DELL EMC CLOUD DATA PROTECTION Software and Saas Solutions

DELL EMC CLOUD DATA PROTECTION Software and Saas Solutions

GLOBAL SPONSORS Internal Use - Confidential Why Dell EMC for Data Protection Modernization and Transformation GLOBAL SPONSORS Data Protection Overview Agenda • Market, Requirements and what customers want • Dell EMC Data Protection Strategy • Dell EMC Data Protection Portfolio • Dell EMC Data Protection vs traditional & competing architectures • Isolated Recovery from a Cyber-attack Internal Use - Confidential “DATA FOG” Where is your How do you data and… protect it? DATA CENTERS OF DATA Internal Use - Confidential Today’s Data Protection Approach Only 1 in 4 customers have a single vendor approach…* * IDC 2017 Internal Use - Confidential Customers are telling us… Less specialization of skills SDDC for agility Cloud and As-a-Service Stream based backup does Offerings Prevalent not meet scale needs Ease-of and Can not continue to linearly Time-to Critical grow teams Internal Use - Confidential Data Protection must EVOLVE Transform Modernize TRADITIONAL .NEXT IT INVESTMENT $ INVESTMENT IT 2000 2030 Automate Everywhere it Makes Sense Internal Use - Confidential Dell EMC Data Protection TRANSFORM PEOPLE PROCESS CLOUD PEOPLE PROCESS CLOUD PEOPLE PROCESS CLOUD & Automate PHYSICAL VIRTUAL NEXT GEN ENTERPRISE APPS HYPERVISOR BIG DATA APPS MODERNIZE & Automate HARDWARE & SOFTWARE HARDWARE & SOFTWARE HARDWARE & SOFTWARE Internal Use - Confidential MODERNIZE, TRANSFORM and AUTOMATE DATA PROTECTION with Dell EMC Data Protection Portfolio Protection and recovery for cloud PROTECTION PROTECTION PROTECTION STORAGE SOFTWARE APPLIANCE Internal Use - ConfidentialBest of breed Integrated Why Dell EMC Protection Storage Protect more data End-to-end data Integrates with Natively tier deduplicated faster with industry verification, fault leading backup, data to the cloud for leading speed and detection, and self archiving, enterprise modern long-term scale healing applications and big retention data applications or Reduce storage directly with primary Deliver data protection as required by 10–30x storage a service with logical data isolation Deploy protection storage however you want it Internal Use - Confidential Dell EMC Data Protection Software Protection and Continuity Based on Data Value and Business Objectives Availability Replication Snapshot Backup Archive VPLEX Internal Use - Confidential Why Dell EMC Protection Software Delivers protection across the Industry’s tightest integration Automated provisioning and data protection continuum with Data Domain, yielding scaling deduplication rates nearly 4x Spans physical, virtual, hybrid that of our competitors Search and analytics and public cloud environments - Reduces backup storage by Hypervisor integration enables Data Protection of Hyper up to 38x data protection through native Converged/Converged interfaces - Reduces network traffic by Provides complete protection up to 99% Application and data owners for cloud-based data and are empowered to protect applications - Reduces backup times by their mission-critical up to 50% information Internal Use - Confidential DELL EMC CLOUD DATA PROTECTION Software and SaaS Solutions PRIVATE EXTEND IN-CLOUD CLOUD TO CLOUD PROTECTION Protect Your Data Across the Entire Cloud Protection Continuum Internal Use - Confidential “Dell EMC reduces monthly in-cloud data DELL EMC CLOUD DATA PROTECTION protection costs by 50%.” Software and SaaS Solutions ESG PRIVATE EXTEND IN-CLOUD CLOUD TO CLOUD PROTECTION Software Defined Backup to Cloud In Cloud Protection Storage Data Protection APIs Long Term Retention to Cloud VMware Cloud on AWS Automation Orchestration Disaster Recovery to Cloud Amazon Turn Key Cloud Integration Desktop / Laptop to Cloud Azure Private Hosted 3rd Site Internal Use - Confidential Extend to the cloud with Mozy by Dell Endpoint protection in the cloud • Mozy by Dell – MozyPro for SMB – MozyEnterprise for large businesses • Desktop/laptop backup, file sync, and mobile access – Windows, Mac, Linux clients • Protection for small server workloads – Particularly suitable for remote and branch offices • Cybercrime protection – A second line of defense against ransomware and other forms of malware • Backup-as-a-Service – Requires no capital expenditures for hardware Internal Use - Confidential INTRODUCING-Better Together Integrated Data Protection Appliance Innovation without compromise Converged and High-value and Comprehensive Low-TCO 10X Fast and Avg 55:1 Faster Time to Protect Modern Deduplication 20% Faster Internal Use - Confidential IDPA - Maximum choice and flexibility Available NOW!! LARGE ENTERPRISE MIDSIZE ENTERPRISE DP5300 DP5800 DP8300 DP8800 BACKUP INGEST 24 TB/hr 32 TB/hr 41 TB/hr 68 TB/hr 1.4 to 14.4 PB1 1.9 to 36 PB1 6.2 to 50 PB1 LOGICAL CAPACITY 340 TB to 6.5 PB1 4.2 to 43.2 PB2 5.7 to 108 PB2 18.6 to 150 PB2 144 to 288 TBu1 192 to 720TBu1 624 TBu to 1 PBu1 USABLE CAPACITY 34 to 130 TBu1 Up to 864 TBu2 Up to 2.16 PBu2 Up to 3 PBu2 1 2 Internal Use - ConfidentialTotal capacity on active tier only Total capacity with cloud tiering add-on for long-term retention Key Technology Differentiation Choice and Flexibility SW Defined or PBBA Native Application 67% PBBA Share Integration Industry-leading data Architecture Matters reduction PROTECTION PROTECTION PROTECTION STORAGE SOFTWARE APPLIANCE Proven: Over 73,000 Over 21,000 Data Data Domain Units on Protection Software Support Customers Cloud-enabled where Internal Use - Confidential you need it Other VMware Data Protection Alternatives Traditional Hardware and Software Model Initial Attempts At HW & SW Bundled Solutions Policy Policy Management Management Data Movers Network Network Networking Network Protection Storage Internal Use - Confidential Other VMware Data Protection Alternatives Traditional Hardware and Software Model Initial Attempts At HW & SW Bundled Solutions Policy Policy Management Management Data Movers Network Network Networking Network NO AUTOMATION Protection Storage Not SDDC ready • Complex, expensive to scale • Slower backups and recoveries Internal Use - Confidential Dell EMC Modern VMware Data Protection Architecture Matters Virtual Machines Virtual Proxies Automation across the entire data protection stack Networking Protection Storage Internal Use - Confidential Nature of the Cyber Attacks On The Rise • All industries and organizations are vulnerable • No system is 100% secure. Understanding the threats you face will help you improve your preparedness. • The attacks are getting more sophisticated • Insider access is a contributing factor in 25% of the cases • The majority of attackers are still entering via email Internal Use - Confidential Isolated Recovery – Dell EMC Data Domain ISOLATED RECOVERY VAULT • Create backup of data Backup • No management App Hosts connectivity to IR Vault DD Replication • Enable data link and Recovery replicate to isolated system Test Hosts • Complete replication and Air Gap disable data link Management Host • Maintain WORM locked Primary Storage Backup Appliance Isolated Recovery restore points System • Optional security analytics on data at rest • Professional Services Internal Use - Confidential Resiliency Consulting Services Well Run Data Protection • Transformation Program including Backup and Archive • Blueprint for Backup Architecture Isolated Recovery Advisory and Implementation • Cyber Risk / Application of NIST Recovery IT Continuity Services • Disaster Recovery / Business Continuity • Continuous Application Availability Resiliency Program Management Why Dell EMC? Where we’ve done it: Depth of experience & proven outcomes Major US-based Airline Mature, robust methodology Worldwide Distribution Company Full spectrum of services Energy services Internal Use - Confidential Aligned to industry standards Large Regional Bank How Are You Going to Back that Up? Deduplicated App Integrated Storage Integrated Software Defined Cloud Integrated Hyper Converged Internal Use - Confidential .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    26 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us