Transcript
Page 1: Intelligent Information Infrastructure presented by EMC2

1EMC CONFIDENTIAL—INTERNAL USE ONLY

Intelligent Information Infrastructure

Rajesh ItagiDirector, Client Services

Page 2: Intelligent Information Infrastructure presented by EMC2

2EMC CONFIDENTIAL—INTERNAL USE ONLY

CIO concerns and resolutions for 2008

Page 3: Intelligent Information Infrastructure presented by EMC2

3EMC CONFIDENTIAL—INTERNAL USE ONLY

WHO WE ARE

We are a leading technology company that is driven to perform, to partner, to execute. We go about our jobs with a passion for delivering results that exceed our customers’ expectations for quality, service, innovation, and interaction. We pride ourselves on doing what’s right and on putting our customers’ best interests first. We lead change and change to lead. We are devoted to advancing our people, customers, industry, and community. We say what we mean and do what we say. We are EMC, where information lives.®

Page 4: Intelligent Information Infrastructure presented by EMC2

5EMC CONFIDENTIAL—INTERNAL USE ONLY

EMC Corporation

At a Glance

Revenues (2007): $13.2 billion

Net Income $1.7 billion

Employees (end Q4 worldwide): >37,600

Countries with EMC operations: >50

R&D Investment (2007): >$1.5

Total Cash and Investments (end Q4): $8 billion

Free Cash Flow (2007) $2.2 billion

Market Capitalization: (Feb. 4) >$33 billion

Founded: 1979

Page 5: Intelligent Information Infrastructure presented by EMC2

6EMC CONFIDENTIAL—INTERNAL USE ONLY

Software16%

Services10%

Systems74%

Systems74%

100% dedicated toEMC hardware

90% dedicated toHigh-End Symmetrix

Customer Services only

Software40%

Systems44%

16%Services

Content Management and ArchivingInformation SecurityVirtual Infrastructure

EMC Today

InformationStorage

EMC in 2002

Consulting / Solution IntegrationManaged ServicesTechnology ImplementationMaintenance and SupportEducation Services

• Symmetrix• CLARiiON• Centera• Celerra• Connectrix• Invista• DiskLibrary

EMC’s Ongoing Transformation

Page 6: Intelligent Information Infrastructure presented by EMC2

8EMC CONFIDENTIAL—INTERNAL USE ONLY

Our Strategy

Information Infrastructure is a shared set of products,services, and best practices to store, protect,

add intelligence to, virtualize and automate information

Page 7: Intelligent Information Infrastructure presented by EMC2

9EMC CONFIDENTIAL—INTERNAL USE ONLY

What EMC Does

information infrastructure makes information work with increased value, flexibility, efficiency, and cost savings.

storing moreefficiently

next generationbackup and archive

making protectioneffective and affordable

securing criticalassets

automatingdata center operations

leveraging content forcompetitive advantage

virtualizing yourinformation infrastructure

accelerating business valuefor applications

Page 8: Intelligent Information Infrastructure presented by EMC2

10EMC CONFIDENTIAL—INTERNAL USE ONLY

CLARiiON InvistaEMC

Centera

Symmetrix

Celerra

EMCDisk Library

Connectrix

Broadest Lineup! Best Performance! Best Functionality!Highest Quality! Most Secure!

Networked Storage

LifeLineAX4

DMX

FlashDrives

Page 9: Intelligent Information Infrastructure presented by EMC2

11EMC CONFIDENTIAL—INTERNAL USE ONLY

Networked Storage

“Five 9s” availability on arrays

Tiering

Energy / data center efficiency

Ease of use

Virtual “thin” provisioning

Flash technology will revolutionize storage

Page 10: Intelligent Information Infrastructure presented by EMC2

12EMC CONFIDENTIAL—INTERNAL USE ONLY

“Most likely this will create a giant gap against IBM and Hitachi.”-- ESG Analyst Steve Duplessie

Wall Street Journal, 14 January 2008

“Today the enterprise disk drive market changed forever.”-- Techworld

14 January 2008

Page 11: Intelligent Information Infrastructure presented by EMC2

13EMC CONFIDENTIAL—INTERNAL USE ONLY

Information Protection

Assurethat the informationis always available

and alwayssecure

Page 12: Intelligent Information Infrastructure presented by EMC2

14EMC CONFIDENTIAL—INTERNAL USE ONLY

Information Protection

Operational recovery– Clones, snaps, CDP

Disaster recovery– Remote replicas

Speed of recoveryis of the essence

– (Backup to Tape) → (Backup to Disk)

Cost is important– Data de-duplication

(VTL, LAN, Tier 3, at the source)

SaaS “Data Vault” option– EMC Fortress

Assure High Availability

Page 13: Intelligent Information Infrastructure presented by EMC2

15EMC CONFIDENTIAL—INTERNAL USE ONLY

Information Protection

Assure the information is secure Operational recovery

– Clones, snaps, CDP

Disaster recovery– Remote replicas

Speed of recoveryis of the essence

– (Backup to Tape) → (Backup to Disk)

Cost is important– Data de-duplication

(VTL, LAN, Tier 3, at the source)

SaaS “Data Vault” option– EMC Fortress

Assure High Availability

Assess Risk– Service engagement

Protect Identities– Strong authentication– Access control

Protect data– Encryption– Centralized key management– Data loss prevention

Secure information management– Envision– Incident and event monitoring

Page 14: Intelligent Information Infrastructure presented by EMC2

16EMC CONFIDENTIAL—INTERNAL USE ONLY

+Intelligence

Addintelligenceto manage

unstructured dataand data in place

Page 15: Intelligent Information Infrastructure presented by EMC2

17EMC CONFIDENTIAL—INTERNAL USE ONLY

+Intelligence

Capture and ingest Classify and tag Rich repository functionality

– Logical info storage– Check in/out, version control

Workflow and BPM Multichannel Output Management

– Web, self-service, email, reports

Archive and retain– Compliance– eDiscovery– Automated policy management

Unstructured information

Page 16: Intelligent Information Infrastructure presented by EMC2

18EMC CONFIDENTIAL—INTERNAL USE ONLY

Unstructured information

+Intelligence

Capture and ingest Classify and tag Rich repository functionality

– Logical info storage– Check in/out, version control

Workflow and BPM Multichannel Output Management

– Web, self-service, email, reports

Archive and retain– Compliance– eDiscovery– Automated policy management

Classify and tag Automated policy management

– Infoscape with Tablus discovery engine

Digital rights management

Manage All Data Types in Place

Page 17: Intelligent Information Infrastructure presented by EMC2

19EMC CONFIDENTIAL—INTERNAL USE ONLY

Virtualize & Automate

Orchestrate the informationinfrastructure through virtualization,

and resource managementtechnologies

Page 18: Intelligent Information Infrastructure presented by EMC2

20EMC CONFIDENTIAL—INTERNAL USE ONLY

Virtualize & Automate

x86 Virtual Infrastructure File virtualization Global namespace Virtual provisioning SAN virtualization

Virtualize

Page 19: Intelligent Information Infrastructure presented by EMC2

21EMC CONFIDENTIAL—INTERNAL USE ONLY

Virtualize

Virtualize & Automate

x86 Virtual Infrastructure File virtualization Global namespace Virtual provisioning SAN virtualization

Element Management– Storage arrays

Problem management– Root cause– Problem automation

Change and compliance mgmt– Automated provisioning– Change management

Coming soon . . .Process orchestration

– ITIL enablement– Service management

Resource Management

Page 20: Intelligent Information Infrastructure presented by EMC2

22EMC CONFIDENTIAL—INTERNAL USE ONLY

Symmetrix HW & SW CLARiiON HW & SW Celerra HW &SW Centera HW& SW Connectrix HW &SW Disk Libraries Control Center SMARTS NetWorker Avamar Backup Advisor Replication Manager Infoscape RecoverPoint Retrospect Xtender Family VisualSAN / VisualSRM PowerPath Invista Rainfinity AutoStart

SecurID Authentication Consumer Protection Suite Smart Cards and USB

Authenticators Card Manager Access Manager Federated Identity Manager Enterprise Data Protection

Solutions BSAFE Security Tools for

Developers Digital Certificate

Management enVision

Virtual Infrastructure 3 ESX Server VMware VMFS Virtual SMP VirtualCenter VMotion VMware HA VMware DRS VMware Consolidated

Backup VMware Lab Manager VMware Workstation VMware ACE Virtual Desktop Infrastructure VMware Player VMware Server P2V Assistant Virtual Machine Importer

Docmntm Content Srvr Docmntm Web Publisher Dcmntm 5.3 sp 2, 3, 4, 5 Dcmntm OEM Edition Docmntm Process Suite Docmntm Report’g Srvcs eRoom Unified Records Manager Content Storage Services Business Process Mgr Compliance Manager Archive Services for

eMail / Imaging / Reports Captiva InputAccel Captiva FormWare Captiva Dispatcher Application Xtender ViewPoint SharePoint Content Srvcs SharePoint Archive Srvcs SAP Portal Content Srvcs IRM Srvcs for Docmntm IRM Services for eRoom Web Pub Page Builder Web Pub Contrib Client

Information Storage

Content Mgmt & Archiving

RSA InformationSecurity

VMwareVirtualization

Industry’s Broadest Information Infrastructure Portfolio

Page 21: Intelligent Information Infrastructure presented by EMC2

23EMC CONFIDENTIAL—INTERNAL USE ONLY

The Wired 40EMC CorporationBest Data

Classification Solution

EMC InfoScape

InformationWeek 500 EMC

Corporation

Enterprise Software StorageEMC Avamar 3.6

EMC Corporation

Companywide IntegrationInitiative Synergy

Technology Campaign of the Year IDC EMC Digital

Universe Campaign

Industry Recognition for EMC’s Leadership

Disk and disk subsystemsEMC CLARiiON CX3

BusinessWeek InfoTech 100EMC Corporation

Golden Processor Award 2008Best Content Management

SoftwareEMC Documentum 6.0

Enterprise Equipment:

Network StorageEMC

Corporation

Most Powerful Enterprise Playersin the Middle EastEMC Corporation

Digital Times 2007HIT Product Award

EMC Symmetrix DMX 4

MHT Citizenship AwardsPhilanthropy

EMC Corporation

Page 22: Intelligent Information Infrastructure presented by EMC2

24EMC CONFIDENTIAL—INTERNAL USE ONLY

“Strategic Supplierof the Year Award”

Recognition for EMC’s Leadership:Partner & Customer Awards

“Diamond Partnerof the Year”

“Star Awards”

“Customer AppreciationAward”

“CustomerAppreciation Award”

“Customer AppreciationAward” “2007 Preferred Supplier”

2007 Annual Report CardNetwork Storage and

Storage Management SoftwareEMC Ranked #1

“IT Supplier of the Year”

Page 23: Intelligent Information Infrastructure presented by EMC2

25EMC CONFIDENTIAL—INTERNAL USE ONLY

How to Get Started?

Service Catalog Application Alignment Information Infrastructure Planning

Services

BuRA Assessment Classification for Information

Security Continuous Availability

Assessment Security Information and Event

Management Services

Digital Rights Management Workflow Solutions, Compliance Solutions

Storage, File, Server VirtualizationChange ManagementAutomating Root cause analysis

Store

Protect

Intelligence

Virtualise & Automate

EMC Consulting Can Help

Page 24: Intelligent Information Infrastructure presented by EMC2

26EMC CONFIDENTIAL—INTERNAL USE ONLY

Page 25: Intelligent Information Infrastructure presented by EMC2

27EMC CONFIDENTIAL—INTERNAL USE ONLY

S.P.I.V.A

5 Minutes Power Talk

Page 26: Intelligent Information Infrastructure presented by EMC2

28EMC CONFIDENTIAL—INTERNAL USE ONLY

Typical IT Environment

Outlook users &file clients

File servers

SQL server

Exchange servers

LAN

LANbackup

CRM server

Web server

Tapebackup

App server

Page 27: Intelligent Information Infrastructure presented by EMC2

29EMC CONFIDENTIAL—INTERNAL USE ONLY

Typical IT Environment – Potential Issues

Outlook users &file clients

File servers

SQL server

Exchange servers

LAN

LANbackup

CRM server

Web server

Tapebackup

App server

Data Everywhere

Data Everywhere

Data Everywhere

Data Everywhere

Page 28: Intelligent Information Infrastructure presented by EMC2

30EMC CONFIDENTIAL—INTERNAL USE ONLY

Typical IT Environment – Potential Issues

Outlook users &file clients

File servers

SQL server

Exchange servers

LAN

LANbackup

CRM server

Web server

Tapebackup

App server

Multiple Backup

Multiple Backup

Hard to Manage

Low Utilization

Difficult to build DR

Page 29: Intelligent Information Infrastructure presented by EMC2

31EMC CONFIDENTIAL—INTERNAL USE ONLY

Typical IT Environment – Potential Issues

Outlook users &file clients

File servers

SQL server

Exchange servers

LAN

LANbackup

CRM server

Web server

Tapebackup

App server

Unprotected Tape

User Identification

Compliance

How to Archive

Business Intelligence

To many servers

How to handle paper

RTO/RPO

How to manage SLA

Automating workflow

Page 30: Intelligent Information Infrastructure presented by EMC2

32EMC CONFIDENTIAL—INTERNAL USE ONLY

IP/iSCSI

Store More Intelligently

Outlook users &file clients

SQL server

Exchange servers

LAN

LANbackup

ERP server

Web server

Tapebackup

App server

FC

SANIP

iSCSI

Unified Storage

Page 31: Intelligent Information Infrastructure presented by EMC2

33EMC CONFIDENTIAL—INTERNAL USE ONLY

IP/iSCSI

Store More Intelligently

Outlook users &file clients

SQL server

Exchange servers

LAN

LANbackup

ERP server

Web server

Tapebackup

App server

FC

SANIP

iSCSI

Unified Storage

- NS 20/40

- DMX-3 / DMX-4

- CX3 / CX3i

- Celerra

- NAS Gateway

- Storage Consolidation

Page 32: Intelligent Information Infrastructure presented by EMC2

34EMC CONFIDENTIAL—INTERNAL USE ONLY

Protect Against Data Loss

Outlook users &file clients

SQL server

Exchange servers

LAN

Consolidatedbackup

ERP server

Web server

App server

FC

SANIP

iSCSI

Data ReplicationData Snapshot

Page 33: Intelligent Information Infrastructure presented by EMC2

35EMC CONFIDENTIAL—INTERNAL USE ONLY

Protect Against Data Loss

Outlook users &file clients

SQL server

Exchange servers

LAN

Consolidatedbackup

ERP server

Web server

App server

FC

SANIP

iSCSI

Data ReplicationData Snapshot

- Networker

- Networker modules

- Tape Library

- EDL

- SANtape

- EBA

- BURA Assessment

- SRDF

- Mirrorview

- Recoverpoint

- DR Storage

- SAN Copy

- Replistor

- BC Assessment

- Timefinder

- Snapview

- Recoverpoint

- Powersnap modules

- TFEIM

- SAN Copy / Open Replicator/Migrator

- Replication Manager

Page 34: Intelligent Information Infrastructure presented by EMC2

36EMC CONFIDENTIAL—INTERNAL USE ONLY

Protect from Mis-Use (Security)

Outlook users &file clients

SQL server

Exchange servers

LAN

ERP server

Web server

App server

FC

ProtectUser Access

ProtectBackup Tape

ProtectInformation

ProtectDatabase

ProtectReplication

Page 35: Intelligent Information Infrastructure presented by EMC2

37EMC CONFIDENTIAL—INTERNAL USE ONLY

Protect from Mis-Use (Security)

Outlook users &file clients

SQL server

Exchange servers

LAN

ERP server

Web server

App server

FC

ProtectUser Access

ProtectBackup Tape

ProtectInformation

ProtectDatabase

ProtectReplication

- Neoscale

- CipherOptics

- Enterprise Data Protection

- BSAFE Tools

- SecurID

- Consumer Protection Suite

- Access Manager

- Identity Manager

- Neoscale

- IRM (Authentica)

Page 36: Intelligent Information Infrastructure presented by EMC2

38EMC CONFIDENTIAL—INTERNAL USE ONLY

Intelligent Information Management

Outlook users &file clients

SQL server

Exchange servers

LAN

ERP server

Web server

App server

FC

ArchiveStorage

Archive inactivedata before backup

backup

Information Classification

TieredStorage

Page 37: Intelligent Information Infrastructure presented by EMC2

39EMC CONFIDENTIAL—INTERNAL USE ONLY

Intelligent Information Management

Outlook users &file clients

SQL server

Exchange servers

LAN

ERP server

Web server

App server

FC

ArchiveStorage

Archive inactivedata before backup

backup

Information Classification

TieredStorage

- Centera

- Tiered Storage on DMX/CS

- Xtender family

- Archive Service

- Rainfinity File Manager

- CFA

- Infoscape

- Infoscope

- Information Classification Services

- Tiered Storage

- Networker

- Networker modules

- Avamar

- Tape Library

- EDL

- EBA

- BURA Assessment

Page 38: Intelligent Information Infrastructure presented by EMC2

40EMC CONFIDENTIAL—INTERNAL USE ONLY

Leveraging Content to Create Business Value

Outlook users &file clients

SQL server

Exchange servers

LAN

ERP server

Web server

FAX

Unified Content Repository

Report Data

Web Content

Email

Transaction

Customer data

Unstructured files

ECM server

Capture, Classify, Change, Route, Approve, Publish, Search, Retire information

Paper Doc.

Page 39: Intelligent Information Infrastructure presented by EMC2

41EMC CONFIDENTIAL—INTERNAL USE ONLY

Leveraging Content to Create Business Value

Outlook users &file clients

SQL server

Exchange servers

LAN

ERP server

Web server

FAX

Unified Content Repository

Report Data

Web Content

Email

Transaction

Customer data

Unstructured files

ECM server

Capture, Classify, Change, Route, Approve, Publish, Search, Retire information

Paper Doc.

- Documentum Content Server

- Archive Service for Report

- DocumentumWeb Publisher

- SAP Content Services

- Captiva

- Archive Service for Image

- Archive Services for Email

- BPM

- Compliance Mgr

- Record Mgr

- Federated Search

Page 40: Intelligent Information Infrastructure presented by EMC2

42EMC CONFIDENTIAL—INTERNAL USE ONLY

Virtualized & Automate Infrastructure

Users

Web serverApp serverERP Server

VMware Environment

SQL serverExchange Server

VMware Environment

Virtualized Storage and File System

Corporate Network (IP & FC)

VirtualTape

De-Duplication

Next Generation Backup

Archive

`

End to EndInfrastructure &

Service Management

Page 41: Intelligent Information Infrastructure presented by EMC2

43EMC CONFIDENTIAL—INTERNAL USE ONLY

Virtualize & Automate Infrastructure

Users

Web serverApp serverERP Server

VMware Environment

SQL serverExchange Server

VMware Environment

Virtualized Storage and File System

Corporate Network (IP & FC)

VirtualTape

De-Duplication

Next Generation Backup

Archive

`

End to EndInfrastructure &

Service Management

- VMware

- P2V

- Consolidation & Virtualization Assessment

- EDL

- Avamar

- Centera

- BURA

- Invista

- Raininfinity

- DMX / CX

- Smarts

- Smarts ADM

- Control Center

- Visual SAN/SRM

Page 42: Intelligent Information Infrastructure presented by EMC2

44EMC CONFIDENTIAL—INTERNAL USE ONLY


Top Related