Overall Messaging/Description (We'll Want to Highlight
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Symantec™ Storage Foundation and High Availability 6.1 Release Notes - Linux
Symantec™ Storage Foundation and High Availability 6.1 Release Notes - Linux August 2015 Symantec™ Storage Foundation and High Availability Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Product version: 6.1 Document version: 6.1 Rev 7 Legal Notice Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, Veritas Storage Foundation, CommandCentral, NetBackup, Enterprise Vault, and LiveUpdate are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations, whether delivered by Symantec as on premises or hosted services. -
Protecting Miscrosoft® Hyper-V Environments
Protecting Miscrosoft® Hyper-V Environments Who should read this paper Technical White Papers are designed to introduce Veritas partners and end users to key technologies and technical concepts that are associated with the Veritas™ Backup and Recovery product family. The information within a Technical White Paper will assist partners and end users as they design and implement data protection solutions based on Veritas Backup and Recovery products. Technical White Papers are authored and maintained by the Veritas Backup and Recovery Technical Services group. Veritas Backup Exec™ 15 Technical White Paper Protecting Hyper-V Environments Contents Introduction.......................................................................................3 Business Value....................................................................................3 Underlying Backup Principles.........................................................................7 Virtualized Application Protection .....................................................................10 Virtual Machine Recovery Options ....................................................................12 Improved Usability for Virtual Environments.............................................................15 Example Hyper-V Configurations .....................................................................16 Performance Recommendations .....................................................................17 Notes and Best Practices ...........................................................................18 -
Cluster Server Installation Guide
Veritas™ Cluster Server Installation Guide Solaris 5.0 N18534F Veritas Cluster Server Installation Guide Copyright © 2006 Symantec Corporation. All rights reserved. Veritas Cluster Server 5.0 Symantec, the Symantec logo, Veritas are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THIS DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID, SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be “commercial computer software” and “commercial computer software documentation” as defined in FAR Sections 12.212 and DFARS Section 227.7202. Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 www.symantec.com Third-party legal notices Third-party software may be recommended, distributed, embedded, or bundled with this Symantec product. Such third-party software is licensed separately by its copyright holder. All third-party copyrights associated with this product are listed in the accompanying release notes. -
Volume Replicator Advisor User's Guide
Veritas™ Volume Replicator Advisor User’s Guide AIX, HP-UX, Linux, Solaris 5.0 N18466C Veritas Volume Replicator Advisor User’s Guide Copyright © 2006 Symantec Corporation. All rights reserved. Veritas Volume Replicator 5.0 Symantec, the Symantec logo, Veritas, and Veritas Storage Foundation are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THIS DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID, SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be “commercial computer software” and “commercial computer software documentation” as defined in FAR Sections 12.212 and DFARS Section 227.7202. Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 www.symantec.com Third-party legal notices Third-party software may be recommended, distributed, embedded, or bundled with this Symantec product. Such third-party software is licensed separately by its copyright holder. -
Altaro VM Backup Vs. Symantec Backup Exec Product Comparison
Altaro VM Backup vs. Symantec Backup Exec Product comparison [email protected] | www.altaro.com Altaro VM Backup vs. Symantec Backup Exec 2015 Altaro VM Backup 6 vs. Symantec Backup Exec 2015 The Backup Exec product is a long-standing member of the data protection market. Some aspects have not aged well, diminishing its attractiveness in the modern datacenter era. Executive Summary Backup Exec is not priced well in comparison to Altaro VM Backup. The confusing array of editions and individually-priced features makes it likely that a consultation will be necessary just to determine what a customer will need to purchase. While day-to-day usage of Backup Exec is likely to not be draining, initial deployment can be very difficult; it could take a substantial amount of time before options are correctly configured such that a backup job finishes successfully. Backup Exec has a very complicated installation path, made even more difficult by the need to select and purchase components separately. Backup Exec Weaknesses against Altaro VM Backup Heavy application requirements: Backup Exec is intended to be installed on a dedicated server, and its console and primary backup components are resource-intensive enough to justify it. It cannot be installed on Hyper-V Server or a Core installation of Windows Server. A Microsoft SQL instance is required (the Express edition is acceptable). Conversely, Altaro VM Backup can be installed directly on the system to manage and works perfectly well in Core environments, all without a heavy database system. Feature limitations: Backup Exec is designed as a modular system with a great many feature that are simply not available in the basic package. -
Veritas Backup Reporter 6.5 Installation Guide Veritas Backup Reporter Installation Guide
Veritas Backup Reporter 6.5 Installation Guide Veritas Backup Reporter Installation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 6.5 PN: : (HRO7210)SKU 11132088 Legal Notice Copyright © 2008 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions. Actionable Infrastructure™, Active Extensions™, ActiveAdmin™, Anti-Freeze™, Application Saver™, Backup Exec™, Bare Metal Restore™, BindView™, Bloodhound™, Bootguard™, Brightmail™, bv-Admin™, bv-Control™, CarrierScan™, CleanSweep™, ColorScale™, CommandCentral™, Confidence Online™, CrashGuard™, Day-End Sync™, dbAnywhere™, DeepSight™, Defender™, Digital Immune System™, DiskDoubler™, DiskLock™, Drive Image™, Enterprise Security Manager™, Enterprise Vault™, FlashSnap™, FlowChaser™, Ghost Walker™, Ghost™, GoBack™, Healthy PC™, i3™, iCommand™, I-Gear™, Indepth™, Information Integrity™, Intellicrypt™, Intruder Alert™, LiveUpdate™, LiveState™, Mail-Gear™, ManHunt™, ManTrap™, MicroMeasure™, Mobile Update™, NetBackup™, NetProwler™, NetRecon™, Norton™, Norton 360™, Norton AntiSpam™, Norton AntiVirus™, Norton Commander™, Norton Editor™, Norton Guides™, Norton Internet Security™, Norton Mobile Essentials™, Norton Password Security™, Norton SystemWorks™, Norton Utilities™, Norton WinDoctor™, OmniGuard™, OpForce™, PartitionMagic™, pcAnywhere™, PowerQuest™, PowerVPN™, Procomm™, Procomm Plus™, -
VERITAS Cluster Server 4.0 Installation Guide for Linux
VERITAS Cluster Server 4.0 Installation Guide Linux N10923H August 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes no warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. VERITAS Software Corporation shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual. VERITAS Legal Notice Copyright © 1998-2004 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS logo, VERITAS Cluster Server, and all other VERITAS product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation. VERITAS and the VERITAS logo, Reg. U.S. Pat. & Tm. Off. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. VERITAS Software Corporation 350 Ellis Street Mountain View, CA 94043 USA Phone 650–527–8000 Fax 650–527–2908 www.veritas.com Third-Party Copyrights Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. “License” shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. “Licensor” shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. “Legal Entity” shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. -
Veritas™ Volume Manager Administrator's Guide: HP-UX 11I V3
Veritas™ Volume Manager Administrator's Guide HP-UX 11i v3 5.1 Service Pack 1 Veritas™ Volume Manager Administrator's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Product version: 5.1 SP1 Document version: 5.1SP1.1 Legal Notice Copyright © 2011 Symantec Corporation. All rights reserved. Symantec, the Symantec logo, Veritas, Veritas Storage Foundation, CommandCentral, NetBackup, Enterprise Vault, and LiveUpdate are trademarks or registered trademarks of Symantec corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. -
Symantec™ Storage Foundation for Oracle® RAC 6.2 Release Notes - Solaris
Symantec™ Storage Foundation for Oracle® RAC 6.2 Release Notes - Solaris August 2015 Symantec™ Storage Foundation for Oracle RAC Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Product version: 6.2 Document version: 6.2 Rev 3 Legal Notice Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, Veritas Storage Foundation, CommandCentral, NetBackup, Enterprise Vault, and LiveUpdate are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations, whether delivered by Symantec as on premises or hosted services. -
What's New in Backup Exec What’S New in Backup Exec Releases and Its Feature Packs
What's new in Backup Exec What’s New in Backup Exec releases and its feature packs This document includes the following topics: ■ What's New in Backup Exec releases from Backup Exec 16 to Backup Exec 21 ■ What's new in Backup Exec 21 ■ What's new in Backup Exec 20 Update 6 ■ What's new in Backup Exec 20 Update 5 ■ What's new in Backup Exec 20 Update 4 ■ What's new in Backup Exec 20 Update 3 ■ What's new in Backup Exec 20 Update 2 ■ What's new in Backup Exec 20 Update 1 ■ What's new in Backup Exec 20 ■ What's New in Backup Exec 16 Feature Pack 2 ■ What's New in Backup Exec 16 Feature Pack 1 ■ What's New in Backup Exec 16 What’s New in Backup Exec releases and its feature packs 3 What's New in Backup Exec releases from Backup Exec 16 to Backup Exec 21 What's New in Backup Exec releases from Backup Exec 16 to Backup Exec 21 This article lists the new features added from Backup Exec 16 to Backup Exec 21. For more information on these features, see the Backup Exec Administrator’s Guide. What's new in Backup Exec 21 Item Description Enhanced licensing experience Backup Exec users get an enhanced licensing experience. Connection with Veritas Entitlement Management System will be authenticated and updated licenses will be downloaded automatically. Backup Exec will also automatically synchronize licenses when maintenance contracts are renewed. Instance-based Licensing The Instance-based licensing model in Backup Exec is available in Bronze, Silver, and Gold packaging. -
Symantec™ Cluster Server 6.2.1 Installation Guide - Linux
Symantec™ Cluster Server 6.2.1 Installation Guide - Linux Platform Release OL7 UEK R3 April 2015 Symantec™ Cluster Server Installation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Product version: 6.2.1 Document version: 6.2.1 Rev 0 Legal Notice Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, Veritas Storage Foundation, CommandCentral, NetBackup, Enterprise Vault, and LiveUpdate are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations, whether delivered by Symantec as on premises or hosted services. -
Symantec Backup Exec™ 2012 Better Backup for All Data Sheet: Backup and Disaster Recovery
Symantec Backup Exec™ 2012 Better backup for all Data Sheet: Backup and Disaster Recovery Overview Symantec Backup Exec™ 2012 is one integrated product that protects virtual and physical environments, simplifies both backup and disaster recovery, and recovers data or systems at any scale, from an individual item to an entire server. Reduce business downtime with unparalleled recovery, powered by Symantec™ V-Ray technology, that restores entire servers, critical Microsoft® applications, and VMware® or Microsoft Hyper-V® virtual guests. Meet your recovery point and recovery time objectives with integrated bare metal, hardware-independent disaster recovery, “no-hardware disaster recovery” in a virtual environment, application recovery, and efficient granular restore of individual emails, files, and folders. Simultaneously reduce storage costs and increase backup speed with deduplication and archiving. Backup Exec 2012 delivers centralized management to easily extend your backup infrastructure across distributed environments and remote offices so physical or virtual server protection is easily managed as your business grows. With a sleek and streamlined administration console, Backup Exec 2012 makes it easier than ever to efficiently manage backup and recovery operations across your physical and virtual infrastructure. Backup Exec 2012 efficiently delivers advanced capabilities for VMware, Hyper-V, Windows®, Linux®, and Mac® backup and recovery, for both simple and complex IT environments. Key benefits Unified virtual and physical backup • Protect your virtual infrastructure with VMware and Hyper-V backup and recovery from the experts in virtual backup. Host- level backup, powered by V-Ray technology and integrated with VMware Data Protection APIs (application programming interfaces) and Microsoft® Volume Shadow Copy Service (VSS), enables backup of entire virtual guests and recovery at the virtual machine, virtual disk, application, and file/folder level.