Upload
arrow-ecs-uk
View
466
Download
0
Embed Size (px)
DESCRIPTION
Presented at the Arrow ECS Accelerate your Virtualisation Business with Symantec and VMware event, 18th January 2012 at Williams F1 Conference Centre
Citation preview
The Last Mile…
Darren ThomsonCTO, Symantec EMEA
Make Clear Our Product Strategy Give Insight Into Our Experiences In The Virtualization SpaceShare Our Approach & Value Proposition In Virtualization
Today’s Objectives
2
The Need for a More Information-centric Approach
3
• Transactional
• Structured Data
• On-premise
System-Centric Information-Centric
• Collaborative
• Unstructured
• Distributed
The Symantec Strategic “Blueprint”An Information-Centric Model
Classification
Ownership
Threats Discovery
Encryption
Compliance
Reporting
Remediation
Policy Identity
4
Symantec Architectural Blueprinting
Classification
Ownership
Threats Discovery
Encryption
Compliance
Reporting
Remediation
Policy Identity
5
The Virtualization Journey
The road to the Cloud goes straight through business-critical virtualization…
Virtualizing Business-critical Applications 6
Cloud
Increasing…• IT Confidence
• Quality of Service
• Resiliency and Compliance
• Business AgilityTest & Dev
File, Print, DNS
Line of Business
Apps
Business- critical Apps
Virtualizing Business-critical Applications 7
The Promise of Virtualization
Virtual Infrastructure
IT Agility
IT Costs
“Improve operational efficiency whilst maintaining an
appropriate risk posture”
A Recipe For Good IT Strategy
Challenges of Business-critical Virtualization
Modernizing for high-density environments..
…across virtual and physical
Virtualizing Business-critical Applications 9
PerformanceAvailabilitySecurityStorage Mgmt
+Business-critical
Virtualization
• Data Protection• High Availability• Storage Management• Security• Systems Management• Endpoint Security• NFS File Storage
Collaborative partnership delivering critical solutions:
Virtualizing Business-critical Applications 10
Symantec and VMware
Evolving from Silos to Hybrid Cloud
Key Strategies:1. Virtualize more application
infrastructure
2. Consolidate application silos to a service delivery platform
3. Increase automation
Virtualizing Business-critical Applications 11
Hybrid Cloud
Silos of Application Infrastructure
Virtualizing Business-critical Applications 12
Symantec Business-critical Virtualization Solutions
Symantec Solutions for Business-critical Virtualization
13
Data Protection
Endpoint Virtualization
Storage Virtualization
Storage Management
Security
HA/DR
Symantec Business-critical Virtualization Solutions
Symantec Solutions for Business-critical Virtualization
14
Data Protection
Endpoint Virtualization
Storage Virtualization
Storage Management
Security
HA/DR
15
High Availability Modernized for Business-critical Virtualization
• Advanced monitoring for multi-tier applications
• Integrated with VMware vCenter console
• Policy-driven restart coordinated with VMware HA and vMotion
Virtualizing Business-critical Applications
Symantec ApplicationHA
SQL*Server
Web Logic
Exchange
Oracle
Sharepoint
SAPIIS
Custom Apps
Virtualization High Availability Challenges
Virtualizing Business-critical Applications 16
Business-critical SLA’s
…. With Virtual Business Services
Virtual Business Services
17
Database SG
Application Server SG
Web Server SG
Billing Virtual Business Service
Veritas Operations Manager
Start/Stop OrderInter-cluster fault policy
Database
Application
Web server
Billing
appappapp
DB
FSIP
VVR
Service Group
VCS
App
IP
Service Group
VCS
Web
VM
Service Group
Web
VM
Service Group
ApplicationHA
Business Critical Applications' Journey to the Cloud
Symantec Business-critical Virtualization Solutions
Symantec Solutions for Business-critical Virtualization
18
Data Protection
Endpoint Virtualization
Storage Virtualization
Storage Management
Security
HA/DR
19
The Virtualization Security Challenge
• Threat landscape constantly evolving– and more toxic than ever
• Security solutions can’t compromise run-time performance
• High density increases operational complexity
• Security model predicted on physical hardware have to change
Virtualizing Business-critical Applications
Virtualizing Business-critical Applications
Advanced Security for VMware Endpoints
• Symantec Endpoint Protection
• Eliminates “AV storms”
• Improves performance resulting in a 10x increase in VM density
20
Maximizes performance and density without
sacrificing security
Disk I/O ↓ by up to
90%
Virtual Image
Exception
Shared Insight Cache
Virtual Client
TaggingOffline Image
Scanner
Resource Leveling Powere
d by Insight
Virtualizing Business-critical Applications
Security for VMware
100% 84%60%
4%12%
40%
CompromisedNeutralizedDefended
21
Best Protection
22
Virtualizing Business-critical Applications
Information ProtectionPreemptive Security Alerts Threat Triggered Actions
Global Scope and ScaleWorldwide Coverage 24x7 Event Logging
Rapid Detection
Attack Activity• 240,000 sensors• 200+ countries
Malware Intelligence• 133M client, server,
gateways monitored• Global coverage
Vulnerabilities• 40,000+ vulnerabilities• 14,000 vendors• 105,000 technologies
Spam/Phishing• 5M decoy accounts• 8B+ email messages/day• 1B+ web requests/day
Austin, TXMountain View, CACulver City, CA
San Francisco, CA
Taipei, Taiwan
Tokyo, Japan
Dublin, IrelandCalgary, Alberta
Chengdu, China
Chennai, India
Pune, India
Symantec™ Global Intelligence NetworkIdentifies more threats, takes action faster & prevents impact
Symantec Business-critical Virtualization Solutions
Symantec Solutions for Business-critical Virtualization
23
Data Protection
Endpoint Virtualization
Storage Virtualization
Storage Management
Security
HA/DR
The Journey to the Cloud Goes Straight through Business-critical Virtualization
Virtualizing Business-critical Applications 24
• Evolve from server virtualization to hybrid cloud service delivery
• Leverage public cloud services with confidence
Public Saas, PaaS, IaaS Clouds
Virtual Private/ Community Clouds
Cloud Workload Management
Hybrid Cloud
Cloud Storage, Security, Backup, DR
IT as a Service: Get There with Fujitsu & Symantec.
Virtualization
Consolidation & Automation
Resiliency&
Compliance
Thank you.
Virtualizing Business-critical Applications 25