Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 4 of 4 white papers, page 1 of 1.
True 15-Minute RTO for Mission-Critical VM Systems with Vembu VMBackup Replication
Vembu Backup & Disaster Recovery (BDR) provides IT with a Disaster Recovery Management (DRM) system capable of meeting even more aggressive RTO and RPO goals than the previous release. For highly active database-driven systems, Vembu VMBackup leverages VMtools and VMware Changed Block Tracking (CBT) to perform incremental backups in 15-minute intervals with minimal impact on query processing. As a result, IT can limit data loss to 15 minutes of processing on active mission critical VMs.

The only way to recover a VM with full functionality and full performance without performing an explicit restore operation is through VM replication. Maintaining a replica VM, however, requires frequent and potentially expensive update processes that involve both explicit backup and implicit restore operations. To enable the extensive use of replication by IT, VMBackup adds critical optimizations to both restore and replication operations that dramatically minimize overhead on ESXi hosts and production VMs to just VM snapshot processing. Specifically, a BDR Backup server running on a VM is able to leverage hot-add SCSI transfer mode to write logical disk and logical disk snapshot files directly to a vSphere datastore, without involving the ESXi host for anything more than creating a VM snapshot.

A key a value proposition for Vembu VMBackup is its ability to directly read and write all backup and restore data directly to and from a datastore snapshot. As a result, Vembu VMBackup offloads all I/O overhead from production VMs and ESXi hosts, which is critical for maintaining an aggressive DRM strategy in a highly active virtual environment. What’s more, the performance of Vembu VMBackup in openBench lab's test environment made it possible to enhance support for a mission-critical OLTP application running on a VM using a combination of incremental backups for backup and replication. As a result, they were able to comply with a 30-minute RPO, restore the VM to a production environment in 5 minutes, and return to full-production level processing of business transactions—850 cTPS—in under 15 minutes.

VMBackup adds a new replica management module that enables an IT administrator to fully manage an initial failover and later finalize failover or failback with consolidation. In addition, BDR backup server simplifies all management functions by eliminating the need to run a separate client module on a BDR backup server, which becomes its own client within the BDR reporting hierarchy.

Customer Solution Spotlight: Faster Database Reporting
Infinio Accelerator can improve database performance for reporting activities. By leveraging server-side resources for storage operations, Infinio can deliver IOPS at a microsecond response time, improving database reporting performance by minutes or even hours.
Normal 0 false false false EN-US X-NONE X-NONE

Infinio Accelerator can improve database performance for reporting activities. By leveraging server-side resources for storage operations, Infinio can deliver IOPS at a microsecond response time, improving database reporting performance by minutes or even hours.  See how two of Infinio’s customers saw drastic performance benefits in their database reporting activities.

Information Security with HC3
The security of your information and data is paramount to Scale Computing. In order to be agile in the ever-changing security landscape, all technology platforms must adapt quickly. Threat vectors from new avenues are emerging on a daily basis.
The security of your information and data is paramount to Scale Computing. In order to be agile in the ever-changing security landscape, all technology platforms must adapt quickly. Threat vectors from new avenues are emerging on a daily basis.

Our culture has always been about having an exceptionally efficient and focused engineering team. A tight-knit, highly skilled team of engineers and developers cuts back on the red tape and delay that may be present in other organizations and keeps the focus on what matters in this ever-changing and always demanding landscape: innovation, stability, and security for the customer. In keeping with this culture, we have built the HC3 appliance using our own proprietary software in combination with common building blocks of well-tested open source technologies.
Azure Security Center: A Complete Guide
Protect your cloud from malicious threats with Microsoft Azure Security Center. Download this guide and learn how to easily monitor and take action to ensure compliance with security standards.

Understand threats and take action to protect your hybrid cloud

A 2017 report from Intel Security notes that only 23% of organizations completely trust public clouds to keep their data secure. But with the right resources, it is possible for your organization to achieve both compliance and security in the cloud—without high costs, special expertise or performance setbacks.

Azure Security Center provides unified security management and advanced threat protection across hybrid cloud workloads. Using advanced analytics, it helps you detect potentially malicious activity and apply actions to ensure compliance with various security standards.

This guide will cover:

•    The fundamentals, and top six reasons for building a security solution that works
•    An overview of the main features, including security event collection and threat intelligence
•    A sneak peek of a simple, yet powerful management platform to help you simplify the creation of rules and streamline firewall configuration

Download this guide and learn how you can take advantage of Azure Security Center!