Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 16 of 22 white papers, page 1 of 2.
5 Fundamentals of Modern Data Protection
Some data protection software vendors will say that they are “agentless” because they can do an agentless backup. However, many of these vendors require agents for file-level restore, proper application backup, or to restore application data. My advice is to make sure that your data protection tool is able to address all backup and recovery scenarios without the need for an agent.
Legacy backup is costly, inefficient, and can force IT administrators to make risky compromises that impact critical business applications, data and resources. Read this NEW white paper to learn how Modern Data Protection capitalizes on the inherent benefits of virtualization to:
  • Increase your ability to meet RPOs and RTOs
  • Eliminate the need for complex and inefficient agents
  • Reduce operating costs and optimize resources
The Expert Guide to VMware Data Protection
Virtualization is a very general term for simulating a physical entity by using software. There are many different forms of virtualization that may be found in a data center including server, network and storage virtualization. When talking about server virtualization there are many unique terms and concepts that you may hear that are part of the technology that makes up server virtualization.
Virtualization is the most disruptive technology of the decade. Virtualization-enabled data protection and disaster recovery is especially disruptive because it allows IT to do things dramatically better at a fraction of the cost of what it would be in a physical data center.

Chapter 1: An Introduction to VMware Virtualization

Chapter 2: Backup and Recovery Methodologies

Chapter 3: Data Recovery in Virtual Environments

Chapter 4: Learn how to choose the right backup solution for VMware
How to avoid VM sprawl and improve resource utilization in VMware and Veeam backup infrastructures
You're facing VM sprawl if you're experiencing an uncontrollable increase of unused and unneeded objects in your virtual VMware environment. VM sprawl occurs often in virtual infrastructures because they expand much faster than physical, which can make management a challenge. The growing number of virtualized workloads and applications generate “virtual junk” causing VM sprawl issue. Eventually it can put you at risk of running out of resources.

You're facing VM sprawl if you're experiencing an uncontrollable increase of unused and unneeded objects in your virtual VMware environment. VM sprawl occurs often in virtual infrastructures because they expand much faster than physical, which can make management a challenge. The growing number of virtualized workloads and applications generate “virtual junk” causing VM sprawl issue. Eventually it can put you at risk of running out of resources.

Getting virtual sprawl under control will help you reallocate and better provision your existing storage, CPU and memory resources between critical production workloads and high-performance, virtualized applications. With proper resource management, you can save money on extra hardware.

This white paper examines how you can avoid potential VM sprawl risks and automate proactive monitoring by using Veeam ONE, a part of Veeam Availability Suite. Veeam ONE will arm you with a list of VM sprawl indicators and explain how you can pick up and configure a handy report kit to detect and eliminate VM sprawl threats in your VMware environment.

Read this FREE white paper and learn how to:

  • Identify “zombies”
  • Clean up garbage and orphaned snapshots
  • Establish a transparent system to get sprawl under control
  • And more!
A New Approach to Per User Application Management
Our premise is simple: existing methodologies for delivering and deploying Windows applications are based upon outmoded ideas and outdated technology. There remains a need for a product that makes it simple for each user to have their Windows applications individually tailored for their device. When a user logs on they should see only the applications that they are licensed to use regardless of whether they are using cloud, virtual or traditional desktops.
Normal 0 false false false EN-US X-NONE X-NONE

A simple truth: Current application delivery and deployment solutions for Windows®-based desktops are often not fast enough, and the methods employed introduce complexities and limitations that cost enterprises valuable time, money and productivity. There is a strong need for a solution that is faster to deploy, simpler to use, and improves productivity rather than degrades it. In fact, the best solution would seamlessly and instantaneously personalizing the entire desktop, from profiles and printers to applications and extensions, while supporting license compliance and cost optimization. And, of course, it wouldn’t matter if the target desktops were physical, virtual, or cloud-based. FSLogix is delivering that solution today.

UNIQUE, CUTTING EDGE TECHNOLOGY

FSLogix has devised a revolutionary technique called Image Masking to create a single Unified Base Image that hides everything a logged in user shouldn’t see, providing predictable and real-time access to applications and profiles. This approach is driving unprecedented success in image reduction, with a side benefit of license cost optimization. Image masking functions identically across a wide range of Windows-based platforms, greatly simplifying the path from traditional to virtual environments, and dramatically reducing the management overhead required for enterprise desktops. This solution eliminates multiple layers of management infrastructure, creating a single, unified approach to image management, profile access, and application delivery.
How VembuHIVE, a backup repository as a file system is changing the dynamics of Data Protection
MS Applications are a critical segment of the core systems managed and run in IT of most organizations. Backing them up is not enough. The effect of the backup process on your system and storage determines its efficiency. From this whitepaper, learn how VembuHIVE transforms the way backups are performed to achieve disaster-readiness.
It is imperative that Microsoft Applications like SQL, Exchange, Active Directory and many others have been instrumental in running some of the mission-critical processes of an IT setup. While there are many solutions that address its Data Protection concerns, efficient recovery from a storage medium has always been a pivotal issue. Read this white paper that includes performance and resource utilization reports on how Vembu BDR Suite with its in-house proprietary file system VembuHIVE, reduces the backup footprints on the storage repositories enabling quick recovery with minimal RTOs.
True 15-Minute RTO for Mission-Critical VMs using Vembu BDR Suite
Every minute counts when your mission-critical VMs are facing a downtime. Read this whitepaper to see how Vembu VM Replication helps you achieve the true industry-standard of 15-minute Recovery Time Objective (RTO).
When you are running critical VMs that are necessary to sustain your business, you must take all possible steps that are required to reduce their downtime. With every minute of downtime, you are losing business transactions, operations, customer trust and your brand value. Read this whitepaper to know how Vembu BDR helps protect the VM data in a simulated Online Transaction Processing scenario and achieves the industry-standard of 15 minute Recovery Time Objective.
Optimize RPO & RTO objectives while enhancing DR resilience with Vembu OffsiteDR
Being disaster-resistant is an essential requirement for any organization that is looking to ensure business continuity. Read this white paper to know how Vembu OffsiteDR helps you build a sound and resilient DR plan for your business.
As a data-driven business, a disaster plan is essential, even if it means that you’ll never need to use it. The statistics after the recent Hurricane Irma revealed that almost 40% of small businesses were never able to reopen due to extensive damages. With Vembu OffsiteDR, you can build a reliable and resilient DR strategy for your business as it replicates data from the onsite server instantaneously. You can set up a disaster recovery server in an offsite location, and when the primary server goes down, data can easily be restored from the offsite server.

Read this white paper to know more about how Vembu OffsiteDR works and why it is a suitable solution for your business.
How to Plan for Disaster Recovery
Disaster recovery scenario planning begins with identifying potential business interruption events. If you understand what the risks are, you can formulate a strategy of how to deal with them and mitigate, or at least limit, business impact. Once the disaster recovery scenarios are identified, the planning phase commences. This involves determining the probability of each scenario occurring and documenting the recovery operations.
Disaster recovery scenario planning begins with identifying potential business interruption events. If you understand what the risks are, you can formulate a strategy of how to deal with them and mitigate, or at least limit, business impact. Once the disaster recovery scenarios are identified, the planning phase commences. This involves determining the probability of each scenario occurring and documenting the recovery operations.
 
Although no prevention method is 100% fool proof, risk avoidance and taking proactive measures for preparedness are essential elements of the disaster recovery process. Still despite all the measures you take to avoid a disaster, you must assume that a disaster will happen. Having this mind-set will help shape your decisions when it comes to planning for IT disaster recovery.
UNC Health Care Leverages IGEL in Virtual Desktop Infrastructure Deployment
UNC Health Care selected IGEL Universal Desktop Converter (UDC) and IGEL Universal Management Suite (UMS) for simplicity, cost-savings and security. This document outlines key findings on how IGEL helps organizations manage entire fleets of thin clients from a single console. In addition, you will see how IGEL Universal Desktop Converter provides IT organizations with the flexibility they need to convert any compatible thin client, desktop or laptop computer into an IGEL thin client solution, wi

UNC Health Care selects IGEL Universal Desktop Converter (UDC) and IGEL Universal Management Suite (UMS) for simplicity, cost-savings and security.

“The need to provide users with access to their desktops from any device anywhere, anytime is driving a growing number of IT organizations to migrate toward VDI environments,” said Simon Clephan, Vice President of Business Development and Strategic Alliances, IGEL. “One of the key advantages that IGEL brings to the table is the simplicity that comes from being able to manage an entire fleet of thin clients from a single console. Additionally, the IGEL Universal Desktop Converter provides IT organizations with the flexibility they need to convert any compatible thin client, desktop or laptop computer into an IGEL thin client solution, without having to make an upfront investment in new hardware to support their virtualized infrastructures.” 

UNC Health Care selected the IGEL UDC and UMS software for its Citrix VDI deployment following a “bake-off” between thin client solutions. “IGEL won hands down due the simplicity and superiority of its management capabilities,” said James Cole, Technical Architect, UNC Health Care. “And, because the IGEL UDC software is designed to quickly and efficiently convert existing endpoint hardware into IGEL Linux OS-powered thin clients, we knew that by selecting the IGEL solution we would also realize a significant reduction in our capital expenditures.”

Since initiating the deployment of the IGEL UDC and UMS software, UNC Health Care has also experienced significant time savings. “Prior to deploying the IGEL UDC and UMS software, it took our team 25-30 minutes to create a virtual image on each system, not counting the personalization of the system for each use case, now that process takes less than 10 minutes, and even less time when converting the system to VDI roaming,” added Cole.

Additionally, the ease of integration between the IGEL UDC and IGEL UMS with Citrix XenDesktop and other solutions offered by Citrix Ecosystem partners, including Imprivata, has enabled secure access to the health care network’s Epic Systems’ Electronic Medical Records (EMR) system.

DR 101 EBook
Confused about RTOs and RPOs? Fuzzy about failover and failback? Wondering about the advantages of continuous replication over snapshots? Well, you’re in the right place. The Disaster Recovery 101 eBook will help you learn about DR from the ground up and assist you in making informed decisions when implementing your DR strategy, enabling you to build a resilient IT infrastructure.
Confused about RTOs and RPOs? Fuzzy about failover and failback? Wondering about the advantages of continuous replication over snapshots? Well, you’re in the right place. The Disaster Recovery 101 guide will help you learn about DR from the ground up and assist you in making informed decisions when implementing your DR strategy, enabling you to build a resilient IT infrastructure.

This 101 guide will educate you on topics like:
  • How to evaluate replication technologies
  • Measuring the cost of downtime
  • How to test your Disaster Recovery plan
  • Reasons why backup isn’t Disaster Recovery
  • Tips for leveraging the cloud
  • Mitigating IT threats like ransomware
Get your business prepared for any interruption, download the Disaster Recovery 101 eBook now!
Ovum: Igel's Security Enhancements for Thin Clients
Thin client vendor Igel is enhancing the security capabilities of its products, both under its own steam and in collaboration with technology partners. Ovum sees these developments as important for the next wave of thin client computing, which will be software-based – particularly if the desktop-as-a-service (DaaS) market is to take off.

With hardware-based thin client shipments in the region of 4–5 million units annually, this market is still a drop in the ocean compared to the 270 million PCs shipping each year, though the latter figure has been declining since 2011. And within the thin client market, Igel is in fourth place behind Dell and HP (each at around 1.2 million units annually) and China’s Centerm, which only sells into its home market.

However, the future for thin clients looks bright, in that the software-based segment of the market  (which some analyst houses refuse to acknowledge) is expanding, particularly for Igel. Virtual desktop infrastructure (VDI) technology has stimulated this growth, but the greatest promise is probably in the embryonic DaaS market, whereby enterprises will have standard images for their workforce hosted by service providers.

Application & Desktop Delivery for Dummies
In this book, you learn how solutions, such as Parallels Remote Application Server (RAS), replace traditional application deployment with on-demand application delivery, and why it's right for your organization.
Applications are essential to the businesses and organizations of all sizes and in all industries. End-users need to have continuous and reliable access to their applications whether working in the office or remotely, at any time of the day or night, and from any device. With the advent of cloud computing, office desktops with installed applications (that had to be constantly updated) have become a thing of the past — application streaming, virtual desktop infrastructure (VDI), and hosted applications are the future (and the present, for that matter). Application virtualization is an easy way to manage, distribute, and maintain business applications. Virtualized applications run on a server, while end-users view and interact with their applications over a network via a remote display protocol. Remote applications can be completely integrated with the user’s desktop so that they appear and behave like local applications. Today, you can dynamically publish applications to remote users in several ways. The server-based operating system (OS) instances that run remote applications can be shared with other users (a terminal services desktop), or the application can be running on its own OS instance on the server (a VDI desktop).
Become an Always-On Enterprise: How 6 Companies Revolutionized Ops to Achieve 24/7 Availability
Digital transformation is dramatically changing how the world interacts. Ensuring your services and applications are always available to employees - and customers - is essential to becoming a digital leader.
Digital transformation is dramatically changing how the world interacts. Ensuring your services and applications are always available to employees - and customers - is essential to becoming a digital leader.

The journey to Always-On application Availability begins with a close examination of your current infrastructure to determine the cause of unwanted downtime. From eliminating data loss and slow data recovery to minimizing risk and decreasing downtime, you can leverage Availability initiatives to jumpstart digital transformation, rapidly adapt to business changes and become an industry leader.

Read this eBook to learn how six companies achieved 24/7 Availability with help from Cisco and Veeam.
Top 5 Backup and DRaaS Considerations to Strengthen Your Multi-Cloud Strategy
Enterprise IT is embracing multi-cloud as the go-to model for cloud deployments. By 2019, nearly 81% of enterprises will have adopted a multi-cloud strategy. While this trend gives organizations more flexibility overall, it puts added pressure on IT teams to manage backup and recovery in a more complex environment.

Enterprise IT is embracing multi-cloud as the go-to model for cloud deployments. By 2019, nearly 81% of enterprises will have adopted a multi-cloud strategy. While this trend gives organizations more flexibility overall, it puts added pressure on IT teams to manage backup and recovery in a more complex environment.

To reduce complexity and lower costs, it is imperative to deploy a single platform that consolidates management for all of your needs - including both on-premises infrastructure and any public cloud platform you choose.

Which features and functions give you the best opportunity for multi-cloud success?

This special white paper, developed in conjunction with TechTarget, outlines the key factors to consider in maximizing your multi-cloud strategy to achieve:

  • Non-stop business continuity
  • Digital transformation agility
  • Analytics and visibility
  • And more!
The State of IT Resilience
Over 90% of business don’t consider themselves IT resilient, however the majority of these businesses view IT resilience to be foundational to successfully achieve digital transformation. Zerto has partnered with industry-leading research analyst firm, IDC, to get the pulse of the state of IT resilience and its correlation to business and digital transformation. Download the report to learn the key tenets of IT resilience, the challenges, opportunities and the 5 stages of maturity. Benchmark yo
Without IT Resilience, Digital Transformation (and Competitors) Will Pass You By

Over 90% of business don’t consider themselves IT resilient, however the majority of these businesses view IT resilience to be foundational to successfully achieve digital transformation.  Zerto has partnered with industry-leading research analyst firm, IDC, to get the pulse of the state of IT resilience and its correlation to business and digital transformation.

“IT resilience needs to be a key strategic priority for any forward-thinking organization and data protection needs to be top of mind for organizations in this resilience effort.” – IDC

Download the report to learn the key tenets of IT resilience, the challenges, opportunities and the 5 stages of maturity. Benchmark your IT organization and map your steps forward to achieve resilience and accelerate IT and digital transformation.
Is Your Citrix Monitoring Ready for Virtual Apps and Desktops 7.x?
Read this white paper by George Spiers, Citrix CTP and EUC Architect, where you will understand the changes in Virtual Apps and Desktops 7.x in detail and what types of monitoring best practices to adopt for ensuring top performance of your virtualized environment and outstanding user experience.

With XenApp 6.5 going EOL on June 30, 2018, organizations across the world are migrating to the latest version of Citrix Virtual Apps and Desktops 7.x. This upgrade comes with radical changes to Citrix architecture, configuration, policy settings, protocols and deployment models. There are many components in the Citrix architecture that have been replaced with new ones. And many have also been newly introduced. With such a strategic change in the Citrix environment, traditional methods of monitoring won't hold good.

Read this white paper by George Spiers, Citrix CTP and EUC Architect, where you will understand the changes in Virtual Apps and Desktops 7.x in detail and what types of monitoring best practices to adopt for ensuring top performance of your virtualized environment and outstanding user experience.

top25