backup Exec 2010 Branch office • Storage and Cost Savings Branch office Branch office • Operational Simplicity • Adaptable To Your Environment Main office Protect More, Store Less, Save More NBU 7 / BE 2010 7
  • 8. Unified Archiving (powered by Enterprise Vault) Backup Exec 2010 • Easily Automate Savings • Reduce Backup Management Resources • Optimize Exchange and File Server Performance Protect More, Store Less, Save More NBU 7 / BE 2010 8
  • 9. Virtualize with Confidence Backup Exec 2010 Virtual Servers • First-to-Market Granular Recovery for Applications • Deduplicate VMware Backups VMware/Hyper-V • Protect the Latest Virtual Environments Protect More, Store Less, Save More NBU 7 / BE 2010 9
  • 10. Complete Protection for Information Driven Enterprise NetBackup 7 Deduplication Simple & Better Disaster Everywhere, Complete Virtual Recovery with Closer to the Machine Global Data Source Protection Protection NBU 7 / BE 2010 10
  • 11. Deduplication Everywhere, Closer to the Source NetBackup 7 Fully Integrated – Easy to Configure NetBackup Client Deduplication Cost Effective & SAN/ DAS Flexible NetBackup 7 Site 2 Site 1 Replication Proven SAN/ Technology DAS NetBackup 7 PureDisk Storage NetBackup 7 NBU 7 / BE 2010 11
  • 12. Simple & Comprehensive Protection for Virtual Machines NetBackup 7 old Shorten Backup • Faster backups with client-side deduplication 90% Time by new • Disaster recovery ready in less time 50-90% Recovery Find & VM File 1.. File 2.. Recover • Simple recovery process - Guided VM recovery Files VM • Instant file recovery from any backup – disk or tape Instantly Backup Storage Greater VM VM VM • Store less with deduplication across physical & virtual Storage Efficiency Hypervisor • Store less with VMware block optimization NBU 7 / BE 2010 12
  • 13. Better Disaster Recovery for Global Data Protection NetBackup 7 • One Console To Monitor Global Backup Information • Replicate & Store Up to 80% Less Data • Recover Terabytes of Data In Seconds From Anywhere NBU 7 / BE 2010 13
  • 14. Thank you! Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. NBU 7 / BE 2010 14