SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
SymantecBackupandRecovery TechnicalBrief
NetBackup7.6Deduplication Technology
NetBackup 7.6 Deduplication Technology
NetBackup 7.6 Overview
The Symantec NetBackup Platformisa completebackupandrecoverysolutionthatisoptimized for
virtually any workload, includingphysical,virtual, arrays, or big data infrastructures. NetBackup
delivers flexibletargetstorageoptions, such as tape, 3rd
-party disk, cloud, or appliance storage
devices,includingtheNetBackup Deduplication Appliances and Integrated Backup Appliances.
NetBackup 7.6 delivers the performance, automation, and manageability necessary to protect
virtualized deploymentsatscale–wherethousandsof Virtual Machinesand petabytes of data are
the normtoday,andwheresoftware-defined data centers and IT-as-a-service become the norm
tomorrow. Enterprises trust Symantec.
Key Benefits
 Comprehensive –As a singlesolution to protectall of your data assets,NetBackup provides
supportforvirtually every popularserver,storage,hypervisor,database, and application
platform used in the enterprise today.
 Scalable–High performance,elasticautomation,andcentralized management based on a flexible, multitier architecture
enables NetBackup to adapt to the growing needs of a fast-paced, modern enterprise data center.
 Integrated –Frombackupappliancesto bigdataplatforms,NetBackup integrates at every point in the technology stack to
improvereliability and performance. OpenStorage Technology (OST) provides even tighter integration with third-party
storage and snapshot solutions.
 Innovative–With hundredsof patentsawarded in areas including backup, recovery, virtualization, deduplication, and
snapshot management, NetBackup continues a long tradition of bringing advanced technologies to market first.
 Proven –For over a decade,NetBackuphasled the industry as the most popular enterprise data protection software by
marketshareandisused by many of thelargestenterprises on the planet. When you need your data back, you can trust
NetBackup.
Key Features
 One platform, one console unifies virtual and physical global data protection
 Unified global management of snapshots, replicated snapshots, backup, and recovery
 Scalable, global deduplication across virtual and physical infrastructures
 V-Ray one pass backup, instant image and single file restore for virtual and physical
 Automated virtual data protection and load balanced backup performance
Deduplication Overview
Deduplication isdefined astheelimination of redundantdatafromdisk storage. NetBackup deduplication uses a hash algorithm to
providea uniqueidentifier,or fingerprint, to datasegmentswithin a clientbackup stream. These fingerprints enable NetBackup to
identify clientdatasegmentsthatareidentical to oneanother,whichcanthen beused to prevent the same data from being stored
multiple times while still allowing the data to be restored when necessary.
Backup and archiveinfrastructures areideal candidatesfor deduplication due to the redundant nature of backed up and archived
data.For example,in many backupinfrastructures mostof thedatabacked upduringa full backupisidentical to that of the previous
full backup. Deduplication prevents storing multiple copies of the identical data.
KeyBenefits
 Powerful, enterprise-class data
deduplication technology
 Dramatic optimization of disk-
based backup storage
 Flexible implementation
choices, including server and
client deduplication
 Purpose-built appliance
solutions for streamlined
implementation and
management
 Support for OST-compliant
deduplication storage devices
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
SymantecBackupandRecovery TechnicalBrief
NetBackup7.6Deduplication Technology
Figure 1: Deduplication overview
In addition to thesignificantstoragesavingsthatareprovided by deduplicationtechnology,timeand otherresources arealso saved.
Although manyvendorsprovidetheabilityto performdeduplicationatthe storagetarget,usually atthe backup storage location or
appliance,beingableto deduplicatedataatthesource,or theclient,providestheability to significantly reduce network bandwidth
utilization, and can speed up the entire backup process. NetBackup supports deduplication at the target – also referred to as
NetBackup Media Server Deduplication (MSDP) – as well as client deduplication.
NetBackup Deduplication Options
NetBackup offersseveral optionsfor implementingdeduplication. Symantec’sfirstdeduplication product was PureDisk, which is a
stand-alone application.
Soon after Symantec released the PureDisk product, it was integrated into NetBackup through an option called the PureDisk
Deduplication Option,or PDDO,in which NetBackupused thePureDisk environmentasa deduplicationstorageunit.PureDisk is now
deprecated as a software form.
Another deduplicationoptionthatisavailableisNetBackupMediaServer Deduplication, or MSDP. An MSDP server is a NetBackup
media serverthatprovidesa built-inmethod for NetBackupto supportdeduplication withouttheneed for complex hardware.Prior to
NetBackup 7.5,theMSDP storagelimitwas32TB.In NetBackup 7.5 the limit was increased to 64TB. NetBackup can also perform
deduplication at the source, using a technology called client deduplication.
As another alternative,Symantec offerstheNetBackup5200-seriesappliances thatsupportdeduplication,andfromNetBackup7.6.1,
the 5300 seriesappliances.The5200and 5300 series appliances are effectively NetBackup media servers than have NetBackup
installed and preconfigured to performdeduplication.The5230 cansupportup to 144TBof deduplicated storage,whilstthe5330 can
support up to 229TB, as shown in figure 2.
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
SymantecBackupandRecovery TechnicalBrief
NetBackup7.6Deduplication Technology
Figure 2: NetBackup deduplication-enabled appliances
Finally,certain third-party vendors provide appliances that support NetBackup’s OpenStorage Technology (OST). Some of these
appliancessupportdeduplication.ChecktheSymantec NetBackup hardwarecompatibility list to determine the vendor appliances
that support this capability. http://www.symantec.com/business/support/index?page=content&id=TECH76495
How NetBackup Deduplication Works
Whilea backup job isrunning,NetBackup determines whatclientdataneedsto bebackedup. For each filethatisbacked up, the file
metadata –includingfilepermissions,directorylocation, and file name – is separated from the actual content of the file. The file
metadata is saved in the deduplication database.
The filecontentisbrokendown into smaller 128 KBsegments.In figure3,thisisrepresented by segments A, B, C, and D for File 1. A
hash fingerprintiscalculated for each segment. Thedata segmentfingerprintsarecompared againstthefingerprints of datasegments
thathavealready been stored in deduplicationstorage,in order to identify uniquedata segments.Only theuniquedatasegmentsare
sent to deduplication storage, along with the file metadata.
Itis importantto notethatfilesegmentsarechecked for uniquenessacrossall clients’backupdata,notjust for an indivi dual client.
This meansthatif an identical datasegmentexistson multipleclients,only a singlecopy of that data segment is written to storage.
The metadata storagetracksall themetadatafor each filethatisbacked up.Thecontentstoragetrackseachfileand all thesegments
thatareassociated with that file to enable NetBackup to put the file back together. In figure 2, data segments A, B, C, and D are
required to restore File 1.
Next, when File2 is backed up, the file is separated into metadata and content. The file contents are broken down into 128 KB
segments and a fingerprintiscalculated for eachsegment.SinceFile2 isslightly differentthanFile1,segmentsEand F are determined
to haveuniquefingerprints,whilesegmentsAand C havethesamefingerprintsassegmentsthatarealready stored in the database.
SincesegmentsEand F areunique,they aresentto storageand anotation ismadethatFile 2 iscomprised of segmentsA,E, C, and F.
This process continues for each file in the backup job, until all files are processed.
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
SymantecBackupandRecovery TechnicalBrief
NetBackup7.6Deduplication Technology
Figure 3: NetBackup deduplication example
Media Server and Client Deduplication Comparison
NetBackup providesthecapabilityto performbothmediaserverdeduplication and client-side deduplication, as shown in figure 4.
Depending on the circumstances, one deduplication method might be more beneficial than the other.
When usingNetBackupmediaserverdeduplication,theclientsends the entire backup data stream over the network to the media
server.Thededuplicationmedia server performsthefingerprinting.Itdetermineswhich data segments are unique and which data
segments have an exact fingerprint match that has been stored previously.
The media server sendsonlytheuniquedatasegments,thededuplicated data stream, to deduplication storage. The advantage of
performingdeduplication on themediaserver isthattheCPUof theclientisnotimpacted by fingerprintingactivity thatoccursduring
the backup.Potentialdisadvantagesarethatall backup datamustbesentover thenetwork,and thatheavydeduplication loads can
affect the overall performance of the media server.
When using client-side deduplication, the segmenting of client files and the fingerprinting of the resulting data segments, is
performed by theDeduplicationplug-inon theclientsystem.After comparingwith alocal fingerprintcache, or communicating with
the deduplication mediaserverto determinewhichdata segmentsareunique,only theuniquedatasegments,thededuplicated data
stream,issentover thenetwork to thededuplication mediaserver,which then writes thededuplicated datato deduplicationstorage.
Client-sidededuplicationhastheadvantagesof distributingthefingerprintingworkloadto theclients,aseach client deduplicates its
own backup data,andsendsonly uniqueclientdatasegmentsover thenetwork.Thiscan greatly reducethenetwork utilization. The
potential disadvantageof client-sidededuplicationistheadditionalloadthatisplaced on theclient’s CPU to perform dedupli cation
during the backup.
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
SymantecBackupandRecovery TechnicalBrief
NetBackup7.6Deduplication Technology
Figure 4: Media server and client deduplication
The good news isthatNetBackupcustomershavecapability to use client-side deduplication for those clients where that method
provides the greatest benefit, while simultaneously performing deduplication on the media server for other clients.
Summary
The Symantec Backup and Recovery productfamily offersmarket-leadingbackup and disasterrecoverysolutionsfor criticalcustomer
ITresources. Thisincludespowerful and proven storageoptimization technologies,such asdatadeduplication, that help customers
manage data growth and backup storage costs to lower overall total cost of ownership.
Feedback
Pleasetakea minuteto providefeedback on thisdocumentby clickingon this FEEDBACKLINK.This will redirect you to Adobe Forms
where you can fill out a very short form. This will take less than a minute and help us improve our documentation.
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products
are trademarks of their respective holder/s. 01/2014
SymantecBackupandRecovery TechnicalBrief
NetBackup7.6Deduplication Technology
For More Information
Link Description
http://www.netbackup.com/ NetBackup Home Page
http://www.symantec.com/docs/TECH59978 NetBackup Compatibility Information
http://www.symantec.com/docs/DOC6488 NetBackup Documentation
http://www.symantec.com/support Symantec Support Portal

Mais conteúdo relacionado

Mais procurados

Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
ljaquet
 
Accel - EMC - Data Domain Series
Accel - EMC - Data Domain SeriesAccel - EMC - Data Domain Series
Accel - EMC - Data Domain Series
accelfb
 
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
Symantec
 

Mais procurados (20)

A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
 
EMC Data domain advanced features and functions
EMC Data domain advanced features and functionsEMC Data domain advanced features and functions
EMC Data domain advanced features and functions
 
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMPEMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
 
EMC Deduplication Fundamentals
EMC Deduplication FundamentalsEMC Deduplication Fundamentals
EMC Deduplication Fundamentals
 
Novinky v NetBackup 7.7
Novinky v NetBackup 7.7Novinky v NetBackup 7.7
Novinky v NetBackup 7.7
 
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
Better Backup For All Symantec Appliances NetBackup 5220 Backup Exec 3600 May...
 
Data Domain Architecture
Data Domain ArchitectureData Domain Architecture
Data Domain Architecture
 
Presentation deduplication backup software and system
Presentation   deduplication backup software and systemPresentation   deduplication backup software and system
Presentation deduplication backup software and system
 
Avamar 7 2010
Avamar 7 2010Avamar 7 2010
Avamar 7 2010
 
Emc data domain
Emc data domainEmc data domain
Emc data domain
 
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
 
EV9 & NBU5000
EV9 & NBU5000EV9 & NBU5000
EV9 & NBU5000
 
EMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed ReviewEMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed Review
 
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
 
Accel - EMC - Data Domain Series
Accel - EMC - Data Domain SeriesAccel - EMC - Data Domain Series
Accel - EMC - Data Domain Series
 
Presentation data domain advanced features and functions
Presentation   data domain advanced features and functionsPresentation   data domain advanced features and functions
Presentation data domain advanced features and functions
 
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
 
Emc data domain® boost integration guide
Emc data domain® boost integration guideEmc data domain® boost integration guide
Emc data domain® boost integration guide
 
Symantec Backup Exec 2010 and NetBackup 7
Symantec Backup Exec 2010 and NetBackup 7Symantec Backup Exec 2010 and NetBackup 7
Symantec Backup Exec 2010 and NetBackup 7
 
Training netbackup6x2
Training netbackup6x2Training netbackup6x2
Training netbackup6x2
 

Destaque

Mobile App Tracking - How it Works
Mobile App Tracking - How it WorksMobile App Tracking - How it Works
Mobile App Tracking - How it Works
MobileAppTracking
 
The Nature of Production
The Nature of ProductionThe Nature of Production
The Nature of Production
Kim Delisser
 
Top 36 project coordinator interview questions and answers pdf
Top 36 project coordinator interview questions and answers pdfTop 36 project coordinator interview questions and answers pdf
Top 36 project coordinator interview questions and answers pdf
HelenMirren123
 

Destaque (20)

Basics of Coding in Pediatrics Medical Billing
Basics of Coding in Pediatrics Medical BillingBasics of Coding in Pediatrics Medical Billing
Basics of Coding in Pediatrics Medical Billing
 
Mobile App Tracking - How it Works
Mobile App Tracking - How it WorksMobile App Tracking - How it Works
Mobile App Tracking - How it Works
 
Understanding Document Managment Systems and Nuxeo
Understanding Document Managment Systems and NuxeoUnderstanding Document Managment Systems and Nuxeo
Understanding Document Managment Systems and Nuxeo
 
Sample Product Overview Presentation
Sample Product Overview PresentationSample Product Overview Presentation
Sample Product Overview Presentation
 
Objectives and strategies of M&A
Objectives and strategies of M&AObjectives and strategies of M&A
Objectives and strategies of M&A
 
Servicenow ppt
Servicenow pptServicenow ppt
Servicenow ppt
 
The Nature of Production
The Nature of ProductionThe Nature of Production
The Nature of Production
 
NFL CASE STUDY ANALYSIS
NFL CASE STUDY ANALYSISNFL CASE STUDY ANALYSIS
NFL CASE STUDY ANALYSIS
 
Surgical induced astigmatism
Surgical induced astigmatismSurgical induced astigmatism
Surgical induced astigmatism
 
Getting started with SAP PI/PO an overview presentation
Getting started with SAP PI/PO an overview presentationGetting started with SAP PI/PO an overview presentation
Getting started with SAP PI/PO an overview presentation
 
Best Practices for Testing in salesforce.com
Best Practices for Testing in salesforce.comBest Practices for Testing in salesforce.com
Best Practices for Testing in salesforce.com
 
Types of Art Media
Types of Art MediaTypes of Art Media
Types of Art Media
 
Brand Management Lezione 1
Brand Management Lezione 1 Brand Management Lezione 1
Brand Management Lezione 1
 
Components of nuclear reactor
Components of nuclear reactorComponents of nuclear reactor
Components of nuclear reactor
 
How to test payment gateway functionality
How to test payment gateway functionalityHow to test payment gateway functionality
How to test payment gateway functionality
 
Objectives of supply chain management
Objectives of supply chain managementObjectives of supply chain management
Objectives of supply chain management
 
8 D – Problem Solving Process
8 D – Problem Solving Process8 D – Problem Solving Process
8 D – Problem Solving Process
 
Top 36 project coordinator interview questions and answers pdf
Top 36 project coordinator interview questions and answers pdfTop 36 project coordinator interview questions and answers pdf
Top 36 project coordinator interview questions and answers pdf
 
Opportunities In Marketing
Opportunities In MarketingOpportunities In Marketing
Opportunities In Marketing
 
ServiceNow Overview
ServiceNow OverviewServiceNow Overview
ServiceNow Overview
 

Semelhante a TECHNICAL BRIEF▶ NetBackup 7.6 Deduplication Technology

Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paper
Symantec
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
Kranthi
 
Hpe data protector deduplication
Hpe data protector deduplicationHpe data protector deduplication
Hpe data protector deduplication
Andrey Karpov
 
Back up and restore data faster with a Dell PowerProtect Data Manager Appliance
Back up and restore data faster with a Dell PowerProtect Data Manager ApplianceBack up and restore data faster with a Dell PowerProtect Data Manager Appliance
Back up and restore data faster with a Dell PowerProtect Data Manager Appliance
Principled Technologies
 
Sample_Blueprint-Fault_Tolerant_NAS
Sample_Blueprint-Fault_Tolerant_NASSample_Blueprint-Fault_Tolerant_NAS
Sample_Blueprint-Fault_Tolerant_NAS
Mike Alvarado
 
Case Study British Red Cross 161257
Case Study British Red Cross 161257Case Study British Red Cross 161257
Case Study British Red Cross 161257
AsigraCloudBackup
 

Semelhante a TECHNICAL BRIEF▶ NetBackup 7.6 Deduplication Technology (20)

Net App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution SheetNet App Syncsort Integrated Backup Solution Sheet
Net App Syncsort Integrated Backup Solution Sheet
 
TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014
TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014
TECHNICAL BRIEF▶ NDMP Backups with Backup Exec 2014
 
Reduce time to complete backups and restores with Transparent Snapshots with ...
Reduce time to complete backups and restores with Transparent Snapshots with ...Reduce time to complete backups and restores with Transparent Snapshots with ...
Reduce time to complete backups and restores with Transparent Snapshots with ...
 
Combining IBM Real-time Compression and IBM ProtecTIER Deduplication
Combining IBM Real-time Compression and IBM ProtecTIER DeduplicationCombining IBM Real-time Compression and IBM ProtecTIER Deduplication
Combining IBM Real-time Compression and IBM ProtecTIER Deduplication
 
Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paper
 
Data De-Duplication Engine for Efficient Storage Management
Data De-Duplication Engine for Efficient Storage ManagementData De-Duplication Engine for Efficient Storage Management
Data De-Duplication Engine for Efficient Storage Management
 
Netbackup advantages features and benefits Netbackup classes may help hands o...
Netbackup advantages features and benefits Netbackup classes may help hands o...Netbackup advantages features and benefits Netbackup classes may help hands o...
Netbackup advantages features and benefits Netbackup classes may help hands o...
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Hpe data protector deduplication
Hpe data protector deduplicationHpe data protector deduplication
Hpe data protector deduplication
 
Back up and restore data faster with a Dell PowerProtect Data Manager Appliance
Back up and restore data faster with a Dell PowerProtect Data Manager ApplianceBack up and restore data faster with a Dell PowerProtect Data Manager Appliance
Back up and restore data faster with a Dell PowerProtect Data Manager Appliance
 
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
 
TECHNICAL BRIEF▶ Using Virtual Tape Libraries with Backup Exec 2014
TECHNICAL BRIEF▶ Using Virtual Tape Libraries with Backup Exec 2014TECHNICAL BRIEF▶ Using Virtual Tape Libraries with Backup Exec 2014
TECHNICAL BRIEF▶ Using Virtual Tape Libraries with Backup Exec 2014
 
Datasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media serverDatasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media server
 
Sample_Blueprint-Fault_Tolerant_NAS
Sample_Blueprint-Fault_Tolerant_NASSample_Blueprint-Fault_Tolerant_NAS
Sample_Blueprint-Fault_Tolerant_NAS
 
Backing Up Mountains of Data to Disk
Backing Up Mountains of Data to DiskBacking Up Mountains of Data to Disk
Backing Up Mountains of Data to Disk
 
Case Study British Red Cross 161257
Case Study British Red Cross 161257Case Study British Red Cross 161257
Case Study British Red Cross 161257
 
ProServer - Direct network attached CD / DVD Server and Loader
ProServer - Direct network attached CD / DVD Server and LoaderProServer - Direct network attached CD / DVD Server and Loader
ProServer - Direct network attached CD / DVD Server and Loader
 
Fluid Data Storage:Driving Flexibility in the Data Center
Fluid Data Storage:Driving Flexibility in the Data Center Fluid Data Storage:Driving Flexibility in the Data Center
Fluid Data Storage:Driving Flexibility in the Data Center
 
Oaklands college: Protecting your data.
Oaklands college: Protecting your data.Oaklands college: Protecting your data.
Oaklands college: Protecting your data.
 
DATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackup
DATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackupDATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackup
DATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackup
 

Mais de Symantec

Mais de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Último

AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 

Último (20)

Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 

TECHNICAL BRIEF▶ NetBackup 7.6 Deduplication Technology

  • 1. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 SymantecBackupandRecovery TechnicalBrief NetBackup7.6Deduplication Technology NetBackup 7.6 Deduplication Technology NetBackup 7.6 Overview The Symantec NetBackup Platformisa completebackupandrecoverysolutionthatisoptimized for virtually any workload, includingphysical,virtual, arrays, or big data infrastructures. NetBackup delivers flexibletargetstorageoptions, such as tape, 3rd -party disk, cloud, or appliance storage devices,includingtheNetBackup Deduplication Appliances and Integrated Backup Appliances. NetBackup 7.6 delivers the performance, automation, and manageability necessary to protect virtualized deploymentsatscale–wherethousandsof Virtual Machinesand petabytes of data are the normtoday,andwheresoftware-defined data centers and IT-as-a-service become the norm tomorrow. Enterprises trust Symantec. Key Benefits  Comprehensive –As a singlesolution to protectall of your data assets,NetBackup provides supportforvirtually every popularserver,storage,hypervisor,database, and application platform used in the enterprise today.  Scalable–High performance,elasticautomation,andcentralized management based on a flexible, multitier architecture enables NetBackup to adapt to the growing needs of a fast-paced, modern enterprise data center.  Integrated –Frombackupappliancesto bigdataplatforms,NetBackup integrates at every point in the technology stack to improvereliability and performance. OpenStorage Technology (OST) provides even tighter integration with third-party storage and snapshot solutions.  Innovative–With hundredsof patentsawarded in areas including backup, recovery, virtualization, deduplication, and snapshot management, NetBackup continues a long tradition of bringing advanced technologies to market first.  Proven –For over a decade,NetBackuphasled the industry as the most popular enterprise data protection software by marketshareandisused by many of thelargestenterprises on the planet. When you need your data back, you can trust NetBackup. Key Features  One platform, one console unifies virtual and physical global data protection  Unified global management of snapshots, replicated snapshots, backup, and recovery  Scalable, global deduplication across virtual and physical infrastructures  V-Ray one pass backup, instant image and single file restore for virtual and physical  Automated virtual data protection and load balanced backup performance Deduplication Overview Deduplication isdefined astheelimination of redundantdatafromdisk storage. NetBackup deduplication uses a hash algorithm to providea uniqueidentifier,or fingerprint, to datasegmentswithin a clientbackup stream. These fingerprints enable NetBackup to identify clientdatasegmentsthatareidentical to oneanother,whichcanthen beused to prevent the same data from being stored multiple times while still allowing the data to be restored when necessary. Backup and archiveinfrastructures areideal candidatesfor deduplication due to the redundant nature of backed up and archived data.For example,in many backupinfrastructures mostof thedatabacked upduringa full backupisidentical to that of the previous full backup. Deduplication prevents storing multiple copies of the identical data. KeyBenefits  Powerful, enterprise-class data deduplication technology  Dramatic optimization of disk- based backup storage  Flexible implementation choices, including server and client deduplication  Purpose-built appliance solutions for streamlined implementation and management  Support for OST-compliant deduplication storage devices
  • 2. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 SymantecBackupandRecovery TechnicalBrief NetBackup7.6Deduplication Technology Figure 1: Deduplication overview In addition to thesignificantstoragesavingsthatareprovided by deduplicationtechnology,timeand otherresources arealso saved. Although manyvendorsprovidetheabilityto performdeduplicationatthe storagetarget,usually atthe backup storage location or appliance,beingableto deduplicatedataatthesource,or theclient,providestheability to significantly reduce network bandwidth utilization, and can speed up the entire backup process. NetBackup supports deduplication at the target – also referred to as NetBackup Media Server Deduplication (MSDP) – as well as client deduplication. NetBackup Deduplication Options NetBackup offersseveral optionsfor implementingdeduplication. Symantec’sfirstdeduplication product was PureDisk, which is a stand-alone application. Soon after Symantec released the PureDisk product, it was integrated into NetBackup through an option called the PureDisk Deduplication Option,or PDDO,in which NetBackupused thePureDisk environmentasa deduplicationstorageunit.PureDisk is now deprecated as a software form. Another deduplicationoptionthatisavailableisNetBackupMediaServer Deduplication, or MSDP. An MSDP server is a NetBackup media serverthatprovidesa built-inmethod for NetBackupto supportdeduplication withouttheneed for complex hardware.Prior to NetBackup 7.5,theMSDP storagelimitwas32TB.In NetBackup 7.5 the limit was increased to 64TB. NetBackup can also perform deduplication at the source, using a technology called client deduplication. As another alternative,Symantec offerstheNetBackup5200-seriesappliances thatsupportdeduplication,andfromNetBackup7.6.1, the 5300 seriesappliances.The5200and 5300 series appliances are effectively NetBackup media servers than have NetBackup installed and preconfigured to performdeduplication.The5230 cansupportup to 144TBof deduplicated storage,whilstthe5330 can support up to 229TB, as shown in figure 2.
  • 3. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 SymantecBackupandRecovery TechnicalBrief NetBackup7.6Deduplication Technology Figure 2: NetBackup deduplication-enabled appliances Finally,certain third-party vendors provide appliances that support NetBackup’s OpenStorage Technology (OST). Some of these appliancessupportdeduplication.ChecktheSymantec NetBackup hardwarecompatibility list to determine the vendor appliances that support this capability. http://www.symantec.com/business/support/index?page=content&id=TECH76495 How NetBackup Deduplication Works Whilea backup job isrunning,NetBackup determines whatclientdataneedsto bebackedup. For each filethatisbacked up, the file metadata –includingfilepermissions,directorylocation, and file name – is separated from the actual content of the file. The file metadata is saved in the deduplication database. The filecontentisbrokendown into smaller 128 KBsegments.In figure3,thisisrepresented by segments A, B, C, and D for File 1. A hash fingerprintiscalculated for each segment. Thedata segmentfingerprintsarecompared againstthefingerprints of datasegments thathavealready been stored in deduplicationstorage,in order to identify uniquedata segments.Only theuniquedatasegmentsare sent to deduplication storage, along with the file metadata. Itis importantto notethatfilesegmentsarechecked for uniquenessacrossall clients’backupdata,notjust for an indivi dual client. This meansthatif an identical datasegmentexistson multipleclients,only a singlecopy of that data segment is written to storage. The metadata storagetracksall themetadatafor each filethatisbacked up.Thecontentstoragetrackseachfileand all thesegments thatareassociated with that file to enable NetBackup to put the file back together. In figure 2, data segments A, B, C, and D are required to restore File 1. Next, when File2 is backed up, the file is separated into metadata and content. The file contents are broken down into 128 KB segments and a fingerprintiscalculated for eachsegment.SinceFile2 isslightly differentthanFile1,segmentsEand F are determined to haveuniquefingerprints,whilesegmentsAand C havethesamefingerprintsassegmentsthatarealready stored in the database. SincesegmentsEand F areunique,they aresentto storageand anotation ismadethatFile 2 iscomprised of segmentsA,E, C, and F. This process continues for each file in the backup job, until all files are processed.
  • 4. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 SymantecBackupandRecovery TechnicalBrief NetBackup7.6Deduplication Technology Figure 3: NetBackup deduplication example Media Server and Client Deduplication Comparison NetBackup providesthecapabilityto performbothmediaserverdeduplication and client-side deduplication, as shown in figure 4. Depending on the circumstances, one deduplication method might be more beneficial than the other. When usingNetBackupmediaserverdeduplication,theclientsends the entire backup data stream over the network to the media server.Thededuplicationmedia server performsthefingerprinting.Itdetermineswhich data segments are unique and which data segments have an exact fingerprint match that has been stored previously. The media server sendsonlytheuniquedatasegments,thededuplicated data stream, to deduplication storage. The advantage of performingdeduplication on themediaserver isthattheCPUof theclientisnotimpacted by fingerprintingactivity thatoccursduring the backup.Potentialdisadvantagesarethatall backup datamustbesentover thenetwork,and thatheavydeduplication loads can affect the overall performance of the media server. When using client-side deduplication, the segmenting of client files and the fingerprinting of the resulting data segments, is performed by theDeduplicationplug-inon theclientsystem.After comparingwith alocal fingerprintcache, or communicating with the deduplication mediaserverto determinewhichdata segmentsareunique,only theuniquedatasegments,thededuplicated data stream,issentover thenetwork to thededuplication mediaserver,which then writes thededuplicated datato deduplicationstorage. Client-sidededuplicationhastheadvantagesof distributingthefingerprintingworkloadto theclients,aseach client deduplicates its own backup data,andsendsonly uniqueclientdatasegmentsover thenetwork.Thiscan greatly reducethenetwork utilization. The potential disadvantageof client-sidededuplicationistheadditionalloadthatisplaced on theclient’s CPU to perform dedupli cation during the backup.
  • 5. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 SymantecBackupandRecovery TechnicalBrief NetBackup7.6Deduplication Technology Figure 4: Media server and client deduplication The good news isthatNetBackupcustomershavecapability to use client-side deduplication for those clients where that method provides the greatest benefit, while simultaneously performing deduplication on the media server for other clients. Summary The Symantec Backup and Recovery productfamily offersmarket-leadingbackup and disasterrecoverysolutionsfor criticalcustomer ITresources. Thisincludespowerful and proven storageoptimization technologies,such asdatadeduplication, that help customers manage data growth and backup storage costs to lower overall total cost of ownership. Feedback Pleasetakea minuteto providefeedback on thisdocumentby clickingon this FEEDBACKLINK.This will redirect you to Adobe Forms where you can fill out a very short form. This will take less than a minute and help us improve our documentation.
  • 6. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks of Symantec Corporation. All other brands and products are trademarks of their respective holder/s. 01/2014 SymantecBackupandRecovery TechnicalBrief NetBackup7.6Deduplication Technology For More Information Link Description http://www.netbackup.com/ NetBackup Home Page http://www.symantec.com/docs/TECH59978 NetBackup Compatibility Information http://www.symantec.com/docs/DOC6488 NetBackup Documentation http://www.symantec.com/support Symantec Support Portal