SlideShare uma empresa Scribd logo
1 de 21
Enable Symantec Backup Exec ™  to store and retrieve backup data to Cloud storage using CloudArray ™  software For virtualized and physical server environments
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
Example Environment  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Backup Targets Tape and/or D2D Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center D2D Tape Host n SAN LAN Offsite Tape  Backup Storage Typical backup solution using  Backup Exec  VM and PS  Data backup VM and PS  Data restore (CIFS) VM=virtual machine, PS=physical server Backup Exec Backup target
Backup Targets Tape and/or D2D Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center D2D Tape Host n SAN LAN Offsite Tape  Backup Storage VM and PS  Data backup VM and PS  Data restore (CIFS) VM=virtual machine, PS=physical server Backup Exec Backup target ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Backup Targets Tape and/or D2D Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center D2D Tape Host n SAN LAN Offsite Tape  Backup Storage VM and PS  Data backup VM and PS  Data restore (CIFS) VM=virtual machine, PS=physical server Backup Exec Backup target ,[object Object],[object Object],[object Object]
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec Backup target Backup Target Storing backup data for recovery in the Cloud offers many benefits, but how do we inexpensively connect Backup Exec to a Cloud provider of our choice?
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec Backup target Backup Target … with CloudArray software!  CloudArray
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec Backup target TwinStrata.com CloudArray ESX CloudArray Virtual  Appliance CloudArray operates as a virtual appliance  It presents iSCSI volumes to physical and virtual servers Volumes are block-based and replicate data to cloud storage providers It’s local cache allows fast access to data
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec Backup target TwinStrata.com CloudArray ESX CloudArray Virtual  Appliance Provision CloudArray volume(s) using local storage as a cache or a full local copy
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec Backup target TwinStrata.com CloudArray ESX CloudArray Virtual  Appliance Cloud Storage  Providers WAN CloudArray volume(s) are mapped to your choice of Cloud storage service providers with pricing as low as $0.15/GB per month
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual  Appliance Cloud Storage  Providers WAN CloudArray Vol mapped To VCB Proxy Server Present CloudArray volume to Windows Proxy Server running Backup Exec.  Backup Target
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual  Appliance Cloud Storage  Providers WAN CloudArray Vol mapped To VCB Proxy Server Proxy Server installs NTFS on vol. and mounts drive Backup Target=  mapped CloudArray volume with NTFS
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual  Appliance Cloud Storage  Providers WAN CloudArray Vol mapped To VCB Proxy Server Backup Target=  mapped CloudArray volume with NTFS In Backup Exec config window, create backup-to-disk folder and point it to CloudArray volume on Proxy Server.
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual  Appliance Cloud Storage  Providers WAN CloudArray Vol mapped To VCB Proxy Server Backup Target [drive letter:] =  mapped CloudArray volume with NTFS From the Backup Exec window, add VMs and physical hosts to be backed up to the Backup Exec database by selecting it from the resources tab  Select destination folder in [drive letter:] where backup sources will reside Initiate backup
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual  Appliance Cloud Storage  Providers WAN CloudArray Vol mapped To VCB Proxy Server Backup Target [drive letter:] =  mapped CloudArray volume with NTFS The backup data set is written to CloudArray local cache
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual  Appliance Cloud Storage  Providers WAN CloudArray Vol mapped To VCB Proxy Server Backup Target [drive letter:] =  mapped CloudArray volume with NTFS The data set is asynchronously replicated to one or more Cloud storage providers of your choice Encryption,  Compression,
Proxy Server running  Backup Exec VM Ph. Host  VM disk files on  primary storage Data Center Host n SAN LAN VM and PS  Data backup VM and PS  Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual  Appliance Cloud Storage  Providers WAN CloudArray Vol mapped To VCB Proxy Server Backup Target [drive letter:] =  mapped CloudArray volume with NTFS A restore operation from Backup Exec  retrieves data from CloudArray local cache and Cloud storage provider(s)
CloudArray vs. Existing Backup & Replication Solutions: 5 TB Environment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3 yr-TCO for CloudArray vs. Existing  Backup and Replication Solutions
Feature / Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Eval of CloudArray is Available Now ,[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Colvin RMAN New Features
Colvin RMAN New FeaturesColvin RMAN New Features
Colvin RMAN New FeaturesEnkitec
 
Gruter TECHDAY 2014 Realtime Processing in Telco
Gruter TECHDAY 2014 Realtime Processing in TelcoGruter TECHDAY 2014 Realtime Processing in Telco
Gruter TECHDAY 2014 Realtime Processing in TelcoGruter
 
Ceph - High Performance Without High Costs
Ceph - High Performance Without High CostsCeph - High Performance Without High Costs
Ceph - High Performance Without High CostsJonathan Long
 
Aerospike DB and Storm for real-time analytics
Aerospike DB and Storm for real-time analyticsAerospike DB and Storm for real-time analytics
Aerospike DB and Storm for real-time analyticsAerospike
 
Apache Con NA 2013 - Cassandra Internals
Apache Con NA 2013 - Cassandra InternalsApache Con NA 2013 - Cassandra Internals
Apache Con NA 2013 - Cassandra Internalsaaronmorton
 
Quick-and-Easy Deployment of a Ceph Storage Cluster with SLES
Quick-and-Easy Deployment of a Ceph Storage Cluster with SLESQuick-and-Easy Deployment of a Ceph Storage Cluster with SLES
Quick-and-Easy Deployment of a Ceph Storage Cluster with SLESJan Kalcic
 
HBaseCon 2012 | Learning HBase Internals - Lars Hofhansl, Salesforce
HBaseCon 2012 | Learning HBase Internals - Lars Hofhansl, SalesforceHBaseCon 2012 | Learning HBase Internals - Lars Hofhansl, Salesforce
HBaseCon 2012 | Learning HBase Internals - Lars Hofhansl, SalesforceCloudera, Inc.
 
Native erasure coding support inside hdfs presentation
Native erasure coding support inside hdfs presentationNative erasure coding support inside hdfs presentation
Native erasure coding support inside hdfs presentationlin bao
 
Your first ClickHouse data warehouse
Your first ClickHouse data warehouseYour first ClickHouse data warehouse
Your first ClickHouse data warehouseAltinity Ltd
 
Introduction to Apache Tajo: Data Warehouse for Big Data
Introduction to Apache Tajo: Data Warehouse for Big DataIntroduction to Apache Tajo: Data Warehouse for Big Data
Introduction to Apache Tajo: Data Warehouse for Big DataGruter
 
ClickHouse Introduction by Alexander Zaitsev, Altinity CTO
ClickHouse Introduction by Alexander Zaitsev, Altinity CTOClickHouse Introduction by Alexander Zaitsev, Altinity CTO
ClickHouse Introduction by Alexander Zaitsev, Altinity CTOAltinity Ltd
 
Latest performance changes by Scylla - Project optimus / Nolimits
Latest performance changes by Scylla - Project optimus / Nolimits Latest performance changes by Scylla - Project optimus / Nolimits
Latest performance changes by Scylla - Project optimus / Nolimits ScyllaDB
 
PostgreSQL Replication High Availability Methods
PostgreSQL Replication High Availability MethodsPostgreSQL Replication High Availability Methods
PostgreSQL Replication High Availability MethodsMydbops
 
Terror & Hysteria: Cost Effective Scaling of Time Series Data with Cassandra ...
Terror & Hysteria: Cost Effective Scaling of Time Series Data with Cassandra ...Terror & Hysteria: Cost Effective Scaling of Time Series Data with Cassandra ...
Terror & Hysteria: Cost Effective Scaling of Time Series Data with Cassandra ...DataStax
 
Build an High-Performance and High-Durable Block Storage Service Based on Ceph
Build an High-Performance and High-Durable Block Storage Service Based on CephBuild an High-Performance and High-Durable Block Storage Service Based on Ceph
Build an High-Performance and High-Durable Block Storage Service Based on CephRongze Zhu
 

Mais procurados (19)

RAIDZ on-disk format vs. small blocks
RAIDZ on-disk format vs. small blocksRAIDZ on-disk format vs. small blocks
RAIDZ on-disk format vs. small blocks
 
caching2012.pdf
caching2012.pdfcaching2012.pdf
caching2012.pdf
 
Colvin RMAN New Features
Colvin RMAN New FeaturesColvin RMAN New Features
Colvin RMAN New Features
 
Gruter TECHDAY 2014 Realtime Processing in Telco
Gruter TECHDAY 2014 Realtime Processing in TelcoGruter TECHDAY 2014 Realtime Processing in Telco
Gruter TECHDAY 2014 Realtime Processing in Telco
 
Ceph - High Performance Without High Costs
Ceph - High Performance Without High CostsCeph - High Performance Without High Costs
Ceph - High Performance Without High Costs
 
Aerospike DB and Storm for real-time analytics
Aerospike DB and Storm for real-time analyticsAerospike DB and Storm for real-time analytics
Aerospike DB and Storm for real-time analytics
 
Apache Con NA 2013 - Cassandra Internals
Apache Con NA 2013 - Cassandra InternalsApache Con NA 2013 - Cassandra Internals
Apache Con NA 2013 - Cassandra Internals
 
Performance Tuning
Performance TuningPerformance Tuning
Performance Tuning
 
Quick-and-Easy Deployment of a Ceph Storage Cluster with SLES
Quick-and-Easy Deployment of a Ceph Storage Cluster with SLESQuick-and-Easy Deployment of a Ceph Storage Cluster with SLES
Quick-and-Easy Deployment of a Ceph Storage Cluster with SLES
 
HBaseCon 2012 | Learning HBase Internals - Lars Hofhansl, Salesforce
HBaseCon 2012 | Learning HBase Internals - Lars Hofhansl, SalesforceHBaseCon 2012 | Learning HBase Internals - Lars Hofhansl, Salesforce
HBaseCon 2012 | Learning HBase Internals - Lars Hofhansl, Salesforce
 
Native erasure coding support inside hdfs presentation
Native erasure coding support inside hdfs presentationNative erasure coding support inside hdfs presentation
Native erasure coding support inside hdfs presentation
 
Your first ClickHouse data warehouse
Your first ClickHouse data warehouseYour first ClickHouse data warehouse
Your first ClickHouse data warehouse
 
Introduction to Apache Tajo: Data Warehouse for Big Data
Introduction to Apache Tajo: Data Warehouse for Big DataIntroduction to Apache Tajo: Data Warehouse for Big Data
Introduction to Apache Tajo: Data Warehouse for Big Data
 
ClickHouse Introduction by Alexander Zaitsev, Altinity CTO
ClickHouse Introduction by Alexander Zaitsev, Altinity CTOClickHouse Introduction by Alexander Zaitsev, Altinity CTO
ClickHouse Introduction by Alexander Zaitsev, Altinity CTO
 
Latest performance changes by Scylla - Project optimus / Nolimits
Latest performance changes by Scylla - Project optimus / Nolimits Latest performance changes by Scylla - Project optimus / Nolimits
Latest performance changes by Scylla - Project optimus / Nolimits
 
PostgreSQL Replication High Availability Methods
PostgreSQL Replication High Availability MethodsPostgreSQL Replication High Availability Methods
PostgreSQL Replication High Availability Methods
 
Aerospike & GCE (LSPE Talk)
Aerospike & GCE (LSPE Talk)Aerospike & GCE (LSPE Talk)
Aerospike & GCE (LSPE Talk)
 
Terror & Hysteria: Cost Effective Scaling of Time Series Data with Cassandra ...
Terror & Hysteria: Cost Effective Scaling of Time Series Data with Cassandra ...Terror & Hysteria: Cost Effective Scaling of Time Series Data with Cassandra ...
Terror & Hysteria: Cost Effective Scaling of Time Series Data with Cassandra ...
 
Build an High-Performance and High-Durable Block Storage Service Based on Ceph
Build an High-Performance and High-Durable Block Storage Service Based on CephBuild an High-Performance and High-Durable Block Storage Service Based on Ceph
Build an High-Performance and High-Durable Block Storage Service Based on Ceph
 

Semelhante a Enable Symantec Backup Exec™ to store and retrieve backup data to Cloud storage using CloudArray™ software

Backup / Restore to Cloud Storage with Veeam and CloudArray software
Backup / Restore to Cloud Storage with Veeam and CloudArray softwareBackup / Restore to Cloud Storage with Veeam and CloudArray software
Backup / Restore to Cloud Storage with Veeam and CloudArray softwareTwinStrata
 
VMUG - Falconstor Presentation
VMUG - Falconstor PresentationVMUG - Falconstor Presentation
VMUG - Falconstor Presentation1CloudRoad.com
 
Efficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environmentsEfficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environmentsKingfin Enterprises Limited
 
NICConf 2015 - azure disaster recovery in 60min
NICConf 2015 -  azure disaster recovery in 60minNICConf 2015 -  azure disaster recovery in 60min
NICConf 2015 - azure disaster recovery in 60minPeter De Tender
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwebhostingguy
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwebhostingguy
 
Private Cloud Academy: Backup and DPM 2010
Private Cloud Academy: Backup and DPM 2010Private Cloud Academy: Backup and DPM 2010
Private Cloud Academy: Backup and DPM 2010Aidan Finn
 
Azure Backup component matrix
Azure Backup component matrixAzure Backup component matrix
Azure Backup component matrixAnthony Clendenen
 
PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMwareDevansh Chowdhary
 
Guaranteeing Storage Performance by Mike Tutkowski
Guaranteeing Storage Performance by Mike TutkowskiGuaranteeing Storage Performance by Mike Tutkowski
Guaranteeing Storage Performance by Mike Tutkowskibuildacloud
 
Virtualize Your Disaster! Customer Use Cases & Scenarios
Virtualize Your Disaster! Customer Use Cases & ScenariosVirtualize Your Disaster! Customer Use Cases & Scenarios
Virtualize Your Disaster! Customer Use Cases & ScenariosEmirates Computers
 
What’s New in Backup Exec 16 FP2 Solution Brief
What’s New in Backup Exec 16 FP2 Solution Brief  What’s New in Backup Exec 16 FP2 Solution Brief
What’s New in Backup Exec 16 FP2 Solution Brief Veritas Technologies LLC
 
Best Practices for Backup and Recovery: Windows Workload on AWS
Best Practices for Backup and Recovery: Windows Workload on AWS Best Practices for Backup and Recovery: Windows Workload on AWS
Best Practices for Backup and Recovery: Windows Workload on AWS Amazon Web Services
 
Introducing CloudBacko cloud / local backup software
Introducing CloudBacko cloud / local backup softwareIntroducing CloudBacko cloud / local backup software
Introducing CloudBacko cloud / local backup softwareAdeline Wong
 
Building Disaster Recovery as a Service:
Building Disaster Recovery as a Service:Building Disaster Recovery as a Service:
Building Disaster Recovery as a Service:Alexandre Verkinderen
 

Semelhante a Enable Symantec Backup Exec™ to store and retrieve backup data to Cloud storage using CloudArray™ software (20)

Backup / Restore to Cloud Storage with Veeam and CloudArray software
Backup / Restore to Cloud Storage with Veeam and CloudArray softwareBackup / Restore to Cloud Storage with Veeam and CloudArray software
Backup / Restore to Cloud Storage with Veeam and CloudArray software
 
VMUG - Falconstor Presentation
VMUG - Falconstor PresentationVMUG - Falconstor Presentation
VMUG - Falconstor Presentation
 
Efficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environmentsEfficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environments
 
Double-Take Software
Double-Take SoftwareDouble-Take Software
Double-Take Software
 
Nakivo overview
Nakivo overviewNakivo overview
Nakivo overview
 
NICConf 2015 - azure disaster recovery in 60min
NICConf 2015 -  azure disaster recovery in 60minNICConf 2015 -  azure disaster recovery in 60min
NICConf 2015 - azure disaster recovery in 60min
 
10215 A 10
10215 A 1010215 A 10
10215 A 10
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualization
 
www.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualizationwww.doubletake.com Data Protection Strategies for Virtualization
www.doubletake.com Data Protection Strategies for Virtualization
 
Expertslive azure site recovery
  Expertslive   azure site recovery  Expertslive   azure site recovery
Expertslive azure site recovery
 
Private Cloud Academy: Backup and DPM 2010
Private Cloud Academy: Backup and DPM 2010Private Cloud Academy: Backup and DPM 2010
Private Cloud Academy: Backup and DPM 2010
 
Azure Backup component matrix
Azure Backup component matrixAzure Backup component matrix
Azure Backup component matrix
 
PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMware
 
Guaranteeing Storage Performance by Mike Tutkowski
Guaranteeing Storage Performance by Mike TutkowskiGuaranteeing Storage Performance by Mike Tutkowski
Guaranteeing Storage Performance by Mike Tutkowski
 
Veeam Backup Essentials v9 Overview
Veeam Backup Essentials v9 OverviewVeeam Backup Essentials v9 Overview
Veeam Backup Essentials v9 Overview
 
Virtualize Your Disaster! Customer Use Cases & Scenarios
Virtualize Your Disaster! Customer Use Cases & ScenariosVirtualize Your Disaster! Customer Use Cases & Scenarios
Virtualize Your Disaster! Customer Use Cases & Scenarios
 
What’s New in Backup Exec 16 FP2 Solution Brief
What’s New in Backup Exec 16 FP2 Solution Brief  What’s New in Backup Exec 16 FP2 Solution Brief
What’s New in Backup Exec 16 FP2 Solution Brief
 
Best Practices for Backup and Recovery: Windows Workload on AWS
Best Practices for Backup and Recovery: Windows Workload on AWS Best Practices for Backup and Recovery: Windows Workload on AWS
Best Practices for Backup and Recovery: Windows Workload on AWS
 
Introducing CloudBacko cloud / local backup software
Introducing CloudBacko cloud / local backup softwareIntroducing CloudBacko cloud / local backup software
Introducing CloudBacko cloud / local backup software
 
Building Disaster Recovery as a Service:
Building Disaster Recovery as a Service:Building Disaster Recovery as a Service:
Building Disaster Recovery as a Service:
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Enable Symantec Backup Exec™ to store and retrieve backup data to Cloud storage using CloudArray™ software

  • 1. Enable Symantec Backup Exec ™ to store and retrieve backup data to Cloud storage using CloudArray ™ software For virtualized and physical server environments
  • 2.
  • 3.
  • 4. Backup Targets Tape and/or D2D Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center D2D Tape Host n SAN LAN Offsite Tape Backup Storage Typical backup solution using Backup Exec VM and PS Data backup VM and PS Data restore (CIFS) VM=virtual machine, PS=physical server Backup Exec Backup target
  • 5.
  • 6.
  • 7. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec Backup target Backup Target Storing backup data for recovery in the Cloud offers many benefits, but how do we inexpensively connect Backup Exec to a Cloud provider of our choice?
  • 8. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec Backup target Backup Target … with CloudArray software! CloudArray
  • 9. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec Backup target TwinStrata.com CloudArray ESX CloudArray Virtual Appliance CloudArray operates as a virtual appliance It presents iSCSI volumes to physical and virtual servers Volumes are block-based and replicate data to cloud storage providers It’s local cache allows fast access to data
  • 10. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec Backup target TwinStrata.com CloudArray ESX CloudArray Virtual Appliance Provision CloudArray volume(s) using local storage as a cache or a full local copy
  • 11. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec Backup target TwinStrata.com CloudArray ESX CloudArray Virtual Appliance Cloud Storage Providers WAN CloudArray volume(s) are mapped to your choice of Cloud storage service providers with pricing as low as $0.15/GB per month
  • 12. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual Appliance Cloud Storage Providers WAN CloudArray Vol mapped To VCB Proxy Server Present CloudArray volume to Windows Proxy Server running Backup Exec. Backup Target
  • 13. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual Appliance Cloud Storage Providers WAN CloudArray Vol mapped To VCB Proxy Server Proxy Server installs NTFS on vol. and mounts drive Backup Target= mapped CloudArray volume with NTFS
  • 14. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual Appliance Cloud Storage Providers WAN CloudArray Vol mapped To VCB Proxy Server Backup Target= mapped CloudArray volume with NTFS In Backup Exec config window, create backup-to-disk folder and point it to CloudArray volume on Proxy Server.
  • 15. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual Appliance Cloud Storage Providers WAN CloudArray Vol mapped To VCB Proxy Server Backup Target [drive letter:] = mapped CloudArray volume with NTFS From the Backup Exec window, add VMs and physical hosts to be backed up to the Backup Exec database by selecting it from the resources tab Select destination folder in [drive letter:] where backup sources will reside Initiate backup
  • 16. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual Appliance Cloud Storage Providers WAN CloudArray Vol mapped To VCB Proxy Server Backup Target [drive letter:] = mapped CloudArray volume with NTFS The backup data set is written to CloudArray local cache
  • 17. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual Appliance Cloud Storage Providers WAN CloudArray Vol mapped To VCB Proxy Server Backup Target [drive letter:] = mapped CloudArray volume with NTFS The data set is asynchronously replicated to one or more Cloud storage providers of your choice Encryption, Compression,
  • 18. Proxy Server running Backup Exec VM Ph. Host VM disk files on primary storage Data Center Host n SAN LAN VM and PS Data backup VM and PS Data restore VM=virtual machine, PS=physical server Backup Exec TwinStrata.com CloudArray ESX CloudArray Virtual Appliance Cloud Storage Providers WAN CloudArray Vol mapped To VCB Proxy Server Backup Target [drive letter:] = mapped CloudArray volume with NTFS A restore operation from Backup Exec retrieves data from CloudArray local cache and Cloud storage provider(s)
  • 19.
  • 20.
  • 21.

Notas do Editor

  1. In-house vs web 2.0 apps
  2. In-house vs web 2.0 apps
  3. In-house vs web 2.0 apps
  4. In-house vs web 2.0 apps
  5. In-house vs web 2.0 apps
  6. In-house vs web 2.0 apps
  7. In-house vs web 2.0 apps
  8. In-house vs web 2.0 apps
  9. In-house vs web 2.0 apps
  10. In-house vs web 2.0 apps
  11. In-house vs web 2.0 apps
  12. In-house vs web 2.0 apps
  13. In-house vs web 2.0 apps
  14. In-house vs web 2.0 apps
  15. In-house vs web 2.0 apps