dell emc forum 2016 - tiedon täydellinen suojaaminen
TRANSCRIPT
DATA PROTECTION EVERYWHEREFOR THE MODERN DATA CENTER
Kim Niskanen Sr Systems Engineer
TALE OF TWO WORLDS
You Need Bothfor Trust and Agility
Traditional Apps
IT
On Premise
Next Gen Apps
Developers
Cloud
EMC’S MODERN DATA CENTER STRATEGY
PROTECTION AND TRUSTSecurity/Governance – Data Protection – Services/Support
FLASH
SCALE-OUT
SOFTWARE
DEFINED
CLOUD
ENABLED
Reduce Costs (# Of Drives, Power, Floor Space. Etc.)
Consistent And Predictable Performance
Lower Entry Costs And Scale As You Grow
Manage Massive Capacity With Fewer Resources
Automated Provisioning And Business Agility
Flexible And Programmable Data Services
Policy Driven Service Delivery
On/Off Premises Data and/or Application Mobility
ARE YOU PROTECTED?
Global Data Protection Index
$914K Average Cost of
Data Loss
2.36TData Loss
90%Laggards or Evaluators
73% Unable to keep pace with Flash
82%Unprepared for
future business
challenges
50%Unprotected in the
Cloud
EMC DATA PROTECTION – BY THE NUMBERS
• World’s Largest Data Protection
Company
• Market Share Leader in Purpose Built
Backup Appliances• Leaders in Open & Mainframe Systems
• 3x share our closest competitor
• 70,000+ Systems Shipped and Installed
• 4,000+ Data Protection Solution
Employees
• And…Ask Us About Gartner!
EMC DATA PROTECTION – BY THE NUMBERS
ENABLING SIMPLICITY - DATA PROTECTION EVERYWHERE
Where
You
Need It
Born in the Cloud
SaaS
Public / Private
R T O & R P O
Consumption
Models
How You
Want It
Best of Breed Converged Software Defined As-a-Service
VirtualizedConverged
InfrastructureOn-Prem
SnapsReplication ArchiveBackup IRS “Air Gap”
LTR / Archive
Continuous
Availability
PROTECTION STORAGE
WHY EMC PROTECTION STORAGE
FLEXIBLE• Integrates with leading backup, archiving, enterprise applications and big data
applications or directly with primary storage• Deploy protection storage however you want it
RELIABLE• End-to-end data verification, fault detection, and self healing
EFFICIENT• Protect more data faster with industry leading speed and scale
• Reduce storage required by 10–30x
CLOUD-ENABLED• Natively tier deduplicated data to the cloud for modern long-term retention
• Deliver data protection as a service with logical data isolation
PROTECTION STORAGE - HOW YOU WANT IT
How You
Want It
Best of Breed Converged Software Defined As-a-Service
PROTECTION SOFTWARE
WHY EMC PROTECTION SOFTWARECOMPREHENSIVE PROTECTION• Delivers protection across the data protection continuum• Covers all consumption models, from on-premise traditional infrastructures to
virtualized environments to hybrid and public clouds• Delivers backups of data and applications WITHIN the public cloud as well as
provides secure long-term retention of backups TO the cloud
HIGH PERFORMANCE• Up to 20x faster backup• Up to 30x faster image-level recovery• Industry’s tightest integration with Data Domain, yielding deduplication rates
nearly 4x that of our competitors• Reduces backup storage by up to 38x• Reduces network traffic by up to 99%• Reduces backup times by up to 50%
FLEXIBLE• Includes 5 purpose-built offerings, protecting environments rich in mission
critical applications, fully virtualized, focused on backup and recovery, requiring archive and compliance, or a complex assortment of these
• Supports a wide range of protection technologies including deduplication backup, backup to disk, snapshot-based backup, and backup to tape
• Delivers application owner visibility and control
COMPREHENSIVE DATA PROTECTION FOR THE MODERN DATA CENTER
EMC PROTECTION SOFTWARE – HOW YOU WANT IT
EMC CLOUD DATA PROTECTION SOFTWARE
COMPREHENSIVE PROTECTION• Direct-to-cloud backup for desktops, laptops and remote and branch offices (RoBo)• Born-in-cloud protection for fast growing enterprise SaaS applications including
Office 365, Salesforce and Google Apps• Cloud enablement for long-term retention (LTR) to the cloud
FLEXIBLE• Deployment time measured in minutes or hours as opposed to weeks or months• Doesn’t require additional capital expense for hardware• Easily scale resources up or down according to demand• Per user, utility based pricing plans
SECURE• End-to-end encryption, including customer managed 256-bit AES enterprise key • Global network of world-class data centers, ensuring data is stored in region
according to local laws and regulations • Successful attainment of industry leading cloud service audits and certifications
including ISO 27001, SOC 2, SSAE 16, Veracode AA, and HIPAA
ISOLATED RECOVERY SOLUTIONS
IMPACT OF CYBER ATTACKS
6 MinutesTime it takes to
compromise an
organization, 60%
of the time
$1.25MAverage cost of
1M breached
records
$67KAverage cost of
1,000 breached
records
36%Lost data due to
security breach
2,122Confirmed data
breaches in 2014
SOLUTIONS AND SERVICES TO SAFE GUARD YOUR DATA
EMC ISOLATED RECOVERY SOLUTIONS
Assess ValidatePlan Implement• Business Application
Protection Requirements
• Compliance Policies Requirements
• Application Readiness & Requirements
• Application Dependencies
• IRS Architecture & High-Level Design
• Technology Recommendations
• Implementation Plan & Timeline
• IRS Validation Test Design
• Program Managed Implementation
• Technology Deployment & Hardening
• IRS Processes & Procedures
• IRS Run Books
• Compliance Ready Test Reports
• Facilitated IRS Table Top Exercises
• IRS Process Training
• Proctored IRS Test
Advisory Service Implementation Service
Educate & Assess
Workshop Format Various Delivery Models
• Data Protection Everywhere
• One vendor delivering simplicity, flexibility, and investment protection
• Market & Technology Leadership
– #1 In Deduplication
– #1 In Purpose Built Backup Appliances
– #1 In Combined Data Protection Software & Storage
– #1 In Replication
– Isolated Recovery Solutions
• Unparalleled Investment
• $16.5B cumulative R&D investment, $17B in technology acquisitions
• 4,000+ team members dedicated to helping our customers
WHY EMC FOR DATA PROTECTION
HELPING CUSTOMERS TRANSFORM
LET’S GET STARTED
1. Assess
2. Design
3. ROI/TCO
4. Implement
5. Validate The Value
Analysis By EMC and its Partners After 6-12 Months In Production
Output: ROI To-Date Using EMC Data Protection Solutions
Identify What You Have,Biggest Problem Areas
Design Architecture That Meets Your Needs And Agree On Key Focus Area
Develop ROI/TCO Analysis That Shows What You Are Spending Today
EMC and Partner Services to Get Solution Up, Running and Maintained –Whatever You Need
6. TCE & Customer Escalation Management