SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
This document is provided for informational purposes only. All warranties relating to the information
in this document, either express or implied, are disclaimed to the maximum extent allowed by law.
The information in this document is subject to change without notice. Copyright © 2013 Symantec
Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are
trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other
countries. Other names may be trademarks of their respective owners.
NetBackup 7.6 Feature Briefing
Direct virtual machine creation from
backup with BMR
Version number: 1.0
Issue date: 5th
November 2013
This document describes a feature introduced in NetBackup7.6 and available in this and higher releases.
If you have any feedback or questions about this document please email them to IMG-TPM-Requests@symantec.com
stating the document title.
NETBACKUP7.6FEATUREBRIEFING
DIRECTVIRTUALMACHINECREATIONFROM
BACKUPWITHBMR
Page 1
NetBackup 7.6 Feature Briefing - Direct virtual machine creation from backup with BMR
Feature Description
The last few years have seen a significant growth in the adoption of virtualized servers in data centers
with many organizations converting to purely virtual environments. Even organizations that use physical
servers in their production environments are starting to see the benefits of using virtualization in their
disaster recovery and test and development environments. NetBackup’s Bare Metal Restore (BMR)
feature has always provided an effective mechanism for migrating between physical and virtual
environments by recovering backups of physical servers to virtual servers. In NetBackup 7.6 this
“physical to virtual” recovery model has been greatly simplified allowing customers to achieve rapid
physical to virtual migration and disaster recovery to virtual environments for Windows servers in both
local and remote (disaster recovery) sites.
Business Value
The Bare Metal Restore “physical to virtual” recovery capability allows customers to recover backups of
physical Windows servers to VMware virtual machines. Using VMware virtualization in a disaster
recovery data center can significantly reduce both the capital and operational costs associated with
maintaining a disaster recovery position by allowing a “lights out” facility to be rapidly spun up in the
event of a site loss.
Bare Metal Restore “physical to virtual” can be combined the NetBackup Auto Image Replication
feature, allowing backup of physical servers to be replicated to a remote data center. VMware ESX
servers at this disaster recovery facility can be left powered off until required and then powered up.
Once the ESX servers are available the replicated backups of the physical servers at the product site can
be quickly restored to virtual machines running on the ESX servers rather than needing to deploy
physical servers.
For disaster recovery testing purposes the virtual machines created during the recovery process can
simply be deleted once the testing activities are complete.
A similar approach can be used in test and development environments with backups from physical
production servers being used to create virtual test servers.
Page 2
NetBackup 7.6 Feature Briefing - Direct virtual machine creation from backup with BMR
Underlying Principles
The BMR physical to virtual recovery process uses the VMware proxy server to provide a “virtual
instance converter” which creates a VMDK for the new virtual machine and restores the BMR backup of
the physical machine to that VMDK.
Figure 1 - physical to virtual conversion process
Figure 1 above shows the key components used during the recovery process. An empty virtual machine
container is created on the ESX server and presented to Virtual Instance Converter which formats the
virtual machine’s disks and restores the backup from the physical machine to them. The virtual machine
is then automatically started and made available to users.
Guided Tour
The conversion and recovery process can either be driven from the command line, using the
nbrestorevm command, or from the Bare Metal Restore Management section of the master server
administration interface. Using the command line allows the backup administrator to script and
schedule “bulk” conversions of virtual machines or disaster recovery testing purpose.
Page 3
NetBackup 7.6 Feature Briefing - Direct virtual machine creation from backup with BMR
This “guided tour” provides examples from the administration interface “GUI driven” conversion
method.
Clients suitable for conversion to virtual machines are displayed under “VM Conversion Clients” (see
Figure 2) and conversion can be initiated by right clicking on the required client and selecting the option
“Convert to Virtual Machine”.
Figure 2 – VM conversion clients
One initiated the conversion wizard prompts for a number of inputs including the name of the
NetBackup Recovery Host
Page 4
NetBackup 7.6 Feature Briefing - Direct virtual machine creation from backup with BMR
Figure 3 – Conversion Options
Once this information has been enter the next screen prompts for restore options including whether any
existing VM should be overwritten and whether the new VM should automatically power on after
recovery (Figure 4)
Figure 4 – Virtual Machine Options
Page 5
NetBackup 7.6 Feature Briefing - Direct virtual machine creation from backup with BMR
The next screen prompts for the datastore where the VMDK file will be created (Figure 5):
Figure 5 - Storage locations
Finally the network to be used is selected (Figure 6):
Figure 6- Network connections
Page 6
NetBackup 7.6 Feature Briefing - Direct virtual machine creation from backup with BMR
Once all the required information has been enter a summary screen is provided with the ability to run a
pre-conversion check (Figure 7).
Figure 7 - Conversion settings summary
The pre-conversion check validates the selected options and allows the conversion to be initiated
(Figure 8).
Figure 8 - Pre-conversion check output
Page 7
NetBackup 7.6 Feature Briefing - Direct virtual machine creation from backup with BMR
If the pre-conversion check is successful the conversion can be started by hitting “Convert to VM”, the
progress of the conversion can be seen through the VM conversion tasks tab (Figure 9) and via the
NetBackup activity monitor.
Figure 9 – Conversion progress displayed through VM Conversion Tasks
Licensing and support considerations
No special licenses are required for the BMR Physical to Virtual recovery feature. However a full
NetBackup VMware backup configuration is required for the recovery process. The server that acts as
the Virtual Instance Converter must be a Windows server and must have access to a copy of the
VMware tools ISO from the ESX server.
About Symantec:
Symantec is a global leader in
providing security, storage, and
systems management solutions to
help consumers and organizations
secure and manage their
information-driven world. Our
software and services protect
against more risks at more points,
more completely and efficiently,
enabling confidence wherever
information is used or stored.
Headquartered in Mountain View,
Calif., Symantec has operations in
40 countries. More information is
available at www.symantec.com.
For specific country offices and
contact numbers, please visit our Web
site: www.symantec.com
Symantec Corporation
World Headquarters
350 Ellis Street
Mountain View, CA 94043 USA
+1 (650) 527 8000
+1 (800) 721 3934
Copyright © 2013 Symantec
Corporation. All rights reserved.
Symantec and the Symantec logo
are trademarks or registered
trademarks of Symantec
Corporation or its affiliates in the
U.S. and other countries. Other
names may be trademarks of their
respective owners.

Contenu connexe

Tendances

VMWARE Professionals - Availability and Resiliency
VMWARE Professionals -  Availability and ResiliencyVMWARE Professionals -  Availability and Resiliency
VMWARE Professionals - Availability and ResiliencyPaulo Freitas
 
Scvmm Technical Overview.Son Vu
Scvmm Technical Overview.Son VuScvmm Technical Overview.Son Vu
Scvmm Technical Overview.Son Vuvncson
 
System Center Virtual Machine Manager 2012 - Whats New
System Center  Virtual Machine Manager 2012 - Whats NewSystem Center  Virtual Machine Manager 2012 - Whats New
System Center Virtual Machine Manager 2012 - Whats NewAmit Gatenyo
 
Performance management in the virtual data center
Performance management in the virtual data centerPerformance management in the virtual data center
Performance management in the virtual data centerMark Friedman
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server VirtualisationAlan McSweeney
 
Tranxition sccm integration guide
Tranxition sccm integration guideTranxition sccm integration guide
Tranxition sccm integration guidevinodmeltoe
 
Vmware training presentation
Vmware training presentationVmware training presentation
Vmware training presentationAmit Kapadia
 
Virtualization: Hyper-V, VMM, App-V and MED-V.
Virtualization: Hyper-V, VMM, App-V and MED-V.Virtualization: Hyper-V, VMM, App-V and MED-V.
Virtualization: Hyper-V, VMM, App-V and MED-V.Microsoft Iceland
 
Veeam Backup & Replication - What’s New in 6.5
Veeam Backup & Replication - What’s New in 6.5Veeam Backup & Replication - What’s New in 6.5
Veeam Backup & Replication - What’s New in 6.5Veeam Software
 
WSUS Deployment on Windows Server 2008
WSUS Deployment on Windows Server 2008WSUS Deployment on Windows Server 2008
WSUS Deployment on Windows Server 2008SolarWinds
 
Veeam Backup and Replication: Overview
Veeam  Backup and Replication: OverviewVeeam  Backup and Replication: Overview
Veeam Backup and Replication: OverviewDudley Smith
 
What's new in Windows Server 2012 R2
What's new in Windows Server 2012 R2What's new in Windows Server 2012 R2
What's new in Windows Server 2012 R2Christopher Keyaert
 
Ibm smart cloud entry+ for system x administrator guide
Ibm smart cloud entry+ for system x administrator guideIbm smart cloud entry+ for system x administrator guide
Ibm smart cloud entry+ for system x administrator guideIBM India Smarter Computing
 
PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMwareDevansh Chowdhary
 
Microsoft Virtualization for VMware Professionals
Microsoft Virtualization for VMware ProfessionalsMicrosoft Virtualization for VMware Professionals
Microsoft Virtualization for VMware ProfessionalsEduardo Castro
 
Virtualizing the Next Generation of Server Workloads with AMD™
Virtualizing the Next Generation of Server Workloads with AMD™Virtualizing the Next Generation of Server Workloads with AMD™
Virtualizing the Next Generation of Server Workloads with AMD™James Price
 
AMD Virtualization -- Take Charge
AMD Virtualization -- Take ChargeAMD Virtualization -- Take Charge
AMD Virtualization -- Take ChargeJames Price
 
IBM SmartCloud Virtual Desktop Infrastructure for Microsoft Windows Server 20...
IBM SmartCloud Virtual Desktop Infrastructure for Microsoft Windows Server 20...IBM SmartCloud Virtual Desktop Infrastructure for Microsoft Windows Server 20...
IBM SmartCloud Virtual Desktop Infrastructure for Microsoft Windows Server 20...IBM India Smarter Computing
 
VMware vSphere Storage Appliance (VSA) - Technical Presentation,Almacenamien...
VMware vSphere Storage Appliance (VSA) -  Technical Presentation,Almacenamien...VMware vSphere Storage Appliance (VSA) -  Technical Presentation,Almacenamien...
VMware vSphere Storage Appliance (VSA) - Technical Presentation,Almacenamien...Suministros Obras y Sistemas
 

Tendances (20)

VMWARE Professionals - Availability and Resiliency
VMWARE Professionals -  Availability and ResiliencyVMWARE Professionals -  Availability and Resiliency
VMWARE Professionals - Availability and Resiliency
 
Scvmm Technical Overview.Son Vu
Scvmm Technical Overview.Son VuScvmm Technical Overview.Son Vu
Scvmm Technical Overview.Son Vu
 
System Center Virtual Machine Manager 2012 - Whats New
System Center  Virtual Machine Manager 2012 - Whats NewSystem Center  Virtual Machine Manager 2012 - Whats New
System Center Virtual Machine Manager 2012 - Whats New
 
VMware vSphere 6 & Horizon View 6.1 – What's New ?
VMware vSphere 6 & Horizon View 6.1 – What's New ?VMware vSphere 6 & Horizon View 6.1 – What's New ?
VMware vSphere 6 & Horizon View 6.1 – What's New ?
 
Performance management in the virtual data center
Performance management in the virtual data centerPerformance management in the virtual data center
Performance management in the virtual data center
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server Virtualisation
 
Tranxition sccm integration guide
Tranxition sccm integration guideTranxition sccm integration guide
Tranxition sccm integration guide
 
Vmware training presentation
Vmware training presentationVmware training presentation
Vmware training presentation
 
Virtualization: Hyper-V, VMM, App-V and MED-V.
Virtualization: Hyper-V, VMM, App-V and MED-V.Virtualization: Hyper-V, VMM, App-V and MED-V.
Virtualization: Hyper-V, VMM, App-V and MED-V.
 
Veeam Backup & Replication - What’s New in 6.5
Veeam Backup & Replication - What’s New in 6.5Veeam Backup & Replication - What’s New in 6.5
Veeam Backup & Replication - What’s New in 6.5
 
WSUS Deployment on Windows Server 2008
WSUS Deployment on Windows Server 2008WSUS Deployment on Windows Server 2008
WSUS Deployment on Windows Server 2008
 
Veeam Backup and Replication: Overview
Veeam  Backup and Replication: OverviewVeeam  Backup and Replication: Overview
Veeam Backup and Replication: Overview
 
What's new in Windows Server 2012 R2
What's new in Windows Server 2012 R2What's new in Windows Server 2012 R2
What's new in Windows Server 2012 R2
 
Ibm smart cloud entry+ for system x administrator guide
Ibm smart cloud entry+ for system x administrator guideIbm smart cloud entry+ for system x administrator guide
Ibm smart cloud entry+ for system x administrator guide
 
PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMware
 
Microsoft Virtualization for VMware Professionals
Microsoft Virtualization for VMware ProfessionalsMicrosoft Virtualization for VMware Professionals
Microsoft Virtualization for VMware Professionals
 
Virtualizing the Next Generation of Server Workloads with AMD™
Virtualizing the Next Generation of Server Workloads with AMD™Virtualizing the Next Generation of Server Workloads with AMD™
Virtualizing the Next Generation of Server Workloads with AMD™
 
AMD Virtualization -- Take Charge
AMD Virtualization -- Take ChargeAMD Virtualization -- Take Charge
AMD Virtualization -- Take Charge
 
IBM SmartCloud Virtual Desktop Infrastructure for Microsoft Windows Server 20...
IBM SmartCloud Virtual Desktop Infrastructure for Microsoft Windows Server 20...IBM SmartCloud Virtual Desktop Infrastructure for Microsoft Windows Server 20...
IBM SmartCloud Virtual Desktop Infrastructure for Microsoft Windows Server 20...
 
VMware vSphere Storage Appliance (VSA) - Technical Presentation,Almacenamien...
VMware vSphere Storage Appliance (VSA) -  Technical Presentation,Almacenamien...VMware vSphere Storage Appliance (VSA) -  Technical Presentation,Almacenamien...
VMware vSphere Storage Appliance (VSA) - Technical Presentation,Almacenamien...
 

Similaire à FEATRURE BRIEF▶ NetBackup 7.6 - Direct virtual machine creation from backup with BMR

TECHNICAL WHITE PAPER▸ NetBackup 7.6 Plugin for VMware vCenter
TECHNICAL WHITE PAPER▸ NetBackup 7.6 Plugin for VMware vCenterTECHNICAL WHITE PAPER▸ NetBackup 7.6 Plugin for VMware vCenter
TECHNICAL WHITE PAPER▸ NetBackup 7.6 Plugin for VMware vCenterSymantec
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization1CloudRoad.com
 
VMTurbo Performance Study
VMTurbo Performance StudyVMTurbo Performance Study
VMTurbo Performance StudyShane Meth
 
VMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & Replication
VMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & ReplicationVMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & Replication
VMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & ReplicationSuministros Obras y Sistemas
 
15 Vmware interview questions & answers 2018
15 Vmware interview questions & answers 201815 Vmware interview questions & answers 2018
15 Vmware interview questions & answers 2018Mercury Solutions
 
Practical Guide to Business Continuity & Disaster Recovery
Practical Guide to Business Continuity & Disaster RecoveryPractical Guide to Business Continuity & Disaster Recovery
Practical Guide to Business Continuity & Disaster Recoveryatif_kamal
 
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...Symantec
 
Efficiently protect-virtual-machines
Efficiently protect-virtual-machinesEfficiently protect-virtual-machines
Efficiently protect-virtual-machinesIcomm Technologies
 
Virtualization meisen 042811
Virtualization meisen 042811Virtualization meisen 042811
Virtualization meisen 042811Morty Eisen
 
Veeam Availability top 10 reasons to choose veeam - long
Veeam Availability top 10 reasons to choose veeam - longVeeam Availability top 10 reasons to choose veeam - long
Veeam Availability top 10 reasons to choose veeam - longS. Hanau
 
VMbackup Agent for VMware
VMbackup Agent for VMwareVMbackup Agent for VMware
VMbackup Agent for VMwarejerrycarleo
 
Datacenter migration using vmware
Datacenter migration using vmwareDatacenter migration using vmware
Datacenter migration using vmwareWilson Erique
 
Symantec NetBackup 7.6 benchmark comparison: Data protection in a large-scale...
Symantec NetBackup 7.6 benchmark comparison: Data protection in a large-scale...Symantec NetBackup 7.6 benchmark comparison: Data protection in a large-scale...
Symantec NetBackup 7.6 benchmark comparison: Data protection in a large-scale...Principled Technologies
 
NBU_benchmark_comparison_(part_2)_1214_v2
NBU_benchmark_comparison_(part_2)_1214_v2NBU_benchmark_comparison_(part_2)_1214_v2
NBU_benchmark_comparison_(part_2)_1214_v2Abdul Rasheed
 
Backup workflow for SMHV on windows 2008R2 HYPER-V
Backup workflow for SMHV on windows 2008R2 HYPER-VBackup workflow for SMHV on windows 2008R2 HYPER-V
Backup workflow for SMHV on windows 2008R2 HYPER-VAshwin Pawar
 
Whitepaper Server Virtualisation And Storage Management
Whitepaper   Server Virtualisation And Storage ManagementWhitepaper   Server Virtualisation And Storage Management
Whitepaper Server Virtualisation And Storage ManagementAlan McSweeney
 
VMware vSphere 5 and IBM XIV Gen3 end-to-end virtualization
VMware vSphere 5 and  IBM XIV Gen3 end-to-end  virtualizationVMware vSphere 5 and  IBM XIV Gen3 end-to-end  virtualization
VMware vSphere 5 and IBM XIV Gen3 end-to-end virtualizationIBM India Smarter Computing
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software TestingColloquium
 

Similaire à FEATRURE BRIEF▶ NetBackup 7.6 - Direct virtual machine creation from backup with BMR (20)

Whitepaper
WhitepaperWhitepaper
Whitepaper
 
TECHNICAL WHITE PAPER▸ NetBackup 7.6 Plugin for VMware vCenter
TECHNICAL WHITE PAPER▸ NetBackup 7.6 Plugin for VMware vCenterTECHNICAL WHITE PAPER▸ NetBackup 7.6 Plugin for VMware vCenter
TECHNICAL WHITE PAPER▸ NetBackup 7.6 Plugin for VMware vCenter
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization
 
VMTurbo Performance Study
VMTurbo Performance StudyVMTurbo Performance Study
VMTurbo Performance Study
 
VMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & Replication
VMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & ReplicationVMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & Replication
VMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & Replication
 
15 Vmware interview questions & answers 2018
15 Vmware interview questions & answers 201815 Vmware interview questions & answers 2018
15 Vmware interview questions & answers 2018
 
Practical Guide to Business Continuity & Disaster Recovery
Practical Guide to Business Continuity & Disaster RecoveryPractical Guide to Business Continuity & Disaster Recovery
Practical Guide to Business Continuity & Disaster Recovery
 
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...
 
Efficiently protect-virtual-machines
Efficiently protect-virtual-machinesEfficiently protect-virtual-machines
Efficiently protect-virtual-machines
 
Virtualization meisen 042811
Virtualization meisen 042811Virtualization meisen 042811
Virtualization meisen 042811
 
Veeam Availability top 10 reasons to choose veeam - long
Veeam Availability top 10 reasons to choose veeam - longVeeam Availability top 10 reasons to choose veeam - long
Veeam Availability top 10 reasons to choose veeam - long
 
VMbackup Agent for VMware
VMbackup Agent for VMwareVMbackup Agent for VMware
VMbackup Agent for VMware
 
Datacenter migration using vmware
Datacenter migration using vmwareDatacenter migration using vmware
Datacenter migration using vmware
 
70 533 study material
70 533 study material70 533 study material
70 533 study material
 
Symantec NetBackup 7.6 benchmark comparison: Data protection in a large-scale...
Symantec NetBackup 7.6 benchmark comparison: Data protection in a large-scale...Symantec NetBackup 7.6 benchmark comparison: Data protection in a large-scale...
Symantec NetBackup 7.6 benchmark comparison: Data protection in a large-scale...
 
NBU_benchmark_comparison_(part_2)_1214_v2
NBU_benchmark_comparison_(part_2)_1214_v2NBU_benchmark_comparison_(part_2)_1214_v2
NBU_benchmark_comparison_(part_2)_1214_v2
 
Backup workflow for SMHV on windows 2008R2 HYPER-V
Backup workflow for SMHV on windows 2008R2 HYPER-VBackup workflow for SMHV on windows 2008R2 HYPER-V
Backup workflow for SMHV on windows 2008R2 HYPER-V
 
Whitepaper Server Virtualisation And Storage Management
Whitepaper   Server Virtualisation And Storage ManagementWhitepaper   Server Virtualisation And Storage Management
Whitepaper Server Virtualisation And Storage Management
 
VMware vSphere 5 and IBM XIV Gen3 end-to-end virtualization
VMware vSphere 5 and  IBM XIV Gen3 end-to-end  virtualizationVMware vSphere 5 and  IBM XIV Gen3 end-to-end  virtualization
VMware vSphere 5 and IBM XIV Gen3 end-to-end virtualization
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software Testing
 

Plus de Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Plus de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Dernier

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Dernier (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

FEATRURE BRIEF▶ NetBackup 7.6 - Direct virtual machine creation from backup with BMR

  • 1. This document is provided for informational purposes only. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Copyright © 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. NetBackup 7.6 Feature Briefing Direct virtual machine creation from backup with BMR Version number: 1.0 Issue date: 5th November 2013 This document describes a feature introduced in NetBackup7.6 and available in this and higher releases. If you have any feedback or questions about this document please email them to IMG-TPM-Requests@symantec.com stating the document title. NETBACKUP7.6FEATUREBRIEFING DIRECTVIRTUALMACHINECREATIONFROM BACKUPWITHBMR
  • 2.
  • 3. Page 1 NetBackup 7.6 Feature Briefing - Direct virtual machine creation from backup with BMR Feature Description The last few years have seen a significant growth in the adoption of virtualized servers in data centers with many organizations converting to purely virtual environments. Even organizations that use physical servers in their production environments are starting to see the benefits of using virtualization in their disaster recovery and test and development environments. NetBackup’s Bare Metal Restore (BMR) feature has always provided an effective mechanism for migrating between physical and virtual environments by recovering backups of physical servers to virtual servers. In NetBackup 7.6 this “physical to virtual” recovery model has been greatly simplified allowing customers to achieve rapid physical to virtual migration and disaster recovery to virtual environments for Windows servers in both local and remote (disaster recovery) sites. Business Value The Bare Metal Restore “physical to virtual” recovery capability allows customers to recover backups of physical Windows servers to VMware virtual machines. Using VMware virtualization in a disaster recovery data center can significantly reduce both the capital and operational costs associated with maintaining a disaster recovery position by allowing a “lights out” facility to be rapidly spun up in the event of a site loss. Bare Metal Restore “physical to virtual” can be combined the NetBackup Auto Image Replication feature, allowing backup of physical servers to be replicated to a remote data center. VMware ESX servers at this disaster recovery facility can be left powered off until required and then powered up. Once the ESX servers are available the replicated backups of the physical servers at the product site can be quickly restored to virtual machines running on the ESX servers rather than needing to deploy physical servers. For disaster recovery testing purposes the virtual machines created during the recovery process can simply be deleted once the testing activities are complete. A similar approach can be used in test and development environments with backups from physical production servers being used to create virtual test servers.
  • 4. Page 2 NetBackup 7.6 Feature Briefing - Direct virtual machine creation from backup with BMR Underlying Principles The BMR physical to virtual recovery process uses the VMware proxy server to provide a “virtual instance converter” which creates a VMDK for the new virtual machine and restores the BMR backup of the physical machine to that VMDK. Figure 1 - physical to virtual conversion process Figure 1 above shows the key components used during the recovery process. An empty virtual machine container is created on the ESX server and presented to Virtual Instance Converter which formats the virtual machine’s disks and restores the backup from the physical machine to them. The virtual machine is then automatically started and made available to users. Guided Tour The conversion and recovery process can either be driven from the command line, using the nbrestorevm command, or from the Bare Metal Restore Management section of the master server administration interface. Using the command line allows the backup administrator to script and schedule “bulk” conversions of virtual machines or disaster recovery testing purpose.
  • 5. Page 3 NetBackup 7.6 Feature Briefing - Direct virtual machine creation from backup with BMR This “guided tour” provides examples from the administration interface “GUI driven” conversion method. Clients suitable for conversion to virtual machines are displayed under “VM Conversion Clients” (see Figure 2) and conversion can be initiated by right clicking on the required client and selecting the option “Convert to Virtual Machine”. Figure 2 – VM conversion clients One initiated the conversion wizard prompts for a number of inputs including the name of the NetBackup Recovery Host
  • 6. Page 4 NetBackup 7.6 Feature Briefing - Direct virtual machine creation from backup with BMR Figure 3 – Conversion Options Once this information has been enter the next screen prompts for restore options including whether any existing VM should be overwritten and whether the new VM should automatically power on after recovery (Figure 4) Figure 4 – Virtual Machine Options
  • 7. Page 5 NetBackup 7.6 Feature Briefing - Direct virtual machine creation from backup with BMR The next screen prompts for the datastore where the VMDK file will be created (Figure 5): Figure 5 - Storage locations Finally the network to be used is selected (Figure 6): Figure 6- Network connections
  • 8. Page 6 NetBackup 7.6 Feature Briefing - Direct virtual machine creation from backup with BMR Once all the required information has been enter a summary screen is provided with the ability to run a pre-conversion check (Figure 7). Figure 7 - Conversion settings summary The pre-conversion check validates the selected options and allows the conversion to be initiated (Figure 8). Figure 8 - Pre-conversion check output
  • 9. Page 7 NetBackup 7.6 Feature Briefing - Direct virtual machine creation from backup with BMR If the pre-conversion check is successful the conversion can be started by hitting “Convert to VM”, the progress of the conversion can be seen through the VM conversion tasks tab (Figure 9) and via the NetBackup activity monitor. Figure 9 – Conversion progress displayed through VM Conversion Tasks Licensing and support considerations No special licenses are required for the BMR Physical to Virtual recovery feature. However a full NetBackup VMware backup configuration is required for the recovery process. The server that acts as the Virtual Instance Converter must be a Windows server and must have access to a copy of the VMware tools ISO from the ESX server.
  • 10. About Symantec: Symantec is a global leader in providing security, storage, and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Headquartered in Mountain View, Calif., Symantec has operations in 40 countries. More information is available at www.symantec.com. For specific country offices and contact numbers, please visit our Web site: www.symantec.com Symantec Corporation World Headquarters 350 Ellis Street Mountain View, CA 94043 USA +1 (650) 527 8000 +1 (800) 721 3934 Copyright © 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.