Upload
sai-kumar
View
36
Download
2
Tags:
Embed Size (px)
DESCRIPTION
Backup Exec Guide
Citation preview
The Fundamental Guide to Symantec Backup Exec and System Recovery Data ProtectionPortfolio
Backup Exec 2012 Fundamental GuideWho should read this paperWho should read this paper
Anyone who needs a quick reference to the capabilities of Backup Exec2012 from sales managers to consultants and technical pre-salesmanagers. This publication is designed to offer readers an overview ofBackup Exec 2012 and Symantec System Recovery 2011.
PAR
TNER
BR
IEF:FU
ND
AM
ENTA
L GU
IDE – B
ACKU
P EXEC 2012
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
SYMANTEC PROPRIETARY/CONFIDENTIAL—INTERNAL & PARTNERS UNDER NDA USE ONLY.This document contains confidential and privileged information. It is intended for use by SymantecPartners to help evaluate Symantec solutions provided such Partners have signed an agreementwith the appropriate confidentiality provisions.
Content
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Data Protection and Archiving - Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
BE 2012 Agents and Options - Quick View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Backup Exec 2012 Core Products. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Backup Exec 2012 Core Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Agents for Virtual Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Backup Exec 2012 Agent for Applications and Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Backup Exec 2012 Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Disaster Recovery Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Virtual Infrastructure Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Storage Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Application Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Disaster Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
For more information visit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Glossary of some Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
Introduction
This paper is aimed at all Professionals who work with Symantec Backup Exec and Symantec System Recovery who can leverage this guide to
improve general knowledge of Symantec’s Data Protection strategy and wider Information Management capabilities. Professionals can use
this document to build availability solutions and data protection strategies – based upon Backup Exec – for all types of organizations.
The publication in broken down into a number of sections that focus on the following:
• The Information Management Group, Symantec
• Virtual Infrastructure Protection
• Storage Management
• Application Protection
• Disaster Recovery Solutions
Each section looks at specific products or services and explains, as simply as possible, what it does and how it fits into a backup strategy
without going into great technical detail. This publication should be of use to the following:
• Anyone who needs to gain a high level view of what Symantec Backup Exec and Symantec System recovery products offer
• Anyone who is responsible for developing sales and marketing strategies for data protection or application/system recovery
• Anyone who needs to understand the requirements or offerings around protecting information and IT systems
• Anyone who wants to understand more about backing up data to protect businesses
Integrated products and solutions should give flexibility, a key factor in successful project design. Flexibility also helps ensure that the
solution can be deployed successfully when the time comes. This publication is intended to help readers become more informed about
Symantec Backup Exec and Symantec System Recovery, and how these solutions can be leveraged to implement data protection and disaster
recovery solutions that meet the challenges resulting from modern data and storage management problems.
This guide is not meant to be read from cover-to-cover; rather, it is meant to act as a reference guide that can be referred to as needed
depending upon topic and context.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
1
Data Protection and Archiving - Overview
Competition is intense in every industry; consequently, in today’s world the window of opportunity, whether it’s to enter a new market,
launch a new product, or increase customer satisfaction, is small. As a result, technology innovations, driven by pervasive connectivity, have
fueled new capabilities and business models to speed up processes and routes to market. More and more businesses are using Web services
for delivery, and numerous organizations are outsourcing non-core functions in order to concentrate on processes that help create a
competitive advantage.
To make matters more incestuous, organizations are bringing outside businesses inside by collaborating with other organizations in the
supply chain ecosystem, utilizing cloud capabilities and driving change throughout and across the extended business, to enable businesses
to interact more with customers, partners, and suppliers. Although these technologies are driving operations costs down, speed remains the
ultimate competitive differentiator and winning requires companies to innovate more and move faster than the competition.
So, with companies racing to get to market with new services and products, it is now even more important for organizations to be agile and
proactive, to think creatively, and to push the boundaries of what’s possible to create, and to deliver to their existing as well as new and
undiscovered markets. If IT has transitioned from being a business support function to being a driver of business innovation, then businesses
are looking to IT to grow commerce, looking to IT to grow the business, looking to IT to facilitate growth by improving business unit efficiency
with innovative operational tools, looking to IT to improve the manageability of IT systems and business requirements, and thereby grow top
line revenue and bottom line profitability. Given this requirement, it is even more important for IT departments to control costs, manage
complexity and ensure adherence to regulations; a task that remains challenging with data growth continuing to double each year and
organizations’ environments continuing to become more complex.
As organizations become more collaborative, more people have access to the infrastructure and the applications the infrastructure supports.
Information is more distributed and accessible than ever before. Businesses need access to information anytime, anywhere. That means that
critical business systems must be up and running at all times. This requires a broader approach to the protection of data and IT systems.
Businesses need to protect both the physical and the virtual components of their IT systems, the hardware, networks, storage, servers,
operating systems, as well as the databases and the applications, across all tiers of the network.
IT needs to protect a broad range of information, generated in a plethora of ways, through multiple applications used by billions of
individuals around the world. Organizations not only need to protect their information and IT infrastructure, but need to be aware of how the
infrastructure facilitates the sharing and use of the information used by the organization between, not just connections among colleagues,
but linking businesses, from businesses to consumers, as well as between consumers themselves. In other words, all the collaborative
environments, and the movement of data while in use.
The IT world is now required to protect the infrastructure, the data and ultimately the business and that mean creating an IT environment
that is free of risks of data loss, reducing the danger of interrupted systems. That’s were Symantec Backup Exec can help.
Symantec can help organizations manage data protection complexity across their IT estate and to sustain the availability of information,
systems, and applications, and can help organizations protect the entire IT infrastructure, from client to storage. This is done through
standardized software solutions that enable improved productivity, greater agility, reduced costs, lowered risk of failure and downtime, and
better service.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
2
Symantec has no operating system agenda, no database agenda, and no application agenda, giving organizations the flexibility they need to
be aligned with the business. Symantec’s long term objective is to help organizations build an IT machine that ultimately delivers IT simply,
with policy-driven management and reporting capabilities that dynamically improve backup, archiving and infrastructure utilization,
automates routine tasks, and helps maintain service levels. Symantec can help organizations optimize the operation of their information from
end-to-end; Backup Exec streamlines and automates the management of data within storage and servers, while also enhancing the
performance of applications.
IT organizations use Backup Exec to build the solution that’s right for them. From a quick and easy pick and mix menu of agents and options,
IT professionals can standardize on a common software information management infrastructure layer, whether the protected resource is
virtual or physical, and solve one of IT’s biggest headaches – the protection of its most critical asset - data.
About Backup
Simply put, backup is the ability to take an electronic copy of a piece of data and put it somewhere else just in case something should go
wrong with the original copy – knowing that things go wrong all the time.
Sounds pretty simple doesn’t it? Sadly over time things always become more complicated – not so much the backup solution as the amount
of data and the complexity of the IT infrastructure. The days have gone where we had the time to turn off our systems in order to back them
up. With increasing amounts of data that’s being received, created, analyzed and stored, the time it takes to backup servers and the
associated storage is growing.
• How much data could you get on 3 ½” floppy disk? (1.44MB) (Mid 1990s)
• One CD ROM (650MB) is equivalent to about 450 floppies (Early 2000s)
• One DVD (4.7GB) to around 3000 floppies (Mid 2000s)
• One 64GB memory stick is the same as 45,508 floppies (2012)
And our servers and systems keep expanding to keep up with our data storage needs, new systems arrive on a frequent basis and are
installed and up and running with new applications - creating and manipulating data.
However, traditional backup solutions require the application to be shut down and tend to use all available network resources for the backup
to occur as quickly as possible, hence backups used to be done after everyone went home – a luxury we no longer have. The art of backing up
an application while it is still running is called a ‘hot backup’ and it’s tough because you need to ensure that the data doesn’t become
corrupted or inconsistent at any time. So, the backup solution needs to be able to integrate with the applications you are using.
What happens when your data becomes too big? Backup applications need to understand the complexities of applications with big data sets.
There are a number of ways of dealing with “Big Data”. This could be block-level incremental backup or imaged based backups, which either
backup just the changes that have taken place or take a snapshot image of the data. The options for different types of storage can be
extremely complex. IT systems can include virtualized storage or servers, Storage Area Networks (SAN), or Network Data Management
Protocol (NDMP) devices, running Fiber Channel over Ethernet (FCoE). Regardless of the storage system being used, you will need a backup
solution that can cope with what you have, so all servers and storage can be backed up.
The change in disk capacity has opened up a whole new world to backup – why use tape when you could use disk? Disk is faster, lots of
people can access it at the same time, and it can be easily updated and overwritten. Looks like a great solution, right?
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
3
It is. Backup solutions can both backup to disk and then, after a period of time, copy data to a tape as well. There are lots of benefits to this
hybrid disk + tape approach. Firstly, the backups are quicker because writing to disk is faster than writing to tape. Secondly, the backups can
be online so users can readily ask for their data back without the need to involve tapes, tape libraries and IT people, to recover a file that they
lost. In the ideal world, the recovery of data will be from disk rather than tape. In the real world, there will always be data required from
longer ago than the disk backup system can provide, so having longer term copies on tape is invaluable.
As was mentioned earlier, it’s all about flexibility, which is perhaps one of Backup Exec’s greatest attributes. Whether the target environment
includes virtual or physical resources, whether the storage system includes disk or tape devices, whether the servers are running Windows or
Linux platforms, and whether the infrastructure is simple or complex, Backup Exec can ensure the applications and data within the IT
infrastructure are properly protected and always available for recovery.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
4
BE 2012 Agents and Options - Quick View
Core Products
• Symantec Backup Exec™2012
• Symantec Backup Exec™ 2012 Small Business Edition
• Symantec Backup Exec™ 2012 V-Ray Edition
• Symantec Backup Exec™ 2012 Capacity Edition
• Symantec Backup Exec™ 3600 Appliance
• Symantec Backup Exec™ Desktop and Laptop Option
• Symantec Backup Exec™ System Recovery 2011 Server Edition
• Symantec Backup Exec™ Recovery 2011 Desktop Edition
• Symantec Backup Exec™ Recovery 2011 Small Business Server Edition
Agents and Options
AgentsAgents
• Backup Exec™ 2012 Agent for Windows® Systems (AWS)
• Backup Exec™ 2012 Agent for Applications and Databases
⁃ for Microsoft® Exchange Server
⁃ for Microsoft SQL Server®
⁃ for Microsoft SharePoint®
⁃ for Windows Active Directory®
⁃ for Lotus Domino®
⁃ for Oracle®
⁃ for Enterprise Vault
• Backup Exec™ 2012 Agent for VMware and Hyper-V
⁃ for VMware
⁃ for Microsoft Hyper-V
• Backup Exec™ 2012 Agent for Linux® Servers
• Backup Exec™ 2012 Remote Media Agent for Linux Servers
• Backup Exec™ 2012 Agent for Macintosh® Servers
OpOptionstions
• Backup Exec™ 2012 Enterprise Server Option – includes:
⁃ Central Administration Server Option & Advanced Disk Backup Option
• Backup Exec™ 2012 Deduplication Option
• Backup Exec™ 2012 Exchange Mailbox Archiving Option 1-10
• Backup Exec™ 2012 File System Archiving Option
• Backup Exec™ 2012 VTL Unlimited Drive Option
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
5
• Backup Exec™ 2012 Library Expansion Option
• Backup Exec™ 2012 NDMP Option
Backup Exec 2012 Core Products
Symantec Backup Exec™ 2012 Family
The Symantec Backup Exec product family offers market-leading backup and disaster recovery solutions for critical customer IT resources.
This includes Backup Exec 2012, Symantec System Recovery 2011, the BE 3600 Appliance, a virtual-only V-Ray Edition, Capacity licensing,
BE.cloud, and the Small Business Edition.
Backup Exec 2012
Symantec Backup Exec 2012 has dramatically re-engineered its range of offerings and user interface to deliver even more comprehensive
and reliable backup and recovery for any IT environment. The new, modern range of Backup Exec solutions are designed to adapt for any
business. Organizations can easily protect increasing amounts of data, in either virtual or physical, environments with integrated VMware
and Hyper-V protection, while reducing storage and management costs through integrated deduplication and archiving technology; reduce
customer business downtime through integrated bare metal and dissimilar hardware recovery features and backup to virtual (B2V) and
convert to virtual (P2V) capabilities, and ensure critical information on virtual or physical systems is always protected and can be restored in
seconds.
Key Features
• Market-leading data and application protection for physical and virtual server environments
⁃ A redesigned administration console eliminate complexity and reduce time managing backups
• Support for the latest virtual platforms, such as Hyper-V 2008 R2 and vSphere 5.0
• First-to-market granular recovery for virtual applications from a single-pass backup
• Block-level data deduplication reduces storage costs associated with backup processes
• Integrated bare metal and dissimilar hardware recovery make disaster recovery painless
• B2V and P2V features leverage virtual technology for migration and virtual fail over
• Backup Exec 3600 Appliance offers the reliability of Backup Exec software on optimized hardware
These powerful capabilities in Backup Exec 2012 allow Businesses to protect more customer data while reducing storage and management
costs, optimize network utilization across physical and virtual environments, automate storage management savings with efficient archiving
and backup, and enable all types of recovery for both virtual and physical resources, all through a single product and console.
Symantec Backup Exec 2012 provides technologies that offer multiple opportunities to ensure that backup and recovery strategies are kept
up to date. Backup Exec 2012’s market-leading archiving and disaster recovery capabilities ensure that IT infrastructures are fully protected.
Our integrated deduplication and archiving technologies, plus first-to-market granular application recovery for virtual environments, help IT
improve backup performance and reduce storage and administration costs.
Symantec Backup Exec 2012 delivers reliable Windows, Linux, Macintosh, ESX, vSphere and Hyper-V server backup and recovery. Backup
Exec enables the automated protection of critical data with advanced automated protection of applications such as Microsoft Exchange,
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
6
Microsoft SQL Server, Active Directory and Oracle, simplifying routine network administration. Coupled with Backup Exec’s flexible Agents
and Options, Backup Exec 2012 provides:
• Integrated and adaptable deduplication - helps reduce storage costs while optimizing network utilization across physical and virtual
environments. Reduces the amount of data you have to backup and store on disk.
• Unified backup and archiving - automates storage and management savings through efficient data lifecycle management. Reduces the
data held on primary storage for either Exchange or file system by archiving off older data – instead of backing up the same data over and
over again.
• Granular application and database recovery of virtual and physical servers from a single-pass backups (you only need to run one backup
instead of two); reduces costs with fewer backups. Restores individual items with no impact on the end user environment no matter
whether in virtual or physical environment.
• Choose the leading backup and recovery technology for the latest Windows® systems and mixed O/S environments that customers have
relied on for over three decades. Dependable and sturdy - why make the mistake of using anything inferior?
• Supports disk and tape, virtual and physical maintains productivity, profits, and confidence – one solution for every IT environment.
⁃ Centralized management reduces administration time and effort ensures that a distributed backup environment is protected with ease.
Backup ExBackup Exec Serec Server Licensever License
This is the core Backup Exec product. This license enables a server to act as the central backup “brain” for your backup strategy. The Backup
Exec console run from this server allows the administrator to manage each agent or option that is added to a backup solution. It automates
the processes and capabilities of data protection and acts as a central location for monitoring success rates. The BE 2012 Backup Exec Server
License provides a new streamlined administration console (user interface) making it easier to set up backups, manage backup policies,
perform disaster recovery, and convert backups of servers to virtual machines for instant disaster recovery or for migration. It includes
defaults for backup and recovery that can be leveraged to protect data and applications with minimal effort. The Backup Exec Server License
also includes integrated bare metal recovery and dissimilar hardware recovery capabilities called Simplified Disaster Recovery which is used
to rebuild the failed server and restore it to a functional state. By adding agents and options to your solution you can enhance and customize
the backup and restore process for specific systems, applications, databases, or file systems as well as improve storage management and
disaster recovery capabilities.
Backup ExBackup Exec 2012 Small Business Eec 2012 Small Business Edition (BESBE)dition (BESBE)
The Backup Exec™ 2012 Small Business Edition (BESBE) is an all-in-one package for small businesses that replaces previous Backup Exec
Microsoft Small Business Server (BE SBS) Editions. Microsoft has recently reviewed and changed its licensing for the Microsoft Small
Business Server, operating system and application software, due to more customers wanting to take advantage of server virtualization
technologies. To simplify the whole licensing process Symantec have replaced Backup Exec SBS with Backup Exec Small Business Edition (BE
2012 SBE). Not only does BE 2012 SBE support Microsoft operating systems (SBS or the full version of Microsoft), it also supports Linux and
Mac O/S. The new BE SBE to three servers (whether physical or virtual), one license of BE 2012 SBE supports a single physical box. For any
additional physical box (to a maximum of 3) you will need a BE 2012 SBE O/S agent (Agent for Windows, Agent for Linux or Agent for Mac)
and/or an application agent (Backup Exec Small Business Agent) to protect additional physical machines running Microsoft Applications. BE
2012 SBE and Backup Exec Small Business Agent supports Active Directory, Exchange, SQL, SharePoint and Hyper-V. Included with the BE
2012 SBE is Microsoft Application support, Bare Metal Recovery with Simplified Disaster Recovery technology, B2V, P2V support for Hyper-V,
as well as being upgradeable to the full versions of Backup Exec.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
7
Backup ExBackup Exec 2012 Vec 2012 V-Ra-Ray Ey Editiondition
Extensive virtualization is just a fact of life in IT today. Driving down cost and increasing IT agility are the primary drivers behind going
“virtual”. With an increasing number of complex workloads wrapped up in virtual machines (VMs), enterprises are challenged to maintain the
same degree of security and protection they enjoy for their physical environment in their virtual infrastructure, and also leverage benefits
brought by virtualization as a technology. Attaining the service levels for these business systems requires a high degree of visibility into
virtual environments. Without this visibility, VM managers have no way to answer crucial questions such as:
• How can I protect both my virtualized and physical environments?
• How quickly can I recover or discover data within my virtualized environments?
• Am I running VM backups on huge amounts of wasteful redundant data?
• How many virtual machines are running in my environment?
Symantec helps IT administrators solve the problem of visibility into virtualized infrastructures through a technology known as V-Ray.
Symantec V-Ray technology provides visibility across your virtual environments and is delivered in across of Symantec products for virtual
environments: security, storage, backup, etc. because virtual machines should be protected just as effectively and as well as physical
machines. Symantec’s V-Ray technology provides the visibility needed to peer inside VMs and understand how to protect these systems and
run them at the highest possible service level.
Symantec Backup Exec™ 2012 V-Ray Edition is a separate edition of Backup Exec named for V-Ray and designed to completely protect
VMware or Hyper-V virtual environments – including critical virtualized applications. With agent-less or agent-based virtual protection, the V-
Ray Edition lets organizations optimize protection for virtual machine performance and recoverability. The V-Ray Edition gives you granular
recovery of entire virtual machines, single files, Active Directory® objects, Exchange emails, SQL databases, or SharePoint® documents from a
single-pass backup. Backup Exec 2012 V-Ray Edition is part of Symantec’s leading portfolio for virtualized environments. With integrated
deduplication and site-to-site replication, the V-Ray Edition is easy to use, and represents complete protection for VMware and Hyper-V
environments.
Included in the Backup Exec 2012 V-Ray Edition:
• Backup Exec Server
• Agent for VMware and Hyper-V
• Agent for Applications and Databases
⁃ Exchange
⁃ SQL
⁃ SharePoint
⁃ Active Directory
⁃ Oracle
⁃ Lotus Domino
⁃ Enterprise Vault
⁃ Deduplication Option
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
8
Backup ExBackup Exec 2012 Capacitec 2012 Capacity Ey Editiondition
Over the last few years a number of organizations have found traditional methods of software licensing, commonly based upon the total
numbers of applications, CPUs, servers or some combination thereof, more difficult to manage. They are looking for simplified, capacity-
based software licensing models where they get all the backup software features available and then only pay a fixed fee based upon the total
amount of front-end data being protected.
The Backup Exec family now offers a new capacity-based licensing model that provides easier purchasing and maintenance. This is realized
through the new Backup Exec Capacity Edition which uses this licensing model. The Backup Exec 2012 Capacity Edition licensing is based on
the aggregate amount of uncompressed data residing on the “front end” production systems to be protected. Depending on the situation, a
capacity-based licensing model, instead of an “a la carte” agent and option based model, may be dramatically easier and cheaper.
Traditionally, organizations buy per-server licenses, per-agent licenses, and per-option licenses. This can get complex with different renewal
dates for a host of agents and options required for complex environments.
With one single product, or one single unit, priced per Terabyte (pricing start at 2TB), the new Backup Exec 2012 Capacity Edition gives an
unlimited numbers of agents and options, and it is just the total amount of data to be backed up that needs to be licensed.
Backup Exec users can expand the feature rich capabilities of Backup Exec (without increasing costs) via the capacity model due to the all-
inclusive benefits. Backup Exec continues to offer flexibility with multiple licensing strategies.
• Single SKU Protects an entire site
• Metered per “front end” TB
• Includes:
⁃ Symantec Backup Exec™ 2012 Server License – Includes:
◦ New User Interface
◦ Simplified Disaster Recovery
◦ P2V and B2V
◦ Unlimited Agent for Windows®
◦ Unlimited Agent for Linux®
◦ Deduplication Option
◦ Unlimited Agent for Applications and Databases,
◦ Unlimited Agent for VMware® and Hyper-V®
◦ Agent for Mac®
◦ All Storage Options
◦ All Management Options
DLO is not included.
Backup ExBackup Exec 3600 Applianceec 3600 Appliance
The Backup Exec 3600 Appliance is an all in one solution. It’s a backup server, a 5.5TB storage device, and a deduplication appliance at the
same time. The Backup Exec 3600 Appliance delivers complete data and application protection out of the box, reducing the problems of
complexity, cost, and risk associated with traditional backup solutions by delivering a combined hardware and software solution in a single
package. It is ideal for growing VMware and Hyper-V virtual environments and fully supports the protection of physical server environments,
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
9
all using one consolidated appliance solution. Using the Backup Exec 3600 Appliance IT administrators can protect all server resources in
their environment and avoid the unnecessary costs and headaches associated with implementing and managing multiple backup solutions.
Simple and easy to use and install, the 3600 Appliance has all the appropriate agents and options already installed and ready to go.
SSymantec Desktop and Lapymantec Desktop and Laptop Optop Optiontion
Symantec Desktop and Laptop Option is a standalone product that protects the data held on desktop and laptop computers. With the
majority of business-critical information residing outside the data centre or off corporate servers, protection for desktops and laptops is a
must. Symantec Desktop and Laptop Option delivers data protection to desktops and laptops whether in the office or on the road. Not only
improving data protection and efficiency, this option enables users to restore their own files and maintains synchronization between multiple
desktops and laptops so the most up-to-date file versions are available on all of a user's computers. Because the Desktop and Laptop Option
does not require a dedicated stand-alone server as competing products do, it easily integrates into existing IT infrastructure and policies,
helping lower the total cost of ownership. The push-install functionality from within either Backup Exec or NetBackup centralizes deployment.
Symantec Desktop and Laptop Option includes support for Windows 7, Windows Vista, Windows XP 64-bit OS.
SSymantec Symantec Sysystem Recovertem Recovery 2011 Sery 2011 Server Ever Editiondition
Symantec System Recovery 2011 combines the speed and reliability of disk-based, bare-metal Windows® System Recovery with revolutionary
technologies for hardware-independent restoration and lights-out operation. The result is unparalleled freedom to restore systems anytime,
from anywhere, to virtually any device without affecting the performance of the systems. It is a simple, cost-effective backup and recovery
solution for any businesses that requires simple disaster recovery capability. It helps minimize downtime and avoid disaster by easily
recovering the individual data files/folders or complete Windows systems in minutes. Doesn’t matter if the IT systems are virtual or physical,
System Recovery can restore systems anytime, from anywhere, to virtually any device, storing virtual or physical systems in virtual or physical
environments with the ability to convert physical system images to virtual environments. It is the perfect standalone solution for anyone
running any other backup solution.
SSymantec Symantec Sysystem Recovertem Recovery 2011 Desktop Ey 2011 Desktop Editiondition
System Recovery Desktop Edition is a reliable system recovery solution designed to quickly recover failed Windows-based desktop PCs and
remote laptop systems back to an operative state. It allows organizations to recover desktop data, files, operating systems and applications,
or complete a bare metal restore (bare metal means hardware with no software on it) in minutes as opposed to manually rebuilding systems,
which could take hours or even days (especially if IT has loads of them to do). With this disk-based system recovery solution (disk is faster
than tape), users can capture the entire desktop including the operating system, applications, files, system configurations, and personal user
settings in one easy-to-manage file, without interrupting productivity or application usage. This “image” can be saved on CD, DVD, USB,
FireWire, another system or a network drive in case of device failure. It creates real-time ‘while you work’ recovery points, reducing
bandwidth needed to create a recovery point to improve performance as well as allowing users to restore desktops remotely.
SSymantec Symantec Sysystem Recovertem Recovery 2011 Small Business Sery 2011 Small Business Serverver
This is the System Recovery product built for Microsoft Small Business Server, designed for organizations that require a simple system and
data recovery solution for SBS. Like its big brothers, System Recovery Small Business Server Edition is a disk based disaster recovery solution
that can quickly restore failed systems to a specified point-in-time without taking hours to manually rebuild and restore from traditional
methods or reinstalling from scratch. It adjusts system usage performance in scheduled jobs creating scheduled/automated recovery points
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
10
so that the impact on the end user is unnoticed. System and data images can be stored more or less anywhere including USBs, FireWire, CD/
DVD or FTP sites as well as traditional SAN, NAS, or RAID arrays.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
11
Backup Exec 2012 Core Agents
Backup Exec Agents – an agent provides backup/recovery for systems, applications, databases or file systems. Each one is designed to
enhance feature support for environments, very much depending on what environments, platforms, applications or databases need
protection.
Agents fAgents for Operating Sor Operating Sysystem Platftem Platformsorms
Agent fAgent for Windowsor Windows
The Agent for Windows provides the standard platform required for Backup Exec for all application and database backups on Windows
servers. It does, however, provide other benefits such as open file protection and direct recovery of granular file and folder data directly back
to the Windows server from which it was backed up.
The Agent for Windows optimizes data transfers for 32-bit and 64-bit Windows servers. Special Agent Accelerator technology helps increase
backup and recovery performance by compressing data at the source and intelligently managing distributed environment backups at the
client.
Agent fAgent for Mac®or Mac®
The Symantec Backup Exec 2012 Agent for Mac provides support for on-line, non-disruptive backup of Macintosh OS X 10.5, 10.6 and 10.7
operating systems. Coupled with application agents you can broaden the data protection offering for Backup Exec.
Agent fAgent for Linuxor Linux
This agent extends Backup Exec software's advanced agent technology to provide high-performance network wide data protection and
recovery for 32-bit and 64-bit Linux servers with support for both Intel and AMD 32-bit and 64-bit processors. This agent meets the needs of
business applications on Linux operating systems offering full or incremental, or differential, backup and restore and client-side
deduplication for supported distributions of Linux. Note: client-side deduplication requires the Deduplication Option to be licensed on the
Backup Exec Server.
RemoRemote Media Agent fte Media Agent for Linuxor Linux
If you need enhanced storage capabilities using Linux based systems then this is the agent for you! The Backup Exec 2012 Remote Media
Agent for Linux provides additional storage flexibility enabling IT administrators to add a storage device to a remote Linux server as well as
increasing bandwidth (actually reducing bandwidth requirements) for backup jobs on remote Linux servers. The Linux-based backup server
must be managed by the primary Backup Exec server console.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
12
Agents for Virtual Environments
Symantec Backup Exec™ 2012 Agent for VMware and Hyper-V
For VMware
One license of the Agent for VMware and Hyper-V enables the protection of all VMs on a VMware host – irrespective of how many VMs are
installed on the host. This includes full VM recovery capabilities as well as granular file and folder recovery capabilities. Symantec has been a
partner with VMware for over 10 years – longer than any other vendor – and as a result of this relationship Backup Exec 2012 is VMware
ready. Backup Exec 2012 delivers complete disk-to-disk-to-tape based data protection for VMware virtual environments. You don’t need
another backup solution; you don’t need to add any complexity to your environment; the Agent for VMware and Hyper-V automatically
discovers VM instances giving you all the benefits of backup Exec: Granular Recovery, restoring individual files, and folders from a single
image-level backup.
If you already use Backup Exec there is no need to rip out and replace – just add the Agent for VMware and Hyper-V to your infrastructure
and begin protecting virtual machines. If you are running both physical and virtual systems there is no issue, add the Agent for VMware and
Hyper-V to the new virtual servers and manage both environments through one flexible console.
Remember:
• One agent delivers comprehensive data protection to an unlimited number of VMware virtual guest systems
• Comprehensive backup for virtual systems and legacy physical systems supporting disk and tape storage environments
• Integration with vStorage to maximize backup and recovery performance
• FREE plug-in for VMware allows you to manage Backup Exec 2012 from the vCenter or vStorage interface
• Granular data recovery for VMware Infrastructures saves time and lowers cost
• Supports disk and tape storage environments
• Granular recovery of Exchange, SQL, Active Directory, and SharePoint virtual machines can be enabled through the addition of the Agent
for Applications and Databases
For Microsoft Hyper-V
The improved support for Hyper-V environments in the Backup Exec 2012 Agent for VMware and Hyper-V provides a single agent to support
an unlimited number of virtual guests running on a Windows Server 2008 R2 Hyper-V host while protecting existing physical server files and
Windows applications. Backup Exec 2012 has a virtual stream handler included that improves backups and deduplication rates across Hyper-
V environments. It enables granular restore of individual virtual files, folders and items from a single image-level backup - eliminating the
time and storage requirements of a second file level backup giving you all the benefits you would get from a physical environment.
• Single, comprehensive backup application for virtual systems and legacy physical systems supporting disk and tape storage environments
• Complete Windows data protection for new Windows Server 2008 R2 Hyper-V systems including Cluster Shared Volumes and
LiveMigration
• One agent delivering affordable data protection to an unlimited number of Microsoft virtual systems
• Granular recovery of Exchange, SQL, Active Directory, and SharePoint virtual machines can be enabled through the addition of the Agent
for Applications and Databases
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
13
Backup Exec 2012 Agent for Applications and Databases
For Microsoft® Exchange Server
Exchange is the most prevalent messaging system on the planet. The Agent for Applications and Databases is built to revolutionize data
protection for Exchange and supports Exchange 2003, 2007, 2010 SP2. The Agent for Applications and Databases enables Backup Exec to
run a single backup job for Exchange without the need to run an additional mailbox job (MAPI) whilst still allowing granular recovery of
individual emails or mailboxes – in other words the Agent for Applications and Databases can granularly recover from a single full backup
while the application is still online. This significantly reduces the number of backups and time required to protect Exchange.
FFor Lor Lootus Dominotus Domino®®
The Agent for Applications and Databases provides data protection of vital Lotus Domino 7.x, 8 and 8.5 messaging and collaboration
databases as an integrated part of your daily backup activities. The Agent for Applications and Databases supports both 32-bit and 64-bit
versions of Lotus Domino including partitioned and clustered Lotus Domino servers and new support for Domino Attachment Object Service
(DAOS) store and associated NLO files. Put differently, no matter how your Domino server is set up, this agent’s API’s help provides non-
disruptive data protection of the databases and transaction logs as well as flexible restore options including database redirection and point-
in-time "rollback" recovery of databases or transaction logs. So you can restore to an alternative location as well as roll the database back to
a previous point in time.
FFor Microor Microsofsoft SharePt SharePoint®oint®
With over 100 million SharePoint licenses sold worldwide Microsoft SharePoint is becoming part of our business lives. With the Agent for
Applications and Databases recovery of data is made simple - individual files or whole systems. It supports all versions of Microsoft Office
SharePoint Server as well as Windows SharePoint Services 2.0/3.0. Using a 32-bit or 64-bit Backup Exec 2012 media server, the Agent for
Applications and Databases can protect 32-bit or 64-bit MOSS-2007 and 2010 servers deployed either on a Single-Server or within a Multi-
Server Farm. The Agent for Applications and Databases offers Granular Recovery Technology (GRT) which enables users to restore individual
documents, sites and list items in a simple straightforward way from single Pass backups (one backup), either directly back into the original
document library in the SharePoint farm or redirecting it to an alternative file system.
FFor Microor Microsofsoft SQL Sert SQL Server®ver®
The Agent for Applications and Databases gives IT administrators the ability to recover SQL databases to destinations other than from where
they originated, flexible recovery options, directing a copy of the actual data streams being sent to media by a SQL database to a local
directory if needed. With the Agent for Applications and Databases SQL Server 2008 snapshots are integrated into the Backup Exec catalog
for a consolidated look at all data copies available, which can be recovered instantly. This Agent for Applications and Databases provides SQL
Server 2008, 2005, and 2000 users with granular protection on 32-bit and 64-bit systems down to the individual database or file group.
FFor Windows Active Directoror Windows Active Directory®y®
Most of us forget about Active Directory (AD), but it is the database that runs so many of our Microsoft systems – without Active Directory
most companies would come to a grinding halt. Should anything go wrong with this replicated database, a small fault can become a major
catastrophe. The Agent for Applications and Databases solves all these issues by dramatically reducing the time to recover either individual
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
14
items in AD or individual user accounts, organizational units, even whole individual records from a single pass backup (only one backup)
while Active Directory remains online – with no reboots. Anyone who has ever tried to manually restore AD will appreciate the significance of
being able to alleviate the aggravation associated with traditional Active Directory protection and recovery. Our Granular Recovery
Technology (GRT) once again gives IT Administrators the ability to:
• Restore objects without rebooting AD Domain Controllers
• Single pass backups for complete AD or object level recovery
• Support for 2008 Active Directory Domain Services
• Centralized System State and Active Directory protection
FFor Oracleor Oracle®®
If you need to protect Oracle then the Agent for Applications and Databases will give you integrated non-disruptive data protection for Oracle
11g, 10g, and 9i databases. The advanced features (GRT) provide protection of individual table spaces or a complete application/database
backup as well as the protection of archived redo logs and control files, without ever taking them offline. Integrated with Oracle's Recovery
Manager (RMAN) users used to Backup Exec can manage backup and recovery whilst the Oracle administrator is out of the office. You can
initiate backups or recovery either through Backup Exec or the Oracle RMAN console. Multi-Streaming can be used for improved performance
during backups and restores. The Agent for Applications and Databases supports Intel Xeon EMT64, Intel Pentium EMT64, AMD Athlon, and
AMD Opteron processors as well as Red Hat and SUSE Linux, and Oracle RAC on Windows and Linux servers.
FFor Enterprise Vor Enterprise Vaultault
Backup Exec and Enterprise Vault are part of the same business unit within Symantec which makes it pretty straightforward to interweave
the technologies; in fact, the archiving option within Backup Exec is built on Enterprise Vault technology. The Backup Exec 2012 Agent for
Applications and Databases provides integrated backup protection for Symantec Enterprise Vault archives with full application protection for
its directory databases, partitions, or vault stores and indexes. All backup and recovery jobs are managed though the Backup Exec console
which allows users to select some or all of the Enterprise Vault resources they wish to backup. Our Granular Technology (GRT) gives the
ability to browse and select the Enterprise Vault components for recovery, including individual partition files and indexes.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
15
Backup Exec 2012 Options
Backup Exec Options extend functionality of Backup Exec and include features like data deduplication, additional management, all of which
scale with a business.
Enterprise SerEnterprise Server Opver Optiontion
The new Enterprise Server Option combines the management capabilities of the Central Administration Server Option (CASO) together with
the storage management expansion capabilities of the Advanced Disk Based Option (ADBO) and SAN Storage Option (SSO). Now as one
agent, CASO, ADBO and SSO are provided together helping organizations manage larger storage environments.
The Backup Exec 2012 Enterprise Server Option is designed to help IT administrators and Managed Service Providers meet the backup
protection needs of growing companies. The Enterprise Server Option includes the tools they need to scale their backup infrastructure and
management capabilities alongside the needs of a growing environment. The Enterprise Server Option includes three components:
1. Central Admin Server Option (CASO)
2. Advanced Disk Backup Option (ADBO)
3. SAN Shared Storage Option
Both CASO and ADBO are optional components that can be leveraged to expand and scale the capabilities of a Backup Exec 2012
environment.
Central Admin Server Option (CASO) simplifies backup management of multiple Backup Exec servers. Centralized management that can scale
to manage media servers across the network provides concise information including load balancing of backup jobs, the management of
distributed catalogs – backup reports which enable the restore process, bandwidth throttling - which regulates network traffic and minimizes
bandwidth congestion, fault tolerance – which enables a system to continue operation rather than failing altogether, as well as monitoring
and reporting for a number of Backup Exec servers in a Windows data centre, distributed throughout a network or at remote offices. If you
are running a growing backup environment the Central Admin Server Option can help you manage that growth.
Advanced Disk-Based Backup Option speeds both backup and restore processes through Synthetic, Off-Host backup, and True Image restore
functionality. Synthetic backup reduces backup windows and network bandwidth requirements using incremental backups to create a full
“Synthetic” backup by merging the previous full backup and all the incremental together. Off host backups remove the bulk of the backup
‘burden’ from the server being protected and move it to the backup server. This is done through the usage of snapshot technology.
Snapshots are created of volumes that are being backed up, and these snapshots are imported to the backup server enabling the backup
server to perform the backup operation. Once the backup completes, the snapshot is released. True image restore restores data sets in the
correct order which simplifies the process of restoring data sets.
Enterprise Server Option makes the whole backup process faster and easier to manage in larger environments. It is a LAN-free backup
solution (a LAN-free backup is a backup of server data to a shared, central storage device (SAN) without sending the data over the local area
network (LAN), it allows multiple distributed backup servers to backup to storage devices that are connected over a switched fabric or iSCSI
SAN. It provides more efficient and better backup performance without interrupting normal LAN activity. It load balances backup job activity
across shared devices from multiple Backup Exec servers. The centralized management of media helps to lower the total cost of management
across larger high-end storage environments.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
16
Note: If you already have either ADBO and do not want the full functionality of the new ESO then you can simply extend your maintenance on
either ADBO.
Deduplication OpDeduplication Optiontion
Backing up the same – often duplicate -- data every day can exponentially increase backup storage requirements, can have an adverse effect
on bandwidth consumption, and can increase the length of time it takes to carry out daily backups. The Deduplication Option only backs up
unique data blocks that have not previously been captured rather than backing up everything – again - and significantly reduces the amount
of backup data stored to disk. The Deduplication Option is conveniently licensed per backup server. The Deduplication Option helps to reduce
backup data storage costs and improves network utilization across physical and virtual environments. Integrated into Backup Exec, the
Deduplication Option gives you the choice to carry out deduplication either at source or remote server (sometimes called client
deduplication), at the backup server (at the point of backup), or appliance deduplication (integrates with OpenStorage deduplication
appliances – OST, see the Backup Exec hardware compatibility list for a full list of compatible appliances).
• Client or Remote Office Deduplication – reduces the amount of data you are sending over the network
• Backup Server Deduplication – suitable for higher-speed network connections
• Appliance Deduplication – integrated logging means that Backup Exec can manage any restore through the appliance
ExExchange Mailbochange Mailbox Archiving Opx Archiving Optiontion
Integrated archiving for Exchange can reduce the data you hold on your Exchange servers speeding up the backup process and helping to
reduce the amount of time it takes to backup (reducing the backup window). Reduce the amount of old data sitting on your exchange servers
by archiving untouched email (by setting up a policy) to a separate location and then delete the original email from the Exchange server. This
frees up storage space and dramatically reduces backup times as well as giving you a much better idea of your real storage growth and
storage requirements. End users can retrieve archived emails straight from Outlook or administrators can retrieve archived data through the
Backup Exec console. Each license of the Exchange Mailbox Archiving Option enables archiving of 10 user mailboxes and supports Exchange
2007 & 2010 (it also requires an Exchange Agent for each Exchange Server).
File SFile Sysystem Archiving Optem Archiving Optiontion
Integrated archiving for Windows file systems helps to reduce the data you hold on your file servers. This helps to speed up the backup
process (reducing the backup window). Reduce the amount of old data sitting on your file servers by archiving untouched data (by setting up
a policy) to a separate location and then deleting the original file the File server. This frees up storage space and dramatically reduces backup
times as well as giving you a much better idea of your real storage growth and storage requirements. Data can still be retrieved through
indexing (tagging) data through the Backup Exec Retrieve Google-like web UI or administrators can retrieve archived data through the Backup
Exec console. Supports Windows, Windows 2003, Windows 2008 and Windows 2008 R2, is licensed per protected/archived server and
requires an Agent for Windows Systems for each archived server.
Virtual TVirtual Tape Librarape Library Unlimited Drive Opy Unlimited Drive Optiontion
A virtual tape library (VTL) is a storage virtualization technology that makes a storage component (usually disk) look like a tape library or tape
drives. By virtualising the disk storage it lets you consolidate storage and improve the data restore processes. With Backup Exec’s Virtual
Tape Library Unlimited Drive Option you can use up to 80 drives per Virtual Tape Library (VTL), providing unlimited (80) Library Expansion
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
17
Options per VTL device. It is a simple and cost effective way to integrate a VTL storage virtualization environment that can both behave as a
tape as well as erase data that has reached its expiration data in order to reclaim storage space for more crucial data.
LibrarLibrary Expansion Opy Expansion Optiontion
The Library Expansion Option means you can add additional drives within multi-drive tape or optical autoloader/library storage systems –
thereby growing storage systems. It has Advanced Device and Media Management (ADAMM) technology which provides additional
configuration and management capabilities – these include lights-out backup and restore operations (this is a way of restoring an entire
system from a built-in recovery environment) and barcode reader and portal support for both SCSI and Fibre attached devices which allow
administrators to partition slots within a library to target backup jobs to a specific slot or library location.
NDMP OpNDMP Optiontion
Network Data Management Protocol (NDMP) is a protocol which enables the transport data between NAS (Network Attached Storage) devices
and backup devices. This removes the need for transporting the data through the backup media server itself and can enhance the speed of
the backup and reduce the load on the backup server. This option supports the backup and restore of NDMP NetApp (Data ONTAP 7.0 or
later), EMC Celerra (with DART 5.5 or later) and IBM N-Series storage (with tape devices attached). It can also protect NDMP devices at
remote locations including in a Storage Area Network (SAN) as well as NDMP filer data duplication to tape.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
18
Disaster Recovery Capabilities
Simplified Disaster Recovery
Backup Exec 2012 now offers a new, integrated solution to help businesses prepare for and overcome the problem of server failure and
downtime. The new version of Backup Exec 2012 includes integrated bare metal recovery and dissimilar hardware recovery – also known as
hardware discovery - capabilities. These new features make full server recovery easy, and are offered as a no charge, built-in element of
Backup Exec 2012. Now, using Backup Exec 2012, a single protection policy for a server can protect it against all types of disaster or failure,
and enable all of the following types of recovery:
• Server Recovery
⁃ Bare metal recovery
⁃ Dissimilar hardware recovery
• Application Recovery (agent for Applications and Databases required)
• Granular Application Recovery (agent for Applications and Databases required)
• File and Folder Recovery
All of these recovery capabilities are offered in a single product and solution, Backup Exec 2012.
SSymantec Backup Exymantec Backup Exec™ Desktop and Lapec™ Desktop and Laptop Optop Optiontion
For data held on desktops and laptops, the Symantec Desktop and Laptop Option can be deployed to save end users time and money by
protecting and recovery restoring critical data contained on desktop and laptop systems. With the majority of business-critical information
residing on desktops and laptops, the Symantec Desktop and Laptop Option is a must. Whether in the office or on the road, the Desktop and
Laptop Option can improve data protection and efficiency, and even enables users to restore their own files without costly administrator
intervention. The Symantec Desktop and Laptop Option maintains synchronization between multiple desktops and laptops so the most up-to-
date file versions are available on all of a user's computers. Because the Desktop and Laptop Option does not require a dedicated stand-alone
server as competing products do, it easily integrates into existing IT infrastructures and policies, helping lower the total cost of ownership.
The Symantec Desktop and Laptop Option includes support for Windows 7, Windows Vista, Windows XP 64-bit OS.
SSymantec™ Symantec™ Sysystem Recovertem Recovery Sery Server Ever Editiondition
Symantec System Recovery 2011 combines the speed and reliability of disk-based, bare-metal Windows® System Recovery with revolutionary
technologies for hardware-independent restoration and lights-out operation. The result is unparalleled freedom to restore systems anytime,
from anywhere, to virtually any device without affecting the performance of Windows systems. It is a simple, cost-effective backup and
recovery solution for any business that requires simple disaster recovery for windows systems. It helps minimize downtime and avoid disaster
by easily recovering individual data files/folders or complete Windows systems in minutes. No matter if the IT systems are virtual or physical,
System Recovery can restore systems anytime, from anywhere, to virtually any device, storing virtual or physical systems in virtual or physical
environments with the ability to convert physical system images to virtual environments. It is the perfect standalone solution for anyone
running any other backup solution.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
19
SSymantec™ Symantec™ Sysystem Recovertem Recovery Desktop Ey Desktop Editiondition
System Recovery 2011 Desktop Edition is a reliable system recovery solution designed to quickly recover failed Windows-based desktop PCs
and remote laptop systems back to an operative state. It allows organizations to recover desktop data, files, operating systems and
applications, or complete a bare metal restore (bare metal means hardware with no software on it) in minutes as opposed to manually
rebuilding systems, which could take hours or even days (especially if IT has loads of them to do). With this disk-based system recovery
solution (disk is faster than tape), users can capture the entire desktop including the operating system, applications, files, system
configurations, and personal user settings in one easy-to-manage file, without interrupting productivity or application usage. This “image”
can be saved on CD, DVD, USB, FireWire, another system or a network drive in case of device failure. It creates real-time ‘while you work’
recovery points, reducing bandwidth needed to create a recovery point to improve performance as well as allowing users to restore desktops
remotely.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
20
Virtual Infrastructure Protection
Overview
Virtualization means adding a layer of abstraction to simplify the administration, or increase utilization, of a system or device so that the
applications are unaware of what is going on underneath them – and, for that matter, cares not what is going on beneath them. Virtualization
is ultimately about business benefits, such as the following:
• Enabling IT to manage the infrastructure without affecting the business’s applications, so they can work on the server, network or storage
layers without effecting the application
• Move or change the storage, or move the application from server to server transparently
Any kind of virtualization is just another part of an overall trend in creating abstraction layers in the IT infrastructure. Virtualization all comes
together to make more efficient use of resources, reduce total cost of ownership, improve availability, assist in disaster recovery, testing and
development, centralize data centre administration, and do away with server sprawl to provide businesses with an efficient and agile IT
environment.
The virtual server environment is made up of software that divides one physical server into multiple isolated virtual environments; or, to put
it another way, the virtual server foundation is leveraged to allow multiple virtual machines, with heterogeneous operating systems, to run in
isolation, side by side, on the same physical machine.
By being able to abstract the physical hardware from the O/S, server virtualization allows organizations to run multiple operating systems on
the same hardware, isolate virtual machines to run specific applications, and speed up the process of provisioning machines from one server
to another for workload management, consolidation, or maintenance.
Having made the decision to virtualise your systems, you will be faced with a number of potential challenges, such as the following:
• V-Server Sprawl
The danger is that “server virtualization” is backing organizations into the situation they were trying to escape by using virtualization in the
first place. Cloning is so easy – ‘right click, clone machine’ and, voila you have another machine. Using server virtualization can create
complexity and v-sprawl or v-mess. Organizations need to be able to track what they have in their virtual environment, what dependencies
they have, how these devices are connected to the storage infrastructure in order not to lose control of the server environment again.
• Lack of Visibility
Understanding all the dependencies in a virtual environment is made tricky because you can't necessarily find virtual machines with a
physical asset check, you have to have a tool that can audit the network, whether they are online or not.
• Complexity
Management complexity is the major issue with virtual environments. IT sometimes has difficulty finding or applying adequate monitoring
and management tools that work across both virtual and physical landscapes. Other issues can include support, integration and compatibility
of different operating systems on the multivendor hardware being virtualized.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
21
• IT Storms
Bandwidth problems can also be a challenge and are caused by co-locating multiple workloads onto a single system with one network path.
In a physical server environment, each application runs on a separate box with a dedicated network interface card. But in a virtual
environment, multiple workloads share a single NIC, and possibly one router or switch as well. This setup can increase the network traffic
through this single path, resulting in problems with bandwidth availability and throughput.
Achieving the promised agility and cost savings of virtualization requires modernizing and automating service-level processes – including the
backup process.
Backing it all up
How do you make sure that your backup application protects, and where possible, takes advantage of all the changes and new technologies
available in a virtualized environment? Although the data protection process constantly changes, organizations often overlook the re-
assessment of their backup strategies on a regular basis – or when things change. We are in an age of application updates, virtual and
physical mixed environments as well as and a whole new set of data deduplication-enabled target devices.
How you use server virtualization makes a difference to how you backup virtual machines. Backup applications need to understand a little
more about virtual machines and the virtual machine image to back them up efficiently. Having an integrated solution that can manage both
physical and virtual environments helps to reduce the number of tools required to protect and manage information and applications spread
across physical and virtual systems in both data centers and disaster recovery sites. An integrated solution that can manage both physical
and virtual environments also helps control storage growth by enhancing visibility into the virtual environment and associated storage
consumption, by using deduplication and archiving, and by stopping unnecessary backup operations. This helps eliminate bottlenecks and
application impact associated with backup, using optimized snapshot and off-host technologies, without sacrificing file or disaster recovery
capability.
Organizations should be concerned about the risk of downtime when altering production systems, as well as the fear of managing a complex
virtualized environment. This is specifically where Symantec can help. By taking a strategic approach to reducing the complexity of managing
a virtualized environment organizations are able to streamline their backup environment, cutting costs and improving manageability.
Backup Exec 2012 supports both VMware vSphere 4.0/5.0 environments as well as Microsoft Server 2008 R2 Hyper-V environments, and
helps to reduce the time and cost of managing separate backup solutions for your virtual systems. With Backup Exec 2012 you can manage
both virtual and physical backups.
Data deduplication is ideal for VMware environments:
• It reduces the backup window and helps achieving faster backups (including remote sites)
• It reduces the amount of storage required for data backup
• It increases bandwidth efficiency from remote sites
• Ideal for WAN, LAN or SAN based environments
• Allows users to adopt 3rd party Open Storage (OST) deduplication disk devices
• Reduces overall storage cost
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
22
Backup Exec 2012 Agent for VMware and Hyper-V: VMware Environments
• Support for VMware vSphere, vCenter, and vStorage
• Stage-less backup and restore (no proxy server)
• Single-pass, image-based virtual machine backups
• Block Optimization (skipping of empty space within a virtual machine)
• Backup over SAN support
• vSphere block level Differential/Incremental backup
• Virtual Machine Template File Backups
• Deduplication optimized for VMware backups
• Dynamic inclusion of new virtual machines
• Full virtual machine recovery
• Individual file and folder recovery
• Application Granular Recovery (Exchange, SQL, SharePoint, AD)
• Redirected restore - Support for Folders and Resource pools
• VMware Storage Distributed Resource Scheduling support
Backup Exec 2012 Agent for VMware and Hyper-V: Hyper-V Environments
• Complete protection for Hyper-V 2008 R2, including Cluster Shared Volumes (CSV)
• Single agent protects the entire Hyper-V host and all Windows and Linux Guest virtual machines
• Protection of Live Migration-enabled virtual machines
• Stage-less backup and restore (no proxy server)
• Single-pass, image-based virtual machine backups
• Block Optimization (skipping of empty space within a virtual machine)
• Hyper-V block level Differential/Incremental backup
• Optional deduplication support of virtual machines
• Virtual Application Granular Recovery Technology support for object level recovery of virtualized applications SQL, Exchange, and Active
Directory
• Single Pass Backups for complete virtual machine recovery or individual file/folder level recovery
What you could consider fWhat you could consider for Virtual machine proor Virtual machine protection:tection:
Backup Exec Media Server License
This is the core Backup Exec product. This license enables a server to act as the backup media for your backup strategy and manages each
agent or option that you add to your backup solution.
Agent for Windows Systems
This agent provides the platform for all application and database backup on Windows O/S.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
23
or Agent for Linux Servers
This agent provides high-performance network wide data protection and recovery for 32-bit and 64-bit remote Linux servers.
Symantec System Recovery Server Edition
This is a simple, cost-effective backup and recovery solution for any businesses that requires simple disaster recovery for windows systems.
Agent for VMware and Hyper-V
This agent delivers complete disk-to-disk-to-tape based data protection for VMware virtual environments or Windows Server 2008 R2 running
Hyper-V. A single agent provides support for an unlimited number of virtual guests running on a machine while protecting existing physical
server files and Windows applications.
Deduplication Option
This option only backs up unique data blocks rather than backing up everything – again - and reduces the amount of backup data stored to
disk.
Exchange Mailbox Archiving Option 1-10
This option frees up storage space for Exchange and dramatically reduces backup times as well as giving you a much better idea of your real
storage growth and storage requirements.
And/or the appropriate number of Backup Exec 2012 Agent for Application and Databases
• for Microsoft® Exchange Server
• for Microsoft SQL Server®
• for Microsoft SharePoint®
• for Windows Active Directory®
• for Lotus Domino®
• for Oracle®
• for Enterprise Vault
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
24
Storage Management
Overview
Storage management used to be all about where to put your backup tapes. Things have moved on since then and operations can no longer
afford to ignore the need for a sound storage and server management systems. The System Administrator’s role conjures up images of IT
staff running themselves ragged. With manual systems, Data Centre Management is fraught with error, and inevitably costly and labor
intensive. At the same time, the amount of data the IT Manager is trying to manage is growing exponentially. With apparently no help on the
horizon, how are they going to keep the whole process of data centre management under control? Storage management has become costly
and an unwieldy process. It can leave other areas of a business vulnerable, simply because of the lack of resources available. So what is the
answer?
Backing up the same data day after day
Backing up data day after day just adds to the problem – the amount of data being backed up is now at such levels that it is becoming
impossible to sustain. We are currently in the midst of a shift from assembling standard systems in a custom data centre out of physical
components based on standard designs, to assembling a data centre out of virtual components based on designs using modeling techniques.
The watch word is integration, integration, integration. Once, client server data centers were isolated pockets of computing resources, but
now they're integral, mission-critical components of businesses and their success. Cloud computing, virtualization and mobile computing are
all turning IT on its head. But now more than ever data has become a valuable, critical, virtual pool of business resources.
Drive down costs and drive efficiency up
As computing environments evolve into the future, IT organizations need to focus on how to maximize cost efficiencies while planning and
implementing an infrastructure that can incorporate the powerful new business technologies available today; the business needs to stay
competitive. The challenge is how IT can drive down IT costs, improve time to market, and increase utilization across both the server to
storage environment. Virtualization can help drive down the cost of the data centre and reduce the time to get a configuration online,
providing greater capability through the dynamic assembly of lower cost processors into massive networks of computing capability. But the
pull through of data is even greater – thereby increasing the problem.
Increased Complexity
Until now, data centre complexity was managed using the most flexible tool available - people. With virtualization and the increase in
processor count and speed, size of storage and speed of network, the data centre environment of the future will be too complex for an
individual (on their own) to comprehend. The decision to re-architect your data centre to a new environment is a challenging one, but one
that does not necessarily mean huge operational and financial impact. Organizations can build the new IT infrastructure using stepping stone
tools, making the data centre of the future more of a value network centre, pulling together its resources, adding value to organizations
through its flexible and powerful capabilities. Its limits will be on our understanding of how to gain benefit from it. Where the data centre is
located and who owns the hardware within it will be of less concern than the advantage it provides to the business. Even with all this
automation, it will be the people and their understanding of the business that will make the difference.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
25
Storage Management revolves around what you don’t have to manage, not what you do
Optimizing storage to reduce overall storage capacity can be done through integrated archiving and deduplication. Archiving moves old data
off of expensive, primary storage to a separate store so you don’t have to backup the same data day-in, day-out - forever. Deduplication only
backs up data (at a block level) once, using a pointer to the unique data. You can reduce the backup window dramatically with both archiving
and data deduplication. Reduce backup data storage costs and optimize network utilization across physical and virtual environments
providing a solution that will adapt to any environment. Integrated and customizable deduplication offering client deduplication
(deduplicates data at source or remote server - allowing users to deduplicate data from remote offices to headquarters), or at the media
server deduplication (deduplicates data at the point of backup), or through 3rd party appliance (integrates with OpenStorage deduplication
appliances). The options File System & Exchange Mailbox Archiving Options provide unified backup and archiving for growing File Systems
and Exchange environments by archiving data from the backup copy rather than separately pulling data from the source. The archive options
can free up storage space by reducing redundant data from the File Systems and Exchange server sources, and enables the indexing of data
and set retention periods to efficiently manage data lifecycles.
What you could consider fWhat you could consider for opor optimiztimized Storage Management:ed Storage Management:
Backup Exec Server License
This is the core Backup Exec product. This license enables a server to act as the backup media for your backup strategy and manages each
agent or option that you add to your backup solution.
Agent for Windows Systems
This agent provides the platform for all application and database backup on Windows O/S.
or Agent for Mac® Systems
If you are running Mac Systems then you will need this agent, it provides support for on-line non-disruptive backup of Macintosh OS X OS X
10.5, 10.6 and 10.7 operating systems.
or Agent for Linux Servers
This agent provides high-performance network wide data protection and recovery for 32-bit and 64-bit remote Linux servers.
Deduplication Option
This option only backs up unique data blocks rather than backing up everything – again - and reduces the amount of backup data stored to
disk.
Advanced Disk-Based Backup Option
This option speeds both the backup and restore processes using Synthetic and Off-Host backup and True Image restore functionality.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
26
Exchange Mailbox Archiving Option
This option frees up storage space for Exchange and dramatically reduces backup times as well as giving you a much better idea of your real
storage growth and storage requirements.
File System Archiving Option
This option frees up storage space and dramatically reduces backup times as well as giving you a much better idea of your real storage
growth and storage requirements.
VTL Unlimited Drive Option
This option lets you consolidate storage and improve the data restore processes using up to 80 drives per Virtual Tape Library.
Library Expansion Option
The Library Expansion Option means you can add additional drives within multi-drive tape or optical autoloader/library storage systems –
thereby help to grow storage systems.
NDMP Option
This removes the need for transporting the data through the backup media server itself and can enhance the speed of the backup and reduce
the load on the backup server.
With a proven track record spanning over 20 years, Symantec offers an unmatched combination of solutions for storage management
environments based on the industry’s leading data protection technologies as well as world-class partner services and support programs.
Reduce the complexity in your data centre without compromise. Whatever is in your data centre, take control of IT.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
27
Application Recovery
Overview
Not only is the Windows operating system one of the most prevalent business operating systems available, it, together with the applications
that sit on the Windows platform, can create huge amounts of unstructured, unmanaged information in the data centre and on remote
mobile devices. Organizations have to manage the Windows environment and at the same time ensure continuity of operations, the layers of
the infrastructure, the discovery of all IT assets the protection of the infrastructure, the information contained on all devices and the
thousands of business interactions that take place on a daily basis. IT needs to have the tools to protect the business at every level.
The protection, tracking, management, and retrieval of content, is most logically and effectively implemented by IT. As the leader in data
protection and management on the Windows platform, Symantec is ideally placed as a key asset in your efforts to strengthen and streamline
your IT initiatives.
Business Dependence
Today’s organizations depend on IT-wide applications used by everyone from employees and customers to suppliers and partners. Numerous
applications support key business processes such as e-commerce and business intelligence, but they also create a mountain of information
that must be successfully harnessed, securely stored and continually accessible. Organizations that fail to protect application data, or fail to
have a comprehensive data protection plan, are under threat from short- and long-term data loss, with all the revenue, customer loyalty,
share value, brand equity and market share implications it represents. But the protection of data is only a part of the story; the only reason
we backup is to be able to recover.
Test, Test, Test
To backup data without testing the recovery process to make sure that everything works has to be the definition of madness. But as
organizations become more reliant on the rapid, continual availability of information and as data is increasing at such a rapid rate, the means
of achieving both backup and recovery are becoming more complex. Although server and storage hardware continue to improve, IT
infrastructures are growing more complex, adding new potential points of failure. Organizations require rapid, secure and continual
information availability and integrity. Watertight data protection, therefore, is a critical strategy for every organization.
Non-stop, 24-hour operations
Businesses today require data protection solutions to deliver robust, scalable storage management, backup, and recovery, from desktop to
data centre, for both virtual and physical environments through streamlining, scaling, and automating backup throughout the organization.
Organizations need a solution that is fast, flexible, fully automated, and integrated with the storage and data protection architecture.
Modern, Universal Data Protection Solutions
Symantec offers businesses an unmatched combination of affordable solutions that help organizations fully protect their Windows
environment, keeping information available, and manageable; helping to provide Modern, Universal Data Protection Solutions for any
environment as well as disaster recovery, application and data availability and storage management.
• Make sure that your data is safe (from user error)
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
28
• Protect your email - the lifeblood of your business
• Protect your data from system failure (disk does fail)
• Ensure fast data recovery from any disaster
• Be prepared when data growth gets explosive
• Make sure you can recover – to anywhere
Comprehensive Adaptable Solutions
Backup Exec provides multiple methods for data protection for various recovery purposes: single data item corruption, dataset corruption,
storage, server failures, and disaster recovery. Typically media copies that are kept for extended periods of time (for example the monthly or
quarterly full backups), are repurposed as archival versions. Both Backup Exec and the Archiving Option focus on specific data retention and
all aspects of Windows near-term and long-term data preservation across a variety of media and media technology generations. Archival key
functions include: data organization, navigation, search, retrieval, export, collections/grouping, and co-location management, data quality
management: security, integrity, immutability, and disposal. Integrated archiving in Backup Exec helps to control, manage and protect the
data generated by organizations.
Applications and Data
Data does actually create itself, but it is the applications we run that certainly help. The increase amounts of data we are trying to manage,
store, retrieve, or delete are running management costs skyward. Regardless of how robust, configurable, and flexible your solution may be it
must be automated, fast, and unobtrusive. With the number of IT assets you have to juggle, failure to provide automated processes leads to
IT resources being unnecessarily diverted from other priorities, leaving you and your business exposed to performance degradation and
reduced availability. The company that recognizes this and identifies the best automated solution clearly has a competitive edge. Backup
Exec provides extensive storage management tools to make sure you proactively safeguard your local and remote data and systems from
external and internal threats, helping you achieve greater levels of application protection.
Application and System Disaster Recovery in 10 Minutes
Symantec System Recovery enables IT organizations to combine the speed and reliability of disk-based, bare-metal Windows system recovery
with revolutionary technologies for hardware-independent restoration and lights-out recovery. The result is the ability to restore systems and
applications, or even data anytime, from anywhere, to virtually any device. Businesses can now help dramatically minimize downtime for
critical IT services by rapidly recovering entire systems to dissimilar hardware platforms or to, or from, virtual environments.
What you could consider fWhat you could consider for Application Recoveror Application Recovery:y:
Backup Exec Server License
This is the core Backup Exec product. This license enables a server to act as the backup media for your backup strategy and manages each
agent or option that you add to your backup solution.
Agent for Windows Systems
This agent provides the platform for all application and database backup on Windows O/S.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
29
or Agent for Mac® Systems
If you are running Mac Systems then you will need this agent. It provides support for on-line non-disruptive backup of Macintosh OS X 10.5,
10.6 and 10.7 operating systems.
or Agent for Linux Servers
This agent provides high-performance network wide data protection and recovery for 32-bit and 64-bit remote Linux servers.
Agent for Applications and Databases:
• For Microsoft® Exchange Server - The Exchange Agent can granularly recover from a single full backup while the application is still
online. If you have Exchange you will need the Agent for Active Directory.
• For Microsoft SQL Server® - This agent give you continuous protection of SQL databases, removing the need for a daily backup window
for SQL server and enables recovery of database transactions right up to the time of the system failure.
• For Microsoft SharePoint® - This agent enables users to restore individual documents, sites and list items from a single Pass backup
(one backup), either directly back into the original document library or to an alternative file system. If you have SharePoint you will need
the Agent for Active Directory.
• For Windows Active Directory® - This Agent reduces the time to recover individual items in AD and individual user accounts, or
organizational units, even whole individual records from a single pass backup (only one backup) while AD remains online – with no
reboots. If you have Exchange or SharePoint you will need this agent.
• For Lotus Domino® - The agent supports both 32-bit and 64-bit versions of Lotus Domino including partitioned and clustered Lotus
Domino servers and new support for Domino Attachment Object Service (DAOS) store and associated NLO files.
• For Oracle® - The Oracle agent provides protection of individual table spaces or a complete application/database backup as well as the
protection of archived redo logs and control files, without ever taking them offline.
• For Enterprise Vault - This agent provides integrated backup protection for Symantec Enterprise Vault archives with full application
protection for its directory databases, partitions, or vault stores and indexes.
Exchange Mailbox Archiving Option
This option frees up storage space and dramatically reduces backup times as well as giving you a much better idea of your real storage
growth and storage requirements.
Backup Exec 2012 Small Business Edition
Backup Exec 2012 Small Business Edition (BESBE) is an all-in-one package for small businesses that replaces all Backup Exec Microsoft
Small Business Server (BE SBS) Editions and protects up to 3 virtual or physical servers.
Symantec System Recovery 2011 Server Edition
This is a simple, cost-effective backup and recovery solution for any businesses that requires simple disaster recovery for windows systems.
Symantec Desktop and Laptop Option
This option delivers data protection to desktops and laptops whether in the office or on the road.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
30
Symantec System Recovery 2011 Desktop Edition
This is a reliable system recovery solution designed to quickly recover failed Windows-based desktop PCs and remote laptop systems back to
an operative state.
With a proven track record spanning over 20 years, Symantec offers an unmatched combination of business solutions for the Windows
environment based on the industry’s leading data protection technologies as well as world-class partner services and support programs.
Reduce the complexity in your data centre without compromise. Whatever is in your data centre, take control of IT.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
31
Disaster Recovery
Overview
Business leaders are faced with the challenge of keeping their business running and growing, no matter what. This requires planning to
mitigate against the risk or impact of a planned or unplanned disruption on the organization’s staff, facilities, processes, reputation, brand,
customer relationships, applications, data, IT infrastructure, and value-creating activities.
There are numerous figures that have been published over the past few years, showing this loss and that, for minutes, days, and weeks of
outage for differing vertical business sectors. And yet, there seems as if there is no one formula to fit all. No one is able to come up with a set
of rules to explain the impact of downtime to an organization. Granted, calculating an organization’s total financial loss due to network and
system downtime is not a simple undertaking. There are many tangible and intangible impacts that must be factored into the equation.
The simple equation is easy and most of us can do it in our heads. Income, multiplied by time, but that is merely a superficial formula. Lost
revenue is the most obvious, most visible and most easily identified cost of downtime, and the calculation above is a reasonable ballpark
figure of that loss (notwithstanding sale fluctuations, calendar and time). But this simple calculation is also grossly inadequate and only
touches lightly on the real costs to the organization.
When we talk about the impact system failure can have on a business we usually think of loss of revenue during downtime. However, the
impact is far greater than the inability to carry out transactions. The true effect to a business should be measured in terms of operations,
financials, regulatory and legal implications. If a business is forced to operate without its systems for a significant period of time, the day-to-
day information we are used to extracting at the touch of a button will require tedious research and manual labor. Transactions that would
normally take place automatically will cease, staff will be unemployed without these systems, personnel and operating regulations will be
more difficult to adhere to and subsequently the efficiency of a business will suffer and management will be faced with making vital decisions
to carry the operation through the crisis.
Protecting information
Information comes in many forms and through a multitude of different channels. One of the great business challenges is to gather all of that
information and to create a useful integrated resource that can become a part of the corporate knowledge and be shared amongst those that
have a need to access it. If you get it right, the end result is a more agile business with much improved intelligence.
As the information-driven organization evolves, the demands placed upon the data storage infrastructure become stronger. Accepted wisdom
indicates that the basic storage requirement for organizations doubles every one or two years. This is increased further as the need to take
backup copies, mirrors and replicas is taken into account. As the volume of data stored increases and as the importance of information to the
organization grows, an unacceptable burden of management is placed onto the organization.
Should any of the fundamental functions within a business be disrupted then inevitably the lack of cash flow will prevent the company from
deploying capital to keep the business running. The ultimate risk is that credit ratings suffer, shares go down, the business is unable to fulfill
the legal requirements of suppliers’ contracts, customers lose faith and may never return, and significant costs can be associated with
restoring servers and systems. What is required is a solution that is simple and easy to install and manage, given that integration is so
difficult and time consuming. This presents the greatest challenge to the success of continuity and recovery. The more integrated the IT
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
32
infrastructure application environment is, the harder it is to recover, no matter what the process. This is because so much more must be
available simultaneously.
So when looking at the most appropriate data protection solution for your business, the business contingency planner needs to identify the
critical functions within the business and estimate the loss for an outage and the effect time has on the impact. Once you have determined
the impact of an incident on a business function, you can determine the recommended recovery timeframe for the function. Once the critical
and necessary business functions have been identified, the next step is to establish the resources that are required to continue to perform
those functions.
When something goes wrong, the two most important questions that every company has to answer are:
• How much data can I afford to lose (this is called the Recovery Point Objective)?
⁃ How quickly must my systems be back on-line (this is called the Recovery Time Objective)?
RPO and RTO
These are the two most critical questions to answer and vary from business to business. The Recovery Point Objective is the amount of data
loss the application and business can sustain. Vaulting is archived data on tape and tends to be days old. Backup can restore from disk and is
therefore quicker and the loss of data is only hours old. Replication is usually almost continuous so the loss of data is minimal. Recovery Time
Objective is the length of time it takes to get the application back on line and everybody working again. Restoring from tape can be time
consuming: tapes need to be returned from an off-site location, and tape restores take longer than disk. Clustering keeps applications
available almost continuously; therefore, the return to normal business can be made in seconds.
Smaller businesses cannot afford solutions that offer higher levels of technology sophistication and may choose simply to backup their data
to tape. The choices vary from business to business and application to application.
Critical applications can be identified in a number of ways:
• List all functions performed
• Interview business functional managers
• Conducting surveys with employees
⁃ Using a questionnaire with the functional managers
There are two routes available to manage the disaster recovery requirements of your company.
Symantec Backup Exec 2012 delivers reliable backup and recovery. It can protect more data and systems as well as reducing storage costs
and improving backup performance through integrated deduplication and archiving technology. If backup is purely for disaster recovery, you
can to take advantage of automated policy capabilities to delete backups that are no longer required based on age. Reduce business
downtime with technology designed to recover critical Microsoft applications and VMware or Microsoft Hyper-V virtual environments and
restore an entire application or down to a granular email or individual file/folder. You can simply meet your recovery point objectives with
continuous data protection technology and easily manage both Windows and non-Windows systems through a single console.
Backup Exec 2012 now offers a new integrated solution in the core product in to help businesses prepare for and overcome the problem of
server failure and downtime. The new version of Backup Exec 2012 includes integrated bare metal recovery and dissimilar hardware recovery
– also known as hardware discovery - capabilities. These new features make full server recovery easy, and offer it as a built-in element of
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
33
Backup Exec 2012 data and application protection practices. Now, using Backup Exec 2012, a single protection policy for server can protect
it against all types of disaster or failure, and enable all of the following types of recovery:
• Server Recovery
⁃ Bare metal recovery
⁃ Dissimilar hardware recovery
⁃ Application Recovery (agent for Applications and Databases required)
⁃ Granular Application Recovery (agent for Applications and Databases required)
⁃ File and Folder Recovery
All of these recovery capabilities are offered in a single product and solution, Backup Exec 2012.
Alternatively Symantec System Recovery offers a complete, disk-based system recovery solution for Microsoft® Windows®- based servers,
desktops, and laptops. It allows businesses to recover from system loss or disasters quickly and simply to dissimilar hardware platforms,
virtual environments, or in remote, unattended locations. Symantec System Recovery supports VMware, Hyper-V and Citrix and is a quick way
to make individual servers DR ready.
What you could consider fWhat you could consider for Disasor Disaster Recoverter Recovery:y:
Backup Exec Server License
This is the core Backup Exec product. This license enables a server to act as the backup media for your backup strategy and manages each
agent or option that you add to your backup solution.
Agent for Windows Systems
This agent provides the platform for all application and database backup on Windows O/S.
Or Agent for Mac® Systems
If you are running Mac Systems then you will need this agent, it provides support for on-line non-disruptive backup of Macintosh OS X 10.5,
10.6 and 10.7 operating systems.
Or Remote Agent for Linux Servers
This agent provides high-performance network wide data protection and recovery for 32-bit and 64-bit remote Linux servers.
And/or Agent for VMware and Hyper-V
This agent delivers complete disk-to-disk-to-tape based data protection for VMware virtual environments. This agent provides a single agent
to support an unlimited number of virtual guests running on a Windows Server 2008 R2 machine while protecting existing physical server
files and Windows applications.
Backup Exec 2012 Small Business Edition
Backup Exec™ 2012 Small Business Edition (BESBE) is an all-in-one package for small businesses that replaces all Backup Exec Microsoft
Small Business Server (BE SBS) Editions and protects up to 3 virtual or physical servers.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
34
Symantec Desktop and Laptop Option
The Desktop and Laptop Option delivers data protection to desktops and laptops whether in the office or on the road.
For simple imaged based DR you could consider:
Backup Exec System Recovery 2011 Server Edition
This is a simple, cost-effective backup and recovery solution for any businesses that requires simple disaster recovery for windows systems.
Backup Exec System Recovery 2011 Desktop Edition
This is a reliable system recovery solution designed to quickly recover failed Windows-based desktop PCs and remote laptop systems back to
an operative state.
Backup Exec System Recovery 2011 Small Business Server
This is the System Recovery product built for Microsoft Small Business Server, designed for organizations that require a simple system and
data recovery solution for SBS.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
35
Link Description
www.backupexec.com Backup Exec Website
www.backupexec.com/beguide Backup Exec Agent and Option Guide
https://support.veritas.com/docs/304175 Backup Exec in Large Environments
www.backupexec.com/new What’s New in Backup Exec 2012
www.backupexec.com/wpapers Backup Exec 2012 White Papers
https://partnernet.symantec.com/ PartnerNet
www.backupexec.com/collateral Backup Exec Datasheets, Solution Briefs and FAQs
www.backupexec.com/compatibility Backup Exec Software and Hardware Compatibility Documentation
www.symantecsystemrecovery.com Symantec System Recovery Website
www.backupexec.com/skugenerator Backup Exec SKU Generator
For more information visit
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
36
Glossary of some Terms
A
Active Directory - Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture
ActiveX - ActiveX controls are software modules based on Microsoft's Component Object Model (COM) architecture
ADO (ActiveX Data Objects) - Microsoft ADO is a Component object model object for accessing data sources It provides a layer between
programming languages and databases, which allows a developer to write programs which access data, without knowing how the database is
implemented
AES (Advanced Encryption Standard) - Encryption method using 128 up to 256 bits
AIT (Advanced Intelligent Tape) - A tape device and media technology introduced by Sony Corporation
ANSI (American National Standards Institute) - A coordinating organization for voluntary standards in the United States
Appliance - An intelligent device programmed to perform a single well-defined function, such as providing file, web, or print services
Archive - A consistent copy of a collection of data, usually taken for the purpose of maintaining a long-term durable record of a business or
application state
Archiving - The act of creating an archive
ARP (Address Resolution Protocol) - The protocol used by an IP networking layer to map IP addresses to lower level hardware (i.e., MAC)
addresses
Array – Disk storage device
ASP(Active Server Pages) - A specification for a dynamically created Web page with a ASP extension that utilises ActiveX scripting
ASPNET - is used to create Web pages and Web services and is an integral part of Microsoft's NET vision
Asynchronous - A type of two-way communication that occurs with a time delay, allowing participants to respond at their own convenience
ATA (Advanced Technology Attachment) - ATA interface is used to connect storage devices, such as hard disc drives, DVDs and CD-R/Ws
ATAPI (AT Attachment Packet Interface) - ATAPI is the protocol by which CD-ROM drives communicate with a computer system over an IDE
interface
Audit trail - A chronological record of system resource usage This includes user login, file access, other various activities, and whether any
actual or attempted security violations occurred, legitimate and unauthorized
Authentication - A security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an
individual's authorisation to receive information
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
37
Authorisation - The limiting of usage of information system resources to authorised users, programs, processes or other systems
Availability - The amount of time that a system is available during those time periods when it is expected to be available
B
Backup - A collection of data stored on (usually removable) non-volatile storage media for purposes of recovery in case the original copy of
data is lost or becomes inaccessible
Backup window - An interval of time during which a set of data can be backed up without seriously affecting applications that use the data
Bandwidth - The difference in Hertz between the highest and the lowest frequency in a transmission
Biometric Authentication - A method of generating authentication information for a person by digitizing measurements of a physical
characteristic, such as a fingerprint, a hand shape, a retina pattern…
BIOS (Basic Input Output System) - The part of the operating system that provides the lowest level interface to peripheral devices The BIOS is
stored in the ROM on the computer's motherboard
Block - The atomic unit in which data is stored and retrieved on disk and tape devices
Boot Sector - the first sector, or sectors, on any disk, usually containing programming necessary for the boot process
BOOTP (BOOTstrap Protocol) - A protocol that is used by a network node to determine the IP address of its Ethernet interfaces, in order to
effect network booting
Bot (Robot) - Short for Robot, - the term describes little programs designed to perform automated tasks on the Internet such as indexing,
looking/watching for message contents
Broadcast - The simultaneous transmission of a message to all receivers (ports) connected to a communication facility
BSA (Business Software Alliance) - The BSA is a group of software vendors dedicated to fighting software piracy, educating computer users
about software copyrights and cyber-security
Buffer – (usually known as Data Buffer) is a region of memory used to temporarily hold data while it is being moved from one place to
another.
Buffer overflow - Common program logic error in which input is not checked for length so the data over runs the buffer causing erratic
application behavior
Business Continuity - The ability of an organization to continue to function even after a disastrous event, accomplished through the
deployment of redundant hardware and software
Business Continuity Planning - Prepared (and tested) measures for protection of critical business operations from the effects of a loss,
damage or other failure of operational facilities providing crucial functions
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
38
C
Cache - A high speed memory or storage device used to reduce the effective time required to read data from or write data to a lower speed
memory or device
Cache poisoning - Cache poisoning, also called domain name system (DNS) poisoning or DNS cache poisoning, is the corruption of an
Internet server's domain name system table by replacing an Internet address with that of another, rogue address
CAS (Content Addressed Storage) - A storage methodology designed for rapid access to fixed content
Cascading - The process of connecting two or more Fibre Channel hubs or switches together to increase the number of ports or extend
distances
Catalog - A stored list of backed up files and directories and the locations of the backup copies
CCRC (Computer Crime Research Center) - US organization, the mission of the CCRC is to research and warn of unlawful acts involving
computer and information technologies, including computer crimes, internet fraud and cyber terrorism
CDP (Continuous Data Protection) - Storage system in which all the data in an enterprise is backed up whenever any change is made
CERT (Computer Emergency Readiness Team) - Established in 1988, the CERT® Coordination Centre (CERT/CC) is a centre of Internet security
expertise, located at the Software Engineering Institute, a federally funded research and development centre operated by Carnegie Mellon
University
Certificate (Digital certificate) - An electronic document attached to a public-key by a trusted third party, which provides proof that the
public-key belongs to a legitimate owner and has not been compromised
Certification - Endorsement of information by a trusted entity
CGI (Common Gateway Interface) - CGI is a programming method of passing information between a Web site and an applications program
and back again
Checkpoint - The recorded state of an application at an instant of time, including data, in-memory variables, program counter, and all other
context that would be required to resume application execution from the recorded state
CIFS (Common Internet File System) - A network file system access protocol originally designed and implemented by Microsoft Corporation
under the name Server Message Block protocol, and primarily used by Windows clients to communicate file access requests to Windows
servers
Cipher - The core algorithm used to encrypt data A cipher transforms regular data (plaintext) into a coded set of data (ciphertext) that is not
reversible without a key For example, AES and DES are examples of secret key block ciphers
Client – end-user, or application that runs on an end-user personal computer
Cluster - A collection of computers that are interconnected (typically at high-speeds) for the purpose of improving reliability, availability,
serviceability and/or performance
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
39
Compliance - In the storage context, compliance refers to a whole bundle of legislation, rules and conventions which impact the way that data
is stored, archived, retrieved and encrypted
Compression - The process of encoding data to reduce its size
Consolidation - Cost reduction process to optimize IT resources by locating them in a central location
Contingency Planning - The development of a management plan that uses alternative strategies to ensure project success if specified risk
events occur
CRC (cyclic redundancy check) - A scheme for checking the correctness of data that has been transmitted or stored and retrieved
Cryptography - A single means of encryption or decryption
CSI (Computer Security Institute) - CSI is a membership organization specifically dedicated to serving and training the information, computer
and network security professionals
Cylinder - Structure data organization on a disk drive
D
D2D2T - An approach to computer storage backup and archiving in which data is initially copied to backup storage on a disk storage system
and then periodically copied again to a tape storage system
DAS (Direct Attached Storage) - DAS is storage that is directly connected to a server by connectivity media such as parallel SCSI cables
Data Protection - Solutions used to protect Data
DBMS (Database Management System) - An set of computer programs with a user and/or programming interface that supports the definition
of the format of a database, and the creation of and access to its data
Defragmentation - Operation performed on a disk drive to group files in order to optimize access time
DES (Data Encryption Standard) - A cryptographic data protection algorithm published by the National Institute of Standards and Technology
Digital Signature - The digital equivalent of a written signature, providing cryptographic evidence that the original document is authentic,
unaltered, not forged, and non-repudiable, almost always using a public-key algorithm
Disaster Recovery - The ability to recover from the loss of a complete site, whether due to natural disaster or malicious intent Disaster
recovery strategies include replication and backup/restore
Disaster Recovery Plan - A plan to describe all processes to recover after a disaster
Disk array - A set of disks from one or more commonly accessible disk subsystems, combined with a body of control software
DLT (Digital Linear Tape) - A family of tape device and media technologies developed by Quantum Corporation
DMA (Direct Memory Access) - Direct memory access between microprocessor and a peripheral
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
40
DMTF (Distributed Management Taskforce) - An industry organization that develops management standards for computer system and
enterprise environments
DMZ (De Militarized Zone) - A security zone between internet and the internal network
DNS (Domain Name Services) - A computer program that converts between IP addresses and symbolic names for nodes on a network
DRM (Digital Right Management) - Any technology used to protect the interests of owners of content and services
E
ECC (Error Correction Code) - A scheme for checking the correctness of data that has been stored and retrieved, and correcting it if necessary
Encryption - The conversion of plaintext to encrypted text with the intent that it only be accessible to authorised users who have the
appropriate decryption key
ESM – Enterprise Storage Management
F
Fabric - A Fibre Channel switch or more Fibre Channel switches interconnected
Failover - The automatic substitution of a functionally equivalent system component for a failed one Failover applies both to clustering and to
multiple paths to storage
FAT32 - 32 bit File Allocation Table A method of storing information on a hard disk FAT32 supports drives up to 2 terabytes and pathnames
greater that 256 characters
FCAL - A form of Fibre Channel network in which up to 126 nodes are connected in a loop topology
Fibre Channel - Fibre-Channel is an interface standard for connecting computers to mass storage devices such as disk drives and tape
libraries
Fragmentation - The state of having a file scattered around a disk in pieces rather than existing in one contiguous area of the disk
Fragmented files are slower to read than unfragmented files
FTP (File Transfer Protocol) - The File Transfer Protocol is an application program which moves files between computers connected to the
Internet independent of machine type or operating systems
Full backup - A backup in which all of a defined set of data objects are copied, regardless of whether they have been modified since the last
backup
G
Garbage collector - a particular class of strategies for dynamically but transparently reallocating computer memory in running applications
GB/s - A throughput of 1 Billion bits per seconds
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
41
GBIC (GigaBit Interface Converter) - An interface module which converts the light stream from a Fibre channel cable into electronic signals for
use by the network interface card
H
HBA (Host Bus Adapter) - An interface card which plugs into the computer's bus and connects it to the network
Host – Servers, or a device that houses, applications or data
Holographic storage - Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions
Hotfix - A single cumulative package composed of one or more files used to address a problem in a product
HTML (Hypertext Mark-up Language) - The set of tags or “mark-up" codes that describe how a document is displayed by a web browser
HTTP (Hypertext Transfer Protocol) - An application level protocol, usually run over TCP/IP that enables the exchange of files via the World
Wide Web
I
ICMP - A control protocol strongly related to IP and TCP, and used to convey a variety of control and error indications
IDE (Integrated Drive Electronics) - This is a commonly used interface for hard disk drives and CD-ROM drives
ILM (Information Lifecycle Management) - The process of managing information growth, storage, and retrieval over time, based on its value
to the organization
Imap 4 (Internet Message Access Protocol)
Imap 4 is an application layer Internet protocol used for accessing email on a remote server from a local client
In band (Virtualisation) - Virtualisation functions or services that are in the data path In a system that implements in-band virtualisation,
virtualisation services such as address mapping are performed by the same functional components used to read or write data
Inode - A persistent data structure in a UNIX or UNIX-like file system that describes the location of some or all of the disk blocks allocated to
the file
Integrity (information) - Information integrity is the trustworthiness of information It is a state of information that collectively describes the
accuracy, consistency and reliability of the information
IP tunneling - An encapsulating network protocol that enables one network to send its data inside another network's connection
IPv6 - A generation of the Internet Protocol, designed not only to extend the address space (to cope with growth in Internet usage) but also to
take advantage of concepts like multicast and the quality of service
iSCSI - iSCSI is a software package which emulates SCSI protocols, but the connection method is via an IP network instead of a direct SCSI
compatible cable
ISO (International Standards Organisation) - The international standards body
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
42
J
J2EE - A platform-independent, Java-centric environment from Sun for developing, building and deploying Web-based enterprise applications
online
Java - Java is an applications programming language which was developed by SUN Microsystems now owned and developed by Oracle –
alternatively is rather nice coffee
JavaBeans - JavaBeans architecture provides a way of designing reusable software components that can be visually manipulated in builder
tools
JavaScript - Java Script is an interpreted scripting language
JBOD (Just a Bunch of Disks) - A group of disks housed in its own box JBOD differs from RAID in not having any storage controller intelligence
or data redundancy capabilities
JDBC (Java Database Connectivity) - JDBC is a Java API that enables Java programs to execute SQL statements This allows Java programs to
interact with any SQL-compliant database
JVM (Java Virtual Machine) - The Java virtual machine executes instructions that a Java compiler generates This run time environment, or
JVM, is embedded in various products, such as web browsers, servers, and operating systems
K
kB -The kilobyte is a multiple of the unit byte for digital information. k- stands for kilo, meaning 1,000, while Ki- stands for kilobinary ("kibi-"),
meaning 1,024. The standardized binary prefixes such as Ki- were relatively recently introduced and still face low adoption. K- is often used
to mean 1,024, especially in KB, the kilobyte.
Suffix: b vs B
b stands for bit and B stands for byte. In the context of data rate units, one byte refers to 8 bits. For example, when a 1 Mbps connection is
advertised, it usually means that the maximum achievable download bandwidth is 1 megabit/s (million bits per second), which is actually
0.125 MB/s (megabyte per second), or about 0.1192 MiB/s (mebibyte per second)
Kernel - In computing, the kernel is the main component of most computer operating systems; it is a bridge between applications and the
actual data processing done at the hardware level.
KVM –Kernel-based Virtual Machine (KVM) is a virtualization infrastructure for the Linux kernel.
KVM switch - A KVM switch (with KVM being an abbreviation for keyboard, video or visual display unit, mouse) is a hardware device that
allows a user to control multiple computers from a single keyboard, video monitor and mouse.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
43
L
LAN – Local Area Network, most LANs are confined to a single building or group of buildings
LBA (Logical Block Addressing) - The address of a logical block
LDAP (Lightweight Directory Access Protocol) - An LDAP server centralizes network user information
LDM (Logical Disk Manager) - A name for the volume management control software in the Windows operating system
Library, Tape – Magnetic tape storage device
Logical Unit - The entity within a SCSI target that executes I/O commands Tape drives and array controllers may incorporate multiple logical
units to which I/O commands can be addressed
LTO (Linear Tape Open) - Technology was developed jointly by HP, IBM and Seagate to provide a clear and viable choice in an increasingly
complex array of tape storage options
LUN (Logical Unit Number) - A logical unit is a division of a storage disk or a set of disks
LUN Masking - A method to restrict server access to storage not specifically allocated to that server
LVD (Low Voltage Differential) - Low Voltage Differential technology is used for the production of special cables and circuitry used on the
newer SCSI hard drives which deliver data at very high speeds
M
MAC (Media Access Control) - Algorithms that control access to physical media, especially in shared media networks
MAN – Metropolitan Area Network is a data network designed for a town or city. In terms of geographic breadth, MANs are larger than local-
area networks (LANs), but smaller than wide-area networks (WANs). MANs are usually characterized by very high-speed connections using
fiber optical cable or other digital media.
Mapi (Messaging Application programming - A standard Windows interface for messaging that enables different mail programs and other
mail-aware applications like word processors and spreadsheets to exchange messages and attachments with each other
MBR (Master Boot Record) - Data present on the first sector of an hard drive, containing information needed to load operating system
Memory leak - A bug in a program that prevents it from freeing discarded memory and causes it to use increasing amounts of memory
Message Digest (MD) - A number that is derived from a message If you change a single character in the message, it will have a different
message digest
Mirroring - A form of storage array in which two or more identical copies of data are maintained on separate media
Multimode - A fiber optic cabling specification that allows up to 500 meter distances between devices
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
44
Multipathing - Multipathing is the use of redundant storage network components responsible for transfer of data between the server and
storage
Multi-threading - Used to described processes in computer systems
Multi-streaming - Multistreaming is a backup method by which a client sends multiple data streams simultaneously.
N
NAS (Network Attached Storage) - Term used for RAID, tape and other mass storage systems which have an integral network connection such
as Ethernet or Fibre-channel
NAT (Network Address Translation) - NAT is a technique in which the source and/or destination addresses of IP packets are rewritten as they
pass through a router or firewall
NCSC (National Computer Security Center) - The arm of the US National Security Agency that defines criteria for trusted computer products
NDMP (Network Data Management Protocol) - A communications protocol that allows intelligent devices on which data is stored, robotic
library devices, and backup applications to intercommunicate for the purpose of performing backups
NFS (Network File System) - A distributed file system and its associated network protocol originally developed by Sun Microsystems
Computer Corporation and commonly implemented in UNIX systems
NTFS (NT File System) - The file system for the Windows NT/2000/XP Operating System NTFS cannot be accessed by other Operating Systems
such as DOS It provides increase reliability and security in comparison to FAT
O
ODBC (Open Database Connect) - This is an interface developed by Microsoft, X/Open, and others that allows applications to access diverse
databases with a single, flexible interface
Offline backup - A form of backup in which the data being backed up is not accessed by applications for the duration of the backup
O/S – the Operating System is the most important programme that runs on a computer. Every general-purpose computer must have an
operating system to run other programs
Off-Host – not installed on the server, usually in the fabric or switch
Out of band (Virtualisation) - Virtualisation functions or services that are not in the data path
P
Partition - A partition is the portion of a physical disk or LUN that functions as though it were a physically separate disk
Patching - A method of updating a file that replaces only the parts being changed, rather than the entire file
Peer to peer - A network that allows two or more computers to share their resources
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
45
Petabyte - A Petabyte is 1,024 Terabytes
PHP (Hypertext Pre-processor) - PHP is an open source, server-side, HTML embedded scripting language used to create dynamic Web pages
PING (Packet Internet Groper) - 'Ping' stands for Packet Internet (or Inter-Network) Groper and is a packet (small message) sent to test the
validity / availability of an IP address on a network
Ping of death - A ping request that crashes the target computer, it is caused by an invalid packet size value in the packet header
PKI (Public Key Infrastructure) - A framework encompassing the laws, policies, standards, hardware, and software to provide and manage the
use of public key cryptography on public networks
PPP (Point to Point Protocol) - PPP is a protocol for communication between two computers using a serial interface, typically a personal
computer connected by phone line to a server
Provisioning - The process enabling administrators to assign system resources and privileges to users
Proxy server - A proxy server is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can
ensure security, administrative control, and caching service
PST (Personal folder Store) - This is the file/files where the Microsoft Exchange server delivers messages on local computer for offline usage
Public key - One of two keys in public key encryption
Public key encryption - A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key
Q
QOS (Quality of Service) - A set of quality assurance standards and mechanisms for data transmission
R
R/3 - Release 3 of SAP ERP application
RAM - Stands for "Random Access Memory," and is pronounced like the male sheep. RAM is made up of small memory chips that form a
memory module. These modules are installed in the RAM slots on the motherboard of your computer.
Radius (Remote Authentication Dial In User- Radius is a protocol used by Remote Access Server's for user Authentication
RAID (Redundant Array of Independent Disk) - A way of storing the same data over multiple physical disks to ensure that if a hard disk fails a
redundant copy of the data can be accessed instead
RAID 0 (stripping) - This technique has striping but no redundancy of data It offers the best performance but no fault-tolerance
RAID 1 (Mirroring) - Mirroring consists of at least two drives that duplicate the storage of data There is no striping
RAID 4 - A form of parity RAID in which the disks operate independently and all parity check data is stored on one disk
RAID 5 - A form of parity RAID in which the disks operate independently, and parity check data is distributed across the array's disks
RARP (Reverse Address Resolution Protocol) - RARP is a method of mapping the physical Ethernet address to the IP address of the host
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
46
Raw partition - A disk partition not managed by a volume manager
Replica - A general term for a copy of a collection of data
Registry - This is a database used by Microsoft Windows to store configuration information about the software installed on a computer. This
information includes things like the desktop background, program settings, and file extension associations.
Replication - Replication is the process of duplicating mission critical data from one highly available site to another
Replication (asynchronous) - After data has been written to the primary storage site, new writes to that site can be accepted, without having
to wait for the secondary (remote) storage site to also finish its writes
Replication (synchronous) - In synchronous replication, each write to the primary disk and the secondary disk must be complete before the
next write can begin
Retention period - The length of time that a backup image should be kept
Router - An interconnection device that connects individual Local Area Networks (LANs)
RSA -Acronym for both a public key algorithm and a corporation in the business of algorithm design, derived from the names of the founders
(Rivest, Shamir & Adelman)
Restore - The word "restore" means to return something to its former condition. Therefore, when you restore a computer or other electronic
device, you return it to a previous state. This may be a previous system backup or the original factory settings.
S
SAIT (Super Advanced Intelligent Tape) - SAIT (Super AIT) uses half-inch cartridges with native capacities of 500GB (SAIT-1) and 1TB (SAIT-2)
Both formats use the helical scan recording method and employ advanced metal evaporated tape
SAN (Storage Area Network) - A network whose primary purpose is the transfer of data between computer systems and storage elements and
among storage elements
SCSI (Small Computer System Interface) - A high performance parallel interface for connected mass storage devices such as disk drives to a
computer
SCSI 3 - Uses a 16-bit bus and supports data rates of 40 MB/sec Also called Ultra Wide SCSI
SDLT (Super DLT) – Super DLT (SDLT) provides native capacities of 110GB (SDLT 220), 160GB (SDLT 320) and 300GB (SDLT 600) SDLT drives
can read DLT IV cartridges
Sector - The unit in which data is physically stored and protected against errors on a fixed block architecture disk
Serial ATA (Serial Advanced Technology - SATA is a computer bus primarily designed for transfer of data to and from a hard disk, it is the
successor to the legacy ATA
S-HTTP - An extension to HTTP that uses encryption and digital signatures to provide security in each transaction
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
47
SLA (Service Level Agreement) - An agreement between a service provider, such as an IT department, an internet services provider, or an
intelligent device acting as a server, and a service consumer
SMI-S (Storage Management Initiative) - An interface standard that enables interoperability in both hardware and software between storage
products from different vendors to simplify the management of SAN environment
SMTP (Simple Mail transport Protocol) - The Internet standard protocol for transferring electronic mail messages from one computer to
another SMTP specifies how two mail systems interact and the format of control messages they exchange to transfer mail
SNIA (Storage Networking Industry Association) - An association of producers and consumers of storage networking products whose goal is
to further storage networking technology and applications
SNMP (Simple Network Management Protocol) - An IETF protocol for monitoring and managing systems and devices in a network
SQL (Structured query language) - Structured Query Language or SQL is a type of programming language used to interact with a database
SRM (Storage Resource Management) - Management of physical and logical storage resources, including storage elements, storage devices,
appliances, virtual devices, disk volume and file resources
SSL (Secure Socket Layer) - A protocol that provides secure data communication through data encryption
Striping - A mapping technique in which fixed-size consecutive ranges of virtual disk data addresses are mapped to successive array
members in a cyclic pattern, also known as RAID
Switch - Is a device that joins, filters and forwards packets between LAN segments. Switches operate at the data link layer and sometimes the
network layer and support any packet protocol.
T
TFTP (Trivial File Transfer Protocol) - A simplified version of FTP that transfers files but does not provide password protection or user-
directory capability
Tiered storage - Tiered storage is the assignment of different categories of data (like levels of protection needed, performance requirements,
frequency of use) to different types of storage media to reduce total storage cost
Track - The part of a disk which passes under one read/write head while the head is stationary
Triple DES - any of a number of variations on the DES algorithm - A cryptographic data protection algorithm published by the National
Institute of Standards and Technology
Two-phase commit - A feature of transaction processing systems that enables databases to be returned to the pre-transaction state if some
error condition occurs
Thick Client - Thick clients, also called heavy clients, are full-featured computers that are connected to a network.
Thin Client - Thin clients function as regular PCs, but lack hard drives and typically do not have extra I/O ports or other unnecessary features.
Since they do not have hard drives, thin clients do not have any software installed on them. Instead, they run programs and access data from
a server.
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
48
Throughput - Throughput refers to how much data can be transferred from one location to another in a given amount of time. It is used to
measure the performance of hard drives and RAM, as well as Internet and network connections.
Token - In networking, a token is a series of bits that circulate on a token-ring network. When one of the systems on the network has the
"token," it can send information to the other computers. Since there is only one token for each token-ring network, only one computer can
send data at a time.
In programming, a token is a single element of a programming language.
In security systems, a hard token is small card that displays an identification code used to log into a network.
TTL - "Time To Live” TTL is used when a "ping," or a request for a response, is sent to another computer, such as a server. The TTL represents
the number of hops, or servers in different locations, the request can travel to before returning a failed attempt message.
U
Ultra ATA - A version of the AT Attachment (ATA) standard that supports burst mode data transfer rates of 333 MBps
Ultra DMA/33 - Ultra DMA is a protocol for transferring data between a hard disk drive through the computer's data paths (or bus) to the
computer's random access memory (RAM)
Ultra SCSI - A form of SCSI capable of 20 MB/s
Ultra2 SCSI - A form of SCSI capable of 40 MB/s
Ultra3 SCSI - A form of SCSI capable of 80 MB/s
Ultrium - The high-capacity implementation of LTO technology
V
Virtual machine - A computer that hosts two or more different operating systems or multiple copies of the same operating system with each
instance of the operating system runs its own applications
Virtualization - Virtualization is a means by which multiple physical devices are viewed as a single logical unit
VLAN (Virtual LAN) - Group of devices on one or more LANs that are configured (using management software) so that they can communicate
as if they were attached to the same wire, when in fact they are located on a number of different LAN segments
Volume - Synonym for virtual disk Used to denote virtual disks created by a volume manager control software
VPN (Virtual Private Network) - The extension of a private network that provides encapsulated, encrypted, and authenticated logical links
across shared or public networks
VSS (Volume Shadow Copy Services) - In Windows NET Server 2003 VSS enables heterogeneous interoperation and cooperation between
storage hardware, storage software and business applications
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
49
VTL (Virtual Tape Library) - Storage system that includes a disk, a processor, and software to emulate tape or a tape library
W
WAFS (Wide Area File Services) - WAFS is a storage technology that makes it possible to access a remote data centre as though it were local
WAN – Wide Area Network is a computer network that spans a relatively large geographical area, typically, a WAN consists of two or more
local-area networks (LANs)
WDM (Wave Division Multiplexing) - The splitting of light into a series of “colors” for the purpose of carrying simultaneous traffic over the
same physical fiber
WEP (Wired Equivalent Privacy) - local area networks (WLANs) defined in the 80211b standard
Wide SCSI - Any form of SCSI using a 16-bit data path
Wi-Fi (Wireless Fidelity) - Wi-Fi is a term for certain types of wireless local area network (WLAN) that use specifications in the 80211 family
WORM (Write Once, Read Many) - A non-magnetic disk where, once data had been written to the disk, it could not be deleted, changed, or any
more data added, but could be read, or copied to other media, as many times as required
X
XML (eXtensible Markup Language) - A universal format for structured documents and data on the World Wide Web
Z
Zoning - A method of subdividing a storage area network into disjoint zones, or subsets of nodes on the network
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
50
About Symantec
Symantec is a global leader in providing security,
storage, and systems management solutions to help
consumers and organizations secure and manage
their information-driven world. Our software and
services protect against more risks at more points,
more completely and efficiently, enabling
confidence wherever information is used or stored.
Headquartered in Mountain View, Calif., Symantec
has operations in 40 countries. More information is
available at www.symantec.com.
For specific country offices
and contact numbers, please
visit our website.
Symantec World Headquarters
350 Ellis St.
Mountain View, CA 94043 USA
+1 (650) 527 8000
1 (800) 721 3934
www.symantec.com
Symantec helps organizations secure and manage theirinformation-driven world with data backup andrecovery software.
Copyright © 2012 Symantec Corporation. All rightsreserved. Symantec, the Symantec Logo, and theCheckmark Logo are trademarks or registeredtrademarks of Symantec Corporation or its affiliates inthe U.S. and other countries.Windows is a registeredtrademark of Microsoft Corporation in the United Statesand other countries. Macintosh, Mac, and Mac OS aretrademarks of Apple Inc., registered in the United Statesand other countries. Linux is the registered trademarkof Linus Torvalds in the U.S. and other countries. UNIX®is a trademark of the Open Group. Other names may betrademarks of their respective owners.4/2012 21245173
Backup Exec 2012 Fundamental GuideThe Fundamental Guide to Symantec Backup Exec and System Recovery Data Protection Portfolio
Are you looking for: Hosted, cloud-based backup Backup software
Backup software and storage appliance
Symantec Backup Exec.cloud™Symantec Backup Exec™ 2012
Small Business EditionSymantec Backup Exec™ 2012
V-Ray Edition Symantec Backup Exec™ 2012Symantec Backup Exec™ 3600
Appliance
Ideal for businesses withThree or fewer servers and/or
mobile PCs One to three serversVMware® or Microsoft®
Hyper-V®–centric environments Three or more servers 15 or more servers
Overview
Cloud-based backup for servers and PCs • No storage hardware required • Easy-to-use Web-based administration console • Predictable subscription licensing • Easily expands to support Symantec™ Endpoint Protection.cloud
Complete setup in less than 10 minutes • Easy to maintain • One license covers Windows® systems, SQL®, Exchange, SharePoint®, Active Directory®, and Hyper-V • Complete disaster recovery
Designed and licensed for VMware & Hyper-V–centric environments • Agentless VM backup • Integrated deduplication • Full VM, application, file/folder, and granular recovery from single-pass backup
Physical and virtual protection through one console • Complete disaster recovery and integrated deduplication and flexible, granular recovery • Expandable through agents and options or capacity licensing
Integrated data protection software & hardware in one device • Easy to install & configure • Physical and virtual protection through one console • Complete disaster recovery and integrated deduplication and flexible, granular recovery
Licensing
Per server ü ü
Capacity-based ü ü Up to 5.5 TB usable storage space
Licensed per socket-hosting virtual machines ü
Subscription-based licensing ü Service Provider (ExSP)licensing program
Service Provider (ExSP)licensing program
Service Provider (ExSP)licensing program
Service Provider (ExSP)licensing program
Data protection requirements
Optimized for server recovery ü ü ü ü ü
Optimized for server and desktop protection ü
Host and guest level protection for virtual server environments Hyper-V only ü ü ü
Only guest level protection for virtual machines ü
Optimized for pure virtual environments VMware and Hyper-V
Centralized management console ü ü ü ü ü
Centralized Web-based management ü
Optimized for limited IT staff ü ü ü
Data protection for three or fewer servers ü ü
Integrated software, hardware backup, and storage solution ü
Remote office backup ü ü ü
Support for on-premise software using your current storage hardware ü ü ü
Support for hosted backup with no additional storage hardware requirement
ü
Application protection Exchange, SQL only ü ü ü ü
Integrated deduplication ü ü ü
Backup
File level backup ü ü ü ü ü
Incremental backup ü ü ü ü ü
Differential backup ü ü ü ü
To tape ü ü ü ü
Symantec Backup Exec™ Portfolio Comparison Guide
Functionality by Product
Are you looking for: Hosted, cloud-based backup Backup software
Backup software and storage appliance
Symantec Backup Exec.cloud™Symantec Backup Exec™ 2012
Small Business EditionSymantec Backup Exec™ 2012
V-Ray Edition Symantec Backup Exec™ 2012Symantec Backup Exec™ 3600
Appliance
Ideal for businesses withThree or fewer servers and/or
mobile PCs One to three serversVMware® or Microsoft®
Hyper-V®–centric environments Three or more servers 15 or more servers
Overview
Cloud-based backup for servers and PCs • No storage hardware required • Easy-to-use Web-based administration console • Predictable subscription licensing • Easily expands to support Symantec™ Endpoint Protection.cloud
Complete setup in less than 10 minutes • Easy to maintain • One license covers Windows® systems, SQL®, Exchange, SharePoint®, Active Directory®, and Hyper-V • Complete disaster recovery
Designed and licensed for VMware & Hyper-V–centric environments • Agentless VM backup • Integrated deduplication • Full VM, application, file/folder, and granular recovery from single-pass backup
Physical and virtual protection through one console • Complete disaster recovery and integrated deduplication and flexible, granular recovery • Expandable through agents and options or capacity licensing
Integrated data protection software & hardware in one device • Easy to install & configure • Physical and virtual protection through one console • Complete disaster recovery and integrated deduplication and flexible, granular recovery
To disk ü ü ü ü
To cloud Symantec Cloud Third-party cloud* Third-party cloud* Third-party cloud* Third-party cloud*
Recovery
File and folder recovery ü ü ü ü ü
Bare metal recovery ü ü ü ü
Dissimilar hardware recovery ü ü ü ü
Granular recovery of Microsoft Exchange, SQL, Active Directory, and SharePoint applications on physical servers
ü ü ü ü
Granular recovery of Microsoft Exchange, SQL, Active Directory, and SharePoint applications on VMware and Hyper-V servers
Hyper-V only ü ü ü
Centralized search and recovery of stored data ü ü ü ü ü
End-user recovery of backup files ü
Physical to virtual conversion ü Remote agent for physical required
ü ü
Supports recovery to a new machine using system image and operating system
ü
Operating system support
Microsoft servers ü ü ü ü ü
Microsoft desktops ü ü ü ü ü
Linux® ü ü ü ü
Mac® OS ü ü ü ü
Microsoft Hyper-V Guest only ü ü ü ü
VMware ESX®/vSphere™ Guest only ü ü ü ü
Citrix® XenServer® Guest only Guest only Guest only Guest only Guest only
*Third-party cloud support via Nirvanix® (www.nirvanix.com) today and more coming tomorrow
For additional information on desktop only backup and recovery: Symantec Desktop and Laptop Option www.symantec.com/business/products/agents_options.jsp?pcid=pcat_business_cont&pvid=57_1
For additional information on system imaging software: Symantec™ System Recovery www.symantec.com/business/system-recovery-server-edition
To learn more about data protection compatibility, configuration, and installation, visit www.backupexec.com/compatibility
Copyright © 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, and Backup Exec are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 21224408 02/12
Symantec Backup Exec™ Portfolio Comparison Guide
Functionality by Product