SYMANTEC 为教育网构建信息安全平台

Embed Size (px)

DESCRIPTION

SYMANTEC 为教育网构建信息安全平台. 徐珂 资深售前顾问 [email protected] SYMANTEC Software. 议程. SYMANTEC 公司简介 教育行业需求 SYMANTEC 的解决方案 成功案例. 赛门铁克公司介绍. 全球第四大独立软件公司 全球增长速度最快的大型软件公司 在全球有 1 5,000 多名员工. - PowerPoint PPT Presentation

Citation preview

  • SYMANTEC [email protected] Software

    *

    SYMANTECSYMANTEC

    *

    15,000 --Chris Christiansen, IDC

    *

    + =

    *

    *

    *

    SAN

    VOD

    *

    WebVOD

    *

    //VODData TypeDatabase+ FileDatabase+ FileDatabase+ FileDatabaseData Growth per YearTBGBTBGBAvailability & Performance FocusServerStorageStorageStorageServer NetworkOpportunityBackupBackup + ArchiveBackupHA

  • SYMANTEC

    *

    SYMANTEC

    IT Symantec Client Security Symantec AntiVirus Symantec Gateway Security Symantec Network Security, Symantec Host IDS Symantec Mail Security Symantec BrightMail AntiSpam Symantec Security Information Management Symantec ESM VERITAS Storage Foundation VERITAS Storage Foundation for Networks CommandCentral Storage NetBackup & Options Backup Exec Suite & Options Enterprise Vault & Options LiveState Recovery Clients & Manager IT i3: OpForce LiveState Client Management Suite LiveState Delivery Ghost Solution Suite pcAnywhere LiveState Patch Manager LiveState Enterprise Asset Server Cluster Server CommandCentral Availability CommandCentral Service Consulting Advisory Services Consulting Solutions Enablement Services Managed Security Services Symantec DeepSight Alert Services & DeepSight Threat Mgmt System Symantec Discovery

    *

    SNS 7100SCS 3.0SGS 5400

    *

    SFHASAN

    VOD

    *

    *

    - - - -

    *

    /

    SYMANTEC NetBackup: Backup Exec: Windows46%26%

    *

    *

    /, 2004Total New License Revenue = $1,378.5 MillionSource: Gartner Dataquest Market Share: Storage Management Software, Worldwide, 2004 (April 2005)VERITAS NetBackup26.0%VERITAS BackupExec20.0%IBM TSM14.6%CABrightStor8.4%HP3.6%CommVault3.6%Syncsort1.4%EMC7.9%Other14.5%Symantec Total 46.0%

    Chart1

    26

    20

    14.6

    8.4

    7.9

    3.6

    3.6

    1.4

    14.5

    Sheet1

    VERITAS26

    VERITAS20

    IBM14.6

    CA8.4

    EMC7.9

    HP3.6

    CommVault3.6

    Syncsort1.4

    Other14.5

    Sheet1

    Sheet2

    Sheet3

    *

    SANSANSANSAN

    VOD

    (NBU/BEWS)

    (NBU/BEWS)

    *

    CDP)/

    SYMANTEC

    *

    *

    *

    *

    *

    Storage Foundation HASANStorage Foundation HAStorage Foundation HAStorage Foundation HA

    *

    SYMANTEC

    *

    *

    Global Cluster OptionDNS VERITAS

    *

    ----- (MAN) (WAN)(LAN)Remote MirroringReplicationVERITAS Cluster Server+ Global Cluster OptionVERITAS Storage Foundation+ Volume Replicator OptionRemote Mirror, SAN Attached, FibreReplication, IP, DWDM, Escon License Key EnabledLicense Key Enabled

    *

    SANStorage Foundation HAStorage Foundation HAStorage Foundation HA12

    *

    SYMANTEC

  • *

    VSF HA

    *

    *Symantec Confidential

    Notes to presenters:Uses SEVERAL BUILDS designed to focus your audiences attention on specific areas of the slide. Nothing fancy.REVIEW in SLIDESHOW MODE BEFORE PRESENTING to familiarize yourself with the buildsLESS TEXT on the PAGE and MORE in the NOTESTELL A STORY rather than asking your audience to read the page

    In combining Symantec and VERITAS, weve brought two industry leaders together to provide a more integrated, proactive, and efficient approach to managing the security and availability of information as it moves in and out of the infrastructure. Only the combined capabilities of these two market leaders can provide the type of integrated, holistic view that businesses require to fully leverage the value of their information and of the infrastructure which delivers it.

    By managing information in this way, youre better able to ensure your information is protected, and that it is available to whomever needs it (and only to those authorized to use it), whenever and wherever they need it. We call the result information integrity. By managing the integrity of your information, you develop greater resilience in your infrastructure, which enables you to reduce the risk of downtime, risk of data loss, and the risk of lost business. You are better able to reduce the complexity associated with increased demands, including regulatory demands, and you are able to operate more efficiently. Note to presenter: use if you need a single summary slide on the product categories and the individual products

    Security Infrastructure & Management Defense-in-depth protection against attacks at all tiers.Due to the evolving threat landscape, organizations are required to change their security approach to implement defense-in-depth. This is done via a combination of protection at the client, server and gateway tiers to combat blended threat attacks. Integrated Security at all levels is used to simplify the approach. Strong security information management and compliance solutions are required to correlate incidents across tiers and technologies. In addition, due to the critical nature of threats facing email today, the defense-in-depth approach must be applied to email this includes SPAM control, throttling, virus protection and management.Storage Management Eliminate storage-related downtime and improve disk utilizationFor the entire enterprise, monitoring and configuring storage environments providing cross-platform management to improve disk utilization and eliminate storage-related down-time.Data Management Simplify the management, protection and recovery of data throughout its lifecycle, and rapidly recover systemsFrom the desktop to the data center regardless of the type or size of business, providing scalable data backup and recovery solutions to protect critical data, simplify the management of data backup and recovery, and provide consistent, reliable data protection. Our system recovery solutions allow organizations to perform bare metal recovery in minutes and create real-time snapshots without disrupting system availability. When disaster strikes you can quickly restore data or failed systems to a specific point in time without taking hours to manually rebuild and restore data or reinstall from scratch.Application Service Management Optimize application and system availability and performance. Application Service Management (ASM) is a heterogeneous, cost effective and flexible approach that helps improve system and application uptime and availability by configuring, monitoring, analyzing, and tuning client and server devices and associated applications. Proactively address performance issues before they impact users or application performance falls below SLA thresholds. ASM also helps maintain control over client and server devices by discovering, provisioning, configuring, patching, updating, and retiring devices. Replication and remote mirroring technologies speed recovery time to eliminate data loss by making current data available immediately at an alternate location. From acquisition to disposal, ASM helps ensure devices remain secure, available, and compliant with corporate standards.Insight Use knowledge of the environment to provide actionable intelligence.Collecting vast amounts of information and turning that into knowledge, then adapting that knowledge to the changing threat environment enables the delivery of actionable intelligence to be leveraged by people and technologies. This requires a complete view of the external landscape and a keen understanding of the internal environment that can be brought together and rationalized then delivered to the appropriate tools that can implement these tasks in accordance with organization policy to mitigate risk, manage threats, and ensure business continuity

    Let's drill down a second on availability of data. Organizations need to consider recovery point and the recovery time objectives when thinking about data and data protection. This is how much data can you afford to lose, and how long can you afford to be down. Once that decision has been made, you're very well positioned to choose which technology is going to be most useful to solve your problems.

    Depending on how your recovery point or recovery time look, you can select many different kinds of technologies from VERITAS. You might decide that the application can withstand hours, or even days, of downtime, so a very simple tape based backup solution might be enough for you.You may also decide that you've got a highly transactional mission-critical application, maybe it's an online web site or maybe it's a trading floor, so you can only withstand minutes, or even seconds, of downtime. To meet this demand, you might choose a very highly available clustered and replicated solution, so that no matter what happens, you can be taking transactions within seconds of the failure. The good news is that VERITAS offers a complete suite of software that can provide both -- an environment which can get by with hours or days of downtime, or an environment that gets up and running within minutes or even seconds. So whatever you decide, VERITAS has a solution.

    Now let's look at that a little bit more closely. How can good software drive down the cost of hardware? First, let's talk about storage. VERITAS virtualizes storage. What does that mean? It means we can create a shared pool of storage devices. The way typically people deploy systems today is they deploy them in silos. The sales application is sitting on the sales server and talking to the sales disk. The financial application writes to the financial disk. The HR application writes to the HR disk. When the sales disk fills up we don't go and use the empty disk in finance, we go buy another disk. This causes high utilization rates in most IT shops most utilize about 50 or 60% at best. To correct this, we can pool those resources together, share them amongst different applications, and access them in a uniform way. end-users are able to use the data they need. Availability is not absolute. Rather, there are different levels of availability. in general, availability means that the following conditions are metThe final technology to discuss today is VERITAS Global Cluster Manager. Global Cluster Manager provides you the ultimate in availability, because it allows you to monitor and manage both your local clusters as well as remote clusters and replication from one Web based GUI. Should a failure occur at a single site, you can actually failover your entire site with a single click of a button. The benefits of VERITAS Global Cluster Manager is first and foremost ease of management, because this single Web console allows you to manage your clusters and your replication. In addition, it has built in automation. Should you have a failure at your primary site, you would get an email or a page saying the site is down. Receiving this message, an administrator would log on and verify a true disaster has occurred. If they feel a disaster has occurred, they click one button. At that point in time, the entire site is migrated to the secondary location. The data is mounted. The applications are turned on, and all of the client traffic can be redirected to that new IP address at the secondary site. Finally, Global Cluster Manager is an open solution. It provides the same management across multiple operating systems, and allows you to monitor not only VERITAS replication, but also third party replication. Global Cluster Manager provides you the ultimate in availability by allowing you to monitor and manage both your clusters and replication from a single console, while providing a failover for an entire site with a single click of a button. Key Message: It is important for companies to have the flexibility to scale from local high availability to disaster recovery. VERITAS provides a solution that can scale from LAN, MAN and WAN as simple as turning on license keys. Integration between Storage Foundation and Cluster Server ensures not only data is protected in the event of an outage but also applications are kept running. With a single solution, VERITAS Cluster Server, a company can provide high availability to applications in a single datacenter to providing disaster recovery over wide area. With VERITAS Storage Foundation, Data can be protected either within a single storage array to providing disaster recovery and data protection over a wide area using IP. Its as simple as that!******************************************************************************More information on what each configuration provides and the Advantages and Disadvantages of each:

    Local ClusteringShared-storage clusters are considered second generation clusters, and today are the most prevalent (over shared-nothing) for providing HA through application failover, primarily for RDBMS applications, e.g., Oracle, DB2, Sybase, etc. Questions to ask your customer to see if this infrastructure is appropriate for their environment:Do you have a storage area network (SAN) infrastructure?Is your data center in one location or are other components if your data center in another location near campus or off site?Are you satisfied with local availability?

    Architectural characteristics of this configuration include:A redundant server, network and storage architecture for application and data availability through the linking of multiple servers with shared storage;Systems are linked with private heartbeats, usually ethernet, which they use to communicate state status VCS uses a fast proprietary protocol, GAB/LLT, to communicate status;Each system in the cluster can access the storage of any other system.There is no replication or mirroring of data, as opposed to a shared-nothing or stretch clusterA SAN facilitates larger clusters (> 2 nodes), and is typically present in all clusters, i.e., switches or hubs are used;All cluster components servers, SAN infrastructure, storage are co-located on a single site.What products can be offered to support this solution? VCS and Storage FoundationAdvantages Applications can be easily migrated from one server in the cluster to any other server, facilitating application uptime.Redundant components prevent single point of failure;Use of SAN enables data access and sharing;DisadvantagesComplexityCost *********************************************Metro DR with Remote MirroringThis architecture typically gets deployed when customers want DR over short distances, and they have a SAN infrastructure in place. Many VERITAS customers in the Wall Street area have set up campus clusters with VM mirroring to separate their data centers over several miles, thus providing DR against such disasters as terrorist attacks. This would not provide long distance DR against a natural disaster such as an earthquake. Characteristics include:Single VCS cluster spanning multiple locationsCan have multiple VCS nodes at each site (2 sites maximum)Uses VxVM to create a mirror with plexes in two locationsNo host or array replication involvedWith new data switches using DWDM, support for up to 100KM distances have been claimed. VCS is testing with some of these.Requires Professional Services to ImplementSeparation Range dependent on infrastructure providerWhat products can be offered to support this solution? Storage Foundation and Cluster Server (or any 3rd party array vendor that provides data mirroring)

    Advantages: Effective configuration for Disaster Recovery at a low cost Quick restore in the event of a disaster (remote mirroring is quick always in synch) Maximum use of infrastructure effective use of fibre infrastructure that company already has in place. Most disasters are localized and this configuration would protect against most disasters.Disadvantages: ComplexityCost of DWDM/Fibre infrastructure. The key to this architecture slide is to emphasize that a customer who purchases Volume Manager and Cluster Server (or Foundation Suite/HA) can achieve local availability as well as metropolitan disaster recovery for no additional costs. Metropolitan Disaster Recovery (also known as Campus Clustering or Stretch Clustering) has been a prominent deployment for several companies whos service level agreements dont require a disaster recovery site to be across the country. Rather than investing in a disaster recovery site thousands of miles away, a customer can invest in a disaster recovery data center in the same city. The cost savings are tremendous! The minimal requirements is that the customer has a SAN infrastructure. The distance limitations depend on the latency that the customer is willing to afford. VERITAS recommends within 100 km. Remote Mirroring technology found in Volume Manager is used to replicate the data between the two sites synchronously. If the customer has already purchased Volume Manager and Cluster Server, this is a bonus that is part of the feature set.

    A customer example using metropolitan disaster recovery is a large bank in NYC who has fiber under the Hudson. Their remote site is in New Jersey. This is sufficient to meet their disaster recovery needs at an affordable price. ***************************************************************Metro DR with ReplicationMetro DR with Replication is a VCS, shared nothing configuration using replication between nodes to allow geographical separation of the cluster, thus providing both HA and DR benefits. Due to latency, the separation permitted will not be as extensive as a wide-area, TCP/IP solution, but RDC does provide a straight-forward, single cluster solution for many DR scenarios.The replication must be synchronous. Currently, VVR and SRDF replications are supported. The solution supports a cluster with 32 nodes. X number of nodes can be at the primary site, Y nubmer of nodes at the secondary site. In the event of a failure, VCS will attempt to failover the service group on a node at the primary site first before failing over to the remote site.A question associated with this architecture is when to position it over the campus cluster solution with VM mirroring. The general rule is that if a customer does not want to invest in a SAN, they can just run private Ethernet networks for VCS heartbeating, and set up Metro DR with Replication. If the customer has a SAN infrastructure in place, they would implement Metro DR with Remote Mirroring. This configuration is supported with VVR, SRDF and True Copy in a Solaris environment and SRDF only in a Windows environment. There are distance limitations to this configuration. Distance can be greater than a campus cluster architecture but less than DR (WAN) architecture. This is due to LLT (heartbeat) connections. This configuration can be stretched as far as the network latency for LLT is acceptable. This generally means no more than 500ms (1/2 second) return trip response between the two sites.

    **********************************************************Wide Area Disaster RecoveryGCM is both a management solution and a DR solution, involving multiple VCS clusters. Of the HA and DR solutions offered by VERITAS, it is the only one which involves multiple clusters. The stretch clusters use multiple sites, but always a single cluster. GCM is used for DR where unlimited geographical separation is called for, or for when management from a single console is needed to manage an enterprises clusters worldwide.The management solution (Base Option) does not implement replication. The DR option, which builds on the Base Option, always uses replication, either host-based from VERITAS, or array based, from 3rd party vendors like EMC (SRDF), or HDS (TruCopy).Advantages: Can support any distanceMultiple replication solutionsMultiple clustersMultiple OSesDisadvantages: CostComplexityNot integrated with VCS.