SlideShare a Scribd company logo
© 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.
The Challenges
Server virtualization has become a mainstream deployment due to its proven benefits: physical server consolidation,
cost reduction, efficiency, and flexibility. However, it can throw a monkey wrench into data protection processes.
Backup administrators must manage physical and virtual servers, consolidated workloads, and multiple hypervisors—
while often lacking virtualization skills and training.1
In addition, the ease of spinning up new VMs can leave
administrators unaware of unprotected assets, resulting in data vulnerabilities.
ESG recently asked IT professionals at both midmarket and enterprise organizations about their challenges in protecting
virtualized environments. In terms of all virtual server data protection challenges, the ability to validate both backup and
recovery success topped the list, closely followed by recoverability of data (Figure 1).2
Other top challenges included
response times for troubleshooting, gaps in protection, and simplified views across the virtual infrastructure. When
asked about the primary challenge, recoverability and validating backup and recovery success topped the list.
Figure 1. Top 7 Challenges of Protecting Virtual Server Environments
Source: Enterprise Strategy Group, 2014.
Ultimately, administrators of varying skill levels need solutions that not only ensure proper protection for all virtual
server data, but also enable them to quickly and easily monitor data protection status and tasks.
1 Source: ESG Research Report, Trends for Protection Highly Virtualized and Private Cloud Environments, June 2013.
2 Ibid.
28%
33%
27%
27%
44%
44%
41%
6%
8%
9%
9%
10%
11%
21%
0% 10% 20% 30% 40% 50%
Gaps in protection
Response time for troubleshooting backup
failures, policy violations, etc.
Simplified views across virtual
infrastructure
Identifying factors impacting the
performance of backup operations
Validating recovery success
Validating backup success
Recoverability of data
Which of the following would you characterize as challenges for protecting your organization’s
virtual server environment? Which would you consider to be your organization’s primary virtual
server data protection challenge? (Percent of respondents, N=325)
Primary virtual
server data
protection
challenge
All virtual
server data
protection
challenges
ESG Lab Review
Protecting Virtual Environments with Symantec Backup Exec 2014
Date: November 2014 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst
Abstract: This ESG Lab review documents hands-on testing of Symantec Backup Exec 2014, with a focus on ease of
management and flexible recovery options for virtual machine backups.
ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 2
© 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.
The Solution: Backup Exec 2014
Backup Exec 2014 is a full-featured backup and recovery solution for both virtual and physical environments. It supports
VMware and Hyper-V as well as Windows, Linux, and Macintosh environments, and includes full support for Windows
Server 2012/2012 R2. Key features include:
 Faster performance
 Image-based backups for VMware and Hyper-V
 Easy to implement, use, and manage
 Fast, versatile backup and restore options, including:
o Catalog-assisted granular recovery of objects, files, folders, applications, or VMs (including
Exchange, SharePoint, SQL Server, and Active Directory) directly from storage, with no mounting or
staging.
o Restore to different targets or hardware
o Restore to physical or virtual servers
 Backup to disk, tape, or cloud regardless of location
 Integrated block-level data deduplication – client, media server, or OST appliance
Powerful
Backup Exec 2014 offers faster backups, flexible backup methods, and the ability to monitor recovery success. An
updated deduplication engine adds to the performance improvement. In addition, each virtual backup stream can be
split into multiple streams, shrinking the time required as writes don’t have to wait for reads to complete. These are key
to managing the growing number of VMs that need protection while minimizing downtime and disruption; completing
backups within the backup window; and achieving recovery time objectives (RTOs). A multi-hypervisor protection
solution, Backup Exec 2014 is integrated with VMware vCenter and VMware APIs for Data Protection (VADP), as well as
Microsoft Hyper-V and VSS.
Integrated deduplication reduces data volumes to minimize storage requirements. Backup Exec 2014 leverages
VMware’s change block tracking feature (CBT), Windows Change Journal, and Symantec CBT for fast
incremental/differential backups and efficient deduplication. Global deduplication helps to ensure maximum savings by
eliminating duplication across all protected volumes.
Flexible
Backup Exec 2014 offers multiple backup and restore options, including restore from any full or incremental point in
time. Backup Exec 2014 was designed to support virtual, physical, or hybrid environments from a single management
console, eliminating the cost and complexity of point solutions.
 Agentless backup provides recovery of complete VMs, while optional agents (for coordination only, not data
movement) enable granular recovery using Symantec Granular Restore Technology (GRT). This enables IT to
quickly recover only the data needed without having to restore entire volumes.
 The workflow makes it simple to convert a running physical machine to a VM during the backup process
(P2V), restore a VM to a physical host (V2P), and restore a backup directly to a VM (B2V). These features are
useful for disaster recovery as well as workload migration.
ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 3
© 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.
Easy to Use
Backup Exec 2014 includes all the functionality that customers have counted on for many years, with simplified,
centralized views across the physical and virtual environment. Management is simple and fast using dashboards and
wizards. The interface includes the job monitor as well as server-centric management. A single backup job can be used
to backup and manage multiple servers. The “stages” method uses intuitive wizards with which IT can set up multi-step
backup jobs in just a few mouse clicks. In addition, Backup Exec 2014 automatically detects and protects new VMs that
come online or are created/cloned, ensuring that all data is safe. A free VMware plug-in enables full monitoring
capability through vCenter.
Figure 2 shows an overview of Backup Exec 2014. On the left are VMware or Hyper-V servers hosting multiple virtual
machines, including a virtual file server, SQL Server, and an optional Backup Exec VM. The Backup Exec server can be
physical (as show on the right) or virtual. In the upper right is the Backup Exec 2014 management interface.
Figure 2. Backup Exec 2014 Solution Overview
ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 4
© 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.
ESG Lab Tested
ESG Lab performed hands-on testing of Backup Exec 2014 via remote log-in. Testing was focused on simple, intuitive
management and flexible recovery options for virtual backups.
Simple, Intuitive Management
ESG Lab began by exploring the management interface. Backup Exec 2014 has combined the best of its previous GUI
features so that administrators can take advantage of both the server-centric and the job-centric views. These options
enable IT to tailor the management experience to accommodate particular workflows, applications, and administrators.
Figure 3 shows backup status detail for each server in the environment via the Backup and Restore tab. This tab enables
administrators to manage all activities from a single screen. From the Groups navigation pane on the left ESG Lab clicked
on the Physical group, and the physical servers were displayed in the top pane. The servers shown include a Hyper-V
host with a blue Windows logo indicating that it is hosting at least one VM. Other servers include two physical Windows
servers, two VMware hosts containing VMs, and one physical Linux server. For each server, administers can view current
backup status, the success or failure of the past week’s backup jobs, and the times of the last and next backups.
The bottom pane shows details of the Hyper-V host that is highlighted in the top portion. In the yellow portion of the
screen ESG Lab could see at a glance that there was one guest VM, and that it had never been backed up. The detail
screen displayed backup status and history for the VM.
It should be noted that Backup Exec 2014 will automatically discover any virtual or physical servers in the domain, and
can be configured to automatically back up what is discovers. This prevents organizations from having stranded assets
that remain unprotected.
Figure 3. Backup and Restore Tab
ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 5
© 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.
Next, ESG Lab created a backup job for two VMware VMs (w2012-a and w2008-b) on the pos72-vca host, and named
the job 2 Vm Backup. Using the workflow, the Lab created, scheduled, and executed both full and incremental backups.
Figure 4 shows the Job Monitor view. The top portion of the screen shows the job highlighted, including details about
the scheduled full and incremental backups. Details include the storage target, job type, current state, and schedule
details.
The bottom portion of the screen displays the job history and details, including servers, storage, type of job, and status;
administrators can click on each job for more detail. For example, the status of one backup job was listed as “Success
with Exceptions.” IT can drill down on that specific job to discover what the exceptions were. In addition, this screen
shows the throughput rate, byte count, and elapsed time for each job.
When multiple servers are selected for a backup job, Backup Exec 2014 presents a dialog box with the option to create a
single job with multiple servers, or to create individual jobs. This option enables administrators to create the workflow
that is most effective for the particular job.
Figure 4. Job Monitor
Delayed Catalog Option
The catalog portion of the backup enables granular recovery, letting IT recover individual files or application objects
instead of having to restore an entire volume to recover a single file. With Backup Exec 2014, Symantec provides the
option to make the catalog backup a separate task, and to delay that task for up to a week. This enables organizations to
speed their backups and save cataloging for later, ensuring that backups are completed within the backup window and
don’t interfere with production operations. A granular restore must wait for the catalog backup, but a full restore can be
executed without it, so using the delayed catalog option does not make the data vulnerable. Multiple delayed catalogs
can be configured for datasets that will be backed up multiple times within the week.
ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 6
© 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.
Highlighted in the red box in Figure 4 are details of the initial 2 Vm Backup job, which was configured with the catalog
backup as a separate job to run immediately after data backup. The jobs are separated out into four tasks: full data
backup; catalog backup; incremental backup; and incremental catalog backup.
The elapsed time column in Figure 4 indicates that the catalog portion of the task consumes some time. Adding the
times together provides the complete time for each backup job; in this example, the data portion of the full 2Vm backup
took 16:18, while the catalog portion took 6:25, for a total of 22:43 seconds. The incremental backup took 5:25 + 5:30 =
10:55.
In this case, the delayed catalog option would move almost 25% of the full backup time, and 50% of the incremental
backup time, to a more convenient window, while still enabling granular recovery of files application objects. Figure 5
shows the Delayed Catalog options screen.
Figure 5. Delayed Catalog Options
Finally, ESG Lab explored the additional monitoring options that Backup Exec 2014 provides. The top screen in Figure 6
shows the Jobs view, displaying all the jobs for the server pos72-vca. Several backup jobs and their details are listed, and
the 2 Vm Backup-Full job is highlighted. From this screen the administrator can click on a job and execute backup,
restore, and other tasks.
Backup Exec 2014 incudes a free vCenter plug-in to enable monitoring of virtual machines. The bottom of Figure 6 shows
the view from vCenter. The left navigation shows the pos72-vca host and the ESG folder containing three VMs: RHEL6-A,
W2008-B, and W2012-A. On the right are a summary screen at the top, and individual VMs listed on the bottom along
with their job status and details.
ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 7
© 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.
Figure 6. Jobs View and VMware vCenter View
Why This Matters
According to ESG research, business process improvement and reduction in operational expenditures are the
second most important considerations for justifying IT investments to business management.3
Making it
simpler and faster to ensure that the virtual environment is properly protected, and enabling administrators to
easily view the status of VM backups, help organizations save both time and money.
ESG Lab confirmed that Backup Exec 2014 is easy to use, with an intuitive GUI. Data protection status and
history are viewable at a glance. Data protection tasks can be managed using a job-centric or server-centric
view, with drill down capabilities for individual jobs. The Lab created a workflow for full and incremental
backups and found it extremely easy to set up, manage, and track. The Delayed Catalog option provides
additional flexibility to prioritize backup speed if needed, and the vCenter plug-in enables monitoring the
virtual environment from a single screen.
3 Source: ESG Research Report, 2014 IT Spending Intentions Survey, February 2014
ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 8
© 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.
Flexible Recovery Options
Backup Exec 2014 offers full and incremental recovery from any point in time, with options to restore to dissimilar
hardware or hosts, as well as enabling P2V, V2P, and B2V. These options enable organizations to not just protect data
and provide disaster recovery, but also maximize asset utilization and migrate workloads.
Backup Exec 2014 includes Symantec’s Granular Restore Technology (GRT) that leverages catalog entries, enabling IT to
simply search for individual files or application objects to be restored without having to stage them to proxy or disk first.
This capability lets IT restore only the object desired instead of an entire volume. It also vastly reduces the time and
effort required to mount multiple backup images and manually hunt for the specific file.
Search and Granular File Recovery
ESG Lab began this testing by adding folders containing Backup Exec 2014 administration guide PDF files for two VMs on
the ESX host named pos72-vca. The PDFs were added to a Windows 2008 VM (w2008-b) in a folder named Kerry, and to
a Windows 2012 VM (w2012-a) in a folder named Vinny. Next, the Lab backed up both VMs, and then deleted the
beadmin.pdf file.
To restore, ESG Lab clicked on Search from the Backup and Restore/Restores tab and selected the w2008-b and w2012-
a VMs. Restore menus are built based on the server selected, because these VMs only contained files, when the search
wizard prompted for what type of data to restore the only option was Search for file and folders (Figure 7, top). If there
had been other data types such as Exchange or SharePoint, those options would have also been displayed. Next, the Lab
selected the appropriate backup period, entered the file name beadmin.pdf, and clicked search. As shown in the bottom
left of Figure 7, the file was located on the server, and the Lab selected it and click Next.
Figure 7. Search and Granular File Recovery
ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 9
© 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.
Next, the wizard prompted for a restore location. As shown in the bottom right of Figure 7, ESG Lab selected the option
to restore to a different location, in this case, a different server (pos37). This method of moving data might be used for
disaster recovery. Two alerts were displayed to ensure a successful recovery, along with links to additional information:
1) to confirm sufficient disk space for restoring volumes with Windows deduplication, which would be restored in full
and non-deduplicated; and 2) to inform the administrator that some file system attributes might not be available with
redirected restores. Once all screens had been completed the file was restored.
Granular SQL Server Restore
Many granular database recovery options require that the log files be included in the backup schema, a job often done
in a separately executed backup job, after which the log files can be cleared. Backup Exec 2014 offers an optional agent
for applications and database that enables integrated log-file backup and granular recovery options. It should be noted
that when using GRT and VADP, the agent does not execute the backup, it only captures metadata for integrated
granular recovery.
ESG Lab tested this feature and demonstrated the ability to restore from one screen. The Lab created a SQL database
called ESGTestDatabase1 on the w2008-a VM on ESX host pos72-vca, and ran a GRT-enabled backup of the host to
include this database. Once the backup was complete, the Lab deleted that database on the production VM.
Next, from the Backup and Restore tab showing all servers, the Lab selected the ESX host pos72-vca (Figure 8, top). After
highlighting the w2008-a VM in the lower panel, the Lab right-clicked and selected the option, Restore GRT-enabled
data for the selected virtual machine (circled in red). This launched the Restore Wizard. Through a series of screens, ESG
Lab created a restore job by selecting the database for restore to its original location, requesting a physical consistency
check, and selecting the option to leave the database in a ready-to-use state. No pre or post commands were enabled.
The job was named, a restore summary page was displayed, and the restore was initiated. The small test database was
restored quickly.
Figure 8. SQL Granular Restore
ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 10
© 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.
Figure 9 shows the SQL Management Studio view. On the left it shows the database that was created and backed up. In
the middle the database has been deleted, and on the right, it has been restored.
Figure 9. SQL Management Studio View
Why This Matters
The whole purpose of backup is for restore. As a result, data protection management applications should
make the backup process as simple and efficient as possible to minimize time and costs, and should maximize
restore capabilities to ensure data integrity and the fast return to productivity. While the option to restore
only the file or object you need instead of an entire volume is enticing for users and for IT, most solutions can
only provide this flexibility by requiring overhead-intensive agents that slow production.
Backup Exec 2014 delivers flexible restore options without the pain. Symantec’s GRT technology builds the
association back to the client for granular restore. As a result, organizations can enjoy the efficiency of VADP-
enabled, snapshot-based VM backups, as well as gaining granular, browse-able, searchable restore
functionality. ESG Lab validated the simplicity of searching for and recovering a specific file without having to
mount multiple backup images and manually locate what you want. ESG Lab also confirmed the ease of
restoring a single SQL database from a SQL Server VM in seconds, instead of restoring the entire SQL host over
many hours. Also, the ability to execute all restore tasks from a single screen dramatically simplifies the
restore process.
ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 11
© 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.
The Bigger Truth
Backup Exec 2014 is a full-featured data protection solution for virtual environments. We put that in bold text,
because there are still those who think of Backup Exec as a physical server solution, and that’s just not the case. If you
are looking for a way to ensure that your virtual workloads are safe (even those VMs that get created on the fly, that IT
doesn’t know about), and you want to validate the protection status of your VMs at a glance (even from vCenter), and
you want the option to recover individual application objects, and restore to different environments, Backup Exec 2014
has all the goods.
In addition, it is an all-in-one solution to protect every part of the data center, remote office, or small office. By
protecting both virtual and physical servers, it eliminates the need for separate backup applications, workflows, and
targets, reducing both costs and complexity. The GUI improvements are simple and intuitive, and enable administrators
to use the job-centric and/or server-centric views as desired. Symantec answered the complaints of some long-time
customers when they brought the job monitor back with Backup Exec 2014, and they should be commended for
incorporating client feedback into their solution. Also key are the flexible recovery options—including P2V, V2P, and
B2V—that are important for the workload mobility and infrastructure flexibility that are essential in today’s agile, virtual
environment.
ESG Lab has tested Symantec Backup Exec on a number of occasions. This testing focused on the management interface,
and we validated the ability to view your high-level VMware and Hyper-V protection status at a glance, drill down for
detail, and manage backup and recovery tasks from a single screen. ESG Lab also confirmed that Backup Exec 2014 can
deliver granular recovery with the option to delay the catalog backup to prioritize speed. The Lab was also able to easily
search for a file and restore only that file, as well as recovering a single SQL Server database, both features designed to
speed restore and keep both users and IT focused on production activities.
There are a few minor nits still to be included—an ad hoc catalog backup, for example, would let IT backup the catalog
at the time a granular recovery was needed. In addition, instant restart is still a road-map item for Backup Exec. But
these are non-essentials that don’t take away from the solution’s overall value as a complete solution for virtual data
protection.
The bottom line is that you don’t have to be a large organization to get a powerful, flexible, easy-to-manage data
protection solution for your virtual infrastructure. Backup Exec 2014 is the real deal.
The goal of ESG Lab reports is to educate IT professionals about data center technology products for companies of all types and sizes. ESG Lab reports are not
meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging
technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems
and identify any areas needing improvement. ESG Lab’s expert third-party perspective is based on our own hands-on testing as well as on interviews with
customers who use these products in production environments. This ESG Lab report was sponsored by Symantec.
All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy
Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This
publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy
format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S.
copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client
Relations at 508.482.0188.

More Related Content

PDF
VMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & Replication
PDF
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
PDF
Protecting Microsoft Exchange with the NEW Backup Exec 15
PDF
Fusion-io Virtualization Reference Architecture: Deploying Server and Desktop...
PDF
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
PDF
ConsoleWorks ITFM for VMware
PDF
Installation
PDF
havcs-410-101 a-2-10-srt-pg_2
VMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & Replication
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
Protecting Microsoft Exchange with the NEW Backup Exec 15
Fusion-io Virtualization Reference Architecture: Deploying Server and Desktop...
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
ConsoleWorks ITFM for VMware
Installation
havcs-410-101 a-2-10-srt-pg_2

What's hot (20)

PPTX
VMWARE Professionals - App Management
PDF
TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015
PDF
havcs-410-101 a-2-10-srt-pg_3
PPT
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
PDF
havcs-410-101 a-2-10-srt-_pg_1
PPTX
Sccm 2012
PDF
Operational Management Challenges for Converged Infrastructure
PDF
Nimboxx HCI AU-110x: A scalable, easy-to-use solution for hyperconverged infr...
PDF
-bheritas5fundamentals-
PDF
vRealize Operations (vROps) Management Pack for Cisco UCS User Guide
PDF
VMworld 2013: Health Care Applications Characterization in VMware Horizon View
PPT
How-To: WSUS Reporting Made Easier
PPTX
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
PDF
havcs-410-101 a-2-10-srt-pg_4
PDF
Backup Exec 2014 Technical White Paper - Protecting Microsoft Exchange
PDF
Kubisys-Product-Overview-1.2
PDF
Microsoft System Center Configuration Manager 2012 R2 Installation
PDF
MY EASY CENTER FOR SYSTEM CENTER CONFIGURATION MANAGER
PDF
Microsoft System Center Service Manager on a Single Computer
DOCX
Veerendra_2016_V2
VMWARE Professionals - App Management
TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015
havcs-410-101 a-2-10-srt-pg_3
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
havcs-410-101 a-2-10-srt-_pg_1
Sccm 2012
Operational Management Challenges for Converged Infrastructure
Nimboxx HCI AU-110x: A scalable, easy-to-use solution for hyperconverged infr...
-bheritas5fundamentals-
vRealize Operations (vROps) Management Pack for Cisco UCS User Guide
VMworld 2013: Health Care Applications Characterization in VMware Horizon View
How-To: WSUS Reporting Made Easier
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
havcs-410-101 a-2-10-srt-pg_4
Backup Exec 2014 Technical White Paper - Protecting Microsoft Exchange
Kubisys-Product-Overview-1.2
Microsoft System Center Configuration Manager 2012 R2 Installation
MY EASY CENTER FOR SYSTEM CENTER CONFIGURATION MANAGER
Microsoft System Center Service Manager on a Single Computer
Veerendra_2016_V2
Ad

Similar to ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014 (20)

PDF
Backup exec 2014 deduplication option white paper
PDF
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...
PDF
Top 10 Reasons to upgrade to BackupExec 2014
PDF
Techarex networks introduces disaster recovery as a service (draas) in united...
PDF
Benefits of VMware Monitoring Tools
PDF
VMworld 2013: Virtualization 101
PPTX
Emc recoverpoint technical
PDF
Protect HPE VM Essentials using Veeam Agents-a50012338enw.pdf
PDF
VMworld 2013: VMware vCenter Site Recovery Manager – Solution Overview and Le...
PDF
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
PDF
Storage for VMware vSphere IBM Storwize V7000 Unified Provides Enterprise-Cla...
PDF
VMware Site Recovery Manager
PDF
PDF
Cisco-HyperFlex-4-0-with-Veam-Backup-Replication-v11.pdf
PDF
Esg solution showcase considerations for protecting converged systems and ...
PDF
Dell EMC CloudIQ streamlined the user experience in five cloud-based storage ...
ODP
How to achieve better backup with Symantec
PDF
WHITE PAPER▶ Protecting VMware Environments with Backup Exec 15
PDF
Datasheet nbu 5230 appliance vs media server
PDF
SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...
Backup exec 2014 deduplication option white paper
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...
Top 10 Reasons to upgrade to BackupExec 2014
Techarex networks introduces disaster recovery as a service (draas) in united...
Benefits of VMware Monitoring Tools
VMworld 2013: Virtualization 101
Emc recoverpoint technical
Protect HPE VM Essentials using Veeam Agents-a50012338enw.pdf
VMworld 2013: VMware vCenter Site Recovery Manager – Solution Overview and Le...
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
Storage for VMware vSphere IBM Storwize V7000 Unified Provides Enterprise-Cla...
VMware Site Recovery Manager
Cisco-HyperFlex-4-0-with-Veam-Backup-Replication-v11.pdf
Esg solution showcase considerations for protecting converged systems and ...
Dell EMC CloudIQ streamlined the user experience in five cloud-based storage ...
How to achieve better backup with Symantec
WHITE PAPER▶ Protecting VMware Environments with Backup Exec 15
Datasheet nbu 5230 appliance vs media server
SEGURANÇA | BACKUP | LGPD | GDPR | 10 RAZÕES PARA OPTAR PELA SOLUÇÃO BACKUPEX...
Ad

More from Symantec (20)

PDF
Symantec Enterprise Security Products are now part of Broadcom
PDF
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
PDF
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
PDF
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
PDF
Symantec Webinar | National Cyber Security Awareness Month - Own IT
PDF
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
PDF
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
PDF
Symantec Mobile Security Webinar
PDF
Symantec Webinar Cloud Security Threat Report
PDF
Symantec Cloud Security Threat Report
PDF
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
PDF
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
PDF
Symantec Webinar | Tips for Successful CASB Projects
PDF
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
PDF
Symantec Webinar: GDPR 1 Year On
PDF
Symantec ISTR 24 Webcast 2019
PDF
Symantec Best Practices for Cloud Security: Insights from the Front Lines
PDF
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
PDF
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
PDF
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Enterprise Security Products are now part of Broadcom
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Mobile Security Webinar
Symantec Webinar Cloud Security Threat Report
Symantec Cloud Security Threat Report
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: GDPR 1 Year On
Symantec ISTR 24 Webcast 2019
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear

Recently uploaded (20)

PDF
System and Network Administration Chapter 2
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PPT
Introduction Database Management System for Course Database
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
How Creative Agencies Leverage Project Management Software.pdf
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
Online Work Permit System for Fast Permit Processing
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
ai tools demonstartion for schools and inter college
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
AI in Product Development-omnex systems
System and Network Administration Chapter 2
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Introduction Database Management System for Course Database
Understanding Forklifts - TECH EHS Solution
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
VVF-Customer-Presentation2025-Ver1.9.pptx
Adobe Illustrator 28.6 Crack My Vision of Vector Design
2025 Textile ERP Trends: SAP, Odoo & Oracle
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Upgrade and Innovation Strategies for SAP ERP Customers
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
How Creative Agencies Leverage Project Management Software.pdf
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Online Work Permit System for Fast Permit Processing
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
ai tools demonstartion for schools and inter college
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
AI in Product Development-omnex systems

ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014

  • 1. © 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved. The Challenges Server virtualization has become a mainstream deployment due to its proven benefits: physical server consolidation, cost reduction, efficiency, and flexibility. However, it can throw a monkey wrench into data protection processes. Backup administrators must manage physical and virtual servers, consolidated workloads, and multiple hypervisors— while often lacking virtualization skills and training.1 In addition, the ease of spinning up new VMs can leave administrators unaware of unprotected assets, resulting in data vulnerabilities. ESG recently asked IT professionals at both midmarket and enterprise organizations about their challenges in protecting virtualized environments. In terms of all virtual server data protection challenges, the ability to validate both backup and recovery success topped the list, closely followed by recoverability of data (Figure 1).2 Other top challenges included response times for troubleshooting, gaps in protection, and simplified views across the virtual infrastructure. When asked about the primary challenge, recoverability and validating backup and recovery success topped the list. Figure 1. Top 7 Challenges of Protecting Virtual Server Environments Source: Enterprise Strategy Group, 2014. Ultimately, administrators of varying skill levels need solutions that not only ensure proper protection for all virtual server data, but also enable them to quickly and easily monitor data protection status and tasks. 1 Source: ESG Research Report, Trends for Protection Highly Virtualized and Private Cloud Environments, June 2013. 2 Ibid. 28% 33% 27% 27% 44% 44% 41% 6% 8% 9% 9% 10% 11% 21% 0% 10% 20% 30% 40% 50% Gaps in protection Response time for troubleshooting backup failures, policy violations, etc. Simplified views across virtual infrastructure Identifying factors impacting the performance of backup operations Validating recovery success Validating backup success Recoverability of data Which of the following would you characterize as challenges for protecting your organization’s virtual server environment? Which would you consider to be your organization’s primary virtual server data protection challenge? (Percent of respondents, N=325) Primary virtual server data protection challenge All virtual server data protection challenges ESG Lab Review Protecting Virtual Environments with Symantec Backup Exec 2014 Date: November 2014 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst Abstract: This ESG Lab review documents hands-on testing of Symantec Backup Exec 2014, with a focus on ease of management and flexible recovery options for virtual machine backups.
  • 2. ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 2 © 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved. The Solution: Backup Exec 2014 Backup Exec 2014 is a full-featured backup and recovery solution for both virtual and physical environments. It supports VMware and Hyper-V as well as Windows, Linux, and Macintosh environments, and includes full support for Windows Server 2012/2012 R2. Key features include:  Faster performance  Image-based backups for VMware and Hyper-V  Easy to implement, use, and manage  Fast, versatile backup and restore options, including: o Catalog-assisted granular recovery of objects, files, folders, applications, or VMs (including Exchange, SharePoint, SQL Server, and Active Directory) directly from storage, with no mounting or staging. o Restore to different targets or hardware o Restore to physical or virtual servers  Backup to disk, tape, or cloud regardless of location  Integrated block-level data deduplication – client, media server, or OST appliance Powerful Backup Exec 2014 offers faster backups, flexible backup methods, and the ability to monitor recovery success. An updated deduplication engine adds to the performance improvement. In addition, each virtual backup stream can be split into multiple streams, shrinking the time required as writes don’t have to wait for reads to complete. These are key to managing the growing number of VMs that need protection while minimizing downtime and disruption; completing backups within the backup window; and achieving recovery time objectives (RTOs). A multi-hypervisor protection solution, Backup Exec 2014 is integrated with VMware vCenter and VMware APIs for Data Protection (VADP), as well as Microsoft Hyper-V and VSS. Integrated deduplication reduces data volumes to minimize storage requirements. Backup Exec 2014 leverages VMware’s change block tracking feature (CBT), Windows Change Journal, and Symantec CBT for fast incremental/differential backups and efficient deduplication. Global deduplication helps to ensure maximum savings by eliminating duplication across all protected volumes. Flexible Backup Exec 2014 offers multiple backup and restore options, including restore from any full or incremental point in time. Backup Exec 2014 was designed to support virtual, physical, or hybrid environments from a single management console, eliminating the cost and complexity of point solutions.  Agentless backup provides recovery of complete VMs, while optional agents (for coordination only, not data movement) enable granular recovery using Symantec Granular Restore Technology (GRT). This enables IT to quickly recover only the data needed without having to restore entire volumes.  The workflow makes it simple to convert a running physical machine to a VM during the backup process (P2V), restore a VM to a physical host (V2P), and restore a backup directly to a VM (B2V). These features are useful for disaster recovery as well as workload migration.
  • 3. ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 3 © 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved. Easy to Use Backup Exec 2014 includes all the functionality that customers have counted on for many years, with simplified, centralized views across the physical and virtual environment. Management is simple and fast using dashboards and wizards. The interface includes the job monitor as well as server-centric management. A single backup job can be used to backup and manage multiple servers. The “stages” method uses intuitive wizards with which IT can set up multi-step backup jobs in just a few mouse clicks. In addition, Backup Exec 2014 automatically detects and protects new VMs that come online or are created/cloned, ensuring that all data is safe. A free VMware plug-in enables full monitoring capability through vCenter. Figure 2 shows an overview of Backup Exec 2014. On the left are VMware or Hyper-V servers hosting multiple virtual machines, including a virtual file server, SQL Server, and an optional Backup Exec VM. The Backup Exec server can be physical (as show on the right) or virtual. In the upper right is the Backup Exec 2014 management interface. Figure 2. Backup Exec 2014 Solution Overview
  • 4. ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 4 © 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved. ESG Lab Tested ESG Lab performed hands-on testing of Backup Exec 2014 via remote log-in. Testing was focused on simple, intuitive management and flexible recovery options for virtual backups. Simple, Intuitive Management ESG Lab began by exploring the management interface. Backup Exec 2014 has combined the best of its previous GUI features so that administrators can take advantage of both the server-centric and the job-centric views. These options enable IT to tailor the management experience to accommodate particular workflows, applications, and administrators. Figure 3 shows backup status detail for each server in the environment via the Backup and Restore tab. This tab enables administrators to manage all activities from a single screen. From the Groups navigation pane on the left ESG Lab clicked on the Physical group, and the physical servers were displayed in the top pane. The servers shown include a Hyper-V host with a blue Windows logo indicating that it is hosting at least one VM. Other servers include two physical Windows servers, two VMware hosts containing VMs, and one physical Linux server. For each server, administers can view current backup status, the success or failure of the past week’s backup jobs, and the times of the last and next backups. The bottom pane shows details of the Hyper-V host that is highlighted in the top portion. In the yellow portion of the screen ESG Lab could see at a glance that there was one guest VM, and that it had never been backed up. The detail screen displayed backup status and history for the VM. It should be noted that Backup Exec 2014 will automatically discover any virtual or physical servers in the domain, and can be configured to automatically back up what is discovers. This prevents organizations from having stranded assets that remain unprotected. Figure 3. Backup and Restore Tab
  • 5. ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 5 © 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved. Next, ESG Lab created a backup job for two VMware VMs (w2012-a and w2008-b) on the pos72-vca host, and named the job 2 Vm Backup. Using the workflow, the Lab created, scheduled, and executed both full and incremental backups. Figure 4 shows the Job Monitor view. The top portion of the screen shows the job highlighted, including details about the scheduled full and incremental backups. Details include the storage target, job type, current state, and schedule details. The bottom portion of the screen displays the job history and details, including servers, storage, type of job, and status; administrators can click on each job for more detail. For example, the status of one backup job was listed as “Success with Exceptions.” IT can drill down on that specific job to discover what the exceptions were. In addition, this screen shows the throughput rate, byte count, and elapsed time for each job. When multiple servers are selected for a backup job, Backup Exec 2014 presents a dialog box with the option to create a single job with multiple servers, or to create individual jobs. This option enables administrators to create the workflow that is most effective for the particular job. Figure 4. Job Monitor Delayed Catalog Option The catalog portion of the backup enables granular recovery, letting IT recover individual files or application objects instead of having to restore an entire volume to recover a single file. With Backup Exec 2014, Symantec provides the option to make the catalog backup a separate task, and to delay that task for up to a week. This enables organizations to speed their backups and save cataloging for later, ensuring that backups are completed within the backup window and don’t interfere with production operations. A granular restore must wait for the catalog backup, but a full restore can be executed without it, so using the delayed catalog option does not make the data vulnerable. Multiple delayed catalogs can be configured for datasets that will be backed up multiple times within the week.
  • 6. ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 6 © 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved. Highlighted in the red box in Figure 4 are details of the initial 2 Vm Backup job, which was configured with the catalog backup as a separate job to run immediately after data backup. The jobs are separated out into four tasks: full data backup; catalog backup; incremental backup; and incremental catalog backup. The elapsed time column in Figure 4 indicates that the catalog portion of the task consumes some time. Adding the times together provides the complete time for each backup job; in this example, the data portion of the full 2Vm backup took 16:18, while the catalog portion took 6:25, for a total of 22:43 seconds. The incremental backup took 5:25 + 5:30 = 10:55. In this case, the delayed catalog option would move almost 25% of the full backup time, and 50% of the incremental backup time, to a more convenient window, while still enabling granular recovery of files application objects. Figure 5 shows the Delayed Catalog options screen. Figure 5. Delayed Catalog Options Finally, ESG Lab explored the additional monitoring options that Backup Exec 2014 provides. The top screen in Figure 6 shows the Jobs view, displaying all the jobs for the server pos72-vca. Several backup jobs and their details are listed, and the 2 Vm Backup-Full job is highlighted. From this screen the administrator can click on a job and execute backup, restore, and other tasks. Backup Exec 2014 incudes a free vCenter plug-in to enable monitoring of virtual machines. The bottom of Figure 6 shows the view from vCenter. The left navigation shows the pos72-vca host and the ESG folder containing three VMs: RHEL6-A, W2008-B, and W2012-A. On the right are a summary screen at the top, and individual VMs listed on the bottom along with their job status and details.
  • 7. ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 7 © 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved. Figure 6. Jobs View and VMware vCenter View Why This Matters According to ESG research, business process improvement and reduction in operational expenditures are the second most important considerations for justifying IT investments to business management.3 Making it simpler and faster to ensure that the virtual environment is properly protected, and enabling administrators to easily view the status of VM backups, help organizations save both time and money. ESG Lab confirmed that Backup Exec 2014 is easy to use, with an intuitive GUI. Data protection status and history are viewable at a glance. Data protection tasks can be managed using a job-centric or server-centric view, with drill down capabilities for individual jobs. The Lab created a workflow for full and incremental backups and found it extremely easy to set up, manage, and track. The Delayed Catalog option provides additional flexibility to prioritize backup speed if needed, and the vCenter plug-in enables monitoring the virtual environment from a single screen. 3 Source: ESG Research Report, 2014 IT Spending Intentions Survey, February 2014
  • 8. ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 8 © 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved. Flexible Recovery Options Backup Exec 2014 offers full and incremental recovery from any point in time, with options to restore to dissimilar hardware or hosts, as well as enabling P2V, V2P, and B2V. These options enable organizations to not just protect data and provide disaster recovery, but also maximize asset utilization and migrate workloads. Backup Exec 2014 includes Symantec’s Granular Restore Technology (GRT) that leverages catalog entries, enabling IT to simply search for individual files or application objects to be restored without having to stage them to proxy or disk first. This capability lets IT restore only the object desired instead of an entire volume. It also vastly reduces the time and effort required to mount multiple backup images and manually hunt for the specific file. Search and Granular File Recovery ESG Lab began this testing by adding folders containing Backup Exec 2014 administration guide PDF files for two VMs on the ESX host named pos72-vca. The PDFs were added to a Windows 2008 VM (w2008-b) in a folder named Kerry, and to a Windows 2012 VM (w2012-a) in a folder named Vinny. Next, the Lab backed up both VMs, and then deleted the beadmin.pdf file. To restore, ESG Lab clicked on Search from the Backup and Restore/Restores tab and selected the w2008-b and w2012- a VMs. Restore menus are built based on the server selected, because these VMs only contained files, when the search wizard prompted for what type of data to restore the only option was Search for file and folders (Figure 7, top). If there had been other data types such as Exchange or SharePoint, those options would have also been displayed. Next, the Lab selected the appropriate backup period, entered the file name beadmin.pdf, and clicked search. As shown in the bottom left of Figure 7, the file was located on the server, and the Lab selected it and click Next. Figure 7. Search and Granular File Recovery
  • 9. ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 9 © 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved. Next, the wizard prompted for a restore location. As shown in the bottom right of Figure 7, ESG Lab selected the option to restore to a different location, in this case, a different server (pos37). This method of moving data might be used for disaster recovery. Two alerts were displayed to ensure a successful recovery, along with links to additional information: 1) to confirm sufficient disk space for restoring volumes with Windows deduplication, which would be restored in full and non-deduplicated; and 2) to inform the administrator that some file system attributes might not be available with redirected restores. Once all screens had been completed the file was restored. Granular SQL Server Restore Many granular database recovery options require that the log files be included in the backup schema, a job often done in a separately executed backup job, after which the log files can be cleared. Backup Exec 2014 offers an optional agent for applications and database that enables integrated log-file backup and granular recovery options. It should be noted that when using GRT and VADP, the agent does not execute the backup, it only captures metadata for integrated granular recovery. ESG Lab tested this feature and demonstrated the ability to restore from one screen. The Lab created a SQL database called ESGTestDatabase1 on the w2008-a VM on ESX host pos72-vca, and ran a GRT-enabled backup of the host to include this database. Once the backup was complete, the Lab deleted that database on the production VM. Next, from the Backup and Restore tab showing all servers, the Lab selected the ESX host pos72-vca (Figure 8, top). After highlighting the w2008-a VM in the lower panel, the Lab right-clicked and selected the option, Restore GRT-enabled data for the selected virtual machine (circled in red). This launched the Restore Wizard. Through a series of screens, ESG Lab created a restore job by selecting the database for restore to its original location, requesting a physical consistency check, and selecting the option to leave the database in a ready-to-use state. No pre or post commands were enabled. The job was named, a restore summary page was displayed, and the restore was initiated. The small test database was restored quickly. Figure 8. SQL Granular Restore
  • 10. ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 10 © 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved. Figure 9 shows the SQL Management Studio view. On the left it shows the database that was created and backed up. In the middle the database has been deleted, and on the right, it has been restored. Figure 9. SQL Management Studio View Why This Matters The whole purpose of backup is for restore. As a result, data protection management applications should make the backup process as simple and efficient as possible to minimize time and costs, and should maximize restore capabilities to ensure data integrity and the fast return to productivity. While the option to restore only the file or object you need instead of an entire volume is enticing for users and for IT, most solutions can only provide this flexibility by requiring overhead-intensive agents that slow production. Backup Exec 2014 delivers flexible restore options without the pain. Symantec’s GRT technology builds the association back to the client for granular restore. As a result, organizations can enjoy the efficiency of VADP- enabled, snapshot-based VM backups, as well as gaining granular, browse-able, searchable restore functionality. ESG Lab validated the simplicity of searching for and recovering a specific file without having to mount multiple backup images and manually locate what you want. ESG Lab also confirmed the ease of restoring a single SQL database from a SQL Server VM in seconds, instead of restoring the entire SQL host over many hours. Also, the ability to execute all restore tasks from a single screen dramatically simplifies the restore process.
  • 11. ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 11 © 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved. The Bigger Truth Backup Exec 2014 is a full-featured data protection solution for virtual environments. We put that in bold text, because there are still those who think of Backup Exec as a physical server solution, and that’s just not the case. If you are looking for a way to ensure that your virtual workloads are safe (even those VMs that get created on the fly, that IT doesn’t know about), and you want to validate the protection status of your VMs at a glance (even from vCenter), and you want the option to recover individual application objects, and restore to different environments, Backup Exec 2014 has all the goods. In addition, it is an all-in-one solution to protect every part of the data center, remote office, or small office. By protecting both virtual and physical servers, it eliminates the need for separate backup applications, workflows, and targets, reducing both costs and complexity. The GUI improvements are simple and intuitive, and enable administrators to use the job-centric and/or server-centric views as desired. Symantec answered the complaints of some long-time customers when they brought the job monitor back with Backup Exec 2014, and they should be commended for incorporating client feedback into their solution. Also key are the flexible recovery options—including P2V, V2P, and B2V—that are important for the workload mobility and infrastructure flexibility that are essential in today’s agile, virtual environment. ESG Lab has tested Symantec Backup Exec on a number of occasions. This testing focused on the management interface, and we validated the ability to view your high-level VMware and Hyper-V protection status at a glance, drill down for detail, and manage backup and recovery tasks from a single screen. ESG Lab also confirmed that Backup Exec 2014 can deliver granular recovery with the option to delay the catalog backup to prioritize speed. The Lab was also able to easily search for a file and restore only that file, as well as recovering a single SQL Server database, both features designed to speed restore and keep both users and IT focused on production activities. There are a few minor nits still to be included—an ad hoc catalog backup, for example, would let IT backup the catalog at the time a granular recovery was needed. In addition, instant restart is still a road-map item for Backup Exec. But these are non-essentials that don’t take away from the solution’s overall value as a complete solution for virtual data protection. The bottom line is that you don’t have to be a large organization to get a powerful, flexible, easy-to-manage data protection solution for your virtual infrastructure. Backup Exec 2014 is the real deal. The goal of ESG Lab reports is to educate IT professionals about data center technology products for companies of all types and sizes. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab’s expert third-party perspective is based on our own hands-on testing as well as on interviews with customers who use these products in production environments. This ESG Lab report was sponsored by Symantec. All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at 508.482.0188.