intelligent information infrastructure presented by emc2

Post on 06-May-2015

1.238 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

1EMC CONFIDENTIAL—INTERNAL USE ONLY

Intelligent Information Infrastructure

Rajesh ItagiDirector, Client Services

2EMC CONFIDENTIAL—INTERNAL USE ONLY

CIO concerns and resolutions for 2008

3EMC CONFIDENTIAL—INTERNAL USE ONLY

WHO WE ARE

We are a leading technology company that is driven to perform, to partner, to execute. We go about our jobs with a passion for delivering results that exceed our customers’ expectations for quality, service, innovation, and interaction. We pride ourselves on doing what’s right and on putting our customers’ best interests first. We lead change and change to lead. We are devoted to advancing our people, customers, industry, and community. We say what we mean and do what we say. We are EMC, where information lives.®

5EMC CONFIDENTIAL—INTERNAL USE ONLY

EMC Corporation

At a Glance

Revenues (2007): $13.2 billion

Net Income $1.7 billion

Employees (end Q4 worldwide): >37,600

Countries with EMC operations: >50

R&D Investment (2007): >$1.5

Total Cash and Investments (end Q4): $8 billion

Free Cash Flow (2007) $2.2 billion

Market Capitalization: (Feb. 4) >$33 billion

Founded: 1979

6EMC CONFIDENTIAL—INTERNAL USE ONLY

Software16%

Services10%

Systems74%

Systems74%

100% dedicated toEMC hardware

90% dedicated toHigh-End Symmetrix

Customer Services only

Software40%

Systems44%

16%Services

Content Management and ArchivingInformation SecurityVirtual Infrastructure

EMC Today

InformationStorage

EMC in 2002

Consulting / Solution IntegrationManaged ServicesTechnology ImplementationMaintenance and SupportEducation Services

• Symmetrix• CLARiiON• Centera• Celerra• Connectrix• Invista• DiskLibrary

EMC’s Ongoing Transformation

8EMC CONFIDENTIAL—INTERNAL USE ONLY

Our Strategy

Information Infrastructure is a shared set of products,services, and best practices to store, protect,

add intelligence to, virtualize and automate information

9EMC CONFIDENTIAL—INTERNAL USE ONLY

What EMC Does

information infrastructure makes information work with increased value, flexibility, efficiency, and cost savings.

storing moreefficiently

next generationbackup and archive

making protectioneffective and affordable

securing criticalassets

automatingdata center operations

leveraging content forcompetitive advantage

virtualizing yourinformation infrastructure

accelerating business valuefor applications

10EMC CONFIDENTIAL—INTERNAL USE ONLY

CLARiiON InvistaEMC

Centera

Symmetrix

Celerra

EMCDisk Library

Connectrix

Broadest Lineup! Best Performance! Best Functionality!Highest Quality! Most Secure!

Networked Storage

LifeLineAX4

DMX

FlashDrives

11EMC CONFIDENTIAL—INTERNAL USE ONLY

Networked Storage

“Five 9s” availability on arrays

Tiering

Energy / data center efficiency

Ease of use

Virtual “thin” provisioning

Flash technology will revolutionize storage

12EMC CONFIDENTIAL—INTERNAL USE ONLY

“Most likely this will create a giant gap against IBM and Hitachi.”-- ESG Analyst Steve Duplessie

Wall Street Journal, 14 January 2008

“Today the enterprise disk drive market changed forever.”-- Techworld

14 January 2008

13EMC CONFIDENTIAL—INTERNAL USE ONLY

Information Protection

Assurethat the informationis always available

and alwayssecure

14EMC CONFIDENTIAL—INTERNAL USE ONLY

Information Protection

Operational recovery– Clones, snaps, CDP

Disaster recovery– Remote replicas

Speed of recoveryis of the essence

– (Backup to Tape) → (Backup to Disk)

Cost is important– Data de-duplication

(VTL, LAN, Tier 3, at the source)

SaaS “Data Vault” option– EMC Fortress

Assure High Availability

15EMC CONFIDENTIAL—INTERNAL USE ONLY

Information Protection

Assure the information is secure Operational recovery

– Clones, snaps, CDP

Disaster recovery– Remote replicas

Speed of recoveryis of the essence

– (Backup to Tape) → (Backup to Disk)

Cost is important– Data de-duplication

(VTL, LAN, Tier 3, at the source)

SaaS “Data Vault” option– EMC Fortress

Assure High Availability

Assess Risk– Service engagement

Protect Identities– Strong authentication– Access control

Protect data– Encryption– Centralized key management– Data loss prevention

Secure information management– Envision– Incident and event monitoring

16EMC CONFIDENTIAL—INTERNAL USE ONLY

+Intelligence

Addintelligenceto manage

unstructured dataand data in place

17EMC CONFIDENTIAL—INTERNAL USE ONLY

+Intelligence

Capture and ingest Classify and tag Rich repository functionality

– Logical info storage– Check in/out, version control

Workflow and BPM Multichannel Output Management

– Web, self-service, email, reports

Archive and retain– Compliance– eDiscovery– Automated policy management

Unstructured information

18EMC CONFIDENTIAL—INTERNAL USE ONLY

Unstructured information

+Intelligence

Capture and ingest Classify and tag Rich repository functionality

– Logical info storage– Check in/out, version control

Workflow and BPM Multichannel Output Management

– Web, self-service, email, reports

Archive and retain– Compliance– eDiscovery– Automated policy management

Classify and tag Automated policy management

– Infoscape with Tablus discovery engine

Digital rights management

Manage All Data Types in Place

19EMC CONFIDENTIAL—INTERNAL USE ONLY

Virtualize & Automate

Orchestrate the informationinfrastructure through virtualization,

and resource managementtechnologies

20EMC CONFIDENTIAL—INTERNAL USE ONLY

Virtualize & Automate

x86 Virtual Infrastructure File virtualization Global namespace Virtual provisioning SAN virtualization

Virtualize

21EMC CONFIDENTIAL—INTERNAL USE ONLY

Virtualize

Virtualize & Automate

x86 Virtual Infrastructure File virtualization Global namespace Virtual provisioning SAN virtualization

Element Management– Storage arrays

Problem management– Root cause– Problem automation

Change and compliance mgmt– Automated provisioning– Change management

Coming soon . . .Process orchestration

– ITIL enablement– Service management

Resource Management

22EMC CONFIDENTIAL—INTERNAL USE ONLY

Symmetrix HW & SW CLARiiON HW & SW Celerra HW &SW Centera HW& SW Connectrix HW &SW Disk Libraries Control Center SMARTS NetWorker Avamar Backup Advisor Replication Manager Infoscape RecoverPoint Retrospect Xtender Family VisualSAN / VisualSRM PowerPath Invista Rainfinity AutoStart

SecurID Authentication Consumer Protection Suite Smart Cards and USB

Authenticators Card Manager Access Manager Federated Identity Manager Enterprise Data Protection

Solutions BSAFE Security Tools for

Developers Digital Certificate

Management enVision

Virtual Infrastructure 3 ESX Server VMware VMFS Virtual SMP VirtualCenter VMotion VMware HA VMware DRS VMware Consolidated

Backup VMware Lab Manager VMware Workstation VMware ACE Virtual Desktop Infrastructure VMware Player VMware Server P2V Assistant Virtual Machine Importer

Docmntm Content Srvr Docmntm Web Publisher Dcmntm 5.3 sp 2, 3, 4, 5 Dcmntm OEM Edition Docmntm Process Suite Docmntm Report’g Srvcs eRoom Unified Records Manager Content Storage Services Business Process Mgr Compliance Manager Archive Services for

eMail / Imaging / Reports Captiva InputAccel Captiva FormWare Captiva Dispatcher Application Xtender ViewPoint SharePoint Content Srvcs SharePoint Archive Srvcs SAP Portal Content Srvcs IRM Srvcs for Docmntm IRM Services for eRoom Web Pub Page Builder Web Pub Contrib Client

Information Storage

Content Mgmt & Archiving

RSA InformationSecurity

VMwareVirtualization

Industry’s Broadest Information Infrastructure Portfolio

23EMC CONFIDENTIAL—INTERNAL USE ONLY

The Wired 40EMC CorporationBest Data

Classification Solution

EMC InfoScape

InformationWeek 500 EMC

Corporation

Enterprise Software StorageEMC Avamar 3.6

EMC Corporation

Companywide IntegrationInitiative Synergy

Technology Campaign of the Year IDC EMC Digital

Universe Campaign

Industry Recognition for EMC’s Leadership

Disk and disk subsystemsEMC CLARiiON CX3

BusinessWeek InfoTech 100EMC Corporation

Golden Processor Award 2008Best Content Management

SoftwareEMC Documentum 6.0

Enterprise Equipment:

Network StorageEMC

Corporation

Most Powerful Enterprise Playersin the Middle EastEMC Corporation

Digital Times 2007HIT Product Award

EMC Symmetrix DMX 4

MHT Citizenship AwardsPhilanthropy

EMC Corporation

24EMC CONFIDENTIAL—INTERNAL USE ONLY

“Strategic Supplierof the Year Award”

Recognition for EMC’s Leadership:Partner & Customer Awards

“Diamond Partnerof the Year”

“Star Awards”

“Customer AppreciationAward”

“CustomerAppreciation Award”

“Customer AppreciationAward” “2007 Preferred Supplier”

2007 Annual Report CardNetwork Storage and

Storage Management SoftwareEMC Ranked #1

“IT Supplier of the Year”

25EMC CONFIDENTIAL—INTERNAL USE ONLY

How to Get Started?

Service Catalog Application Alignment Information Infrastructure Planning

Services

BuRA Assessment Classification for Information

Security Continuous Availability

Assessment Security Information and Event

Management Services

Digital Rights Management Workflow Solutions, Compliance Solutions

Storage, File, Server VirtualizationChange ManagementAutomating Root cause analysis

Store

Protect

Intelligence

Virtualise & Automate

EMC Consulting Can Help

26EMC CONFIDENTIAL—INTERNAL USE ONLY

27EMC CONFIDENTIAL—INTERNAL USE ONLY

S.P.I.V.A

5 Minutes Power Talk

28EMC CONFIDENTIAL—INTERNAL USE ONLY

Typical IT Environment

Outlook users &file clients

File servers

SQL server

Exchange servers

LAN

LANbackup

CRM server

Web server

Tapebackup

App server

29EMC CONFIDENTIAL—INTERNAL USE ONLY

Typical IT Environment – Potential Issues

Outlook users &file clients

File servers

SQL server

Exchange servers

LAN

LANbackup

CRM server

Web server

Tapebackup

App server

Data Everywhere

Data Everywhere

Data Everywhere

Data Everywhere

30EMC CONFIDENTIAL—INTERNAL USE ONLY

Typical IT Environment – Potential Issues

Outlook users &file clients

File servers

SQL server

Exchange servers

LAN

LANbackup

CRM server

Web server

Tapebackup

App server

Multiple Backup

Multiple Backup

Hard to Manage

Low Utilization

Difficult to build DR

31EMC CONFIDENTIAL—INTERNAL USE ONLY

Typical IT Environment – Potential Issues

Outlook users &file clients

File servers

SQL server

Exchange servers

LAN

LANbackup

CRM server

Web server

Tapebackup

App server

Unprotected Tape

User Identification

Compliance

How to Archive

Business Intelligence

To many servers

How to handle paper

RTO/RPO

How to manage SLA

Automating workflow

32EMC CONFIDENTIAL—INTERNAL USE ONLY

IP/iSCSI

Store More Intelligently

Outlook users &file clients

SQL server

Exchange servers

LAN

LANbackup

ERP server

Web server

Tapebackup

App server

FC

SANIP

iSCSI

Unified Storage

33EMC CONFIDENTIAL—INTERNAL USE ONLY

IP/iSCSI

Store More Intelligently

Outlook users &file clients

SQL server

Exchange servers

LAN

LANbackup

ERP server

Web server

Tapebackup

App server

FC

SANIP

iSCSI

Unified Storage

- NS 20/40

- DMX-3 / DMX-4

- CX3 / CX3i

- Celerra

- NAS Gateway

- Storage Consolidation

34EMC CONFIDENTIAL—INTERNAL USE ONLY

Protect Against Data Loss

Outlook users &file clients

SQL server

Exchange servers

LAN

Consolidatedbackup

ERP server

Web server

App server

FC

SANIP

iSCSI

Data ReplicationData Snapshot

35EMC CONFIDENTIAL—INTERNAL USE ONLY

Protect Against Data Loss

Outlook users &file clients

SQL server

Exchange servers

LAN

Consolidatedbackup

ERP server

Web server

App server

FC

SANIP

iSCSI

Data ReplicationData Snapshot

- Networker

- Networker modules

- Tape Library

- EDL

- SANtape

- EBA

- BURA Assessment

- SRDF

- Mirrorview

- Recoverpoint

- DR Storage

- SAN Copy

- Replistor

- BC Assessment

- Timefinder

- Snapview

- Recoverpoint

- Powersnap modules

- TFEIM

- SAN Copy / Open Replicator/Migrator

- Replication Manager

36EMC CONFIDENTIAL—INTERNAL USE ONLY

Protect from Mis-Use (Security)

Outlook users &file clients

SQL server

Exchange servers

LAN

ERP server

Web server

App server

FC

ProtectUser Access

ProtectBackup Tape

ProtectInformation

ProtectDatabase

ProtectReplication

37EMC CONFIDENTIAL—INTERNAL USE ONLY

Protect from Mis-Use (Security)

Outlook users &file clients

SQL server

Exchange servers

LAN

ERP server

Web server

App server

FC

ProtectUser Access

ProtectBackup Tape

ProtectInformation

ProtectDatabase

ProtectReplication

- Neoscale

- CipherOptics

- Enterprise Data Protection

- BSAFE Tools

- SecurID

- Consumer Protection Suite

- Access Manager

- Identity Manager

- Neoscale

- IRM (Authentica)

38EMC CONFIDENTIAL—INTERNAL USE ONLY

Intelligent Information Management

Outlook users &file clients

SQL server

Exchange servers

LAN

ERP server

Web server

App server

FC

ArchiveStorage

Archive inactivedata before backup

backup

Information Classification

TieredStorage

39EMC CONFIDENTIAL—INTERNAL USE ONLY

Intelligent Information Management

Outlook users &file clients

SQL server

Exchange servers

LAN

ERP server

Web server

App server

FC

ArchiveStorage

Archive inactivedata before backup

backup

Information Classification

TieredStorage

- Centera

- Tiered Storage on DMX/CS

- Xtender family

- Archive Service

- Rainfinity File Manager

- CFA

- Infoscape

- Infoscope

- Information Classification Services

- Tiered Storage

- Networker

- Networker modules

- Avamar

- Tape Library

- EDL

- EBA

- BURA Assessment

40EMC CONFIDENTIAL—INTERNAL USE ONLY

Leveraging Content to Create Business Value

Outlook users &file clients

SQL server

Exchange servers

LAN

ERP server

Web server

FAX

Unified Content Repository

Report Data

Web Content

Email

Transaction

Customer data

Unstructured files

ECM server

Capture, Classify, Change, Route, Approve, Publish, Search, Retire information

Paper Doc.

41EMC CONFIDENTIAL—INTERNAL USE ONLY

Leveraging Content to Create Business Value

Outlook users &file clients

SQL server

Exchange servers

LAN

ERP server

Web server

FAX

Unified Content Repository

Report Data

Web Content

Email

Transaction

Customer data

Unstructured files

ECM server

Capture, Classify, Change, Route, Approve, Publish, Search, Retire information

Paper Doc.

- Documentum Content Server

- Archive Service for Report

- DocumentumWeb Publisher

- SAP Content Services

- Captiva

- Archive Service for Image

- Archive Services for Email

- BPM

- Compliance Mgr

- Record Mgr

- Federated Search

42EMC CONFIDENTIAL—INTERNAL USE ONLY

Virtualized & Automate Infrastructure

Users

Web serverApp serverERP Server

VMware Environment

SQL serverExchange Server

VMware Environment

Virtualized Storage and File System

Corporate Network (IP & FC)

VirtualTape

De-Duplication

Next Generation Backup

Archive

`

End to EndInfrastructure &

Service Management

43EMC CONFIDENTIAL—INTERNAL USE ONLY

Virtualize & Automate Infrastructure

Users

Web serverApp serverERP Server

VMware Environment

SQL serverExchange Server

VMware Environment

Virtualized Storage and File System

Corporate Network (IP & FC)

VirtualTape

De-Duplication

Next Generation Backup

Archive

`

End to EndInfrastructure &

Service Management

- VMware

- P2V

- Consolidation & Virtualization Assessment

- EDL

- Avamar

- Centera

- BURA

- Invista

- Raininfinity

- DMX / CX

- Smarts

- Smarts ADM

- Control Center

- Visual SAN/SRM

44EMC CONFIDENTIAL—INTERNAL USE ONLY

top related