SlideShare a Scribd company logo
ARE YOU TREATING
UNSTRUCTURED
DATA LIKE A SECOND
CLASS CITIZEN?
For audio playback and Q&A go to: bit.ly/UnstData
George Crump
Founder/Lead Analyst
Jonathan Calmes
Vice President
Business Development
COMPARING UNSTRUCTURED
DATA PROTECTION TO OTHER
DATA SETS
• Databases are often snapshotted, replicated and
backed up multiple times per day
• Virtual Environments provide change block
tracking so virtual machines are protected every
few hours
• “Instant-Restore” / Recovery in Place very
popular feature
• What about Unstructured data?
• Backed up once per night
• Not often enough, especially with
ransomware
• Maybe snapshotted a couple times per day
• Provides faster backup but horrible search
and weak retention
HOW IMPORTANT IS
UNSTRUCTURED DATA?
• The unstructured data set in terms of
capacity typically dwarfs all other data sets
in the organization
• Data from Office Productivity Applications
often represent a large chunk of the
organization’s creative energy
• It can be reproduced but reproduction
is time consuming
• Data from Machines and Devices represent
a large % of the unstructured data
• In many cases it can’t be reproduced
UNSTRUCTURED DATA
IS HARD TO PROTECT
• Again, the data set, in terms of capacity, is
often the largest in the data center
• Most unstructured data sets are made up
of millions if not billions of files
• The value of unstructured data is often
found inside the file
• Regulations like CCPA and GDPR clearly
indicate that an organization needs to
know what’s inside the file
UNSTRUCTURED DATA
PROTECTION IS AN
AFTERTHOUGHT
• Legacy applications for the most part backup
Unstructured Data a file at a time
• Egregiously slow
• Causes metadata problems with backup
application
• Most applications, today, protect unstructured
as an image
• Fast and No Metadata problems
(because there isn’t any)
• They loose granularity and can’t
extract value
ORGANIZATIONS NEED A SOLUTION
PURPOSE-BUILT FOR UNSTRUCTURED
DATA PROTECTION
• Use snapshot-like data capture for fast but
granular data protection
• Leverage that granularity by providing
content search and automatic data
classification
• Leverage on-premises Object Storage or
• Public Cloud for long-term data retention
• Provide “instant-restore” like functionality
via an in-place mount point
Multi-Cloud Intelligent Data Protection
Action must be taken now to prepare data for future use
Action must be taken now to prepare data for future use
Aparavi File Protect & Insight℠
File by file data protection and archive for servers,
endpoints and storage devices featuring data
classification, content level search, and hybrid
cloud retention and versioning.
Does your organization
have a second line
of defense against
ransomware?
Recover and retrieve with confidence and context
Mountable file
recovery
Automated
alerts and
defense
Near instant
data recovery
Data insight and
governance
Air-gapped
copies in
multiple clouds
Aparavi gives you air-gapped, immutable copies
of all your files so you can recover immediately
Data is Organized
With classification tags
+instant searchable content
Data is Protected
Hybrid and multi cloud
infinitely distributable
Data is Usable
Web access CIFS/NFS mount
open format for AI-ML-BI
Aparavi File Protect & Insight
What problems Aparavi FPI can solve
 Ransomware recovery
 Endpoint and ROBO
protection
 Data retention and Archive
 Compliance and Governance
 Storage optimization (Besides the mystery of Stonehenge)
storageswiss.com
aparavi.com
georgeacrump@
storageswiss.com
info@aparavi.com
@storageswiss
@aparavisoftware
CONTACT US
Storageswiss
Aparavi Software
ARE YOU TREATING
UNSTRUCTURED
DATA LIKE A SECOND
CLASS CITIZEN?
For complete audio and Q&A please register for the On Demand Version:
bit.ly/UnstData

More Related Content

What's hot

CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security Checklist
Druva
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence
Stefaan Van daele
 
User Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network SecurityUser Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network Security
Happiest Minds Technologies
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
Happiest Minds Technologies
 
Edgescan 2021 Vulnerability Stats Report
Edgescan 2021 Vulnerability Stats ReportEdgescan 2021 Vulnerability Stats Report
Edgescan 2021 Vulnerability Stats Report
Eoin Keary
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016patmisasi
 
Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
VivianMarcello3
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
Nicolas Morales
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
Cloudera, Inc.
 
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Druva
 
Managed Cyber Security Services
Managed Cyber Security ServicesManaged Cyber Security Services
Managed Cyber Security Services
Michael Bowers
 
The Importance of Business Data Backups
The Importance of Business Data BackupsThe Importance of Business Data Backups
The Importance of Business Data Backups
SwiftTech Solutions, Inc.
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Storage Switzerland
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...
Marco Casassa Mont
 
Cyber Security Management | Cyber Security Consultant | JST Business Solution...
Cyber Security Management | Cyber Security Consultant | JST Business Solution...Cyber Security Management | Cyber Security Consultant | JST Business Solution...
Cyber Security Management | Cyber Security Consultant | JST Business Solution...
Sahabuddin Siddiqui
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
North Texas Chapter of the ISSA
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
Jerry Paul Acosta
 
Cyber security infotech pvt ltd
Cyber security infotech pvt ltdCyber security infotech pvt ltd
Cyber security infotech pvt ltd
Cyber Security Infotech
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datos
Software Guru
 
Sqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use CaseSqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl
 

What's hot (20)

CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security Checklist
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence
 
User Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network SecurityUser Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network Security
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Edgescan 2021 Vulnerability Stats Report
Edgescan 2021 Vulnerability Stats ReportEdgescan 2021 Vulnerability Stats Report
Edgescan 2021 Vulnerability Stats Report
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016
 
Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
 
Managed Cyber Security Services
Managed Cyber Security ServicesManaged Cyber Security Services
Managed Cyber Security Services
 
The Importance of Business Data Backups
The Importance of Business Data BackupsThe Importance of Business Data Backups
The Importance of Business Data Backups
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...
 
Cyber Security Management | Cyber Security Consultant | JST Business Solution...
Cyber Security Management | Cyber Security Consultant | JST Business Solution...Cyber Security Management | Cyber Security Consultant | JST Business Solution...
Cyber Security Management | Cyber Security Consultant | JST Business Solution...
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
Cyber security infotech pvt ltd
Cyber security infotech pvt ltdCyber security infotech pvt ltd
Cyber security infotech pvt ltd
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datos
 
Sqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use CaseSqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use Case
 

Similar to Webinar: Are You Treating Unstructured Data as a Second Class Citizen?

PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
Proact Netherlands B.V.
 
Webinar: Using the Cloud to Fix Backup's Blind Spot - Endpoint Data Protection
Webinar: Using the Cloud to Fix Backup's Blind Spot - Endpoint Data ProtectionWebinar: Using the Cloud to Fix Backup's Blind Spot - Endpoint Data Protection
Webinar: Using the Cloud to Fix Backup's Blind Spot - Endpoint Data Protection
Storage Switzerland
 
Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013
Steven Williams
 
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
Storage Switzerland
 
Webinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A RealityWebinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A Reality
Storage Switzerland
 
Webinar: Does Object Storage Make Sense for Backups?
Webinar: Does Object Storage Make Sense for Backups?Webinar: Does Object Storage Make Sense for Backups?
Webinar: Does Object Storage Make Sense for Backups?
Storage Switzerland
 
Succor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackupSuccor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackup
Succor Consulting Group, Inc.
 
Webinar: NAS vs. Object Storage: 10 Reasons Why Object Storage Will Win
Webinar: NAS vs. Object Storage: 10 Reasons Why Object Storage Will WinWebinar: NAS vs. Object Storage: 10 Reasons Why Object Storage Will Win
Webinar: NAS vs. Object Storage: 10 Reasons Why Object Storage Will Win
Storage Switzerland
 
HP Autonomy - Three Ways to Preserve and Protect your Virtual Infrastructure
HP Autonomy - Three Ways to Preserve and Protect your Virtual InfrastructureHP Autonomy - Three Ways to Preserve and Protect your Virtual Infrastructure
HP Autonomy - Three Ways to Preserve and Protect your Virtual Infrastructure
VMUG IT
 
Webinar: The Elephant in the Datacenter - Protect, Manage, & Leverage Unstruc...
Webinar: The Elephant in the Datacenter - Protect, Manage, & Leverage Unstruc...Webinar: The Elephant in the Datacenter - Protect, Manage, & Leverage Unstruc...
Webinar: The Elephant in the Datacenter - Protect, Manage, & Leverage Unstruc...
Storage Switzerland
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
Dell World
 
E2 evc 3-2-1-rule - mikeresseler
E2 evc   3-2-1-rule - mikeresselerE2 evc   3-2-1-rule - mikeresseler
E2 evc 3-2-1-rule - mikeresseler
Mike Resseler
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignment
naterator
 
Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021
Karel Kannel
 
Webinar: Achieving VDI Success Without All-Flash Problems
Webinar: Achieving VDI Success Without All-Flash ProblemsWebinar: Achieving VDI Success Without All-Flash Problems
Webinar: Achieving VDI Success Without All-Flash Problems
Storage Switzerland
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recoverymrmwood
 
University of Bath Research Data Management training for researchers
University of Bath Research Data Management training for researchersUniversity of Bath Research Data Management training for researchers
University of Bath Research Data Management training for researchers
Jez Cope
 
EarthLink Business Cloud Server Backup
EarthLink Business Cloud Server BackupEarthLink Business Cloud Server Backup
EarthLink Business Cloud Server BackupMike Ricca
 
somee.pptx
somee.pptxsomee.pptx
somee.pptx
SritamDash6
 
Four Assumptions Killing Backup Storage Webinar
Four Assumptions Killing Backup Storage WebinarFour Assumptions Killing Backup Storage Webinar
Four Assumptions Killing Backup Storage Webinar
Storage Switzerland
 

Similar to Webinar: Are You Treating Unstructured Data as a Second Class Citizen? (20)

PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
 
Webinar: Using the Cloud to Fix Backup's Blind Spot - Endpoint Data Protection
Webinar: Using the Cloud to Fix Backup's Blind Spot - Endpoint Data ProtectionWebinar: Using the Cloud to Fix Backup's Blind Spot - Endpoint Data Protection
Webinar: Using the Cloud to Fix Backup's Blind Spot - Endpoint Data Protection
 
Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013
 
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
Four Reasons Why Your Backup & Recovery Hardware will Break by 2020
 
Webinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A RealityWebinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A Reality
 
Webinar: Does Object Storage Make Sense for Backups?
Webinar: Does Object Storage Make Sense for Backups?Webinar: Does Object Storage Make Sense for Backups?
Webinar: Does Object Storage Make Sense for Backups?
 
Succor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackupSuccor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackup
 
Webinar: NAS vs. Object Storage: 10 Reasons Why Object Storage Will Win
Webinar: NAS vs. Object Storage: 10 Reasons Why Object Storage Will WinWebinar: NAS vs. Object Storage: 10 Reasons Why Object Storage Will Win
Webinar: NAS vs. Object Storage: 10 Reasons Why Object Storage Will Win
 
HP Autonomy - Three Ways to Preserve and Protect your Virtual Infrastructure
HP Autonomy - Three Ways to Preserve and Protect your Virtual InfrastructureHP Autonomy - Three Ways to Preserve and Protect your Virtual Infrastructure
HP Autonomy - Three Ways to Preserve and Protect your Virtual Infrastructure
 
Webinar: The Elephant in the Datacenter - Protect, Manage, & Leverage Unstruc...
Webinar: The Elephant in the Datacenter - Protect, Manage, & Leverage Unstruc...Webinar: The Elephant in the Datacenter - Protect, Manage, & Leverage Unstruc...
Webinar: The Elephant in the Datacenter - Protect, Manage, & Leverage Unstruc...
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
E2 evc 3-2-1-rule - mikeresseler
E2 evc   3-2-1-rule - mikeresselerE2 evc   3-2-1-rule - mikeresseler
E2 evc 3-2-1-rule - mikeresseler
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignment
 
Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021
 
Webinar: Achieving VDI Success Without All-Flash Problems
Webinar: Achieving VDI Success Without All-Flash ProblemsWebinar: Achieving VDI Success Without All-Flash Problems
Webinar: Achieving VDI Success Without All-Flash Problems
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
 
University of Bath Research Data Management training for researchers
University of Bath Research Data Management training for researchersUniversity of Bath Research Data Management training for researchers
University of Bath Research Data Management training for researchers
 
EarthLink Business Cloud Server Backup
EarthLink Business Cloud Server BackupEarthLink Business Cloud Server Backup
EarthLink Business Cloud Server Backup
 
somee.pptx
somee.pptxsomee.pptx
somee.pptx
 
Four Assumptions Killing Backup Storage Webinar
Four Assumptions Killing Backup Storage WebinarFour Assumptions Killing Backup Storage Webinar
Four Assumptions Killing Backup Storage Webinar
 

More from Storage Switzerland

Webinar: Five Reasons Modern Data Centers Need Tape
Webinar: Five Reasons Modern Data Centers Need TapeWebinar: Five Reasons Modern Data Centers Need Tape
Webinar: Five Reasons Modern Data Centers Need Tape
Storage Switzerland
 
Special Presentation of Meet The CEOs - Commvault and Hedvig
Special Presentation of Meet The CEOs - Commvault and HedvigSpecial Presentation of Meet The CEOs - Commvault and Hedvig
Special Presentation of Meet The CEOs - Commvault and Hedvig
Storage Switzerland
 
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
Storage Switzerland
 
Webinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
Webinar: Complete Your Cloud Transformation - Store Your Data in The CloudWebinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
Webinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
Storage Switzerland
 
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCIWebinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Storage Switzerland
 
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
Storage Switzerland
 
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
Storage Switzerland
 
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data GrowthWebinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
Storage Switzerland
 
Webinar: Three Steps to Modernizing Backup Storage
Webinar: Three Steps to Modernizing Backup StorageWebinar: Three Steps to Modernizing Backup Storage
Webinar: Three Steps to Modernizing Backup Storage
Storage Switzerland
 
Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?
Storage Switzerland
 
Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?
Storage Switzerland
 
Webinar: 5 Critical Enterprise Cloud Backup Capabilities
Webinar: 5 Critical Enterprise Cloud Backup CapabilitiesWebinar: 5 Critical Enterprise Cloud Backup Capabilities
Webinar: 5 Critical Enterprise Cloud Backup Capabilities
Storage Switzerland
 
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft AzureWebinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
Storage Switzerland
 
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage CostsWebinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Storage Switzerland
 
Webinar: Does Your Data Center Need NVMe?
Webinar: Does Your Data Center Need NVMe?Webinar: Does Your Data Center Need NVMe?
Webinar: Does Your Data Center Need NVMe?
Storage Switzerland
 
Webinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs DownWebinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs Down
Storage Switzerland
 
Webinar: How to Put an End to Hyperconverged Silos
Webinar: How to Put an End to Hyperconverged SilosWebinar: How to Put an End to Hyperconverged Silos
Webinar: How to Put an End to Hyperconverged Silos
Storage Switzerland
 
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
Storage Switzerland
 
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
Storage Switzerland
 
Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...
Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...
Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...
Storage Switzerland
 

More from Storage Switzerland (20)

Webinar: Five Reasons Modern Data Centers Need Tape
Webinar: Five Reasons Modern Data Centers Need TapeWebinar: Five Reasons Modern Data Centers Need Tape
Webinar: Five Reasons Modern Data Centers Need Tape
 
Special Presentation of Meet The CEOs - Commvault and Hedvig
Special Presentation of Meet The CEOs - Commvault and HedvigSpecial Presentation of Meet The CEOs - Commvault and Hedvig
Special Presentation of Meet The CEOs - Commvault and Hedvig
 
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
 
Webinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
Webinar: Complete Your Cloud Transformation - Store Your Data in The CloudWebinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
Webinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
 
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCIWebinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
 
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
 
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
 
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data GrowthWebinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
 
Webinar: Three Steps to Modernizing Backup Storage
Webinar: Three Steps to Modernizing Backup StorageWebinar: Three Steps to Modernizing Backup Storage
Webinar: Three Steps to Modernizing Backup Storage
 
Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?
 
Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?
 
Webinar: 5 Critical Enterprise Cloud Backup Capabilities
Webinar: 5 Critical Enterprise Cloud Backup CapabilitiesWebinar: 5 Critical Enterprise Cloud Backup Capabilities
Webinar: 5 Critical Enterprise Cloud Backup Capabilities
 
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft AzureWebinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
 
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage CostsWebinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
 
Webinar: Does Your Data Center Need NVMe?
Webinar: Does Your Data Center Need NVMe?Webinar: Does Your Data Center Need NVMe?
Webinar: Does Your Data Center Need NVMe?
 
Webinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs DownWebinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs Down
 
Webinar: How to Put an End to Hyperconverged Silos
Webinar: How to Put an End to Hyperconverged SilosWebinar: How to Put an End to Hyperconverged Silos
Webinar: How to Put an End to Hyperconverged Silos
 
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
 
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
 
Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...
Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...
Webinar: Designing Storage Architectures for Data Privacy, Compliance and Gov...
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

Webinar: Are You Treating Unstructured Data as a Second Class Citizen?

  • 1. ARE YOU TREATING UNSTRUCTURED DATA LIKE A SECOND CLASS CITIZEN? For audio playback and Q&A go to: bit.ly/UnstData
  • 2. George Crump Founder/Lead Analyst Jonathan Calmes Vice President Business Development
  • 3. COMPARING UNSTRUCTURED DATA PROTECTION TO OTHER DATA SETS • Databases are often snapshotted, replicated and backed up multiple times per day • Virtual Environments provide change block tracking so virtual machines are protected every few hours • “Instant-Restore” / Recovery in Place very popular feature • What about Unstructured data? • Backed up once per night • Not often enough, especially with ransomware • Maybe snapshotted a couple times per day • Provides faster backup but horrible search and weak retention
  • 4. HOW IMPORTANT IS UNSTRUCTURED DATA? • The unstructured data set in terms of capacity typically dwarfs all other data sets in the organization • Data from Office Productivity Applications often represent a large chunk of the organization’s creative energy • It can be reproduced but reproduction is time consuming • Data from Machines and Devices represent a large % of the unstructured data • In many cases it can’t be reproduced
  • 5. UNSTRUCTURED DATA IS HARD TO PROTECT • Again, the data set, in terms of capacity, is often the largest in the data center • Most unstructured data sets are made up of millions if not billions of files • The value of unstructured data is often found inside the file • Regulations like CCPA and GDPR clearly indicate that an organization needs to know what’s inside the file
  • 6. UNSTRUCTURED DATA PROTECTION IS AN AFTERTHOUGHT • Legacy applications for the most part backup Unstructured Data a file at a time • Egregiously slow • Causes metadata problems with backup application • Most applications, today, protect unstructured as an image • Fast and No Metadata problems (because there isn’t any) • They loose granularity and can’t extract value
  • 7. ORGANIZATIONS NEED A SOLUTION PURPOSE-BUILT FOR UNSTRUCTURED DATA PROTECTION • Use snapshot-like data capture for fast but granular data protection • Leverage that granularity by providing content search and automatic data classification • Leverage on-premises Object Storage or • Public Cloud for long-term data retention • Provide “instant-restore” like functionality via an in-place mount point
  • 9. Action must be taken now to prepare data for future use
  • 10. Action must be taken now to prepare data for future use
  • 11. Aparavi File Protect & Insight℠ File by file data protection and archive for servers, endpoints and storage devices featuring data classification, content level search, and hybrid cloud retention and versioning. Does your organization have a second line of defense against ransomware?
  • 12. Recover and retrieve with confidence and context Mountable file recovery Automated alerts and defense Near instant data recovery Data insight and governance Air-gapped copies in multiple clouds Aparavi gives you air-gapped, immutable copies of all your files so you can recover immediately
  • 13. Data is Organized With classification tags +instant searchable content Data is Protected Hybrid and multi cloud infinitely distributable Data is Usable Web access CIFS/NFS mount open format for AI-ML-BI Aparavi File Protect & Insight
  • 14. What problems Aparavi FPI can solve  Ransomware recovery  Endpoint and ROBO protection  Data retention and Archive  Compliance and Governance  Storage optimization (Besides the mystery of Stonehenge)
  • 16. ARE YOU TREATING UNSTRUCTURED DATA LIKE A SECOND CLASS CITIZEN? For complete audio and Q&A please register for the On Demand Version: bit.ly/UnstData

Editor's Notes

  1. Add Multiple Cloud Benefits