Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 16 of 34 white papers, page 1 of 3.
5 Fundamentals of Modern Data Protection
Some data protection software vendors will say that they are “agentless” because they can do an agentless backup. However, many of these vendors require agents for file-level restore, proper application backup, or to restore application data. My advice is to make sure that your data protection tool is able to address all backup and recovery scenarios without the need for an agent.
Legacy backup is costly, inefficient, and can force IT administrators to make risky compromises that impact critical business applications, data and resources. Read this NEW white paper to learn how Modern Data Protection capitalizes on the inherent benefits of virtualization to:
  • Increase your ability to meet RPOs and RTOs
  • Eliminate the need for complex and inefficient agents
  • Reduce operating costs and optimize resources
The Expert Guide to VMware Data Protection
Virtualization is a very general term for simulating a physical entity by using software. There are many different forms of virtualization that may be found in a data center including server, network and storage virtualization. When talking about server virtualization there are many unique terms and concepts that you may hear that are part of the technology that makes up server virtualization.
Virtualization is the most disruptive technology of the decade. Virtualization-enabled data protection and disaster recovery is especially disruptive because it allows IT to do things dramatically better at a fraction of the cost of what it would be in a physical data center.

Chapter 1: An Introduction to VMware Virtualization

Chapter 2: Backup and Recovery Methodologies

Chapter 3: Data Recovery in Virtual Environments

Chapter 4: Learn how to choose the right backup solution for VMware
How to avoid VM sprawl and improve resource utilization in VMware and Veeam backup infrastructures
You're facing VM sprawl if you're experiencing an uncontrollable increase of unused and unneeded objects in your virtual VMware environment. VM sprawl occurs often in virtual infrastructures because they expand much faster than physical, which can make management a challenge. The growing number of virtualized workloads and applications generate “virtual junk” causing VM sprawl issue. Eventually it can put you at risk of running out of resources.

You're facing VM sprawl if you're experiencing an uncontrollable increase of unused and unneeded objects in your virtual VMware environment. VM sprawl occurs often in virtual infrastructures because they expand much faster than physical, which can make management a challenge. The growing number of virtualized workloads and applications generate “virtual junk” causing VM sprawl issue. Eventually it can put you at risk of running out of resources.

Getting virtual sprawl under control will help you reallocate and better provision your existing storage, CPU and memory resources between critical production workloads and high-performance, virtualized applications. With proper resource management, you can save money on extra hardware.

This white paper examines how you can avoid potential VM sprawl risks and automate proactive monitoring by using Veeam ONE, a part of Veeam Availability Suite. Veeam ONE will arm you with a list of VM sprawl indicators and explain how you can pick up and configure a handy report kit to detect and eliminate VM sprawl threats in your VMware environment.

Read this FREE white paper and learn how to:

  • Identify “zombies”
  • Clean up garbage and orphaned snapshots
  • Establish a transparent system to get sprawl under control
  • And more!
IDC Technology Spotlight - Zerto Cloud Continuity Platform
This spotlight IDC Technology highlights IT professionals facing aggressive service level and low budgets, Learn how Zerto Cloud Continuity Platform helps resolve this issue.

A recent IDC survey of small and medium-sized business (SMB) users revealed that 67% have a recovery time requirement of less than four hours, and 31% have a recovery time requirement of less than two hours. Additionally, IDC estimates that as many as half of all organizations have insufficient business continuity and disaster recovery plans to meet business requirements, or to even survive a disaster.

Although business continuity is perhaps the top use case for cloud computing, simply focusing on this one use limits the broad potential of cloud, especially in a hybrid cloud context.

Technology Comparison: Disaster Recovery Solutions
Deep-dive comparison of disaster recovery solutions - differences between Zerto's hypervisor-based replication and array-based replication (with VMWare SRM)

Zerto’s innovative, hypervisor-based replication is a technology developed to provide a true enterprise class, yet fully virtual-aware disaster recovery solution, to protect virtualized, mission-critical applications. This document outlines the fundamental differences between Zerto’s hypervisor-based replication and other current and legacy technologies.

Compared Technologies

The current and legacy disaster recovery solutions compared in this document include:

• Zerto Hypervisor-based Replication

• Array-based Replication with and without SRM

• Host / Guest-based Replication

• Snapshot-based Replication

• VMware Site Recovery Manager with vSphere Replication

Discover Cross-Hypervisor Replication with Zerto
Zerto Virtual Replication (ZVR) is the first hypervisor-based replication solution to offer enterprise-class cross-hypervisor replication, disaster recovery, data protection and workload mobility. With ZVR 4.0, IT departments can automatically convert Hyper-V VMs to VMware, convert VMware VMs to Hyper- V, and convert Hyper-V to AWS for increased flexibility and cost savings.
Zerto Virtual Replication (ZVR) is the first hypervisor-based replication solution to offer enterprise-class cross-hypervisor replication, disaster recovery, data protection and workload mobility. With ZVR 4.0, IT departments can automatically convert Hyper-V VMs to VMware, convert VMware VMs to Hyper- V, and convert Hyper-V to AWS for increased flexibility and cost savings.
Replication Software for the VMware ESXi Hypervisor
Zerto protects virtualized applications with the same robust and effective recovery previously available only with complex and expensive array based replication solutions.

Zerto protects virtualized applications with the same robust and effective recovery previously available only with complex and expensive array based replication solutions. With Zerto you get:

  •         Scalability
  •         Ease of management
  •         A Hardware agnostic solutions
Zerto Offsite Cloud Backup & Data Protection
Offsite Backup is a new paradigm in data protection that combines hypervisor-based replication with longer retention. This greatly simplifies data protection for IT organizations. The ability to leverage the data at the disaster recovery target site or in the cloud for VM backup eliminates the impact on production workloads.

Zerto Offsite Backup in the Cloud

What is Offsite Backup?

Offsite Backup is a new paradigm in data protection that combines hypervisor-based replication with longer retention. This greatly simplifies data protection for IT organizations. The ability to leverage the data at the disaster recovery target site or in the cloud for VM backup eliminates the impact on production workloads.

Why Cloud Backup?

  • Offsite Backup combines replication and long retention in a new way
  • The repository can be located in public cloud storage, a private cloud, or as part of a hybrid cloud solution.
  • Copies are saved on a daily, weekly and monthly schedule.
  • The data volumes and configuration information are included to allow VM backups to be restored on any compatible platform, cloud or otherwise.
Introducing Cloud Disaster Recovery
Can mission-critical apps really be protected in the cloud? Introducing: Cloud Disaster Recovery Today, enterprises of all sizes are virtualizing their mission-critical applications, either within their own data center, or with an external cloud vendor.

Can mission-critical apps really be protected in the cloud?

Introducing: Cloud Disaster Recovery

Today, enterprises of all sizes are virtualizing their mission-critical applications, either within their own data center, or with an external cloud vendor. One key driver is to leverage the flexibility and agility virtualization offers to increase availability, business continuity and disaster recovery.

With the cloud becoming more of an option, enterprises of all sizes are looking for the cloud, be it public, hybrid or private, to become part of their BC/DR solution. However, these options do not always exist. Virtualization has created the opportunity, but there is still a significant technology gap. Mission-critical applications can be effectively virtualized and managed; however, the corresponding data cannot be effectively protected in a cloud environment.

Additional Challenges for Enterprises with the Cloud:

  • Multi-tenancy
  • Data protection & mobility
  • Lack of centralized management

Solutions with Zerto Virtual Replication:

  • Seamless integration with no environment change
  • Multi-site support
  • Hardware-agnostic replications
Application Protection & Recovery for VMware
Protect Applications, Not Data. How-to Guide: Application Protection and Recovery for VMware

Protect Applications, Not Data

How-to Guide: Application Protection and Recovery for VMware

When organizations are considering a business continuity/disaster recovery (BC/DR) solution, they need to look for a solution that not only protects and recovers the data, but also protects and recovers the application. Virtualized applications typically span multiple VMs and are more complex in terms of dependencies and infrastructure. They require recovery with write-order fidelity, something most replications solutions do not supply

Zerto Application Protection Features:

  • VM-level consistency grouping
  • Crash-consistent application recovery
  • Recovery of specific application objects
Backup is Not Replication - Backup VMware
Why Rely on Backup Shipping as Your VMware DR Solution? Some people think, if you want to protect data in your virtual VMware environment, your easiest solution is to backup VMware using snapshots or agents.

Why Rely on Backup Shipping as Your VMware DR Solution?

Some people think, if you want to protect data in your virtual VMware environment, your easiest solution is to backup VMware using snapshots or agents.  However, solutions like this, such as Veeam, can slow down your production environment, and they are difficult to scale.

However, many of us understand that backup is not disaster recovery. The right approach to a BC/DR solution is hypervisor-based replication.

With hypervisor-based replication you receive:

  • Continuous data replication
  • Recovery capabilities built specifically for VMware datacenters
  • Full consistency between and among all application components
  • Zerto’s Offsite Backup for VMware
A New Approach to Per User Application Management
Our premise is simple: existing methodologies for delivering and deploying Windows applications are based upon outmoded ideas and outdated technology. There remains a need for a product that makes it simple for each user to have their Windows applications individually tailored for their device. When a user logs on they should see only the applications that they are licensed to use regardless of whether they are using cloud, virtual or traditional desktops.
Normal 0 false false false EN-US X-NONE X-NONE

A simple truth: Current application delivery and deployment solutions for Windows®-based desktops are often not fast enough, and the methods employed introduce complexities and limitations that cost enterprises valuable time, money and productivity. There is a strong need for a solution that is faster to deploy, simpler to use, and improves productivity rather than degrades it. In fact, the best solution would seamlessly and instantaneously personalizing the entire desktop, from profiles and printers to applications and extensions, while supporting license compliance and cost optimization. And, of course, it wouldn’t matter if the target desktops were physical, virtual, or cloud-based. FSLogix is delivering that solution today.

UNIQUE, CUTTING EDGE TECHNOLOGY

FSLogix has devised a revolutionary technique called Image Masking to create a single Unified Base Image that hides everything a logged in user shouldn’t see, providing predictable and real-time access to applications and profiles. This approach is driving unprecedented success in image reduction, with a side benefit of license cost optimization. Image masking functions identically across a wide range of Windows-based platforms, greatly simplifying the path from traditional to virtual environments, and dramatically reducing the management overhead required for enterprise desktops. This solution eliminates multiple layers of management infrastructure, creating a single, unified approach to image management, profile access, and application delivery.
A Flash Storage Technical and Economic Primer
Topics: tegile, storage, flash
Flash technology is rapidly evolving. Chances are the game has changed since you last checked. With every step forward, flash storage is becoming faster, more reliable, and less expensive. And there’s more than one kind of flash technology out there. Some flash focuses on performance, while others balance performance with capacity. Read this white paper for a technical breakdown of the latest in flash storage. Learn how flash has changed in the last few years, and how the economics have shifted.
Normal 0 false false false EN-US X-NONE X-NONE Although today’s NAND flash storage has its roots in 30-year-old technology, innovation has negated almost all of the challenges that are inherent in the media. Moreover, modern storage companies are taking even more software-based steps to further overcome such challenges. Between these advances, it’s clear that flash media use will continue to grow in the data center.
2016 Citrix Performance Management Report
This 2nd-annual research report from DABCC and eG Innovations provides the results of a comprehensive survey of the Citrix user community that explored the current state of Citrix performance management and sought to better understand the current challenges, technology choices and best practices in the Citrix community. The survey results have been compiled into a data rich, easily-digestible report to provide you with benchmarks and new insights into the best practices for Citrix performance m

Over the last decade, the Citrix portfolio of solutions has dramatically expanded to include Citrix XenApp, XenDesktop, XenServer, XenMobile, Sharefile and Workspace Cloud. And, the use cases for Citrix technologies have also expanded with the needs of the market. Flexwork and telework, BYOD, mobile workspaces, PC refresh alternatives and remote partner access are now common user paradigms that are all supported by Citrix technologies.

To deliver the best possible user experience with all these Citrix technologies, Citrix environments need to be well architected but also well monitored and managed to identify and diagnose problems early on and prevent issues from escalating and impacting end users and business processes.

This 2nd-annual research report from DABCC and eG Innovations provides the results of a comprehensive survey of the Citrix user community with a goal of exploring the current state of Citrix performance management and helping Citrix users better understand current challenges, technology choices and best practices in the Citrix community.

The survey results have been compiled into a data-rich, easy-to-digest report to provide you with benchmarks and new insights into the best practices for effective Citrix performance management.

User Profile and Environment Management with ProfileUnity
This whitepaper has been authored by experts at Liquidware Labs in order to provide guidance to adopters of desktop virtualization technologies. In this paper, we outline how ProfileUnity was designed to address many of the shortcomings of Roaming Profiles, and basic profile management tools that are just a step away from roaming profiles, in managing user profiles and user-authored data over multiple desktop platforms, including physical upgrades and refreshes, Windows migrations and moves to
User Profile Management on Microsoft Windows desktops continues to provide challenges.  Most Administrators find that Roaming Profiles and even Microsoft UEV generally fall short due to several factors. Profile Corruption, Lack of Customization, and lack of Enterprise Features are just some of the top shortcomings of Microsoft Windows profile management with these options.

Basic tools such as roaming profiles do not support a mixed operating environment, therefore it does not allow users to move among desktops with mixed profile versions, e.g. Windows 7, Windows 10, Server2008, 2012 r2, etc.

The lack of support of mixed OS versions makes Microsoft profile management methods a serious hindrance when upgrading/migrating operating systems. Microsoft profile management tools also only support very limited granular management, so admins do not have the ability to exclude bloated areas of a user profile or to include files and registry keys outside of the profile. Profile bloat is one of the number one reasons for long logon times on Windows desktops.

Most organizations who will upgrade from a previous Windows® OS, such as Windows 7, to Windows 10, will want the flexibility to move at their own pace and upgrade machines on a departmental or ‘as needed’ basis.  As a result, management of Microsoft profiles and migration become a huge challenge for these environments because neither operation is seamlessly supported or functional between the two operating systems.  

A user’s profile consists of nearly everything needed to provide a personalized user experience within Windows.  If one could separate out the user profile from Windows and enable dynamic profiles that can adapt to any Windows OS version, several advantages can be realized:
  • User state can be stored separately and delivered just-in-time to enable workers to roam from workspace to workspace
  • Users’ profiles can co-exist in mixed OS environments or automatically migrate from one OS to the next, making OS upgrades easy and essentially irrelevant during a point-in-time upgrade
  • Integral policies and self-managed settings, such as local and network printer management, as well as security policies, can be readily restored in the event of a PC failure or loss (disaster recovery)
Given the growing complexity and diversity of Windows desktops technologies, today’s desktop administrators are looking for better ways to manage user profiles across the ever-increasing spectrum of desktop platforms available. In this whitepaper, we will cover the issues inherent with Roaming Profiles and how ProfileUnity addresses these issues.
Vembu Changes the Dynamics of Data Protection for  Business Applications in a vSphere Environment
This paper examines how to use Vembu BDR to implement distributed backup and disaster recovery (DR) operations in a centrally managed data protection environment with an ingenious twist. Rather than store image backups of VMs and block-level backups of physical and VM guest host systems as a collection of backup files, Vembu BDR utilizes a document-oriented database as a backup repository, dubbed VembuHIVE, which Vembu virtualizes as a file system.
Normal 0 false false false EN-US X-NONE X-NONE In this analysis, openBench Labs assesses the performance and functionality of the Vembu Backup & Disaster Recovery (BDR) host-level (a.k.a. agentless) data protection solution in a VMware vSphere 5.5 HA Cluster. For this test they utilized a vSphere VM configured with three logical disks located on separate datastores to support an Exchange server with two mailbox databases. Each of the mailbox databases was configured to support 1,000 user accounts.

This paper provides technically savvy IT decision makers with the detailed performance and resource configuration information needed to analyze the trade-offs involved in setting up an optimal data protection and business continuity plan to support a service level agreement (SLA) with line of business (LoB) executives.

To test backup performance, they created 2,000 AD users and utilized LoadGen to generate email traffic. Each user received 120 messages and sent 20 messages over an 8-hour workday. Using this load level, we established performance baselines for a data protection using direct SAN-based agentless VM backups.

In this scenario they were able to :

  • Finish crash-consistent incremental agent-less backups in 18 minutes, while processing our base transaction load of 12 Outlook TPS.
  • Restore a fully functional VM in less than 5 minutes as a Hyper-V VM capable of sustaining an indefinite load of 4 Outlook TPS
  • Recover all user mailboxes as .pst files from a host-level agentless VM backup with no need to schedule a Windows Client backup initiated within the VM’s guest Windows OS.
In a DR scenario, Vembu leverages the ability to restore a VM in any format, to provide an Instant-boot function, When Vembu Backup Server is installed on a server that is concurrently running Hyper-V, Vembu exports the datastores associated with a VM backup as Hyper-V disks and configures a VM to boot from the datastores.