SlideShare a Scribd company logo
Unlock real value from back up data
with IBM Spectrum Protect Plus
Marco van Gils
March 21, 2019
Client Technical Specialist IBM Storage
Marco_van_gils@nl.ibm.com
#NLVMUG | MARCH 21, 2019
Today’s Key Data Protection Trends
Application / Data Recovery
Data availability
Application / Data Reuse
Utilize data for new routes to market
Disaster Recovery
Recovering from a minor to major data loss
Business Continuity
Reducing the risk to the business,
employees, market perception
Cyber Resiliency
Recover the business from
a compromised attack
01
02
03
05
04
#NLVMUG | MARCH 21, 2019
Why Modernize Backup?
Lower Costs
Improved Performance
Simple / SLA Management
Enhanced
Business Agility
Multi Cloud Enablement
#NLVMUG | MARCH 21, 2019
The Phases and Processes of Data Access
Data Management / Operational Recovery
Modernize and expanded use cases with instant
data access, instant recovery leveraging snapshots
Backup
Traditional backup / recovery using
streaming backups
Archive
Long-term data retention /
compliance, corporate governance
#NLVMUG | MARCH 21, 2019
Spectrum Protect Plus – 10.1.3
• Supports
̶ VMware & Hyper-V
̶ MS SQL, Oracle, DB2, MongoDB, MS Exchange
Server (all on physical / virtual systems)
• Primary data reuse use cases
̶ Data Protection / Recovery
̶ Test/Dev, DevOps, Reporting, Analytics, etc…
The enterprise-proven data protection, data reuse solution
from IBM for multiple use cases
Backup Data Made Useful
#NLVMUG | MARCH 21, 2019
What's New in 10.1.3?
• Application Support
- MongoDB – 3.6 / 4.0 – Community and Enterprise
- Microsoft Exchange Server – 2013 CU2, 2016, 2019 – Includes item-level restores
• Optimized offload to Spectrum Protect – no need for SP4VE any longer
• Off-load to Object Storage – IBM COS, IBM COS Worm, Amazon S3, Microsoft
Azure
• High Availability of the Spectrum Protect Plus server for both VMware and
Hyper-V implementations
• Enhanced RESTful APIs – faster time to value around reporting / analytics
NEW
#NLVMUG | MARCH 21, 2019
Spectrum Protect Plus & IBM COS – Cyber Resiliency
• Spectrum Protect 10.1.3 can offload data
to IBM COS and COS WORM storage via S3
̶ Set through single SLA policy
• Data protection to IBM COS WORM is
key to any cyber resiliency strategy
̶ Offload to immutable storage
̶ “Air-gap” like capabilities
̶ Data cannot be deleted or changed
• Utilize offload to IBM COS for off-prem DR
̶ Get data off-site in the event of a disaster
̶ Recover data in multiple locations
#NLVMUG | MARCH 21, 2019
Spectrum Protect Plus – Modern Data Protection
Easy to Deploy
and Manage
Immediate ROI
Intuitive User Interface
Lower OpEx
Software Defined
Software-defined
Proactive Backup Catalog
Automated Data Protection
Instant Recovery
Data Access
Lowest RTO
Self-service – RBAC
Flexible Management
Automation
Orchestration
DevOps, Dev-Test
RESTful APIs
Application Integration
#NLVMUG | MARCH 21, 2019
New Protection / Reuse Attributes
Leading to Real Business Value
Instant Data
Recovery
Data snapshots stored
in native format
Instant recovery from
multiple recovery
points
Agentless &
Efficient
VM APIs for agentless
deployment
Incremental forever,
compression and
dedupe built in
Simple, Easy,
Modern UI
Recovery-driven
simple management
*Easy to use, new UX
SLA, SLO Based
Data
Catalog
Scalable
MongoDB
Google-like
Search interface
Find data quickly
13
#NLVMUG | MARCH 21, 2019
Cloud-like
Agility
Deliver data / systems
on demand or via
schedule
Application, database
& VM centric templates
New Protection / Reuse Attributes
Leading to Real Business Value
End-user
Self Service
Secure Roles Based
Access Controls
(RBAC)
Right data, right
people, right time, right
location
Secure Data,
No Interference
Recover in a fenced
environment
Rename databases and
mountpoints
*New vSnap encryption
Network remapping
Data Delivered
as Code
Infrastructure /
Database as a
service
RESTful APIs
Integration with
DevOps tools
16
#NLVMUG | MARCH 21, 2019
Rapid Data &
System Recovery
Native-format data for
instant access
Application-aware
recovery
New Protection / Reuse Attributes
Leading to Real Business Value
Service
Modernization
Data-as-a-Service
Task automation
Extend to the Cloud
Regulatory
Compliance
Integration with
Spectrum Protect
ensures corporate
governance /
compliance
Data
Reuse
Speed application
delivery cycles
Feed reporting and
analytics engines
19
#NLVMUG | MARCH 21, 2019
One Workflow, Multiple Use Cases
Hypervisor
Run on-premises or in IBM Cloud
Policies, Catalog
Spectrum
Protect Plus
Server
Backup Admin
Gold SLA Silver SLA Bronze SLA
Policy-Based
Management
VM Admin
Developer Help Desk
Roles-Based
AccessHypervisor
Physical Servers
(Protects applications running on
physical and virtual servers, including
Oracle/SQL/Db2/MongoDB/Exchange)
Copy Repository
vSnap Server
Local Data Center
Instant Recovery and Multi-Purpose Data Reuse
API Calls
Copy Repository
vSnap Server
Physical Servers
Remote Data Center
Hypervisor
S3
Offload to
21
#NLVMUG | MARCH 21, 2019
RE-invent Your Business
• Modernize your data protection environment
- Lower your data protection costs
- Improve your business SLAs
- Elevate your staff
- Exploit your data
- Enable the cloud
#NLVMUG | MARCH 21, 2019
© Copyright IBM Corporation 2019. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or
service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
THANK YOU

More Related Content

What's hot

Delivering Backup as a service
Delivering Backup as a serviceDelivering Backup as a service
Delivering Backup as a service
4sl
 
S104876 ibm-cos-jburg-v1809b
S104876 ibm-cos-jburg-v1809bS104876 ibm-cos-jburg-v1809b
S104876 ibm-cos-jburg-v1809b
Tony Pearson
 
Optimize Your VMware SDDC with IBM Infrastructure
Optimize Your VMware SDDC with IBM InfrastructureOptimize Your VMware SDDC with IBM Infrastructure
Optimize Your VMware SDDC with IBM Infrastructure
Paula Koziol
 
Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...
Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...
Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...
Paula Koziol
 
Modernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen AlahmadModernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen Alahmad
Veritas Technologies LLC
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a Service
Ingram Micro Cloud
 
Z111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910aZ111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910a
Tony Pearson
 
S104878 nvme-revolution-jburg-v1809b
S104878 nvme-revolution-jburg-v1809bS104878 nvme-revolution-jburg-v1809b
S104878 nvme-revolution-jburg-v1809b
Tony Pearson
 
Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...
Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...
Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...
Netgear Italia
 
Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015Amer Zia
 
S104874 toe-pool-jburg-v1809e
S104874 toe-pool-jburg-v1809eS104874 toe-pool-jburg-v1809e
S104874 toe-pool-jburg-v1809e
Tony Pearson
 
Achieving Storage Agility and Improved Economics
Achieving Storage Agility and Improved EconomicsAchieving Storage Agility and Improved Economics
Achieving Storage Agility and Improved EconomicsPatrick Berghaeger
 
S100297 ilm-archive-orlando-v1804c
S100297 ilm-archive-orlando-v1804cS100297 ilm-archive-orlando-v1804c
S100297 ilm-archive-orlando-v1804c
Tony Pearson
 
Build your own Cloud
Build your own CloudBuild your own Cloud
Build your own Cloud
IBM Software India
 
IBM Cloud Storage - Cleversafe
IBM Cloud Storage - CleversafeIBM Cloud Storage - Cleversafe
IBM Cloud Storage - CleversafeMichael Beatty
 
Acronis access for blaud event
Acronis access for blaud eventAcronis access for blaud event
Acronis access for blaud event
BLAUD
 
PCTY 2012, Tivoli Storage Strategi og Portfolio Update v. Greg Tevis
PCTY 2012, Tivoli Storage Strategi og Portfolio Update v. Greg TevisPCTY 2012, Tivoli Storage Strategi og Portfolio Update v. Greg Tevis
PCTY 2012, Tivoli Storage Strategi og Portfolio Update v. Greg Tevis
IBM Danmark
 
Virtustream presentation
Virtustream presentationVirtustream presentation
Virtustream presentation
Eimantas
 
Infinidat InfiniGuard
Infinidat InfiniGuardInfinidat InfiniGuard
Infinidat InfiniGuard
MarketingArrowECS_CZ
 

What's hot (20)

Delivering Backup as a service
Delivering Backup as a serviceDelivering Backup as a service
Delivering Backup as a service
 
S104876 ibm-cos-jburg-v1809b
S104876 ibm-cos-jburg-v1809bS104876 ibm-cos-jburg-v1809b
S104876 ibm-cos-jburg-v1809b
 
Optimize Your VMware SDDC with IBM Infrastructure
Optimize Your VMware SDDC with IBM InfrastructureOptimize Your VMware SDDC with IBM Infrastructure
Optimize Your VMware SDDC with IBM Infrastructure
 
Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...
Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...
Addressing VMware Data Backup and Availability Challenges with IBM Spectrum P...
 
Modernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen AlahmadModernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen Alahmad
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a Service
 
Z111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910aZ111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910a
 
S104878 nvme-revolution-jburg-v1809b
S104878 nvme-revolution-jburg-v1809bS104878 nvme-revolution-jburg-v1809b
S104878 nvme-revolution-jburg-v1809b
 
Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...
Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...
Webinar NETGEAR - Acronis Backup 12 e ReadyCloud per il backup e l'accesso re...
 
Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015Acronis+IW_Webinar_10Nov2015
Acronis+IW_Webinar_10Nov2015
 
S104874 toe-pool-jburg-v1809e
S104874 toe-pool-jburg-v1809eS104874 toe-pool-jburg-v1809e
S104874 toe-pool-jburg-v1809e
 
Achieving Storage Agility and Improved Economics
Achieving Storage Agility and Improved EconomicsAchieving Storage Agility and Improved Economics
Achieving Storage Agility and Improved Economics
 
Acronis presentation
Acronis presentationAcronis presentation
Acronis presentation
 
S100297 ilm-archive-orlando-v1804c
S100297 ilm-archive-orlando-v1804cS100297 ilm-archive-orlando-v1804c
S100297 ilm-archive-orlando-v1804c
 
Build your own Cloud
Build your own CloudBuild your own Cloud
Build your own Cloud
 
IBM Cloud Storage - Cleversafe
IBM Cloud Storage - CleversafeIBM Cloud Storage - Cleversafe
IBM Cloud Storage - Cleversafe
 
Acronis access for blaud event
Acronis access for blaud eventAcronis access for blaud event
Acronis access for blaud event
 
PCTY 2012, Tivoli Storage Strategi og Portfolio Update v. Greg Tevis
PCTY 2012, Tivoli Storage Strategi og Portfolio Update v. Greg TevisPCTY 2012, Tivoli Storage Strategi og Portfolio Update v. Greg Tevis
PCTY 2012, Tivoli Storage Strategi og Portfolio Update v. Greg Tevis
 
Virtustream presentation
Virtustream presentationVirtustream presentation
Virtustream presentation
 
Infinidat InfiniGuard
Infinidat InfiniGuardInfinidat InfiniGuard
Infinidat InfiniGuard
 

Similar to Unlock Real Value from Back Up Data with IBM Spectrum Protect Plus

the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
sarah david
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
sarah david
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
Metaorange
 
The ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertThe ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expert
Chapter247 Infotech
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isv
Pandu W Sastrowardoyo
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)Glenn Ambler
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
vijay_m_chaudhary
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
IJMER
 
Hybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfHybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdf
manoharparakh
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Stefaan Van daele
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptx
SaadZaman23
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
IRJET Journal
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
IBM Security
 
Exploring the Applications of Cloud Computing in the IT Industry.pdf
Exploring the Applications of Cloud Computing in the IT Industry.pdfExploring the Applications of Cloud Computing in the IT Industry.pdf
Exploring the Applications of Cloud Computing in the IT Industry.pdf
TechnoMark Solutions
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
jeffirby
 
F017414853
F017414853F017414853
F017414853
IOSR Journals
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Amazon Web Services
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
Amazon Web Services
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
Happiest Minds Technologies
 

Similar to Unlock Real Value from Back Up Data with IBM Spectrum Protect Plus (20)

the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
 
The ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertThe ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expert
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isv
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
 
Hybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfHybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdf
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptx
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
Exploring the Applications of Cloud Computing in the IT Industry.pdf
Exploring the Applications of Cloud Computing in the IT Industry.pdfExploring the Applications of Cloud Computing in the IT Industry.pdf
Exploring the Applications of Cloud Computing in the IT Industry.pdf
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
F017414853
F017414853F017414853
F017414853
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 

More from Paula Koziol

Sizing Splunk SmartStore - Spend Less and Get More Out of Splunk
Sizing Splunk SmartStore - Spend Less and Get More Out of SplunkSizing Splunk SmartStore - Spend Less and Get More Out of Splunk
Sizing Splunk SmartStore - Spend Less and Get More Out of Splunk
Paula Koziol
 
AI Scalability for the Next Decade
AI Scalability for the Next DecadeAI Scalability for the Next Decade
AI Scalability for the Next Decade
Paula Koziol
 
IBM Storage for SAP HANA Deployments
IBM Storage for SAP HANA DeploymentsIBM Storage for SAP HANA Deployments
IBM Storage for SAP HANA Deployments
Paula Koziol
 
IBM Storage at Fiserv Forum 2018
IBM Storage at Fiserv Forum 2018IBM Storage at Fiserv Forum 2018
IBM Storage at Fiserv Forum 2018
Paula Koziol
 
IBM Storage at FIS Connect 2018
IBM Storage at FIS Connect 2018 IBM Storage at FIS Connect 2018
IBM Storage at FIS Connect 2018
Paula Koziol
 
IBM & Veeam: Bridging the availability gap
IBM & Veeam: Bridging the availability gapIBM & Veeam: Bridging the availability gap
IBM & Veeam: Bridging the availability gap
Paula Koziol
 
Transform to Cognitive Healthcare with IBM Software Defined Infrastructure an...
Transform to Cognitive Healthcare with IBM Software Defined Infrastructure an...Transform to Cognitive Healthcare with IBM Software Defined Infrastructure an...
Transform to Cognitive Healthcare with IBM Software Defined Infrastructure an...
Paula Koziol
 
Accelerate Your Signature Banking Applications with IBM Storage Offerings
Accelerate Your Signature Banking Applications with IBM Storage OfferingsAccelerate Your Signature Banking Applications with IBM Storage Offerings
Accelerate Your Signature Banking Applications with IBM Storage Offerings
Paula Koziol
 
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Paula Koziol
 
IBM Storage and VMware – A Winning Combination
IBM Storage and VMware – A Winning CombinationIBM Storage and VMware – A Winning Combination
IBM Storage and VMware – A Winning Combination
Paula Koziol
 
Scalable Data Computing for Healthcare and Life Sciences Industry
Scalable Data Computing for Healthcare and Life Sciences Industry Scalable Data Computing for Healthcare and Life Sciences Industry
Scalable Data Computing for Healthcare and Life Sciences Industry
Paula Koziol
 
Future Proof Your Data: IBM Storage at VeeamON
Future Proof Your Data: IBM Storage at VeeamONFuture Proof Your Data: IBM Storage at VeeamON
Future Proof Your Data: IBM Storage at VeeamON
Paula Koziol
 
IBM Storage at SAPPHIRE 2017
IBM Storage at SAPPHIRE 2017IBM Storage at SAPPHIRE 2017
IBM Storage at SAPPHIRE 2017
Paula Koziol
 
POWER8 the x86 Server Farm - IBM Business Partners use POWER8 to Lower Client...
POWER8 the x86 Server Farm - IBM Business Partners use POWER8 to Lower Client...POWER8 the x86 Server Farm - IBM Business Partners use POWER8 to Lower Client...
POWER8 the x86 Server Farm - IBM Business Partners use POWER8 to Lower Client...
Paula Koziol
 
Why You Should Consider Linux on IBM POWER8 - How IBM Partners are Driving Bu...
Why You Should Consider Linux on IBM POWER8 - How IBM Partners are Driving Bu...Why You Should Consider Linux on IBM POWER8 - How IBM Partners are Driving Bu...
Why You Should Consider Linux on IBM POWER8 - How IBM Partners are Driving Bu...
Paula Koziol
 

More from Paula Koziol (15)

Sizing Splunk SmartStore - Spend Less and Get More Out of Splunk
Sizing Splunk SmartStore - Spend Less and Get More Out of SplunkSizing Splunk SmartStore - Spend Less and Get More Out of Splunk
Sizing Splunk SmartStore - Spend Less and Get More Out of Splunk
 
AI Scalability for the Next Decade
AI Scalability for the Next DecadeAI Scalability for the Next Decade
AI Scalability for the Next Decade
 
IBM Storage for SAP HANA Deployments
IBM Storage for SAP HANA DeploymentsIBM Storage for SAP HANA Deployments
IBM Storage for SAP HANA Deployments
 
IBM Storage at Fiserv Forum 2018
IBM Storage at Fiserv Forum 2018IBM Storage at Fiserv Forum 2018
IBM Storage at Fiserv Forum 2018
 
IBM Storage at FIS Connect 2018
IBM Storage at FIS Connect 2018 IBM Storage at FIS Connect 2018
IBM Storage at FIS Connect 2018
 
IBM & Veeam: Bridging the availability gap
IBM & Veeam: Bridging the availability gapIBM & Veeam: Bridging the availability gap
IBM & Veeam: Bridging the availability gap
 
Transform to Cognitive Healthcare with IBM Software Defined Infrastructure an...
Transform to Cognitive Healthcare with IBM Software Defined Infrastructure an...Transform to Cognitive Healthcare with IBM Software Defined Infrastructure an...
Transform to Cognitive Healthcare with IBM Software Defined Infrastructure an...
 
Accelerate Your Signature Banking Applications with IBM Storage Offerings
Accelerate Your Signature Banking Applications with IBM Storage OfferingsAccelerate Your Signature Banking Applications with IBM Storage Offerings
Accelerate Your Signature Banking Applications with IBM Storage Offerings
 
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
 
IBM Storage and VMware – A Winning Combination
IBM Storage and VMware – A Winning CombinationIBM Storage and VMware – A Winning Combination
IBM Storage and VMware – A Winning Combination
 
Scalable Data Computing for Healthcare and Life Sciences Industry
Scalable Data Computing for Healthcare and Life Sciences Industry Scalable Data Computing for Healthcare and Life Sciences Industry
Scalable Data Computing for Healthcare and Life Sciences Industry
 
Future Proof Your Data: IBM Storage at VeeamON
Future Proof Your Data: IBM Storage at VeeamONFuture Proof Your Data: IBM Storage at VeeamON
Future Proof Your Data: IBM Storage at VeeamON
 
IBM Storage at SAPPHIRE 2017
IBM Storage at SAPPHIRE 2017IBM Storage at SAPPHIRE 2017
IBM Storage at SAPPHIRE 2017
 
POWER8 the x86 Server Farm - IBM Business Partners use POWER8 to Lower Client...
POWER8 the x86 Server Farm - IBM Business Partners use POWER8 to Lower Client...POWER8 the x86 Server Farm - IBM Business Partners use POWER8 to Lower Client...
POWER8 the x86 Server Farm - IBM Business Partners use POWER8 to Lower Client...
 
Why You Should Consider Linux on IBM POWER8 - How IBM Partners are Driving Bu...
Why You Should Consider Linux on IBM POWER8 - How IBM Partners are Driving Bu...Why You Should Consider Linux on IBM POWER8 - How IBM Partners are Driving Bu...
Why You Should Consider Linux on IBM POWER8 - How IBM Partners are Driving Bu...
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Unlock Real Value from Back Up Data with IBM Spectrum Protect Plus

  • 1. Unlock real value from back up data with IBM Spectrum Protect Plus Marco van Gils March 21, 2019 Client Technical Specialist IBM Storage Marco_van_gils@nl.ibm.com #NLVMUG | MARCH 21, 2019
  • 2. Today’s Key Data Protection Trends Application / Data Recovery Data availability Application / Data Reuse Utilize data for new routes to market Disaster Recovery Recovering from a minor to major data loss Business Continuity Reducing the risk to the business, employees, market perception Cyber Resiliency Recover the business from a compromised attack 01 02 03 05 04 #NLVMUG | MARCH 21, 2019
  • 3. Why Modernize Backup? Lower Costs Improved Performance Simple / SLA Management Enhanced Business Agility Multi Cloud Enablement #NLVMUG | MARCH 21, 2019
  • 4. The Phases and Processes of Data Access Data Management / Operational Recovery Modernize and expanded use cases with instant data access, instant recovery leveraging snapshots Backup Traditional backup / recovery using streaming backups Archive Long-term data retention / compliance, corporate governance #NLVMUG | MARCH 21, 2019
  • 5. Spectrum Protect Plus – 10.1.3 • Supports ̶ VMware & Hyper-V ̶ MS SQL, Oracle, DB2, MongoDB, MS Exchange Server (all on physical / virtual systems) • Primary data reuse use cases ̶ Data Protection / Recovery ̶ Test/Dev, DevOps, Reporting, Analytics, etc… The enterprise-proven data protection, data reuse solution from IBM for multiple use cases Backup Data Made Useful #NLVMUG | MARCH 21, 2019
  • 6. What's New in 10.1.3? • Application Support - MongoDB – 3.6 / 4.0 – Community and Enterprise - Microsoft Exchange Server – 2013 CU2, 2016, 2019 – Includes item-level restores • Optimized offload to Spectrum Protect – no need for SP4VE any longer • Off-load to Object Storage – IBM COS, IBM COS Worm, Amazon S3, Microsoft Azure • High Availability of the Spectrum Protect Plus server for both VMware and Hyper-V implementations • Enhanced RESTful APIs – faster time to value around reporting / analytics NEW #NLVMUG | MARCH 21, 2019
  • 7. Spectrum Protect Plus & IBM COS – Cyber Resiliency • Spectrum Protect 10.1.3 can offload data to IBM COS and COS WORM storage via S3 ̶ Set through single SLA policy • Data protection to IBM COS WORM is key to any cyber resiliency strategy ̶ Offload to immutable storage ̶ “Air-gap” like capabilities ̶ Data cannot be deleted or changed • Utilize offload to IBM COS for off-prem DR ̶ Get data off-site in the event of a disaster ̶ Recover data in multiple locations #NLVMUG | MARCH 21, 2019
  • 8. Spectrum Protect Plus – Modern Data Protection Easy to Deploy and Manage Immediate ROI Intuitive User Interface Lower OpEx Software Defined Software-defined Proactive Backup Catalog Automated Data Protection Instant Recovery Data Access Lowest RTO Self-service – RBAC Flexible Management Automation Orchestration DevOps, Dev-Test RESTful APIs Application Integration #NLVMUG | MARCH 21, 2019
  • 9. New Protection / Reuse Attributes Leading to Real Business Value Instant Data Recovery Data snapshots stored in native format Instant recovery from multiple recovery points Agentless & Efficient VM APIs for agentless deployment Incremental forever, compression and dedupe built in Simple, Easy, Modern UI Recovery-driven simple management *Easy to use, new UX SLA, SLO Based Data Catalog Scalable MongoDB Google-like Search interface Find data quickly 13 #NLVMUG | MARCH 21, 2019
  • 10. Cloud-like Agility Deliver data / systems on demand or via schedule Application, database & VM centric templates New Protection / Reuse Attributes Leading to Real Business Value End-user Self Service Secure Roles Based Access Controls (RBAC) Right data, right people, right time, right location Secure Data, No Interference Recover in a fenced environment Rename databases and mountpoints *New vSnap encryption Network remapping Data Delivered as Code Infrastructure / Database as a service RESTful APIs Integration with DevOps tools 16 #NLVMUG | MARCH 21, 2019
  • 11. Rapid Data & System Recovery Native-format data for instant access Application-aware recovery New Protection / Reuse Attributes Leading to Real Business Value Service Modernization Data-as-a-Service Task automation Extend to the Cloud Regulatory Compliance Integration with Spectrum Protect ensures corporate governance / compliance Data Reuse Speed application delivery cycles Feed reporting and analytics engines 19 #NLVMUG | MARCH 21, 2019
  • 12. One Workflow, Multiple Use Cases Hypervisor Run on-premises or in IBM Cloud Policies, Catalog Spectrum Protect Plus Server Backup Admin Gold SLA Silver SLA Bronze SLA Policy-Based Management VM Admin Developer Help Desk Roles-Based AccessHypervisor Physical Servers (Protects applications running on physical and virtual servers, including Oracle/SQL/Db2/MongoDB/Exchange) Copy Repository vSnap Server Local Data Center Instant Recovery and Multi-Purpose Data Reuse API Calls Copy Repository vSnap Server Physical Servers Remote Data Center Hypervisor S3 Offload to 21 #NLVMUG | MARCH 21, 2019
  • 13. RE-invent Your Business • Modernize your data protection environment - Lower your data protection costs - Improve your business SLAs - Elevate your staff - Exploit your data - Enable the cloud #NLVMUG | MARCH 21, 2019
  • 14. © Copyright IBM Corporation 2019. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. THANK YOU