Requirements for virtualizing Exchange Server 2010

Size: px
Start display at page:

Download "Requirements for virtualizing Exchange Server 2010"

Transcription

1 Requirements for

2 Exchange : Hardware Microsoft Exchange Server is one of the most mission-critical IT services for many enterprises. Yet while isn t difficult, it must be done properly to ensure success. This e-guide, from SearchServerVirtualization.com, explores the hardware, storage and memory requirements for Exchange virtualization. Also, discover other important considerations for such as how to select the right hypervisor. : Hardware requirements and By: Brien M. Posey When, administrators must provision servers with adequate resources, while at the same time adhering to Microsoft s requirements. It s something of an art form. Hardware requirements only scratch the surface. also requires attention to storage requirements, memory considerations and fault tolerance. Hardware requirements for The hardware requirements for Exchange vary greatly depending on the server roles installed on the anticipated workload. As such, the minimum hardware requirements on Microsoft s website are often completely inadequate. Determining the hardware requirements for most Exchange Server roles is fairly straightforward. There are numerous TechNet articles that can guide you through the planning process. Hardware planning for the mailbox server role is the most difficult, especially in large deployments. The best way to accurately estimate the role s hardware requirements is to use the Exchange 2010 Mailbox Server Role Requirements Calculator. Page 2 of 9

3 Exchange : Hardware As you plan hardware allocation for virtualized Exchange servers, it is important to remember that Microsoft does not differentiate between physical and virtual deployments of Exchange. The hardware requirements are the same regardless of whether you run Exchange on physical hardware or in virtual machines (VMs). Storage requirements for Storage requirements are also a consideration when. You can configure Exchange to use virtual hard disks that reside locally on the server, or you can connect to a remote storage mechanism through iscsi. Exchange also supports SCSI pass-through disks. If you use virtual hard drives for Exchange Server storage, they must be a fixed size. Microsoft does not support dynamically expanding virtual hard drives with Exchange Server. (This isn t really an issue with VMware, because VMware uses fixed-length virtual hard disks by default.) If you plan to use iscsi connectivity, make sure the virtual Exchange server uses a full-featured network stack. If the server does not support the use of jumbo frames, for example, then storage performance may be greatly diminished. Memory considerations when Exchange has always been an I/O intensive application, but one of Microsoft s major design goals in Exchange was to drive down the I/O requirements. With fewer I/O requirements, it is practical to virtualize Exchange mailbox servers. But in order to achieve decreased I/O levels, Exchange 2010 is designed to use large amounts of memory. That means efficient memory use is critical to the server s performance. You should avoid using memory overcommit or Dynamic Memory when. Memory overcommit works well for servers that occasionally need extra memory to perform an operation and release that memory when the task is complete. Exchange, however, is a Page 3 of 9

4 Exchange memory-hungry application, and the Mailbox Server role usually consumes all the memory that it can. : Hardware No snapshots allowed One of the most important things to know about Server 2010 is that it doesn t support VM snapshots. Snapshots make a point-intime copy of the VM to be used for backup and recovery. In Exchange, the Mailbox Server, Hub Transport Server, and Edge Transport Server roles all use highly transactional internal databases. Using snapshots to revert a virtualized Exchange server to a previous state could therefore have disastrous consequences, especially in organizations that use multiple Exchange servers. Fault tolerance Before the release of Service Pack 1 (SP1), Microsoft didn t support combining Exchange Server database availability groups with hypervisorlevel clusters. Exchange SP1 supports this configuration, but with some limitations. VMs must be configured so that their state is never saved or restored when the VM is taken offline or when a failover occurs. With all the hardware resource-allocation considerations, can be a juggling act. VMware (PDF) and Microsoft have released best practices for on their hardware platforms. By: Greg Shields Microsoft Exchange Server is one of the most mission-critical IT services for many enterprises. When mail servers are down, so is the entire business communication infrastructure. combines the server s high-availability features with all of the benefits that virtualization brings to Windows servers. Page 4 of 9

5 Exchange : Hardware The steps involved in creating a virtual Exchange 2010 server aren t all that different from those used to create a physical one. The primary difference lies with the creation of a virtual machine (VM). The real planning takes place in these five steps you need to do before you even click New -> Virtual Machine. Step 1: Select and verify a hypervisor Microsoft doesn t support every configuration of Exchange Server running on a hypervisor. The company recognizes that Exchange is a high-priority workload that consumes a lot of resources, so it places limits on what it allows you to virtualize. Microsoft supports Exchange 2010 on hypervisors that have been validated by the Windows Server Virtualization Validation Program. Microsoft hasn t validated every virtual platform, but most major products have been approved, including Microsoft Hyper-V R2, VMware vsphere ESXi 4.1 and XenServer 5.6. Verify that your hypervisor is on the list. Step 2: Determine your virtual Exchange design Even if you re using an approved hypervisor, not all Exchange designs are supported in virtual environments. Microsoft will support Exchange Server 2010 on production hardware only when the following conditions are true: The VM is running Windows Server 2008 SP2 or Windows Server 2008 R2. Microsoft will likely recommend Windows Server 2008 R2 SP1 once it has been released. The VM is not running the Unified Messaging (UM) server role. Microsoft supports each of Exchange s other server roles in a virtual environment, but has concerns about performance for virtualized UM. A UM server requires substantial processing power with little tolerance for processing latency, which may not be guaranteed in a virtual environment. In short, keep your UM servers physical -- at least for now. The virtual machine is not using dynamically expanding virtual hard disk files such as VHD or VMDK files. Disk files can be either SCSI pass- Page 5 of 9

6 Exchange through or iscsi, but must be block-level storage. Microsoft does not support the use of network-attached storage (NAS) for Exchange Server. : Hardware The VM does not use differencing disks, delta disks, linked clones or hypervisor-layer snapshots. These mechanisms link virtual hard disks to create dependencies that could affect Exchange functionality and possibly cause it to fail down the road. Pay particular attention to the lack of support for disk snapshots; you should never create hypervisor-layer snapshots of an Exchange server s disks. The number of assigned virtual processors should never exceed two times the number of logical processors on the physical host. This 2:1 ratio refers to the number of virtual processors that have been assigned to all colocated VMs on the host. In this calculation, logical processors represent the number of processors per core times the number of cores on the server. Step 3: Provision storage for Exchange data stores Exchange needs processing and memory resources to accomplish its job, but storage provisioning is another important consideration. You ll not only need to determine how much storage to provision, but also how that storage will be presented to the server. Two mechanisms are common among essentially all hypervisors. 1. The creation and presentation of a virtual hard disk: This encapsulated storage brings the benefits of virtualized disks to your Exchange design. It can, however, introduce complexities with your backup schemes and incur a slight loss of performance over raw disks. Encapsulation also tends to create extremely large virtual hard disks that become difficult to manage in the long run. 2. The creation and presentation of raw storage such as a SCSI passthrough disk or Raw Disk Mapping: Raw disks do not see the benefits of virtual hard disks, but they may be easier for backup and restore, depending on the capabilities of your backup solution. Additionally, they don t experience the same complexities that virtual hard disks do as they grow. Microsoft supports both types of disks Page 6 of 9

7 Exchange for Exchange storage; however, it recommends the use of raw storage when it s feasible. : Hardware 3. With Exchange Server 2007, Microsoft did not support the direct connection of iscsi storage into the VM. The official support guidelines have changed with Exchange 2010, now allowing iscsi direct connections into virtual machines. However, even though it now allows this configuration, Microsoft does not recommend using it because the network stack inside the VM isn t fully featured. It does not include the kinds of network accelerations enjoyed by physical hosts. You will get optimal performance and full supportability when iscsi storage is configured on the host machine and presented to the VM as a pass-through disk. 4. For information, check out Microsoft s full storage support statement under the section titled Hardware Virtualization. 5. Step 4: Design Exchange Server for high availability High-availability options are built into Exchange Server with database availability groups (DAGs). They are also internal to the hypervisor via live migration. Microsoft doesn t support the use of both high-availability approaches in combination. More importantly, DAG cluster node failures during a live migration have been reported. 6. Live migration and DAGs are complementary technologies; both aim to accomplish the same task but do so at different levels of the application stack. Live migration works at the level of the entire VM. DAGs, on the other hand, are application-specific instances of database clustering. 7. DAGs provide a superior level of service specific to Exchange. You can create multiple DAGs for each data store. DAGs can also be tiered to support failover and disaster recovery situations as well as the additional requirements of data archival. Thus, experts often suggest that virtualized Exchange environments leverage DAGs over and above live migration as a solution for database high availability. 8. Step 5: Guarantee Exchange Server performance Virtualization makes financial sense because it allows multiple VMs Page 7 of 9

8 Exchange to share physical server resources. However, the laws of physics always apply. : Hardware 9. Exchange s various server roles can require substantial processing power and memory to accomplish their tasks without taking a performance hit. On the other hand, combining too many VMs on the same server can create contention as they vie for resources. 10. Your virtualized Exchange design should effectively monitor server performance to ensure that resource contention does not occur. Make sure Exchange has a minimum service level by setting resource reservations -- minimum levels of resources guaranteed to specific servers. 11. And since Exchange is memory-intensive, ensuring that hypervisor memory overcommitment doesn t affect the server s memory needs will also preserve its service levels. Don t overcommit host memory until Exchange s memory usage stabilizes and you have a good understanding of how much memory it actually needs. 12. Once you ve completed these five planning steps, you can begin clicking through the virtual Exchange installation. Choosing New -> Virtual Machine is, for the most part, the only extra step you need. Page 8 of 9

9 Exchange : Hardware Free resources for technology professionals TechTarget publishes targeted technology media that address your need for information and resources for researching products, developing strategy and making cost-effective purchase decisions. Our network of technology-specific Web sites gives you access to industry experts, independent content and analysis and the Web s largest library of vendor-provided white papers, webcasts, podcasts, videos, virtual trade shows, research reports and drawing on the rich R&D resources of technology providers to address market trends, challenges and solutions. Our live events and virtual seminars give you access to vendor neutral, expert commentary and advice on the issues and challenges you face daily. Our social community IT Knowledge Exchange allows you to share real world information in real time with peers and experts. What makes TechTarget unique? TechTarget is squarely focused on the enterprise IT space. Our team of editors and network of industry experts provide the richest, most relevant content to IT professionals and management. We leverage the immediacy of the Web, the networking and face-to-face opportunities of events and virtual events, and the ability to interact with peers all to create compelling and actionable information for enterprise IT professionals across all industries and markets. Related TechTarget Websites Page 9 of 9

Storage Virtualization Explained

Storage Virtualization Explained Storage Virtualization Explained In order to understand the benefits of storage virtualization, it is important to understand how it works. In this e-guide, brought to you by SearchServerVirtualization.com,

More information

Server Hardware for Virtualization: Exploring the Options

Server Hardware for Virtualization: Exploring the Options Server Virtualization: Exploring the Options As virtualization moves toward the private cloud, server hardware will also have to evolve. Soon, when you talk about hardware for virtualization, you ll mean

More information

VMware vsphere Beginner s Guide

VMware vsphere Beginner s Guide The latest version of VMware s virtualization platform, vsphere 5, builds on the already solid foundation of. With the growth of cloud computing and the move from ESX to ESXi, it s imperative for IT pros

More information

E-Guide BENEFITS AND DRAWBACKS OF SSD, CACHING, AND PCIE BASED SSD

E-Guide BENEFITS AND DRAWBACKS OF SSD, CACHING, AND PCIE BASED SSD E-Guide BENEFITS AND DRAWBACKS OF SSD, CACHING, AND PCIE BASED SSD A modern trend in IT infrastructures reveals that more and more companies are installing solid-state storage and caching. Additionally,

More information

BUYING SERVER HARDWARE FOR A SCALABLE VIRTUAL INFRASTRUCTURE

BUYING SERVER HARDWARE FOR A SCALABLE VIRTUAL INFRASTRUCTURE E-Guide BUYING SERVER HARDWARE FOR A SCALABLE VIRTUAL INFRASTRUCTURE SearchServer Virtualization P art 1 of this series explores how trends in buying server hardware have been influenced by the scale-up

More information

TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS

TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS E-Guide TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS SearchSDN T here is some confusion surrounding as there is no one definition. In this exclusive guide, you ll find ten to help you better understand

More information

LESSONS LEARNED FROM AN OFFICE 365 MIGRATION

LESSONS LEARNED FROM AN OFFICE 365 MIGRATION E-Guide LESSONS LEARNED FROM AN OFFICE 365 MIGRATION SearchExchange Office 365. O ffice 365 s take time and careful research, but even then, some mistakes are inevitable. Find out what one expert learned

More information

KNOW THE FEATURES OF WINDOWS SERVER 2012 R2

KNOW THE FEATURES OF WINDOWS SERVER 2012 R2 E-Guide KNOW THE FEATURES OF WINDOWS SERVER 2012 R2 SearchWindows Server T hinking of upgrading to Windows Server 2012 R2? In this eguide learn about five new features. From managing the cloud faster to

More information

E-Guide CLOUDS ARE MORE SECURE THAN TRADITIONAL IT SYSTEMS -- AND HERE S WHY

E-Guide CLOUDS ARE MORE SECURE THAN TRADITIONAL IT SYSTEMS -- AND HERE S WHY E-Guide CLOUDS ARE MORE SECURE THAN TRADITIONAL IT SYSTEMS -- AND HERE S WHY P aranoia has crept into many organizations due to the cloud computing approach, and how it feels insecure with your data stored

More information

WHAT NETWORK VIRTUALIZATION TECHNOLOGY CAN DO FOR YOUR NETWORK TODAY

WHAT NETWORK VIRTUALIZATION TECHNOLOGY CAN DO FOR YOUR NETWORK TODAY E-Guide WHAT NETWORK VIRTUALIZATION TECHNOLOGY CAN DO FOR YOUR NETWORK TODAY SearchSDN : S oftware-defined networking (SDN) and network technologies are being combined to fundamentally change our approach

More information

Desktop Virtualization: What Windows Managers Should Know

Desktop Virtualization: What Windows Managers Should Know One of the biggest jobs for any Windows shop is managing client workstations. Using desktop virtualization can help make that job a little bit easier. This e-guide, from SearchVirtualDesktop.com, can help

More information

PREVENTING PRIVILEGE CREEP

PREVENTING PRIVILEGE CREEP E-Guide PREVENTING PRIVILEGE CREEP SearchSecurity Mike Cobb The security principle of least privilege is the practice of limiting permissions to the minimal level that will allow users to perform their

More information

AUTHENTICATION AND AUTHORIZATION: TWO SECURITY ESSENTIALS THAT WORK TOGETHER

AUTHENTICATION AND AUTHORIZATION: TWO SECURITY ESSENTIALS THAT WORK TOGETHER E-Guide AUTHENTICATION AND AUTHORIZATION: TWO SECURITY ESSENTIALS THAT WORK TOGETHER SearchSecurity E ffective IT security today demands that users be both authenticated and authorized. But even those

More information

E-Guide DATABASE DESIGN HAS EVERYTHING TO DO WITH PERFORMANCE

E-Guide DATABASE DESIGN HAS EVERYTHING TO DO WITH PERFORMANCE E-Guide DATABASE DESIGN HAS EVERYTHING TO DO WITH PERFORMANCE D atabase performance can be sensitive to the adjustments you make to design. In this e-guide, discover the affects database performance data

More information

NETWORK-BASED CONTROLS: SECURING THE INTERNET OF THINGS

NETWORK-BASED CONTROLS: SECURING THE INTERNET OF THINGS E-Guide NETWORK-BASED CONTROLS: SECURING THE INTERNET OF THINGS SearchSecurity D evices may not connect to enterprise access systems or inventory and patching mechanisms. This expert eguide explains how

More information

MANAGING ENDPOINTS WITH DEFENSE- IN-DEPTH

MANAGING ENDPOINTS WITH DEFENSE- IN-DEPTH E-Guide MANAGING ENDPOINTS WITH DEFENSE- IN-DEPTH SearchSecurity L earn how to implement appropriate security controls for endpoint management. PAGE 2 OF 7 MANAGING ENDPOINTS WITH DEFENSE-IN-DEPTH Mike

More information

AS ATTACKERS TARGET APPLICATION CODING ERRORS, ARE STATIC ANALYSIS TOOLS THE ANSWER?

AS ATTACKERS TARGET APPLICATION CODING ERRORS, ARE STATIC ANALYSIS TOOLS THE ANSWER? E-Guide AS ATTACKERS TARGET APPLICATION CODING ERRORS, ARE STATIC ANALYSIS TOOLS THE ANSWER? SearchSecurity A pplication development teams often prioritize timely delivery of software above all other concerns

More information

Disaster recovery planning for health care data and HIPAA compliance regulations

Disaster recovery planning for health care data and HIPAA compliance regulations Disaster recovery care data and HIPAA compliance regulations Disaster recovery care Disaster recovery planning takes on special importance in health care organizations dealing with patients and care delivery.

More information

Disaster Recovery Planning: Weighing your customer s options

Disaster Recovery Planning: Weighing your customer s options Disaster Recovery Planning: Weighing your Even though backing up data and developing a plan to restore it isn't the first step in business continuity planning (BCP), it's still a cornerstone. Without a

More information

10 Cloud Storage Concepts to Master

10 Cloud Storage Concepts to Master 10 Cloud Storage Concepts to Master Cloud hype has given way to a certain amount of confusion, particularly around the terms used to describe the technology itself. This E-Guide defines "cloud washing"

More information

Utilizing Windows Server 2012 without the GUI Key workarounds for avoiding the Modern UI

Utilizing Windows Server 2012 without the GUI Key workarounds for avoiding the Modern UI Utilizing Windows Server 2012 Key workarounds for avoiding the Modern UI Even though the graphical user interface (GUI) Microsoft introduced in Windows Server 2012 has its benefits, IT admins are reluctant

More information

E-Guide WHAT WINDOWS 10 ADOPTION MEANS FOR IT

E-Guide WHAT WINDOWS 10 ADOPTION MEANS FOR IT E-Guide WHAT WINDOWS 10 ADOPTION MEANS FOR IT E nterprise adoption of Windows 10 isn t likely to follow the same pattern as for Windows 7, and that s a good thing, writes columnist Brian Madden. And even

More information

Virtualizing Microsoft Exchange Server 2010 with NetApp and VMware

Virtualizing Microsoft Exchange Server 2010 with NetApp and VMware Virtualizing Microsoft Exchange Server 2010 with NetApp and VMware Deploying Microsoft Exchange Server 2010 in a virtualized environment that leverages VMware virtualization and NetApp unified storage

More information

Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future

Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future Solid state storage is ready for prime time, or so the latest awareness and usage statistics would indicate. Moreover, a recent

More information

Identify and Eliminate Oracle Database Bottlenecks

Identify and Eliminate Oracle Database Bottlenecks Identify and Eliminate Oracle Database Bottlenecks Improving database performance isn t just about optimizing your queries. Oftentimes the infrastructure that surrounds it can inhibit or enhance Oracle

More information

Microsoft E xchange 2010 on VMware

Microsoft E xchange 2010 on VMware : Microsoft E xchange 2010 on VMware Availability and R ecovery Options This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more

More information

Backup solutions for today s Data Center

Backup solutions for today s Data Center Backup solutions for today s Data Center If your job involved storage data, you already know storage eats up budget dollars fast! In this eguide learn the different data and storage systems available,

More information

BEST PRACTICES TO PROTECTING AWS CLOUD RESOURCES

BEST PRACTICES TO PROTECTING AWS CLOUD RESOURCES E-Guide BEST PRACTICES TO PROTECTING AWS CLOUD RESOURCES SearchAWS T here is no catch-all for securing a cloud network. Administrators should take a comprehensive approach to protect AWS cloud resources

More information

Understanding Virtual System Data Protection

Understanding Virtual System Data Protection Understanding Virtual System Data Protection Server virtualization is the most important new technology introduced in the data center in the past decade. It has changed the way we think about computing

More information

SSL Certificate Management: Common Mistakes and How to Avoid Them

SSL Certificate Management: Common Mistakes and How to Avoid Them Common Mistakes and How to Avoid Them Common Mistakes and Errors are bound to occur when SSL certificate management is handled manually. Learn how to avoid these common mistakes. How to Avoid Them By:

More information

SUPPLEMENTARY DEFENSES FOR ENDPOINT SECURITY

SUPPLEMENTARY DEFENSES FOR ENDPOINT SECURITY E-Guide SUPPLEMENTARY DEFENSES FOR ENDPOINT SECURITY SearchSecurity L earn how network access control, data loss prevention (DLP) and robust data destruction can secure endpoints and protect enterprise

More information

ADOPTING FIDO SearchSecurity

ADOPTING FIDO SearchSecurity E-Guide SearchSecurity T he inability of passwords to keep online accounts secure has been recognized for quite some time, but the IT industry has struggled to establish a practical alternative. PAGE 2

More information

An introduction to the VDI landscape

An introduction to the VDI landscape The : An Virtual desktop infrastructures are quickly gaining popularity in the IT industry as end users are now able to connect to their desktops from any location, at any time. This e-guide, from SearchVirtualDesktop.com,

More information

Best Practices for the Hybrid Cloud

Best Practices for the Hybrid Cloud Best Practices for the Hybrid Cloud Private clouds have been a popular topic amongst IT managers in the past year, but IT organizations that build private clouds need the peak computing power of a public

More information

ADDRESSING TODAY S VULNERABILITIES

ADDRESSING TODAY S VULNERABILITIES E-Guide ADDRESSING TODAY S VULNERABILITIES SearchSecurity E ven if your firm has no legal or contractual obligation to perform them, authenticated scans should be an essential part of your security program.

More information

SDN Technologies Primer: Revolution or Evolution in Architecture?

SDN Technologies Primer: Revolution or Evolution in Architecture? There is no single, clear definition of softwaredefined networking (SDN), but there are two sets of beliefs centralized control and management of packet forwarding vs. a distributed architecture. This

More information

Evaluating the Security of Software Defined Networking

Evaluating the Security of Software Defined Networking Evaluating the Security of Software Defined Networking This expert e-guide explores the latest challenges in network security. Get tips for evaluating network security virtualization and explore the security

More information

Microsoft Virtualization Delivers More Capabilities, Better Value than VMware

Microsoft Virtualization Delivers More Capabilities, Better Value than VMware It s clear that virtualization can help you save money and operate more effi ciently. However, what may not be so apparent at fi rst glance, is which virtualization approach makes the most sense. VMware

More information

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure Nutanix Tech Note Virtualizing Microsoft Applications on Web-Scale Infrastructure The increase in virtualization of critical applications has brought significant attention to compute and storage infrastructure.

More information

BENEFITS AND CHALLENGES OF PCIE SSDS

BENEFITS AND CHALLENGES OF PCIE SSDS E-Guide BENEFITS AND CHALLENGES OF PCIE SSDS SearchSolidState Storage S o l i d-s tat e s t o r a g e i s increasingly becoming universally recognized as a top storage performance option but its performance

More information

SECURITY MONITORING: BE EVERYWHERE AT ONCE

SECURITY MONITORING: BE EVERYWHERE AT ONCE E-Guide SECURITY MONITORING: BE EVERYWHERE AT ONCE SearchNetworking P ervasive security improves on defense in depth by layering security according to risk and assigning it specifically to each critical

More information

Protecting Miscrosoft Hyper-V Environments

Protecting Miscrosoft Hyper-V Environments Protecting Miscrosoft Hyper-V Environments Who should read this paper Technical White Papers are designed to introduce Veritas partners and end users to key technologies and technical concepts that are

More information

The Emergence of SDN in WLAN

The Emergence of SDN in WLAN The Emergence of SDN in WLAN SDN is being implemented rapidly find out how SDN can benefit your wireless network. Contents architectures? Chuck Moozakis Some experts predict that the network functions

More information

Deploying Application and OS Virtualization Together: Citrix and Virtuozzo

Deploying Application and OS Virtualization Together: Citrix and Virtuozzo White Paper Deploying Application and OS Virtualization Together: Citrix and Virtuozzo www.swsoft.com Version 1.0 Table of Contents The Virtualization Continuum: Deploying Virtualization Together... 3

More information

Stellar performance for a virtualized world

Stellar performance for a virtualized world IBM Systems and Technology IBM System Storage Stellar performance for a virtualized world IBM storage systems leverage VMware technology 2 Stellar performance for a virtualized world Highlights Leverages

More information

Protecting Hyper-V Environments

Protecting Hyper-V Environments TECHNICAL WHITE PAPER: BACKUP EXEC TM 2014 PROTECTING HYPER-V ENVIRONMENTS Backup Exec TM 2014 Technical White Paper Protecting Hyper-V Environments Technical White Papers are designed to introduce Symantec

More information

BRING SPEAR PHISHING PROTECTION TO THE MASSES

BRING SPEAR PHISHING PROTECTION TO THE MASSES E-Guide BRING SPEAR PHISHING PROTECTION TO THE MASSES SearchSecurity phishing. I n this expert tip, David Sherry describes how a combination of technical controls and user awareness training can help put

More information

Easy VMware Disaster Recovery & Business Continuity in Amazon Web Services

Easy VMware Disaster Recovery & Business Continuity in Amazon Web Services White Paper White Paper Managing Public Cloud Computing in the Enterprise Easy VMware Disaster Recovery & Business Continuity in Amazon Web Services A Quick Start Guide For the Price of Basic Backup By

More information

Server Fault Protection with NetApp Data ONTAP Edge-T

Server Fault Protection with NetApp Data ONTAP Edge-T Technical Report Server Fault Protection with NetApp Data ONTAP Edge-T Jeff Whitaker, NetApp March 2013 TR-4154 TABLE OF CONTENTS 1 Introduction... 3 2 Backup and Disaster Recovery Technology... 4 2.1

More information

STORAGE NETWORKING TECHNOLOGY STEPS UP TO PERFORMANCE CHALLENGES

STORAGE NETWORKING TECHNOLOGY STEPS UP TO PERFORMANCE CHALLENGES E-Guide STORAGE NETWORKING TECHNOLOGY STEPS UP TO PERFORMANCE CHALLENGES SearchStorage S torage network technology is changing and speed is the name of the game. To handle the burgeoning data growth, organizations

More information

StarWind Virtual SAN Free

StarWind Virtual SAN Free #1 HyperConverged Appliance for SMB and ROBO StarWind Virtual SAN Free Value Proposition For virtualization admins, IT geeks, bloggers, students or those who look to build and maintain virtualization infrastructure

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers Parallels Virtuozzo Containers White Paper Deploying Application and OS Virtualization Together: Citrix and Parallels Virtuozzo Containers www.parallels.com Version 1.0 Table of Contents The Virtualization

More information

Backup Appliances: Key Players and Criteria for Selection

Backup Appliances: Key Players and Criteria for Selection Backup Appliances: Key Players and Criteria for Selection Backup appliances may have been created with the SMB in mind, but that doesn't mean larger companies can't derive value from them. In fact, recent

More information

StorageCraft OneXafe and Veeam 9.5

StorageCraft OneXafe and Veeam 9.5 TECHNICAL DEPLOYMENT GUIDE NOV 2018 StorageCraft OneXafe and Veeam 9.5 Expert Deployment Guide Overview StorageCraft, with its scale-out storage solution OneXafe, compliments Veeam to create a differentiated

More information

Virtualization can provide many advantages in enterprise

Virtualization can provide many advantages in enterprise iscsi: Changing the Economics of Part 2 Deploying iscsi in Virtualized Data Centers By Matt Baker Travis Vigil Integrating virtualized servers with shared storage is necessary for flexible virtual machine

More information

Virtual Volumes FAQs First Published On: Last Updated On:

Virtual Volumes FAQs First Published On: Last Updated On: First Published On: 03-20-2017 Last Updated On: 07-13-2018 1 Table of Contents 1. FAQs 1.1.Introduction and General Information 1.2.Technical Support 1.3.Requirements and Capabilities 2 1. FAQs Frequently

More information

EMC Integrated Infrastructure for VMware. Business Continuity

EMC Integrated Infrastructure for VMware. Business Continuity EMC Integrated Infrastructure for VMware Business Continuity Enabled by EMC Celerra and VMware vcenter Site Recovery Manager Reference Architecture Copyright 2009 EMC Corporation. All rights reserved.

More information

VMware Virtual SAN. Technical Walkthrough. Massimiliano Moschini Brand Specialist VCI - vexpert VMware Inc. All rights reserved.

VMware Virtual SAN. Technical Walkthrough. Massimiliano Moschini Brand Specialist VCI - vexpert VMware Inc. All rights reserved. VMware Virtual SAN Technical Walkthrough Massimiliano Moschini Brand Specialist VCI - vexpert 2014 VMware Inc. All rights reserved. VMware Storage Innovations VI 3.x VMFS Snapshots Storage vmotion NAS

More information

Dell Server Migration Utility (SMU)

Dell Server Migration Utility (SMU) Using SMU to simplify migration to a boot from SAN architecture Aaron Prince, Technical Marketing Dell Virtualization Solutions This document is for informational purposes only and may contain typographical

More information

EBOOK. NetApp ONTAP Cloud FOR MICROSOFT AZURE ENTERPRISE DATA MANAGEMENT IN THE CLOUD

EBOOK. NetApp ONTAP Cloud FOR MICROSOFT AZURE ENTERPRISE DATA MANAGEMENT IN THE CLOUD EBOOK NetApp ONTAP Cloud FOR MICROSOFT AZURE ENTERPRISE DATA MANAGEMENT IN THE CLOUD NetApp ONTAP Cloud for Microsoft Azure The ONTAP Cloud Advantage 3 Enterprise-Class Data Management 5 How ONTAP Cloud

More information

vsan Mixed Workloads First Published On: Last Updated On:

vsan Mixed Workloads First Published On: Last Updated On: First Published On: 03-05-2018 Last Updated On: 03-05-2018 1 1. Mixed Workloads on HCI 1.1.Solution Overview Table of Contents 2 1. Mixed Workloads on HCI 3 1.1 Solution Overview Eliminate the Complexity

More information

Remove complexity in protecting your virtual infrastructure with. IBM Spectrum Protect Plus. Data availability made easy. Overview

Remove complexity in protecting your virtual infrastructure with. IBM Spectrum Protect Plus. Data availability made easy. Overview Overview Challenge In your organization, backup management is too complex and consumes too much time and too many IT resources. Solution IBM Spectrum Protect Plus dramatically simplifies data protection

More information

Preparing for Server 2012 Hyper-V: Seven Questions to Ask Now Greg Shields

Preparing for Server 2012 Hyper-V: Seven Questions to Ask Now Greg Shields Preparing for Server 2012 Hyper-V: Seven Questions to Ask Now Greg Shields Microsoft MVP and VMware vexpert September, 2012 may be the release date for Windows Server 2012, but odds are good that your

More information

SvSAN Data Sheet - StorMagic

SvSAN Data Sheet - StorMagic SvSAN Data Sheet - StorMagic A Virtual SAN for distributed multi-site environments StorMagic SvSAN is a software storage solution that enables enterprises to eliminate downtime of business critical applications

More information

The Data Protection Rule and Hybrid Cloud Backup

The Data Protection Rule and Hybrid Cloud Backup The 3-2-1 Data Protection Rule and Hybrid Cloud Backup IT teams are under extreme pressure to improve backup, disaster recovery and data protection to eliminate downtime and facilitate digital transformation.

More information

Virtual Server Agent for VMware VMware VADP Virtualization Architecture

Virtual Server Agent for VMware VMware VADP Virtualization Architecture Virtual Server Agent for VMware VMware VADP Virtualization Architecture Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 18 VMware VADP Virtualization Architecture - Virtual Server Agent for VMware

More information

YOUR APPLICATION S JOURNEY TO THE CLOUD. What s the best way to get cloud native capabilities for your existing applications?

YOUR APPLICATION S JOURNEY TO THE CLOUD. What s the best way to get cloud native capabilities for your existing applications? YOUR APPLICATION S JOURNEY TO THE CLOUD What s the best way to get cloud native capabilities for your existing applications? Introduction Moving applications to cloud is a priority for many IT organizations.

More information

EMC Backup and Recovery for Microsoft Exchange 2007

EMC Backup and Recovery for Microsoft Exchange 2007 EMC Backup and Recovery for Microsoft Exchange 2007 Enabled by EMC CLARiiON CX4-120, Replication Manager, and Hyper-V on Windows Server 2008 using iscsi Reference Architecture Copyright 2009 EMC Corporation.

More information

Virtual Disaster Recovery

Virtual Disaster Recovery The Essentials Series: Managing Workloads in a Virtual Environment Virtual Disaster Recovery sponsored by by Jaime Halscott Vir tual Disaster Recovery... 1 Virtual Versus Physical Disaster Recovery...

More information

IOmark- VM. HP HP ConvergedSystem 242- HC StoreVirtual Test Report: VM- HC b Test Report Date: 27, April

IOmark- VM. HP HP ConvergedSystem 242- HC StoreVirtual Test Report: VM- HC b Test Report Date: 27, April IOmark- VM HP HP ConvergedSystem 242- HC StoreVirtual Test Report: VM- HC- 150427- b Test Report Date: 27, April 2015 Copyright 2010-2015 Evaluator Group, Inc. All rights reserved. IOmark- VM, IOmark-

More information

Course Outline 20740B. Module 1: Installing, upgrading, and migrating servers and workloads

Course Outline 20740B. Module 1: Installing, upgrading, and migrating servers and workloads Course Outline 20740B Module 1: Installing, upgrading, and migrating servers and workloads This module describes the new features of Windows Server 2016, and explains how to prepare for and install Nano

More information

ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS. By George Crump

ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS. By George Crump ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS By George Crump Economical, Storage Purpose-Built for the Emerging Data Centers Most small, growing businesses start as a collection of laptops

More information

VMware vsphere 5.0 STORAGE-CENTRIC FEATURES AND INTEGRATION WITH EMC VNX PLATFORMS

VMware vsphere 5.0 STORAGE-CENTRIC FEATURES AND INTEGRATION WITH EMC VNX PLATFORMS VMware vsphere 5.0 STORAGE-CENTRIC FEATURES AND INTEGRATION WITH EMC VNX PLATFORMS A detailed overview of integration points and new storage features of vsphere 5.0 with EMC VNX platforms EMC Solutions

More information

vsan Remote Office Deployment January 09, 2018

vsan Remote Office Deployment January 09, 2018 January 09, 2018 1 1. vsan Remote Office Deployment 1.1.Solution Overview Table of Contents 2 1. vsan Remote Office Deployment 3 1.1 Solution Overview Native vsphere Storage for Remote and Branch Offices

More information

VMware Backup and Replication Enterprise Edition

VMware Backup and Replication Enterprise Edition VMware Backup and Replication Enterprise Edition TECHNOLOGY PARTNERS Vembu Technologies 10+ Years of Experience 100+ Countries 2 Headquartered in Chennai Vembu BDR Suite Vembu BDR suite is an one stop

More information

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

PUT DATA PROTECTION WHERE YOU NEED IT

PUT DATA PROTECTION WHERE YOU NEED IT from Carbonite PUT DATA PROTECTION WHERE YOU NEED IT Flexibility is your best friend when it comes to choosing a backup plan. For a backup solution to be considered flexible, it needs to satisfy several

More information

VMware vsphere APIs for I/O Filtering (VAIO) November 14, 2017

VMware vsphere APIs for I/O Filtering (VAIO) November 14, 2017 VMware vsphere APIs for I/O Filtering (VAIO) November 14, 2017 1 Table of Contents 1. Introduction to vsphere APIs for I/O Filtering 1.1.Introduction to vsphere APIs for I/O Filtering 2. VAIO Technical

More information

EMC VSPEX FOR VIRTUALIZED MICROSOFT EXCHANGE 2013 WITH MICROSOFT HYPER-V

EMC VSPEX FOR VIRTUALIZED MICROSOFT EXCHANGE 2013 WITH MICROSOFT HYPER-V IMPLEMENTATION GUIDE EMC VSPEX FOR VIRTUALIZED MICROSOFT EXCHANGE 2013 WITH MICROSOFT HYPER-V EMC VSPEX Abstract This describes the steps required to deploy a Microsoft Exchange Server 2013 solution on

More information

Achieving high availability for Hyper-V

Achieving high availability for Hyper-V At a glance: Consolidating servers using Hyper-V Ensuring high availability of virtual machines Setting up a Windows Server 2008 failover cluster Achieving high availability for Hyper-V Steven Ekren Server

More information

Native vsphere Storage for Remote and Branch Offices

Native vsphere Storage for Remote and Branch Offices SOLUTION OVERVIEW VMware vsan Remote Office Deployment Native vsphere Storage for Remote and Branch Offices VMware vsan is the industry-leading software powering Hyper-Converged Infrastructure (HCI) solutions.

More information

Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability

Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability IT teams in companies of all sizes face constant pressure to meet the Availability requirements of today s Always-On

More information

Hyperconvergence and Medical Imaging

Hyperconvergence and Medical Imaging Hyperconvergence and Medical Imaging A recent survey found the top three challenges facing medical IT departments with regard to data storage are: 1. Lack of flexibility Requirements for dedicated hardware

More information

VMware vsphere with ESX 4.1 and vcenter 4.1

VMware vsphere with ESX 4.1 and vcenter 4.1 QWERTYUIOP{ Overview VMware vsphere with ESX 4.1 and vcenter 4.1 This powerful 5-day class is an intense introduction to virtualization using VMware s vsphere 4.1 including VMware ESX 4.1 and vcenter.

More information

Business Continuity and Disaster Recovery Disaster-Proof Your Business

Business Continuity and Disaster Recovery Disaster-Proof Your Business Business Continuity and Disaster Recovery Disaster-Proof Your Business Jon Bock Senior Product Marketing Manager October 16, 2008 Agenda Disaster Recovery Requirements and Challenges Disaster Recovery

More information

TOP REASONS TO CHOOSE DELL EMC OVER VEEAM

TOP REASONS TO CHOOSE DELL EMC OVER VEEAM HANDOUT TOP REASONS TO CHOOSE DELL EMC OVER VEEAM 10 This handout overviews the top ten reasons why customers choose Data Protection from Dell EMC over Veeam. Dell EMC has the most comprehensive data protection

More information

E-Guide CLOUD COMPUTING VS. VIRTUALIZATION

E-Guide CLOUD COMPUTING VS. VIRTUALIZATION E-Guide CLOUD COMPUTING VS. VIRTUALIZATION A lthough cloud computing uses virtualization, virtualization is simply one element that makes cloud computing. In this e- guide, brought to you by SearchServerVirtualization.com,

More information

Eliminate the Complexity of Multiple Infrastructure Silos

Eliminate the Complexity of Multiple Infrastructure Silos SOLUTION OVERVIEW Eliminate the Complexity of Multiple Infrastructure Silos A common approach to building out compute and storage infrastructure for varying workloads has been dedicated resources based

More information

StorageCraft OneBlox and Veeam 9.5 Expert Deployment Guide

StorageCraft OneBlox and Veeam 9.5 Expert Deployment Guide TECHNICAL DEPLOYMENT GUIDE StorageCraft OneBlox and Veeam 9.5 Expert Deployment Guide Overview StorageCraft, with its scale-out storage solution OneBlox, compliments Veeam to create a differentiated diskbased

More information

Expert Reference Series of White Papers. Five Reasons Why You Should Pair VSAN and View

Expert Reference Series of White Papers. Five Reasons Why You Should Pair VSAN and View Expert Reference Series of White Papers Five Reasons Why You Should Pair VSAN and View 1-800-COURSES www.globalknowledge.com Five Reasons Why You Should Pair VSAN and View Matt Feeney, VCI, VCP5, VCP-DT,

More information

shaping tomorrow with you Eternus VVOL Matthias Bothe Fujitsu Technology Solutions

shaping tomorrow with you Eternus VVOL Matthias Bothe Fujitsu Technology Solutions shaping tomorrow with you Eternus VVOL Matthias Bothe 0 2015 Fujitsu Technology Solutions Agenda What are Virtual Volumes? Advantages of VVOLs Technical implementation of VVOL for ETERNUS Usage 1 2015

More information

STATE OF STORAGE IN VIRTUALIZED ENVIRONMENTS INSIGHTS FROM THE MIDMARKET

STATE OF STORAGE IN VIRTUALIZED ENVIRONMENTS INSIGHTS FROM THE MIDMARKET STATE OF STORAGE IN VIRTUALIZED ENVIRONMENTS INSIGHTS FROM THE MIDMARKET PAGE 1 ORGANIZATIONS THAT MAKE A GREATER COMMITMENT TO VIRTUALIZING THEIR OPERATIONS GAIN GREATER EFFICIENCIES. PAGE 2 SURVEY TOPLINE

More information

Pivot3 Acuity with Microsoft SQL Server Reference Architecture

Pivot3 Acuity with Microsoft SQL Server Reference Architecture Pivot3 Acuity with Microsoft SQL Server 2014 Reference Architecture How to Contact Pivot3 Pivot3, Inc. General Information: info@pivot3.com 221 West 6 th St., Suite 750 Sales: sales@pivot3.com Austin,

More information

Installation, Storage, and with Windows Server 2016

Installation, Storage, and with Windows Server 2016 Installation, Storage, and with Windows Server 2016 Course: 20740 Course Details Audience(s): IT Professional(s) Technology: Windows Server 2016 Duration: 40 Hours ABOUT THIS COURSE This five-day course

More information

Veritas Storage Foundation in a VMware ESX Environment

Veritas Storage Foundation in a VMware ESX Environment Veritas Storage Foundation in a VMware ESX Environment Linux and Solaris x64 platforms January 2011 TABLE OF CONTENTS Introduction... 3 Executive Summary... 4 Overview... 5 Virtual Machine File System...

More information

Hyper-V Top performance and capacity tips

Hyper-V Top performance and capacity tips Hyper-V Top performance and capacity tips Introduction This paper discusses the changes in Windows/Hyper-V 2012 and what that means from the perspective of the business and managing the capacity. It will

More information

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of

More information

Veritas Resiliency Platform: The Moniker Is New, but the Pedigree Is Solid

Veritas Resiliency Platform: The Moniker Is New, but the Pedigree Is Solid Enterprise Strategy Group Getting to the bigger truth. SOLUTION SHOWCASE Veritas Resiliency Platform: The Moniker Is New, but the Pedigree Is Solid Date: September 2015 Authors: Jason Buffington, Senior

More information

Vista Deployment: What s in the Box and What s Not

Vista Deployment: What s in the Box and What s Not An IT Briefing produced by Vista Deployment: What s in the Box and What s Not By Mark Minasi 2007 TechTarget BIO Mark Minasi is a best-selling author, popular technology columnist and commentator, and

More information

Nutanix Complete Cluster Date: May 2012 Authors: Ginny Roth, Tony Palmer, and Emil Flock

Nutanix Complete Cluster Date: May 2012 Authors: Ginny Roth, Tony Palmer, and Emil Flock ESG Lab Review Nutanix Complete Cluster Date: May 2012 Authors: Ginny Roth, Tony Palmer, and Emil Flock Abstract: This ESG Lab review documents hands-on testing of the Nutanix Complete Cluster, highlighting

More information