Note to Presenter: View in Slide Show mode for hyperlink in footer to work.According to the latestTheInfoPro Wave Storage Study, 48 percent of Fortune 1000 respondents have backup deduplication in use and another 40percent have it either in pilot, or in their future plans. That’s about nine in 10 respondents, either with deduplication or moving to it, giving deduplication a “Technology Heat Index” rank of 1. In other words, the move is on—from tape-centric backup architecture to disk-centric designed backup based on deduplication technologies.Note to Presenter: Details of the May 2011 release of TheInfoPro Wave 15 Storage Study can be found at this URL: http://www.theinfopro.com/2011/05/latest-it-market-study-from-theinfopro-f1000-enterprises-2011-storage-spend-continues-at-a-strong-pace/.TheInfoPro’s “Technology Heat Index” is widely regarded as effective measure of user “demand” for a technology, and from a vendor’s perspective, a good indicator of the relative size of the market opportunity.
This was expected to be a $2.7B market in 2011 that hasn’t really been tracked until now. EMC is in a clear leadership position with over 62% market share.Of all the backup market segments, that’s a great place to be, since it’s growing the fastest and will be over a $5B market by 2015. This means the market is embracing these solutions.
Another important differentiator for Data Domain systems is the Data Invulnerability Architecture. Data Domain Data Invulnerability Architecture lays out the industry's best defense against data integrity issues by providing unprecedented levels of data protection, data verification, and self-healing capabilities that are unavailable in conventional disk or tape systems.There are three key areas of data integrity protection described on this slide:First is end-to-end data verification at backup time. As illustrated by the graphic at the right, end-to-end verification means reading data after it is written and comparing it to what was sent to disk, proving that it is reachable through the file system to disk and that the data is not corrupted. Specifically, when the Data Domain Operating System receives a write request from backup software, it computes a checksum over the data. After analyzing the data for redundancy, it stores the new data segments and all of the checksums. After all the data has been written to disk, Data Domain Operating System verifies that it can read the entire file from the disk platter and through the Data Domain file system, and that the checksums of the data read back match the checksums of the written data. This confirms the data is correct and recoverable from every level of the system. If there are problems anywhere along the way—for example, if a bit has flipped on a disk drive—it will be caught. Since most restores happen within a day or two of backups, systems that verify/correct data integrity slowly over time will be too late for most recoveries.Second is a self-healing file system. Data Domain systems actively re-verify the integrity of all data every week in an ongoing background process. This scrub process will find and repair defects on the disk before they can become a problem. In addition, real-time error detection ensures that all data returned to the user during a restore is correct. On every read from disk, the system first verifies that the block read from disk is the block expected. It then uses the checksum to verify the integrity of the data. If any issue is found, the Data Domain Operating System will self-heal and correct the data error. In addition to data verification and self-healing, there are a collection of other capabilities. Data Domain with RAID 6 provides double disk failure protection; NVRAM enables fast, safe restart; and snapshots provide point-in-time file system recoverability.Backups are the data store of last resort. Data Domain Data Invulnerability Architecture provides extra levels of data integrity protection to detect faults and repair them to ensure backup data or recovery is not at risk.
In addition to DD Boost, EMC offers four additional Data Domain software options that can enhance the value of a Data Domain system in your environment. Note to Presenter: Click now in Slide Show mode for animation.The first is DD Retention Lock software enables you to easily implement deduplication with file locking to satisfy IT governance and compliance standards including SEC 17a-4(f) for archive data. Note to Presenter: Click now in Slide Show mode for animation.Next is DD Replicator software, which provides fast, network-efficient , encrypted replication for disaster recovery, remote office data protection, multi-site tape consolidation, and long-term offsite retention. DD Replicator asynchronously transfers only the compressed, deduplicated data over the WAN, making network-based replication cost-effective, fast, and reliable. In addition, you can replicate up to 270 remote sites into a single Data Domain system for consolidated protection of your distributed enterprise.Note to Presenter: Click now in Slide Show mode for animation.Next,DD Virtual Tape Library software, which eliminates tape-related failures by enabling all Data Domain systems to emulate multiple tape devices over a Fibre Channel interface. This software option provides easy integration of deduplication storage in open systems and IBM i environments. Note to Presenter: Click now in Slide Show mode for animation.Next is DD Extended Retention software, which enables long-term retention of backup data on the DD860 or DD990 with up to 65 PB of logical capacity.Note to Presenter: Click now in Slide Show mode for animation.Finally, DD Encryption software protects backup and archive data stored on Data Domain systems with encryption that is performed inline—before the data is written to disk. Encrypting data at rest satisfies internal governance rules and compliance regulations and protects against theft or loss of a physical system. The combination of inline encryption and deduplication provides the most secure data-at-rest encryption solution available.
Here’s a look at the latest Data Domain product family including the new DD990. The capabilities previously available in a DD Archiver are now only available with the ‘DD Extended Retention software option’ on two platforms – as you can see the capacity supported for the DD860 and DD990 now includes a line dedicated to DD Extended Retention.
OPTIONAL SLIDEEMC Global Services is a large component of the your total EMC experience. EMC Global Services allows you to…Save money by:Significantly lowering your implementation and operating expenditure costsFilling internal resource gaps for less Protecting your investments in EMC solutionsAccelerate time to value by:Reducing deployment timeAccelerating return on investment for new projectsEasing the burden of compliance while protecting critical business informationMitigate risk and get better results by:Configuring the solution to meet your requirementsImproving your service levels and reducing your management costsUsing EMC best practices and unmatched product expertise = superior customer experienceReducing disruption while taking advantage of the features and benefits of the latest EMC products and solutions