NetBackup Encryption Option Info for Solution Engineers

Slides:



Advertisements
Similar presentations
Last lesson... what did we look at?. Today we will be looking at Creating a professional presentation to discuss ICT both inside and outside of school.
Advertisements

Seeking prime numbers quickly through parallel-computing Daniel J. Wright.
Systems Analysis and Design Feasibility Study. Introduction The Feasibility Study is the preliminary study that determines whether a proposed systems.
Online School Registration System Solomon Ng Pei-Yu Wang Evan Chiu Curtis Wong.
Chapter 2.
Software Design & Development Year 12. Structure of the Course Development and Impact of Software Solutions Development and Impact of Software Solutions.
Cloud Backup. Current Backup failures  Bad media (tapes have limited lifespan, HDD’s can fail)  Backup software fault  Operating system fault  Human.
Slide 1 Instructor: Dr. Hong Jiang Teaching Assistant: Mr. Sheng Zhang Department of Computer Science & Engineering University of Nebraska-Lincoln Classroom:
Oracle Database Administration. Rana Almurshed 2 course objective After completing this course you should be able to: install, create and administrate.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
Networking, Hardware Issues, SQL Server and Terminal Services Session VII.
Server Types Different servers do different jobs. Proxy Servers Mail Servers Web Servers Applications Servers FTP Servers Telnet Servers List Servers Video/Image.
Enterprise Product Implementation Process. Components of a Successful Implementation  A detailed Scope Document for customer review and signoff  Creation.
Selecting the Right Virtualization Technology Infrastructure Planning and Design Series.
IT 499 Bachelor Capstone Week 8. Adgenda Administrative Review UNIT Seven UNIT Eight Project UNIT Nine Preview Project Status Summary.
Requirements for Multi-Program Systems
Proposer: Mark Jones, SSE Panel Date: 20 th February : Mod Title: Amendment to AQ Values Present within Annex A of the CSEP NExA AQ Table Following.
Systems Development Life Cycle
IT 499 Bachelor Capstone Week 3. Adgenda Administrative Review UNIT two UNIT threeProject UNIT four Preview Project Status Summary.
RBSP Radiation Belt Storm Probes RBSP Radiation Belt Storm Probes 12/25/20151 Flight Software Template for Instrument Critical Design Review Gary M. Heiligman.
Accelerator for VMware backup
Outages. We have not been able to consolidate our outage postings to one OASIS site as planned We are working to address posting accuracy and outage path.
Introduce NetBackup Accelerator
Accelerator VMware backup best practices
Virtualization Assessment. Strategy for web hosting Reduce costs by consolidating services onto the fewest number of physical machines
VMware Recovery Software RECOVER DATA FROM CORRUPT VMDK FILE.
The Troubleshooting Process. Hardware Maintenance Make sure that the hardware is operating properly.  Check the condition of parts.  Repair or replace.
CJA 464 Week 2 DQ 2 What is the definition of policy implementation? How can policy implementation improve for better cooperation within the various elements.
HCS 446 Week 5 Learning Team Environmental Impact Presentation Develop a Microsoft ® PowerPoint ® presentation with 12 to15 slides and detailed speaker’s.
ACC 557 Week 2 DQ 1 Assuming the consumer is rational, how can utility affect their economic decisions? Does utility lead to more or less customer satisfaction?
Adjusting RMPTTOM to Reduce SRM Overhead Kevin Martin – McKesson
Unix Server Consolidation
Installation 1. Installation Sources
Environment Assessment
Cisco Data Virtualization
6WIND MWC IPsec Demo Scalable Virtual IPsec Aggregation with DPDK for Road Warriors and Branch Offices Changed original subtitle. Original subtitle:
Oracle Database Administration
Systems Design.
Presenter Name | Company Name
November 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [AES-256 for ] Date Submitted:
Business Risks of Insecure Networks
THE FEASIBILTY STUDY LECTURE-5.
Requirements and the Software Lifecycle
Project Management Complexity, Risks, Failure and Technology
October 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [AES-256 for ] Date Submitted: [17.
Writing a Memo Report Writing a Memo Report.
Relate to Clients on a business level
October 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [AES-256 for ] Date Submitted: [17.
Presenter Name | Company Name
Presenter Name | Company Name
BIC 10503: COMPUTER ARCHITECTURE
Project - Execution stage
Watch the Scope of Practice video
Multi Core Processing What is term Multi Core?.
Customer Overview Pack – July 2018
Presenter Name | Company Name
Customer Overview Pack – July 2018
Backup Monitoring – EMC NetWorker
Backup Monitoring – EMC NetWorker
CS/EE/ME 75(a) Nov. 19, 2018 Today: Prelimnary Design Review Homework.
Software Requirement and Specification
АВЛИГАТАЙ ТЭМЦЭХ ҮНДЭСНИЙ ХӨТӨЛБӨР /танилцуулга/
Presenter Name | Company Name
Slide #1: Topic Section.
PerformanceBridge Application Suite and Practice 2.0 IT Specifications
CMPE400 – Summer Training Presentation
Information technology
Presentation transcript:

NetBackup Encryption Option Info for Solution Engineers Original creation date: May 2005 For Internal Use Only 1 38 2

NetBackup Encryption Option implementation details Software based encryption affects backup performance on 2 levels Increases time to complete backup based on the bit-level of encryption CPU utilization increases at the client for both backup and recovery Recommend encrypting only customer related data An approximation of performance impact** See the Encryption Performance Notes in the NetBackup 5.1 datasheets section on VNET for more information on the test parameter and equipment used. The encryption option for 5.x (5.1 and higher) and NetBackup 6.0 are identical and function the same. In Summer 2005, the NetBackup team will perform more testing of the encryption option. VNET: http://prod.veritas.com/Products/vnet?c=collateral&refId=2 Preliminary performance tests for encryption showed the following. Additional performance testing will be done in summer 2005. Backup time increase Standard (128 / 256 bit) = 45-50% increase (128/256 bit) Legacy (40 / 56 bit) = 12-17% increase (40/56 bit) CPU utilization times Standard = 15% increase (128/256 bit) Legacy = 25% increase (40/56 bit) ** Internal VERITAS test data. Results will vary for customers based on data and hardware

Preliminary Encryption Option Performance - Baseline Note the relatively small performance difference between 128 & 256-AES. This slide shows the range of absolute values for CPU utilization and elapsed time from no encryption to 256-AES. We refer to this as prelimnary data because we have not measured performance with multi-processor machines and various types of data. For this reason we recommend proceeding with implementation on a step-by-step basis. A Full details of the test can be found at the VNET link below. VNET: http://prod.veritas.com/Products/vnet?c=collateral&refId=2