Toy Story 2Good data protection practices can help ensure successful business outcomes The Toy Story films are some of the most cherished animated movies ever made, but the second part of the trilogy almost disappeared for good — and it was all because of a bad backup. [click to play video, 2.5 minutes] Good data protection hygiene is essentialIntroduce concept of balancing cost vs. risk. Underinvested in data protection. Led to accidental erasure. Need to safeguard from user error – accidental or maliciousNeed to ensure backup/recovery system works – no bad backupsTwo potentially dramatically different business outcomesLoss - Business outcome could have been a disaster – lost movie – lost revenueWin - Instead $0.5B WW revenuesDetails____________________________________________________________________________________________________________________________________________________The Toy Story films are some of the most cherished animated movies ever made, but the second part of the trilogy almost disappeared for good — and it was all because of a bad backup. According to Pixar's Oren Jacob and GalynSusman, during development someone ran the rm* (non geek: “remove all” command) on the drive where Toy Story 2's database containing the master copies of the characters, sets, animation, etc. files were being stored, essentially erasing about a year's worth a work in 20 seconds. Under normal circumstances this wouldn't have been an issue; Pixar maintains backups of all its films throughout the production process. But the backups for Toy Story 2 had failed – for more than a month. The movie, it appeared, was gone for good.Only it wasn’t. That’s when GalynSusman,Pixar’s technical director of the film, noted that, because she wanted to see her family and kids, she had been making copies of the entire film and transferring it to her home computer. After a careful trip from the Pixar offices to her home and back, they discovered that, indeed, most of the film was saved.Pixar, like any other company could have experienced massive loss if they had not gotten lucky. Don’t rely on luck to save you from data loss – there aren’t too many of these stories with happy endings!Here is the first person account of the incident from Oren Jacob, the Associate Technical Director for TS2 (taken from quora.com posting, “Pixar Animation Studios: Did Pixar accidentally delete Toy Story 2 during production?” (http://www.quora.com/Pixar-Animation-Studios/Did-Pixar-accidentally-delete-Toy-Story-2-during-production):Hi everyone, I'm the Oren Jacob in the video. Hopefully I can offer some first person color commentary about the video above that might serve to answer the questions here. Note, after 20 years at the studio I left Pixar last year to start ToyTalk (www.toytalk.com), so this answer hasn't gone through any PR filtering, it's straight from my foggy memory of those events back in the late 90's.First, it wasn't multiple terabytes of information. Neither all the rendered frames, nor all the data necessary to render those frames in animation, model, shaders, set, and lighting data files was that size back then. A week prior to driving across the bridge in a last ditch attempt to recover the show (depicted pretty accurately in the video above) we had restored the film from backups within 48 hours of the /bin/rm -r -f *, run some validation tests, rendered frames, somehow got good pictures back and no errors, and invited the crew back to start working. It took another several days of the entire crew working on that initial restoral to really understand that the restoral was, in fact, incomplete and corrupt. Ack. At that point, we sent everyone home again and had the come-to-Jesus meeting where we all collectively realized that our backup software wasn't dishing up errors properly (a full disk situation was masking them, if my memory serves), our validation software also wasn't dishing up errors properly (that was written very hastily, and without a clean state to start from, was missing several important error conditions), and several other factors were compounding our lack of concrete, verifiable information. The only prospect then was to roll back about 2 months to the last full backup that we thought might work. In that meeting, Galyn mentioned she might have a copy at her house. So we went home to get that machine, and you can watch the video for how that went...With Galyn's machine now back in the building, we dupe'd that data immediately, then set about the task of trying to verify and validate this tree, which we thought might be about 2 weeks old. We compared Galyn's restoral with a much older one (from 2 months prior) and couldn't determine a clear winner, there were too many inconsistencies. So, instead, we set about the task of assembling what effectively amounted to a new source tree, by hand, one file at a time. The total number of files involved was well into the six figures, but we'll round down to 100,000 for the sake of the rest of this discussion to make the math easier.We identified the files that hadn't changed between the two, and took those straight away. Then there were the files that were on Galyn's but not on the older one; we took Galyn's and assumed they were new. Then there were files that were on the older one but not on Galyn's; we put those in the "hand check" pile, since it is unusual for files to be deleted within a production source tree, and we were suspicious of those deletions. Then there were the files that were different across the two backups, those also went into the "hand check" pile along with any files that were touched more recently than Galyn's version.Given that, we had something like 70,000 files that we felt good about, and we poured those into a new source tree. For the remaining 30,000 files, it was all hands on deck.We checked things across 3 partially complete, partially correct trees... the 2 month old full backup (A) , Galyn's (B, which we thought was the best one), and another cobbled together tree (C) from the stray files left around from failed renders, backup directories on animator's machines, some heads of source history that were left untouched, verbose test renders, and other random stuff we could find via NFS elsewhere in the building.We invited a select few members of the crew back to work straight from Friday -> Monday morning. We took rolling shifts to sleep and eat and kept plowing through, file by file, comparing each of the files in the "to be checked" list from A, B, and C, doing the best to verify and validate them, one at a time, by looking at them in xdiff. In the end, human eyes scanned, read, understood, looked for weirdness, and made a decision on something like 30,000 files that weekend. Having taken our best guesses at those suspect files, we assembled a new master of ToyStory2. Many source histories were lost as a result, but we had the best version we could pull together. We invited the crew back, and started working again. Every shot went through a test render, and surprisingly, only a dozen or so failed.I know full well that the following statement will likely blow people's heads up, but the truth is that more than several percentage points of the show (as measured in numbers of files) were never recovered at all. So how could ToyStory2 work at all? We don't know. The frames were rendering (other than that dozen shots), so we just carried on, fixed those shots, and charged ahead. At that point, there was nothing more that could be done. And then, some months later, Pixar rewrote the film from almost the ground up, and we made ToyStory2 again. That rewritten film was the one you saw in theatres and that you can watch now on BluRay.
It’s all about recoveryWithout guaranteed recovery, good backup practices are not much help The slide build highlights the number of loss incidents firstDon’t assume what happened to Pixar isn’t going to happen to youAnd then recovery pointJust like with Pixar there was a backup process, it just didn’t work when needed[Sources4.6 M annual incidents of data loss in the US TechWench All Things Tech, Oct. 13, 201140% hardware failure, 20% human error, 13% software corruption, 9% theft, 6% computer virus, 3% hardware destruction1 in 5 recovery jobs are unsuccessful ESG; “The Modernization of Data Protection, Jason Buffington, Bill Lundell et al, April 2012]
Where do pain points exist?Overarching mega trends across the IT environment (green); others are ‘environment’ specific’(blue) [Set up slide for latter part of the presentation, will discuss following 5 pain points (in blue) and how Dell addressed] Data growth, around the clock operations and compliance Overarching mega trends that span the businessCompliance is driving the need to retain more data for longer periods, putting more data into the backup work stream – time, space, capacity, staff, etc. [click to advance animation] SAN & NASProxy backup may consume excessive system & network resources to move data between systems; overrun backup windows; disrupt application availabilityArray-based backup may introduce retention issues by limiting number of snapshots; require additional license fees; pre-allocate up to 20% of disk spaceNDMP backup may overrun allocated windows with weekly full / daily increment backups; make recovery tedious & time-consumingApplicationsImpact of traditional backup process on application performance and availabilityRemote Office (ROBO)Remote backup via WAN may be slow & expensive due to unavailable or insufficient WAN bandwidth; stall recovery efforts; require on-site IT staffLocal backup via tape may introduce reliability issues by relying on local staff & manual processes; be subject to tape overwriting, mishandling, mislabeling & misplacing; put data at risk during transport; make recovery tedious & time-consumingVirtualAgent-based, file-level backup may create contention issues due to limited shared resources (CPU, memory, disk, NIC); increase backup times; require additional license feesVM image-level backup via proxy server may complicate file-level and application object-level recovery; inhibit fully application-consistent backup/recoveryCloudData backed up to a public cloud raises concerns about security, privacy, legal issues, regulatory compliance, and service-level agreements, etc.Concern that cloud partner’s long term viability. What is your exit strategy if a cloud partner falters? Cloud Services – The immaturity of the Cloud business models raises customer concerns about security, privacy, legal issues, regulatory compliance, and service-level agreements as just a few of the go-slow signals for faster and widespread adoption. Many issues that arise in the business world also affect companies interested in working in the cloud - what is your exit strategy if a cloud partner falters? From the device to the data center to the cloud, we can help you make faster, more informed decisions, streamline your IT operations, increase end-user productivity and keep your data secure. Best of all, our $8B Services business will be there to support every step of your journey.
The Cost vs. Risk ConundrumHow to balance cost vs. risk? IT organizations are under increased pressure to reduce risks and costs, particularly in the area of data protection.At the same time, there is an increased dependence on data to run the business, including the need to manage constant data growth and make sure the data is available when requested. The conundrum – the need to ensure that data is safe and accessible while also introducing efficiency to deliver savings. [click to advance animation] The lower the RPO/RTO requirements, the greater the cost of meeting them [click to advance animation] The higher the RPO/RTO requirements, the greater the risk of data loss and system downtime [click to advance animation] The ideal solution meets or exceeds RPO/RTO requirements for a cost that does not exceed the value of the assets, the cost of downtime.
Dell’s POV for Data ProtectionBest practices for modern data protection vs. traditional legacy approaches [Note: The talking points contrast Dell’s POV to legacy approaches. This slide is not intended to ‘prove’ the POV; it is Dell’s statement or assertion at this stage of the presentation. The proof begins with the next slide and through the case studies.] AlignData value is not one size fits all, nor staticCreate a tiered or layered strategy to balance affordability with risk; encompassing servers, storage, networking and applications [click to advance animation] MinimizeEliminate redundant data; compress, deduplicate and snapImprove performance and consume less storage [click to advance animation] StandardizeDon’t build stovepipe solutions; reduce complexity, ensure consistency, accelerate recovery, lower costs [click to advance animation] Automate and modernizeMove beyond batch backups; introduce modern solutions to enhance continuity and resiliency [click to advance animation] Address whole pictureSuccess requires a holistic approach, implement inclusive framework to keep data safe, users productive
What makes a modern data protection platform?Three core capabilities (blue), built on leading edge technologies (orange) for a scalable, end to end data protection architecture [Note: This slide is the POV in action.Align - Fluid data architecture helps create tiered or layered strategy Minimize - Snaps, replication, dedup, and tapeStandardize - Again point to Fluid data architectureAutomate and modernize - AppAssure, Quest.Address whole picture - Dell services] Self-protecting storageEQL, CMP – snaps and replicationBackup and recoveryAppAssure, Quest, DR4000, etc.Consulting, support and service - Dell ServicesComprehensive suite of offerings that address the challenges of implementing, managing, and maintaining reliable backup and recovery solutions in the most efficient, cost-effective manner [click to advance animation] Fluid Data ArchitectureHelp to simplify your move to the storage platform that’s right for your business, solutions that are based upon Dell Fluid Data™ architecture, supporting expertise and Cloud capabilitiesBuilt on core capabilitiesSnaps, replication, near-CDP, deduplication, disk to disk backup [click to advance animation] End-to-end data protection solutionsModular, scalable systems
Kansas Spine Hospital / CompellentLower cost, recovery in minutes not hours with a scalable SAN & disk-based recovery Kansas Spine Hospital was one of the first fully digital hospitals in the United States. Their electronic patient records contain everything from billing information to radiology images. As those digital records began to accumulate the IT group needed a more flexible, long-term storage solution. And given the vital nature of the patient information system, the team also had to consider reliability and business continuity. Additionally, the hospital IT team wanted to implement a more efficient backup strategy. Traditional, overnight backups were taking twice as long as they should have, impacting the production environment’s performance during the day. [click to advance animation] After evaluating storage systems from several vendors, Kansas Spine Hospital selected the Dell Compellent Storage Center storage area network (SAN), part of the Dell Fluid Data architecture. They deployed a two-tiered production SAN, a second business continuity SAN in an adjacent room and a third disaster recovery system at a remote location. [click to advance animation] General Storage BenefitsThin provisioning with Compellent Dynamic Capacity gave the hospital the flexibility to accommodate the ever-expanding PACS data, without incurring great expense for allocated but unused storage.Automated tiering with Compellent Data Progression allowed them to use a combination of drive technologies to save money and provide better performanceData Protection Features/BenefitsSpace-efficient snapshots with Compellent Remote Instant Replay helped the hospital save at least 85% of the acquisition cost of a traditional backup solution [COMPETITIVE DIFFERENTIATOR]. They were considering a $100,000 backup solution for their production site, but with Compellent all they needed to spend was only about $15,000 for a backup server.Compellent Remote Instant Replay, with its intuitive wizard, allowed the IT Group to set up replication with just six clicks and replicate over low-cost IP lines. And they now run backups from the business continuity SAN without affecting the product environment.Recovery from disk means they can have a system back up and running in minutes – which allow them to provide a high level of patient care. [click to advance animation] Dell End-to-End SolutionCompellent Data ProgressionCompellent Dynamic CapacityCompellent Enterprise ManagerCompellent Remote Instant Replay
Application Protection/ Dell EqualLogicSnapshot & Auto-Replication enable creation of consistent local & remote copies of database for backup/recovery Like many organizations, Dell traditionally ran its business-critical Oracle and Microsoft SQL Server databases on high-end EMC SymmetrixFibre Channel storage arrays. Dell Management challenged our infrastructure team, asked them to implement an end-to-end Dell solution that took advantage of iSCSI storage. [click to advance animation] After extensive testing on less critical workloads yielded positive results, Dell migrated its Services Data Repository (SDR) database, which supports essential business functions, to EqualLogic iSCSI SANs and PowerEdge blade servers. [click to advance animation] Within the next two years, Dell plans to replace all of its legacy EMC storage with Dell storage solutions [COMPETITIVE DIFFERENTIATOR]. When the migration is complete, Dell projects it will require 69% less rack space to support business-critical databases. Dell will reduce TOC for database infrastructure by 75%, saving millions of dollars.With the adoption of EqualLogic storage and PowerVault blade servers, Dell has observed as much as a 10-fold improvement in database performance. Overall application performance has been outstanding.Replication and snapshotting capabilities are built in to each array at no additional cost.The SDR database generates about 2,500 gigabytes of redo transaction daily. The IT team had quite a few performance issue and DR synchronization issues in the past. After migrating to EqualLogic, the performance issues no longer existed, and DR is always in sync with primary. [click to advance animation] Dell End-to-End SolutionEqualLogicPowerEdgePowerConnectSAN HeadQuarters
ROBO / Forum Energy TechnologiesForum Energy Technologies unifies data protection across 90 locations with disk-based backup appliances Forum Energy Technologies (FET), a Houston-based provider of oilfield products and related aftermarket technical services, had acquired nearly 50 companies over six years. The different businesses were handling data protection in a variety of ways – hey needed to consolidate data protection across 90 sites and build a new data center environment to improve performance and efficiency.Backup success rates were 85%Restore success rates were around 70 to 80% [click to advance animation] To unite data protection across all of its Northern American locations, FET deployed Dell PowerVault DL2200-based backup appliance. The company also purchased PowerVault MD1200 direct-attached storage arrays. They have one DL2200 in the main data center, another at a remote site with large amounts of geological data, and a third at a disaster recovery site. They completely eliminated tape with this architecture. With source-sided deduplication, the company estimates it is sending 90% less data over the WAN.Setup time was minimal due to the appliance form factor – they unboxed it, got it in the rack, powered it up, and went through the configuration wizards and started their first backup the first morning.The company now has a single consolidated solution that’s easy to manage and backup/restore rates have been 100%. [COMPETITIVE DIFFERENTIATOR]The backup administrator no longer has to log into different solutions for each of their locations; he just goes to one console. He is saving 4 to 6 hours a week – that’s 250 hours a year. [COMPETITIVE DIFFERENTIATOR]The ability to restore files and VM images quickly from disk has reduced restore times to an hour or two, as opposed to a day or multiple days if they had to go to tape. [COMPETITIVE DIFFERENTIATOR] [click to advance animation]Dell End-to-End SolutionEqualLogicForce10PowerEdgePowerVault
Virtual Environments/salutec/vRangerReplication of VMs means a copy is available offsite; granular recovery enables restore of specific email or task within Exchange salutec, a German IT services provide that specializes in provisioning security and virtualization systems to medium- and enterprise-sized organizations, was looking for ways to better protect its two VMware-based computer centers. They were looking for a solution that would offer straightforward recovery of either individual files or an entire VM. It was also looking for a solution that would recovery individual Exchange server e-mails or mailboxes. Also, a number of salutec’s customers were generating a high frequency of data and needed a greater level of protection than could be offered by traditional daily backup. Salute wanted a replication solution that could provide a fast recovery that wouldn’t adversely affect their customers’ business productivity or cause them significant data loss. Finally salute needed a VM monitoring solution that would provide an overview of the data flow within the entire virtualized environment within their data centers, as well as their customers’ sites. [click to advance animation] salutec tested several backup/restore solutions and asked its customers for feedback. All found the Quest vRanger Pro offered the most straightforward approach to VM backup, replication and recovery. salutec also selected Quest’s VM replication solution, vReplicator, after determining that it was the most sophisticated solution available – it is the only solution that provides powerful virtual infrastructure monitoring, capacity planning, chargeback, Hyper-V and VMware management. vRanger is optimized for VMware image-based data handling, simplifying protection with 1-pass backup and replication.It also provides granular restore capabilities across virtualized files, objects and applications, including Microsoft ExchangevRanger Pro’s technology accelerated VMware backup while dramatically reducing the size of the backup image.Reduced backup times by at least 40%, from 12 hours to seven [COMPETITIVE DIFFERENTIATOR]Reduced mailbox recovery times by 94%, from one day to 30 minutessalutec and its customers also experienced 100% ROI very quickly after implement their Quest server virtualization management solutions. [COMPETITIVE DIFFERENTIATOR] [click to advance animation] Dell End-to-End SolutionvRanger ProvReplicatorvFoglightRecovery Manager for Exchange
Cloud/eFolder/AppAssureeFolder leverages Dell AppAssure to offer superior cloud-based data protection eFolder provides cloud data protection, business continuity and cloud security services for MSPs, solution providers and VARs. Most of its 1,000 MSP partners serve clients that have Microsoft workstation and server environments leveraging Microsoft Exchange, SQL Server and SharePoint. The company’s partners needed a way to replicate their clients’ AppAssure backup images offsite. [click to advance animation] eFolder had MSP clients who loved AppAssure’s software and asked it to develop a custom cloud that delivered the power of the AppAssure technology but with the key characteristics of a cloud service – no upfront costs, labor-free scaling to petabytes, multi-tenancy, consumption-based billing, automated provisioning and tight SLAs. The company deployed AppAssure software with the eFolder AppAssure Cloud service. Fully managed AppAssure cores hosted in eFolder’s cloud receive replicated AppAssure bare-metal backup images into the eFolder Storage Cloud, enabling multiple disaster recovery options. A new standard was set for unified data protection with backup, replication and recovery combined in a single solution, engineered to be the fastest and most reliable backup/recovery service protecting virtual, physical, and cloud environments.In-line block-level compression and deduplication reduces cloud storage requirements with space reduction ratios exceeding 80:1. This resulted in more efficient replication and off-site storage for the MSPs. [COMPETITIVE DIFFERENTIATOR]The feature also includes data corruption prevention for data at rest and in flight. AppAssure technology is unique in that deduplication algorithms and retention policies work solely on encrypted data. Customers can meet regulatory requirements and have the peace of mind by only storing encrypted data in the cloud and have a truly private encryption key.AppAssure provides fully automatic, chain-free retention policies. It is a truly automatic, se-it-and-forget-it backup and disaster recovery service. Customers get any retention policy they want, while MSPs get zero labor overhead.MSPs are able to back up not just the data, but the whole system image to recover in minutes. [COMPETITIVE DIFFERENTIATOR] [click to advance animation] Dell End-to-End SolutionAppAssure eFolder builds custom appliances for their customers based on Dell 12G servers built by Dell OEM
Right data, right place, right time, right costDell now has an extensive and end-to-end data protection portfolio that is enterprise-ready and part of Dell’s fluid data architecture Store and Manage less - Self-protecting primary storageEQL, CMP, PVBackup less - Minimize data backed upDedup and compression capabilitiesBackup, archive to tapeProtect simply and continuously - Dell data protection softwareHighlight new DL4000 Appliance (talking points below)AppAssure – phys/virtual – Mid-marketvRanger – Vmware - Mid-marketNetVault – heterogeneous – EnterpriseSonicWall – server and desktop - SMBAccelerate value - ServicesDell Services provides a wide range of offerings for designing, enhancing, and managing backup and recovery infrastructures. Recover business-critical data in minutes DL4000 AppAssure appliance Designed for business resiliencyDelivers rapid, flexible recovery of both data and applications with confidenceConfigured for maximum valueAward-winning backup protection plus disaster recovery software integrated in a pre-configured 1U applianceOptimized for efficiencyTurnkey solution – quickly deployed, easily managed Key Software Features Highly granular recovery point (RPO) with 5-min. incremental snapshotsNear instantaneous recovery time (RTO) with AppAssure Live RecoveryRecovery Assure™ automatically verifies data & apps are fully recoverable Universal Recovery™ for fast recovery to physical, virtual and cloud2 Standby VMs for disaster recoveryIntegrated deduplication and compressionSingle Management Console for backup and recoveryFirst Time Boot Utility automates onboard storage provisioningiDRAC for remote monitoring & managementFlexible, server-based licensing with 5-, 10- and 15-server license packs
Fluid Data Architecture and data protectionHow Dell data protection fits within Fluid Data architecture [Note : Black boxes - primary storage, offsite storage and backup to disk/tape – already discussedPrimary storage – industry leading efficiency, ease of use and reliability within a scalable design pointOffsite storage – fully integrated recovery and replication at a fraction of the costBackup to disk & tape – advanced backup with data reduction and future scalability built-in] [click to advance animation] Application serversData moves closer to compute to optimize workloads from the peak to the predictableServer flash cache designed to access information on servers quickly. DX ArchiveLong-term massively scalable storage that reduces retention and operation costsArchiving is key to any data protection strategy Reduces amount of data backed upCloudBurst priority workloads to the cloud for backup, recovery and archiveAppAssure Multi-tenancyDell Public Cloud powered by vCloud
Dell services help bridge to futureDell is not just hardware and software but also has rich set of services offering Workshop, AssessmentWhat is your current environment?Where does it need to be?DesignThe path to getting thereImplementationSupport to execute the planManage/supportEnsure ongoing success
Simple, scalable, reliable data protection solutionsKeep users productive, protect information, applications and services continuously and cost effectively - anywhere [Note: - Claims on right side of slide talk to our competitive differentiation across the portfolio] Cut Risk (guaranteed reliability)Spectrum of traditional & modern data protection solutions, for client to cloud, that are reliable, resilient & responsive to ensure data, applications & services are always-on & available.Save Time (greater flexibility)Simple administration, built-in automation & intelligence, heterogeneous integration & business-ready solutions that are open, fast, flexible & scalable to accelerate the productivity of all your operationsSlash Costs (maximum efficiency)Virtualized, self-protecting storage architecture & broad data protection portfolio that are optimized, efficient, complete & connected to maximize the efficiency of all your resources. Simple, scalable, reliable data protection solutionsKeep users productive, protect information, applications and services continuously and cost effectively - anywhere [Note: - Claims on right side of slide talk to our competitive differentiation across the portfolio] Cut Risk (guaranteed reliability)Spectrum of traditional & modern data protection solutions, for client to cloud, that are reliable, resilient & responsive to ensure data, applications & services are always-on & available.Save Time (greater flexibility)Simple administration, built-in automation & intelligence, heterogeneous integration & business-ready solutions that are open, fast, flexible & scalable to accelerate the productivity of all your operationsSlash Costs (maximum efficiency)Virtualized, self-protecting storage architecture & broad data protection portfolio that are optimized, efficient, complete & connected to maximize the efficiency of all your resources.
Dell architecture is driven to address customer pain pointsDell’s end to end data protection portfolio is giving customers the power to do more and helping manage the forces shaping today’s IT landscape [Highlight Data Insight as this is where Dell Data Protection is positioned within the ‘5 Forces’ and the ‘neighborhood’ we want them to visit] Convergence and the cloud Accelerate adoption from virtualization to convergence to cloudConverged infrastructure and cloud efficiency have changed IT forever. Organizations can now deploy applications and storage more quickly, while also lowering costs, increasing reliability and gaining flexibility. But to gain a real edge, organizations need to go beyond just changing infrastructure. They need to manage these services in a new way. Cloud computing requires new capabilities to oversee the public and private resources, including the ability to securely integrate diverse software, platforms and infrastructure.Workforce mobilityEmbrace consumerization “BYOD and beyond”Innovative technologies such as ultrabooks, smartphones, tablets, wireless and social networks have liberated workforces. Employees can now work from anywhere and still remain connected, collaborative and productive. Likewise, with the consumerization of IT, we are also seeing more employees using personal devices in the enterprise. The challenge for IT organizations lies in designing infrastructure that balances workforce flexibility with the right level of IT control and security.Hyper-connected worldHarness the power of social networkingIn today’s environment, the internet and social media are accessible and immediate—helping people and businesses communicate and connect with each other instantly. This hyper-connectivity is redefining relationships between individuals, consumers and enterprises, as well as citizens and governments. While this force introduces more opportunities for collaboration and connection, it also presents new behavioral challenges and risks in terms of privacy, security and access to information.Data insightTurn data into insightsOrganizations are awash in data. Mobile devices, new sensors, transactions and social media are creating an ever-expanding flow of information faster than we can capture, store and analyze it. Organizations that harness this data flow and use it to drive decisions can improve productivity and establish competitive advantages. But doing so requires successfully adopting the right practices and tools, from data management to analyticsHeightened security riskOvercome the emerging security threatThe severity of high-risk security problems inside organizations is soaring. The proliferation of devices, social networking and virtual workforces has opened new avenues for security threats. Sophisticated cybercriminals who attack the integrity of data and privacy are only part of the problem. Employees unknowingly allowing hackers to infiltrate the system pose the biggest risk. Today’s IT organization needs a comprehensive and proactive approach to enterprise security to avoid tomorrow’s disaster.
Actions upon leavingEncourage audience to visit the solution kiosks Data into Insights KiosksOne Tower6.12a AppAssure6.12b DL Appliance6.12c NetVault6.12d vRanger 6.16a DR40006.16c DX Object StorageEmerging Security Threat Kiosk2.16 Data Protection OverviewConsulting Services -- Dell Data Protection experts help companies of all sizes by providing an objective data quality assessment through the process of discovery and analysis. This objective view of data values leads to design transformations that optimize your storage ecosystem through efficient tiering. Take the first step in this transformational journey from the data center to the Cloud by scheduling an initial whiteboarding session with our services professionals.Mention / Invite to Dell Storage ForumSan Jose, CA - June 4-6, 2013Frankfurt, Germany - January 14-16, 2014Register at www.dellstorageforum.comEnter code DSF20DW for 20% Discount
Backup and recovery: risk vs. cost conundrum - Chandra Mukhyala
Backup and recovery:risk vs. cost conundrumChandra MukhyalaProduct Marketing
Backup and recovery:risk vs. cost conundrumChandan TalukdarProduct Manager
It’s not the backup – it’s the recovery 1 in 5 recoveries failData is the life bloodof any organization It’s not a question of will you lose 4.6 million your data – it’s when Annual incidents of data lossDell World 2012
Where are your pain points? 24x7x365 Growing data Compliance Operations SAN & NAS Applications Remote Virtual Cloud office Exponential Complex & high Scarce IT staff, Highly Big & dynamic growth of load data space, time & consolidated data volumes, highly volumes, fault- bandwidth environments, multi clientsredundant data tolerant resources virtual sprawl architectures
The solution is to balance risk vs. cost Cost / Risk Cost of Cost of data availability system availability Risk of Risk of data loss system downtime Ideal solution Hours RPO Seconds RTO Hours Hours of lost data Hours to restore data
Our point of view for data protection Align protection strategies with application value Minimize data captured, moved, stored & protected Standardize, consolidate & converge infrastructure Automate & modernize; add self-protecting storage Address whole picture – people, process, technology
Built on a modern data protection platform Modular, scalable systems Self-protecting Backup & recovery Consulting, support storage & service Snapshots Replication CDP Dedupe Disk Tape Integration End-to-end data protection solutions
Flexible SAN & NAS data protection Dell advantage delivered: 85% less cost Native snapshots Bandwidth savings Native replication Non-disruptive backup 6-click replication setup Recovery in minutes IP-based recovery CompellentStorage SoftwareDell World 2012
Affordable remote office data protection Dell advantage delivered: 100% success rates Built-in compression 90% less data replicated Source-based deduplication 4-6 hours saved weekly Remote replication 1-day restore response Minimal setup time PowerVault DL, EqualLogicServers Storage Networking Services Dell World 2012
Simplified virtual data protection Dell advantage delivered:Reduced backup image size 1-pass backup & replication 40% faster backup times Enterprise-class deduplication94% faster mailbox recovery Granular restores 100% ROI very quickly Agent-less, maintenance-free deployment vRanger, vReplicator, Recovery ManagerSoftware Services Dell World 2012
Reliable cloud-based data protection Dell advantage delivered: Simplified operations Unified data protection Fine-grained RPOs Global data deduplication Recovery in minutes WAN-optimized replication Comprehensive DR Comprehensive encryption AppAssure 5Software Servers Dell World 2012
Right data, right place, right time, right costStore & manage Backup less Protect simply Accelerate less & continuously value Compellent DR4000 AppAssure / DL4000 IT Consulting Storage EqualLogic PowerVault DL Implementation Quest Software PowerVault PowerVault LTO SonicWALL Data Migration End-to-end data protection solutions
World’s most cost-effective storage platforms Optimize data everywhere to drive business resultsApplication Primary Offsite Backup Object- Cloudservers storage storage to disk & based tape archiveFluid Cache Compellent, EqualLogic , PowerVault DR4000, DL2200, DX Archive Public, private PowerVault or hybrid Efficiency | Flexibility | Reliability
With flexible services for every need Workshop Assessment Design Implementation Manage/supportUnderstand the Make informed Lay the path for Capture the value Ongoing success potential decisions success • Focused high impact engagements • Clear phases & decision points • Validated repeatable process • Flexible, modular approach
Dell data protection solutions help you… • Near-zero RTO, 5-minute RPO Cut risk • 99.999% availability • #1 VMware protection solution • Reduce backup data 90% Save time • Eliminate backup windows • Built-in automation, intelligence, integration • 15x bandwidth reduction Slash costs • 80% reduction in storage cost • Persistent design, perpetual licenses
Comprehensive end-to-end solutionsthat deliver greater efficiency The power to do more Client Servers Storage Networking Software Cloud Services Finance Forces shaping the IT landscape Convergence Hyper- Workforce Heightened connected Data insight and the cloud mobility security risk world
Gain hands on experience / demos in theLet’s get Solution Center: Turning Data into Insightsstarted • AppAssure (6.12a) • DL Appliance (6.12b) • NetVault (6.12c) • vRanger (6.12d) • DR4000 (6.16a) Engage with experts at the Expo • Or visit www.Dell.com Envision a solution with a Whiteboard Session
Please help Dell meet your needsby filling out the Session Evaluation Surveys On paper Content On the Dell World app style • Forms in room • Turn in on the way out guidelines 1. Select My Schedule Session Evaluation Survey 2. Select session to evaluate 3. Select Surveys 4. Select survey title Or 5. Simply complete the survey