dell emc data protection vision · guru u indianapolis data protection agenda 1) dell emc data...

90
© Copyright 2017 Dell Inc. 1 DELL EMC DATA PROTECTION VISION Friday, April 21, 2017

Upload: tranquynh

Post on 04-May-2019

217 views

Category:

Documents


0 download

TRANSCRIPT

© Copyright 2017 Dell Inc.1

DELL EMC DATA PROTECTION VISIONFriday, April 21, 2017

© Copyright 2017 Dell Inc.2

Sphero App-enabled BB-8 Drawing

Drawing to be held at end of day

Look for an email to enter after 3:00

Must be present to win

© Copyright 2017 Dell Inc.3

Guru U Indianapolis Data Protection Agenda

1) Dell EMC Data Protection VisionData Protection Everywhere and Extending to

the Cloud

2) Data Protection Solutions UpdateWhat’s New with Avamar, NetWorker, &

Data Domain

3) Virtustream Overview

4) Dell EMC Cloud Protection

© Copyright 2017 Dell Inc.4

Product Roadmap Disclaimer

• EMC makes no representation and undertakes no obligations with regard to product

planning information, anticipated product characteristics, performance

specifications, or anticipated release dates (collectively, “Product Roadmap

Information”).

• Product and or Roadmap Information is provided by EMC as an accommodation to

the recipient solely for purposes of discussion and without intending to be bound

thereby.

• Product / Roadmap information is EMC Restricted Confidential and is provided

under the terms, conditions and restrictions defined in the EMC Non-Disclosure

Agreement in place with your organization.

© Copyright 2017 Dell Inc.5

Protecting All Consumption Models

On-premise Virtual Converged Cloud-born

Protecting Data Wherever It Lives

© Copyright 2017 Dell Inc.6

Complementary Recovery Tiers

SnapshotReplicationAvailability Backup Archive

Zero Seconds Minutes Hours

DATA AVAILABILITY DATA DURABILITY

Dell EMC Data Protection Continuum

© Copyright 2017 Dell Inc.7

Protecting Data Where You Need It, Simply

RPO / RTOBorn in the Cloud

Public / PrivateConsumption

ModelsVirtualized Converged InfrastructureOn-Premise

SnapsReplication ArchiveBackup IsolatedRecovery

Long TermRetention

ContinuousAvailability

© Copyright 2017 Dell Inc.8

Where You

Need It

Born in the CloudSaaS

Public / Private

R T O & R P O

ConsumptionModels

How You Want It

Best of Breed Converged Software Defined As-a-Service

VirtualizedConverged

InfrastructureOn-Prem

SnapsReplication ArchiveBackup IRS “Air Gap”LTR / ArchiveContinuousAvailability

Enabling Simplicity, Protecting Data EverywhereEnabling Simplicity, Protecting Data Everywhere

© Copyright 2017 Dell Inc.9

Cloud and Data Protection

EXTENDTO CLOUD

MOVETO CLOUD

BORNIN CLOUD

© Copyright 2017 Dell Inc.10

Cloud Data Protection Use Cases

Direct to Cloud

CLIENT

• Back up directly to

cloud, or via edge cache

(ROBO)

• Intended for small

amounts of data with

flexible RTO SLAs

Benefit

• Remote manageability

• Direct Restore

• Low On-Prem Footprint

Disaster Recovery

as a Service

• Outsource replication to

a Service Provider

Benefit

• No DR site required

• Easy fire drills

• Aligns DR readiness to

pay as you go model

Infrastructure

as a Service

• Protects virtual

workloads and storage

in the cloud

Benefit

• Prevents cloud work

loads against data

corruption

• Includes Software

as a Service

PROTECTION

STORAGE

• Extended storage

provisioning via the

cloud

Benefit

• Tape Replacement

• Infinitely Scalable

• Low Cost

Long Term

Retention

© Copyright 2017 Dell Inc.13

The Evolution Of Data Protection

BACKUP SOFTWARE

PROTECTION STORAGEBackup Servers/Agents

© Copyright 2017 Dell Inc.14

BACKUP ADMIN

TRADITIONALBACKUPS

Protection Geared For The Persona

© Copyright 2017 Dell Inc.15

The Evolution Of Data Protection

BACKUP SOFTWARE

PROTECTION STORAGEBackup Servers/Agents Self Service (from Data Source)

© Copyright 2017 Dell Inc.16

The Evolution Of Data Protection

BACKUP SOFTWARE

PROTECTION STORAGE

INTELLIGENT COPY OVERSIGHT

Backup Servers/Agents Self Service (from Data Source)

ANALYTICS & SEARCH

© Copyright 2017 Dell Inc.17

BACKUP ADMIN

TRADITIONAL

BACKUPS

APP ADMIN

DUMPS

COPY DBs

VM ADMIN

VM CLONES

VM SNAPS

STORAGE ADMIN

SNAPS

CLONES

REPLICAS

Protection Geared For The Persona

Protecting Business Critical Data From A Cyber Attack

© Copyright 2017 Dell Inc.20

Layered Cyber Security For Data Protection

Advanced Protection Services- Isolated Recovery Solution

- EMC Service Offerings

- RSA Security Analytics

Additional Hardening & Protection Features- DPS Product Specific Hardening Guides

- Encryption in Flight and/or at Rest

- Retention Lock w/Separate Security officer credentials

Traditional Data Protection Best Practices- Deploy a layered data protection approach (“the

continuum”) for more business critical systems but always

include a point in time off array independent backup with

DR Replication (N+1)

RISK

Best

© Copyright 2017 Dell Inc.21

Disk-based Protection With Replication

Primary Storage

• Create Backup of Data

• Replicate Second Copy to Secondary Site

Backup Appliance

DD

Replication

Primary Site

Backup Appliance

Secondary Site

Best Practice: Separation From

Primary Site

“The organization identifies an alternate

storage site that is separated from the

primary storage site to reduce

susceptibility to the same threats.”

NIST 800-53 CP-6(1)

© Copyright 2017 Dell Inc.22

Isolated Recovery Solution with Data Domain

Isolated Recovery

System

Air Gap

• Create Backup of Data

• Enable Link and Replicate to Isolated System

• Complete Replication and Disable Link

• Air Gapped Solution

• Enable Link and Initiate Restore

DD

Replication

Mgmt Host

Validation Hosts

Isolated Recovery System

Restore Hosts

DD

Replication

Primary Site Secondary Site

Primary Storage Backup Appliance Backup Appliance

© Copyright 2017 Dell Inc.23

Most Critical Data First

• Protect the “heartbeat” of

the business first

• Prioritize top applications or

data sets to protect

• Usually less than 10% of

data (this is NOT DR!)

• Start with a core set and

build from there

Compute

Applications

Validate & Store

Highest Priority Data

© Copyright 2017 Dell Inc.25

Join The Conversation

@DellEMCProtect

EMC Storage and Data Protection

Dell EMC Data Protection Community

Data Protection on EMC.com

Mozy.com

Spanning.com

© Copyright 2017 Dell Inc.26

Thank You.

© Copyright 2017 Dell Inc.1

SAAS PROTECTION FOR THE END USERData Protection in the CloudFriday, April 21, 2017

© Copyright 2017 Dell Inc.2

Why is End User data protection important?

• 30-40% of Corporate data lives outside of the data center

• Gartner predicts that to increase to over 50% before 2020 – this MUST be protected!

• Endpoint data loss incident costs $3,000 - $4,000

– Lost/stolen devices, failed Hard Drives, Ransomware, End User error, etc.

– 5 - 7% incident rate, $150K - $280K / 1,000 endpoints

• 27% of tech leaders reporting data loss as their greatest worry (#1)

• Reduce Help Desk ticket costs associated with data restores by 80% - increase Employee

NPS

• Ransomware is a big issue! Over $1B paid last year!

• Assists in data migration for device refresh and data collection for Legal Hold - eDiscovery

© Copyright 2017 Dell Inc.3

Cloud-based Backup Services

Protect Your Data In

SaaS Applications

Next-generation

endpoint protection

for the enterprise

© Copyright 2017 Dell Inc.4

Spanning by Dell EMCBORN-IN-THE-CLOUD BACKUP TO THE CLOUD

Fast, easy, accurate backup & recovery

of cloud application data

© Copyright 2017 Dell Inc.5

Shared Responsibility When In The Cloud

• SaaS Application & Infrastructure

– Platform Security

– Availability

– Reliability

– Resiliency

• Your Data

– Accounts and Access

– Application Configuration

– Data Security Policies

– Data Protection (Backup) Policies

SAAS PROVIDER YOUR ORGANIZATION

© Copyright 2017 Dell Inc.6

SaaS Vendors Agree

“With Office 365, it’s your

data. You own it. You control

it.”

“We recommend that you use a partner backup

solution that can be found on the AppExchange.”

“To put it simply, Google

does not own your data.”

© Copyright 2017 Dell Inc.7

Spanning by Dell EMC

• Fast, easy, accurate recovery of cloud application data

• Automated “set it and forget it” point-in-time backup

• End user restore, freeing IT

• Full transparency into backup status

• Complete restores of data and metadata

• No limits on storage, ever

PROTECT YOUR DATA IN SAAS APPLICATIONS

© Copyright 2017 Dell Inc.8

Need For SaaS Data Protection

• 58% of companies using SaaS apps have lost data* due to:• User errors

• Malicious intent

• Sync errors

*Source: IDG and Spanning research

© Copyright 2017 Dell Inc.9

Top 3 Use Cases From Customer Stories

1. Data sync and shared folder errors destroy data at compute speed

2. Enable fast restores of lost data for better business continuity

protection

3. Provide third-party backup to protect data in a separate

infrastructure, align with IT best practices

© Copyright 2017 Dell Inc.10

Spanning Backup for G Suite

Enterprise-grade daily, automated backup and recovery for Gmail, Drive, Calendar, Contacts and Sites

• Automated and on-demand backups

• Granular point-in-time restore

• Intuitive interface, empowering end users

• Complete and actionable status monitoring

• Enterprise-grade security

500,000 Google Apps accounts across 5,000+ domains, protecting billions of documents and emails

© Copyright 2017 Dell Inc.11

Spanning Backup for Office 365

• Automated back up of OneDrive for Business, Mail, and Calendars

• Point-in-time, granular restore by administrators and end users

• Cloud-first, mobile-first strategy, aligned with Microsoft

• Last stand against Ransomware

• Per-user, per-year pricing with unlimited storage

OneDrive for Business Support

© Copyright 2017 Dell Inc.13

Endpoint Protection In The Cloud

• Desktop – Laptop backup and file sync with mobile access– Windows, Mac, Linux clients

• Protection for small server workloads at remote offices– Physical or virtual

• Backup-as-a-Service– No capital investment required

– 1–5 year subscription options

– Up to 50% discount for yearly subscription

© Copyright 2017 Dell Inc.15

Security and EncryptionWorld-Class Data Protection in the Cloud

• MozyEnterprise Encryption– 448-bit Blowfish default /256-bit AES Corporate/personal key encryption

– Encryption key(s) are created and managed by the customer

– Data is never decrypted on the Mozy servers, even for web restores

– KMIP integration coming 2017

• Third-Party Audits and Certifications– ISO/IEC 27001 certification: This is the leading international standard for measuring

information security

– SSAE 16 Type 2 audit pass: customer data is done safely and securely.

– Veracode AA rating

– TRUSTe certified

– HIPAA-compliant Backup Service

– PCI

© Copyright 2017 Dell Inc.16

Federated Identity and Single Sign-OnWorld-Class Data Protection in the Cloud

• Easy User Management– Automatic provisioning and de-provisioning based on LDAP

– Set queries to keep data for terminated users time period after

termination, reducing license costs and user management while

complying with Legal and Security standards

• Seamless End User Experience– Single Sign-On Authentication

– Easily integrate with your existing SAML provider

• Seamless deployment via software deployment tools– Silently deploy MozyEnterprise via SCCM, Airwatch, or other software

deployment tool for hands-off deployment and activation

© Copyright 2017 Dell Inc.18

Status and Audit Reporting

…Schedule the delivery of reports:

As an Administrator you can…

…Create the following reports:

Billing Summary

Outdated Clients

Billing Detail

Machine Watchlist

Machine Status

Resources Added

Overdraft Added

Machines Over

Quota

Report Settings Enter the name and other required information

Report Scope

Email Options

Select the user groups to be included

Select who, what, and when you want reports delivered

© Copyright 2017 Dell Inc.23

Join The Conversation

@DellEMCProtect

EMC Storage and Data Protection

Dell EMC Data Protection Community

Data Protection on EMC.com

Mozy.com

Spanning.com

© Copyright 2017 Dell Inc.24

Thank You.

Data Protection Suite

Family OverviewMark Venditti

SW Manager - Central

April 2017

[email protected]

972-836-9938

© Copyright 2016 Dell Inc.

Data Protection Continuum

SnapshotReplicationAvailability Backup Archive

Protection and ContinuityBased on Data Value and

Business Objectives

© Copyright 2016 Dell Inc.

Continuous Replication SnapshotReplication Backup Archive

DATA PROTECTION CONTINUUM

Any point-in-time recovery

Consistent recovery of inter-dependent applications

Integrated vCenter management and orchestration

Disaster and operational recovery

Software-only solution

Simple

Efficient

Proven

© Copyright 2016 Dell Inc.

Storage Integrated Data Protection

RPO = Minutes

Minimal RTO

Cost Effective

Reliable Recovery

App Integration

Backups Snapshots+

No App Impact

SnapshotReplication Backup Archive

DATA PROTECTION CONTINUUM

© Copyright 2016 Dell Inc.

Policy-based lifecycle data protection

management for snapshot copies

Support for both SAN and NAS arrays

Non-disruptive live backup Rollover to backup media for longer retention

Application aware Exchange, SQL, DB2, Oracle, SAP, and SAP with Oracle

Snapshot Management SnapshotReplication Backup Archive

DATA PROTECTION CONTINUUM

© Copyright 2016 Dell Inc.

Backup and Recovery

Up to 20x faster backup with Storage Integrated Data

Protection

Up to 30x faster image-based recovery

Cloud-enabled, both IN the cloud and TO the cloud

Empowers app owners to work within their native

utilities

Tightest integration with Data Domain

Heterogeneous platform support across a broad range

of apps

Daily full

backup

Never backup

the same data

twice!

SnapshotReplication Backup Archive

DATA PROTECTION CONTINUUM

© Copyright 2016 Dell Inc.

Archive long-term inactive business data

Reduce primary storage utilization

Manages risk to help meet compliance and

litigation needs

Enable data search & discovery

Improve operational efficiencies

Archive SnapshotReplication Backup Archive

DATA PROTECTION CONTINUUM

© Copyright 2016 Dell Inc.

Unified search of backup data

Metadata or full-content indexing

Provides real-time results

Web-based search with visual filters

Google-like interface

Restore directly from search GUI

Index and Search

© Copyright 2016 Dell Inc.

Copy data management across the data center, which

Discovers copies for non-disruptive global oversight

Automates SLO compliance via efficient copy creation

Optimizes operations through intelligent analytics

Designed for self service with global oversight to increase efficiency,

streamline operations and reduce costs

Enterprise Copy Data Management

© Copyright 2016 Dell Inc.

DISCOVER ANALYZE INFORM

Business Applications Backup

Applications Replication

Virtualization

Deduplication/VTL/Tape Primary

Storage

Monitoring Optimization

Capacity Planning Alerting

Utilization Reporting

Troubleshooting / Root Cause

Analysis

Proactive Real-time Processing

Policy-based Management

Cross-domain Events Correlation

Monitoring, reporting and analysis capabilities

Data Protection Management

© Copyright 2016 Dell Inc.

Comprehensive, industry-leading data protection

Data Protection Suite Family

Data Protection

Suite

Enterprise Edition

Data Protection

Suite

For VMware

Choose the right solution for your environment:

Data Protection

Suite

For Backup

Data Protection

Suite

For Applications

Data Protection

Suite

For Archive

© Copyright 2016 Dell Inc.

Enterprise Edition

Suite for

VMware

Data Protection Continuum

Protection and ContinuityBased on Data Value and Business Objectives

Suite for

VMwareSuite for Backup

Suite for Apps

Suite for

Archive

SnapshotReplication Backup ArchiveAvailability

© Copyright 2016 Dell Inc.

Comprehensive replication, backup and archive solution

Data Protection Suite Enterprise Edition

Covers All Consumption Models

From on premise traditional infrastructures to

virtualized environments to hybrid and public clouds

Protects Data Across the Continuum

Using technologies spanning replication, snapshot, backup and

archive

For Organizations of All Sizes

Optimize protection for everything from laptops to the largest data

center

Built to meet your data requirements in a single offering

© Copyright 2016 Dell Inc.

Best-of-breed backup and recovery software

Data Protection Suite for Backup

Centralized Data Protection Management

Comprehensive scheduling, policy management, monitoring,

analysis and reporting for physical and virtual environments

Cloud-Enabled

Delivers backups of data and applications WITHIN the public cloud

Provides secure long-term-retention of backups TO the cloud

Flexibility and Choice

Supports deduplication backup, backup to disk, snapshot-based

backup, and backup to tape

Mix and match software anytime for complete data protection

© Copyright 2016 Dell Inc.

The speed and control app owners require

Data Protection Suite for Applications

Empower Application Owners

Allows direct backup from their native utilities

Direct Backup to Data Domain from either Primary Storage or application

sever

Up to 20x Faster Backup and 10X Faster Recovery

Allows them to discover, automate and optimize copies

Eliminate or reduce impact on applications

Little or no data flows through application server

Reduce cost and complexity

Eliminate a traditional backup application

© Copyright 2016 Dell Inc.

End-to-end data protection for VMware based environments

Data Protection Suite for VMware

Market-Leading Integration with VMware

Empower vAdmins by providing self-service protection to users

Software-Only Data Protection

Hypervisor based replication for any point-in-time recovery

Backup system scales to 96 TB when configured with DD VE

Shortened Backup Times and Storage Cost Savings

30x faster image recovery than traditional backups

10-38x reduction in backup storage

Application Consistency

Across a broad application landscape of mission critical apps

Microsoft Application Aware

© Copyright 2016 Dell Inc.

Industry-leading archiving and eDiscovery solutions

Data Protection Suite for Archive

Best-in-Class Archiving

Offers flexible archiving of email, file systems and SharePoint

Accelerates search through full-text indexing of archived content

Reduce Costs

Reduce primary storage utilization

Improve application performance

Manage Risk

Delivers litigation readiness and compliance

Provides repeatable and streamlined eDiscovery processes

© Copyright 2016 Dell Inc.

The same user experience whether on-premises or in the cloud

Cloud-enabled

Extend to Cloud Move to Cloud

Apps and DB On-

PremisesApps and DB

In the Cloud

© Copyright 2016 Dell Inc.

Optional add-on

Endpoint Protection in the Cloud

Desktop/laptop backup, file sync, and mobile access

Windows, Mac, Linux clients

Protection for small server workloads at remote offices

Physical/virtual

Backup-as-a-Service

No capital investment required

© Copyright 2016 Dell Inc.

Leverage the cloud of your choice for long-term retention of backups

Data Protection Suite & Data Domain Cloud Tier

StreamlinedRecovery

Orchestration

Long-term Retention

Elastic Cloud Storage

3rd Party

Public Clouds

© Copyright 2016 Dell Inc.

Better together

Data Protection Suite with Data Domain

Why Data Domain with Data Protection Suite?

Tightest integration in the industry

Single vendor, complete data protection solution

Organizations that only work with one data

protection vendor have reduced risk of data loss

Deduplication rates up to 6x better than

competitors

Click here for the full story

© Copyright 2016 Dell Inc.

Data Domain + Data Protection Suite

Better Together

6.2x 7.1x9.8x 10.5x

15.3x

38.2x

0x

5x

10x

15x

20x

25x

30x

35x

40x

45x

IBM TSM CommVault VeritasNetBackup

VeritasBackup Exec

Dell EMCNetWorker

Dell EMCAvamar

Average Dedupe Rate by

Backup Software

© Copyright 2016 Dell Inc.

Why Choose the Dell EMC Data Protection Suite Family

Protection Across the Continuum

Designed to Meet Your Requirements

Covers All Consumption Models

Industry-Leading Protection

Tightest Integration with Data Domain

© Copyright 2016 Dell Inc.

Where can I get more info….

MORE RESOURCES

DELL EMC Data Protection Suite Site: http://www.emc.com/en-us/data-protection/data-protection-suite/index.htm#collapse=&tab3=0

DP Suite Data Sheet: http://www.emc.com/collateral/data-sheet/h11800-emc-data-protection-suite-so.pdf

Fantastic LightBoard Video: (5 mins 33 secs) http://www.emc.com/video-collateral/demos/microsites/mediaplayer-video/emc-data-

protection-suite-family-overview.htm

Top Reasons DP Suite: https://www.emc.com/collateral/handout/h12382-br-top-5-reasons-emc-data-protection-suite.pdf

Even more DP Suite Resources: https://www.emc.com/en-us/data-protection/data-protection-suite/index.htm#collapse=&tab3=4

Overview of the

Virtustream Storage Cloud

Joseph Williams

Business Development Leader

Central Region

A Dell Technology Company

A Dell Technology Company

Protecting the Data

Without

Breaking the Bank

Virtustream and Dell/EMC: A Perfect Marriage

Dell/EMC - The world’s largest privately controlled technology company

• $74 billion revenue• Serving 98% of the Fortune 500• 140,000 team members• 180 countries• Established leader in Storage Technology

Virtustream• $.5B revenue plan in 2016 – from $100M in 2015• 2,000+ employees – from 300 in 2015• 20+ data centers• Major operations in 10 countries• One of the fastest growing EMC companies

• Bloated storage costs & assets

• Mounting Security & Compliance

requirements

• Growing Long Term Retention,

Back-up, and Archive needs

• Larger than desired data center

footprint and data center

consolidation

• Strained enterprise collaboration

• Global access content repository

• Pervasive tape libraries

Growing Storage Requirements Continue to Create and Broaden Business Challenges

4

Object storage is storage that is:

• Exposed and consumed via API’s

(REST)

• Unstructured In Nature

• Designed to be accessed by

applications natively

• Operating system agnostic

• Highly distributed potential

• Durable and scalable

• Typically Erasure Coded for

protection

Let’s Start with the Object

If You Require:

• Enterprise Storage and Security

• Hyper-Scalability into the Cloud

• Extend Dell-EMC Infrastructure

Extended to Cloud

• Mission Critical Workloads in the Cloud

Choosing the Right Tool is Critical

6

Virtustream Portfolio - Built for the Enterprise

STORAGE CLOUD SERVICEBUILT FROM THE GROUND UP FOR ENTERPRISES

22 Data Centers* SLA Attainment 20K Servers Security Certifications

1.8 EB Data4 Continents 4B Events/Day 1+ Tb/s Network

Phase 1: 135 PB

Phase 2: 1,100 PB

Phase 3: 492 PB

130 Billion Objects

10

11

Trusted and Secure Cloud Storage Services for Your Mission-Critical Data

Secure Network Architecture ✅

Encrypted Data in Transit ✅

Rigorous Separation Between Consumers ✅

Data-at-Rest Encryption (Customer-Managed Keys) ✅

Protected Cloud Services Infrastructure ✅

Resilient Security Controls ✅

Independently Audited Environment ✅

Strong Operational Security ✅

Secure Service Administration ✅

Mature Governance, Risk, and Compliance Framework ✅

Security

• SOC 1 Type 2

• SOC 2 Type 2: Security,

Confidentiality, Availability

• CSA STAR Attestation • ISO 27001:2013 • HIPAA• PCI-DSS 3.2

Compliance

Virtustream Storage Cloud Security & Compliance

12

One EMC Number

EMC Triage’s All Incidents

Enterprise Grade Support

Command Centers in Salt Lake City, UT and

Durham, NC

24x7x365 - L1,L2, L3 Round the Clock

Monitoring

Included in Monthly Price/GB

End-to-end EMC Enterprise Support

The Key Strengths of Vistustream Storage Cloud separate it from the rest . . .

13

The Virtustream Storage Cloud is an

Enterprise Ready, Hyper-Scalable Object

Store

• Engineered for the Enterprise by Virtustream

with Dell-EMC Technology

• Validated and Tested with Dell-EMC technology

• One Number Dell-EMC Enterprise Support

number

• Secure, complies with ISO 27001, SOC1, SOC2,

PCI-DSS, CSA STAR and HIPAA Certifications.

• Direct, Partner, and Service Provider models

• Available by Subscription or Pay-As-You-Go

. . . and the key attributes of the Virtustream Storage Cloud meet the requirements CIOs are demanding

1. Object storage service with S3-compatible API

2. Seamless tethers to EMC Storage Systems

3. LTR offering for backups, archiving and cold/frozen storage

4. 4 sites in US, 4 sites in EMEA

5. Extremely competitive pricing model

6. Supports key compliance frameworks

7. End to End Single Vendor Support

8. Industry-leading data durability (designed for 13 9’s)

9. Built for performance

10. Seamlessly extends primary storage & backup to cloud

11. Multiple-tier offerings for resilience, access frequency

12. Supports OpenStack compute environment

13. Built for hyper-scalabilityResearch by

5

2,3,4,8,10,11

2,13

1,2,4,7,10,13

2,4,12

9,13

1,2,7,8,9

6

12

Requirements for Cloud Adoption

Virtustream

Storage Cloud

Cloud Tiering for

Cold Data

EMC VMAX, VNX

XTREMIO, & UNITY

LTR of Backups

to the Cloud

EMC

DATA DOMAIN/

DATA PROTECTION

SUITE

Applications

in the Cloud

ENTERPRISE

Archive

to the Cloud

EMC ISILON

S3 API

Connecting to the Cloud

EMC internal

> 30 days

NetWorker

CloudTier

DD9500

0 - 30 days

Avamar

Other Apps

DR:

> 30 days

NetWorker

CloudTier

DD9500

0 - 30 days

Avamar

Other Apps

PRODUCTION:

Example Cloud Options

CloudArray

VMax

VPlexVRail

CIFSNFSiSCSI

CloudArray

VMax

VPlexVRail

CIFSNFSiSCSI

CloudPools CloudPools

> 60 days> 60 days

Replication

Replication

COTS-or-

Custom

IsilonIsilon

Unity via Cloud Tiering Appliance

Cloud Archival and Backup Gateways

Virtustream

Storage Cloud

EMC InfoArchive

VMax

Networker

XtremIO

Isilon

Source Enabler

VNX

Spanning

DataDomain

eMail,Sharepoint eDiscovery

Unity

CloudArray

CloudBoost

CloudArray

CloudPools

CloudArray

Native

CloudBoost and CloudTier

SourceOne

Cloud TieringAppliance

Storage Classes - Service Offerings

18

Protected within One Data Center

Readily available

Normal access

Single region protected

Read from within region

Highly available

Uninterrupted read access

Multi-region protected

Read from anywhere

Unmatched Durability: Up to 99.99999999999% (13 9s)

Long-term archive

Low need to retrieve

Single region protected

Read from within region

Long-term archive

Low need to retrieve

Multi region protected

Read from anywhere

Standard PremiumStandard

Infrequently Accessed

Premium

Infrequently Accessed

Geo-Protection among all Data Centers

within the Geography

TBsStandard

InfrequentAccess

Premium Infrequent Access

Standard Premium

1 $154 $307 $362 $713

5 $768 $1,536 $1,812 $3,564

10 $1,536 $3,072 $3,624 $7,128

50 $7,760 $15,360 $18,120 $35,640

100 $15,360 $30,720 $35,016 $70,044

Annual Price/GB of VSC Storage Classes

Pricing Strategy

Standard & Premium

• Subscription & Overage Pricing– Base Per TB /Monthly Subscription Rate

– Includes subscribed capacity, 20% egress of subscribed capacity, transactions up to the amount needed to write subscribed capacity and read 20% back*

– Overages charges assessed on capacity, egress and transactions over included amounts

– 12 month contract term, no discount class

IA Pricing

• Subscription & Overage Pricing– Base Per TB /Monthly Subscription Rate.

– Includes subscribed capacity only

– Overages on capacity, egress, transactions and data retrieval

– 12 month contract term, No discount class

$1,250

$1,350

$1,450

$1,550

$1,650

$1,750

$1,850

$1,950

$2,050

$2,150

0%

10

%

20

%

30

%

40

%

50

%

60

%

70

%

80

%

90

%

10

0%

Annual Restore

Std @ 50TB w/ 20% Included

VS Bill

AWS Bill

Azure Bill

50TB Capacity pricing inclusive of transaction and

network egress charges at different read back rates

*Transaction entitlement amounts are based on the cumulative number of

required to write subscribed capacity (Cat A) and read back 20% of

subscribed capacity (Cat B) in 256K chunks.

Virtustream Storage CloudSample pricing* for 50 TB, 100 TB, and 150 TB @ 12% Retrieval

Category50 TBIA – Std

50 TBIA - Prem

100 TBIA – Std

100 TBIA – Prem

150 TBIA - Std

150 TBIA - Prem

Storage $640 $1280 $1280 $2560 $1920 $3840

Data Input Transactions $175 $175 $350 $350 $524 $524

Other Transactions $2 $2 $4 $4 $6 $6

Data Egress $146 $46 $92 $92 $138 $138

Data Retrieval $5 $5 $10 $10 $15 $15

TOTAL MONTHLY $868 $1,508 $1736 $3,016 $2,604 $4,524

• Based on subscribed capacity, 12% egress of subscribed capacity, transactions up to the amount needed to write subscribed capacity and read 12% back, and leveled for even monthly charges*

• Standard (std) is maintained in one data center; Premium (prem) is replicated in a second data center

• Prices are comparable and competitive with AWS and Google

Virtustream Storage CloudSample pricing* for 50 TB, 100 TB, and 150 TB @ 60% Retrieval

Category50 TBIA – Std

50 TBIA - Prem

100 TBIA – Std

100 TBIA – Prem

150 TBIA - Std

150 TBIA - Prem

Storage $640 $1280 $1280 $2560 $1920 $3840

Data Input Transactions $175 $175 $350 $350 $524 $524

Other Transactions $10 $10 $21 $21 $31 $31

Data Egress $230 $230 $461 $461 $691 $691

Data Retrieval $26 $26 $51 $51 $77 $77

TOTAL MONTHLY $1,081 $1,721 $2,162 $3,442 $3,244 $5,164

• Based on subscribed capacity, 60% egress of subscribed capacity, transactions up to the amount needed to write subscribed capacity and read 60% back, and leveled for even monthly charges*

• Standard (std) is maintained in one data center; Premium (prem) is replicated in a second data center

• Prices are comparable and competitive with AWS and Google

Virtustream Storage Cloud Success - Logos

23

Key Market Differentiators

24

For Enterprise and Service Provider Clouds

At no additional cost,

support is fully inclusive

with cloud subscription.

Single Line of Support

Flexible online and offline

data migrations

Migration to/from ECS,

AWS, Azure, Google

Cloud, and NAS/SAN

Storage

S3 REST API, offering

seamless integration

and most flexible

interoperability

Offers most

competitive pricing

Support Data Migration PricingIndustry Standards API

HIPAA, SOX, PCI, SOC

I, SOC II, SOC III,

FedRamp,

accommodating, and

growing.

Flexible range of

consumption paths,

enabling integration with a

wide array of EMC and 3rd

party solutions.

Flexible range of

Standard, Standard IA,

Premium, and Premium

IA offerings.

Additionally, ancillary

compute is provided,

for big data and

analytic workloads.

Security Consumption Paths Ancillary ComputeRange of Offerings