dell emc forum 2016 - tiedon täydellinen suojaaminen

20
DATA PROTECTION EVERYWHERE FOR THE MODERN DATA CENTER Kim Niskanen Sr Systems Engineer

Upload: dell-emc-finland

Post on 16-Apr-2017

188 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Dell EMC Forum 2016 - Tiedon täydellinen suojaaminen

DATA PROTECTION EVERYWHEREFOR THE MODERN DATA CENTER

Kim Niskanen Sr Systems Engineer

Page 2: Dell EMC Forum 2016 - Tiedon täydellinen suojaaminen

TALE OF TWO WORLDS

You Need Bothfor Trust and Agility

Traditional Apps

IT

On Premise

Next Gen Apps

Developers

Cloud

Page 3: Dell EMC Forum 2016 - Tiedon täydellinen suojaaminen

EMC’S MODERN DATA CENTER STRATEGY

PROTECTION AND TRUSTSecurity/Governance – Data Protection – Services/Support

FLASH

SCALE-OUT

SOFTWARE

DEFINED

CLOUD

ENABLED

Reduce Costs (# Of Drives, Power, Floor Space. Etc.)

Consistent And Predictable Performance

Lower Entry Costs And Scale As You Grow

Manage Massive Capacity With Fewer Resources

Automated Provisioning And Business Agility

Flexible And Programmable Data Services

Policy Driven Service Delivery

On/Off Premises Data and/or Application Mobility

Page 4: Dell EMC Forum 2016 - Tiedon täydellinen suojaaminen

ARE YOU PROTECTED?

Global Data Protection Index

$914K Average Cost of

Data Loss

2.36TData Loss

90%Laggards or Evaluators

73% Unable to keep pace with Flash

82%Unprepared for

future business

challenges

50%Unprotected in the

Cloud

Page 5: Dell EMC Forum 2016 - Tiedon täydellinen suojaaminen

EMC DATA PROTECTION – BY THE NUMBERS

• World’s Largest Data Protection

Company

• Market Share Leader in Purpose Built

Backup Appliances• Leaders in Open & Mainframe Systems

• 3x share our closest competitor

• 70,000+ Systems Shipped and Installed

• 4,000+ Data Protection Solution

Employees

• And…Ask Us About Gartner!

EMC DATA PROTECTION – BY THE NUMBERS

Page 6: Dell EMC Forum 2016 - Tiedon täydellinen suojaaminen

ENABLING SIMPLICITY - DATA PROTECTION EVERYWHERE

Where

You

Need It

Born in the Cloud

SaaS

Public / Private

R T O & R P O

Consumption

Models

How You

Want It

Best of Breed Converged Software Defined As-a-Service

VirtualizedConverged

InfrastructureOn-Prem

SnapsReplication ArchiveBackup IRS “Air Gap”

LTR / Archive

Continuous

Availability

Page 7: Dell EMC Forum 2016 - Tiedon täydellinen suojaaminen

PROTECTION STORAGE

Page 8: Dell EMC Forum 2016 - Tiedon täydellinen suojaaminen

WHY EMC PROTECTION STORAGE

FLEXIBLE• Integrates with leading backup, archiving, enterprise applications and big data

applications or directly with primary storage• Deploy protection storage however you want it

RELIABLE• End-to-end data verification, fault detection, and self healing

EFFICIENT• Protect more data faster with industry leading speed and scale

• Reduce storage required by 10–30x

CLOUD-ENABLED• Natively tier deduplicated data to the cloud for modern long-term retention

• Deliver data protection as a service with logical data isolation

Page 9: Dell EMC Forum 2016 - Tiedon täydellinen suojaaminen

PROTECTION STORAGE - HOW YOU WANT IT

How You

Want It

Best of Breed Converged Software Defined As-a-Service

Page 10: Dell EMC Forum 2016 - Tiedon täydellinen suojaaminen

PROTECTION SOFTWARE

Page 11: Dell EMC Forum 2016 - Tiedon täydellinen suojaaminen

WHY EMC PROTECTION SOFTWARECOMPREHENSIVE PROTECTION• Delivers protection across the data protection continuum• Covers all consumption models, from on-premise traditional infrastructures to

virtualized environments to hybrid and public clouds• Delivers backups of data and applications WITHIN the public cloud as well as

provides secure long-term retention of backups TO the cloud

HIGH PERFORMANCE• Up to 20x faster backup• Up to 30x faster image-level recovery• Industry’s tightest integration with Data Domain, yielding deduplication rates

nearly 4x that of our competitors• Reduces backup storage by up to 38x• Reduces network traffic by up to 99%• Reduces backup times by up to 50%

FLEXIBLE• Includes 5 purpose-built offerings, protecting environments rich in mission

critical applications, fully virtualized, focused on backup and recovery, requiring archive and compliance, or a complex assortment of these

• Supports a wide range of protection technologies including deduplication backup, backup to disk, snapshot-based backup, and backup to tape

• Delivers application owner visibility and control

Page 12: Dell EMC Forum 2016 - Tiedon täydellinen suojaaminen

COMPREHENSIVE DATA PROTECTION FOR THE MODERN DATA CENTER

EMC PROTECTION SOFTWARE – HOW YOU WANT IT

Page 13: Dell EMC Forum 2016 - Tiedon täydellinen suojaaminen

EMC CLOUD DATA PROTECTION SOFTWARE

COMPREHENSIVE PROTECTION• Direct-to-cloud backup for desktops, laptops and remote and branch offices (RoBo)• Born-in-cloud protection for fast growing enterprise SaaS applications including

Office 365, Salesforce and Google Apps• Cloud enablement for long-term retention (LTR) to the cloud

FLEXIBLE• Deployment time measured in minutes or hours as opposed to weeks or months• Doesn’t require additional capital expense for hardware• Easily scale resources up or down according to demand• Per user, utility based pricing plans

SECURE• End-to-end encryption, including customer managed 256-bit AES enterprise key • Global network of world-class data centers, ensuring data is stored in region

according to local laws and regulations • Successful attainment of industry leading cloud service audits and certifications

including ISO 27001, SOC 2, SSAE 16, Veracode AA, and HIPAA

Page 14: Dell EMC Forum 2016 - Tiedon täydellinen suojaaminen

ISOLATED RECOVERY SOLUTIONS

Page 15: Dell EMC Forum 2016 - Tiedon täydellinen suojaaminen

IMPACT OF CYBER ATTACKS

6 MinutesTime it takes to

compromise an

organization, 60%

of the time

$1.25MAverage cost of

1M breached

records

$67KAverage cost of

1,000 breached

records

36%Lost data due to

security breach

2,122Confirmed data

breaches in 2014

Page 16: Dell EMC Forum 2016 - Tiedon täydellinen suojaaminen

SOLUTIONS AND SERVICES TO SAFE GUARD YOUR DATA

EMC ISOLATED RECOVERY SOLUTIONS

Assess ValidatePlan Implement• Business Application

Protection Requirements

• Compliance Policies Requirements

• Application Readiness & Requirements

• Application Dependencies

• IRS Architecture & High-Level Design

• Technology Recommendations

• Implementation Plan & Timeline

• IRS Validation Test Design

• Program Managed Implementation

• Technology Deployment & Hardening

• IRS Processes & Procedures

• IRS Run Books

• Compliance Ready Test Reports

• Facilitated IRS Table Top Exercises

• IRS Process Training

• Proctored IRS Test

Advisory Service Implementation Service

Educate & Assess

Workshop Format Various Delivery Models

Page 17: Dell EMC Forum 2016 - Tiedon täydellinen suojaaminen

• Data Protection Everywhere

• One vendor delivering simplicity, flexibility, and investment protection

• Market & Technology Leadership

– #1 In Deduplication

– #1 In Purpose Built Backup Appliances

– #1 In Combined Data Protection Software & Storage

– #1 In Replication

– Isolated Recovery Solutions

• Unparalleled Investment

• $16.5B cumulative R&D investment, $17B in technology acquisitions

• 4,000+ team members dedicated to helping our customers

WHY EMC FOR DATA PROTECTION

Page 18: Dell EMC Forum 2016 - Tiedon täydellinen suojaaminen

HELPING CUSTOMERS TRANSFORM

Page 19: Dell EMC Forum 2016 - Tiedon täydellinen suojaaminen

LET’S GET STARTED

1. Assess

2. Design

3. ROI/TCO

4. Implement

5. Validate The Value

Analysis By EMC and its Partners After 6-12 Months In Production

Output: ROI To-Date Using EMC Data Protection Solutions

Identify What You Have,Biggest Problem Areas

Design Architecture That Meets Your Needs And Agree On Key Focus Area

Develop ROI/TCO Analysis That Shows What You Are Spending Today

EMC and Partner Services to Get Solution Up, Running and Maintained –Whatever You Need

6. TCE & Customer Escalation Management

Page 20: Dell EMC Forum 2016 - Tiedon täydellinen suojaaminen