000000-ent vault tech overview-whitepaper

Upload: niller2

Post on 10-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/8/2019 000000-Ent Vault Tech Overview-whitepaper

    1/12

    VERSION INCLUDES TABLE OF CONTENTS STYLES

    W H I T E P A P E R

    VERITAS Enterpr ise V aul t

    TECHNICAL OVERVIEW

  • 8/8/2019 000000-Ent Vault Tech Overview-whitepaper

    2/12

    Copyright 2004 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS Logo and all other VERITAS product names and slogans are trademarks or registeredtrademarks of VERITAS Software Corporation. VERITAS, the VERITAS Logo Reg. U.S. Pat. & Tm. Off. Other product names and/or slogans mentioned herein may be trademarks orregistered trademarks of their respective companies. Specifications and product offerings subject to change without notice.

    2

    TABLE OF CONTENTS

    Introduction.................................................................................................................................................................3 Overall Model .............................................................................................................................................................4Scalability Large, Small, Across Platform and Through Time.................................................................................5

    Building Blocks Component Architecture...............................................................................................................5Open Storage Layer ...........................................................................................................................................6Indexing..................................................................................................................................................................7 Management .......................................................................................................................................................... 7

    Storage Independence...............................................................................................................................................7Security and Reliability ...............................................................................................................................................7Storage and Indexing .................................................................................................................................................8Archiving.....................................................................................................................................................................8 Knowledge Exploitation ..............................................................................................................................................8User Exploitation of Information .................................................................................................................................9

    Shortcuts ................................................................................................................................................................9Universal Shortcuts................................................................................................................................................9Shortcut Management............................................................................................................................................9Search Features...................................................................................................................................................10Offline Vault..........................................................................................................................................................10Outlook Add-On ...................................................................................................................................................10Outlook Web Access............................................................................................................................................10Archive Explorer ...............................................................................................................................................10Clientless Installation ...........................................................................................................................................10

    Corporate Exploitation of Information.......................................................................................................................11Summary Enterprise Vault ....................................................................................................................................11

  • 8/8/2019 000000-Ent Vault Tech Overview-whitepaper

    3/12

    Copyright 2004 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS Logo and all other VERITAS product names and slogans are trademarks or registeredtrademarks of VERITAS Software Corporation. VERITAS, the VERITAS Logo Reg. U.S. Pat. & Tm. Off. Other product names and/or slogans mentioned herein may be trademarks orregistered trademarks of their respective companies. Specifications and product offerings subject to change without notice.

    3

    INTRODUCTIONEnterprise Vault is designed to be a long term, highly scalable store for items of unstructured information. Now inits fifth version, Enterprise Vault delivers not only a scalable and robust storage system but also provides a widechoice of implementation scenarios addressing storage cost reduction and compliance driven information

    retention. The framework architecture allows Enterprise Vault to be populated by multiple information sources(Exchange, SharePoint, File Systems or customer applications) and, through the KVS Business Accelerators,provides seamless interaction for both organization and user exploitation of archived information. Enterprise Vaultenables a secondary, and optionally tertiary, tier of storage to be used behind the primary information source andapplies information lifecycle principles to these applications.

    The situations that Enterprise Vault is commonly employed to solve include:

    Application Storage Management: A major use of Enterprise Vault is to act as an online archive for older itemsthat are moved from primary application storage (e.g. Exchange) according to customer-defined policies. Thisenables the message store size to be controlled and so allows applications, for example Exchange, to focus ontheir strengths, namely the dynamic handling of incoming information and accessing more recent and morefrequently accessed items.

    Regulatory-driven retentionand discovery: Many organizations are required to keep all electronic informationfor long periods of time. This typically includes email, files share content, SharePoint content and instantmessages. Enterprise Vault can be used in conjunction with Exchange journaling to act as a secure repository foritems that need to be retained for defined periods of time for legal or regulatory reasons.

    Upgrade, Migration and Consolidation: Reducing Exchange or file server storage requirements generallymeans that more users can be housed or supported on each server, thus allowing server consolidation. Forexample, controlling mailbox size leads to improved Exchange system consolidation benefits, especially whenupgrading from Exchange version 5.5 to 2003. In addition to this, Enterprise Vault can also be used to minimizethe pain of a migration or upgrade by first slimming down the primary store and housing the bulk of the data inEnterprise Vault during the migration. The import and elimination of PST files is the strongest example of amigration and consolidation exercise that can be undertaken with Enterprise Vault.

    Knowledge Exploitation: In general, Enterprise Vault also acts as an "information warehouse" for personal andcorporate data, which can then be mined as a knowledge resource using the inbuilt index and search technology.Special purpose products such as Enterprise Vault Compliance and Discovery Accelerators then offer solutions tospecific problems such as regulatory surveillance and legal discovery.

    Operational Excellence: A good example of Enterprise Vault being able to increase the operational excellenceof any primary application is the area of SLAs for backup. Many organizations are finding that becauseapplications such as Exchange are growing so large they are no longer able to meet their SLA for restore. With amajority of data being moved out of the Exchange stores these SLAs can be planned and achieved. In addition,end users can service their own requests for old and lost information without consuming help desk oradministration resources.

  • 8/8/2019 000000-Ent Vault Tech Overview-whitepaper

    4/12

    Copyright 2004 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS Logo and all other VERITAS product names and slogans are trademarks or registeredtrademarks of VERITAS Software Corporation. VERITAS, the VERITAS Logo Reg. U.S. Pat. & Tm. Off. Other product names and/or slogans mentioned herein may be trademarks orregistered trademarks of their respective companies. Specifications and product offerings subject to change without notice.

    4

    OVERALL MODELEnterprise Vault provides a framework for archiving that gives choice to the organization and becomes therepository for all unstructured information in the enterprise. There are four layers within the framework which aredesigned to deliver specific functional capability. Together these layers form the framework:

    Enterprise Vault Framework

    The framework is designed to provide the ultimate in flexibility. The various elements of the framework aredesigned to operate together. At the heart of Enterprise Vault are the services themselves that provide support forall activities. Enterprise Vault typically runs on a dedicated server (or servers). A single installation can supportmultiple target systems, which can be of mixed types, and which are usually accessed via the local LAN. WAN

    The Universal Access Layer provides the services which allow end user and corporateaccess to the archive.

    The Open Storage Layer ensures Enterprise Vault supports the most appropriate storage anddelivers extended lifecycle management.

    The Core Vault Services are the fundamental capabilities allowing policy driven, scalablearchiving.

    The Information Sources Layer provides the components specific to archiving information fromapplications.

  • 8/8/2019 000000-Ent Vault Tech Overview-whitepaper

    5/12

    Copyright 2004 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS Logo and all other VERITAS product names and slogans are trademarks or registeredtrademarks of VERITAS Software Corporation. VERITAS, the VERITAS Logo Reg. U.S. Pat. & Tm. Off. Other product names and/or slogans mentioned herein may be trademarks orregistered trademarks of their respective companies. Specifications and product offerings subject to change without notice.

    5

    connection is also possible, with offline capability available to deliver optimum performance. No invasivesoftware needs to be installed on the target systems. For example, Exchange systems are accessed via MAPI, sothat Enterprise Vault appears as a busy user to the Exchange system when it is performing archiving. Anotherexample is that when placeholders are used for Windows file system archives, then an optional filter component

    must be installed on the file system, but this is a well-behaved plug-in to the standard Windows File System filtermechanism

    SCALABILITY LARGE, SMALL, ACROSS PLATFORM AND THROUGHTIMEA key goal of Enterprise Vault's design is scalability, and several aspects of its architecture contribute to this goal.Scalability refers not just to the fact that an initial Vault configuration can be designed to match any size ofcustomer scenario (large or small), but also to the fact that a Vault installation can then be extended incrementallyas the customer's requirement grows. The product imposes no explicit limits to growth. It has a component-baseddesign, and consists of function specific services such as the agents that archive items from various sources(Exchange, File Servers, Instant messaging, SharePoint or custom applications across platform), the storageservice that stores incoming items, the service that indexes them, the restoration service that restores them to theExchange message store, and Internet Server based functionality that delivers search, read and other

    functionality to end users and to calling applications.

    Enterprise Vault has no upper limits and in addition to this its hardware independence means that newtechnologies can be exploited through time to provide lowest cost TCO and reduced risk for the entire lifetime ofthe archive. It is important to remember that the lifetime of the archive is likely to be far longer than the lifetime ofthe storage system it is currently based on and this is a vital consideration when designing an archive repository.Specifically the Open Storage Layer is designed to provide long term independence from specific storagetechnologies.

    BUILDING BLOCKS COMPONENT ARCHITECTURETypically the key factor in configuringa performant archivingsystem is the rate of flow of

    items being archived fromthe target sources tostorage. Enterprise Vaultdelivers multiplemechanisms for archivingwhich are designed to meetindividual circumstances.Archiving can be due toscheduled services (e.g.archiving from file servers),ad hoc requests (e.g. PSTimport), continuous runningservices (e.g. Microsoft

    Exchange journal archive)or a mixture of these. Thelimiting factor in general isprocessor power, althoughof course slow storagedevices can act asbottlenecks. Within aparticular computer,Enterprise Vaults component services can themselves be replicated and tuned in terms of threads and memory,and Enterprise Vaults installation can be further scaled by adding computer power. This can be achieved either

  • 8/8/2019 000000-Ent Vault Tech Overview-whitepaper

    6/12

    Copyright 2004 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS Logo and all other VERITAS product names and slogans are trademarks or registeredtrademarks of VERITAS Software Corporation. VERITAS, the VERITAS Logo Reg. U.S. Pat. & Tm. Off. Other product names and/or slogans mentioned herein may be trademarks orregistered trademarks of their respective companies. Specifications and product offerings subject to change without notice.

    6

    by scaling upwards to take advantage of multiple CPU servers (up to 32-way servers, for example) and outwardsby distributing and replicating the services across multiple computers. For any particular configuration, potentialthroughput also tends to increase as more target servers are supported, since more parallelism can be achieved.

    Outward scaling is made easy by the building block approach. A building block is a single, self-containedEnterprise Vault system running on a computer (of any size in terms of CPUs). Enterprise Vault installations canbe configured and subsequently grown incrementally simply by adding more building blocks to increasethroughput potential. This approach also enables active-active fail-over solutions to be built, where the remainingbuilding blocks take over the work of a failed one, or active-passive fail-over where a spare building block standsby in case one of the active blocks fails.

    The above applies to a particular Enterprise Vault installation, or site, and of course an enterprise may deploymultiple Enterprise Vault installations to achieve their overall archiving requirements. This tends to be driven bygeography, Enterprise Vault being installed at each major site to deal with all the target systems at that site.

    OPEN STORAGE LAYERThe other key scalability factor is storage, that is the capacity to deal with the volume of archived information overtime. The Open Storage Layer is at the heart of Enterprise Vault's efficient utilization of storage technologies anddemonstrates the independent nature of Enterprise Vault while at the same time providing every organization withaccess to the most efficient storage systems. Firstly, for any particular Enterprise Vault installation, archives canbe spread across different devices to achieve higher throughput as well as better disaster proofing. At the sametime, the Enterprise Vault's basic physical storage containers ("Vault stores") are completely self-contained, sothere are no data structures that need to span an entire Enterprise Vault installation. The user visible containers,Vaults, are placed in Vault stores, and the Index for each Vault is self-contained and mapped 1-1 with that Vault.Each archived item is held in compressed form in an NTFS file, and within a Vault store the directory structure isdesigned so that both its depth and the number of files in any particular low-level directory node are limited. SQLdatabases are used as directories, mapping external archived item identifiers to their internal locations in Vaultstores, and these are mapped one per Vault store.

    A practical limit to growth of a Vault store is the fact that although the way the Vault stores items as individual fileslends itself to the use of incremental back-ups, when the number of files in a directory gets very large, there is a

    tendency for some back-up mechanisms to spend too long checking which files to back-up. As a result, the back-up window can become the limiting factor on growth in some circumstances. To address this, a Vault store can befurther partitioned to increase its scalability. Each partition is totally self-contained, so different partitions can evenbe placed on different devices if, for example, there is a migration to a different storage technology. The fact thatVaults in a partitioned Vault store may be spread across multiple partitions is completely transparent to the user.Within a Vault store, at any time one partition is live and is receiving new documents; at a certain point it can beclosed and rolled over to a new partition. So a Vault store can comprise several partitions, one live andreceiving new items, and the rest effectively closed (although they may have items deleted from them by theEnterprise Vault expiration service that deletes out-of-retention items). This means that older partitions arequiescent with regard to receiving new items, which in turn means that they can have different back-up strategiesapplied to them. Another aspect of storage scalability is the ability to collect files into larger container files andalso to further migrate files to even more cost-effective storage facilities as they age. This is achieved by usingEnterprise Vaults migrator/collector facility.

    Files in NTFS stores are initially stored as one file per archived item, however, they can later be collected intofewer, larger container files in order to optimize media utilization and to speed back up. The storage migratorservice can at the same time or later move these containers to a different location either on the same or adifferent storage technology. This enables a multi-step approach to storage to be taken. Initially archived itemsare stored in individual files to optimize single-instance sharing, transactional safety when archiving, and speed ofretrieval. Later, items can be aggregated into larger files to minimize storage occupancy and to speed back-up.Later still, these container files can be moved to lower cost storage. Finally on expiry of their retention periods, thefiles can be automatically deleted. The fact that items have been collected and/or migrated is transparent to end

  • 8/8/2019 000000-Ent Vault Tech Overview-whitepaper

    7/12

    Copyright 2004 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS Logo and all other VERITAS product names and slogans are trademarks or registeredtrademarks of VERITAS Software Corporation. VERITAS, the VERITAS Logo Reg. U.S. Pat. & Tm. Off. Other product names and/or slogans mentioned herein may be trademarks orregistered trademarks of their respective companies. Specifications and product offerings subject to change without notice.

    7

    users. Enterprise Vault is able to deliver end-to-end information lifecycle management to applications such asExchange providing the most cost-appropriate storage location throughout the lifetime o the information.

    INDEXING

    Full-text indexing is tightly integrated into Enterprise Vault with no separate licensing and/or installation required.Indexes are mapped 1-1 with Vaults, and their size relative to the information they index depends on the degreeof indexing being done. This degree of indexing is configurable (e.g. attributes only, full word, or phrase based).As the amount of content managed by Enterprise Vault grows, so does the index and from a manageabilityperspective there are optimum sizes for the size of an index. This can particularly affect the case of journal Vaults,where archived volumes can be very high. This is addressed by automatically rolling over Vaults as the indexlimit is met.

    MANAGEMENTA further contributor to scalability is scalable management, meaning that the administration load does notincrease linearly with the size of the installation. Initial configuration set up and subsequent incrementalextensions are easily done from the standard administration client, which is a Microsoft Management Consolesnap-in, from which multiple Enterprise Vault installations can be managed.

    Users can be bulk enabled for use by Enterprise Vault and new Exchange users can be auto-enabled furtherreducing the ongoing management overhead.

    STORAGE INDEPENDENCEAnother key point of Enterprise Vault's design is storage technology independence. All items are stored in normalNTFS files, so that any storage technology that can be presented as an NTFS volume, whether native Windowsor CIFS, can be used and there is no lock in to any particular storage type or supplier. Enterprise Vault can, forexample, be used with magnetic disk storage, optical storage, tape, SAN or NAS platforms. Items in EnterpriseVault are compressed and a single-instance of identical items is stored. As well as storing the items, attributes ofall items stored in Enterprise Vault are separately indexed, and their full contents (including messageattachments) may optionally be indexed as well.

    Enterprise Vault is independent of backup/restore technology and any well-behaved solution can be used. Inparticular, since each archived item (or complete message) ends up as a single file, incremental backups can beperformed rather than full Vault store backups.

    Similarly, industry standard HSM solutions can be used with the Vaults store and their use will be transparent tothe Vault.

    The Vaults storage migrator capability (part of the Open Storage Layer) additionally allows a primary/secondarystorage approach where archived items are further moved from their initial Vault storage location to anotherlocation on even more cost-effective storage solutions. Again, the same rules apply for the secondary store anytechnology presented as a Windows volume will work. This allows extended storage strategies to be adoptedwithout purchasing additional third-party solutions.

    As well as supporting NTFS file systems, Enterprise Vault supports the EMC Centera content addressable storethrough EMCs proprietary API. It also takes advantage of Centeras optional compliance capabilities to store itemretention periods derived from Enterprise Vault retention policies.

    SECURITY AND RELIABILITYA further major design goal is data security. The design aims to cope with any particular system or componentfailure without loss of data in transit. So, Enterprise Vault will save an item twice in exceptional failurecircumstances rather than losing it. It is extremely important, for example, that there is no risk of data loss whenmoving items from the Exchange store to Enterprise Vault. In this case a transactional approach is taken so that

  • 8/8/2019 000000-Ent Vault Tech Overview-whitepaper

    8/12

    Copyright 2004 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS Logo and all other VERITAS product names and slogans are trademarks or registeredtrademarks of VERITAS Software Corporation. VERITAS, the VERITAS Logo Reg. U.S. Pat. & Tm. Off. Other product names and/or slogans mentioned herein may be trademarks orregistered trademarks of their respective companies. Specifications and product offerings subject to change without notice.

    8

    items are not deleted from Exchange until they have been successfully written to Enterprise Vault and, if extrasafety is required, not until the Vault store itself has been backed up or replicated. Similarly the index and the datastore are always kept in synchronization and the product automatically detects and corrects situations where theindex gets out of step with the store due to a system component failure or loss of stored data.

    User authentication is Windows logon based on the standard Windows security mechanism a customer hasdeployed. If users have not already authenticated when trying to access Enterprise Vault the relevant componentwill challenge them using the appropriate method. Enterprise Vault maintains its own access lists that mapbetween authenticated users and the data containers that they are allowed to access. It also synchronizesaccess rights at folder level in Enterprise Vault targets such as mailboxes and public folders with access to thearchives corresponding to those folders. Note that the access controls on the actual archive files are fixed andthey simply restrict access to Enterprise Vault softwares service account; it is Enterprise Vault that controlsaccess to archives by authenticated users. This mechanism is secure and scalable, since it does not requireaccess lists, and more particularly access list changes, to be propagated on each individual file in the archive.

    A flexible audit capability records events to SQL databases. The audited events are totally configurable andinclude all administrative actions as well as all actions involving archived items and searches. This coversarchiving, viewing, restoring and deleting items.

    STORAGE AND INDEXINGAt the heart of Enterprise Vault are the storage and indexing services, which are closely coupled. All items beingarchived to Enterprise Vault are queued to the storage service, which stores them and initiates the indexingservice. The indexing service encapsulates the AltaVista engine. Selected attributes (especially mail attributes)are always indexed and the contents (header and attachments) are optionally indexed. If attachments can beconverted to text by the inbuilt Stellant (formerly INSO) converters then they can be indexed. This conversionprocess supports approx 200 different file types. Each archived item is stored as a single file, including an optionto retain and HTML text version, and the whole file is compressed. Within a Vault store, identical messages arestored once, although user-specific attributes (for example, users folder name, read/unread status) are alwayskept on a per user basis.

    In EMC Centera, the scope of sharing is a Centera installation rather than a Vault store, and sharing applies toindividual message attachments. This means that identical attachments to different messages are shared, as wellas attachments to multiple copies of the same message.

    The length of time that items are retained in Enterprise Vault is defined by retention policies. The userorganization sets up these policies, and every item stored in Enterprise Vault is associated with one of the definedretention policies. When items reach the age limits defined by their respective retention policies, they areautomatically deleted by Enterprise Vault's expiration service. When items in Enterprise Vault are deleted by theexpiration service, any matching shortcuts will then also be deleted from the Exchange store.

    ARCHIVINGA range of archiving services picks up items from target stores (for example, Exchange mailboxes, public folders,SharePoint workspaces) and queue then to the storage service. These archiving services use the appropriate

    Microsoft interfaces to access their target stores, for example, MAPI for Exchange. They select target items basedon the policy criteria defined by the administrator. As discussed above, these services take a transactionalapproach to the act of copying, archiving and deleting the items in order to avoid information loss.

    KNOWLEDGE EXPLOITATIONWe have now seen that Enterprise Vault can store unstructured data in such a way that the organization not onlyreduces TCO of application storage but it also reduces the risks involved with storing (and not storing) data. Butthere is little point in storing information if it cannot be exploited effectively. The Universal Access Layer inEnterprise Vault separates the two major access types and provides the services unique to each

  • 8/8/2019 000000-Ent Vault Tech Overview-whitepaper

    9/12

    Copyright 2004 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS Logo and all other VERITAS product names and slogans are trademarks or registeredtrademarks of VERITAS Software Corporation. VERITAS, the VERITAS Logo Reg. U.S. Pat. & Tm. Off. Other product names and/or slogans mentioned herein may be trademarks orregistered trademarks of their respective companies. Specifications and product offerings subject to change without notice.

    9

    User Exploitation. End users require that they can access their information in a seamless manner regardless ofwhether archiving has taken place.

    Corporate Exploitation. Usually to meet corporate regulations organizations are required to maintain informationfor a period of years and be able to access this information in a reliable manner in a fixed period of time.

    USER EXPLOITATION OF INFORMATIONThere are two basic methods of accessing items once they are in Enterprise Vault. Firstly, pointers to items inEnterprise Vault can be left behind in place of the original items in the Exchange store or files in the file system,and secondly, Enterprise Vault can be searched either using its associated search application or from its Outlookintegrated search facility.

    SHORTCUTSThe pointers are known as "shortcuts", and are small placeholder files that may optionally replace the originalitems when they are moved from the Exchange store to Enterprise Vault. Their size can be configured, includingan option that stores the complete message header text. These are "loosely coupled" one-way pointers to the

    items in Enterprise Vault, and they work in much the same way as Windows shortcuts, or "internet shortcuts" toExplorer. They can be moved around, mailed, and deleted but this does not affect the item stored in EnterpriseVault. From a shortcut the user can view the item (an action which temporarilyuploads the item from EnterpriseVault) or they can restore it to the Exchange store, but again these operations do not affect the item stored inEnterprise Vault. A further user function allows the shortcut to be deleted together with the item in EnterpriseVault, provided that the user has been granted delete permission.

    If an item is restored from Enterprise Vault then changed and subsequently stored again in the Vault, the modifiedversion will be stored as a new item in addition to the original version.

    Usually an Outlook user views archived items simply by double-clicking on shortcuts, which appear just likeregular messages, but with a distinct icon. However, their content may be viewed in auto-preview or preview-panemode and they can still be searched by Outlook search, as they are basically cut-down Exchange messages.

    Viewing the item does not result in that item being restored to Exchange.

    A similar mechanism optionally leaves either transparent placeholders or internet shortcuts behind when filesystem archiving is being performed.

    UNIVERSAL SHORTCUTSShortcuts can be configured to hold Internet l inks (URLs) to the archived items, which in the case of messagesmeans a link to the entire message and separate links to each attachment. Clicking on a shortcut will then causethe message to be rendered in a browser rather than being down-loaded in its Enterprise Vault format. What thismeans is that non-Outlook clients (e.g. Outlook Express or MAC or Open Source) can be used to view messagesfrom shortcuts, as long as they can read the shortcut itself. These universal shortcuts increase the reach ofEnterprise Vault and add more flexibility in its deployment.

    SHORTCUT MANAGEMENTShortcuts themselves can be automatically deleted after a period defined by a central policy, leaving the items inEnterprise Vault where they can still be accessed using the search application. The aim of this is to preventshortcuts themselves becoming an issue as they accumulate in users mailboxes. So, for example, the policycould be to archive messages from Exchange after 90 days with a retention period of 6 years, leaving shortcutsbehind. Then shortcuts can be automatically deleted after a year, leaving the archived items still searchable for afurther 5 years. In any case, shortcuts are automatically deleted when the matching items are deleted byEnterprise Vaults expiration service.

  • 8/8/2019 000000-Ent Vault Tech Overview-whitepaper

    10/12

    Copyright 2004 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS Logo and all other VERITAS product names and slogans are trademarks or registeredtrademarks of VERITAS Software Corporation. VERITAS, the VERITAS Logo Reg. U.S. Pat. & Tm. Off. Other product names and/or slogans mentioned herein may be trademarks orregistered trademarks of their respective companies. Specifications and product offerings subject to change without notice.

    10

    SEARCH FEATURESEnterprise Vaults Outlook integrated search facility allows accessible Vaults to be searched and then lets theuser view the returned messages, look at their structure and properties, restore them to the Exchange store, and(if permitted) delete them from Enterprise Vault.

    A separate web-based Enterprise Vault search application also allows items in Enterprise Vault to be searched,viewed as HTML, read with their native viewer, or restored to Exchange. They can also be deleted, subject topermission.

    Although items in Enterprise Vault are under retention control and are automatically deleted on expiry, users canmanually delete items from Enterprise Vault using the search application, but only if they have permission to doso.

    OFFLINE VAULTOffline Vault is an additional capability aimed at the user who is sometimes connected and sometimes workingoffline using Outlooks offline mode. This function copies items from the users local OSTs on their PCs into localVaults on the same PCs. When items are eventually archived on the server and replaced by shortcuts, the

    shortcuts will be replicated to their OSTs in the normal way. If the user is working offline and clicks on a shortcut,the item will be retrieved from the local Vault. If shortcuts do not have matching local items, then there is anautomatic mechanism that will record such items and then upload them from the central Vault when the user isnext connected. The aim is to maximize the information held on the PC, without unnecessarily loading up thenetwork to upload the items, while at the same time keeping copies of everything centrally for safety.

    OUTLOOK ADD-ONAn optional Outlook add-on delivers the end user functionality outlined above (although there is a separate web-based search/retrieve application, as described). This functionality includes the ability to read archived items fromshortcuts, to search Vaults, manually archive items, manually restore items, and delete items. The client can beconfigured by the customer to select which functionality is to be delivered to users. All of the client functionality isdelivered to the clients by the Enterprise Vault server via http connection to an IIS server. The client can beinstalled by any of the usual client software distribution methods and can also self-install from the customers

    intranet when the user first double-clicks on a shortcut. It is a quick and straightforward install.

    OUTLOOK WEB ACCESSOutlook Web Access users can also see and view shortcuts and access much of the same functionality as isavailable to users of the Outlook add-on described above.

    ARCHIVE EXPLORERArchive Explorer is designed to give users access to the archived information that comes from any source (e.g.Exchange and File Systems). It displays the folder hierarchy that the user is familiar with. This application isdelivered to the end user as a web page, which provides access to all the usual facilities offered to the end userincluding the search. Although it can be invoked via a button in the Outlook add-on, this access method is not tiedto Outlook and can simply be brought up in a browser.

    Offline Vault also includes a local version of Archive Explorer for accessing the local vault.

    CLIENTLESS INSTALLATIONArchive Explorer is one example of the clientless installations that can be achieved with Enterprise Vault. SinceArchive Explorer is delivered via IIS then there is no need for a client to be installed. However, this is not the onlyclientless installation. Universal Shortcuts can also be delivered to the client without the need for a client side add-on thus reducing the cost of implementation. The search tools can also be invoked as web pages or they can bedelivered to the client by a central scripting tool EVPM. This can create a folder in each user's mailbox that willlink directly to the search, which again is delivered by IIS.

  • 8/8/2019 000000-Ent Vault Tech Overview-whitepaper

    11/12

    Copyright 2004 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS Logo and all other VERITAS product names and slogans are trademarks or registeredtrademarks of VERITAS Software Corporation. VERITAS, the VERITAS Logo Reg. U.S. Pat. & Tm. Off. Other product names and/or slogans mentioned herein may be trademarks orregistered trademarks of their respective companies. Specifications and product offerings subject to change without notice.

    11

    CORPORATE EXPLOITATION OF INFORMATIONEnterprise access (rather than end-user access) to the archived information held in Enterprise Vault typicallyrequires very different methods than those demanded by the end user. Scalability and auditability are far more

    important to the corporate than seamless access demanded by the end user. The Business Accelerators ofEnterprise Vault (Discovery and Compliance Accelerators) provide the tools to perform message supervision,regulatory search and discovery across the entire Enterprise Vault. All of the accelerators are based on 3 majorfunctions

    Search: As all information held in Enterprise Vault is indexed then all information can be recalled in a very fastmanner. Searches for information that took weeks when looking at backups can take minutes using EnterpriseVault

    Workflow: Unlike the user search, corporate searches can take many people many days to complete. Usually areview process is part of the search and this will see many people with different security rights take part in thissearch. The business accelerators help minimize the cost of these searches by ensuring that the whole search iswrapped up in a workflow process along with the whole review process.

    Audit: Many regulatory bodies insist that the whole process is audited so that they can be assured as to theactions that were taken by these people involved in the process.

    All of the Business Accelerators extend the simple user searches by storing the searches for possible reuse andrecording all of the relevant audit data in SQL server. Mechanisms are also available for the external production ofthe items relevant to the discovery case under investigation.

    SUMMARY ENTERPRISE VAULTEnterprise Vault is a stand-alone software based solution that integrates with Microsoft Exchange, SharePointand IM and file system environments. Automatically archiving content onto low-cost online stores, it provideslifecycle management of information, with managed retention, store migration and eventual deletion. It eliminatesmailbox housekeeping load from users and administrators, offers dramatic time savings (from days to seconds) in

    recovering old or lost email and optimizes the management of content for adherence to regulatory and legalrequirements. Our customers report significantly improved service levels for Exchange recovery, a rapid ROI andlower TCO of Exchange.

    The key technical features of Enterprise Vault include:

    A flexible, scalable and resilient architecture based on the building blocks design of Enterprise Vault

    It allows organizations to use the most appropriate storage technology. The Open Storage Layer allowsvirtualization of the storage employed

    It enables enterprise-scale indexing as well as monitoring and management of the index as it grows to alloweven greater flexibility and dependability.

    It provides a fully secure archive. All access to the archive is based on Windows authentication and can beaudited if required.

    Through a rich set of client side tools it allows seamless access for ordinary users or advanced tools for powerusers. This gives customers the flexibility to create the client environment they requireIf the organization is involved with discovery requests, the departments dedicated to the task of retrieving andsubmitting the data can search the entire archive through a web-based tool, thereby reducing the IT departmentsworkload.

  • 8/8/2019 000000-Ent Vault Tech Overview-whitepaper

    12/12

    Copyright 2004 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS Logo and all other VERITAS product names and slogans are trademarks or registeredtrademarks of VERITAS Software Corporation. VERITAS, the VERITAS Logo Reg. U.S. Pat. & Tm. Off. Other product names and/or slogans mentioned herein may be trademarks orregistered trademarks of their respective companies. Specifications and product offerings subject to change without notice.

    12

    VERITAS Software CorporationCorporate Headquarters350 Ellis StreetMountain View, CA 94043650-527-8000 or 866-837-4827

    For additional information aboutVERITAS Software, its products, or thelocation of an office near you, please callour corporate headquarters or visit ourWeb site at www.veritas.com.