Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Everywhere

1,275 views

Published on

Data protection is a critical pillar of any organization’s IT transformation, and Dell EMC is #1 in data protection, offering the industry’s most comprehensive portfolio of solutions.Our ‘Data Protection Everywhere’ strategy provides customers with the ultimate in choice and flexibility and eliminates the need to work with multiple vendors ‘point’ products. In this session learn how we enable you to solve your most difficult data protection challenges of today while laying the foundation to address the challenges of tomorrow. Whether your data is local or in the cloud, Dell EMC has you covered. Join this session and learn how to ensure you are protected.

More about Dell EMC World at http://dellemcworld.com/

  • Be the first to comment

MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Everywhere

  1. 1. MT44 Dell EMC Data Protection: What you need to know about data protection everywhere Garrett Van Siclen, Data Protection Evangelist
  2. 2. 2 A tale of two worlds You need both for trust and agility Traditional Apps IT On Premise Next Gen Apps Developers Cloud
  3. 3. 3 Protecting all consumption models On premises Virtual Hybrid Cloud-born Protecting data wherever it lives
  4. 4. 4 PROTECTION AND TRUST Security/Governance – Data protection – Services/Support FLASH SCALE-OUT SOFTWARE DEFINED CLOUD ENABLED Reduce costs (# Of Drives, Power, Floor Space. Etc.) Consistent and predictable performance Lower entry costs and scale as you grow Manage massive capacity with fewer resources Automated provisioning and business agility Flexible and programmable data services Policy driven service delivery On/Off premises data and/or application mobility Dell EMC modern data center strategy
  5. 5. 5 Global Data Protection Index Are you protected? $914K Average cost of data loss 2.36T Data loss 90% Laggards or Evaluators 73% Unable to keep pace with Flash 82% Unprepared for future business challenges 50% Unprotected in the Cloud
  6. 6. 6 Dell EMC Data Protection by the numbers • World’s largest data protection company • Leader in both Gartner Backup Magic Quadrants • Share leader in purpose built backup appliances • 70,000+ systems shipped and installed • 4,000+ data protection solution employees
  7. 7. 7 Dell EMC Data Protection Continuum Availability, replication, backup and archive SnapshotReplicationAvailability Backup Archive Zero Seconds Minutes Hours DATAAVAILABILITY DATA DURABILITY COMPLEMENTARY TIERS TO MEET ANY RECOVERY REQUIREMENT
  8. 8. 8 HOURLY Recovery points between backups SNAPSHOTS 12AM 6AM 12PM 6PM 12AM DAILY Copies on capacity optimized protection storage BACKUPS MONDAY TUESDAY Access anywhere stretched storage volumes CONTINUOUS AVAILABILITY Recovery to any point-in-timeCONTINUOUS PROTECTION LOCAL OR REMOTE Isilon Meeting recovery objectives
  9. 9. Protection Storage
  10. 10. 11 Why Dell EMC Protection Storage FLEXIBLE • Integrates with industry leading applications • Integrates directly with primary storage • Software defined RELIABLE • End-to-end data verification, fault detection, and self healing EFFICIENT • Protect more data, industry-leading speed and scale • Reduce storage required by 10–30x CLOUD-ENABLED • Natively tier deduplicated data to the cloud for modern LTR • Deliver Data Protection as a Service with logical data isolation
  11. 11. 12 New Systems Flash-Enabled Performance and Instant Access Transformed Data Domain • Category shattering speed and scale – 7x more scalable and 1.5x faster – 20x faster instant access and restore of VMs – High availability from the midmarket to the enterprise • Data Domain Operating System 6.0 – DD Boost Everywhere, benefits expand to new markets – Enabled to tier data to cloud storage – Secure Multi-Tenancy Updates • Data Domain Virtual Edition 3.0 – Enhanced scale and Hyper-V support – Qualified with Dell PowerEdge Servers
  12. 12. Protection Software
  13. 13. 14 Why Dell EMC Protection Software COMPREHENSIVE PROTECTION • Delivers protection across the data protection continuum • Covers all consumption models • Backup WITHIN the public cloud or use for secure long-term retention FLEXIBLE • 5 purpose-built offerings, designed for a variety of requirements • Supports a wide range of protection technologies • Delivers application owner and IT visibility & control HIGH PERFORMANCE • Up to 20x faster backups, 30x faster image-level recovery • Industry’s tightest integration with Data Domain • Reduce backup storage requirements by up to 38x • Reduces network traffic by up to 99% • Reduces backup times by up to 50%
  14. 14. 15 Packaged To Meet Your Data Protection Requirements Dell EMC Protection Software Comprehensive data protection for the modern data center
  15. 15. 16 Cloud and Data Protection EXTEND TO CLOUD MOVE TO CLOUD BORN IN CLOUD
  16. 16. 17 Cloud use cases for data protection Direct to Cloud CLIENT • Back up directly to cloud, or via edge cache (ROBO) • Intended for small amounts of data with flexible RTO SLAs Benefit • Remote manageability • Direct Restore • Low On-Prem Footprint DR as a Service • Outsource replication to a Service Provider Benefit • No DR site required • Easy fire drills • Aligns DR readiness to pay as you go model IaaS Protection • Protects virtual workloads and storage in the cloud Benefit • Prevents cloud work loads against data corruption PROTECTION STORAGE • Extended storage provisioning via the cloud Benefit • Tape Replacement • Infinitely Scalable • Low Cost Long Term Retention
  17. 17. 18 Dell EMC Cloud Data Protection Software COMPREHENSIVE PROTECTION • Direct-to-cloud backup for desktops, laptops, & remote offices • Born-in-cloud protection for fast growing enterprise SaaS applications including Office 365, Salesforce, & Google Apps • Cloud enablement for Long-Term Retention FLEXIBLE • Deployment time measured in minutes or hours, not weeks or months • Doesn’t require additional capital expense for hardware • Easily scale resources up or down according to demand • Per user, utility based pricing plans SECURE • End-to-end encryption, including a customer managed key • Global network of world-class data centers, ensuring data is stored in region according to local laws and regulations • Industry-leading cloud service audits and certifications
  18. 18. 19 What’s New: Expanded Cloud Protection and Manageability Data Protection Software & Cloud • NetWorker with CloudBoost now protects applications running on the Microsoft Azure platform • Natively manage long term retention with Data Domain Cloud Tier directly from NetWorker 9.1 and Avamar 7.4 • Spanning Backup for Office 365 now available for customers within the EU
  19. 19. 20 Protection delivered as you want it Best of Breed Converged Software Defined As-a-Service
  20. 20. Isolated Recovery Solutions
  21. 21. 22 Impact of cyber attacks 6 Minutes Time it takes to compromise an organization, 60% of the time $1.25M Average cost of 1M breached records $67K Average cost of 1,000 breached records 36% Lost data due to security breach 2,122 Confirmed data breaches in 2014
  22. 22. 23 Advanced Protection Services - Isolated Recovery Solution - Dell EMC Service Offerings - RSA Security Analytics Additional Hardening & Protection Features - DPS Product Specific Hardening Guides - Encryption in Flight and/or at Rest - Retention Lock w/Separate Security officer credentials Layered cyber security for data protection Traditional Data Protection Best Practices - Layered data protection Deploy approach (“the continuum”) for more business critical systems - Always include a point in time off array independent backup with DR Replication (N+1) RISK
  23. 23. 24 Most critical data first • Protect the “heartbeat” of the business first • Prioritize top applications or data sets to protect • Usually less than 10% of data (this is NOT DR!) • Start with a core set and build from there Compute Applications Validate & Store Highest Priority Data
  24. 24. 25 Why Dell EMC for Data Protection • Data Protection Everywhere: One vendor delivering simplicity, flexibility, and investment protection • Market and technology leadership – #1 In Deduplication – #1 In Purpose Built Backup Appliances – #1 In Combined Data Protection Software & Storage – #1 In Replication – Isolated Recovery Solutions for protection against Ransomware • Unparalleled investment • $16.5B cumulative R&D investment, $17B in technology acquisitions • 4,000+ team members dedicated to helping our customers
  25. 25. 26 Helping customers transform
  26. 26. 28 Let’s get started Total Customer Experience Support Management Assess Design TCO/ROI Validate the Value
  27. 27. 29 Where to find us at Dell EMC World • Solution Showcase – Data Protection in the Data Center Area – IT Transformation in the Dell Technologies Solutions Center – Dell Data Security Solution in the Security zone
  28. 28. 30 More Dell EMC Data Protection Information EMC Storage and Data Protection Dell EMC Data Protection Community Data Protection on EMC.com Core Technologies Blog Mozy.com Spanning.com @DellEMCProtect

×