Data Protection and Management Lab Guide

Total Page:16

File Type:pdf, Size:1020Kb

Data Protection and Management Lab Guide Data Protection and Management Lab Guide <Month > 2016 EMC2 PROVEN PROFESSIONAL Copyright Copyright ©2016 EMC Corporation. All Rights Reserved. Published in the USA. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. The trademarks, logos, and service marks (collectively "Trademarks") appearing in this publication are the property of EMC Corporation and other parties. Nothing contained in this publication should be construed as granting any license or right to use any Trademark without the prior written permission of the party that owns the Trademark. EMC, EMC², the EMC logo, AccessAnywhere Access Logix, AdvantEdge, AlphaStor, AppSync ApplicationXtender, ArchiveXtender, Atmos, Authentica, Authentic Problems, Automated Resource Manager, AutoStart, AutoSwap, AVALONidm, Avamar, Aveksa, Bus- Tech, Captiva, Catalog Solution, C-Clip, Celerra, Celerra Replicator, Centera, CenterStage, CentraStar, EMC CertTracker. CIO Connect, ClaimPack, ClaimsEditor, Claralert ,CLARiiON, ClientPak, CloudArray, Codebook Correlation Technology, Common Information Model, Compuset, Compute Anywhere, Configuration Intelligence, Configuresoft, Connectrix, Constellation Computing, CoprHD, EMC ControlCenter, CopyCross, CopyPoint, CX, DataBridge , Data Protection Suite. Data Protection Advisor, DBClassify, DD Boost, Dantz, DatabaseXtender, Data Domain, Direct Matrix Architecture, DiskXtender, DiskXtender 2000, DLS ECO, Document Sciences, Documentum, DR Anywhere, DSSD, ECS, elnput, E-Lab, Elastic Cloud Storage, EmailXaminer, EmailXtender , EMC Centera, EMC ControlCenter, EMC LifeLine, EMCTV, Enginuity, EPFM. eRoom, Event Explorer, FAST, FarPoint, FirstPass, FLARE, FormWare, Geosynchrony, Global File Virtualization, Graphic Visualization, Greenplum, HighRoad, HomeBase, Illuminator , InfoArchive, InfoMover, Infoscape, Infra, InputAccel, InputAccel Express, Invista, Ionix, Isilon, ISIS,Kazeon, EMC LifeLine, Mainframe Appliance for Storage, Mainframe Data Library, Max Retriever, MCx, MediaStor , Metro, MetroPoint, MirrorView, Mozy, Multi-Band Deduplication,Navisphere, Netstorage, NetWitness, NetWorker, EMC OnCourse, OnRack, OpenScale, Petrocloud, PixTools, Powerlink, PowerPath, PowerSnap, ProSphere, ProtectEverywhere, ProtectPoint, EMC Proven, EMC Proven Professional, QuickScan, RAPIDPath, EMC RecoverPoint, Rainfinity, RepliCare, RepliStor, ResourcePak, Retrospect, RSA, the RSA logo, SafeLine, SAN Advisor, SAN Copy, SAN Manager, ScaleIO Smarts, Silver Trail, EMC Snap, SnapImage, SnapSure, SnapView, SourceOne, SRDF, EMC Storage Administrator, StorageScope, SupportMate, SymmAPI, SymmEnabler, Symmetrix, Symmetrix DMX, Symmetrix VMAX, TimeFinder, TwinStrata, UltraFlex, UltraPoint, UltraScale, Unisphere, Universal Data Consistency, Vblock, VCE. Velocity, Viewlets, ViPR, Virtual Matrix, Virtual Matrix Architecture, Virtual Provisioning, Virtualize Everything, Compromise Nothing, Virtuent, VMAX, VMAXe, VNX, VNXe, Voyence, VPLEX, VSAM-Assist, VSAM I/O PLUS, VSET, VSPEX, Watch4net, WebXtender, xPression, xPresso, Xtrem, XtremCache, XtremSF, XtremSW, XtremIO, YottaYotta, Zero-Friction Enterprise Storage. Revision Date: June 2016 Course Number: MR-1TP-DPM-1310 EMC2 PROVEN PROFFESSIONAL 2 Table of Contents COPYRIGHT ...................................................................................................................................................................... 2 LAB EXERCISE 1: DATA AVAILABILITY ................................................................................................................................ 4 LAB EXERCISE 2: DATA PROTECTION ARCHITECTURE ........................................................................................................ 5 LAB EXERCISE 3: FAULT TOLERANCE TECHNIQUES ............................................................................................................ 7 LAB EXERCISE 4: DATA BACKUP ........................................................................................................................................ 8 LAB EXERCISE 5: DATA DEDUPLICATION ......................................................................................................................... 10 LAB EXERCISE 6: REPLICATION ........................................................................................................................................ 12 LAB EXERCISE 8: DATA MIGRATION ................................................................................................................................ 16 LAB EXERCISE 9: DATA PROTECTION IN SDDC ................................................................................................................. 18 LAB EXERCISE 10: CLOUD-BASED DATA PROTECTION ..................................................................................................... 20 LAB EXERCISE 11: DATA PROTECTION IN BIG DATA AND MOBILE DEVICE ENVIRONMENT .............................................. 23 LAB EXERCISE 12: SECURING THE DATA PROTECTION ENVIRONMENT ............................................................................ 25 LAB EXERCISE 13: MANAGING DATA PROTECTION ......................................................................................................... 27 EMC2 PROVEN PROFESSIONAL 3 Lab Exercise 1: Data Availability Purpose: To reinforce the concepts presented in the lecture portion of the module, Introduction to Data Protection Tasks: Participants are required to provide a solution for the deliverables based on the given scenario and requirements. References: Module 1: Introduction to Data Protection Scenario In an enterprise data center, a single storage system is used to provide a data archiving service to the customers. The scheduled operating time of the data archiving service is 24×365 hours, so that the customers can archive and retrieve data anytime. The MTBF and MTTR of the storage system are 10000 hours and 12 hours respectively. Last year the storage system failed twice which resulted in a total service downtime of three days. Deliverables: What is the expected availability of the storage system? What are the expected annual uptime and downtime of the storage system? What is the achieved availability of the data archiving service in the last year? End of Lab Exercise EMC2 PROVEN PROFESSIONAL 4 Lab Exercise 2: Data Protection Architecture Purpose: To reinforce the concepts presented in the lecture portion of the module, Data Protection Architecture Tasks: Participants are required to provide a solution for the deliverables based on the given scenario and requirements. References: Module 2: Data Protection Architecture Scenario The IT infrastructure of an organization includes 20 physical computing systems. These compute systems consist of both Microsoft Windows and UNIX platforms. They host financial, email, and backup applications, and the organization’s website. Each compute system runs a single application to avoid resource conflict. The utilization of these compute systems is mostly around 20 percent. These compute systems are connected to six file servers with direct-attached storage (DAS). Three file servers are used for file sharing among Windows compute systems and the remaining three enable file sharing among UNIX compute systems. The email application uses a SAN-attached (block-based) storage system as the primary storage and an aging object-based storage device (OSD) to archive old emails. A SAN-attached tape library is also used to store all backup data. The backup application is purpose-built for backup-to-tape operations. Challenges and Requirements The tape library is aging and is a performance bottleneck during backup operations. Managing different types of storage systems using multiple management tools creates complexity and delays storage provisioning decisions and troubleshooting. Management tools can not provide real-time, end-to-end visibility and reporting on the IT infrastructure, and backup and archiving operations. The SAN-attached storage system has only 10 percent of its storage capacity available for storing new EMC2 PROVEN PROFESSIONAL 5 data. The UNIX users and Microsoft Windows users are unable to share files. Moreover, some of the file servers are overly utilized and therefore new file servers must be deployed to distribute the workload. The organization needs to deploy a set of new applications on social networking, eCommerce, and big data analytics as part of its expanded business objectives. They need to purchase 30 new compute systems to deploy the new applications. Deliverables Propose a solution that will optimize utilization of compute resources and eliminate the performance bottleneck caused by the tape library without changing the existing backup application. The solution should also reduce management complexity, provide real-time, end-to-end visibility of the infrastructure and operations. It should also allow UNIX and Windows users to share files, reduce proliferation of file servers, and improve file serving performance. End of Lab Exercise EMC2 PROVEN PROFESSIONAL 6 Lab Exercise 3: Fault Tolerance
Recommended publications
  • EMC Symmetrix Is “Enterprise Proven”  Gold Standard Remote Replication with SRDF  Performance Leadership Including Flash Drives
    Storage Solutions for Enterprise Consolidation with VMware Peter C. Conway Vice President – Business & Product Operations Symmetrix Product Group EMC Agenda • Overview • Business Continuity • Customer Case Study • Scalable Performance • Customer Case Study • Scaling VMware VDI 22 EMC’s Storage 2008 Portfolio CLARiiON CX4 UltraScale Series DMX-4 950 Symmetrix CX4-960 NS80 NSX Flash drives Celerra CX4 CX4-240 CX4-480 -120 Flash NS40 drives Flash NS40G drives NS20 Fiber Channel and iSCSI NS80G DMX-4 NAS, FC, & iSCSI AX4 Virtual Provisioning EMC ControlCenter Consumer Storage SMC Navisphere Celerra Manager Connectrix SAN Connectivity Smarts PowerPath MPFSi RecoverPoint LifeLine SRDF TimeFinder MirrorView SnapView Mozy Remote Backup Replication Manager Replistor Xtender Family Powered by EMC Fortress RecoverPoint NetWorker Avamar CDP and CRR DLm DL4106 4080 DL4206 Software-as- a-Service (SaaS) DL3D 3000 Invista 2.0 DL210 DL3D SAN Virtualization Centera 1500 EMC Centera Rainfinity Gen 4 LP Node DL4406 Rainfinity Global File Virtualization EMC Disk Library 33 Enterprise Customers Prefer Storage Area Networks* SANs remain the preferred platform for virtualized environments by 2:1 margin and growing • - 12 Months: 43% SAN Favorable vs. 29% for NAS • Today: 46% SAN Favorable vs. 25% for NAS • +12 Months: 59% SAN Favorable vs. 24% for NAS “EMC remains well ahead of the pack as the most preferred storage vendor in virtualized environments, with IBM a distant second.” *Goldman Sachs, IT Spending Survey , 08 September 2008- p. 11 44 Enterprise
    [Show full text]
  • Commvault Backup Appliance with Netapp a Powerful Combination of Commvault Simpana® Software and Netapp E-Series Storage
    CommVault Backup Appliance with NetApp A powerful combination of CommVault Simpana® software and NetApp E-Series storage Two leaders in data protection software and hardware have partnered to bring you a best-of-breed solution that closes the scalability, flexibility and manageability gaps in current offerings. You get powerful scalability • Plug-and-play scaling for capacity and compute power • Scale without reconfiguration • Software AND hardware resiliency • Rapid restores across simultaneous jobs You get broad flexibility • Choose a single appliance for smaller environments • Deploy multiple appliances for medium to large environments • Improve performance and resiliency through load balancing You get simple, comprehensive management • Central management, reporting and software deployment • Self-service access • Integration with NetApp E-Series node management COMMVAULT.COM | 888.746.3849 | [email protected] © 2015 COMMVAULT SYSTEMS, INC. ALL RIGHTS RESERVED. Two industry leaders. One truly integrated solution. COMMVAULT EMC AVAMAR/ SYMANTEC NETBACKUP FEATURE BENEFIT SIMPANA DATA DOMAIN APPLIANCES VM LIFECYCLE Manage the complete Y PARTIAL PARTIAL MANAGEMENT VM lifecycle from provisioning and monitoring to backup and replication to VM archiving and retirement DEDUPLICATION Inexpensively delivers Y PARTIAL N RESILIENCY WITH software load balancing PARALLEL and resiliency to DEDUPLICATION complement hardware availability SIMPANA ONEPASS™ Saves time, money Y N N SINGLE PASS BACKUP, and resources FILE ARCHIVING AND REPORTING ENDPOINT
    [Show full text]
  • Unityvsa Installation and Theory of Operation. Copyright ©2016 EMC
    Welcome to UnityVSA Installation and Theory of Operation. Copyright ©2016 EMC Corporation. All Rights Reserved. Published in the USA. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. The trademarks, logos, and service marks (collectively "Trademarks") appearing in this publication are the property of EMC Corporation and other parties. Nothing contained in this publication should be construed as granting any license or right to use any Trademark without the prior written permission of the party that owns the Trademark. EMC, EMC², the EMC logo, AccessAnywhere Access Logix, AdvantEdge, AlphaStor, AppSync ApplicationXtender, ArchiveXtender, Atmos, Authentica, Authentic Problems, Automated Resource Manager, AutoStart, AutoSwap, AVALONidm, Avamar, Aveksa, Bus-Tech, Captiva, Catalog Solution, C-Clip, Celerra, Celerra Replicator, Centera, CenterStage, CentraStar, EMC CertTracker. CIO Connect, ClaimPack, ClaimsEditor, Claralert ,cLARiiON, ClientPak, CloudArray, Codebook Correlation Technology, Common Information Model, Compuset, Compute Anywhere, Configuration
    [Show full text]
  • The Illusion of Space and the Science of Data Compression And
    The Illusion of Space and the Science of Data Compression and Deduplication Bruce Yellin EMC Proven Professional Knowledge Sharing 2010 Bruce Yellin Advisory Technology Consultant EMC Corporation [email protected] Table of Contents What Was Old Is New Again ......................................................................................................... 4 The Business Benefits of Saving Space ....................................................................................... 6 Data Compression Strategies ....................................................................................................... 9 Data Compression Basics ....................................................................................................... 10 Compression Bakeoff .............................................................................................................. 13 Data Deduplication Strategies .................................................................................................... 16 Deduplication - Theory of Operation ....................................................................................... 16 File Level Deduplication - Single Instance Storage ................................................................. 21 Fixed-Block Deduplication ....................................................................................................... 23 Variable-Block Deduplication .................................................................................................. 24 Content-Aware Deduplication
    [Show full text]
  • Benefits & Requirements
    Solution Provider FY2018 Track Benefits & Requirements North America – Canada The information contained in this presentation is proprietary and considered Dell EMC Confidential information. THIS INFORMATION IS BEING PRESENTED FOR INFORMATIONAL PURPOSES ONLY AND ADDITIONAL TERMS AND CONDITIONS APPLY TO YOUR PARTICIPATION IN ANY OF THE PROGRAMS PRESENTED HEREIN. Dell EMC reserves the right to modify the terms of the Program and/or eligibility requirements applicable to the Program at any time or to terminate the Program at any time at its sole discretion. THESE MATERIALS MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED AS IS, WITHOUT EXPRESS OR IMPLIED WARRANTIES OR GAURANTEES OF ANY KIND. © Copyright 2017 Dell Inc. or its subsidiaries. All rights reserved. Strictly Confidential – Not for Distribution FY2018 Benefits & Requirements Introduction The Requirements and Benefits document provides Solution Providers a framework for understanding the rebates and tier requirements of the Dell EMC Partner Program. The program’s financial framework ensures a predictable and profitable experience so you can focus on driving richer and deeper engagements with your customers. Partner Program Regional Segmentation To best serve local markets, program requirements & benefits are based on four geographic regions. North America ZONE 1 ZONE 2 North America EMEA • USA • Canada This guide is focused on North America Zone 2 EMEA ZONE 1 ZONE 2 APJ • France • Rest of EMEA • UK • Germany Latin America ZONE 1 ZONE 2 • Brazil • Rest of LatAm APJ ZONE 1 ZONE 2 LatAm • Japan • Rest of APJ • ANZ (excluding China, Hong Kong and Taiwan) © Copyright 2017 Dell Inc. or its subsidiaries. All rights reserved.
    [Show full text]
  • EMC Storage Platforms
    EMC Platforms Innovations 2008 Flash , De-Dup, Green , Cloud and more…. Erez Etzyon SMB & Commercail Presale Manager © Copyright 2008 EMC Corporation. All rights reserved. 1 Last Year we Talked About… Thin Provisioning De-duplication VMware Affinity Storage Tiering Energy Efficiency Information Security Consumer Storage Cloud Computing © Copyright 2008 EMC Corporation. All rights reserved. 2 And We Delivered…. ;Thin Provisioning – Available Across All Storage Platforms ;De-duplication – DL3D 1500 & 3000, DL3D 4000 ;VMware Affinity – SRM support, VDI Solutions, Avamar Virtual Ed. ;Storage Tiering – Flash Drives, 1TB SATA Disks ;Energy Efficiency – Spin Down, Adaptive Cooling, LP SATA ;Information Security – PowerPath Encryption, enVision Integration ;Consumer Storage – EMC LifeLine, Mozy, Iomega ;Cloud Computing – EMC Atmos © Copyright 2008 EMC Corporation. All rights reserved. 3 EMC’s Storage Portfolio CLARiiON CX4 UltraScale Series DMX-4 950 Symmetrix CX4-960 NS80 NSX Flash drives CX4 CX4-240 CX4-480 NEW Celerra -120 NEW Flash NS40 drives NEW Flash NS40G drives NS20 Fibre Channel and iSCSI NS80G Virtual Provisioning NEW DMX-4 AX4 NAS, FC, & iSCSI EMC ControlCenter Consumer Storage NEW SMC z Navisphere z Celerra Manager NEW Connectrix SAN Connectivity Smarts z PowerPath z MPFSi z RecoverPoint LifeLine SRDF z TimeFinder z MirrorView z SnapView Mozy Remote Backup z z Powered by EMC Fortress Replication Manager Replistor Xtender Family NEW RecoverPoint CDP and CRR NetWorker z Avamar NEW DLm Gen-2 DL3D Software-as- DL4106 4080 DL4206 DL4406 a-Service (SaaS) Data Store 3000 Invista 2.0 NEW SAN Virtualization NEW DL3D Centera 1500 NEW EMC Centera NEW Rainfinity Gen 4 LP Node NEW Rainfinity Global NEW File Virtualization Avamar EMC Disk Library © Copyright 2008 EMC Corporation.
    [Show full text]
  • Best Practices in Data Center Transformation, Into the Next Century
    riding the clouds - best practices in data center transformation, into the next century and beyond EMC Proven Professional Knowledge Sharing 2011 Paul Brant EMC Corporation [email protected] 2011 EMC Proven Professional Knowledge Sharing 2 Table of Contents Table of Figures................................................................................................. 10 Table of Equations ............................................................................................ 12 Abstract .............................................................................................................. 13 Introduction ....................................................................................................... 15 The need for Preservation in the Cloud/Next Generation Data Center ....................... 17 The ascent of the Computer in the Cloud/Next Generation Data Center .................... 18 The ascent of Data Longevity in the Cloud/Next Generation Data Center .................. 19 The ascent of Virtualization in the Cloud/Next Generation Data Center ..................... 21 The ascent of the Appliance in the Cloud/Next-Generation Data Center .................... 25 The ascent of the Intercloud – AKA Interconnected Global Connectivity .................... 26 The ascent of the Personal Data Store in the Cloud/Next-Generation Data Center .... 27 The Personal Information Management Ecosystem ................................................ 31 The Drivers for the Next-Generation Data Center .....................................................
    [Show full text]
  • Prodeploy Service Description Enterprise
    Service Description Dell ProDeploy Enterprise Suite: ProDeploy for Enterprise Introduction This document outlines the Service Description (“Service Description”) for ProDeploy for Enterprise (the “Service” or “Services”). This Service is part of Dell’s ProDeploy Enterprise Suite (“ProDeploy Suite”) which is available in multiple tiers: Basic Deployment, ProDeploy, and ProDeploy Plus (the “Service Tier” individually or the “Service Tiers” collectively). Enterprise solutions may include but are not limited to hardware platforms such as servers, storage, networking, and modular platforms (the “Hardware Platform”) as well as associated enterprise software and hardware additions, upgrades, or data management (“Supplemental Deployment Services”). Dell is pleased to provide this Service in accordance with this Service Description. Your quote, order form or other mutually-agreed upon form of invoice or order acknowledgment (as applicable, the “Order Form”) will include the name of the Service(s) and available service options that you purchased. For additional assistance or to request a copy of your service contract(s), contact Dell Technical Support or your sales representative. Table of Contents ProDeploy Scope of Service ................................................................................................................................... 2 Service Features.................................................................................................................................................... 3 Offer Structure ......................................................................................................................................................
    [Show full text]
  • Evento GDPR@SMS Engineering
    GDPR Soluzioni Dell EMC per Abilitare la Trasformazione Workshop March 2017 Giovanni Pisegna Cerone – Dell EMC Sr Solution Principal Napoli, 8 Novembre 2017 GDPR introduction |The basics «The General Data Protection Regulation (GDPR) is a new law In short… which estabilishes a single set of rules for every EU Member State to protect personal data. It builds upon and updates the current EU data protection framework » Effective date «It will come into force on 25 May 2018 » 2 GDPR introduction |The main driver to comply is… … the fine ! If a company fails to comply with GDPR, the Supervisory Authority can issue: ‒ Warnings, reprimands, suspension on data transfer, bans on processing and order to correct infringement ‒ Substantial fines of up to: 10 million Euros 20 million Euros or or 2% of Total Global Annual OR 4% of Total Global Annual Turnover Turnover (whichever is great) (whichever is great) 3 GDPR introduction |Principles Company is responsible for understanding its exposure level Several rights – i.e. right and take appropriate actions – to be forgotten, right to Risk Management approach change provider, right to Rights of be informed, … the Data Accountability Subject Principle Data Protection requirements must be taken into account from Data processing must be the beginning of the Design based on the principle of Phase «lawfulness» Semplified Data protection Lawfulness of by design & by processing Processing Cycle default Based upon the Risk Management approach, for the Data Subjects must be «high-risk data processing» it Information Data notified within strict SLAs protection must be carried out a specific in case of data breaches to Data Subject Impact Risk Assessment activity – data breach workflow Assessment 4 GDPR introduction |Scope Genetic data Personal data (Sensitive personal data) are any information relating to are personal data relating to an identified or identifiable the inherited or acquired natural person (‘data subject’).
    [Show full text]
  • Lenovo® Iomega® Ix2
    Product Release Information LENOVO® IOMEGA® IX2 NETWORK STORAGE 2-BAY DESCRIPTION Centrally store and backup your digital files The Lenovo® Iomega® ix2 Network Storage, 2-bay is a compact and affordable desktop network storage that is perfect for small businesses, home offices or advanced home networks, offering content sharing, data protection and basic video surveillance capabilities. Scheduled Availability: May 20 FEATURES Capacity: Up to 8TB*, 2x HDD PC backup with True Image Lite 2013 by Acronis - powerful backup software from Acronis protects Configurations: Diskless (ix2-dl, 0 HDD), Partially content, recovers data in case of any disasters Populated (1 x HDD) or Fully Populated (2 x HDD) (1 license included). Drive Capacities and Type: 1TB, 2TB, 3TB, 4TB* (SATA II) Public Cloud Backup: Use one of the integrated 3rd RAID Support: RAID 1 (mirror) with automatic RAID rebuild. party cloud-based storage services such as Amazon S3 or Mozy™ to replicate data from your ix2 to your public RAID 0 and JBOD mode also available. cloud account. Network File Protocols Supported: CIFS/SMB/Rally Data Replication / Device to Device Copy Jobs (Microsoft), NFS (Linux/UNIX), AFP/Bonjour (Apple), FTP, Easily copy files to and from attached USB drives or SFTP, TFTP, HTTP, HTTPS, WebDAV, Windows DFS, any network share including LenovoEMC™ Personal SNMP. Cloud locations using the rsync or CIFS protocol. Gigabit Ethernet connectivity Define your Copy Job to copy/synchronize files to and * Diskless unit with 2x4TB qualified HDDs from connected drives and/or any other shared storage on your network. Schedule jobs to run on a predetermined schedule.
    [Show full text]
  • EMC ACADEMIC ALLIANCE Educating Future IT Professionals Joachim Worf Senior Education Delivery Manager
    EMC ACADEMIC ALLIANCE Educating Future IT Professionals Joachim Worf http://education.emc.com/academicalliance Senior Education Delivery Manager © Copyright 2012 EMC Corporation. All rights reserved. 1 EMC Corporation… … is a global leader in enabling businesses and service providers to transform their operations and deliver information technology as a service (ITaaS). Through innovative products and services, EMC accelerates the journey to cloud computing, helping IT departments to store, manage, protect and analyze their most valuable asset— information —in a more agile, trusted and cost-efficient way 2011 At a Glance Revenues $20 billion Employees ~50,000 Countries where EMC does business >80 R&D Investment 11% of 2011 revenues Operating Cash Flow $5.7billion Free Cash Flow $4.4 billion Founded 1979 © Copyright 2012 EMC Corporation. All rights reserved. 2 Fast Growth Among Top 10 IT Product Companies Market Profit Rank Company Value (B) Rev Growth(YoY) Growth(YoY) 1 Microsoft 210 22.4% 48.4% 2 Cisco 120 27% 79% 3 IBM 161 2% 9.1% 4 Oracle 115 38.5% 25% 5 Intel 103 34.2% N/A 6 HP 94 11.9% 8% Superior Performance in both Rev & Profit 7 SAP 55 12.3% 15.5% growth 8 EMC 41 23.5% 107.7% 9 Dell 25 21.7% 15.5% 10 Symantec 11 0.1% 117.6% Source: Data as of Sept, 2010 from Yahoo Finance © Copyright 2012 EMC Corporation. All rights reserved. 3 Strategic Acquisitions EMC Strategic acquisitions: 2003–2010 • Expand and strengthen the core product offering • Expand Services expertise for Microsoft technologies Since 2003 approximately $11 billion
    [Show full text]
  • DELL EMC CLOUD DATA PROTECTION Software and Saas Solutions
    GLOBAL SPONSORS Internal Use - Confidential Why Dell EMC for Data Protection Modernization and Transformation GLOBAL SPONSORS Data Protection Overview Agenda • Market, Requirements and what customers want • Dell EMC Data Protection Strategy • Dell EMC Data Protection Portfolio • Dell EMC Data Protection vs traditional & competing architectures • Isolated Recovery from a Cyber-attack Internal Use - Confidential “DATA FOG” Where is your How do you data and… protect it? DATA CENTERS OF DATA Internal Use - Confidential Today’s Data Protection Approach Only 1 in 4 customers have a single vendor approach…* * IDC 2017 Internal Use - Confidential Customers are telling us… Less specialization of skills SDDC for agility Cloud and As-a-Service Stream based backup does Offerings Prevalent not meet scale needs Ease-of and Can not continue to linearly Time-to Critical grow teams Internal Use - Confidential Data Protection must EVOLVE Transform Modernize TRADITIONAL .NEXT IT INVESTMENT $ INVESTMENT IT 2000 2030 Automate Everywhere it Makes Sense Internal Use - Confidential Dell EMC Data Protection TRANSFORM PEOPLE PROCESS CLOUD PEOPLE PROCESS CLOUD PEOPLE PROCESS CLOUD & Automate PHYSICAL VIRTUAL NEXT GEN ENTERPRISE APPS HYPERVISOR BIG DATA APPS MODERNIZE & Automate HARDWARE & SOFTWARE HARDWARE & SOFTWARE HARDWARE & SOFTWARE Internal Use - Confidential MODERNIZE, TRANSFORM and AUTOMATE DATA PROTECTION with Dell EMC Data Protection Portfolio Protection and recovery for cloud PROTECTION PROTECTION PROTECTION STORAGE SOFTWARE APPLIANCE Internal Use - ConfidentialBest
    [Show full text]