Berdon Ledger Shows Net Gains in Productivity, Scalability Due to Symantec Security and Data Protection Solutions

Size: px
Start display at page:

Download "Berdon Ledger Shows Net Gains in Productivity, Scalability Due to Symantec Security and Data Protection Solutions"

Transcription

1 Berdon Ledger Shows Net Gains in Productivity, Scalability Due to Symantec Security and Data Protection Solutions With a huge volume of sensitive client information to protect, turned to Symantec to guard against a variety of threats. Symantec security products have provided completely effective protection against borne viruses even as the volume of threats has increased four-fold in two years. To ensure the integrity of its information, Berdon depends on data protection products and a PC imaging solution from Symantec as well. The firm has seen significant productivity improvements, including a 97 percent decrease in time to reimage corrupted PCs and an 85 percent decrease in backup time. Company Profile provides a broad array of accounting, tax, financial, and management advisory services to a range of individual and organizational clients. Industry Accounting Solution Data Protection Information Security Tax laws, client security drive needs for data protection With the U.S. Internal Revenue Service s tax code running to more than seven million words and 46,000 pages, an estimated 60 percent of individuals, businesses, and organizations filing a tax return now rely on professional service firms like to comply with the Treasury Department s dizzying array of rules and regulations. Founded in 1917, Berdon employs more than 350 professionals who provide accounting, tax, financial planning, and management advisory services to a broad range of clients from the firm s two locations in Manhattan and Jericho, New York. We believe the merger of Symantec and VERITAS will help us to reduce cost and complexity further by providing faster, easier, and integrated solutions for managing the company s data resources. With so much riding on the accuracy, timeliness, and integrity of every tax return, it is little wonder that Berdon takes extraordinary measures to safeguard the six terabytes of tax- and business-critical information it maintains for the firm s growing client base. To keep its clients trust while continuing to provide information integrity, Berdon must ensure that every one of its documents is secure, protected, and highly available. In addition, the company must guard against the never-ending onslaught of malicious code that arrives every day in the company s . Finally, Berdon must have a business continuity plan in place to ensure the company s ability to recover its data no matter what kind of disaster might occur. This responsibility means that job number one for Berdon s IT organization is to protect and secure its information around the clock. That job has been getting harder, due in part to the astronomical increase in the number of malicious threats in recent years. Five years ago, there were far fewer virus attacks than there are today, relates, network manager for Berdon. These days, we have to constantly monitor and upgrade our security infrastructure to keep pace.

2 A comprehensive information security and data protection solution based on Symantec and VERITAS software provides Berdon with substantial operational efficiencies, with results that include an 85 percent faster backup window and 97 percent faster PC reimaging. Every day Symantec Mail Security for Microsoft Exchange software blocks an average of 80 infected attachments... from reaching Berdon s Microsoft Windows 2003-based PC environment with 100 percent accuracy. Symantec delivers end-to-end antivirus protection Berdon s approach to information security is multilayered, relying on a combination of Symantec software products. Symantec AntiVirus Corporate Edition software defends the company s 350 desktop and laptop PCs, while Symantec Mail Security for Microsoft Exchange software protects the server against malicious agents carried by incoming . Berdon installed Symantec AntiVirus Corporate Edition and Symantec Mail Security for Microsoft Exchange software in 2001 to replace McAfee products, which had a history of generating conflicts with other applications and running too slowly for Berdon s fast-paced environment. As a financial institution, we rely on Symantec to prevent disruptions to our business caused by malicious code. Every day Symantec Mail Security for Microsoft Exchange software blocks an average of 80 infected attachments, an 800 percent increase from an average of 8 each day in 2003, from reaching Berdon s Microsoft Windows based PC environment with 100 percent accuracy, explains David Pikelny, network manager for Berdon. The Symantec products work well, and we re very pleased with their overall performance. With hundreds of new viruses coming out every week, Berdon appreciates Symantec s LiveUpdate technology, an integral part of Symantec s antivirus products. LiveUpdate delivers automatic antivirus updates to the company s PC and server environments for improved security, while reducing the administrative overhead of constant reminders to users to download new virus definitions. As a network manager, it s difficult for me to understand why anyone would not choose an antivirus product with an automatic update feature to protect the IT environment, relates Pikelny. With Symantec, we ve never had a virus penetrate our defenses, which makes my job much easier. It s reassuring to know that Symantec is protecting our network 24x7. Moving up from VERITAS Backup Exec to VERITAS NetBackup Building a resilient infrastructure requires paying attention to both information security and information integrity. Both VERITAS and Symantec products have played key roles in Berdon s information integrity strategy. The firm s experience with VERITAS products goes back to 2003, when it deployed VERITAS Backup Exec software to protect its business-critical data. VERITAS Backup Exec has provided us with reliable service over the years, recalls Pikelny. I rarely spent any time thinking about it. Berdon recently determined that it was time to upgrade its software data protection infrastructure. A couple factors drove this decision. To begin, the firm s volume of data was skyrocketing because of the increase in the number of computer-based applications and the growing acceptance of electronic document transfers, with a 25 percent annual increase in data volume over the last three years. And Berdon expects this dramatic growth curve to continue at an even greater rate over the next several years. Also, in order to realize productivity gains through streamlining the movement of documents while reducing the risk of accidental disclosure of sensitive client information through improper disposal of office trash, the firm planned to digitize all of its paper-based information as part of a paperless office initiative. In April, 2005, Pikelny and his team decided to migrate from VERITAS Backup Exec to VERITAS NetBackup Enterprise Server software, purchasing two licenses from Dell Inc., a

3 BERDON LLP Symantec partner. The decision was based on Berdon s successful experience with VERITAS Backup Exec software as well as its need for an enterprise-class backup-and-restore solution that could support the company s exponential growth in data. Berdon also appreciated the multiplexing backup feature in NetBackup software that promised to shorten the firm s backup window. Berdon also deployed VERITAS NetBackup Advanced Open File Option, to protect against open files getting left out of the backup job. To ensure that all critical data is effectively protected, Berdon relies on two additional software agents: VERITAS NetBackup Agent for SQL Server and VERITAS NetBackup Agent for Exchange Server. The decision to migrate to NetBackup software is already paying dividends for Berdon. The firm has accommodated rapid data growth, which is expected to increase from 2.5 terabytes today to more than three terabytes by the end of 2006, without having to increase backup administration staff. At the same time, backups are running 85 percent faster, taking only 4 hours now compared to the previous 26 hours. Enhancing business continuity solution with VERITAS Replication Exec With VERITAS NetBackup software handling day-to-day data protection, Pikelny turned his attention in late April, 2005 to improving the firm s business continuity strategy. Each of Berdon s two offices in Manhattan and Jericho has an ADIC Scalar i2000 tape backup system. Since each site was performing daily backup increments, the archive copy could be as old as 24 hours, putting a substantial amount of data at risk. Also, tape-based recovery can take hours, delaying recovery in the event of a disaster. Replication offered a viable solution, since the Manhattan and Jericho offices are connected via a T-1 telco line. Berdon decided to upgrade its data protection capabilities by implementing VERITAS Replication Exec software to provide the Our people learn technical aspects from VERITAS Education that we would never learn on our own. The solution is not complete without the training package. capability to replicate business-critical data continuously between the two locations. In particular, Berdon selected VERITAS Replication Exec software because it minimizes traffic on the T-1 line by limiting incremental backups to changed data blocks, not entire files. With our data replication volume spiking nearly all the time, we appreciate the reduced impact on T-1 bandwidth that VERITAS Replication Exec software provides, Pikelny says. Using VERITAS Replication Exec software has reduced Berdon s recovery point objective (RPO) from 24 hours to just the network latency, usually a few seconds, ensuring virtually no lost data in the event of a failure. Rebuilding PC images with Symantec Ghost Solution Suite software When one of Berdon s PCs is corrupted, the IT staff can easily retrieve the data from the most recent backup. But there s more to the task of restoring the user s PC, since the operating system, applications, and configuration must be reloaded as well. Setting up a new PC or rebuilding a corrupted PC from scratch can take up to a day to load the operating system and to install the necessary applications from backup tape, remembers Pikelny. Also, we want users to have a standard, companyapproved desktop environment, and it was difficult for us to police each PC, since different users required different sets of applications. SOLUTION AT A GLANCE Business Drivers Prevent disruptions to business caused by malicious code Reduce IT staff time devoted to virus protection and PC management Minimize risk of catastrophic data loss Lower IT support costs for configuring new PCs Technology Challenges Implement highly automated PC imaging and deployment support Screen all incoming to block viruses Assure integrity of and high availability for business-critical data Deploy high-performance backup-andrestore solution Solution Combined information integrity solution based on Symantec antivirus, Symantec PC imaging, and VERITAS data protection products and services. Symantec Products Symantec AntiVirus Corporate Edition Symantec Mail Security for Microsoft Exchange Symantec Ghost Solution Suite Symantec LiveUpdate VERITAS NetBackup Enterprise Server with Advanced Open File Option, Microsoft SQL Server Agent, and Exchange Server Agent VERITAS Replication Exec Technology Environment Server Platform: 60 Dell PowerEdge 2650 servers running Microsoft Windows Server 2003 Storage Infrastructure: 6 Dell PowerVault hard drive arrays; 3 Dell PowerVault 775N NAS servers; ADIC Scalar i2000 tape drive PC: 230 Dell Latitude laptops and 120 Dell OptiPlex desktops running Microsoft Windows XP Software: Microsoft Exchange; Microsoft Office; Microsoft Outlook Symantec Services Symantec Gold Maintenance VERITAS Technical Support (Extended Support) Symantec Education Symantec Partners Dell Inc.

4 More importantly, we wanted our skilled IT personnel to focus on the company s strategic initiatives rather than on restoring PCs. After evaluating carefully the full range of competitive products, Berdon selected Symantec Ghost Solution Suite software in It solves the problem by maintaining a set of predefined PC images that can be easily downloaded to configure a new PC or rebuild a corrupted one. Symantec Ghost Solution Suite software has reduced the time it takes to rebuild the operating environment from eight hours to 15 minutes, a 97 percent improvement in administrative efficiency. Total support and training solution For after-market support, Berdon uses its VERITAS Extended Support agreement for addressing the company s ongoing technical support requirements, as well as a Gold Maintenance subscription from Symantec to support its security applications. In addition, Berdon s IT team is eagerly anticipating a merged product, services, and licensing roadmap once the merger is completed. The good news is that these products just keep on working, so we haven t needed much help from their support team, reports Pikelny. In order to help ensure optimal management of the next-generation NetBackup software environment, Pikelny is sending a member of his staff to a five-day training course from Symantec Education on NetBackup for Microsoft Windows. The training from Symantec Education really completes the NetBackup software deployment, notes Pikelny. Our people learn technical aspects from Symantec Education that we would never learn on our own. The solution is not complete without the training package. Integrated solution for information integrity In the merger of Symantec and VERITAS, Berdon sees a technology provider that will offer product solutions focused on helping the company deliver the comprehensive information integrity its clients expect. For Berdon, the relationship between information security and information integrity goes hand in hand, explains Pikelny. We must ensure that our client data is secure to prevent accidental disclosure, while at the same time making sure that our accounting professionals can easily access the information they need to provide timely, accurate advice to our clients. Information and Data Protection Architecture Symantec LiveUpdate provides automatic antivirus updates to PCs and laptops as well as enterprise servers. Jericho Data Center (Primary site) VERITAS NetBackup backs up and restores data across server and storage environments. 60 Dell PowerEdge 2650 servers running Microsoft Windows Server 6 Dell PowerVault RAID arrays 3 Dell PowerVault 775N NAS Servers Symantec AntiVirus Corporate Edition replaced McAfee antivirus software and protects employee PCs and laptops as well as enterprise servers. 350 employee PCs/laptops Symantec Ghost Solution Suite provisions new PCs and laptops and reimages corrupted PCs and laptops. Symantec Mail Security for Microsoft Exchange protects against malicious agents carried by incoming . Microsoft Exchange Server Manhattan Data Center (Secondary site) ADIC Scalar i2000 tape drive for offline storage ADIC Scalar i2000 tape drive for offline storage T-1 line VERITAS Replication Exec provides continuous backup between the Jericho and Manhattan data center sites.

5 BERDON LLP BUSINESS VALUE AND TECHNICAL BENEFITS Productivity 97% improvement in time to restore corrupted PC desktop environment 85% decrease in backup times via migration to NetBackup software, from 26 hours to 4 hours Security Protection 100% accuracy in blocking daily average of 80 incoming viruses and malicious codes Disaster Recovery Recovery Point Objective reduced from 24 hours to a few seconds As a network manager, it s difficult for me to understand why anyone would not choose an antivirus product with an automatic update feature to protect the IT environment. Scalability 25% annual growth in data volume accommodated with no increase in staff 800% increase in incoming viruses and malicious codes, from 8 per day in 2003 to 80 today Already realizing various cost savings and avoidance as well as productivity improvements using its current Symantec and VERITAS solutions, Berdon anticipates higher efficiencies resulting from the proposed partnership. Reduced cost and complexity is an objective that is always front and center for us, Pikelny explains. We believe the merger of Symantec and VERITAS will help us to reduce cost and complexity further by providing faster, easier, and integrated solutions for managing the company s data resources. Berdon has also come to rely on Symantec and VERITAS to help sustain the company s mission. One of the most fundamental value propositions for Berdon is that we provide both end-to-end information security as well as data protection for our clients business-critical information resources. That s why we are so pleased with the comprehensive solutions we receive from Symantec and VERITAS, concludes Pikelny. Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, LiveUpdate, Symantec AntiVirus, Symantec Mail Security for Microsoft Exchange, Symantec Ghost, NetBackup, Replication Exec, and VERITAS are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Symantec Small Business Solutions

Symantec Small Business Solutions Symantec Small Business Solutions Protect All the Information That Drives Your Business Protect computers and information together with Symantec for a confident future. Full spectrum business protection

More information

Reducing Security Administration Time by 60 percent for More Efficient City Government with Symantec and Novacoast

Reducing Security Administration Time by 60 percent for More Efficient City Government with Symantec and Novacoast City of Aurora Reducing Security Administration Time by 60 percent for More Efficient City Government with Symantec and Novacoast Fending off viruses and other malware was straining IT resources at the

More information

Farmers & Merchants Bank

Farmers & Merchants Bank CUSTOMER SUCCESS Ensuring Safe, Secure, and Highly Available Customer Information with Symantec Information Integrity Solution With a wealth of customer information that must be kept both secure and available,

More information

Protecting Critical Human Services with the Symantec. security and availability solution.

Protecting Critical Human Services with the Symantec.  security and availability solution. Protecting Critical Human Services with the Symantec Email Security and Availability Solution Slowed by network downtime due to security incidents, turned to Symantec for a comprehensive email security

More information

Cutting Backup and Recovery Time in Half with Solutions from Symantec

Cutting Backup and Recovery Time in Half with Solutions from Symantec Customer Success Cutting Backup and Recovery Time in Half with Solutions from Symantec supplies about 5 billion packs of cigarettes to Chinese smokers every year. In 2006 and 2007, the company sought to

More information

Advance Info Service Public Company Limited

Advance Info Service Public Company Limited Advance Info Service Public Company Limited Leading Thailand s Mobile Services with Application Performance, Datacenter Availability, and Data Protection Gains from Symantec To manage fast growth, Thai

More information

Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments

Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

The Copley Press, Inc.

The Copley Press, Inc. CUSTOMER SUCCESS The Streamlining Operations with Symantec Solutions Enhances Availability, Data Protection and More, with Lower TCO In the fast-changing newspaper industry, needed to enhance availability

More information

The Microsoft Large Mailbox Vision

The Microsoft Large Mailbox Vision WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more email has many advantages. Large mailboxes

More information

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

CA ARCserve Backup. Benefits. Overview. The CA Advantage

CA ARCserve Backup. Benefits. Overview. The CA Advantage PRODUCT BRIEF: CA ARCSERVE BACKUP R12.5 CA ARCserve Backup CA ARCSERVE BACKUP, A HIGH-PERFORMANCE, INDUSTRY-LEADING DATA PROTECTION PRODUCT, UNITES INNOVATIVE DATA DEDUPLICATION TECHNOLOGY, POWERFUL STORAGE

More information

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention Symantec Enterprise Vault TransVault CommonDesk ARCviewer Vault LLC Optimize the management of information by defining a lifecycle strategy for data Backup is for recovery, archiving is for discovery.

More information

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling

More information

Understanding Virtual System Data Protection

Understanding Virtual System Data Protection Understanding Virtual System Data Protection Server virtualization is the most important new technology introduced in the data center in the past decade. It has changed the way we think about computing

More information

Total Cost of Ownership: Benefits of the OpenText Cloud

Total Cost of Ownership: Benefits of the OpenText Cloud Total Cost of Ownership: Benefits of the OpenText Cloud OpenText Managed Services in the Cloud delivers on the promise of a digital-first world for businesses of all sizes. This paper examines how organizations

More information

Transforming your IT infrastructure Journey to the Cloud Mike Sladin

Transforming your IT infrastructure Journey to the Cloud Mike Sladin Transforming your IT infrastructure Journey to the Cloud Mike Sladin Director, Global Strategic Partners, APJ Symantec Corporation IT Infrastructure Transformation Journey Business Agility IT as a Service

More information

INTRODUCING VERITAS BACKUP EXEC SUITE

INTRODUCING VERITAS BACKUP EXEC SUITE INTRODUCING VERITAS BACKUP EXEC SUITE January 6, 2005 VERITAS ARCHITECT NETWORK TABLE OF CONTENTS Managing More Storage with Fewer Resources...3 VERITAS Backup Exec Suite...3 Continuous Data Protection...

More information

Symantec Document Retention and Discovery

Symantec Document Retention and Discovery IT POLICY COMPLIANCE Symantec Document Retention and Discovery A state-of-the-art solution that simplifies the discovery of email and other files, enhances litigation readiness, and helps ensure compliance

More information

Data Retrieval Firm Boosts Productivity while Protecting Customer Data

Data Retrieval Firm Boosts Productivity while Protecting Customer Data Data Retrieval Firm Boosts Productivity while Protecting Customer Data With HEIT Consulting, DriveSavers deployed a Cisco Self-Defending Network to better protect network assets, employee endpoints, and

More information

Symantec Business Continuity Solutions for Operational Risk Management

Symantec Business Continuity Solutions for Operational Risk Management Symantec Business Continuity Solutions for Operational Risk Management Manage key elements of operational risk across your enterprise to keep critical processes running and your business moving forward.

More information

DEDUPLICATION BASICS

DEDUPLICATION BASICS DEDUPLICATION BASICS 4 DEDUPE BASICS 6 WHAT IS DEDUPLICATION 8 METHODS OF DEDUPLICATION 10 DEDUPLICATION EXAMPLE 12 HOW DO DISASTER RECOVERY & ARCHIVING FIT IN? 14 DEDUPLICATION FOR EVERY BUDGET QUANTUM

More information

Dell DR4000 Replication Overview

Dell DR4000 Replication Overview Dell DR4000 Replication Overview Contents Introduction... 1 Challenges with Data Disaster Recovery... 1 The Dell DR4000 Solution A Replication Overview... 2 Advantages of using DR4000 replication for disaster

More information

Clyde Companies, Inc.

Clyde Companies, Inc. Paving the Way to High Availability and Cost Savings with Symantec LiveState Recovery Symantec Backup Exec 10 offers the consistent, reliable backups and restores and centralized administration that we

More information

Simplify Backups. Dell PowerVault DL2000 Family

Simplify Backups. Dell PowerVault DL2000 Family Simplify Backups Dell PowerVault DL2000 Family SIMPLIFYING I T The Dell PowerVault DL2000 family helps reduce the cost and complexity of backups and restores, freeing up valuable resources that you can

More information

Symantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS MEDIA SERVER OPTIONS KEY BENEFITS AGENT AND OPTION GROUPS DATASHEET

Symantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS MEDIA SERVER OPTIONS KEY BENEFITS AGENT AND OPTION GROUPS DATASHEET DATASHEET Symantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS Designed for disk, Symantec Backup Exec TM 10d for Windows Servers is the Gold Standard in Windows data protection. It provides comprehensive,

More information

Veritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW

Veritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW Veritas Backup Exec Powerful, flexible and reliable data protection designed for cloud-ready organizations. OVERVIEW Veritas Backup Exec is the backup solution without barriers, delivered your way. You

More information

Holland & Knight Makes the Case with Information Security, Availability, and Data Protection Solutions from Symantec

Holland & Knight Makes the Case with Information Security, Availability, and Data Protection Solutions from Symantec Holland & Knight Makes the Case with Information Security, Availability, and Data Protection Solutions from Symantec A growing international law firm, Holland & Knight depends on information. The firm

More information

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud Total Cost of Ownership: Benefits of ECM in the OpenText Cloud OpenText Managed Services brings together the power of an enterprise cloud platform with the technical skills and business experience required

More information

Transitioning business resiliency to the cloud

Transitioning business resiliency to the cloud IBM Global Technology Services White Paper IBM Business Continuity and Resiliency Services Transitioning business resiliency to the cloud Cloud technologies and services help improve availability and recovery

More information

Build a viable plan for disaster recovery and crisis management.

Build a viable plan for disaster recovery and crisis management. Disaster recovery and crisis management solutions To support your IT objectives Build a viable plan for disaster recovery and crisis management. Highlights Build a plan to help respond to and recover from

More information

Choosing the Right Solution for Strategic Deployment of Encryption

Choosing the Right Solution for Strategic Deployment of  Encryption Choosing the Right Solution for Strategic Deployment of Email Encryption White Paper: Enterprise Email Encryption Email Protection Buyer s Guide Choosing the Right Solution for Strategic Deployment of

More information

Standardizing on Veritas Data Center Management Software from Symantec to Hit Service Levels and Cost Targets

Standardizing on Veritas Data Center Management Software from Symantec to Hit Service Levels and Cost Targets Standardizing on Veritas Data Center Management Software from Symantec to Hit Service Levels and Cost Targets It s challenging to manage one data center manages over 100. It also optimizes these data centers

More information

Symantec Backup Exec 2012

Symantec Backup Exec 2012 Siedziba spółki: Perceptus sp. z o. o. Ul. Drzewna 30/2A 65-140 Zielona Góra Biuro handlowe ul. Chopina 14A 65-031 Zielona Góra Tel. 68 470 07 70 Fax 68 470 07 79 Email: perceptus@perceptus.pl NIP 929-180-85-78

More information

Continuous data protection. PowerVault DL Backup to Disk Appliance

Continuous data protection. PowerVault DL Backup to Disk Appliance Continuous data protection PowerVault DL Backup to Disk Appliance Current Situation The PowerVault DL Backup-to-Disk Appliance Powered by Symantec Backup Exec offers the industry s only fully integrated

More information

Protect enterprise data, achieve long-term data retention

Protect enterprise data, achieve long-term data retention Technical white paper Protect enterprise data, achieve long-term data retention HP StoreOnce Catalyst and Symantec NetBackup OpenStorage Table of contents Introduction 2 Technology overview 3 HP StoreOnce

More information

Managed IT Services Eliminating technology pains for SMBs

Managed IT Services Eliminating technology pains for SMBs Managed IT Services Eliminating technology pains for SMBs Business growth is often slowed by a lack of proper IT infrastructure. But, having a complete IT department is not a viable solution for most SMBs.

More information

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments. WHITE PAPER Data safety for digital business. One solution for hybrid, physical, and virtual environments. It s common knowledge that the cloud plays a critical role in helping organizations accomplish

More information

Protecting Microsoft SharePoint

Protecting Microsoft SharePoint TECHNICAL WHITE PAPER: BACKUP EXEC TM 2014 PROTECTING MICROSOFT SHAREPOINT Backup Exec TM 2014 Technical White Paper Protecting Microsoft SharePoint Technical White Papers are designed to introduce Symantec

More information

Evolved Backup and Recovery for the Enterprise

Evolved Backup and Recovery for the Enterprise Evolved Backup and Recovery for the Enterprise with Asigra technology Working gives me confidence in my data protection plan. I know that if I ever need to restore, it will take a few minutes rather than

More information

Assessing Disaster Recovery with the Help of Symantec Consulting Services Speeds Time to Deployment by 33 Percent

Assessing Disaster Recovery with the Help of Symantec Consulting Services Speeds Time to Deployment by 33 Percent Assessing Disaster Recovery with the Help of Symantec Consulting Services Speeds Time to Deployment by 33 Percent Data protection and availability are at the priority forefront for, a life sciences company

More information

The Future of Business Continuity & Resiliency

The Future of Business Continuity & Resiliency The Future of Business Continuity & Resiliency Richard Cocchiara: IBM Distinguished Engineer; CTO IBM Business Continuity & Resiliency Services (BCRS); Managing Partner IBM Resiliency Consulting Services

More information

Integrated Switching: Cisco Blade Switch Modules for HP BladeSystem Enclosures. Reduce data center complexity

Integrated Switching: Cisco Blade Switch Modules for HP BladeSystem Enclosures. Reduce data center complexity Integrated Switching: Cisco Blade Switch Modules for HP BladeSystem Enclosures Reduce data center complexity Increase agility and decrease TCO with integrated switching As a company s data center expands,

More information

Kroll Ontrack VMware Forum. Survey and Report

Kroll Ontrack VMware Forum. Survey and Report Kroll Ontrack VMware Forum Survey and Report Contents I. Defining Cloud and Adoption 4 II. Risks 6 III. Challenging Recoveries with Loss 7 IV. Questions to Ask Prior to Engaging in Cloud storage Solutions

More information

What can the OnBase Cloud do for you? lbmctech.com

What can the OnBase Cloud do for you? lbmctech.com What can the OnBase Cloud do for you? lbmctech.com The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, long tracks of outstanding

More information

Technical Brief Veritas Technical Education Services

Technical Brief Veritas Technical Education Services Veritas Desktop and Laptop Option 9.3.1 Veritas Desktop and Laptop Option is a user centric backup solution that provides flexible implementation and centralized administration for backup and recovery

More information

Industry-leading solutions for transforming data centers into drivers of business value and innovation. Symantec in the Data Center

Industry-leading solutions for transforming data centers into drivers of business value and innovation. Symantec in the Data Center Industry-leading solutions for transforming data centers into drivers of business value and innovation Symantec in the Data Center 1 In today s wired world, all companies depend on enterprise applications

More information

Backup Exec Subscription Licensing Guide

Backup Exec Subscription Licensing Guide Backup Exec Subscription Licensing Guide Last Update: 27 September 2017 CONTENTS Product Overview... 3 Backup Exec Subscription Licensing... 4 Packaging and Licensing Overview....5 Packaging and Licensing

More information

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored the onbase cloud ONBASE CLOUD // Experience Matters The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, an established history of

More information

Advantage Sales & Marketing LLC

Advantage Sales & Marketing LLC Making Email More Available and Secure, Saving Millions of Dollars After the acquisition of 30 companies, Advantage Sales and Marketing (ASM), one of the fastest growing sales and marketing agencies today,

More information

Networking for a smarter data center: Getting it right

Networking for a smarter data center: Getting it right IBM Global Technology Services October 2011 Networking for a smarter data center: Getting it right Planning the network needed for a dynamic infrastructure 2 Networking for a smarter data center: Getting

More information

WHITE PAPER: ENTERPRISE SOLUTIONS. Disk-Based Data Protection Achieving Faster Backups and Restores and Reducing Backup Windows

WHITE PAPER: ENTERPRISE SOLUTIONS. Disk-Based Data Protection Achieving Faster Backups and Restores and Reducing Backup Windows WHITE PAPER: ENTERPRISE SOLUTIONS Disk-Based Data Protection Achieving Faster Backups and Restores and Reducing Backup Windows White Paper: Enterprise Security Disk-Based Data Protection Achieving Faster

More information

Data Protection for Cisco HyperFlex with Veeam Availability Suite. Solution Overview Cisco Public

Data Protection for Cisco HyperFlex with Veeam Availability Suite. Solution Overview Cisco Public Data Protection for Cisco HyperFlex with Veeam Availability Suite 1 2017 2017 Cisco Cisco and/or and/or its affiliates. its affiliates. All rights All rights reserved. reserved. Highlights Is Cisco compatible

More information

Symantec Client Security. Integrated protection for network and remote clients.

Symantec Client Security. Integrated protection for network and remote clients. Symantec Client Security Integrated protection for network and remote clients. Complex Internet threats require comprehensive security. Today's complex threats require comprehensive security solutions

More information

White paper: Agentless Backup is Not a Myth. Agentless Backup is Not a Myth

White paper: Agentless Backup is Not a Myth. Agentless Backup is Not a Myth White paper: less Backup is Not a Myth less Backup is Not a Myth White paper: less Backup is Not a Myth Executive Summary Backup and recovery software typically requires agents that are installed onto

More information

Networking for a dynamic infrastructure: getting it right.

Networking for a dynamic infrastructure: getting it right. IBM Global Technology Services Networking for a dynamic infrastructure: getting it right. A guide for realizing the full potential of virtualization June 2009 Executive summary June 2009 Networking for

More information

TOP REASONS TO CHOOSE DELL EMC OVER VEEAM

TOP REASONS TO CHOOSE DELL EMC OVER VEEAM HANDOUT TOP REASONS TO CHOOSE DELL EMC OVER VEEAM 10 This handout overviews the top ten reasons why customers choose Data Protection from Dell EMC over Veeam. Dell EMC has the most comprehensive data protection

More information

IBM Resiliency Services:

IBM Resiliency Services: IBM Resiliency Services: Always there, in an always-on world How did we get here? Two IT professionals are experiencing frequent business interruptions that are beyond what a traditional disaster recovery

More information

Reaping the Benefits of Managed Services

Reaping the Benefits of Managed Services Figure 1. Converged Network with Managed Services These services complement each other when bundled together. For example, an IP VPN service makes managing an IP voice network simpler and more effective

More information

Designing Data Protection Strategies for Oracle Databases

Designing Data Protection Strategies for Oracle Databases WHITE PAPER Designing Data Protection Strategies for Oracle Databases VERITAS Backup Exec 9.1 for Windows Servers Agent for Oracle 11/20/2003 1 TABLE OF CONTENTS Introduction...3 Oracle Backup Basics...3

More information

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The

More information

AtoS IT Solutions and Services. Microsoft Solutions Summit 2012

AtoS IT Solutions and Services. Microsoft Solutions Summit 2012 Microsoft Solutions Summit 2012 1 Building Private Cloud with Microsoft Solution 2 Building Private Cloud with Microsoft Solution Atos integration Establish a new strategic IT partnership From July 2011

More information

BUSINESS CONTINUITY: THE PROFIT SCENARIO

BUSINESS CONTINUITY: THE PROFIT SCENARIO WHITE PAPER BUSINESS CONTINUITY: THE PROFIT SCENARIO THE BENEFITS OF A COMPREHENSIVE BUSINESS CONTINUITY STRATEGY FOR INCREASED OPPORTUNITY Organizational data is the DNA of a business it makes your operation

More information

Backup-as-a-Service Powered by Veritas

Backup-as-a-Service Powered by Veritas Backup-as-a-Service Powered by Veritas FOCUS MORE ON YOUR BUSINESS, LESS ON YOUR INFRASTRUCTURE Table of Contents Better data protection from the ground up... 3 Significant challenges in the modern enterprise...

More information

Amanda Enterprise Whitepaper Cost-effective Data Protection for Microsoft Windows Environments

Amanda Enterprise Whitepaper Cost-effective Data Protection for Microsoft Windows Environments Amanda Enterprise Whitepaper Cost-effective Data Protection for Microsoft Windows Environments 465 S. Mathilda Ave., Suite 300 Sunnyvale, CA 94086 t: (888) 496-2632 zsales@zmanda.com www.zmanda.com Abstract

More information

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats

More information

Symantec Protection Suite Add-On for Hosted Security

Symantec Protection Suite Add-On for Hosted  Security Symantec Protection Suite Add-On for Hosted Email Security Overview Malware and spam pose enormous risk to the health and viability of IT networks. Cyber criminal attacks are focused on stealing money

More information

Backup and Restore Strategies

Backup and Restore Strategies Backup and Restore Strategies WHITE PAPER How to identify the appropriate life insurance for your data At home, you safeguard against any incident to protect your family, your life, your property everything

More information

Microsoft 365 Business FAQs

Microsoft 365 Business FAQs Microsoft 365 Business FAQs Last updated April 27 th, 2018 Table of Contents General... 3 What is Microsoft 365 Business?... 3 Who should consider adopting Microsoft 365 Business?... 3 How can I get Microsoft

More information

Disaster Recovery Is A Business Strategy

Disaster Recovery Is A Business Strategy Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...

More information

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Global Headquarters: 5 Speen Street Framingham, MA USA P F B U Y E R C A S E S T U D Y V M w a r e I m p r o v e s N e t w o r k U t i l i z a t i o n a n d B a c k u p P e r f o r m a n c e U s i n g A v a m a r ' s C l i e n t - S i d e D e d u p l i c a t i

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information The pressure on organizations to protect and manage data has intensified with the recent growth in unstructured data and the reliance on email

More information

Countering ransomware with HPE data protection solutions

Countering ransomware with HPE data protection solutions Countering ransomware with HPE data protection solutions What is ransomware? Definition Malware that prevents or limits users from accessing their system by: Locking the system s screen Encrypting files

More information

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

Symantec Reference Architecture for Business Critical Virtualization

Symantec Reference Architecture for Business Critical Virtualization Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization

More information

arcserve r16.5 Hybrid data protection

arcserve r16.5 Hybrid data protection arcserve r16.5 Hybrid data protection Whether you re protecting the data center, remote offices or desktop resources, you need a solution that helps you meet today s demanding service-level agreements

More information

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

The case for cloud-based data backup

The case for cloud-based data backup IBM Global Technology Services IBM SmartCloud IBM Managed Backupi The case for cloud-based data backup IBM SmartCloud Managed Backup offers significant improvement over traditional data backup methods

More information

Slashing Downtime from 24 Hours to 24 Minutes:

Slashing Downtime from 24 Hours to 24 Minutes: Slashing Downtime from 24 Hours to 24 Minutes: Technology Advancements Make Warm-Site Disaster Recovery Possible Don Beyer Director, Technical Services Oakwood Healthcare Louie Caschera Chief Information

More information

OL Connect Backup licenses

OL Connect Backup licenses OL Connect Backup licenses Contents 2 Introduction 3 What you need to know about application downtime 5 What are my options? 5 Reinstall, reactivate, and rebuild 5 Create a Virtual Machine 5 Run two servers

More information

Intelligent, Collaborative Endpoint Security

Intelligent, Collaborative Endpoint Security Intelligent, Collaborative Endpoint Security Improves Detection and Protection and Slashes User Impact US Insurance Company Customer Profile A leading American insurer Industry Financial IT Environment

More information

Achieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX

Achieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX Achieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX Introduction Planning for recovery is a requirement in businesses of all sizes. In implementing an operational

More information

The Business Case to deploy NetBackup Appliances and Deduplication

The Business Case to deploy NetBackup Appliances and Deduplication The Business Case to deploy NetBackup Appliances and Deduplication Noel Winter Appliance Product Lead EMEA Alex Lowe Regional Product Manager EMEA 1 Industry Leading Appliances Powered by Intel Intel Xeon

More information

Why Converged Infrastructure?

Why Converged Infrastructure? Why Converged Infrastructure? Three reasons to consider converged infrastructure for your organization Converged infrastructure isn t just a passing trend. It s here to stay. According to a recent survey

More information

Designing Data Protection Strategies for Oracle Databases

Designing Data Protection Strategies for Oracle Databases WHITE PAPER Designing Data Protection Strategies for Oracle Databases VERITAS Backup Exec 9.0 for Windows Servers Agent for Oracle VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Introduction...3

More information

CA Security Management

CA Security Management CA Security CA Security CA Security In today s business environment, security remains one of the most pressing IT concerns. Most organizations are struggling to protect an increasing amount of disparate

More information

THE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD

THE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD OVERVIEW Accenture is in the process of transforming itself into a digital-first enterprise. Today, Accenture is 80 percent in a public cloud. As the journey continues, Accenture shares its key learnings

More information

Technical Brief Veritas Technical Education Services

Technical Brief Veritas Technical Education Services Veritas Desktop and Laptop Option 9.2 The Desktop and Laptop Option is a network share-based protection and synchronization solution for Windows and Mac that enhances your current IT desktop and laptop

More information

Balancing RTO, RPO, and budget. Table of Contents. White Paper Seven steps to disaster recovery nirvana for wholesale distributors

Balancing RTO, RPO, and budget. Table of Contents. White Paper Seven steps to disaster recovery nirvana for wholesale distributors White Paper Seven steps to disaster recovery nirvana for wholesale distributors Balancing RTO, RPO, and budget In our last white paper, Thinking through the unthinkable: Disaster recovery for wholesale

More information

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery White Paper Business Continuity Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery Table of Contents Executive Summary... 1 Key Facts About

More information

IBM and Sirius help food service distributor Nicholas and Company deliver a world-class data center

IBM and Sirius help food service distributor Nicholas and Company deliver a world-class data center IBM Case Study IBM and Sirius help food service distributor Nicholas and Company deliver a world-class data center Overview Approaching its eighth decade as an independent food service distribution company,

More information

Best Practices in Securing a Multicloud World

Best Practices in Securing a Multicloud World Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers

More information

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief 5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren

More information

Introduction. Read on and learn some facts about backup and recovery that could protect your small business.

Introduction. Read on and learn some facts about backup and recovery that could protect your small business. Introduction No business can afford to lose vital company information. Small-business owners in particular must take steps to ensure that client and vendor files, company financial data and employee records

More information

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being

More information

Symantec Data Center Transformation

Symantec Data Center Transformation Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments

More information

Why Continuity Matters

Why  Continuity Matters Why Email Continuity Matters Contents What is Email Continuity and Why it Matters........................... 1 Challenges to Email Continuity................................... 2 Increasing Email Management

More information

Hitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage

Hitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage O V E R V I E W Hitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage Modular Hitachi Storage Delivers Enterprise-level Benefits Hitachi Adaptable Modular Storage and Hitachi Workgroup

More information

Core Services for ediscovery Perfection

Core Services for ediscovery Perfection BEST-IN-CLASS DATA ENVIRONMENTS. Core Services for ediscovery Perfection MANAGE MANAGE IMPLEMENT IMPLEMENT ASSESS Core Services for ediscovery Perfection George Jon is an ediscovery infrastructure specialist

More information

Catalogic DPX: Backup Done Right

Catalogic DPX: Backup Done Right Catalogic DPX: Backup Done Right The Backup Alternative You ve Been Waiting For Catalogic DPX Highlights Fast and reliable low-impact backup for physical and virtual environments Direct access to data

More information