SlideShare a Scribd company logo
1 of 94
Dell - Internal Use - Confidential
Portfolio Overview
Lorenzo Puopolo
Sr. Account Systems Engineer
2 of 94
Dell - Internal Use - Confidential
The world’s most
value-focused global
supply chain providing
technology infrastructure
for organizations
of all sizes
The world’s leading data
center innovation engine
with cutting-edge
enterprise infrastructure
for the most demanding
environments
The world’s largest
privately-held technology
company with
world-class
enterprise sales and
support
3 of 94
Dell - Internal Use - Confidential
The world’s most
value-focused global
supply chain providing
technology infrastructure
for organizations
of all sizes
The world’s leading data
center innovation engine
with cutting-edge
enterprise infrastructure
for the most demanding
environments
Fortune 500ISG Revenue
4 of 94
Dell - Internal Use - Confidential
CONVERGED SERVERS STORAGE FLASH
SOFTWARE-DEFINED
STORAGE
VIRTUALIZATION DATA
PROTECTION
5 of 94
Dell - Internal Use - Confidential
INDUSTRY'S #1
Storage Portfolio
High-end storage UnstructuredMidrange
ISILON per CRUI
Webinair
Sr. Specialist SE: Andrea Gallo
Ugoandrea.gallo@dell.com
7 © Copyright 2017 Dell Inc.7
Isilon - The Recognized Leader
© Copyright 2017 Dell Inc.8
Content Subscribers
US News Best Hospitals
1.3EB
Pharmaceutical Companies
8 of the Top
10
Video Surveillance Cameras
2B+
2M+
11of the Top
18 Hadoop Analytics
Isilon industry leadership
8
Capabilities and Market LEADERCapabilities and Market LEADER
10 © Copyright 2017 Dell Inc.10
Isilon Workload Consolidation
11 © Copyright 2017 Dell Inc.11
TCO Optimization: Simplicity and Ease of Use
• Automation:
NO manual intervention
NO reconfiguration
NO server or client mount point or
application changes
NO data migrations
NO RAID
• Automation:
NO manual intervention
NO reconfiguration
NO server or client mount point or
application changes
NO data migrations
NO RAID
Single File System Spans All NodesSingle File System Spans All Nodes
Directories and Files Striped Across Cluster
12 © Copyright 2017 Dell Inc.12
Push-Button Linear Scaling
Under 60 Seconds
Transparent to Users and Applications
Unconstrained Scale
13 © Copyright 2017 Dell Inc.13
Extreme
PerformanceNASTier
Enterprise
NASTier
ColdArchive
ObjectTier
Just Enough Flash
TCO Optimization: Policy-Based Automated Tiering
HIGHEST PERFORMANCE
LOWEST TCO
•Tier Between Performance, Enterprise and Archive
Nodes
•Transparent to Users and Applications
HIGHEST PERFORMANCE
LOWEST TCO
•Tier Between Performance, Enterprise and Archive
Nodes
•Transparent to Users and Applications
14 © Copyright 2017 Dell Inc.14
Extreme
PerformanceTier
Enterprise
Tier
Isilon CloudPools and ECS: Integrated and Automated
Archive
Tier
ECS Geo-Replicated
Dedicated Cloud
Other Public Clouds
Single Namespace. Encrypted and SecureLower TCO Than Public Cloud
Policies Control When, Where, How You Move to Cloud
15 © Copyright 2017 Dell Inc.15
Isilon Gen6: Dense Scale Out Architecture
• Dedicated compute per node
• 4 Nodes per chassis
• Broadwell CPU (2-16 Cores)
• Up to 1024 GB RAM
• Dedicated compute per node
• 4 Nodes per chassis
• Broadwell CPU (2-16 Cores)
• Up to 1024 GB RAM
ComputeComputeComputeComputeDrive EnclosureDrive EnclosureDrive EnclosureDrive Enclosure
• 4U chassis
• 5 Drive Sleds per Node
• Up to 6 Drives per Sled
• Hot swappable drives
• 4U chassis
• 5 Drive Sleds per Node
• Up to 6 Drives per Sled
• Hot swappable drives
BackFront
Increased Density
Increased
performance
Increased capacity
Increased Data
protection
Increased Density
Increased
performance
Increased capacity
Increased Data
protection
Benefits
© Copyright 2017 Dell Inc.16
Hybrid
Nodes
Performance,
Capacity and
Value
Extreme
Performance
and Scalability
All-Flash
Nodes
Archive
Nodes
Capacity &
Economics
Meet the New Isilon Family
F800
H600
H500
H400
250K ops/s, <1ms
15 GB/s read
120K ops/s
12 GB/s read
5 GB/s read
3 GB/s read
96 TB 924 TB
72 TB 144 TB
120 TB 480 TB
A200
800 TBA2000
120 TB 480 TB
120 TB 480 TB
Nitro
Performance
Capacity
ScratchFlash
Archive
Hybrid-Series Archive-Series
ScratchIRF
Long
Term
Sequencers Compute Archive
RAW
BCL
FASTQ BAM
VCF
Workstations
S3
Isilon Gen6 in HPC enviromental
© Copyright 2017 Dell Inc.18
Decision
Support
Decision
Support
Web
Click
data
Web
Click
data
OLAPOLAP
EDWEDW
HDFS: Isilon Shared Data lake
MAP
Reduce
MAP
Reduce
MAP
Reduce
MAP
Reduce
Step 1:
Jobs are run
Compute Cluster
HadoopHadoop
NameNodeNameNode
DataNodeDataNode
© Copyright 2017 Dell Inc.19
SMB, NFS,
HTTP, FTP,
HDFS
NameNodeNameNode
DataNodeDataNode
HDFS: Integrated Isilon and Hadoop
name
node
name
node
name
node
name
node
datanode
NFSNFS
SMBSMB
SMBSMB
NFSNFS
hdfs://cloudera
HDFS
hdfs://pivotal
hdfs://hortonworks
hdfs://apache
Dell EMC Data Protection
Solutions (DPS)
Alessio D’Andrea
Dell EMC Advisory Solution Engineer – DPS specialist
Alessio.dandrea@dell.com
Dell - Internal Use - Confidential21of Y
DATA
CENTERS
OF DATA
© Copyright 2017 Dell Inc.21
Where is your
data and…
How do you
protect it?
“DATA FOG”
Dell - Internal Use - Confidential22of Y
Only 1 in 4 customers have a single vendor approach…*
Today’s approach
* IDC 2017
Dell - Internal Use - Confidential23of Y
DELL EMC Data Protection Strategy
Automate
Everywhere it Makes Sense
Transform
.
Modernize
© Copyright 2017 Dell Inc.23
People
Process Technology
Automation
PROTECTION
DATA
APP
APP
APP
CLOUD
APP
CLOUD
APP
CLOUD
APP
Dell - Internal Use - Confidential24of Y
Protection and recovery for cloud
PROTECTION
STORAGE
PROTECTION
SOFTWARE
Best of breed Integrated
PROTECTION
APPLIANCE
Dell EMC Data Protection Portfolio
MODERNIZE, TRANSFORM and AUTOMATE DATA PROTECTION with
© Copyright 2017 Dell Inc.25
Data Protection Everywhere
How
You
Want
It
How
You
Want
It
Virtualized
Converged
InfrastructureOn-Prem
SnapsReplication Archive Isolated RecoveryLTR
Continuous
Availability
APP
As-a-Service
Cloud
Private / Public
Where
You
Need It
Where
You
Need It
Consumption
Models
Protection
SLO
Backup
RTO & RPO
© Copyright 2017 Dell Inc.
Comprehensive, industry-leading data protection
Data Protection Suite Family
Data Protection
Suite
Enterprise Edition
Data Protection
Suite
For VMware
Choose the right solution for your environment:
Data Protection
Suite
For Backup
Data Protection
Suite
For Applications
Data Protection
Suite
For Archive
© Copyright 2017 Dell Inc.
Best-of-breed backup and recovery software
Data Protection Suite for Backup
 Centralized Data Protection Management
 Comprehensive scheduling, policy management, monitoring, analysis
and reporting for physical, virtual and cloud environments
 Cloud-Enabled
 Delivers backups of data and applications WITHIN the public cloud
 Provides secure long-term-retention of backups TO the cloud
 Flexibility and Choice
 Supports deduplication backup, backup to disk, snapshot-based
backup, and backup to tape
 Mix and match software anytime for complete data protection
What’s Included:
‒Avamar
‒NetWorker
‒DD Boost for Enterprise Apps
‒Data Protection Advisor
‒CloudBoost
‒DP Search
© Copyright 2017 Dell Inc.
End-to-end data protection for VMware based environments
Data Protection Suite for VMware
 Market-Leading Integration with VMware
 Empower vAdmins by providing self-service protection to users
 Software-Only Data Protection
 Hypervisor based replication for any point-in-time recovery
 Backup system scales to 96 TB when configured with DD VE
 Shortened Backup Times and Storage Cost Savings
 30x faster image recovery than traditional backups
 10-38x reduction in backup storage
 Application Consistency
 Across a broad application landscape of mission critical apps
 Microsoft Application Aware
What’s Included:
‒Avamar
‒Avamar Virtual Edition
‒RecoverPoint for VMs
‒Data Protection Advisor
‒DP Search
29 of 30
Content managementFile shares/serversVirtual machinesDatabases Enterprise applicationsE-mail servers
Backup Archive
• Database
• Mainframe
• IBMi
• Big Data
• File/E-mail
• VMware
• File
• E-mail
• Big data
• Content management
• Storage tiering
• Database
• NAS
• ROBO
Protect everything on a single platform
The Ultimate Protection Storage
Disaster recovery Long-term retention
VTL
Inline Encryption
Standard network protocols
DD Boost, CIFS, NFS, VTL, NDMP
GDPR ready
30 of 30
Avamar NetWorker
NetBackup
Backup
ExecvRanger NetVault
Data
Protector RMAN SAP
SAP
HANA DB2
SQL &
Exchange
Greenplum
DD BoostDD Boost Supported over SAN
DD BoostDD Boost Supported over LAN
VDP
Advanced
DD BoostDD Boost Supported over WAN
Veeam HortonWorks Cloudera
For everything else, use the
DD Boost file system plug-in
Data Domain Boost Ecosystem
© Copyright 2017 Dell Inc.31
Converged and
comprehensive
Fast and
modern
High value and low
cost
Integrated Data Protection Appliance
Innovation without compromise
© Copyright 2017 Dell Inc.32
Converged and comprehensive
Backup
servers
Backup
storage
Search &
analytics
Tape
libraries
Copy
storage
Flash
Backup
software
DELL EMC DATA PROTECTION
Days Hours
34TB – 1PB
1/10th
Time to deploy*
*Based on Dell EMC internal analysis as of February 2017
© Copyright 2017 Dell Inc.33
Converged and comprehensive
DELL EMC DATA PROTECTION
34TB – 1PB
Physical
VM VM VM VM VM VM
Virtual
Any application, multi-hypervisor & vmware optimizedWidest protected workload ecosystem
© Copyright 2017 Dell Inc.34
Dell EMC data Protection delivers it all…..uniquely positioned to help you Modernize,
Automate and Transform protection across what you value MOST….your data
Why Dell EMC for Data Protection
© Copyright 2017 Dell Inc.34
Lowest cost to protect on prem, SDDC and in the cloud
Architecture Matters
Dell EMC TLAs allows consumption flexibility
Simplicity
Whether CapEx or Utility Pricing Dell EMC has options to meet
your financial needs
Flexibility
A single proven technology partner to unify your protection
today and tomorrow
Reliability
– in Data Protection
– in De-dup ratios
– in Recovery
performance
Best “Cost to
protect” in the
industry
© Copyright 2016 Dell Inc.35
Business needs
Drake University sought to implement
a disaster recovery strategy to
safeguard the information and
applications involved in digital
learning. Given the small size and
limited disaster-recovery skills of the
IT team, the solution needed to be
effective and easily manageable
without much manual intervention.
Business results
•Recovers data and applications rapidly and
reliably from secondary site
•Simplifies and automates disaster recovery,
using industry-best practices
•Streamlines infrastructure portfolio
management through vendor consolidation
•Supports enhanced digital learning through
cloud-based disaster recovery
Solutions at a glance
Dell EMC Data Protection Suite
Disaster
recovery enables
digital learning
Organization: Drake University | Industry: Higher Education | Country: United States | Website: www.drake.edu
Storage e Protezione dei Dati

More Related Content

What's hot

Le soluzioni tecnologiche per il Copy Data Management
Le soluzioni tecnologiche per il Copy Data ManagementLe soluzioni tecnologiche per il Copy Data Management
Le soluzioni tecnologiche per il Copy Data Management
Jürgen Ambrosi
 
Complete data management with Veritas, with Virgil Dobos
Complete data management with Veritas, with Virgil DobosComplete data management with Veritas, with Virgil Dobos
Complete data management with Veritas, with Virgil Dobos
Veritas Technologies LLC
 
Cloud Bursting: Leveraging the Cloud to Maintain App Performance during Peak ...
Cloud Bursting: Leveraging the Cloud to Maintain App Performance during Peak ...Cloud Bursting: Leveraging the Cloud to Maintain App Performance during Peak ...
Cloud Bursting: Leveraging the Cloud to Maintain App Performance during Peak ...
Veritas Technologies LLC
 
Modernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen AlahmadModernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen Alahmad
Veritas Technologies LLC
 
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup AppliancesDeep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Veritas Technologies LLC
 
Predictable Business Continuity for Amazon Web Services
Predictable Business Continuity for Amazon Web ServicesPredictable Business Continuity for Amazon Web Services
Predictable Business Continuity for Amazon Web Services
Veritas Technologies LLC
 
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
Veritas Technologies LLC
 
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
Veritas Technologies LLC
 
Accelerate your digital business transformation with 360 Data Management
Accelerate your digital business transformation with 360 Data ManagementAccelerate your digital business transformation with 360 Data Management
Accelerate your digital business transformation with 360 Data Management
Veritas Technologies LLC
 
Implementing a long term data retention strategy that leverages the cloud
Implementing a long term data retention strategy that leverages the cloudImplementing a long term data retention strategy that leverages the cloud
Implementing a long term data retention strategy that leverages the cloud
Veritas Technologies LLC
 
12 Architectural Requirements for Protecting Business Data in the Cloud
12 Architectural Requirements for Protecting Business Data in the Cloud12 Architectural Requirements for Protecting Business Data in the Cloud
12 Architectural Requirements for Protecting Business Data in the Cloud
Buurst
 
Technical Best Practices for Veritas and Microsoft Azure Using a Detailed Ref...
Technical Best Practices for Veritas and Microsoft Azure Using a Detailed Ref...Technical Best Practices for Veritas and Microsoft Azure Using a Detailed Ref...
Technical Best Practices for Veritas and Microsoft Azure Using a Detailed Ref...
Veritas Technologies LLC
 
Migrate Existing Applications to AWS without Re-engineering
Migrate Existing Applications to AWS without Re-engineeringMigrate Existing Applications to AWS without Re-engineering
Migrate Existing Applications to AWS without Re-engineering
Buurst
 
A futuristic look at BnR: The rise of the machine learning
A futuristic look at BnR: The rise of the machine learningA futuristic look at BnR: The rise of the machine learning
A futuristic look at BnR: The rise of the machine learning
Veritas Technologies LLC
 
AWSome Insider's View of NetBackup 8.1
AWSome Insider's View of NetBackup 8.1AWSome Insider's View of NetBackup 8.1
AWSome Insider's View of NetBackup 8.1
Veritas Technologies LLC
 
How to Stop Over Paying Your VMware Taxes
How to Stop Over Paying Your VMware TaxesHow to Stop Over Paying Your VMware Taxes
How to Stop Over Paying Your VMware Taxes
Veritas Technologies LLC
 
MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Ev...
MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Ev...MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Ev...
MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Ev...
Dell EMC World
 
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
Veritas Technologies LLC
 
Rethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloadsRethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloads
Veritas Technologies LLC
 
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the Cloud
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the CloudNetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the Cloud
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the Cloud
Veritas Technologies LLC
 

What's hot (20)

Le soluzioni tecnologiche per il Copy Data Management
Le soluzioni tecnologiche per il Copy Data ManagementLe soluzioni tecnologiche per il Copy Data Management
Le soluzioni tecnologiche per il Copy Data Management
 
Complete data management with Veritas, with Virgil Dobos
Complete data management with Veritas, with Virgil DobosComplete data management with Veritas, with Virgil Dobos
Complete data management with Veritas, with Virgil Dobos
 
Cloud Bursting: Leveraging the Cloud to Maintain App Performance during Peak ...
Cloud Bursting: Leveraging the Cloud to Maintain App Performance during Peak ...Cloud Bursting: Leveraging the Cloud to Maintain App Performance during Peak ...
Cloud Bursting: Leveraging the Cloud to Maintain App Performance during Peak ...
 
Modernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen AlahmadModernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen Alahmad
 
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup AppliancesDeep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
 
Predictable Business Continuity for Amazon Web Services
Predictable Business Continuity for Amazon Web ServicesPredictable Business Continuity for Amazon Web Services
Predictable Business Continuity for Amazon Web Services
 
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
 
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
 
Accelerate your digital business transformation with 360 Data Management
Accelerate your digital business transformation with 360 Data ManagementAccelerate your digital business transformation with 360 Data Management
Accelerate your digital business transformation with 360 Data Management
 
Implementing a long term data retention strategy that leverages the cloud
Implementing a long term data retention strategy that leverages the cloudImplementing a long term data retention strategy that leverages the cloud
Implementing a long term data retention strategy that leverages the cloud
 
12 Architectural Requirements for Protecting Business Data in the Cloud
12 Architectural Requirements for Protecting Business Data in the Cloud12 Architectural Requirements for Protecting Business Data in the Cloud
12 Architectural Requirements for Protecting Business Data in the Cloud
 
Technical Best Practices for Veritas and Microsoft Azure Using a Detailed Ref...
Technical Best Practices for Veritas and Microsoft Azure Using a Detailed Ref...Technical Best Practices for Veritas and Microsoft Azure Using a Detailed Ref...
Technical Best Practices for Veritas and Microsoft Azure Using a Detailed Ref...
 
Migrate Existing Applications to AWS without Re-engineering
Migrate Existing Applications to AWS without Re-engineeringMigrate Existing Applications to AWS without Re-engineering
Migrate Existing Applications to AWS without Re-engineering
 
A futuristic look at BnR: The rise of the machine learning
A futuristic look at BnR: The rise of the machine learningA futuristic look at BnR: The rise of the machine learning
A futuristic look at BnR: The rise of the machine learning
 
AWSome Insider's View of NetBackup 8.1
AWSome Insider's View of NetBackup 8.1AWSome Insider's View of NetBackup 8.1
AWSome Insider's View of NetBackup 8.1
 
How to Stop Over Paying Your VMware Taxes
How to Stop Over Paying Your VMware TaxesHow to Stop Over Paying Your VMware Taxes
How to Stop Over Paying Your VMware Taxes
 
MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Ev...
MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Ev...MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Ev...
MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Ev...
 
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
 
Rethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloadsRethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloads
 
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the Cloud
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the CloudNetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the Cloud
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the Cloud
 

Similar to Storage e Protezione dei Dati

How to Accelerate Backup Performance with Dell DR Series Backup Appliances
How to Accelerate Backup Performance with Dell DR Series Backup AppliancesHow to Accelerate Backup Performance with Dell DR Series Backup Appliances
How to Accelerate Backup Performance with Dell DR Series Backup Appliances
DLT Solutions
 
MT47 Modernize infrastructure for a modern data center
MT47 Modernize infrastructure for a modern data centerMT47 Modernize infrastructure for a modern data center
MT47 Modernize infrastructure for a modern data center
Dell EMC World
 
EMC Isilon Solutions for Data Archives
EMC Isilon Solutions for Data ArchivesEMC Isilon Solutions for Data Archives
EMC Isilon Solutions for Data Archives
solarisyougood
 
MT25 Server technology trends, workload impacts, and the Dell Point of View
MT25 Server technology trends, workload impacts, and the Dell Point of ViewMT25 Server technology trends, workload impacts, and the Dell Point of View
MT25 Server technology trends, workload impacts, and the Dell Point of View
Dell EMC World
 
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
Netgear Italia
 
Presentation dell™ power vault™ md3
Presentation   dell™ power vault™ md3Presentation   dell™ power vault™ md3
Presentation dell™ power vault™ md3
xKinAnx
 
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Netgear Italia
 
Webinar: The Four Requirements of a Cloud-Era File System
Webinar: The Four Requirements of a Cloud-Era File SystemWebinar: The Four Requirements of a Cloud-Era File System
Webinar: The Four Requirements of a Cloud-Era File System
Storage Switzerland
 
Accelerating Big Data Insights
Accelerating Big Data InsightsAccelerating Big Data Insights
Accelerating Big Data Insights
DataWorks Summit
 
Webinar: What's Best for VDI, Hybrid or All-Flash Storage?
Webinar: What's Best for VDI, Hybrid or All-Flash Storage?Webinar: What's Best for VDI, Hybrid or All-Flash Storage?
Webinar: What's Best for VDI, Hybrid or All-Flash Storage?
Storage Switzerland
 
Emc data domain
Emc data domainEmc data domain
Emc data domain
solarisyougood
 
Webinar: NAS Refresh? – 5 Reasons to Consider the Cloud
Webinar: NAS Refresh? – 5 Reasons to Consider the CloudWebinar: NAS Refresh? – 5 Reasons to Consider the Cloud
Webinar: NAS Refresh? – 5 Reasons to Consider the Cloud
Storage Switzerland
 
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Netgear Italia
 
Ibm spectrum storage protecion
Ibm spectrum storage protecion Ibm spectrum storage protecion
Ibm spectrum storage protecion
Coenraad Smith
 
StoneFly CDR365- Cloud Backup & Disaster Recovery Solution
StoneFly CDR365- Cloud Backup & Disaster Recovery SolutionStoneFly CDR365- Cloud Backup & Disaster Recovery Solution
StoneFly CDR365- Cloud Backup & Disaster Recovery Solution
StoneFly
 
NetBackup CloudCatalyst – efficient, cost-effective deduplication to the cloud
NetBackup CloudCatalyst – efficient, cost-effective deduplication to the cloudNetBackup CloudCatalyst – efficient, cost-effective deduplication to the cloud
NetBackup CloudCatalyst – efficient, cost-effective deduplication to the cloud
Veritas Technologies LLC
 
Nimbus Partner Solutions Brief
Nimbus Partner Solutions BriefNimbus Partner Solutions Brief
Nimbus Partner Solutions Brief
IT Brand Pulse
 
Match Your Backup to Your Business
Match Your Backup to Your BusinessMatch Your Backup to Your Business
Match Your Backup to Your Business
Dell World
 
IBM Spectrum Scale Overview november 2015
IBM Spectrum Scale Overview november 2015IBM Spectrum Scale Overview november 2015
IBM Spectrum Scale Overview november 2015
Doug O'Flaherty
 

Similar to Storage e Protezione dei Dati (20)

How to Accelerate Backup Performance with Dell DR Series Backup Appliances
How to Accelerate Backup Performance with Dell DR Series Backup AppliancesHow to Accelerate Backup Performance with Dell DR Series Backup Appliances
How to Accelerate Backup Performance with Dell DR Series Backup Appliances
 
MT47 Modernize infrastructure for a modern data center
MT47 Modernize infrastructure for a modern data centerMT47 Modernize infrastructure for a modern data center
MT47 Modernize infrastructure for a modern data center
 
EMC Isilon Solutions for Data Archives
EMC Isilon Solutions for Data ArchivesEMC Isilon Solutions for Data Archives
EMC Isilon Solutions for Data Archives
 
MT25 Server technology trends, workload impacts, and the Dell Point of View
MT25 Server technology trends, workload impacts, and the Dell Point of ViewMT25 Server technology trends, workload impacts, and the Dell Point of View
MT25 Server technology trends, workload impacts, and the Dell Point of View
 
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
Webinar NETGEAR - Acronis e Netgear per il backup - Demo soluzione piccolo uf...
 
Cleversafe.PPTX
Cleversafe.PPTXCleversafe.PPTX
Cleversafe.PPTX
 
Presentation dell™ power vault™ md3
Presentation   dell™ power vault™ md3Presentation   dell™ power vault™ md3
Presentation dell™ power vault™ md3
 
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
 
Webinar: The Four Requirements of a Cloud-Era File System
Webinar: The Four Requirements of a Cloud-Era File SystemWebinar: The Four Requirements of a Cloud-Era File System
Webinar: The Four Requirements of a Cloud-Era File System
 
Accelerating Big Data Insights
Accelerating Big Data InsightsAccelerating Big Data Insights
Accelerating Big Data Insights
 
Webinar: What's Best for VDI, Hybrid or All-Flash Storage?
Webinar: What's Best for VDI, Hybrid or All-Flash Storage?Webinar: What's Best for VDI, Hybrid or All-Flash Storage?
Webinar: What's Best for VDI, Hybrid or All-Flash Storage?
 
Emc data domain
Emc data domainEmc data domain
Emc data domain
 
Webinar: NAS Refresh? – 5 Reasons to Consider the Cloud
Webinar: NAS Refresh? – 5 Reasons to Consider the CloudWebinar: NAS Refresh? – 5 Reasons to Consider the Cloud
Webinar: NAS Refresh? – 5 Reasons to Consider the Cloud
 
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...
 
Ibm spectrum storage protecion
Ibm spectrum storage protecion Ibm spectrum storage protecion
Ibm spectrum storage protecion
 
StoneFly CDR365- Cloud Backup & Disaster Recovery Solution
StoneFly CDR365- Cloud Backup & Disaster Recovery SolutionStoneFly CDR365- Cloud Backup & Disaster Recovery Solution
StoneFly CDR365- Cloud Backup & Disaster Recovery Solution
 
NetBackup CloudCatalyst – efficient, cost-effective deduplication to the cloud
NetBackup CloudCatalyst – efficient, cost-effective deduplication to the cloudNetBackup CloudCatalyst – efficient, cost-effective deduplication to the cloud
NetBackup CloudCatalyst – efficient, cost-effective deduplication to the cloud
 
Nimbus Partner Solutions Brief
Nimbus Partner Solutions BriefNimbus Partner Solutions Brief
Nimbus Partner Solutions Brief
 
Match Your Backup to Your Business
Match Your Backup to Your BusinessMatch Your Backup to Your Business
Match Your Backup to Your Business
 
IBM Spectrum Scale Overview november 2015
IBM Spectrum Scale Overview november 2015IBM Spectrum Scale Overview november 2015
IBM Spectrum Scale Overview november 2015
 

More from Jürgen Ambrosi

Discover AI with Microsoft Azure
Discover AI with Microsoft AzureDiscover AI with Microsoft Azure
Discover AI with Microsoft Azure
Jürgen Ambrosi
 
IBM Cloud Platform
IBM Cloud Platform IBM Cloud Platform
IBM Cloud Platform
Jürgen Ambrosi
 
Laboratori virtuali
Laboratori virtualiLaboratori virtuali
Laboratori virtuali
Jürgen Ambrosi
 
Esploriamo Windows 10: nuove funzionalità e aggiornamenti. Potenziare l’esper...
Esploriamo Windows 10: nuove funzionalità e aggiornamenti. Potenziare l’esper...Esploriamo Windows 10: nuove funzionalità e aggiornamenti. Potenziare l’esper...
Esploriamo Windows 10: nuove funzionalità e aggiornamenti. Potenziare l’esper...
Jürgen Ambrosi
 
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
Jürgen Ambrosi
 
Power BI Overview e la soluzione SCA per gli Atenei
 Power BI Overview e la soluzione SCA per gli Atenei Power BI Overview e la soluzione SCA per gli Atenei
Power BI Overview e la soluzione SCA per gli Atenei
Jürgen Ambrosi
 
HPC on Azure for Reserach
HPC on Azure for ReserachHPC on Azure for Reserach
HPC on Azure for Reserach
Jürgen Ambrosi
 
Gruppo di lavoro ICT - attività 2019
Gruppo di lavoro ICT - attività 2019Gruppo di lavoro ICT - attività 2019
Gruppo di lavoro ICT - attività 2019
Jürgen Ambrosi
 
Threat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPRThreat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPR
Jürgen Ambrosi
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRIdentity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Jürgen Ambrosi
 
Proposte ORACLE per la gestione dei contenuti digitali e per la ricerca scien...
Proposte ORACLE per la gestione dei contenuti digitali e per la ricerca scien...Proposte ORACLE per la gestione dei contenuti digitali e per la ricerca scien...
Proposte ORACLE per la gestione dei contenuti digitali e per la ricerca scien...
Jürgen Ambrosi
 
Proposte ORACLE per la modernizzazione dello sviluppo applicativo
Proposte ORACLE per la modernizzazione dello sviluppo applicativoProposte ORACLE per la modernizzazione dello sviluppo applicativo
Proposte ORACLE per la modernizzazione dello sviluppo applicativo
Jürgen Ambrosi
 
Proposte ORACLE per la modernizzazione del Datacenter e delle infrastrutture IT
Proposte ORACLE per la modernizzazione del Datacenter e delle infrastrutture ITProposte ORACLE per la modernizzazione del Datacenter e delle infrastrutture IT
Proposte ORACLE per la modernizzazione del Datacenter e delle infrastrutture IT
Jürgen Ambrosi
 
L’assistente virtuale che informa gli studenti: l'esperienza del Politecnico ...
L’assistente virtuale che informa gli studenti: l'esperienza del Politecnico ...L’assistente virtuale che informa gli studenti: l'esperienza del Politecnico ...
L’assistente virtuale che informa gli studenti: l'esperienza del Politecnico ...
Jürgen Ambrosi
 
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
 Webinar Fondazione CRUI e VMware: VMware vRealize Suite Webinar Fondazione CRUI e VMware: VMware vRealize Suite
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
Jürgen Ambrosi
 
Le soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPRLe soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPR
Jürgen Ambrosi
 
IBM Cloud: Architecture for Disruption
IBM Cloud: Architecture for DisruptionIBM Cloud: Architecture for Disruption
IBM Cloud: Architecture for Disruption
Jürgen Ambrosi
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
Jürgen Ambrosi
 
VMware Site Recovery Manager
VMware Site Recovery ManagerVMware Site Recovery Manager
VMware Site Recovery Manager
Jürgen Ambrosi
 
Hands on labs NSX
Hands on labs NSXHands on labs NSX
Hands on labs NSX
Jürgen Ambrosi
 

More from Jürgen Ambrosi (20)

Discover AI with Microsoft Azure
Discover AI with Microsoft AzureDiscover AI with Microsoft Azure
Discover AI with Microsoft Azure
 
IBM Cloud Platform
IBM Cloud Platform IBM Cloud Platform
IBM Cloud Platform
 
Laboratori virtuali
Laboratori virtualiLaboratori virtuali
Laboratori virtuali
 
Esploriamo Windows 10: nuove funzionalità e aggiornamenti. Potenziare l’esper...
Esploriamo Windows 10: nuove funzionalità e aggiornamenti. Potenziare l’esper...Esploriamo Windows 10: nuove funzionalità e aggiornamenti. Potenziare l’esper...
Esploriamo Windows 10: nuove funzionalità e aggiornamenti. Potenziare l’esper...
 
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
 
Power BI Overview e la soluzione SCA per gli Atenei
 Power BI Overview e la soluzione SCA per gli Atenei Power BI Overview e la soluzione SCA per gli Atenei
Power BI Overview e la soluzione SCA per gli Atenei
 
HPC on Azure for Reserach
HPC on Azure for ReserachHPC on Azure for Reserach
HPC on Azure for Reserach
 
Gruppo di lavoro ICT - attività 2019
Gruppo di lavoro ICT - attività 2019Gruppo di lavoro ICT - attività 2019
Gruppo di lavoro ICT - attività 2019
 
Threat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPRThreat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPR
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRIdentity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
 
Proposte ORACLE per la gestione dei contenuti digitali e per la ricerca scien...
Proposte ORACLE per la gestione dei contenuti digitali e per la ricerca scien...Proposte ORACLE per la gestione dei contenuti digitali e per la ricerca scien...
Proposte ORACLE per la gestione dei contenuti digitali e per la ricerca scien...
 
Proposte ORACLE per la modernizzazione dello sviluppo applicativo
Proposte ORACLE per la modernizzazione dello sviluppo applicativoProposte ORACLE per la modernizzazione dello sviluppo applicativo
Proposte ORACLE per la modernizzazione dello sviluppo applicativo
 
Proposte ORACLE per la modernizzazione del Datacenter e delle infrastrutture IT
Proposte ORACLE per la modernizzazione del Datacenter e delle infrastrutture ITProposte ORACLE per la modernizzazione del Datacenter e delle infrastrutture IT
Proposte ORACLE per la modernizzazione del Datacenter e delle infrastrutture IT
 
L’assistente virtuale che informa gli studenti: l'esperienza del Politecnico ...
L’assistente virtuale che informa gli studenti: l'esperienza del Politecnico ...L’assistente virtuale che informa gli studenti: l'esperienza del Politecnico ...
L’assistente virtuale che informa gli studenti: l'esperienza del Politecnico ...
 
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
 Webinar Fondazione CRUI e VMware: VMware vRealize Suite Webinar Fondazione CRUI e VMware: VMware vRealize Suite
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
 
Le soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPRLe soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPR
 
IBM Cloud: Architecture for Disruption
IBM Cloud: Architecture for DisruptionIBM Cloud: Architecture for Disruption
IBM Cloud: Architecture for Disruption
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
 
VMware Site Recovery Manager
VMware Site Recovery ManagerVMware Site Recovery Manager
VMware Site Recovery Manager
 
Hands on labs NSX
Hands on labs NSXHands on labs NSX
Hands on labs NSX
 

Recently uploaded

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 

Recently uploaded (20)

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 

Storage e Protezione dei Dati

  • 1. 1 of 94 Dell - Internal Use - Confidential Portfolio Overview Lorenzo Puopolo Sr. Account Systems Engineer
  • 2. 2 of 94 Dell - Internal Use - Confidential The world’s most value-focused global supply chain providing technology infrastructure for organizations of all sizes The world’s leading data center innovation engine with cutting-edge enterprise infrastructure for the most demanding environments The world’s largest privately-held technology company with world-class enterprise sales and support
  • 3. 3 of 94 Dell - Internal Use - Confidential The world’s most value-focused global supply chain providing technology infrastructure for organizations of all sizes The world’s leading data center innovation engine with cutting-edge enterprise infrastructure for the most demanding environments Fortune 500ISG Revenue
  • 4. 4 of 94 Dell - Internal Use - Confidential CONVERGED SERVERS STORAGE FLASH SOFTWARE-DEFINED STORAGE VIRTUALIZATION DATA PROTECTION
  • 5. 5 of 94 Dell - Internal Use - Confidential INDUSTRY'S #1 Storage Portfolio High-end storage UnstructuredMidrange
  • 6. ISILON per CRUI Webinair Sr. Specialist SE: Andrea Gallo Ugoandrea.gallo@dell.com
  • 7. 7 © Copyright 2017 Dell Inc.7 Isilon - The Recognized Leader
  • 8. © Copyright 2017 Dell Inc.8 Content Subscribers US News Best Hospitals 1.3EB Pharmaceutical Companies 8 of the Top 10 Video Surveillance Cameras 2B+ 2M+ 11of the Top 18 Hadoop Analytics Isilon industry leadership 8 Capabilities and Market LEADERCapabilities and Market LEADER
  • 9.
  • 10. 10 © Copyright 2017 Dell Inc.10 Isilon Workload Consolidation
  • 11. 11 © Copyright 2017 Dell Inc.11 TCO Optimization: Simplicity and Ease of Use • Automation: NO manual intervention NO reconfiguration NO server or client mount point or application changes NO data migrations NO RAID • Automation: NO manual intervention NO reconfiguration NO server or client mount point or application changes NO data migrations NO RAID Single File System Spans All NodesSingle File System Spans All Nodes Directories and Files Striped Across Cluster
  • 12. 12 © Copyright 2017 Dell Inc.12 Push-Button Linear Scaling Under 60 Seconds Transparent to Users and Applications Unconstrained Scale
  • 13. 13 © Copyright 2017 Dell Inc.13 Extreme PerformanceNASTier Enterprise NASTier ColdArchive ObjectTier Just Enough Flash TCO Optimization: Policy-Based Automated Tiering HIGHEST PERFORMANCE LOWEST TCO •Tier Between Performance, Enterprise and Archive Nodes •Transparent to Users and Applications HIGHEST PERFORMANCE LOWEST TCO •Tier Between Performance, Enterprise and Archive Nodes •Transparent to Users and Applications
  • 14. 14 © Copyright 2017 Dell Inc.14 Extreme PerformanceTier Enterprise Tier Isilon CloudPools and ECS: Integrated and Automated Archive Tier ECS Geo-Replicated Dedicated Cloud Other Public Clouds Single Namespace. Encrypted and SecureLower TCO Than Public Cloud Policies Control When, Where, How You Move to Cloud
  • 15. 15 © Copyright 2017 Dell Inc.15 Isilon Gen6: Dense Scale Out Architecture • Dedicated compute per node • 4 Nodes per chassis • Broadwell CPU (2-16 Cores) • Up to 1024 GB RAM • Dedicated compute per node • 4 Nodes per chassis • Broadwell CPU (2-16 Cores) • Up to 1024 GB RAM ComputeComputeComputeComputeDrive EnclosureDrive EnclosureDrive EnclosureDrive Enclosure • 4U chassis • 5 Drive Sleds per Node • Up to 6 Drives per Sled • Hot swappable drives • 4U chassis • 5 Drive Sleds per Node • Up to 6 Drives per Sled • Hot swappable drives BackFront Increased Density Increased performance Increased capacity Increased Data protection Increased Density Increased performance Increased capacity Increased Data protection Benefits
  • 16. © Copyright 2017 Dell Inc.16 Hybrid Nodes Performance, Capacity and Value Extreme Performance and Scalability All-Flash Nodes Archive Nodes Capacity & Economics Meet the New Isilon Family F800 H600 H500 H400 250K ops/s, <1ms 15 GB/s read 120K ops/s 12 GB/s read 5 GB/s read 3 GB/s read 96 TB 924 TB 72 TB 144 TB 120 TB 480 TB A200 800 TBA2000 120 TB 480 TB 120 TB 480 TB
  • 17. Nitro Performance Capacity ScratchFlash Archive Hybrid-Series Archive-Series ScratchIRF Long Term Sequencers Compute Archive RAW BCL FASTQ BAM VCF Workstations S3 Isilon Gen6 in HPC enviromental
  • 18. © Copyright 2017 Dell Inc.18 Decision Support Decision Support Web Click data Web Click data OLAPOLAP EDWEDW HDFS: Isilon Shared Data lake MAP Reduce MAP Reduce MAP Reduce MAP Reduce Step 1: Jobs are run Compute Cluster HadoopHadoop NameNodeNameNode DataNodeDataNode
  • 19. © Copyright 2017 Dell Inc.19 SMB, NFS, HTTP, FTP, HDFS NameNodeNameNode DataNodeDataNode HDFS: Integrated Isilon and Hadoop name node name node name node name node datanode NFSNFS SMBSMB SMBSMB NFSNFS hdfs://cloudera HDFS hdfs://pivotal hdfs://hortonworks hdfs://apache
  • 20. Dell EMC Data Protection Solutions (DPS) Alessio D’Andrea Dell EMC Advisory Solution Engineer – DPS specialist Alessio.dandrea@dell.com
  • 21. Dell - Internal Use - Confidential21of Y DATA CENTERS OF DATA © Copyright 2017 Dell Inc.21 Where is your data and… How do you protect it? “DATA FOG”
  • 22. Dell - Internal Use - Confidential22of Y Only 1 in 4 customers have a single vendor approach…* Today’s approach * IDC 2017
  • 23. Dell - Internal Use - Confidential23of Y DELL EMC Data Protection Strategy Automate Everywhere it Makes Sense Transform . Modernize © Copyright 2017 Dell Inc.23 People Process Technology Automation PROTECTION DATA APP APP APP CLOUD APP CLOUD APP CLOUD APP
  • 24. Dell - Internal Use - Confidential24of Y Protection and recovery for cloud PROTECTION STORAGE PROTECTION SOFTWARE Best of breed Integrated PROTECTION APPLIANCE Dell EMC Data Protection Portfolio MODERNIZE, TRANSFORM and AUTOMATE DATA PROTECTION with
  • 25. © Copyright 2017 Dell Inc.25 Data Protection Everywhere How You Want It How You Want It Virtualized Converged InfrastructureOn-Prem SnapsReplication Archive Isolated RecoveryLTR Continuous Availability APP As-a-Service Cloud Private / Public Where You Need It Where You Need It Consumption Models Protection SLO Backup RTO & RPO
  • 26. © Copyright 2017 Dell Inc. Comprehensive, industry-leading data protection Data Protection Suite Family Data Protection Suite Enterprise Edition Data Protection Suite For VMware Choose the right solution for your environment: Data Protection Suite For Backup Data Protection Suite For Applications Data Protection Suite For Archive
  • 27. © Copyright 2017 Dell Inc. Best-of-breed backup and recovery software Data Protection Suite for Backup  Centralized Data Protection Management  Comprehensive scheduling, policy management, monitoring, analysis and reporting for physical, virtual and cloud environments  Cloud-Enabled  Delivers backups of data and applications WITHIN the public cloud  Provides secure long-term-retention of backups TO the cloud  Flexibility and Choice  Supports deduplication backup, backup to disk, snapshot-based backup, and backup to tape  Mix and match software anytime for complete data protection What’s Included: ‒Avamar ‒NetWorker ‒DD Boost for Enterprise Apps ‒Data Protection Advisor ‒CloudBoost ‒DP Search
  • 28. © Copyright 2017 Dell Inc. End-to-end data protection for VMware based environments Data Protection Suite for VMware  Market-Leading Integration with VMware  Empower vAdmins by providing self-service protection to users  Software-Only Data Protection  Hypervisor based replication for any point-in-time recovery  Backup system scales to 96 TB when configured with DD VE  Shortened Backup Times and Storage Cost Savings  30x faster image recovery than traditional backups  10-38x reduction in backup storage  Application Consistency  Across a broad application landscape of mission critical apps  Microsoft Application Aware What’s Included: ‒Avamar ‒Avamar Virtual Edition ‒RecoverPoint for VMs ‒Data Protection Advisor ‒DP Search
  • 29. 29 of 30 Content managementFile shares/serversVirtual machinesDatabases Enterprise applicationsE-mail servers Backup Archive • Database • Mainframe • IBMi • Big Data • File/E-mail • VMware • File • E-mail • Big data • Content management • Storage tiering • Database • NAS • ROBO Protect everything on a single platform The Ultimate Protection Storage Disaster recovery Long-term retention VTL Inline Encryption Standard network protocols DD Boost, CIFS, NFS, VTL, NDMP GDPR ready
  • 30. 30 of 30 Avamar NetWorker NetBackup Backup ExecvRanger NetVault Data Protector RMAN SAP SAP HANA DB2 SQL & Exchange Greenplum DD BoostDD Boost Supported over SAN DD BoostDD Boost Supported over LAN VDP Advanced DD BoostDD Boost Supported over WAN Veeam HortonWorks Cloudera For everything else, use the DD Boost file system plug-in Data Domain Boost Ecosystem
  • 31. © Copyright 2017 Dell Inc.31 Converged and comprehensive Fast and modern High value and low cost Integrated Data Protection Appliance Innovation without compromise
  • 32. © Copyright 2017 Dell Inc.32 Converged and comprehensive Backup servers Backup storage Search & analytics Tape libraries Copy storage Flash Backup software DELL EMC DATA PROTECTION Days Hours 34TB – 1PB 1/10th Time to deploy* *Based on Dell EMC internal analysis as of February 2017
  • 33. © Copyright 2017 Dell Inc.33 Converged and comprehensive DELL EMC DATA PROTECTION 34TB – 1PB Physical VM VM VM VM VM VM Virtual Any application, multi-hypervisor & vmware optimizedWidest protected workload ecosystem
  • 34. © Copyright 2017 Dell Inc.34 Dell EMC data Protection delivers it all…..uniquely positioned to help you Modernize, Automate and Transform protection across what you value MOST….your data Why Dell EMC for Data Protection © Copyright 2017 Dell Inc.34 Lowest cost to protect on prem, SDDC and in the cloud Architecture Matters Dell EMC TLAs allows consumption flexibility Simplicity Whether CapEx or Utility Pricing Dell EMC has options to meet your financial needs Flexibility A single proven technology partner to unify your protection today and tomorrow Reliability – in Data Protection – in De-dup ratios – in Recovery performance Best “Cost to protect” in the industry
  • 35. © Copyright 2016 Dell Inc.35 Business needs Drake University sought to implement a disaster recovery strategy to safeguard the information and applications involved in digital learning. Given the small size and limited disaster-recovery skills of the IT team, the solution needed to be effective and easily manageable without much manual intervention. Business results •Recovers data and applications rapidly and reliably from secondary site •Simplifies and automates disaster recovery, using industry-best practices •Streamlines infrastructure portfolio management through vendor consolidation •Supports enhanced digital learning through cloud-based disaster recovery Solutions at a glance Dell EMC Data Protection Suite Disaster recovery enables digital learning Organization: Drake University | Industry: Higher Education | Country: United States | Website: www.drake.edu

Editor's Notes

  1. Bringing Dell and EMC, two industry powerhouses into one new company &amp;lt;CLICK&amp;gt; in Dell EMC has created the world’s largest privately held technology company, with revenues of over $30B! ISG alone would be listed as #93 on the Fortune 500 today! &amp;lt;CLICK&amp;gt;
  2. Bringing Dell and EMC, two industry powerhouses into one new company &amp;lt;CLICK&amp;gt; in Dell EMC has created the world’s largest privately held technology company, with revenues of over $30B! ISG alone would be listed as #93 on the Fortune 500 today! &amp;lt;CLICK&amp;gt;
  3. Bringing Dell and EMC, two industry powerhouses into one new company &amp;lt;CLICK&amp;gt; in Dell EMC has created the world’s largest privately held technology company, with revenues of over $30B! ISG alone would be listed as #93 on the Fortune 500 today! &amp;lt;CLICK&amp;gt;
  4. We are #1 in an incredible amount of places and we will continue to push the envelop and aggressively pursue #1 status in every area of our business &amp;lt;CLICK&amp;gt;
  5. We have the industry&amp;apos;s most comprehensive storage portfolio…. As you heard from David on Monday, we have a wealth of riches and the #1 overall market position within these key storage segments, including software defined. A portfolio designed to deliver high-end, midrange and unstructured solutions based on the unique requirements of your applications., because – after all- this is all about enabling your customers’ applications. From All-Flash to software defined the Dell EMC storage portfolio is #1 in the industry. &amp;lt;CLICK&amp;gt;
  6. Let’s compare the 4 Infinity hardware with corresponding Gen 5 hardware with similar characteristics. Compare H600 to S210 &amp;lt;read the slide&amp;gt;
  7. Lead-in: it’s not just the core and edge You can seamlessly tier data to take advantage of cloud economics. We support a range of public and private clouds
  8. Lead-in: it’s not just the core and edge You can seamlessly tier data to take advantage of cloud economics. We support a range of public and private clouds
  9. Lead-in: now let’s switch gears and dig deeper into this new architecture of the new family of nodes and tell you they’re so ground-breaking. This is a brand-new design that was thought through from the ground up with goals to maximize the performance density; capacity density; throughput and IOPS improving on Isilon’s enterprise grade availability, reliability and serviceability The new chassis houses 4 nodes to a 4U chassis. That’s up to a 4:1 reduction in rack space compared to previous gen nodes All nodes in the new family use the latest Broadwell CPU from Intel and It’s a totally flexible and configurable architecture in which you have a choice of compute or memory or networking or HDD or SSD options. All drives are completely front-of-rack hot swappable for easy serviceability. Its networking modularity means the new gen nodes can connect to installed clusters using InfiniBand while new clusters can be deployed with a GigE cluster network. Both 10 gigabit and 40 gigabit Ethernet are supported for client network based on the performance needs of the user and node type. And they run the same OneFS which means the support all OneFS features and are completely interoperable with existing Isilon nodes in the same cluster
  10. Lead-in: some people do better visualizing numbers This slide shows the feeds and speed for the product family
  11. Perhaps nothing demonstrates that shift more profoundly than the data center. Once upon a time, the data center was every infrastructure team’s pride and joy. They’d eagerly show off the amazing things they’d put together – racks and racks of beautiful technology. Today, “data center” has almost become a dirty word, synonymous with “capital expense” and “legacy thinking”. In addition to business’s distaste for data centers, there are technical reasons why we can’t easily centralize everything in a “data center” anymore. Businesses, applications, and users have become so distributed and data has become so large, that organizations can’t build a data center in which to centralize everything. There isn’t enough network bandwidth, there is too much latency, and there are too many regulations to have one data center. &amp;lt;CLICK&amp;gt; Instead, we now build “centers of data” where they are needed. As applications become virtualized, distributed, and concurrent, so does the data. &amp;lt;CLICK&amp;gt; With all the layers of virtualization, who can answer the questions: “Where is my data?” And “How do I protect it?” As we make the cloud real, it comes down to earth and becomes fog – a data fog. How do you cut through that fog?
  12. Let’s transition from the theoretical to the abstract. How do people protect their data today? As much as they’d like to tell you that they have a simple, standard solution that covers everything… they don’t. Companies have solutions for their traditional physical environments- backup software they’ve been running it for years. They may have more than one… if they ever did an acquisition…. Or had multiple sites … or just multiple autonomous groups. And, within that environment, the DBAs and storage teams are doing some things on their own. We often see one or more solutions for the virtualization environment. Even though the regulations, requirements, and applications line up with the physical environment… most companies found that, initially, their traditional backup application didn’t meet the scale/performance/management needs for the VM environment. So they got one… or two… or three solutions there. (By the way, the DBAs and storage teams are STILL doing things on their own in this environment). Now, cloud admins are coming up with their own tools and processes for the cloud. The result – there are two kinds of companies. Those who know they have one more than one approach to protect their data… and those who will soon learn that they have more than one approach to protect their data. It’s important to understand that nobody in the company is trying to cause trouble with these mechanisms. In general, everybody – from backup to virtualization to application to storage to cloud admin – everybody is just trying to get the job done and the data protected. Just, without a plan, you end up with…
  13. How do we achieve the simplification of modernization? It’s a 3 pronged strategy that addresses the current challenges: Standardize. Replace the ad hoc approaches by standardizing the environment – across people, process, and technology. Think of a standard backup appliance that covers your end-to-end backup needs. Simplify. Replace the manual effort by simplifying the daily management of protection. Think of that single control point for managing your backups and recoveries – from daily operations to recoveries. Cloud. Leverage the cloud to help cover any gaps in the protection – be it long-term retention, offsite replication, disaster recovery, or isolated recovery. The focus is to automate existing processes with improved technology. The technology should help you optimize the existing processes and do more with your people.   Transformation, on the other hand, requires changing the people and process. While the technology will evolve, that is the easiest part of the effort. In the new world, the backup team needs to understand that: Different groups are already running their own protection techniques. The traditional backup approach didn’t meet their needs. There is no way to convince those teams to go back to a model that is slow, expensive, and siloed. The backup team still brings tremendous amounts of value to the environment . They understand business risks, define policies, catalog the data, manage the protection infrastructure – regardless of how the data moves. The protection team will still be held accountable. They own the end-to-end protection of the environment, so they can’t just ignore all the new protection mechanisms, operations, and copies. The goal for the protection team should be to deliver “data protection as a service” – using the value they offer WHILE embracing the new data protection technologies. This approach brings the users to one place, instead of driving them into “shadow data protection”. Then they can be the central hub for protection for all the applications: traditional, on-prem, off-prem, hybrid – while enabling the SDDC/cloud-style delegated management.
  14. We believe that we are the only company in the market that can deliver the entire spectrum of data protection. We can walk you through the phases of transition that have helped thousands of customers modernize and transform their backup environments. Let us help you as well.
  15. As we talk to our customers throughout the world, there is one continuous thread i.e. data centers are evolving faster than ever before, our customers are taking advantage of the different consumption models to place application workloads across them – be it on prem private clouds or off-prem public clouds, on virtualized and converged infrastructure. And they continue to have protection needs that span the RTO / RPO continuum from continuous availability to backup, archive, and LTR. With Data Domain, we strive to provide you the best of breed solution for all your protection storage needs across all consumption models so you can realize the most efficient protection solution -- Wherever your data lives and however you want it – protection storage appliances, converged platforms, software-defined, and in cloud.
  16. The Dell EMC Data Protection Suite Family provides enterprise organizations industry-leading data protection through a comprehensive set of offerings specifically tailored to meet your needs. Whether your data protection environment is rich with mission critical applications, fully virtualized, focused on backup and recovery with requirements for supporting many different use cases including NAS and export to tape, or a complex assortment of these, the Data Protection Suite Family offers solutions that meet the specific needs of your business. Because there is no such thing as a one size fits all solution, Dell EMC has designed the Data Protection Suite Family based on enabling you to meet service levels that align to your business objectives. Let’s take a deeper look at each of offerings: Data Protection Suite Enterprise Edition is a comprehensive data protection solution designed to address the requirements of organizations of all sizes, from mid-market data center deployments to complex enterprise environments. Enterprise Edition expands the value of Dell EMC’s industry-leading backup and recovery solutions with replication and archive. Data Protection Suite for Backup is a backup and recovery software solution, delivering industry-leading data protection to a variety of enterprise organizations. Designed for use in physical and virtual environments and supporting many different deployment models including deduplication backup, back up to disk, snapshot-based backup, and backup to tape, this Suite offers flexibility to mix and match components to quickly optimize performance and data protection today and in the future, while also reducing costs. Data Protection Suite for Applications, a solution targeted at Data Base Administrators charged with protecting mission critical data, offers 20x faster backup, empowers application administrators and eliminates the impact on an application by removing it from the backup process – which also reduces overall cost and complexity. Data Protection Suite for VMware offers end-to-end data protection for VMware-based environments including backup and recovery, continuous data protection, monitoring and analysis, and search capabilities. This offering is a software-only data protection solution that delivers simplified deployment and administration within virtualized and cloud environments. It is unique in the market in that no other vendor provides this depth and breadth of data protection. Data Protection Suite for Archive offers data protection solutions designed to helps companies locate, archive and manage critical business information from emails, file systems, and Microsoft SharePoint to reclaim valuable storage space and improve efficiency in compliance and eDiscovery processes.
  17. Data Protection Suite for Backup is our industry-leading backup and recovery software solution. It: Delivers data protection to a variety of enterprise organizations through Dell EMC’s best-of-breed software solutions. Provides centralized data protection management with comprehensive monitoring, reporting, and analysis for physical, virtual and public cloud environments. Is cloud enabled – delivering backups of data and applications within the public cloud, as well as secure long-term retention of backups to the cloud. Offers flexibility to mix and match components to quickly optimize performance and data protection today and in the future. Supports many different deployment models and protection technologies including: Deduplication backup Back up to disk Snapshot-based backup Backup to tape It enables you to mix and match your software deployment to your specific use case needs, which may change over time and thus reduces your TCO. Products included in Data Protection Suite for Backup include: Avamar NetWorker Data Protection Advisor DD Boost for Enterprise Applications As well as the following enabling technologies: Data Protection Search CloudBoost
  18. Another one of our targeted use-case offerings within the Data Protection Suite Family is Data Protection Suite for VMware. It: Offers end-to-end data protection for VMware-based environments including; Backup and recovery Continuous data protection Monitoring and analysis And search capabilities. Provides industry-leading integration with VMware; and empowers vAdmins by providing self-service protection to users. Is a software-only data protection solution that delivers simplified deployment and administration within virtualized and cloud environments. Yields 30x faster image recovery than traditional backups, as well as 10-30x reduction in backup storage. Is unique in the market in that no other vendor provides this depth and breadth of data protection. VMware Microsoft Application Aware: inject application protection in a Virtual Machines during an Image Backup Products included in Data Protection Suite for VMware include: Avamar Data Protection Advisor RecoverPoint for VMs And the enabling technology: Data Protection Search
  19. Now, let me take you through how Data Domain systems are the ideal protection storage platform for backup and archive data. On the top here, you can see a variety of data sources including databases, e-mail servers, virtual machines and more. One of the main strengths of Data Domain systems is that all of these data sources and broad range of backup and archive use cases can be protected on a single system. Inline encryption provides a fast and secure solution that ensures that user data never resides in a vulnerable, unencrypted state on the disk subsystem. One of the key differentiators Data Domain systems offer is the ability to deduplicate and encrypt data inline as it is written to disk. Furthermore, on the archive side, Data Domain systems can meet a variety of US and international compliance regulations for archive data with retention lock technology. All data sent to a Data Domain system can be efficiently replicated to a secondary site for disaster recovery or to the public, private or hybrid cloud for long-term retention. Data Domain can emulate up to 64 virtual tape libraries with up to 540 virtual tape drives, and unlimited tape cartridges. The key that enables DD OS to provide industry-leading performance while minimizing disk requirements is the Dell EMC Data Domain Stream-Informed Segment Layout (SISLTM) scaling architecture. Specifically, SISL leverages the continued advancement of CPU performance to continuously increase Data Domain system performance by minimizing disk accesses required to deduplicate data. SISL deduplicates data by identifying duplicate data segments in memory, which minimizes disk usage. This enables Data Domain throughput to be CPU-centric, not “spindle bound.”
  20. By integrating with leading backup, enterprise applications and Big Data Applications on Hadoop, DD Boost has a broad ecosystem to integrate with a range of customer environments. For other applications not listed above, Dell EMC offers scripted support through DD Boost File System Plug-in.
  21. Dell EMC Integrated Data Protection Appliance, or IDPA for short, is that solution and was designed from the ground up to address today’s and tomorrow’s data protection challenges – providing data protection innovation without compromise. IDPA is a pre-integrated, turnkey solution that is simple to deploy and scale, provides comprehensive data protection for a large and diverse ecosystem of applications and hypervisors, and comes with native cloud tiering for long term retention. With IDPA, you will gain business agility with a solution that is fast – data is protected more efficiently and can be recovered quicker – and reliable with Dell EMC’s industry proven data invulnerability architecture. IDPA combines protection storage, protection software, search, and analytics to reduce the complexity of managing multiple data silos, point solutions and vendor relationships. In summary, Dell EMC provides a holistic and future proof solution that is: Converged and Comprehensive Fast and Modern, and Provides High-Value and Low TCO
  22. What do we mean when we say converged and comprehensive. IDPA is a pre-integrated, turnkey solution that is easy to deploy and scale. While other “integrated” solutions provide a basic packaging of backup applications and storage targets, IDPA converges data protection across four key vectors:   First, is convergence of protection storage, software, search, and analytics integrated into a single appliance, delivering 10x faster time to protect compared to traditional build your own deployments. You also get the full data protection lifecycle in a single appliance instead of having to purchase and manage multiple products from multiple vendors.
  23. The third convergence vector for IDPA is providing protection across a wide and diverse application ecosystem, both physical and virtual, and support for multiple hypervisors (vSphere and HyperV). While many data protection solutions focus on a few applications or platforms, Dell EMC data protection provides broad application coverage, combined with unique application integration, automation, and optimization services. With comprehensive physical and virtual workload ecosystem coverage, coverage for multiple hypervisors. This enables you to consolidate the protection for all of your workloads onto a single appliance, eliminate silos and inefficient data and infrastructure sprawl, and gain business agility at a lower TCO.
  24. Which leads to the final question – who is ideal partner to help you along on this journey? Not surprisingly, we at Dell EMC think we’re the right choice. In this new world, you cannot afford to simply pick one approach to protection and say – “That’s the right way to do it.” If you don’t see a path from traditional IT to next-gen IT, you’ll get stuck in the past and need to rip and replace the protection environment in a couple of years to transform. If the proposal is to rip and replace the traditional environment with a transformational, next-gen approach, how will you manage the transformation? Can you afford the “rip and replace”? You need a partner who can help you modernize the environment, laying the technical and business foundation for the next-gen environment AND who can then help you transition workloads to that next-gen environment seamlessly – across technology, people, and process.