data protection - dell...dell emc data protection –by the numbers market share position 61.4%...
TRANSCRIPT
Data Protection Everywhere
For the modern data center
Yeong Chee Wai
Director for Asia & Japan
Data Protection Solutions
Dell - Internal Use - Confidential3
Tale of two worlds
Trust
IT centric
Traditional apps
On-premise
You need both for
Developer centric
Next-gen apps
Live in the cloud
Agility
&
© Copyright 2016 Dell Inc.3
Dell - Internal Use - Confidential4
Pillars of the modern data center
Reduce costs (# of drives,
power, floor space, etc.)
Consistent and predictable
performance
Lower entry costs and
scale as you grow
Manage massive capacity
with fewer resources
Automated provisioning
and business agility
Flexible and programmable
data services
Policy driven service delivery
On/off premises data and/or
application mobility
Scale-out Software-definedCloud-enabledFlash
Protection and trustSecurity/Governance | Encryption | Data Protection | Services/Support
© Copyright 2016 Dell Inc.4
Dell - Internal Use - Confidential5
Are you protected?
Journey to digital transformation
Dell - Internal Use - Confidential6
Average cost
of data Loss
Global data protection index
Data loss Laggards or
evaluators
Unable to keep
pace with flash
Unprepared for future
business challenges
Unprotected
in the cloud
© Copyright 2016 Dell Inc.6
Dell - Internal Use - Confidential7
Dell EMC Data Protection – by the numbers
Market share position
61.4%
And…Ask Us About Gartner
Systems Shipped and Installed
Data Protection Solution Employees!
World’s Largest Data
Protection CompanyMarket Share Leader in Purpose Built
Backup Appliances
Leaders in Open &
Mainframe Systems
3x share our
closest competitor
© Copyright 2016 Dell Inc.7
Dell - Internal Use - Confidential8
Enabling simplicity - data protection everywhere
Consumption
Models
VirtualizedConverged
InfrastructureOn-Prem
SnapsReplication ArchiveBackupIRS “Air
Gap”LTR /
ArchiveContinuous
Availability
BEST OF BREED CONVERGED SOFTWARE DEFINED AS-A-SERVICE
How
you
want it
Where
you
need it
Public / Private
R T O & R P O
Born in the
Cloud SaaS
© Copyright 2016 Dell Inc.8
Protection storage
Dell - Internal Use - Confidential10
Why Dell EMC protection storage
EFFICIENT
Protect more data
faster with industry
leading speed and
scale
Reduce storage
required by 10–30x
RELIABLE
End-to-end data
verification, fault
detection, and self
healing
FLEXIBLE
Integrates with
leading backup,
archiving, enterprise
applications and big
data applications or
directly with primary
storage
Deploy protection
storage however you
want it
CLOUD-ENABLED
Natively tier
deduplicated data to
the cloud for modern
long-term retention
Deliver data
protection as a
service with logical
data isolation
Powered by Intel®
Xeon® Processors
© Copyright 2016 Dell Inc.10
Dell - Internal Use - Confidential11
Powered by Intel®
Xeon® Processors
Protection storage - how you want it
BEST OF BREED CONVERGED SOFTWARE DEFINED AS-A-SERVICE
How
You
Want It
© Copyright 2016 Dell Inc.11
Protection software
Dell - Internal Use - Confidential13
COMPREHENSIVE
PROTECTION
Delivers protection across the
data protection continuum
Spans on-premise, virtualized,
hybrid and public cloud
environments
Provides complete protection
for cloud- based data and
applications
Powered by Intel®
Xeon® Processors
Why Dell EMC protection software
FLEXIBLE
Includes 5 purpose-built
offerings, for the most widely
adopted use cases
Supports a wide range of
protection technologies to meet
any service level
Delivers application owner
visibility and control
HIGH PERFORMANCE
Industry’s tightest integration
with Data Domain, yielding
deduplication rates nearly 4x
that of our competitors
- Reduces backup storage by
up to 38x
- Reduces network traffic by
up to 99%
- Reduces backup times by
up to 50%
© Copyright 2016 Dell Inc.113
Dell - Internal Use - Confidential14
Dell EMC protection software – how you want it
Enterprise Edition
Backup Applications VMware Archive
Comprehensive data protection for the modern data center
NEW! NEW!
Data Protection Suite
© Copyright 2016 Dell Inc.14
Dell - Internal Use - Confidential15
Dell EMC cloud data protection software
COMPREHENSIVE
PROTECTION
Direct-to-cloud backup for
desktops, laptops and remote
and branch offices (RoBo)
Born-in-cloud protection for
Office 365, Salesforce and
Google Apps
Cloud enablement for long-
term retention (LTR) to the
cloud
SECURE
End-to-end enterprise-grade
encryption
Global network of world-class
data centers, ensuring data is
stored in region according to
local laws and regulations
Successful attainment of
industry leading cloud service
audits and certifications
FLEXIBLE
Deployment time measured in
minutes or hours as opposed
to weeks or months
Doesn’t require additional
capital expense for hardware
Easily scale resources up or
down according to demand
Per user, utility based pricing
plans
15 © Copyright 2016 Dell Inc.15
Isolated recovery solutions
Dell - Internal Use - Confidential17
Impact of cyber attacks
Time it takes to compromise an organization, 60% of the time
Average cost of 1M breached records
Average cost of 1,000 breached records
Confirmed data breaches in 2014
Lost data due to security breach
Dell - Internal Use - Confidential17© Copyright 2016 Dell Inc.17
Dell - Internal Use - Confidential18
Dell EMC isolated recovery solutions
Assess ValidatePlan Implement
• Business application
protection requirements
• Compliance policies
requirements
• Application readiness &
requirements
• Application dependencies
• IRS architecture &
high-level design
• Technology
recommendations
• Implementation
plan & timeline
• IRS validation test design
• Program managed
implementation
• Technology deployment &
hardening
• IRS processes &
procedures
• IRS run books
• Compliance ready test
reports
• Facilitated IRS table top
exercises
• IRS process training
• Proctored IRS test
Advisory service Implementation service
Educate & assess Design & build
Workshop format Various delivery models
Dell - Internal Use - Confidential18
Solutions and services to safeguard your data
© Copyright 2016 Dell Inc.18
Dell - Internal Use - Confidential19
Vendor delivers
WHY Dell EMC
for data protection?
DATA PROTECTION
EVERYWHERE
Investment protection
Simplicity
Flexibility
© Copyright 2016 Dell Inc.19
Dell - Internal Use - Confidential20
WHY Dell EMC
for data protection?
Deduplication
Purpose built backup appliances
Combined data protection software & storage
Replication
Isolated recovery solutions
MARKET & TECHNOLOGY
LEADERSHIP
© Copyright 2016 Dell Inc.20
Dell - Internal Use - Confidential21
WHY Dell EMC
for data protection?
cumulative R&D investment
in technology acquisitions
team members dedicated to helping our customers
UNPARALLELED INVESTMENT
© Copyright 2016 Dell Inc.21
Dell - Internal Use - Confidential22
Helping customers transform
© Copyright 2016 Dell Inc.22
Dell - Internal Use - Confidential23
Let’s get started
Assess
Identify what you have,
biggest problem areas
1 2 Design
Design architecture that
meets your needs and
agree on key focus area
3 ROI/TCO
Develop ROI/TCO analysis
that shows what you are
spending today
4 Implement
EMC and Partner Services
to get solution up, running
and maintained – whatever
you need
5 Validate the value
Analysis by EMC and its
partners after 6-12 months
in production
Output: ROI to-date using
EMC data protection
solutions
6 TCE & customer
escalation
management
© Copyright 2016 Dell Inc.23