Sal Fernando Chief Technical Architect EMC Enterprise Solutions Group AP/J
Total Page:16
File Type:pdf, Size:1020Kb
Sal Fernando Chief Technical Architect EMC Enterprise Solutions Group AP/J © Copyright 2006 EMC Corporation. All rights reserved. 1 Virtualizing your Infrastructure Sal Fernando Chief Technical Architect EMC Enterprise Solutions Group AP/J © Copyright 2006 EMC Corporation. All rights reserved. 2 Did you know? “75% of storage management is backup and recovery yet 30% of all data recovery instances fail due to botched backups” — Anders Lofgren, Forrester Research, 2003 “Storage & Infrastructure Growth rates >80% per annum” — Gartner 2005 & confirmed by EMC & Partners via Classification of customer environments “Dormant data 50-96%” “Duplicate files >20%” “Illegal files >15%” — EMC & Partners via Classification of customer environments Budgeting issues You’re wasting energy (electricity) and paying for it Your archival (long term retention) policy most likely won’t work Only 10-15% of your CPU population is utilised Your environment isn’t secure — (Nearly) Everyone! © Copyright 2006 EMC Corporation. All rights reserved. 3 Strengthen and Enable Information Infrastructure leverage optimize 2003 2004 2005 2006 2007 JAN. JAN. JAN. JAN. JAN. protect store © Copyright 2006 EMC Corporation. All rights reserved. 4 Information: Change in Multiple Dimensions information information growth information More growth : regulations information stored on disk arrays growing uses 70%+ in 2005 More types: transactions, documents, forms, web, images, voice, messages, reports . More uses: ERP, CRM, RFID, collaboration, data mining, discovery . information More regulations: SEC 17a-4, NASD 3010,Sarbanes-Oxley, Basel types II, UK Metadata, eSign Act, 21 CFR Part 11 (more coming!) © Copyright 2006 EMC Corporation. All rights reserved. 5 INFORMATION INFRASTRUCTURE A shared set of products, services, and best practices for storing , protecting , optimizing , and leveraging information so that people can avoid the potentially serious risks and reduce the significant costs associated with managing information, while fully exploiting its value for business advantage © Copyright 2006 EMC Corporation. All rights reserved. 6 INFORMATION INFRASTRUCTURE © Copyright 2006 EMC Corporation. All rights reserved. 7 More than $10 Billion in R&D and Acquisitions leverage enterprise content mgmt and archive: Documentum information acquisition: Captiva, Acartus BPM, collaboration: ProActivity, eRoom enterprise search: AskOnce app app optimize virtualization: VMware, Rainfinity, Invista app app information mgmt: Xtender family, Documentum , Infoscape information resource mgmt: ControlCenter, Smarts, nLayers protect array replication: SRDF, MirrorView infrastructure backup to disk: NetWorker data de-duplication: Avamar continuous data protection: RecoverPoint security: RSA, Authentica, Network Intelligence store SAN: Symmetrix, CLARiiON, Connectrix NAS: Celerra CAS: Centera IP: Symmetrix, CLARiiON, Celerra, Centera © Copyright 2006 EMC Corporation. All rights reserved. 8 Storing Intelligently storing information at the right service level at the right cost app app app app information broadest choices for tiering meeting business cost optimization requirements at the lowest infrastructure overall cost comprehensive services store | protect | optimize | leverage Key Capabilities: ADIC Scalar CLARiiON Family Disk Library Centera CLARiiON Celerra Connectrix Symmetrix © Copyright 2006 EMC Corporation. All rights reserved. 9 Protecting Against Loss protecting information availability at the right service level at the right time app app app app information archive before backup ensuring access, application integration minimizing cost infrastructure proven, scalable technologies store | protect | optimize | leverage Key Capabilities: array based: SRDF, TimeFinder, MirrorView, SnapView network based: RecoverPoint host based: NetWorker, Avamar, RepliStor infrastructure: AutoStart, PowerPath, VMotion © Copyright 2006 EMC Corporation. All rights reserved. 10 Protecting Against Unauthorized Use from securing infrastructure to securing information app app app app information protecting sensitive identity information- data centric information, mgmt encryption wherever infrastructure security it goes store | protect | optimize | leverage Key Capabilities: identity mgmt, access control, encryption and key management: RSA digital rights management: Authentica, Documentum security information and event management : Network Intelligence storage security assessment services © Copyright 2006 EMC Corporation. All rights reserved. 11 Optimizing Information Management using information to tell the infrastructure what to do app app app app information minimizing information analysis action costs, analysis action reducing risks infrastructure files patterns, move e-mails rules, flag store | protect | optimize | leverage database . criteria . protect . Key Capabilities: applications : EmailXtender, DiskXtender, DatabaseXtender content: Documentum CSS file discovery: Infoscape © Copyright 2006 EMC Corporation. All rights reserved. 12 Optimizing Infrastructure virtualization makes for better consolidation app app app app information server virtualization improved utilization, file virtualization increased flexibility infrastructure storage virtualization store | protect | optimize | leverage Key Capabilities: server virtualization: VMware file virtualization: Rainfinity storage virtualization: Invista © Copyright 2006 EMC Corporation. All rights reserved. 13 Optimizing Service Levels model-based management is a “game changer” for service level mgmt app app app app information application and real-time root-cause better infrastructure monitoring analysis and service level discovery and correlation remediation delivery in distributed infrastructure environments object-based model store | protect | optimize | leverage Key Capabilities: application and infrastructure discovery: ControlCenter, nLayers real-time monitoring, correlation, root-cause: Smarts © Copyright 2006 EMC Corporation. All rights reserved. 14 Leveraging Information one framework for unlocking the value of information app app new applications app app information capture workflow creating new and organize and value from classify existing manage information infrastructure collaboration store | protect | optimize | leverage enterprise search Key Capabilities: enterprise content management: Documentum information capture and classification: Acartus, Captiva business process management: ProActivity collaboration / workflow: eRoom enterprise search: AskOnce © Copyright 2006 EMC Corporation. All rights reserved. 15 Leveraging Information EMC Documentum E-mail Files Database ERP Documents Knowledge Workers Classification and extraction New applications Metadata generation Business process automation Repository incorporation Collaborative workplaces New compliance and New value from security capabilities existing information Standardized metadata, policy, and workflow Automatic protection, retention, and disposition Virtual Repository Creating new value from existing information © Copyright 2006 EMC Corporation. All rights reserved. 16 Completing The Solution building your information infrastructure solution blueprints app app infrastructure | application | information app app information professional services assess | design | build | run delivering faster time-to-value infrastructure industry partnerships store | protect | optimize | leverage technology | integration | solution | VARs and integrators customer partnerships customer business reviews | strategic account management | executive sponsors © Copyright 2006 EMC Corporation. All rights reserved. 17 SStore, PProtect, OOptimize, LLeverage Storing More Intelligently Next Generation Backup, Recovery, and Archive Making Protection Effective & Affordable Automating Data Center Operations Virtualization Information Infrastructure Leveraging Content for Competitive Advantage Securing Critical Assets Acceleration Business Value for Applications © Copyright 2006 EMC Corporation. All rights reserved. 18.