EMC At A Glance


Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Over the past few years, EMC has transformed virtually every part of its business—and always from the point of view of its customers. You may have noticed that EMC has changed in significant ways during the past several years and is considered as a leader in many areas. In fact, software and services accounted for 56% of our revenues in 2007. Note to Presenter: This presentation is designed to be modular, so that you can use these slides in conjunction with slides from other presentations, based on your customer’s/audience’s specific situation. Please review the Notes pages for key speaking points.
  • EMC At A Glance

    1. 1. EMC at a glance François Chazalon EMC EMEA South Regional Marketing Director
    2. 2. The Digital Information World in 2011 70% Will be created by individuals 85% Will be the responsibility of organizations to ensure information’s security, privacy, reliability, and compliance The Paradox of Responsibility… Source: IDC White Paper, "The Diverse and Exploding Digital Universe," Sponsored by EMC, March 2008 .. And the importance of information governance
    3. 3. New Challenges In The Information Economy <ul><li>Managing growth </li></ul><ul><li>Managing risk </li></ul><ul><li>Managing effectiveness </li></ul><ul><li>Creating new value </li></ul>Source: IDC White Paper, &quot;The Diverse and Exploding Digital Universe,&quot; Sponsored by EMC, March 2008 Digital Information Created and Replicated Worldwide 1,773 exabytes Exabytes 173 exabytes 0 200 400 600 800 1,000 1,200 1,400 DVD RFID Digital TV MP3 players Digital cameras Camera phones, VoIP Medical imaging, Laptops, Data center applications, Games Satellite images, GPS, ATMs, Scanners Sensors, Digital radio, DLP theaters, Telematics Peer-to-peer, Email, Instant messaging, Videoconferencing, CAD/CAM, Toys, Industrial machines, Security systems, Appliances 10-fold growth in five years! 1,600 1,800 AMOUNT OF DIGITAL INFORMATION CREATED AND REPLICATED EACH YEAR 2006 2007 2008 2009 2010 2011
    4. 4. The Enterprise Faces the Digital Universe <ul><li>By estimating what percent of the content is generated by various device types or applications – such as e-mail, surveillance, or MP3 players – it is possible to come up with the share of total that is: </li></ul><ul><ul><li>Security-intense – requires high standards of protection </li></ul></ul><ul><ul><li>Compliance-intense – is subject to government rules about retention, privacy, or protection </li></ul></ul><ul><ul><li>Preservation-intense – might reasonably be expected to be stored for 10 years or more </li></ul></ul><ul><li>Note how all three categories are growing! </li></ul>Source: IDC White Paper, &quot;The Diverse and Exploding Digital Universe,&quot; Sponsored by EMC, March 2008 PERCENTAGE OF THE DIGITAL UNIVERSE Security-Intense Compliance- Intense Preservation- Intense 0% 10% 20% 30% 40% 50% 2007 2011
    5. 5. From CIO of Technology To CFO of Information <ul><li>Challenges: </li></ul><ul><li>Information assets need to be managed and governed like financial assets </li></ul><ul><li>Information governance strikes balance between risk avoidance, cost reduction, value generation </li></ul><ul><li>Need excutive forum for discussion, policy setting, measurements </li></ul><ul><li>Opportunities: </li></ul><ul><li>Create case for corporate-level information governance </li></ul><ul><li>Deploy tools to discover information risks and opportunities </li></ul><ul><li>Follow through with: </li></ul><ul><ul><li>risk remediation capabilities </li></ul></ul><ul><ul><li>value-generating information integration capabilities </li></ul></ul><ul><ul><li>cost-reduction strategies </li></ul></ul>The Rise of Information Governance
    6. 6. From Information Security as a Problem To Information Security as a Strategy <ul><li>Challenges: </li></ul><ul><li>Information security breaches are mounting </li></ul><ul><li>Need to protect high-value information dynamically – at more granular level </li></ul><ul><li>No longer just IT problem </li></ul><ul><li>>80% IT and business execs say security concerns inhibit innovation / growth </li></ul><ul><li>Opportunities: </li></ul><ul><li>Give organizations the confidence to run their businesses without worry. </li></ul><ul><li>Create closed-loop system to address risk throughout its lifecycle. </li></ul><ul><li>Make information security a business strategy , not a business concern </li></ul>A New Focus: Information Risk Management
    7. 7. From Physical IT To Virtual IT <ul><li>Challenges: </li></ul><ul><li>Virtualization is creating a new paradigm for IT </li></ul><ul><ul><li>new cost structures </li></ul></ul><ul><ul><li>more responsive to the business </li></ul></ul><ul><ul><li>new strategic options </li></ul></ul><ul><li>Opportunities: </li></ul><ul><li>Designing infrastructure for virtualization </li></ul><ul><li>Designing new processes to capitalize on the power of virtualization </li></ul><ul><li>Considering new strategic options in a virtualized world </li></ul>Building The Virtual Data Center
    8. 8. EMC Information Infrastructure Information infrastructure makes information work with increased value, flexibility, efficiency, cost savings and GREEN
    9. 9. EMC Information Infrastructure Storing more efficiently Next generation backup and archive Making protection effective and affordable Securing critical assets Automating data center operations Leveraging content for competitive advantage Virtualizing your information infrastructure Accelerating business value for applications
    10. 10. Storing Information Efficiently PRIMARY STORAGE, ARCHIVE STORAGE, BACKUP STORAGE <ul><li>Result: storing the right information, at the right service level, at the right cost </li></ul><ul><ul><li>Lower TCO and improved energy efficiency </li></ul></ul><ul><ul><li>Improved risk management </li></ul></ul><ul><ul><li>Simplified management </li></ul></ul><ul><ul><li>High innovation with Flash Drives </li></ul></ul><ul><li>Challenge: efficient operation and service delivery </li></ul><ul><ul><li>60% information growth annually </li></ul></ul><ul><ul><li>Environmental limits – power, cooling, floor space </li></ul></ul><ul><ul><li>Protecting and securing growing volumes </li></ul></ul>Invista Symmetrix Connectrix EMC Centera Celerra CLARiiON EMC Disk Library
    11. 11. Leveraging Content for Competitive Advantage <ul><li>Result: realize the potential of information </li></ul><ul><ul><li>Connect information to people and process </li></ul></ul><ul><ul><li>Improve strategic use of information </li></ul></ul><ul><ul><li>Minimize security and compliance risks </li></ul></ul><ul><ul><li>Lower IT administration costs </li></ul></ul><ul><ul><li> From digital information to enterprise repository. </li></ul></ul><ul><li>Challenge: effective use of enterprise content </li></ul><ul><ul><li>Highest value information growing fastest </li></ul></ul><ul><ul><li>Control cost of content environment – without increasing staff </li></ul></ul><ul><ul><li>Connecting people, information silos and business processes </li></ul></ul>UNIFIED CONTENT MANAGEMENT Knowledge Worker Transactional Interactive Compliance and Archiving UNIFIED CONTENT MANAGEMENT
    12. 12. Securing Critical Assets PERIMETER–CENTRIC + INFORMATION–CENTRIC SECURITY <ul><li>Result: information risk management becomes a business enabler </li></ul><ul><ul><li>Security controls aligned to risk and business drivers </li></ul></ul><ul><ul><li>Efficient regulatory compliance </li></ul></ul><ul><ul><li>Security ‘transparent’ to the end-user </li></ul></ul><ul><li>Challenge: addressing the threat and disruption of information security </li></ul><ul><ul><li>Threats increasing in scope and complexity </li></ul></ul><ul><ul><li>Secure access needed by employees, partners, customers </li></ul></ul><ul><ul><li>Increased regulatory demands to secure information assets </li></ul></ul>
    13. 13. Next Generation Backup and Archive CLASSIFICATION AND ASSESSMENT TOOLS TO ACHIEVE THE KNOWLEDGE TO ACT SaaS alternatives for backup – a new way to realize the value of EMC <ul><li>Result: a reliable and efficient process </li></ul><ul><ul><li>Improve and extend protection while lowering costs </li></ul></ul><ul><ul><li>Expedite e-discovery and attain compliance </li></ul></ul><ul><ul><li>End-to-end solutions from virtual servers to remote offices </li></ul></ul><ul><ul><li>Accelerated build-out of VMware </li></ul></ul><ul><li>Challenge: achieving control, compliance, cost, and confidence </li></ul><ul><ul><li>Information protection and retention is costly </li></ul></ul><ul><ul><li>Potential exposure to litigation and mandates </li></ul></ul><ul><ul><li>Point solutions lack consistency, no end-to-end strategy </li></ul></ul>Archive and Data De-duplication Advanced Technology Policy, Process, and Management Security
    14. 14. Making Protection Effective and Affordable <ul><li>Result: the right protection for the right information </li></ul><ul><ul><li>Effective protection optimizing costs </li></ul></ul><ul><ul><li>Related applications and processes recovered consistently </li></ul></ul><ul><ul><li>Recovery strategies aligned with business requirements </li></ul></ul><ul><li>Challenge: achieving control, compliance, cost, and confidence </li></ul><ul><ul><li>Increased availability requirements – e-mail, web, ERP, VMware </li></ul></ul><ul><ul><li>Eroding availability levels caused by information and complexity explosion </li></ul></ul><ul><ul><li>Awareness gap – business less aware of risk than IT </li></ul></ul>APPLICATION, OPERATING ENVIRONMENT, AND INFRASTRUCTURE INTEGRATION Data De-duplication, Consistency Groups Backup Information Protection Continuous Data Protection Remote Restart Continuous Operations
    15. 15. Virtualizing Your Information Infrastructure <ul><li>Result: “virtual IT” </li></ul><ul><ul><li>On-demand asset utilization, and deployment </li></ul></ul><ul><ul><li>Improved costs, flexibility and responsiveness </li></ul></ul><ul><ul><li>IT processes re-engineered around virtualization </li></ul></ul><ul><ul><li>Accelerated adoption of virtualization throughout its lifecycle </li></ul></ul><ul><li>Challenge: virtualization at scale </li></ul><ul><ul><li>Achieving an infrastructure that’s right for virtualization </li></ul></ul><ul><ul><li>Re-engineering IT processes to exploit virtualization </li></ul></ul><ul><ul><li>Managing physical and virtual environments end to end </li></ul></ul><ul><ul><li>Obtaining the skills required to successfully deploy </li></ul></ul>EMC: DESIGNED AND OPTIMIZED FOR VMware Infrastructure Optimization Software Lifecycle Desktop Management Business Continuity Storage Security Continuity Backup Management
    16. 16. EMC’s Ongoing Transformation Software and Services Are Now 58% of Revenues 12% Growth 25% Growth 23% Growth Revenue Mix 2000 Revenue Mix 2008
    17. 17. EMC’s Accelerating Growth: 2003-08 Note: Net income is in GAAP and includes restructuring charges and other special items. Consistent Top-line and Bottom-line Growth: 6+ Years 2003 2004 2005 2006 2007 $1.25B $496M $871M $1.1B $6.2B $8.2B $9.65B $11.2B $1.67B $13.2B 2008 $1.34B $14.8B Net Income ($M) Revenue ($B)