SlideShare a Scribd company logo
1 of 14
Download to read offline
Unlock real value from back up data
with IBM Spectrum Protect Plus
Marco van Gils
March 21, 2019
Client Technical Specialist IBM Storage
Marco_van_gils@nl.ibm.com
#NLVMUG | MARCH 21, 2019
Today’s Key Data Protection Trends
Application / Data Recovery
Data availability
Application / Data Reuse
Utilize data for new routes to market
Disaster Recovery
Recovering from a minor to major data loss
Business Continuity
Reducing the risk to the business,
employees, market perception
Cyber Resiliency
Recover the business from
a compromised attack
01
02
03
05
04
#NLVMUG | MARCH 21, 2019
Why Modernize Backup?
Lower Costs
Improved Performance
Simple / SLA Management
Enhanced
Business Agility
Multi Cloud Enablement
#NLVMUG | MARCH 21, 2019
The Phases and Processes of Data Access
Data Management / Operational Recovery
Modernize and expanded use cases with instant
data access, instant recovery leveraging snapshots
Backup
Traditional backup / recovery using
streaming backups
Archive
Long-term data retention /
compliance, corporate governance
#NLVMUG | MARCH 21, 2019
Spectrum Protect Plus – 10.1.3
• Supports
̶ VMware & Hyper-V
̶ MS SQL, Oracle, DB2, MongoDB, MS Exchange
Server (all on physical / virtual systems)
• Primary data reuse use cases
̶ Data Protection / Recovery
̶ Test/Dev, DevOps, Reporting, Analytics, etc…
The enterprise-proven data protection, data reuse solution
from IBM for multiple use cases
Backup Data Made Useful
#NLVMUG | MARCH 21, 2019
What's New in 10.1.3?
• Application Support
- MongoDB – 3.6 / 4.0 – Community and Enterprise
- Microsoft Exchange Server – 2013 CU2, 2016, 2019 – Includes item-level restores
• Optimized offload to Spectrum Protect – no need for SP4VE any longer
• Off-load to Object Storage – IBM COS, IBM COS Worm, Amazon S3, Microsoft
Azure
• High Availability of the Spectrum Protect Plus server for both VMware and
Hyper-V implementations
• Enhanced RESTful APIs – faster time to value around reporting / analytics
NEW
#NLVMUG | MARCH 21, 2019
Spectrum Protect Plus & IBM COS – Cyber Resiliency
• Spectrum Protect 10.1.3 can offload data
to IBM COS and COS WORM storage via S3
̶ Set through single SLA policy
• Data protection to IBM COS WORM is
key to any cyber resiliency strategy
̶ Offload to immutable storage
̶ “Air-gap” like capabilities
̶ Data cannot be deleted or changed
• Utilize offload to IBM COS for off-prem DR
̶ Get data off-site in the event of a disaster
̶ Recover data in multiple locations
#NLVMUG | MARCH 21, 2019
Spectrum Protect Plus – Modern Data Protection
Easy to Deploy
and Manage
Immediate ROI
Intuitive User Interface
Lower OpEx
Software Defined
Software-defined
Proactive Backup Catalog
Automated Data Protection
Instant Recovery
Data Access
Lowest RTO
Self-service – RBAC
Flexible Management
Automation
Orchestration
DevOps, Dev-Test
RESTful APIs
Application Integration
#NLVMUG | MARCH 21, 2019
New Protection / Reuse Attributes
Leading to Real Business Value
Instant Data
Recovery
Data snapshots stored
in native format
Instant recovery from
multiple recovery
points
Agentless &
Efficient
VM APIs for agentless
deployment
Incremental forever,
compression and
dedupe built in
Simple, Easy,
Modern UI
Recovery-driven
simple management
*Easy to use, new UX
SLA, SLO Based
Data
Catalog
Scalable
MongoDB
Google-like
Search interface
Find data quickly
13
#NLVMUG | MARCH 21, 2019
Cloud-like
Agility
Deliver data / systems
on demand or via
schedule
Application, database
& VM centric templates
New Protection / Reuse Attributes
Leading to Real Business Value
End-user
Self Service
Secure Roles Based
Access Controls
(RBAC)
Right data, right
people, right time, right
location
Secure Data,
No Interference
Recover in a fenced
environment
Rename databases and
mountpoints
*New vSnap encryption
Network remapping
Data Delivered
as Code
Infrastructure /
Database as a
service
RESTful APIs
Integration with
DevOps tools
16
#NLVMUG | MARCH 21, 2019
Rapid Data &
System Recovery
Native-format data for
instant access
Application-aware
recovery
New Protection / Reuse Attributes
Leading to Real Business Value
Service
Modernization
Data-as-a-Service
Task automation
Extend to the Cloud
Regulatory
Compliance
Integration with
Spectrum Protect
ensures corporate
governance /
compliance
Data
Reuse
Speed application
delivery cycles
Feed reporting and
analytics engines
19
#NLVMUG | MARCH 21, 2019
One Workflow, Multiple Use Cases
Hypervisor
Run on-premises or in IBM Cloud
Policies, Catalog
Spectrum
Protect Plus
Server
Backup Admin
Gold SLA Silver SLA Bronze SLA
Policy-Based
Management
VM Admin
Developer Help Desk
Roles-Based
AccessHypervisor
Physical Servers
(Protects applications running on
physical and virtual servers, including
Oracle/SQL/Db2/MongoDB/Exchange)
Copy Repository
vSnap Server
Local Data Center
Instant Recovery and Multi-Purpose Data Reuse
API Calls
Copy Repository
vSnap Server
Physical Servers
Remote Data Center
Hypervisor
S3
Offload to
21
#NLVMUG | MARCH 21, 2019
RE-invent Your Business
• Modernize your data protection environment
- Lower your data protection costs
- Improve your business SLAs
- Elevate your staff
- Exploit your data
- Enable the cloud
#NLVMUG | MARCH 21, 2019
© Copyright IBM Corporation 2019. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or
service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
THANK YOU

More Related Content

What's hot

Delivering Backup as a service
Delivering Backup as a serviceDelivering Backup as a service
Delivering Backup as a service4sl
 
S104876 ibm-cos-jburg-v1809b
S104876 ibm-cos-jburg-v1809bS104876 ibm-cos-jburg-v1809b
S104876 ibm-cos-jburg-v1809bTony Pearson
 
Optimize Your VMware SDDC with IBM Infrastructure
Optimize Your VMware SDDC with IBM InfrastructureOptimize Your VMware SDDC with IBM Infrastructure
Optimize Your VMware SDDC with IBM InfrastructurePaula Koziol
 
Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...
Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...
Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...Paula Koziol
 
Modernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen AlahmadModernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen AlahmadVeritas Technologies LLC
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIngram Micro Cloud
 
Z111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910aZ111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910aTony Pearson
 
S104878 nvme-revolution-jburg-v1809b
S104878 nvme-revolution-jburg-v1809bS104878 nvme-revolution-jburg-v1809b
S104878 nvme-revolution-jburg-v1809bTony Pearson
 
Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...
Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...
Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...Netgear Italia
 
Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015Amer Zia
 
S104874 toe-pool-jburg-v1809e
S104874 toe-pool-jburg-v1809eS104874 toe-pool-jburg-v1809e
S104874 toe-pool-jburg-v1809eTony Pearson
 
Achieving Storage Agility and Improved Economics
Achieving Storage Agility and Improved EconomicsAchieving Storage Agility and Improved Economics
Achieving Storage Agility and Improved EconomicsPatrick Berghaeger
 
S100297 ilm-archive-orlando-v1804c
S100297 ilm-archive-orlando-v1804cS100297 ilm-archive-orlando-v1804c
S100297 ilm-archive-orlando-v1804cTony Pearson
 
IBM Cloud Storage - Cleversafe
IBM Cloud Storage - CleversafeIBM Cloud Storage - Cleversafe
IBM Cloud Storage - CleversafeMichael Beatty
 
Acronis access for blaud event
Acronis access for blaud eventAcronis access for blaud event
Acronis access for blaud eventBLAUD
 
PCTY 2012, Tivoli Storage Strategi og Portfolio Update v. Greg Tevis
PCTY 2012, Tivoli Storage Strategi og Portfolio Update v. Greg TevisPCTY 2012, Tivoli Storage Strategi og Portfolio Update v. Greg Tevis
PCTY 2012, Tivoli Storage Strategi og Portfolio Update v. Greg TevisIBM Danmark
 
Virtustream presentation
Virtustream presentationVirtustream presentation
Virtustream presentationEimantas
 

What's hot (20)

Delivering Backup as a service
Delivering Backup as a serviceDelivering Backup as a service
Delivering Backup as a service
 
S104876 ibm-cos-jburg-v1809b
S104876 ibm-cos-jburg-v1809bS104876 ibm-cos-jburg-v1809b
S104876 ibm-cos-jburg-v1809b
 
Optimize Your VMware SDDC with IBM Infrastructure
Optimize Your VMware SDDC with IBM InfrastructureOptimize Your VMware SDDC with IBM Infrastructure
Optimize Your VMware SDDC with IBM Infrastructure
 
Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...
Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...
Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...
 
Modernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen AlahmadModernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen Alahmad
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a Service
 
Z111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910aZ111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910a
 
S104878 nvme-revolution-jburg-v1809b
S104878 nvme-revolution-jburg-v1809bS104878 nvme-revolution-jburg-v1809b
S104878 nvme-revolution-jburg-v1809b
 
Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...
Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...
Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...
 
Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015
 
S104874 toe-pool-jburg-v1809e
S104874 toe-pool-jburg-v1809eS104874 toe-pool-jburg-v1809e
S104874 toe-pool-jburg-v1809e
 
Achieving Storage Agility and Improved Economics
Achieving Storage Agility and Improved EconomicsAchieving Storage Agility and Improved Economics
Achieving Storage Agility and Improved Economics
 
Acronis presentation
Acronis presentationAcronis presentation
Acronis presentation
 
S100297 ilm-archive-orlando-v1804c
S100297 ilm-archive-orlando-v1804cS100297 ilm-archive-orlando-v1804c
S100297 ilm-archive-orlando-v1804c
 
Build your own Cloud
Build your own CloudBuild your own Cloud
Build your own Cloud
 
IBM Cloud Storage - Cleversafe
IBM Cloud Storage - CleversafeIBM Cloud Storage - Cleversafe
IBM Cloud Storage - Cleversafe
 
Acronis access for blaud event
Acronis access for blaud eventAcronis access for blaud event
Acronis access for blaud event
 
PCTY 2012, Tivoli Storage Strategi og Portfolio Update v. Greg Tevis
PCTY 2012, Tivoli Storage Strategi og Portfolio Update v. Greg TevisPCTY 2012, Tivoli Storage Strategi og Portfolio Update v. Greg Tevis
PCTY 2012, Tivoli Storage Strategi og Portfolio Update v. Greg Tevis
 
Virtustream presentation
Virtustream presentationVirtustream presentation
Virtustream presentation
 
Infinidat InfiniGuard
Infinidat InfiniGuardInfinidat InfiniGuard
Infinidat InfiniGuard
 

Similar to Unlock Real Value from Back Up Data with IBM Spectrum Protect Plus

the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfsarah david
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxsarah david
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxMetaorange
 
The ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertThe ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertChapter247 Infotech
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isvPandu W Sastrowardoyo
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)Glenn Ambler
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
 
Hybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfHybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfmanoharparakh
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureStefaan Van daele
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxSaadZaman23
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityIBM Security
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2jeffirby
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Amazon Web Services
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAmazon Web Services
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overviewshraddhaudage
 

Similar to Unlock Real Value from Back Up Data with IBM Spectrum Protect Plus (20)

the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
 
The ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertThe ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expert
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isv
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
 
Hybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfHybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdf
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptx
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
F017414853
F017414853F017414853
F017414853
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overview
 

More from Paula Koziol

Sizing Splunk SmartStore - Spend Less and Get More Out of Splunk
Sizing Splunk SmartStore - Spend Less and Get More Out of SplunkSizing Splunk SmartStore - Spend Less and Get More Out of Splunk
Sizing Splunk SmartStore - Spend Less and Get More Out of SplunkPaula Koziol
 
AI Scalability for the Next Decade
AI Scalability for the Next DecadeAI Scalability for the Next Decade
AI Scalability for the Next DecadePaula Koziol
 
IBM Storage for SAP HANA Deployments
IBM Storage for SAP HANA DeploymentsIBM Storage for SAP HANA Deployments
IBM Storage for SAP HANA DeploymentsPaula Koziol
 
IBM Storage at Fiserv Forum 2018
IBM Storage at Fiserv Forum 2018IBM Storage at Fiserv Forum 2018
IBM Storage at Fiserv Forum 2018Paula Koziol
 
IBM Storage at FIS Connect 2018
IBM Storage at FIS Connect 2018 IBM Storage at FIS Connect 2018
IBM Storage at FIS Connect 2018 Paula Koziol
 
IBM & Veeam: Bridging the availability gap
IBM & Veeam: Bridging the availability gapIBM & Veeam: Bridging the availability gap
IBM & Veeam: Bridging the availability gapPaula Koziol
 
Transform to Cognitive Healthcare with IBM Software Defined Infrastructure an...
Transform to Cognitive Healthcare with IBM Software Defined Infrastructure an...Transform to Cognitive Healthcare with IBM Software Defined Infrastructure an...
Transform to Cognitive Healthcare with IBM Software Defined Infrastructure an...Paula Koziol
 
Accelerate Your Signature Banking Applications with IBM Storage Offerings
Accelerate Your Signature Banking Applications with IBM Storage OfferingsAccelerate Your Signature Banking Applications with IBM Storage Offerings
Accelerate Your Signature Banking Applications with IBM Storage OfferingsPaula Koziol
 
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...Paula Koziol
 
IBM Storage and VMware – A Winning Combination
IBM Storage and VMware – A Winning CombinationIBM Storage and VMware – A Winning Combination
IBM Storage and VMware – A Winning CombinationPaula Koziol
 
Scalable Data Computing for Healthcare and Life Sciences Industry
Scalable Data Computing for Healthcare and Life Sciences Industry Scalable Data Computing for Healthcare and Life Sciences Industry
Scalable Data Computing for Healthcare and Life Sciences Industry Paula Koziol
 
Future Proof Your Data: IBM Storage at VeeamON
Future Proof Your Data: IBM Storage at VeeamONFuture Proof Your Data: IBM Storage at VeeamON
Future Proof Your Data: IBM Storage at VeeamONPaula Koziol
 
IBM Storage at SAPPHIRE 2017
IBM Storage at SAPPHIRE 2017IBM Storage at SAPPHIRE 2017
IBM Storage at SAPPHIRE 2017Paula Koziol
 
POWER8 the x86 Server Farm - IBM Business Partners use POWER8 to Lower Client...
POWER8 the x86 Server Farm - IBM Business Partners use POWER8 to Lower Client...POWER8 the x86 Server Farm - IBM Business Partners use POWER8 to Lower Client...
POWER8 the x86 Server Farm - IBM Business Partners use POWER8 to Lower Client...Paula Koziol
 
Why You Should Consider Linux on IBM POWER8 - How IBM Partners are Driving Bu...
Why You Should Consider Linux on IBM POWER8 - How IBM Partners are Driving Bu...Why You Should Consider Linux on IBM POWER8 - How IBM Partners are Driving Bu...
Why You Should Consider Linux on IBM POWER8 - How IBM Partners are Driving Bu...Paula Koziol
 

More from Paula Koziol (15)

Sizing Splunk SmartStore - Spend Less and Get More Out of Splunk
Sizing Splunk SmartStore - Spend Less and Get More Out of SplunkSizing Splunk SmartStore - Spend Less and Get More Out of Splunk
Sizing Splunk SmartStore - Spend Less and Get More Out of Splunk
 
AI Scalability for the Next Decade
AI Scalability for the Next DecadeAI Scalability for the Next Decade
AI Scalability for the Next Decade
 
IBM Storage for SAP HANA Deployments
IBM Storage for SAP HANA DeploymentsIBM Storage for SAP HANA Deployments
IBM Storage for SAP HANA Deployments
 
IBM Storage at Fiserv Forum 2018
IBM Storage at Fiserv Forum 2018IBM Storage at Fiserv Forum 2018
IBM Storage at Fiserv Forum 2018
 
IBM Storage at FIS Connect 2018
IBM Storage at FIS Connect 2018 IBM Storage at FIS Connect 2018
IBM Storage at FIS Connect 2018
 
IBM & Veeam: Bridging the availability gap
IBM & Veeam: Bridging the availability gapIBM & Veeam: Bridging the availability gap
IBM & Veeam: Bridging the availability gap
 
Transform to Cognitive Healthcare with IBM Software Defined Infrastructure an...
Transform to Cognitive Healthcare with IBM Software Defined Infrastructure an...Transform to Cognitive Healthcare with IBM Software Defined Infrastructure an...
Transform to Cognitive Healthcare with IBM Software Defined Infrastructure an...
 
Accelerate Your Signature Banking Applications with IBM Storage Offerings
Accelerate Your Signature Banking Applications with IBM Storage OfferingsAccelerate Your Signature Banking Applications with IBM Storage Offerings
Accelerate Your Signature Banking Applications with IBM Storage Offerings
 
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
 
IBM Storage and VMware – A Winning Combination
IBM Storage and VMware – A Winning CombinationIBM Storage and VMware – A Winning Combination
IBM Storage and VMware – A Winning Combination
 
Scalable Data Computing for Healthcare and Life Sciences Industry
Scalable Data Computing for Healthcare and Life Sciences Industry Scalable Data Computing for Healthcare and Life Sciences Industry
Scalable Data Computing for Healthcare and Life Sciences Industry
 
Future Proof Your Data: IBM Storage at VeeamON
Future Proof Your Data: IBM Storage at VeeamONFuture Proof Your Data: IBM Storage at VeeamON
Future Proof Your Data: IBM Storage at VeeamON
 
IBM Storage at SAPPHIRE 2017
IBM Storage at SAPPHIRE 2017IBM Storage at SAPPHIRE 2017
IBM Storage at SAPPHIRE 2017
 
POWER8 the x86 Server Farm - IBM Business Partners use POWER8 to Lower Client...
POWER8 the x86 Server Farm - IBM Business Partners use POWER8 to Lower Client...POWER8 the x86 Server Farm - IBM Business Partners use POWER8 to Lower Client...
POWER8 the x86 Server Farm - IBM Business Partners use POWER8 to Lower Client...
 
Why You Should Consider Linux on IBM POWER8 - How IBM Partners are Driving Bu...
Why You Should Consider Linux on IBM POWER8 - How IBM Partners are Driving Bu...Why You Should Consider Linux on IBM POWER8 - How IBM Partners are Driving Bu...
Why You Should Consider Linux on IBM POWER8 - How IBM Partners are Driving Bu...
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Unlock Real Value from Back Up Data with IBM Spectrum Protect Plus

  • 1. Unlock real value from back up data with IBM Spectrum Protect Plus Marco van Gils March 21, 2019 Client Technical Specialist IBM Storage Marco_van_gils@nl.ibm.com #NLVMUG | MARCH 21, 2019
  • 2. Today’s Key Data Protection Trends Application / Data Recovery Data availability Application / Data Reuse Utilize data for new routes to market Disaster Recovery Recovering from a minor to major data loss Business Continuity Reducing the risk to the business, employees, market perception Cyber Resiliency Recover the business from a compromised attack 01 02 03 05 04 #NLVMUG | MARCH 21, 2019
  • 3. Why Modernize Backup? Lower Costs Improved Performance Simple / SLA Management Enhanced Business Agility Multi Cloud Enablement #NLVMUG | MARCH 21, 2019
  • 4. The Phases and Processes of Data Access Data Management / Operational Recovery Modernize and expanded use cases with instant data access, instant recovery leveraging snapshots Backup Traditional backup / recovery using streaming backups Archive Long-term data retention / compliance, corporate governance #NLVMUG | MARCH 21, 2019
  • 5. Spectrum Protect Plus – 10.1.3 • Supports ̶ VMware & Hyper-V ̶ MS SQL, Oracle, DB2, MongoDB, MS Exchange Server (all on physical / virtual systems) • Primary data reuse use cases ̶ Data Protection / Recovery ̶ Test/Dev, DevOps, Reporting, Analytics, etc… The enterprise-proven data protection, data reuse solution from IBM for multiple use cases Backup Data Made Useful #NLVMUG | MARCH 21, 2019
  • 6. What's New in 10.1.3? • Application Support - MongoDB – 3.6 / 4.0 – Community and Enterprise - Microsoft Exchange Server – 2013 CU2, 2016, 2019 – Includes item-level restores • Optimized offload to Spectrum Protect – no need for SP4VE any longer • Off-load to Object Storage – IBM COS, IBM COS Worm, Amazon S3, Microsoft Azure • High Availability of the Spectrum Protect Plus server for both VMware and Hyper-V implementations • Enhanced RESTful APIs – faster time to value around reporting / analytics NEW #NLVMUG | MARCH 21, 2019
  • 7. Spectrum Protect Plus & IBM COS – Cyber Resiliency • Spectrum Protect 10.1.3 can offload data to IBM COS and COS WORM storage via S3 ̶ Set through single SLA policy • Data protection to IBM COS WORM is key to any cyber resiliency strategy ̶ Offload to immutable storage ̶ “Air-gap” like capabilities ̶ Data cannot be deleted or changed • Utilize offload to IBM COS for off-prem DR ̶ Get data off-site in the event of a disaster ̶ Recover data in multiple locations #NLVMUG | MARCH 21, 2019
  • 8. Spectrum Protect Plus – Modern Data Protection Easy to Deploy and Manage Immediate ROI Intuitive User Interface Lower OpEx Software Defined Software-defined Proactive Backup Catalog Automated Data Protection Instant Recovery Data Access Lowest RTO Self-service – RBAC Flexible Management Automation Orchestration DevOps, Dev-Test RESTful APIs Application Integration #NLVMUG | MARCH 21, 2019
  • 9. New Protection / Reuse Attributes Leading to Real Business Value Instant Data Recovery Data snapshots stored in native format Instant recovery from multiple recovery points Agentless & Efficient VM APIs for agentless deployment Incremental forever, compression and dedupe built in Simple, Easy, Modern UI Recovery-driven simple management *Easy to use, new UX SLA, SLO Based Data Catalog Scalable MongoDB Google-like Search interface Find data quickly 13 #NLVMUG | MARCH 21, 2019
  • 10. Cloud-like Agility Deliver data / systems on demand or via schedule Application, database & VM centric templates New Protection / Reuse Attributes Leading to Real Business Value End-user Self Service Secure Roles Based Access Controls (RBAC) Right data, right people, right time, right location Secure Data, No Interference Recover in a fenced environment Rename databases and mountpoints *New vSnap encryption Network remapping Data Delivered as Code Infrastructure / Database as a service RESTful APIs Integration with DevOps tools 16 #NLVMUG | MARCH 21, 2019
  • 11. Rapid Data & System Recovery Native-format data for instant access Application-aware recovery New Protection / Reuse Attributes Leading to Real Business Value Service Modernization Data-as-a-Service Task automation Extend to the Cloud Regulatory Compliance Integration with Spectrum Protect ensures corporate governance / compliance Data Reuse Speed application delivery cycles Feed reporting and analytics engines 19 #NLVMUG | MARCH 21, 2019
  • 12. One Workflow, Multiple Use Cases Hypervisor Run on-premises or in IBM Cloud Policies, Catalog Spectrum Protect Plus Server Backup Admin Gold SLA Silver SLA Bronze SLA Policy-Based Management VM Admin Developer Help Desk Roles-Based AccessHypervisor Physical Servers (Protects applications running on physical and virtual servers, including Oracle/SQL/Db2/MongoDB/Exchange) Copy Repository vSnap Server Local Data Center Instant Recovery and Multi-Purpose Data Reuse API Calls Copy Repository vSnap Server Physical Servers Remote Data Center Hypervisor S3 Offload to 21 #NLVMUG | MARCH 21, 2019
  • 13. RE-invent Your Business • Modernize your data protection environment - Lower your data protection costs - Improve your business SLAs - Elevate your staff - Exploit your data - Enable the cloud #NLVMUG | MARCH 21, 2019
  • 14. © Copyright IBM Corporation 2019. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. THANK YOU