GDPR Industriali Di Napoli – 8 Novembre 2017

Total Page:16

File Type:pdf, Size:1020Kb

GDPR Industriali Di Napoli – 8 Novembre 2017 Continuità Operativa e Protezione dei Dati UnioneGDPR Industriali di Napoli – 8 Novembre 2017 Workshop March 2017 Roberto Lotti – Partner System Engineer [email protected] Articoli rilevanti del GDPR Articolo 5 Principi relativi al processo dei Dati Personali 1. Personal data shall be: a) processed lawfully, fairly and in a transparent manner in relation to the data subject (‘lawfulness, fairness and transparency’); b) collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes; further processing for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes shall, in accordance with Article 89(1), not be considered to be incompatible with the initial purposes (‘ purpose limitation ’); c) adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed (‘ data minimisation ’); d) accurate and, where necessary, kept up to date ; every reasonable step must be taken to ensure that personal data that are inaccurate, having regard to the purposes for which they are processed, are erased or rectified without delay (‘ accuracy ’); e) kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data are processed; personal data may be stored for longer periods insofar as the personal data will be processed solely for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes in accordance with Article 89(1) subject to implementation of the appropriate technical and organisational measures required by this Regulation in order to safeguard the rights and freedoms of the data subject (‘storage limitation’); f) processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage , using appropriate technical or organisational measures (‘ integrity and confidentiality ’). 3 Articolo 25 Protezione dei Dati by Design e by Default 1. Taking into account the state of the art, the cost of implementation and the nature, scope, context and purposes of processing as well as the risks of varying likelihood and severity for rights and freedoms of natural persons posed by the processing, the controller shall, both at the time of the determination of the means for processing and at the time of the processing itself, implement appropriate technical and organizational measures , such as pseudonymisation, which are designed to implement data- protection principles, such as data minimisation , in an effective manner and to integrate the necessary safeguards into the processing in order to meet the requirements of this Regulation and protect the rights of data subjects. 2. The controller shall implement appropriate technical and organisational measures for ensuring that, by default, only personal data which are necessary for each specific purpose of the processing are processed . That obligation applies to the amount of personal data collected, the extent of their processing, the period of their storage and their accessibility . In particular, such measures shall ensure that by default personal data are not made accessible without the individual's intervention to an indefinite number of natural persons. 4 Article 32 Sicurezza nel Processo dei dati 1. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate: a) the pseudonymisation and encryption of personal data; b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; c) the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident; d) a process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing. Articolo 34 Comunicazione di “Data Breach” personali al soggetto interessato 1. The communication to the data subject referred to in paragraph 1 shall not be required if any of the following conditions are met: a) the controller has implemented appropriate technical and organisational protection measures, and those measures were applied to the personal data affected by the personal data breach, in particular those that render the personal data unintelligible to any person who is not authorised to access it, such as encryption ; 5 Soluzioni Prodotti & Tecnologie DellEMC per il GDPR Solutions Mapping ° Centralised GRC Framework ° IT Risk Management ° Enterprise Risk Management ° Automated data life-cycle management ° Compliance Management ° Compliance Management Service ° Audit Management Strategy Service ° Data Breach Workflow Management Design ° Business Continuity Solution ITIL ° Resilient solutions to cyber-attack ° Third parties governance v3 ° Identity & Access Management Service ° Incident & Breach Operation Management Service ° Security Information and Transition event management ° Monitor, detection, ° Compliance Management Response ° Change Management Workflow ° Centralised GRC Framework ° Centralised GRC Framework ° Security Information and Event Mgmt 7 ° Compliance Management Service Strategy & Service Design Technology Area Principles Topics Solutions 24 Service ° Accountability ° Enterprise Risk Management ° RSA Archer 83 Strategy ° Service Assurance ° Compliance Management ° RSA Archer 5 ° Dell EMC Isolated Recovery Solution (IRS) 9 ° Accountability ° Dell EMC VMAX SnapVX 35 ° Risk Mitigation ° Centralised GRC Framework ° Dell EMC VMAX FAST/FAST VP 24 ° Privacy by Design ° IT Risk Management ° Dell EMC Avamar ° Least Privilege 33 ° Automated data life-cycle management ° Dell EMC Networker ° Segregation of ° Compliance Management ° Dell EMC RecoverPoint 34 Service Duties ° Audit Management ° Dell EMC VPLEX 40 Design ° Need to Know ° Data Breach Workflow Management ° Dell EMC SC Compellent – Live Volume 42 ° Due Diligence ° Business Continuity Solution ° Dell EMC Data Domain (DD) 25 ° Compliance Assurance ° Resilient solutions to cyber-attack ° Dell EMC Data Protection Advisor (DPA ) 32 ° Privacy by Design ° Third parties governance ° Dell EMC Elastic Cloud Storage (ECS) 44 ° Chain of Custody ° Dell EMC Mozy 45 ° Dell EMC Spanning 8 ° VirtuStream Service Transition & Service Operation Technology Area Principles Topics Solutions 24 ° RSA Archer 40 ° Dell EMC Avamar 42 ° Awareness ° Dell EMC Networker Service ° Accountability ° Compliance Management ° Dell EMC Data Domain (DD) Transition ° Due Diligence ° Change Management Workflow ° Dell EMC Data Protection Advisor (DPA) ° Service Assurance ° Dell EMC Tape Remediation ° Dell EMC Elastic Cloud Storage (ECS) ° VirtuStream 30 ° RSA Archer 33 ° Accountability ° Identity & Access Management ° RSA NetWitness 34 ° Due diligence ° Incident & Breach Management ° Dell EMC Data Protection Advisor (DPA) ° Dell EMC Elastic Cloud Storage (ECS) 12 Service ° Least Privilege ° Security Information and event Operation management ° Segregation of ° Dell EMC SourceOne 18 Duties ° Monitor, Detection, Response ° Dell EMC DP Search 20 ° Need to Know ° Centralised GRC Framework ° Dell EMC Mozy 921 ° Dell EMC Isilon Search Soluzioni Prodotti & Tecnologie DellEMC per il GDPR Obiettivi Perchè i clienti hanno bisogno di una strategia di BC / DR Spiegare possibilità, capacità e scelte Comprendere BC e DR da un punto di vista tecnologico Descrivere le principali soluzioni DellEMC per la BC ed il DR 11 Business Continuity e Disaster Recovery: fattori decisionali Considerazioni Considerazioni Di Business Tecniche Consistency Cost and Recovery Functionality, Capacity Availability Recovery-Time Bandwidth Objectives Recovery-Point Performance Objectives PRIMARY DECISION DRIVERS 12 Una differenza chiave Comprendere bene la differenza tra Disaster Recovery (DR) e Business Continuity (BC) • Disaster Recovery: Ripristinare le operazioni IT a seguito di un “site failure” • Business Continuity: Ridurre, fino ad eliminarli, i “downtime” applicativi 13 L’impatto della Business Continuity Productivity Impact Revenue Impact • Employees affected • Direct + Indirect losses • Email ! • Compensatory payments • Systems • Lost future revenue Brand Impact Financial Impact • Customers • Revenue recognition • Suppliers • Cash flow • Financial markets • Banks • Business partners • The Media 14 Dell EMC Data Protection Continuum Disponibilità, Replica, Backup & Archiviazione Un portafoglio completo per venire incontro a qualsiasi esigenza di “data protection” Availability Replication Snapshot Backup Archive Zero Seconds Minutes Hours 15 Protezione dei Dati ovunque Modelli di Private / Public consumo Converged On-Prem Virtualized Infrastructure Cloud Dove RTO & RPO vuoi Continuous Replication Snaps Backup Archive Encryption Isolated Recovery Availability Il meglio del Convergente Software Defined As-a-Service Multi-Cloud meglio Come APP vuoi 16 DellEMC Storage Integrated Offerings SC Family Unity Family XtremIO Family VMAX AF Family COMMON TOOLS FOR MANAGEMENT, MOBILITY & PROTECTION
Recommended publications
  • Scalable Dell Emc Isilon Storage Solutions with Dell Emc Open Network Fabrics
    Solution Brief SCALABLE DELL EMC ISILON STORAGE SOLUTIONS WITH DELL EMC OPEN NETWORK FABRICS Building a Data Center network in the industry verticals like Media & Entertainment or Industry Horizontals like big data with best-in-breed solutions that can scale for today’s workloads and can easily scale up for tomorrow’s increased demands? Dell EMC’s Open Networking Switching Fabrics and Dell EMC’s Isilon’s scale-out storage can offer you the right solution. The aggressive growth of social media and other industrial data demands high performance access, delivery, and response time to remain competitive in today’s business marketplace. Dell EMC Open Networking Switching Fabrics and Dell EMC On Demand Scalability Isilon NAS are driving products To remain competitive, the modern data center requires the capability to dynamically grow and solutions by offering a and shrink based on business requirements. While idle and unused resources lead to wasted well-engineered storage domain expenses, overused and saturated resources lead to performance degradation and even that can deliver both operational service outages. Together, Dell EMC Open Networking Switching Fabrics and Dell EMC Isilon and infrastructure efficiencies NAS provide an intelligent and capable architecture that can scale on demand to increase the that were previously unavailable. efficiency of the data center. Scalable and seamless access, A scalable data center network must be able to provide for increased storage traffic or new reliability, simple management, devices without impacting current systems. Dell EMC Open Networking Switching Fabrics and performance provide an address this challenge by providing the following to customers: operational advantage to end users and administrators, while • A portfolio of high-density, line rate, switching platforms with a consistent operating better utilization of existing model across platforms.
    [Show full text]
  • Storage Resource Monitor Informes Y Análisis De Administración De Recursos De Almacenamiento
    HOJA DE DATOS Storage Resource Monitor Informes y análisis de administración de recursos de almacenamiento Obtenga visibilidad completa del desempeño y la capacidad de su PRUÉBELO GRATIS entorno de almacenamiento heterogéneo con el monitoreo y los informes de almacenamiento de NAS y SAN sin agentes. Vea su entorno de 30 días, versión completa almacenamiento, incluidos los volúmenes, grupos RAID, conjuntos de almacenamiento, discos, etc. Amplíe el monitoreo e informes de SolarWinds® Server & Application Monitor (SAM) y Virtualization Manager (VMAN) hasta el nivel de dispositivo mediante la integración con Storage Resource Manager Orion® Platform. FUNCIONES • Monitoreo del desempeño del almacenamiento y detección de puntos calientes • Visualización del estado de hardware y los arreglos de almacenamiento • Planificación de la capacidad de almacenamiento con vistas históricas y previstas • Alertas e informes predefinidos y personalizados • Vistas detalladas de la capacidad y el desempeño de controladores, arreglos, capacidad LUN y desempeño página 1 HOJA DE DATOS: STORAGE RESOURCE MONITOR VISIBILIDAD INTEGRAL DE LA PILA DE APLICACIONES Utilice Storage Resource Monitor (SRM) para acceder a los paneles de AppStack™ y PerfStack™ y lograr una visibilidad integral del desempeño de las aplicaciones e infraestructuras, incluidos sus recursos de almacenamiento. AppStack se diseñó para detectar problemas de desempeño de las aplicaciones y permitirle determinar rápidamente la causa, sea de la infraestructura de servidores, virtual o de almacenamiento. Puede evaluar rápidamente el estado de todo su entorno y detectar y solucionar problemas específicos e interrelacionados, todo desde una sola vista. PerfStack presenta mediciones y datos de desempeño en las diversas pilas de todos sus arreglos de almacenamiento, virtualización, aplicaciones, sistemas y sistemas de red a lo largo del tiempo.
    [Show full text]
  • CLOUDIQ DETAILED REVIEW a Proactive Monitoring and Analytics Application for Dell EMC™ Storage Systems
    CLOUDIQ DETAILED REVIEW A Proactive Monitoring and Analytics Application for Dell EMC™ Storage Systems Efficiency Flash Health Scores Performance Notifications ABSTRACT This white paper introduces Dell EMC™ CloudIQ, a free, cloud-native application that lets you easily monitor, analyze, and troubleshoot your Dell EMC Unity, SC Series, XtremIO, and PowerMax/VMAX systems from anywhere and at any time. This paper provides a detailed description of how to use CloudIQ to proactively monitor and troubleshoot Dell EMC storage systems. January 2019 1 The information in this publication is provided “as is.” Dell Inc. makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any software described in this publication requires an applicable software license. Copyright © 2018 Dell Inc. or its subsidiaries. All Rights Reserved. Dell EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners. Published in the USA [1/2019] [White Paper] [H15691.4] Dell EMC believes the information in this document is accurate as of its publication date. The information is subject to change without notice. TABLE OF CONTENTS EXECUTIVE SUMMARY ...........................................................................................................5 Audience ..........................................................................................................................................
    [Show full text]
  • Dell Emc Unity Hybrid Storage
    SPECIFICATION SHEET DELL EMC UNITY HYBRID STORAGE The ultimate in simplicity & unifieD flash value The Dell EMC Unity™ HybriD-Flash proDuct line sets new stanDarDs for storage with compelling simplicity, moDern design, flexible deployments and affordable prices– to meet the neeDs of resource-constraineD IT professionals in large or small companies. If you are looking for rich features anD absolute simplicity in a small footprint, if you are cost-conscious anD need the best from the best, Dell EMC Unity HybriD Flash is for you. DesigneD for flash with rich Data services, it delivers flash performance with the cost advantage of disk. Architecture BaseD on the powerful new family of Intel E5-2600 processors, Dell EMC Unity HybriD storage systems implement an integrateD architecture for block, file, anD VMware VVols with concurrent support for native NAS, iSCSI, anD Fibre Channel protocols. Each system leverages Dual storage processors, full 12 Gb SAS back end connectivity and Dell EMC’s patenteD multicore architecteD operating environment to Deliver unparalleleD performance & efficiency. AdDitional storage capacity is aDDeD via Disk Array Enclosures (DAEs) and for additional performance, online controller upgrades are available. Physical Specifications 300 400 500 600 Min/Max Drives 5/150 5/250 5/500 5/1000 Array Enclosure There are 2 versions: A 2U Disk Processor Enclosure (DPE) with twenty five 2.5” drives and a 2U Disk Processor Enclosure with twelve 3.5” Drives. Drive Enclosure (DAE - All moDels support 2U twenty five drive trays for 2.5” drives, 3U fifteen drive trays for 3.5” drives, anD 3U eighty drive Disk Array Enclosure) trays for 2.5” drives Dell EMC Unity systems are powereD by 2 power supplies (PS) per DPE/DAE.
    [Show full text]
  • Dell EMC E20-393 Exam Dell EMC Implementation Engineer, Unity Solutions Specialist Exam
    Dell EMC E20-393 Exam Dell EMC Implementation Engineer, Unity Solutions Specialist Exam Questions & Answers Demo Questions & Answers PDF Page 2 Version: 13.0 Question: 1 A storage administrator has requested a recommendation on upgrading their VNX5600 to a comparable Unity storage array. The solution requires a maximum capacity of 3.5 PB. To meet the administrator's requirement without over provisioning the capacity, which Unity Hybrid storage array is recommended? A. Unity 300 B. Unity 400 C. Unity 500 D. Unity 600 Answer: D Explanation: Unity 600 delivers 1.2 TB to 3.0 PB max raw capacity. Question: 2 What is the minimum VMware Hypervisor version a server must be running in order to support the deployment of a UnityVSA system? A. 4.0 B. 5.0 C. 5.5 D. 6.0 Answer: C Explanation: UnityVSA requirements include: VMWare ESXi 5.x, 6.x References: https://sweden.emc.com/products-solutions/trial-software-download/unity- vsa.htm Question: 3 Questions & Answers PDF Page 3 Which feature is supported on a UnityVSA operating environment? A. Asynchronous Replication B. MCC Write Caching C. Quick Start Pool Provisioning D. Data at Rest Encryption Answer: A Explanation: Asynchronous Unified Replication is available natively on UnityVSA. This allows file and block resources to be replicated between UnityVSA systems, between UnityVSA and physical Unity systems, and also locally back to the same UnityVSA system Question: 4 A storage administrator is creating a host profile in Unisphere to provide host access to block storage resources using the iSCSI protocol. The host initiators were not automatically discovered and must be manually added.
    [Show full text]
  • Dell EMC Unity: Data at Rest Encryption a Detailed Review
    Technical White Paper Dell EMC Unity: Data at Rest Encryption A Detailed Review Abstract This white paper explains the Data at Rest Encryption feature, which provides controller-based encryption of data stored on Dell EMC™ Unity storage systems to protect against unauthorized access to lost or stolen drives or system. The encryption technology as well as its implementation on Dell EMC Unity storage systems are discussed. June 2021 H15090.6 Revisions Revisions Date Description May 2016 Initial release – Unity OE 4.0 July 2017 Updated for Unity OE 4.2 June 2021 Template and format updates. Updated for Unity OE 5.1 Acknowledgments Author: Ryan Poulin The information in this publication is provided “as is.” Dell Inc. makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any software described in this publication requires an applicable software license. This document may contain certain words that are not consistent with Dell's current language guidelines. Dell plans to update the document over subsequent future releases to revise these words accordingly. This document may contain language from third party content that is not under Dell's control and is not consistent with Dell's current guidelines for Dell's own content. When such third party content is updated by the relevant third parties, this document will be revised accordingly. Copyright © 2016-2021 Dell Inc. or its subsidiaries. All Rights Reserved. Dell Technologies, Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc.
    [Show full text]
  • Migrating to EMC Unity with SAN Copy
    MIGRATING TO DELL EMC UNITY WITH SAN COPY ABSTRACT This white paper explains how to migrate Block data from a CLARiiON® CX™ or VNX™ Series system to Dell EMC Unity™. This paper outlines how to use Dell EMC SAN Copy™ to easily perform the migration of Block devices, and includes simple, step-by-step instructions for the migration. October, 2017 WHITE PAPER The information in this publication is provided “as is.” Dell Inc. makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any software described in this publication requires an applicable software license. Copyright © 2016 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners. Published in the USA [12/16] [White Paper] [H15164.2] Dell EMC believes the information in this document is accurate as of its publication date. The information is subject to change without notice. 2 TABLE OF CONTENTS EXECUTIVE SUMMARY ...........................................................................................................4 Audience ........................................................................................................................................... 4 USING SAN COPY TO MIGRATE TO DELL EMC UNITY .......................................................4
    [Show full text]
  • Dell EMC Unity XT Product Brochure DELL EMC UNITY XT ALL-FLASH STORAGE
    Dell EMC Unity XT Product Brochure DELL EMC UNITY XT ALL-FLASH STORAGE No compromise midrange storage. Designed for performance, optimized for efficiency and built for multi-cloud. Unlock data capital with Dell EMC IDC predicts that by 2025, more than 163 zettabytes of data will be created in that one year alone challenging companies to not only effectively manage data on this massive scale but leverage it through analytics to turn it into data capital. Managing data at this scale has strong implications for IT infrastructure. Requirements around performance, capacity expansion, availability, and automation are all essential. The new Dell EMC Unity XT meets these challenges today and innovation will continue to take customers to new heights in the future. If you are looking for raw all flash power, great efficiency, and absolute simplicity in a small footprint, then Dell EMC Unity XT All-Flash Storage is for you. Designed and optimized for all-flash, these new and modern hardware platforms deliver 2X more performance and a fraction of the latency than previous generations making them a perfect fit for running your business applications wherever they are located and getting ahead of your IT transformation. Designed for performance and Flash design optimized for efficiency Dell EMC Unity XT All Flash Storage starts in a sleek 2U form factor with a modern architecture designed Engineered from the ground-up to meet market for all-flash performance. The design includes linear demands for all-flash performance, efficiency and multicore scaling, inline data reduction with zero lifecycle simplicity, Dell EMC Unity XT All-Flash detect for block and file, zero impact drive firmware- Storage Arrays are NVMe-ready, implement a based garbage collection, write coalescing minimizing dual active architecture, contain dual socket Intel IO, and intelligent wear leveling capabilities, high processors with up to 16-cores and more system density SSD’s including 15.3TB 3D NAND TLC drives.
    [Show full text]
  • Dell EMC Ready Systems for Splunk Solution Overview
    Dell EMC Ready Systems for Splunk Harness machine data with simplified deployment of optimized solutions that you can upgrade and scale with ease Table of Contents Data, data everywhere… . 2 Leverage a system built for Splunk . 2 . Do any of these challenges sound familiar? . 3 Top Splunk use cases . 4 Dell EMC Ready Systems for Splunk . 5. Dell EMC Ready System for Splunk on VxRail technical specifications . 5 Dell EMC Ready System for Splunk on VxRack System FLEX technical specifications . 6. Why Dell EMC? . 7 . Why Splunk? . 7 Services and financing . 8 Dell EMC Professional Services . 8 . Dell EMC Financial Services . 8. Take the next steps toward harnessing more data . 8. Solution overview Solution overview Data, data everywhere… Machine data is one of the fastest-growing and most complex areas of data . It also contains a definitive record of events that can reveal information about user transactions, customer behavior, machine behavior, security threats, fraudulent activity and more . Making use of this data, however, presents real challenges . Traditional data analysis, management and monitoring solutions are not engineered to handle this high-volume, high-velocity and highly diverse data . Splunk® Enterprise is an industry-leading software for machine data analytics . It’s the easy, fast and secure way to search, analyze and visualize the massive streams of machine data generated by your IT systems and technology infrastructure — physical, virtual and in the cloud — helping you deliver real-time visibility across the entire business . But many organizations find it complex and time-consuming to design, architect, test and validate hardware configurations for Splunk .
    [Show full text]
  • Modern Infrastructure for Dummies®, Dell EMC #Getmodern Special Edition
    Modern Infrastructure Dell EMC #GetModern Special Edition by Lawrence C. Miller These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. Modern Infrastructure For Dummies®, Dell EMC #GetModern Special Edition Published by: John Wiley & Sons Singapore Pte Ltd., 1 Fusionopolis Walk, #07-01 Solaris South Tower, Singapore 138628, www.wiley.com © 2017 by John Wiley & Sons Singapore Pte Ltd. Registered Office John Wiley & Sons Singapore Pte Ltd., 1 Fusionopolis Walk, #07-01 Solaris South Tower, Singapore 138628 All rights reserved No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted by the Copyright Act of Singapore 1987, without the prior written permission of the Publisher. For information about how to apply for permission to reuse the copyright material in this book, please see our website http://www.wiley.com/go/ permissions. Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. Dell EMC and the Dell EMC logo are registered trademarks of Dell EMC. All other trademarks are the property of their respective owners. John Wiley & Sons Singapore Pte Ltd., is not associated with any product or vendor mentioned in this book. LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: WHILE THE PUBLISHER AND AUTHOR HAVE USED THEIR BEST EFFORTS IN PREPARING THIS BOOK, THEY MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS BOOK AND SPECIFICALLY DISCLAIM ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
    [Show full text]
  • Connected Customers 2 2
    connected customerscare Dear reader ENTER >> 2 2 Dell EMC, a part of Dell Technologies, enables enterprises to reinvent their business through Digital Transformation. EXECUTIVE SUMMARY CHAPTER 1 - The hyper-connected customer CHAPTER 2 - The hyper-targeted customer CHAPTER 3 - The hyper-aware customer CHAPTER 4 - The hyper-protective customer ‘No man is an island.’ Nor is any system, organization or industry. The CONNECTED series dives into this new reality of ‘everything connected’. It gives you the latest insights on digital transformation. Also available: NEXT >> 4 3 EXECUTIVE SUMMARY OVERVIEW Customers have never been smarter. Businesses must be on the level. CHAPTER 1 CHAPTER 2 The way we interact has changed profoundly. This change has also altered us CHAPTER 3 as individuals and it has also transformed business. Today’s customer is a new breed, and businesses must find new and innovative ways to engage that customer. Even more changes lie in wait for us as the generation of digital natives matures and technology breakthroughs accelerate. CHAPTER 4 Business may not be able to prepare for the unknown, but they can learn from their customers and how to best serve them. It’s the age of the connected customer now, and we must adapt. ABOUT << PREVIOUS NEXT >> 6 The hyper age OVERVIEW The modern customer is: • Hyper-connected: never before have humans been connected with each other through so many devices • Hyper-targeted: with the amount of data available on each individual, it is possible to segment customers in CHAPTER 1 unprecedented detail • Hyper-aware: knowledge is only a click or tap away and the modern customer is acutely aware of the value they represent • Hyper-protective: customers want to safeguard their privacy and do not welcome intrusion CHAPTER 2 CHAPTER 3 C CHAPTER 4 90% ACCORDING TO RESEARCH, NINE IN TEN HOUSEHOLD BRANDS IN THE UNITED STATES HAVE CONSISTENTLY LOST CUSTOMER Dear reader LOYALTY SHARE OVER THE PAST 20 YEARS.
    [Show full text]
  • Dell EMC : Cloud Insights
    Dell EMC Cloud Insights NetApp September 24, 2021 This PDF was generated from https://docs.netapp.com/us- en/cloudinsights/task_dc_emc_datadomain.html on September 24, 2021. Always check docs.netapp.com for the latest. Table of Contents Dell EMC . 1 DELL EMC Data Domain data collector. 1 Configuring the EMC ECS data collector . 2 Dell EMC Isilon data collector . 3 Dell EMC PowerStore data collector . 4 Dell EMC RecoverPoint data collector . 6 DELL EMC ScaleIO data collector . 7 Configuring the EMC Unity data collector . 8 Dell EMC VMAX and PowerMax Family of Devices data collector . 9 Dell EMC VNX Block Storage (NaviCLI) data collector . 13 DELL EMC VNX File (formerly Celerra Unified Storage System) data collector . 15 Configuring the EMC VNX Unified data collector. 17 Configuring the EMC VPLEX data collector. 18 Dell EMC XtremeIO data collector . 20 Dell EMC DELL EMC Data Domain data collector This data collector gathers inventory and performance information from DELL EMC Data Domain deduplication storage systems. To configure this data collector, there are specific configuration instructions and usage recommendations you must follow. Terminology Cloud Insights acquires the following inventory information from the Data Domain data collector. For each asset type acquired by Cloud Insights, the most common terminology used for this asset is shown. When viewing or troubleshooting this data collector, keep the following terminology in mind: Vendor/Model Term Cloud Insights Term Disk Disk Array Storage FC Port Port File System Internal Volume Quota Quota NFS and CIFS share FileShare Note: These are common terminology mappings only and might not represent every case for this data colletor.
    [Show full text]