DELL EMC CLOUD DATA PROTECTION Software and Saas Solutions

Total Page:16

File Type:pdf, Size:1020Kb

DELL EMC CLOUD DATA PROTECTION Software and Saas Solutions GLOBAL SPONSORS Internal Use - Confidential Why Dell EMC for Data Protection Modernization and Transformation GLOBAL SPONSORS Data Protection Overview Agenda • Market, Requirements and what customers want • Dell EMC Data Protection Strategy • Dell EMC Data Protection Portfolio • Dell EMC Data Protection vs traditional & competing architectures • Isolated Recovery from a Cyber-attack Internal Use - Confidential “DATA FOG” Where is your How do you data and… protect it? DATA CENTERS OF DATA Internal Use - Confidential Today’s Data Protection Approach Only 1 in 4 customers have a single vendor approach…* * IDC 2017 Internal Use - Confidential Customers are telling us… Less specialization of skills SDDC for agility Cloud and As-a-Service Stream based backup does Offerings Prevalent not meet scale needs Ease-of and Can not continue to linearly Time-to Critical grow teams Internal Use - Confidential Data Protection must EVOLVE Transform Modernize TRADITIONAL .NEXT IT INVESTMENT $ INVESTMENT IT 2000 2030 Automate Everywhere it Makes Sense Internal Use - Confidential Dell EMC Data Protection TRANSFORM PEOPLE PROCESS CLOUD PEOPLE PROCESS CLOUD PEOPLE PROCESS CLOUD & Automate PHYSICAL VIRTUAL NEXT GEN ENTERPRISE APPS HYPERVISOR BIG DATA APPS MODERNIZE & Automate HARDWARE & SOFTWARE HARDWARE & SOFTWARE HARDWARE & SOFTWARE Internal Use - Confidential MODERNIZE, TRANSFORM and AUTOMATE DATA PROTECTION with Dell EMC Data Protection Portfolio Protection and recovery for cloud PROTECTION PROTECTION PROTECTION STORAGE SOFTWARE APPLIANCE Internal Use - ConfidentialBest of breed Integrated Why Dell EMC Protection Storage Protect more data End-to-end data Integrates with Natively tier deduplicated faster with industry verification, fault leading backup, data to the cloud for leading speed and detection, and self archiving, enterprise modern long-term scale healing applications and big retention data applications or Reduce storage directly with primary Deliver data protection as required by 10–30x storage a service with logical data isolation Deploy protection storage however you want it Internal Use - Confidential Dell EMC Data Protection Software Protection and Continuity Based on Data Value and Business Objectives Availability Replication Snapshot Backup Archive VPLEX Internal Use - Confidential Why Dell EMC Protection Software Delivers protection across the Industry’s tightest integration Automated provisioning and data protection continuum with Data Domain, yielding scaling deduplication rates nearly 4x Spans physical, virtual, hybrid that of our competitors Search and analytics and public cloud environments - Reduces backup storage by Hypervisor integration enables Data Protection of Hyper up to 38x data protection through native Converged/Converged interfaces - Reduces network traffic by Provides complete protection up to 99% Application and data owners for cloud-based data and are empowered to protect applications - Reduces backup times by their mission-critical up to 50% information Internal Use - Confidential DELL EMC CLOUD DATA PROTECTION Software and SaaS Solutions PRIVATE EXTEND IN-CLOUD CLOUD TO CLOUD PROTECTION Protect Your Data Across the Entire Cloud Protection Continuum Internal Use - Confidential “Dell EMC reduces monthly in-cloud data DELL EMC CLOUD DATA PROTECTION protection costs by 50%.” Software and SaaS Solutions ESG PRIVATE EXTEND IN-CLOUD CLOUD TO CLOUD PROTECTION Software Defined Backup to Cloud In Cloud Protection Storage Data Protection APIs Long Term Retention to Cloud VMware Cloud on AWS Automation Orchestration Disaster Recovery to Cloud Amazon Turn Key Cloud Integration Desktop / Laptop to Cloud Azure Private Hosted 3rd Site Internal Use - Confidential Extend to the cloud with Mozy by Dell Endpoint protection in the cloud • Mozy by Dell – MozyPro for SMB – MozyEnterprise for large businesses • Desktop/laptop backup, file sync, and mobile access – Windows, Mac, Linux clients • Protection for small server workloads – Particularly suitable for remote and branch offices • Cybercrime protection – A second line of defense against ransomware and other forms of malware • Backup-as-a-Service – Requires no capital expenditures for hardware Internal Use - Confidential INTRODUCING-Better Together Integrated Data Protection Appliance Innovation without compromise Converged and High-value and Comprehensive Low-TCO 10X Fast and Avg 55:1 Faster Time to Protect Modern Deduplication 20% Faster Internal Use - Confidential IDPA - Maximum choice and flexibility Available NOW!! LARGE ENTERPRISE MIDSIZE ENTERPRISE DP5300 DP5800 DP8300 DP8800 BACKUP INGEST 24 TB/hr 32 TB/hr 41 TB/hr 68 TB/hr 1.4 to 14.4 PB1 1.9 to 36 PB1 6.2 to 50 PB1 LOGICAL CAPACITY 340 TB to 6.5 PB1 4.2 to 43.2 PB2 5.7 to 108 PB2 18.6 to 150 PB2 144 to 288 TBu1 192 to 720TBu1 624 TBu to 1 PBu1 USABLE CAPACITY 34 to 130 TBu1 Up to 864 TBu2 Up to 2.16 PBu2 Up to 3 PBu2 1 2 Internal Use - ConfidentialTotal capacity on active tier only Total capacity with cloud tiering add-on for long-term retention Key Technology Differentiation Choice and Flexibility SW Defined or PBBA Native Application 67% PBBA Share Integration Industry-leading data Architecture Matters reduction PROTECTION PROTECTION PROTECTION STORAGE SOFTWARE APPLIANCE Proven: Over 73,000 Over 21,000 Data Data Domain Units on Protection Software Support Customers Cloud-enabled where Internal Use - Confidential you need it Other VMware Data Protection Alternatives Traditional Hardware and Software Model Initial Attempts At HW & SW Bundled Solutions Policy Policy Management Management Data Movers Network Network Networking Network Protection Storage Internal Use - Confidential Other VMware Data Protection Alternatives Traditional Hardware and Software Model Initial Attempts At HW & SW Bundled Solutions Policy Policy Management Management Data Movers Network Network Networking Network NO AUTOMATION Protection Storage Not SDDC ready • Complex, expensive to scale • Slower backups and recoveries Internal Use - Confidential Dell EMC Modern VMware Data Protection Architecture Matters Virtual Machines Virtual Proxies Automation across the entire data protection stack Networking Protection Storage Internal Use - Confidential Nature of the Cyber Attacks On The Rise • All industries and organizations are vulnerable • No system is 100% secure. Understanding the threats you face will help you improve your preparedness. • The attacks are getting more sophisticated • Insider access is a contributing factor in 25% of the cases • The majority of attackers are still entering via email Internal Use - Confidential Isolated Recovery – Dell EMC Data Domain ISOLATED RECOVERY VAULT • Create backup of data Backup • No management App Hosts connectivity to IR Vault DD Replication • Enable data link and Recovery replicate to isolated system Test Hosts • Complete replication and Air Gap disable data link Management Host • Maintain WORM locked Primary Storage Backup Appliance Isolated Recovery restore points System • Optional security analytics on data at rest • Professional Services Internal Use - Confidential Resiliency Consulting Services Well Run Data Protection • Transformation Program including Backup and Archive • Blueprint for Backup Architecture Isolated Recovery Advisory and Implementation • Cyber Risk / Application of NIST Recovery IT Continuity Services • Disaster Recovery / Business Continuity • Continuous Application Availability Resiliency Program Management Why Dell EMC? Where we’ve done it: Depth of experience & proven outcomes Major US-based Airline Mature, robust methodology Worldwide Distribution Company Full spectrum of services Energy services Internal Use - Confidential Aligned to industry standards Large Regional Bank How Are You Going to Back that Up? Deduplicated App Integrated Storage Integrated Software Defined Cloud Integrated Hyper Converged Internal Use - Confidential .
Recommended publications
  • EMC Symmetrix Is “Enterprise Proven”  Gold Standard Remote Replication with SRDF  Performance Leadership Including Flash Drives
    Storage Solutions for Enterprise Consolidation with VMware Peter C. Conway Vice President – Business & Product Operations Symmetrix Product Group EMC Agenda • Overview • Business Continuity • Customer Case Study • Scalable Performance • Customer Case Study • Scaling VMware VDI 22 EMC’s Storage 2008 Portfolio CLARiiON CX4 UltraScale Series DMX-4 950 Symmetrix CX4-960 NS80 NSX Flash drives Celerra CX4 CX4-240 CX4-480 -120 Flash NS40 drives Flash NS40G drives NS20 Fiber Channel and iSCSI NS80G DMX-4 NAS, FC, & iSCSI AX4 Virtual Provisioning EMC ControlCenter Consumer Storage SMC Navisphere Celerra Manager Connectrix SAN Connectivity Smarts PowerPath MPFSi RecoverPoint LifeLine SRDF TimeFinder MirrorView SnapView Mozy Remote Backup Replication Manager Replistor Xtender Family Powered by EMC Fortress RecoverPoint NetWorker Avamar CDP and CRR DLm DL4106 4080 DL4206 Software-as- a-Service (SaaS) DL3D 3000 Invista 2.0 DL210 DL3D SAN Virtualization Centera 1500 EMC Centera Rainfinity Gen 4 LP Node DL4406 Rainfinity Global File Virtualization EMC Disk Library 33 Enterprise Customers Prefer Storage Area Networks* SANs remain the preferred platform for virtualized environments by 2:1 margin and growing • - 12 Months: 43% SAN Favorable vs. 29% for NAS • Today: 46% SAN Favorable vs. 25% for NAS • +12 Months: 59% SAN Favorable vs. 24% for NAS “EMC remains well ahead of the pack as the most preferred storage vendor in virtualized environments, with IBM a distant second.” *Goldman Sachs, IT Spending Survey , 08 September 2008- p. 11 44 Enterprise
    [Show full text]
  • Commvault Backup Appliance with Netapp a Powerful Combination of Commvault Simpana® Software and Netapp E-Series Storage
    CommVault Backup Appliance with NetApp A powerful combination of CommVault Simpana® software and NetApp E-Series storage Two leaders in data protection software and hardware have partnered to bring you a best-of-breed solution that closes the scalability, flexibility and manageability gaps in current offerings. You get powerful scalability • Plug-and-play scaling for capacity and compute power • Scale without reconfiguration • Software AND hardware resiliency • Rapid restores across simultaneous jobs You get broad flexibility • Choose a single appliance for smaller environments • Deploy multiple appliances for medium to large environments • Improve performance and resiliency through load balancing You get simple, comprehensive management • Central management, reporting and software deployment • Self-service access • Integration with NetApp E-Series node management COMMVAULT.COM | 888.746.3849 | [email protected] © 2015 COMMVAULT SYSTEMS, INC. ALL RIGHTS RESERVED. Two industry leaders. One truly integrated solution. COMMVAULT EMC AVAMAR/ SYMANTEC NETBACKUP FEATURE BENEFIT SIMPANA DATA DOMAIN APPLIANCES VM LIFECYCLE Manage the complete Y PARTIAL PARTIAL MANAGEMENT VM lifecycle from provisioning and monitoring to backup and replication to VM archiving and retirement DEDUPLICATION Inexpensively delivers Y PARTIAL N RESILIENCY WITH software load balancing PARALLEL and resiliency to DEDUPLICATION complement hardware availability SIMPANA ONEPASS™ Saves time, money Y N N SINGLE PASS BACKUP, and resources FILE ARCHIVING AND REPORTING ENDPOINT
    [Show full text]
  • Unityvsa Installation and Theory of Operation. Copyright ©2016 EMC
    Welcome to UnityVSA Installation and Theory of Operation. Copyright ©2016 EMC Corporation. All Rights Reserved. Published in the USA. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. The trademarks, logos, and service marks (collectively "Trademarks") appearing in this publication are the property of EMC Corporation and other parties. Nothing contained in this publication should be construed as granting any license or right to use any Trademark without the prior written permission of the party that owns the Trademark. EMC, EMC², the EMC logo, AccessAnywhere Access Logix, AdvantEdge, AlphaStor, AppSync ApplicationXtender, ArchiveXtender, Atmos, Authentica, Authentic Problems, Automated Resource Manager, AutoStart, AutoSwap, AVALONidm, Avamar, Aveksa, Bus-Tech, Captiva, Catalog Solution, C-Clip, Celerra, Celerra Replicator, Centera, CenterStage, CentraStar, EMC CertTracker. CIO Connect, ClaimPack, ClaimsEditor, Claralert ,cLARiiON, ClientPak, CloudArray, Codebook Correlation Technology, Common Information Model, Compuset, Compute Anywhere, Configuration
    [Show full text]
  • The Illusion of Space and the Science of Data Compression And
    The Illusion of Space and the Science of Data Compression and Deduplication Bruce Yellin EMC Proven Professional Knowledge Sharing 2010 Bruce Yellin Advisory Technology Consultant EMC Corporation [email protected] Table of Contents What Was Old Is New Again ......................................................................................................... 4 The Business Benefits of Saving Space ....................................................................................... 6 Data Compression Strategies ....................................................................................................... 9 Data Compression Basics ....................................................................................................... 10 Compression Bakeoff .............................................................................................................. 13 Data Deduplication Strategies .................................................................................................... 16 Deduplication - Theory of Operation ....................................................................................... 16 File Level Deduplication - Single Instance Storage ................................................................. 21 Fixed-Block Deduplication ....................................................................................................... 23 Variable-Block Deduplication .................................................................................................. 24 Content-Aware Deduplication
    [Show full text]
  • Benefits & Requirements
    Solution Provider FY2018 Track Benefits & Requirements North America – Canada The information contained in this presentation is proprietary and considered Dell EMC Confidential information. THIS INFORMATION IS BEING PRESENTED FOR INFORMATIONAL PURPOSES ONLY AND ADDITIONAL TERMS AND CONDITIONS APPLY TO YOUR PARTICIPATION IN ANY OF THE PROGRAMS PRESENTED HEREIN. Dell EMC reserves the right to modify the terms of the Program and/or eligibility requirements applicable to the Program at any time or to terminate the Program at any time at its sole discretion. THESE MATERIALS MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED AS IS, WITHOUT EXPRESS OR IMPLIED WARRANTIES OR GAURANTEES OF ANY KIND. © Copyright 2017 Dell Inc. or its subsidiaries. All rights reserved. Strictly Confidential – Not for Distribution FY2018 Benefits & Requirements Introduction The Requirements and Benefits document provides Solution Providers a framework for understanding the rebates and tier requirements of the Dell EMC Partner Program. The program’s financial framework ensures a predictable and profitable experience so you can focus on driving richer and deeper engagements with your customers. Partner Program Regional Segmentation To best serve local markets, program requirements & benefits are based on four geographic regions. North America ZONE 1 ZONE 2 North America EMEA • USA • Canada This guide is focused on North America Zone 2 EMEA ZONE 1 ZONE 2 APJ • France • Rest of EMEA • UK • Germany Latin America ZONE 1 ZONE 2 • Brazil • Rest of LatAm APJ ZONE 1 ZONE 2 LatAm • Japan • Rest of APJ • ANZ (excluding China, Hong Kong and Taiwan) © Copyright 2017 Dell Inc. or its subsidiaries. All rights reserved.
    [Show full text]
  • EMC Storage Platforms
    EMC Platforms Innovations 2008 Flash , De-Dup, Green , Cloud and more…. Erez Etzyon SMB & Commercail Presale Manager © Copyright 2008 EMC Corporation. All rights reserved. 1 Last Year we Talked About… Thin Provisioning De-duplication VMware Affinity Storage Tiering Energy Efficiency Information Security Consumer Storage Cloud Computing © Copyright 2008 EMC Corporation. All rights reserved. 2 And We Delivered…. ;Thin Provisioning – Available Across All Storage Platforms ;De-duplication – DL3D 1500 & 3000, DL3D 4000 ;VMware Affinity – SRM support, VDI Solutions, Avamar Virtual Ed. ;Storage Tiering – Flash Drives, 1TB SATA Disks ;Energy Efficiency – Spin Down, Adaptive Cooling, LP SATA ;Information Security – PowerPath Encryption, enVision Integration ;Consumer Storage – EMC LifeLine, Mozy, Iomega ;Cloud Computing – EMC Atmos © Copyright 2008 EMC Corporation. All rights reserved. 3 EMC’s Storage Portfolio CLARiiON CX4 UltraScale Series DMX-4 950 Symmetrix CX4-960 NS80 NSX Flash drives CX4 CX4-240 CX4-480 NEW Celerra -120 NEW Flash NS40 drives NEW Flash NS40G drives NS20 Fibre Channel and iSCSI NS80G Virtual Provisioning NEW DMX-4 AX4 NAS, FC, & iSCSI EMC ControlCenter Consumer Storage NEW SMC z Navisphere z Celerra Manager NEW Connectrix SAN Connectivity Smarts z PowerPath z MPFSi z RecoverPoint LifeLine SRDF z TimeFinder z MirrorView z SnapView Mozy Remote Backup z z Powered by EMC Fortress Replication Manager Replistor Xtender Family NEW RecoverPoint CDP and CRR NetWorker z Avamar NEW DLm Gen-2 DL3D Software-as- DL4106 4080 DL4206 DL4406 a-Service (SaaS) Data Store 3000 Invista 2.0 NEW SAN Virtualization NEW DL3D Centera 1500 NEW EMC Centera NEW Rainfinity Gen 4 LP Node NEW Rainfinity Global NEW File Virtualization Avamar EMC Disk Library © Copyright 2008 EMC Corporation.
    [Show full text]
  • Best Practices in Data Center Transformation, Into the Next Century
    riding the clouds - best practices in data center transformation, into the next century and beyond EMC Proven Professional Knowledge Sharing 2011 Paul Brant EMC Corporation [email protected] 2011 EMC Proven Professional Knowledge Sharing 2 Table of Contents Table of Figures................................................................................................. 10 Table of Equations ............................................................................................ 12 Abstract .............................................................................................................. 13 Introduction ....................................................................................................... 15 The need for Preservation in the Cloud/Next Generation Data Center ....................... 17 The ascent of the Computer in the Cloud/Next Generation Data Center .................... 18 The ascent of Data Longevity in the Cloud/Next Generation Data Center .................. 19 The ascent of Virtualization in the Cloud/Next Generation Data Center ..................... 21 The ascent of the Appliance in the Cloud/Next-Generation Data Center .................... 25 The ascent of the Intercloud – AKA Interconnected Global Connectivity .................... 26 The ascent of the Personal Data Store in the Cloud/Next-Generation Data Center .... 27 The Personal Information Management Ecosystem ................................................ 31 The Drivers for the Next-Generation Data Center .....................................................
    [Show full text]
  • Prodeploy Service Description Enterprise
    Service Description Dell ProDeploy Enterprise Suite: ProDeploy for Enterprise Introduction This document outlines the Service Description (“Service Description”) for ProDeploy for Enterprise (the “Service” or “Services”). This Service is part of Dell’s ProDeploy Enterprise Suite (“ProDeploy Suite”) which is available in multiple tiers: Basic Deployment, ProDeploy, and ProDeploy Plus (the “Service Tier” individually or the “Service Tiers” collectively). Enterprise solutions may include but are not limited to hardware platforms such as servers, storage, networking, and modular platforms (the “Hardware Platform”) as well as associated enterprise software and hardware additions, upgrades, or data management (“Supplemental Deployment Services”). Dell is pleased to provide this Service in accordance with this Service Description. Your quote, order form or other mutually-agreed upon form of invoice or order acknowledgment (as applicable, the “Order Form”) will include the name of the Service(s) and available service options that you purchased. For additional assistance or to request a copy of your service contract(s), contact Dell Technical Support or your sales representative. Table of Contents ProDeploy Scope of Service ................................................................................................................................... 2 Service Features.................................................................................................................................................... 3 Offer Structure ......................................................................................................................................................
    [Show full text]
  • Evento GDPR@SMS Engineering
    GDPR Soluzioni Dell EMC per Abilitare la Trasformazione Workshop March 2017 Giovanni Pisegna Cerone – Dell EMC Sr Solution Principal Napoli, 8 Novembre 2017 GDPR introduction |The basics «The General Data Protection Regulation (GDPR) is a new law In short… which estabilishes a single set of rules for every EU Member State to protect personal data. It builds upon and updates the current EU data protection framework » Effective date «It will come into force on 25 May 2018 » 2 GDPR introduction |The main driver to comply is… … the fine ! If a company fails to comply with GDPR, the Supervisory Authority can issue: ‒ Warnings, reprimands, suspension on data transfer, bans on processing and order to correct infringement ‒ Substantial fines of up to: 10 million Euros 20 million Euros or or 2% of Total Global Annual OR 4% of Total Global Annual Turnover Turnover (whichever is great) (whichever is great) 3 GDPR introduction |Principles Company is responsible for understanding its exposure level Several rights – i.e. right and take appropriate actions – to be forgotten, right to Risk Management approach change provider, right to Rights of be informed, … the Data Accountability Subject Principle Data Protection requirements must be taken into account from Data processing must be the beginning of the Design based on the principle of Phase «lawfulness» Semplified Data protection Lawfulness of by design & by processing Processing Cycle default Based upon the Risk Management approach, for the Data Subjects must be «high-risk data processing» it Information Data notified within strict SLAs protection must be carried out a specific in case of data breaches to Data Subject Impact Risk Assessment activity – data breach workflow Assessment 4 GDPR introduction |Scope Genetic data Personal data (Sensitive personal data) are any information relating to are personal data relating to an identified or identifiable the inherited or acquired natural person (‘data subject’).
    [Show full text]
  • Lenovo® Iomega® Ix2
    Product Release Information LENOVO® IOMEGA® IX2 NETWORK STORAGE 2-BAY DESCRIPTION Centrally store and backup your digital files The Lenovo® Iomega® ix2 Network Storage, 2-bay is a compact and affordable desktop network storage that is perfect for small businesses, home offices or advanced home networks, offering content sharing, data protection and basic video surveillance capabilities. Scheduled Availability: May 20 FEATURES Capacity: Up to 8TB*, 2x HDD PC backup with True Image Lite 2013 by Acronis - powerful backup software from Acronis protects Configurations: Diskless (ix2-dl, 0 HDD), Partially content, recovers data in case of any disasters Populated (1 x HDD) or Fully Populated (2 x HDD) (1 license included). Drive Capacities and Type: 1TB, 2TB, 3TB, 4TB* (SATA II) Public Cloud Backup: Use one of the integrated 3rd RAID Support: RAID 1 (mirror) with automatic RAID rebuild. party cloud-based storage services such as Amazon S3 or Mozy™ to replicate data from your ix2 to your public RAID 0 and JBOD mode also available. cloud account. Network File Protocols Supported: CIFS/SMB/Rally Data Replication / Device to Device Copy Jobs (Microsoft), NFS (Linux/UNIX), AFP/Bonjour (Apple), FTP, Easily copy files to and from attached USB drives or SFTP, TFTP, HTTP, HTTPS, WebDAV, Windows DFS, any network share including LenovoEMC™ Personal SNMP. Cloud locations using the rsync or CIFS protocol. Gigabit Ethernet connectivity Define your Copy Job to copy/synchronize files to and * Diskless unit with 2x4TB qualified HDDs from connected drives and/or any other shared storage on your network. Schedule jobs to run on a predetermined schedule.
    [Show full text]
  • EMC ACADEMIC ALLIANCE Educating Future IT Professionals Joachim Worf Senior Education Delivery Manager
    EMC ACADEMIC ALLIANCE Educating Future IT Professionals Joachim Worf http://education.emc.com/academicalliance Senior Education Delivery Manager © Copyright 2012 EMC Corporation. All rights reserved. 1 EMC Corporation… … is a global leader in enabling businesses and service providers to transform their operations and deliver information technology as a service (ITaaS). Through innovative products and services, EMC accelerates the journey to cloud computing, helping IT departments to store, manage, protect and analyze their most valuable asset— information —in a more agile, trusted and cost-efficient way 2011 At a Glance Revenues $20 billion Employees ~50,000 Countries where EMC does business >80 R&D Investment 11% of 2011 revenues Operating Cash Flow $5.7billion Free Cash Flow $4.4 billion Founded 1979 © Copyright 2012 EMC Corporation. All rights reserved. 2 Fast Growth Among Top 10 IT Product Companies Market Profit Rank Company Value (B) Rev Growth(YoY) Growth(YoY) 1 Microsoft 210 22.4% 48.4% 2 Cisco 120 27% 79% 3 IBM 161 2% 9.1% 4 Oracle 115 38.5% 25% 5 Intel 103 34.2% N/A 6 HP 94 11.9% 8% Superior Performance in both Rev & Profit 7 SAP 55 12.3% 15.5% growth 8 EMC 41 23.5% 107.7% 9 Dell 25 21.7% 15.5% 10 Symantec 11 0.1% 117.6% Source: Data as of Sept, 2010 from Yahoo Finance © Copyright 2012 EMC Corporation. All rights reserved. 3 Strategic Acquisitions EMC Strategic acquisitions: 2003–2010 • Expand and strengthen the core product offering • Expand Services expertise for Microsoft technologies Since 2003 approximately $11 billion
    [Show full text]
  • How Virtualization Is Key to Managing Risk: Vmware, Inc
    How Virtualization is Key to Managing Risk A Guide to Business Continuity and Disaster Recovery Introduction: Managing Risk in a Risky World Losses from unplanned downtime are tens of billions of dollars every year When Hurricane Sandy hit, businesses of all sizes suffered greatly. The insured losses are estimated at more than $20 billion, and the total economic damage at more than $50 billion. The aftermath of the deadly 2011 earthquake and tsunami in Japan was even more devastating, impacting 312,000 employees in 715 industries, according to a Dun & Bradstreet report.1 1 “2011 Impact Report of Japan Earthquake and Tsunami: Preliminary Business Impact Analysts for High Impact Areas of Japan.” Dun and Bradstreet 2012. Introduction (continued) Manmade disasters can be just as serious. Distributed denial of service (DDOS) attacks increased almost 20 percent in 2012 over 2011. Deliberate hacker attacks or malicious code that can bring down your systems also accelerated. Human errors such as construction projects that knock out power or network lines due to careless digging also increased over that same time period. Technology Adopters and the Cost of Downtime Did you know:2 $250,000 $212,100 • 90 percent of businesses surveyed say they’ve been hacked over $200,000 the past 12 months • 72 percent of known hacker incidents targeted companies with $161,000 $150,000 less than 100 employees $118,600 $115,700 • 40 percent of corporate cyberattacks hit companies with less than $110,000 $100,000 $98,000 $97,850 Jun-10 500 employees Feb-12 IT outages have, in aggregate, caused businesses to lose billions $60,000 $50,000 worldwide.
    [Show full text]