Join Storage Switzerland and Micro Focus for this on demand webinar where we discuss the key disruptors in the market that could impact your data protection plan and what you need to consider to avoid them.
Understand the key 5 trends and their implications on your data center:
●The Shift to Hybrid IT
●Ransomware and other Cyber Threats
●The Proliferation of Mission Critical Applications
●Cloud Storage and Cloud Applications
●The Rise of Remote Office Computing (ROBO)
Unlocking the Potential of the Cloud for IBM Power Systems
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
1. Webinar
5 Key Trends That Could Challenge
Your Data Protection Plan in 2018
Learn the 5 Key Trends and the Impact
on your Data Center:
1. The Shift to Hybrid IT
2. Ransomware and other Cyber Threats
3. The Proliferation of Mission-Critical Applications
4. Cloud Storage and Cloud Applications
5. The Rise of Remote Office Computing
For audio playback and Q&A go to:
http://bit.ly/2018KeyTrends
2. Our Speakers
Gagan Bhatia is the Product Marketing lead for Micro Focus Data Protection solution. In this role, he
drives thought leadership, customer and partner engagement, product positioning, go-to-market
strategy, and long-term vision for the Micro Focus Data Protection Suite. Before joining Micro Focus,
he was the lead Product Marketing Manager at Hewlett Packard Enterprise responsible for Data
Protection, Records Management, and Information Archiving products. Gagan has more than 18
years of experience in Information Management and Governance (IM&G) technologies and solutions.
George Crump is the founder of Storage Switzerland, the leading storage analyst focused on the
subjects of big data, solid state storage, virtualization, cloud computing and data protection. He is
widely recognized for his articles, white papers, and videos on such current approaches as all-flash
arrays, deduplication, SSDs, software-defined storage, backup appliances, and storage networking.
He has over 25 years of experience designing storage solutions for data centers across the US.
3. Level Set - What is the
Goal of Data Protection?
● In the event of an outage
○ Be resilient to that outage
○ Restore the most recent data as quickly as
possible based on organizational
expectations
● Achieving that goal requires
○ Frequent, quality backups
○ Dependable off-site movement
○ Responsive data protection architecture
○ Adaptability to a rapidly changing data center
4. The Data Center Trends that are Impacting
Data Protection in 2018
● The Shift to Hybrid IT
● Ransomware and other Cyber
Threats
● The Proliferation of Mission
Critical Applications
● Cloud Storage and Cloud
Applications
● The Rise of Remote Office
Computing (ROBO)
6. What is Hybrid IT?
● A mixture of workloads across
traditional application clusters,
virtual clusters, hyperconverged
clusters as well as private and
public cloud
● Why is a Hybrid IT strategy
important
7. Impact of Hybrid IT on
Data Protection
● Data is everywhere
● Data is in multiple environments
● Workloads are spun up instantly
without notification
9. What is Ransomware?
● Malware that crawls an
organization's storage and
encrypts it
● To get the “key” organizations
have to pay a ransom ranging
from hundreds to thousands of
dollars
● IT’s ability to recover is
compared to the “ease” of
paying the ransom
10. The Impact of
Ransomware
● Unstructured data is particularly
vulnerable
● Data has to be protected more
frequently
● Backup application must protect
itself from attack
● Recovery, potentially of
hundreds of thousands of files
has to happen rapidly
12. Why are “Apps”
Proliferating
● Development tools and
environments have improved
significantly
● Organization’s mobile and IoT
initiatives are increasing rapidly
13. The Impact of App
Proliferation
● Instead of one or two “mission critical”
apps organizations now have dozens
● These apps do need sub 30 minute
recoveries
● Which means
○ rapid backups
○ data protection with snapshot integration
○ live / instant recovery
● SLA driven data protection
15. What’s Your Cloud
Strategy?
● Cloud Storage as a Backup Target
● Cloud Storage as an Archive Target
● Application Migration to Cloud
Compute
● Bursting to the Cloud
● Software as a Service (Salesforce.com,
Office 365, G-Suite)
● Cloud Boomerang (return to on-
premises)
16. Data
Protection
Consideration
● Cloud as a backup / archive target
● Assisting with data migration
● In-Cloud Application Protection (how and
why)
● SaaS Data Protection (how and why)
● Cloud Exit
23. Hybrid IT: disrupting the old data protection paradigm
Protection across platforms
Legacy backup not built for hybrid
IT environments
Security risks
The cost to businesses of cyber
crime continues to rise
SLA compliance
You are increasingly expected to
treat every app as mission critical
39%
Information Loss is the highest cost at of all
Cyber Crime costs2
20%
of IT Managers are concerned their backup
window is too short for backup to complete1
83%
of companies reported a downtime tolerance
of 3 hours or less for key applications3
1. IDC: Reinventing Data Protection Fit for Digital Transformation, https://www.hpe.com/h20195/V2/getpdf.aspx/4AA6-8166ENW.pdf
2. Ponemon: 2016 Cost of Cyber Crime Study, https://software.microfocus.com/en-us/marketing/cyber-crime-risk-to-business-innovation
3. 2014 Enterprise Strategy Group survey
24. Addressing data protection needs
Protection across platforms
Legacy backup not built for hybrid
IT environments
20%
of IT Managers are concerned their backup
window is too short for backup to complete
Your backup solution should be
data centric across hybrid IT,
not in infrastructure centric
silos
25. Addressing data protection needs
Security risks
The cost to businesses of cyber
crime continues to rise
39%
Information Loss is the highest cost at of all
Cyber Crime costs
Advanced backup as a key
component of your security
strategy is the best defense
26. Addressing data protection needs
SLA compliance
You are increasingly expected to
treat every app as mission critical
83%
of organizations reported a downtime
tolerance of 3 hours or less for key applications
Intelligent automation and
SLA tracking is a must have,
not a nice-to-have
28. More on Micro Focus Data Protection
www.microfocus.com/dataprotectorWebsite
Data Protection BlogsData Protection Blogs
Customer SupportData Protection Support
Flex Care SupportFlex Care Support
Data Protection CommunitySupport Forum
30. 5 Key Trends That Could Challenge
Your Data Protection Plan in 2018
For complete Audio and Q&A please register for the On Demand Version at:
http://bit.ly/2018KeyTrends