SlideShare a Scribd company logo
Sebastian Straub
Principal Solutions Architect
Meet our experts
James McDonnell
Sr. System Engineer
Cloud workload patterns we’re seeing
Majority of workloads will end up in the public cloud. But this takes time.
For a while many will have:
• on-premise workloads
• on-public cloud workloads
• “disconnected” cloud options.
• “co-existence” or any combination of the above (hybrid)
Hybrid cloud market trends
https://www.t 4
dirbyh/yrtsudni/ia.
-
duolc
-
tekram
Hybrid cloud is the fastest
growing cloud deployment
model driven by an increasing
need for flexibility and the
benefits obtained from both
the private and public cloud.
Hybrid cloud market trends
22% per year is the average projected growth for hybrid cloud
environments from now to 2025
Third party management software is making it increasingly easier
to manage hybrid cloud deployments
Public cloud leaders (AWS, Azure) are concentrating on
innovations for the hybrid cloud
Hybrid cloud use cases we’re seeing
Data center extension:
Improving on-prem
storage, networking,
infrastructure, and
analytics by extending into
the public cloud.
(AWS VPC, API Gateway)
Edge computing:
Disconnected
environments with
limited processing power
can be loaded into the
public cloud for resilient
long-term storage.
(AWS Snowball Edge)
Data proximity:
Due to low latency or
compliance
requirements some
companies need to be
near their data.
(AWS Outposts)
Hybrid cloud use cases we’re seeing
Compatibility issues:
Many companies have
large footprints with
existing ISV solutions
and want compatibility
with existing on-
premise solutions.
(VMware)
High availability:
Companies choose to
create a high availability,
DR and BC plan on the
public cloud.
Company acquisitions:
MSPs or acquisitions
that bring along
different infrastructure
management.
The challenges of your backup protection
in a hybrid environment
Lack of automation brings complexity and risk and leads to
processes that are not repeatable, shareable or reproduceable.
Visibility and control
Compliance and governance
Data security
Cost control
Evolution of Data Protection Operations
STAGE 1
DENIAL
Basic backup.
Little to no
reporting.
No monitoring.
Codified manual processes
and reporting. Clear policies
and goals coupled with high-
level usage of native tools.
STAGE 2
HOPE
Disjointed.
Some use of native
backup tools for
reactive reporting.
STAGE 3
GUIDANCE
STAGE 4
CONTROL
Automated processes,
proactive monitoring,
centralized visibility.
Labor Costs Very Low High High Low
Risks…
Inability to recover data
in the event of
cybersecurity attack
Very High High Moderate Low
Inability to pass
compliance audits
Very High High Moderate Low
Compliance penalty fees Very High High Moderate Low
Stage 2: Control |Manual Reporting
Limited
Alerting
ASSET INVENTORY
(e.g. CMDB, VMs, Azure + AWS resources)
CLOUD BACKUP
STORAGE
ON PREM BACKUP
TAPE & DISK
No Alerting
Manual Performance
Reporting
Manual
ticketing
Manual
ticketing
Manual
ticketing
Manual Audit
Reporting
Manual Performance
Reporting
Manual Audit
Reporting
Manual Performance
Reporting
Manual Audit
Reporting
Manual Inventory
Comparison
Limited
Alerting
Limited
Alerting
Limited
Alerting
Manual Performance
Reporting
Time intensive. No centralization. Poor visibility. Zero monitoring.
Stage 4: Control |Automating Monitoring
Best practices for protecting your hybrid cloud
Backup EVERYTHING
Automate all possible security avenues: backup,
restore, storage, compliance operations, reporting
across all hybrid, public and private platforms.
Centralize backup monitoring from legacy on-prem
solutions to AWS and other cloud-based tools.
Easily identify unprotected resources, expired
snapshots, and major cost savings opportunities.
Proactively address data protection concerns by
automating critical failure alerting and ticketing.
The Automation Business Case
Labor Hours: Hundreds of labor hours reduced from:​
• Data collection
• Data normalization, grouping, analysis​
• Report creation and distribution​
• Job failure troubleshooting and remediation​
• Ticket creation​
Risk Mitigation: Improved, proactive backup monitoring and automated
failure resolution decreases data protection holes
Compliance Penalty Reduction: Better oversight ensures compliance with
government regulations (HIPAA, SOX, FFIEC, etc.) and internal auditors
Operational backup & disaster
recovery (DR) built for AWS.
Flexible policies —scheduling from
minutes to months.
Distributed as an AMI through AWS
Marketplace.
Near-zero RTO, recover in seconds
from any type of outage across AWS
regions and accounts.
N2WS #1 Backup & Recovery for AWS
User-friendly “single pane of glass”
with dashboards, monitoring, alerting,
reporting, and third-party integrations.
Optimize data lifecycle management
Meet any retention period
N2WS supports multi-tiered
archiving for EBS snapshots and
archiving to S3 or Glacier for long-
term retention
Turn instances on/off on
demand
Stay compliant for less
Store data for as long as you
need while paying less, by
archiving to Amazon S3, Glacier,
or Deep Archive
Reduce your AWS bill by turning
off non-critical Amazon EC2/RDS
instances on-demand or
automatically
Restore Anything
Recover anything from a
single file to your entire AWS
environment (yes, even
encrypted files)
Demo Time!
http://bit.ly/bocada-n2ws
Bocada Announces
N2WS Reporting
Integration
Sign up for N2WS Free Trial
n2ws.com/trial
Q&A
Try Bocada for free
bocada.com/contact

More Related Content

What's hot

Migrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal AgenciesMigrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal Agencies
VMware
 
Your Server. Your Way.
Your Server. Your Way.Your Server. Your Way.
Your Server. Your Way.
Insight
 
Different Cloud Environments
Different Cloud EnvironmentsDifferent Cloud Environments
Different Cloud Environments
ContentAssets
 
Guide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudGuide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public Cloud
Insight
 
CLOUD COMPUTING
CLOUD COMPUTINGCLOUD COMPUTING
CLOUD COMPUTING
rajeev bhatt
 
8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaS8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaS
marketingunitrends
 
Modern Security for the Modern Data Center
Modern Security for the Modern Data CenterModern Security for the Modern Data Center
Modern Security for the Modern Data Center
VMware
 
New Model for IT: Cloud Service Provider
New Model for IT: Cloud Service ProviderNew Model for IT: Cloud Service Provider
New Model for IT: Cloud Service Provider
VMware
 
Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
 Examining Technical Best Practices for Veritas and Azure Using a Detailed Re... Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
Veritas Technologies LLC
 
Executive DCIM
Executive DCIMExecutive DCIM
Executive DCIM
Viridity Software
 
Disaster recovery with cloud computing
Disaster recovery with cloud computingDisaster recovery with cloud computing
Disaster recovery with cloud computing
Israel Roy Sambu
 
VAST Corporate Brochure
VAST Corporate BrochureVAST Corporate Brochure
VAST Corporate Brochure
VAST
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
Qualys
 
The 7 Rules of IT Disaster Recovery by Acronis
The 7 Rules of IT Disaster Recovery by AcronisThe 7 Rules of IT Disaster Recovery by Acronis
The 7 Rules of IT Disaster Recovery by Acronis
Acronis
 
SIEM : Security Information and Event Management
SIEM : Security Information and Event Management SIEM : Security Information and Event Management
SIEM : Security Information and Event Management
SHRIYARAI4
 
Disaster Recovery vs. Business Continuity
Disaster Recovery vs. Business ContinuityDisaster Recovery vs. Business Continuity
Disaster Recovery vs. Business Continuity
RapidScale
 
Best cloud security practices with MITRE ATT&CK
Best cloud security practices with MITRE ATT&CKBest cloud security practices with MITRE ATT&CK
Best cloud security practices with MITRE ATT&CK
Shriya Rai
 
Demystifying Top 5 Cloud Migration Myths
Demystifying Top 5 Cloud Migration MythsDemystifying Top 5 Cloud Migration Myths
Demystifying Top 5 Cloud Migration Myths
Vivek Mishra
 
Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24
 

What's hot (19)

Migrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal AgenciesMigrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal Agencies
 
Your Server. Your Way.
Your Server. Your Way.Your Server. Your Way.
Your Server. Your Way.
 
Different Cloud Environments
Different Cloud EnvironmentsDifferent Cloud Environments
Different Cloud Environments
 
Guide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudGuide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public Cloud
 
CLOUD COMPUTING
CLOUD COMPUTINGCLOUD COMPUTING
CLOUD COMPUTING
 
8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaS8 Things You Need to Know About DRaaS
8 Things You Need to Know About DRaaS
 
Modern Security for the Modern Data Center
Modern Security for the Modern Data CenterModern Security for the Modern Data Center
Modern Security for the Modern Data Center
 
New Model for IT: Cloud Service Provider
New Model for IT: Cloud Service ProviderNew Model for IT: Cloud Service Provider
New Model for IT: Cloud Service Provider
 
Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
 Examining Technical Best Practices for Veritas and Azure Using a Detailed Re... Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
 
Executive DCIM
Executive DCIMExecutive DCIM
Executive DCIM
 
Disaster recovery with cloud computing
Disaster recovery with cloud computingDisaster recovery with cloud computing
Disaster recovery with cloud computing
 
VAST Corporate Brochure
VAST Corporate BrochureVAST Corporate Brochure
VAST Corporate Brochure
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
The 7 Rules of IT Disaster Recovery by Acronis
The 7 Rules of IT Disaster Recovery by AcronisThe 7 Rules of IT Disaster Recovery by Acronis
The 7 Rules of IT Disaster Recovery by Acronis
 
SIEM : Security Information and Event Management
SIEM : Security Information and Event Management SIEM : Security Information and Event Management
SIEM : Security Information and Event Management
 
Disaster Recovery vs. Business Continuity
Disaster Recovery vs. Business ContinuityDisaster Recovery vs. Business Continuity
Disaster Recovery vs. Business Continuity
 
Best cloud security practices with MITRE ATT&CK
Best cloud security practices with MITRE ATT&CKBest cloud security practices with MITRE ATT&CK
Best cloud security practices with MITRE ATT&CK
 
Demystifying Top 5 Cloud Migration Myths
Demystifying Top 5 Cloud Migration MythsDemystifying Top 5 Cloud Migration Myths
Demystifying Top 5 Cloud Migration Myths
 
Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018
 

Similar to How to centralize + monitor the health of your hybrid, private and public clouds

Delivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware EnvironmentsDelivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware Environments
Paula Koziol
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigmfanc1985
 
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Jürgen Ambrosi
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
Gopal Jogdand
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
Happiest Minds Technologies
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
CloudSmartz
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
Epoch Universal, Inc.
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overviewshraddhaudage
 
Cloud Computing Overview | Torry Harris Whitepaper
Cloud Computing Overview | Torry Harris WhitepaperCloud Computing Overview | Torry Harris Whitepaper
Cloud Computing Overview | Torry Harris Whitepaper
Torry Harris Business Solutions
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
Metaorange
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
sarah david
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
CloudExpoEurope
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overview
jaimehra05
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overview
sri_kanth0526
 
Optimize your AWS FEST - N2WS session
Optimize your AWS FEST - N2WS sessionOptimize your AWS FEST - N2WS session
Optimize your AWS FEST - N2WS session
OK2OK
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
sarah david
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
Sekhar Mohanty
 
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 A Survey Paper on Removal of Data Duplication in a Hybrid Cloud  A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
IRJET Journal
 
vVols and Your Cloud Operating Model with Tristan Todd
vVols and Your Cloud Operating Model with Tristan ToddvVols and Your Cloud Operating Model with Tristan Todd
vVols and Your Cloud Operating Model with Tristan Todd
Chris Williams
 

Similar to How to centralize + monitor the health of your hybrid, private and public clouds (20)

Delivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware EnvironmentsDelivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware Environments
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
 
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
AWS Services 7 Transformation Media
AWS Services 7 Transformation MediaAWS Services 7 Transformation Media
AWS Services 7 Transformation Media
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overview
 
Cloud Computing Overview | Torry Harris Whitepaper
Cloud Computing Overview | Torry Harris WhitepaperCloud Computing Overview | Torry Harris Whitepaper
Cloud Computing Overview | Torry Harris Whitepaper
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overview
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overview
 
Optimize your AWS FEST - N2WS session
Optimize your AWS FEST - N2WS sessionOptimize your AWS FEST - N2WS session
Optimize your AWS FEST - N2WS session
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
 
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 A Survey Paper on Removal of Data Duplication in a Hybrid Cloud  A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 
vVols and Your Cloud Operating Model with Tristan Todd
vVols and Your Cloud Operating Model with Tristan ToddvVols and Your Cloud Operating Model with Tristan Todd
vVols and Your Cloud Operating Model with Tristan Todd
 

More from OK2OK

Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
OK2OK
 
NEW RELEASE: N2WS Backup & Recovery now with AnySnap Archiver!
NEW RELEASE: N2WS Backup & Recovery now with AnySnap Archiver! NEW RELEASE: N2WS Backup & Recovery now with AnySnap Archiver!
NEW RELEASE: N2WS Backup & Recovery now with AnySnap Archiver!
OK2OK
 
On-Prem to All-In: How Versent Leads Successful AWS Migrations
On-Prem to All-In: How Versent Leads Successful AWS MigrationsOn-Prem to All-In: How Versent Leads Successful AWS Migrations
On-Prem to All-In: How Versent Leads Successful AWS Migrations
OK2OK
 
NEW RELEASE: N2WS Backup & Recovery v3.2 - Overview & Demo
NEW RELEASE: N2WS Backup & Recovery v3.2 - Overview & DemoNEW RELEASE: N2WS Backup & Recovery v3.2 - Overview & Demo
NEW RELEASE: N2WS Backup & Recovery v3.2 - Overview & Demo
OK2OK
 
The accelerated "lift and shift": How iFeu guided a successful migration to AWS
The accelerated "lift and shift": How iFeu guided a successful migration to AWSThe accelerated "lift and shift": How iFeu guided a successful migration to AWS
The accelerated "lift and shift": How iFeu guided a successful migration to AWS
OK2OK
 
5 Key Pieces you are missing when dealing with Data Lifecycle Management in AWS
5 Key Pieces you are missing when dealing with Data Lifecycle Management in AWS5 Key Pieces you are missing when dealing with Data Lifecycle Management in AWS
5 Key Pieces you are missing when dealing with Data Lifecycle Management in AWS
OK2OK
 
NEW N2WS Backup & Recovery v3.1 Overview & Demo
NEW N2WS Backup & Recovery v3.1 Overview & DemoNEW N2WS Backup & Recovery v3.1 Overview & Demo
NEW N2WS Backup & Recovery v3.1 Overview & Demo
OK2OK
 
Automate and accelerate AWS migrations with CloudChomp and N2WS
Automate and accelerate AWS migrations with CloudChomp and N2WS Automate and accelerate AWS migrations with CloudChomp and N2WS
Automate and accelerate AWS migrations with CloudChomp and N2WS
OK2OK
 
How Successful Companies backup their AWS data, workloads and applications wh...
How Successful Companies backup their AWS data, workloads and applications wh...How Successful Companies backup their AWS data, workloads and applications wh...
How Successful Companies backup their AWS data, workloads and applications wh...
OK2OK
 
Avoiding Disasters by Embracing Chaos
Avoiding Disasters by Embracing ChaosAvoiding Disasters by Embracing Chaos
Avoiding Disasters by Embracing Chaos
OK2OK
 
Next-gen Backup for AWS is HERE: N2WS Backup & Recovery v3.0
Next-gen Backup for AWS is HERE: N2WS Backup & Recovery v3.0Next-gen Backup for AWS is HERE: N2WS Backup & Recovery v3.0
Next-gen Backup for AWS is HERE: N2WS Backup & Recovery v3.0
OK2OK
 
5 Takeaways from AWS re:Invent 2019
5 Takeaways from AWS re:Invent 20195 Takeaways from AWS re:Invent 2019
5 Takeaways from AWS re:Invent 2019
OK2OK
 
How to Ransomware-Proof your AWS Cloud
How to Ransomware-Proof your AWS CloudHow to Ransomware-Proof your AWS Cloud
How to Ransomware-Proof your AWS Cloud
OK2OK
 
Cloud Resilience and Container Workload Automation
Cloud Resilience and Container Workload AutomationCloud Resilience and Container Workload Automation
Cloud Resilience and Container Workload Automation
OK2OK
 

More from OK2OK (14)

Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
 
NEW RELEASE: N2WS Backup & Recovery now with AnySnap Archiver!
NEW RELEASE: N2WS Backup & Recovery now with AnySnap Archiver! NEW RELEASE: N2WS Backup & Recovery now with AnySnap Archiver!
NEW RELEASE: N2WS Backup & Recovery now with AnySnap Archiver!
 
On-Prem to All-In: How Versent Leads Successful AWS Migrations
On-Prem to All-In: How Versent Leads Successful AWS MigrationsOn-Prem to All-In: How Versent Leads Successful AWS Migrations
On-Prem to All-In: How Versent Leads Successful AWS Migrations
 
NEW RELEASE: N2WS Backup & Recovery v3.2 - Overview & Demo
NEW RELEASE: N2WS Backup & Recovery v3.2 - Overview & DemoNEW RELEASE: N2WS Backup & Recovery v3.2 - Overview & Demo
NEW RELEASE: N2WS Backup & Recovery v3.2 - Overview & Demo
 
The accelerated "lift and shift": How iFeu guided a successful migration to AWS
The accelerated "lift and shift": How iFeu guided a successful migration to AWSThe accelerated "lift and shift": How iFeu guided a successful migration to AWS
The accelerated "lift and shift": How iFeu guided a successful migration to AWS
 
5 Key Pieces you are missing when dealing with Data Lifecycle Management in AWS
5 Key Pieces you are missing when dealing with Data Lifecycle Management in AWS5 Key Pieces you are missing when dealing with Data Lifecycle Management in AWS
5 Key Pieces you are missing when dealing with Data Lifecycle Management in AWS
 
NEW N2WS Backup & Recovery v3.1 Overview & Demo
NEW N2WS Backup & Recovery v3.1 Overview & DemoNEW N2WS Backup & Recovery v3.1 Overview & Demo
NEW N2WS Backup & Recovery v3.1 Overview & Demo
 
Automate and accelerate AWS migrations with CloudChomp and N2WS
Automate and accelerate AWS migrations with CloudChomp and N2WS Automate and accelerate AWS migrations with CloudChomp and N2WS
Automate and accelerate AWS migrations with CloudChomp and N2WS
 
How Successful Companies backup their AWS data, workloads and applications wh...
How Successful Companies backup their AWS data, workloads and applications wh...How Successful Companies backup their AWS data, workloads and applications wh...
How Successful Companies backup their AWS data, workloads and applications wh...
 
Avoiding Disasters by Embracing Chaos
Avoiding Disasters by Embracing ChaosAvoiding Disasters by Embracing Chaos
Avoiding Disasters by Embracing Chaos
 
Next-gen Backup for AWS is HERE: N2WS Backup & Recovery v3.0
Next-gen Backup for AWS is HERE: N2WS Backup & Recovery v3.0Next-gen Backup for AWS is HERE: N2WS Backup & Recovery v3.0
Next-gen Backup for AWS is HERE: N2WS Backup & Recovery v3.0
 
5 Takeaways from AWS re:Invent 2019
5 Takeaways from AWS re:Invent 20195 Takeaways from AWS re:Invent 2019
5 Takeaways from AWS re:Invent 2019
 
How to Ransomware-Proof your AWS Cloud
How to Ransomware-Proof your AWS CloudHow to Ransomware-Proof your AWS Cloud
How to Ransomware-Proof your AWS Cloud
 
Cloud Resilience and Container Workload Automation
Cloud Resilience and Container Workload AutomationCloud Resilience and Container Workload Automation
Cloud Resilience and Container Workload Automation
 

Recently uploaded

Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
Nidhi Software Price. Fact , Costs, Tips
Nidhi Software Price. Fact , Costs, TipsNidhi Software Price. Fact , Costs, Tips
Nidhi Software Price. Fact , Costs, Tips
vrstrong314
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)
abdulrafaychaudhry
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Game Development with Unity3D (Game Development lecture 3)
Game Development  with Unity3D (Game Development lecture 3)Game Development  with Unity3D (Game Development lecture 3)
Game Development with Unity3D (Game Development lecture 3)
abdulrafaychaudhry
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 

Recently uploaded (20)

Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
Nidhi Software Price. Fact , Costs, Tips
Nidhi Software Price. Fact , Costs, TipsNidhi Software Price. Fact , Costs, Tips
Nidhi Software Price. Fact , Costs, Tips
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Game Development with Unity3D (Game Development lecture 3)
Game Development  with Unity3D (Game Development lecture 3)Game Development  with Unity3D (Game Development lecture 3)
Game Development with Unity3D (Game Development lecture 3)
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 

How to centralize + monitor the health of your hybrid, private and public clouds

  • 1.
  • 2. Sebastian Straub Principal Solutions Architect Meet our experts James McDonnell Sr. System Engineer
  • 3. Cloud workload patterns we’re seeing Majority of workloads will end up in the public cloud. But this takes time. For a while many will have: • on-premise workloads • on-public cloud workloads • “disconnected” cloud options. • “co-existence” or any combination of the above (hybrid)
  • 4. Hybrid cloud market trends https://www.t 4 dirbyh/yrtsudni/ia. - duolc - tekram Hybrid cloud is the fastest growing cloud deployment model driven by an increasing need for flexibility and the benefits obtained from both the private and public cloud.
  • 5. Hybrid cloud market trends 22% per year is the average projected growth for hybrid cloud environments from now to 2025 Third party management software is making it increasingly easier to manage hybrid cloud deployments Public cloud leaders (AWS, Azure) are concentrating on innovations for the hybrid cloud
  • 6. Hybrid cloud use cases we’re seeing Data center extension: Improving on-prem storage, networking, infrastructure, and analytics by extending into the public cloud. (AWS VPC, API Gateway) Edge computing: Disconnected environments with limited processing power can be loaded into the public cloud for resilient long-term storage. (AWS Snowball Edge) Data proximity: Due to low latency or compliance requirements some companies need to be near their data. (AWS Outposts)
  • 7. Hybrid cloud use cases we’re seeing Compatibility issues: Many companies have large footprints with existing ISV solutions and want compatibility with existing on- premise solutions. (VMware) High availability: Companies choose to create a high availability, DR and BC plan on the public cloud. Company acquisitions: MSPs or acquisitions that bring along different infrastructure management.
  • 8. The challenges of your backup protection in a hybrid environment Lack of automation brings complexity and risk and leads to processes that are not repeatable, shareable or reproduceable. Visibility and control Compliance and governance Data security Cost control
  • 9. Evolution of Data Protection Operations STAGE 1 DENIAL Basic backup. Little to no reporting. No monitoring. Codified manual processes and reporting. Clear policies and goals coupled with high- level usage of native tools. STAGE 2 HOPE Disjointed. Some use of native backup tools for reactive reporting. STAGE 3 GUIDANCE STAGE 4 CONTROL Automated processes, proactive monitoring, centralized visibility. Labor Costs Very Low High High Low Risks… Inability to recover data in the event of cybersecurity attack Very High High Moderate Low Inability to pass compliance audits Very High High Moderate Low Compliance penalty fees Very High High Moderate Low
  • 10. Stage 2: Control |Manual Reporting Limited Alerting ASSET INVENTORY (e.g. CMDB, VMs, Azure + AWS resources) CLOUD BACKUP STORAGE ON PREM BACKUP TAPE & DISK No Alerting Manual Performance Reporting Manual ticketing Manual ticketing Manual ticketing Manual Audit Reporting Manual Performance Reporting Manual Audit Reporting Manual Performance Reporting Manual Audit Reporting Manual Inventory Comparison Limited Alerting Limited Alerting Limited Alerting Manual Performance Reporting Time intensive. No centralization. Poor visibility. Zero monitoring.
  • 11. Stage 4: Control |Automating Monitoring
  • 12. Best practices for protecting your hybrid cloud Backup EVERYTHING Automate all possible security avenues: backup, restore, storage, compliance operations, reporting across all hybrid, public and private platforms. Centralize backup monitoring from legacy on-prem solutions to AWS and other cloud-based tools. Easily identify unprotected resources, expired snapshots, and major cost savings opportunities. Proactively address data protection concerns by automating critical failure alerting and ticketing.
  • 13. The Automation Business Case Labor Hours: Hundreds of labor hours reduced from:​ • Data collection • Data normalization, grouping, analysis​ • Report creation and distribution​ • Job failure troubleshooting and remediation​ • Ticket creation​ Risk Mitigation: Improved, proactive backup monitoring and automated failure resolution decreases data protection holes Compliance Penalty Reduction: Better oversight ensures compliance with government regulations (HIPAA, SOX, FFIEC, etc.) and internal auditors
  • 14. Operational backup & disaster recovery (DR) built for AWS. Flexible policies —scheduling from minutes to months. Distributed as an AMI through AWS Marketplace. Near-zero RTO, recover in seconds from any type of outage across AWS regions and accounts. N2WS #1 Backup & Recovery for AWS User-friendly “single pane of glass” with dashboards, monitoring, alerting, reporting, and third-party integrations.
  • 15. Optimize data lifecycle management Meet any retention period N2WS supports multi-tiered archiving for EBS snapshots and archiving to S3 or Glacier for long- term retention Turn instances on/off on demand Stay compliant for less Store data for as long as you need while paying less, by archiving to Amazon S3, Glacier, or Deep Archive Reduce your AWS bill by turning off non-critical Amazon EC2/RDS instances on-demand or automatically Restore Anything Recover anything from a single file to your entire AWS environment (yes, even encrypted files)
  • 17. Sign up for N2WS Free Trial n2ws.com/trial Q&A Try Bocada for free bocada.com/contact

Editor's Notes

  1. 1. Vpc network connections in aws allow you to connect your on premise network with aws. Direct connect, you can hook up that vpc to on premises, get better through-put. Extending network into the public cloud. Aws gateway service. can deploy on premises as hardware or software, your on prem apps can use cloud storage seamlessly. 2. On prem apps that have to stay there. Extremely low latency requreiments. Aws outposts, an applicance that they will ship, same hardware we run aws 4. Incumbent ISVs that have on prem solutions. Vmware for managing compute resources on prem. They have skillsets built up over time. AWS partnered with Vmware codeveloped with AWS, exclusive with Amazon, now can deploy Vmware tools into the public cloud, everything is the same between on prem and the public cloud 5. Edge computing, iot. Snowball, can ship an appliance, get large amounts of data and move into the cloud. Edge has compute capabilities built in so you can deploy those devices into disconnected environments, ship it back and load it into the public cloud for more resilient longterm storage and advanced processing, use snowball edge and load into the public cloud for longterm storage
  2. 1. Vpc network connections in aws allow you to connect your on premise network with aws. Direct connect, you can hook up that vpc to on premises, get better through-put. Extending network into the public cloud. Aws gateway service. can deploy on premises as hardware or software, your on prem apps can use cloud storage seamlessly. 2. On prem apps that have to stay there. Extremely low latency requreiments. Aws outposts, an applicance that they will ship, same hardware we run aws 4. Incumbent ISVs that have on prem solutions. Vmware for managing compute resources on prem. They have skillsets built up over time. AWS partnered with Vmware codeveloped with AWS, exclusive with Amazon, now can deploy Vmware tools into the public cloud, everything is the same between on prem and the public cloud 5. Edge computing, iot. Snowball, can ship an appliance, get large amounts of data and move into the cloud. Edge has compute capabilities built in so you can deploy those devices into disconnected environments, ship it back and load it into the public cloud for more resilient longterm storage and advanced processing, use snowball edge and load into the public cloud for longterm storage
  3. Time Intensive No Centralization. Poor Visibility. Zero Ability to Proactively Monitor.
  4. @Katherine— This is an alternative option for the previous slide
  5. N2WS not only helps you protect in the cloud, but we can also help you lower your AWS costs: We can help you reduce your storage costs by up to 60% with S3 archiving This ensures that you can stay compliant while paying less overall (and your data will still be recoverable) Our new feature ‘Resource Control’ lets you start and stop non-critical instances on demand, automating the process and saving you money