SlideShare uma empresa Scribd logo
1 de 29
Baixar para ler offline
MT44
Dell EMC Data Protection:
What you need to know about data
protection everywhere
Garrett Van Siclen, Data Protection Evangelist
2
A tale of two worlds
You need both
for trust and agility
Traditional Apps
IT
On Premise
Next Gen Apps
Developers
Cloud
3
Protecting all consumption models
On premises Virtual Hybrid Cloud-born
Protecting data wherever it lives
4
PROTECTION AND TRUST
Security/Governance – Data protection – Services/Support
FLASH
SCALE-OUT
SOFTWARE
DEFINED
CLOUD
ENABLED
Reduce costs (# Of Drives, Power, Floor Space. Etc.)
Consistent and predictable performance
Lower entry costs and scale as you grow
Manage massive capacity with fewer resources
Automated provisioning and business agility
Flexible and programmable data services
Policy driven service delivery
On/Off premises data and/or application mobility
Dell EMC modern data center strategy
5
Global Data Protection Index
Are you protected?
$914K
Average cost of
data loss
2.36T
Data loss
90%
Laggards or
Evaluators
73%
Unable to keep
pace with Flash
82%
Unprepared for
future business
challenges
50%
Unprotected in the
Cloud
6
Dell EMC Data Protection by the numbers
• World’s largest data protection company
• Leader in both Gartner Backup Magic Quadrants
• Share leader in purpose built backup appliances
• 70,000+ systems shipped and installed
• 4,000+ data protection solution employees
7
Dell EMC Data Protection Continuum
Availability, replication, backup and archive
SnapshotReplicationAvailability Backup Archive
Zero Seconds Minutes Hours
DATAAVAILABILITY DATA DURABILITY
COMPLEMENTARY TIERS TO MEET ANY
RECOVERY REQUIREMENT
8
HOURLY
Recovery points between backups
SNAPSHOTS
12AM 6AM 12PM 6PM 12AM
DAILY
Copies on capacity optimized protection storage
BACKUPS
MONDAY TUESDAY
Access anywhere stretched storage volumes
CONTINUOUS
AVAILABILITY
Recovery to any point-in-timeCONTINUOUS
PROTECTION
LOCAL OR REMOTE
Isilon
Meeting recovery objectives
Protection Storage
11
Why Dell EMC Protection Storage
FLEXIBLE
• Integrates with industry leading applications
• Integrates directly with primary storage
• Software defined
RELIABLE
• End-to-end data verification, fault detection, and self healing
EFFICIENT
• Protect more data, industry-leading speed and scale
• Reduce storage required by 10–30x
CLOUD-ENABLED
• Natively tier deduplicated data to the cloud for modern LTR
• Deliver Data Protection as a Service with logical data isolation
12
New Systems Flash-Enabled Performance and Instant Access
Transformed Data Domain
• Category shattering speed and scale
– 7x more scalable and 1.5x faster
– 20x faster instant access and restore of VMs
– High availability from the midmarket to the enterprise
• Data Domain Operating System 6.0
– DD Boost Everywhere, benefits expand to new markets
– Enabled to tier data to cloud storage
– Secure Multi-Tenancy Updates
• Data Domain Virtual Edition 3.0
– Enhanced scale and Hyper-V support
– Qualified with Dell PowerEdge Servers
Protection Software
14
Why Dell EMC Protection Software
COMPREHENSIVE PROTECTION
• Delivers protection across the data protection continuum
• Covers all consumption models
• Backup WITHIN the public cloud or use for secure long-term
retention
FLEXIBLE
• 5 purpose-built offerings, designed for a variety of
requirements
• Supports a wide range of protection technologies
• Delivers application owner and IT visibility & control
HIGH PERFORMANCE
• Up to 20x faster backups, 30x faster image-level recovery
• Industry’s tightest integration with Data Domain
• Reduce backup storage requirements by up to 38x
• Reduces network traffic by up to 99%
• Reduces backup times by up to 50%
15
Packaged To Meet Your Data Protection Requirements
Dell EMC Protection Software
Comprehensive data protection for the modern data center
16
Cloud and Data Protection
EXTEND
TO CLOUD
MOVE
TO CLOUD
BORN
IN CLOUD
17
Cloud use cases for data protection
Direct to Cloud
CLIENT
• Back up directly to
cloud, or via edge cache
(ROBO)
• Intended for small
amounts of data with
flexible RTO SLAs
Benefit
• Remote manageability
• Direct Restore
• Low On-Prem Footprint
DR as a Service
• Outsource replication to
a Service Provider
Benefit
• No DR site required
• Easy fire drills
• Aligns DR readiness to
pay as you go model
IaaS Protection
• Protects virtual
workloads and storage
in the cloud
Benefit
• Prevents cloud work
loads against data
corruption
PROTECTION
STORAGE
• Extended storage
provisioning via the
cloud
Benefit
• Tape Replacement
• Infinitely Scalable
• Low Cost
Long Term
Retention
18
Dell EMC Cloud Data Protection Software
COMPREHENSIVE PROTECTION
• Direct-to-cloud backup for desktops, laptops, & remote offices
• Born-in-cloud protection for fast growing enterprise SaaS
applications including Office 365, Salesforce, & Google Apps
• Cloud enablement for Long-Term Retention
FLEXIBLE
• Deployment time measured in minutes or hours, not weeks or
months
• Doesn’t require additional capital expense for hardware
• Easily scale resources up or down according to demand
• Per user, utility based pricing plans
SECURE
• End-to-end encryption, including a customer managed key
• Global network of world-class data centers, ensuring data is
stored in region according to local laws and regulations
• Industry-leading cloud service audits and certifications
19
What’s New: Expanded Cloud Protection and Manageability
Data Protection Software & Cloud
• NetWorker with CloudBoost now protects
applications running on the Microsoft Azure platform
• Natively manage long term retention with Data
Domain Cloud Tier directly from NetWorker 9.1 and
Avamar 7.4
• Spanning Backup for Office 365 now available for
customers within the EU
20
Protection delivered as you want it
Best of Breed Converged Software Defined As-a-Service
Isolated Recovery
Solutions
22
Impact of cyber attacks
6 Minutes
Time it takes to
compromise an
organization, 60%
of the time
$1.25M
Average cost of
1M breached
records
$67K
Average cost of
1,000 breached
records
36%
Lost data due to
security breach
2,122
Confirmed data
breaches in 2014
23
Advanced Protection Services
- Isolated Recovery Solution
- Dell EMC Service Offerings
- RSA Security Analytics
Additional Hardening & Protection Features
- DPS Product Specific Hardening Guides
- Encryption in Flight and/or at Rest
- Retention Lock w/Separate Security officer credentials
Layered cyber security for data protection
Traditional Data Protection Best Practices
- Layered data protection Deploy approach (“the
continuum”) for more business critical systems
- Always include a point in time off array independent
backup with DR Replication (N+1)
RISK
24
Most critical data first
• Protect the “heartbeat” of
the business first
• Prioritize top applications or
data sets to protect
• Usually less than 10% of
data (this is NOT DR!)
• Start with a core set and
build from there
Compute
Applications
Validate &
Store
Highest
Priority Data
25
Why Dell EMC for Data Protection
• Data Protection Everywhere: One vendor delivering simplicity, flexibility, and
investment protection
• Market and technology leadership
– #1 In Deduplication
– #1 In Purpose Built Backup Appliances
– #1 In Combined Data Protection Software & Storage
– #1 In Replication
– Isolated Recovery Solutions for protection against Ransomware
• Unparalleled investment
• $16.5B cumulative R&D investment, $17B in technology acquisitions
• 4,000+ team members dedicated to helping our customers
26
Helping customers transform
28
Let’s get started
Total Customer Experience
Support Management
Assess Design TCO/ROI
Validate
the Value
29
Where to find us at Dell EMC World
• Solution Showcase
– Data Protection in the Data Center Area
– IT Transformation in the Dell Technologies Solutions Center
– Dell Data Security Solution in the Security zone
30
More Dell EMC Data Protection Information
EMC Storage and Data Protection
Dell EMC Data Protection Community
Data Protection on EMC.com
Core Technologies Blog
Mozy.com
Spanning.com
@DellEMCProtect
MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Everywhere

Mais conteúdo relacionado

Mais procurados

DELLEMC_Portfolio_hyperlinks_Complete
DELLEMC_Portfolio_hyperlinks_CompleteDELLEMC_Portfolio_hyperlinks_Complete
DELLEMC_Portfolio_hyperlinks_Complete
DELLEMC Technologies
 
Storage e Protezione dei Dati
Storage e Protezione dei DatiStorage e Protezione dei Dati
Storage e Protezione dei Dati
Jürgen Ambrosi
 

Mais procurados (20)

MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
 
MT48 A Flash into the future of storage….  Flash meets Persistent Memory: The...
MT48 A Flash into the future of storage….  Flash meets Persistent Memory: The...MT48 A Flash into the future of storage….  Flash meets Persistent Memory: The...
MT48 A Flash into the future of storage….  Flash meets Persistent Memory: The...
 
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
 
MT58 High performance graphics for VDI: A technical discussion
MT58 High performance graphics for VDI: A technical discussionMT58 High performance graphics for VDI: A technical discussion
MT58 High performance graphics for VDI: A technical discussion
 
David Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC WorldDavid Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC World
 
MT23 Benefits of Modular Computing from Data Center to Branch Office
MT23 Benefits of Modular Computing from Data Center to Branch OfficeMT23 Benefits of Modular Computing from Data Center to Branch Office
MT23 Benefits of Modular Computing from Data Center to Branch Office
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
MT129 Isilon Data Lake Overview
MT129 Isilon Data Lake OverviewMT129 Isilon Data Lake Overview
MT129 Isilon Data Lake Overview
 
MT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the CampusMT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the Campus
 
MT30 Best practices for data lake adoption
MT30 Best practices for data lake adoptionMT30 Best practices for data lake adoption
MT30 Best practices for data lake adoption
 
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
 
Dalle soluzioni di BackUp & Recovery al Data management a 360°
Dalle soluzioni di BackUp & Recovery al Data management a 360° Dalle soluzioni di BackUp & Recovery al Data management a 360°
Dalle soluzioni di BackUp & Recovery al Data management a 360°
 
DELLEMC_Portfolio_hyperlinks_Complete
DELLEMC_Portfolio_hyperlinks_CompleteDELLEMC_Portfolio_hyperlinks_Complete
DELLEMC_Portfolio_hyperlinks_Complete
 
The Next Generation of Hyperconverged Infrastructure - Cisco
The Next Generation of Hyperconverged Infrastructure - CiscoThe Next Generation of Hyperconverged Infrastructure - Cisco
The Next Generation of Hyperconverged Infrastructure - Cisco
 
Le soluzioni tecnologiche per il Copy Data Management
Le soluzioni tecnologiche per il Copy Data ManagementLe soluzioni tecnologiche per il Copy Data Management
Le soluzioni tecnologiche per il Copy Data Management
 
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
 
A buyer's guide to Hyper-Converged infrastructure
A buyer's guide to Hyper-Converged infrastructureA buyer's guide to Hyper-Converged infrastructure
A buyer's guide to Hyper-Converged infrastructure
 
Storage e Protezione dei Dati
Storage e Protezione dei DatiStorage e Protezione dei Dati
Storage e Protezione dei Dati
 
Vce vxrail-customer-presentation new
Vce vxrail-customer-presentation newVce vxrail-customer-presentation new
Vce vxrail-customer-presentation new
 
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
 

Destaque

Destaque (10)

Microsoft cloud stack
Microsoft cloud stackMicrosoft cloud stack
Microsoft cloud stack
 
The Path to Digital Transformation
The Path to Digital TransformationThe Path to Digital Transformation
The Path to Digital Transformation
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions Lab
 
Dell EMC VxRAIL Appliance based on VMware SDS
Dell EMC VxRAIL Appliance based on VMware SDSDell EMC VxRAIL Appliance based on VMware SDS
Dell EMC VxRAIL Appliance based on VMware SDS
 
Azure Stack - Azure in your own Data Center
Azure Stack - Azure in your own Data CenterAzure Stack - Azure in your own Data Center
Azure Stack - Azure in your own Data Center
 
Обзор новой СХД EMC Unity. Планирование обновления с VNX\VNX2, Тимофей Григор...
Обзор новой СХД EMC Unity. Планирование обновления с VNX\VNX2, Тимофей Григор...Обзор новой СХД EMC Unity. Планирование обновления с VNX\VNX2, Тимофей Григор...
Обзор новой СХД EMC Unity. Планирование обновления с VNX\VNX2, Тимофей Григор...
 
2016 11-16 Citrix XenServer & Nutanix Master Class
2016 11-16 Citrix XenServer & Nutanix Master Class2016 11-16 Citrix XenServer & Nutanix Master Class
2016 11-16 Citrix XenServer & Nutanix Master Class
 
Nutanix Fundamentals The Enterprise Cloud Company
Nutanix Fundamentals The Enterprise Cloud CompanyNutanix Fundamentals The Enterprise Cloud Company
Nutanix Fundamentals The Enterprise Cloud Company
 
Microsoft Azure Stack
Microsoft Azure StackMicrosoft Azure Stack
Microsoft Azure Stack
 
Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking Overview
 

Semelhante a MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Everywhere

Data Protection Picture Book
Data Protection Picture BookData Protection Picture Book
Data Protection Picture Book
Jeremy Boss
 
Data Protection Picture Book
Data Protection Picture BookData Protection Picture Book
Data Protection Picture Book
Jeremy Boss
 

Semelhante a MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Everywhere (20)

How to Accelerate Backup Performance with Dell DR Series Backup Appliances
How to Accelerate Backup Performance with Dell DR Series Backup AppliancesHow to Accelerate Backup Performance with Dell DR Series Backup Appliances
How to Accelerate Backup Performance with Dell DR Series Backup Appliances
 
Data Protection Picture Book
Data Protection Picture BookData Protection Picture Book
Data Protection Picture Book
 
Future
FutureFuture
Future
 
Match Your Backup to Your Business
Match Your Backup to Your BusinessMatch Your Backup to Your Business
Match Your Backup to Your Business
 
Cloud Business Overview : Seminar Protecting Mission-Critical Application Aga...
Cloud Business Overview : Seminar Protecting Mission-Critical Application Aga...Cloud Business Overview : Seminar Protecting Mission-Critical Application Aga...
Cloud Business Overview : Seminar Protecting Mission-Critical Application Aga...
 
Delivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware EnvironmentsDelivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware Environments
 
IT Resilience Use Case
IT Resilience Use CaseIT Resilience Use Case
IT Resilience Use Case
 
Modernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen AlahmadModernizing your organization's data protection approach, with Yamen Alahmad
Modernizing your organization's data protection approach, with Yamen Alahmad
 
Dell cloud solutions for the future – ready enterprise
Dell cloud solutions for the future – ready enterpriseDell cloud solutions for the future – ready enterprise
Dell cloud solutions for the future – ready enterprise
 
Going Beyond the Cloud to Modernize Your Banking Infrastructure
Going Beyond the Cloud to Modernize Your Banking InfrastructureGoing Beyond the Cloud to Modernize Your Banking Infrastructure
Going Beyond the Cloud to Modernize Your Banking Infrastructure
 
FlexiCloud: Infinitely Scalable
FlexiCloud: Infinitely ScalableFlexiCloud: Infinitely Scalable
FlexiCloud: Infinitely Scalable
 
Cleversafe.PPTX
Cleversafe.PPTXCleversafe.PPTX
Cleversafe.PPTX
 
How to Build Multi-disciplinary Analytics Applications on a Shared Data Platform
How to Build Multi-disciplinary Analytics Applications on a Shared Data PlatformHow to Build Multi-disciplinary Analytics Applications on a Shared Data Platform
How to Build Multi-disciplinary Analytics Applications on a Shared Data Platform
 
Cloud Storage: Enabling The Dynamic Datacenter
Cloud Storage: Enabling The Dynamic DatacenterCloud Storage: Enabling The Dynamic Datacenter
Cloud Storage: Enabling The Dynamic Datacenter
 
Connecting the Clouds - RightScale Compute 2013
Connecting the Clouds - RightScale Compute 2013Connecting the Clouds - RightScale Compute 2013
Connecting the Clouds - RightScale Compute 2013
 
Disaster recovery solutions and datacentre replacements
Disaster recovery solutions and datacentre replacementsDisaster recovery solutions and datacentre replacements
Disaster recovery solutions and datacentre replacements
 
Data Protection Picture Book
Data Protection Picture BookData Protection Picture Book
Data Protection Picture Book
 
Romi tech cloud workspace overview
Romi tech   cloud workspace overviewRomi tech   cloud workspace overview
Romi tech cloud workspace overview
 
Multidisziplinäre Analyseanwendungen auf einer gemeinsamen Datenplattform ers...
Multidisziplinäre Analyseanwendungen auf einer gemeinsamen Datenplattform ers...Multidisziplinäre Analyseanwendungen auf einer gemeinsamen Datenplattform ers...
Multidisziplinäre Analyseanwendungen auf einer gemeinsamen Datenplattform ers...
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
 

Mais de Dell EMC World

Mais de Dell EMC World (14)

MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...
 
MT54 Better security is better business
MT54 Better security is better businessMT54 Better security is better business
MT54 Better security is better business
 
MT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response PlanningMT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response Planning
 
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
 
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
 
MT93 - Federal: End-point evolution: Mobile, secure, connected
MT93 - Federal: End-point evolution: Mobile, secure, connected MT93 - Federal: End-point evolution: Mobile, secure, connected
MT93 - Federal: End-point evolution: Mobile, secure, connected
 
MT92 - Federal: Budget? What budget? Build your dream IT modernization plan
MT92 - Federal: Budget? What budget? Build your dream IT modernization planMT92 - Federal: Budget? What budget? Build your dream IT modernization plan
MT92 - Federal: Budget? What budget? Build your dream IT modernization plan
 
MT87 How technology can reduce costs, minimize environmental impact, and maxi...
MT87 How technology can reduce costs, minimize environmental impact, and maxi...MT87 How technology can reduce costs, minimize environmental impact, and maxi...
MT87 How technology can reduce costs, minimize environmental impact, and maxi...
 
MT101 Dell OCIO: Delivering data and analytics in real time
MT101 Dell OCIO:  Delivering data and analytics in real timeMT101 Dell OCIO:  Delivering data and analytics in real time
MT101 Dell OCIO: Delivering data and analytics in real time
 
MT13 - Keep your business processing operating at peak efficiency with Dell E...
MT13 - Keep your business processing operating at peak efficiency with Dell E...MT13 - Keep your business processing operating at peak efficiency with Dell E...
MT13 - Keep your business processing operating at peak efficiency with Dell E...
 
MT12 - SAP solutions from Dell – from your Datacenter to the Cloud
MT12 - SAP solutions from Dell – from your Datacenter to the CloudMT12 - SAP solutions from Dell – from your Datacenter to the Cloud
MT12 - SAP solutions from Dell – from your Datacenter to the Cloud
 
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoTMT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
 
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
 
MT03 Cloud trends and the Dell Technologies point of view
MT03 Cloud trends and the Dell Technologies point of viewMT03 Cloud trends and the Dell Technologies point of view
MT03 Cloud trends and the Dell Technologies point of view
 

MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Everywhere

  • 1. MT44 Dell EMC Data Protection: What you need to know about data protection everywhere Garrett Van Siclen, Data Protection Evangelist
  • 2. 2 A tale of two worlds You need both for trust and agility Traditional Apps IT On Premise Next Gen Apps Developers Cloud
  • 3. 3 Protecting all consumption models On premises Virtual Hybrid Cloud-born Protecting data wherever it lives
  • 4. 4 PROTECTION AND TRUST Security/Governance – Data protection – Services/Support FLASH SCALE-OUT SOFTWARE DEFINED CLOUD ENABLED Reduce costs (# Of Drives, Power, Floor Space. Etc.) Consistent and predictable performance Lower entry costs and scale as you grow Manage massive capacity with fewer resources Automated provisioning and business agility Flexible and programmable data services Policy driven service delivery On/Off premises data and/or application mobility Dell EMC modern data center strategy
  • 5. 5 Global Data Protection Index Are you protected? $914K Average cost of data loss 2.36T Data loss 90% Laggards or Evaluators 73% Unable to keep pace with Flash 82% Unprepared for future business challenges 50% Unprotected in the Cloud
  • 6. 6 Dell EMC Data Protection by the numbers • World’s largest data protection company • Leader in both Gartner Backup Magic Quadrants • Share leader in purpose built backup appliances • 70,000+ systems shipped and installed • 4,000+ data protection solution employees
  • 7. 7 Dell EMC Data Protection Continuum Availability, replication, backup and archive SnapshotReplicationAvailability Backup Archive Zero Seconds Minutes Hours DATAAVAILABILITY DATA DURABILITY COMPLEMENTARY TIERS TO MEET ANY RECOVERY REQUIREMENT
  • 8. 8 HOURLY Recovery points between backups SNAPSHOTS 12AM 6AM 12PM 6PM 12AM DAILY Copies on capacity optimized protection storage BACKUPS MONDAY TUESDAY Access anywhere stretched storage volumes CONTINUOUS AVAILABILITY Recovery to any point-in-timeCONTINUOUS PROTECTION LOCAL OR REMOTE Isilon Meeting recovery objectives
  • 10. 11 Why Dell EMC Protection Storage FLEXIBLE • Integrates with industry leading applications • Integrates directly with primary storage • Software defined RELIABLE • End-to-end data verification, fault detection, and self healing EFFICIENT • Protect more data, industry-leading speed and scale • Reduce storage required by 10–30x CLOUD-ENABLED • Natively tier deduplicated data to the cloud for modern LTR • Deliver Data Protection as a Service with logical data isolation
  • 11. 12 New Systems Flash-Enabled Performance and Instant Access Transformed Data Domain • Category shattering speed and scale – 7x more scalable and 1.5x faster – 20x faster instant access and restore of VMs – High availability from the midmarket to the enterprise • Data Domain Operating System 6.0 – DD Boost Everywhere, benefits expand to new markets – Enabled to tier data to cloud storage – Secure Multi-Tenancy Updates • Data Domain Virtual Edition 3.0 – Enhanced scale and Hyper-V support – Qualified with Dell PowerEdge Servers
  • 13. 14 Why Dell EMC Protection Software COMPREHENSIVE PROTECTION • Delivers protection across the data protection continuum • Covers all consumption models • Backup WITHIN the public cloud or use for secure long-term retention FLEXIBLE • 5 purpose-built offerings, designed for a variety of requirements • Supports a wide range of protection technologies • Delivers application owner and IT visibility & control HIGH PERFORMANCE • Up to 20x faster backups, 30x faster image-level recovery • Industry’s tightest integration with Data Domain • Reduce backup storage requirements by up to 38x • Reduces network traffic by up to 99% • Reduces backup times by up to 50%
  • 14. 15 Packaged To Meet Your Data Protection Requirements Dell EMC Protection Software Comprehensive data protection for the modern data center
  • 15. 16 Cloud and Data Protection EXTEND TO CLOUD MOVE TO CLOUD BORN IN CLOUD
  • 16. 17 Cloud use cases for data protection Direct to Cloud CLIENT • Back up directly to cloud, or via edge cache (ROBO) • Intended for small amounts of data with flexible RTO SLAs Benefit • Remote manageability • Direct Restore • Low On-Prem Footprint DR as a Service • Outsource replication to a Service Provider Benefit • No DR site required • Easy fire drills • Aligns DR readiness to pay as you go model IaaS Protection • Protects virtual workloads and storage in the cloud Benefit • Prevents cloud work loads against data corruption PROTECTION STORAGE • Extended storage provisioning via the cloud Benefit • Tape Replacement • Infinitely Scalable • Low Cost Long Term Retention
  • 17. 18 Dell EMC Cloud Data Protection Software COMPREHENSIVE PROTECTION • Direct-to-cloud backup for desktops, laptops, & remote offices • Born-in-cloud protection for fast growing enterprise SaaS applications including Office 365, Salesforce, & Google Apps • Cloud enablement for Long-Term Retention FLEXIBLE • Deployment time measured in minutes or hours, not weeks or months • Doesn’t require additional capital expense for hardware • Easily scale resources up or down according to demand • Per user, utility based pricing plans SECURE • End-to-end encryption, including a customer managed key • Global network of world-class data centers, ensuring data is stored in region according to local laws and regulations • Industry-leading cloud service audits and certifications
  • 18. 19 What’s New: Expanded Cloud Protection and Manageability Data Protection Software & Cloud • NetWorker with CloudBoost now protects applications running on the Microsoft Azure platform • Natively manage long term retention with Data Domain Cloud Tier directly from NetWorker 9.1 and Avamar 7.4 • Spanning Backup for Office 365 now available for customers within the EU
  • 19. 20 Protection delivered as you want it Best of Breed Converged Software Defined As-a-Service
  • 21. 22 Impact of cyber attacks 6 Minutes Time it takes to compromise an organization, 60% of the time $1.25M Average cost of 1M breached records $67K Average cost of 1,000 breached records 36% Lost data due to security breach 2,122 Confirmed data breaches in 2014
  • 22. 23 Advanced Protection Services - Isolated Recovery Solution - Dell EMC Service Offerings - RSA Security Analytics Additional Hardening & Protection Features - DPS Product Specific Hardening Guides - Encryption in Flight and/or at Rest - Retention Lock w/Separate Security officer credentials Layered cyber security for data protection Traditional Data Protection Best Practices - Layered data protection Deploy approach (“the continuum”) for more business critical systems - Always include a point in time off array independent backup with DR Replication (N+1) RISK
  • 23. 24 Most critical data first • Protect the “heartbeat” of the business first • Prioritize top applications or data sets to protect • Usually less than 10% of data (this is NOT DR!) • Start with a core set and build from there Compute Applications Validate & Store Highest Priority Data
  • 24. 25 Why Dell EMC for Data Protection • Data Protection Everywhere: One vendor delivering simplicity, flexibility, and investment protection • Market and technology leadership – #1 In Deduplication – #1 In Purpose Built Backup Appliances – #1 In Combined Data Protection Software & Storage – #1 In Replication – Isolated Recovery Solutions for protection against Ransomware • Unparalleled investment • $16.5B cumulative R&D investment, $17B in technology acquisitions • 4,000+ team members dedicated to helping our customers
  • 26. 28 Let’s get started Total Customer Experience Support Management Assess Design TCO/ROI Validate the Value
  • 27. 29 Where to find us at Dell EMC World • Solution Showcase – Data Protection in the Data Center Area – IT Transformation in the Dell Technologies Solutions Center – Dell Data Security Solution in the Security zone
  • 28. 30 More Dell EMC Data Protection Information EMC Storage and Data Protection Dell EMC Data Protection Community Data Protection on EMC.com Core Technologies Blog Mozy.com Spanning.com @DellEMCProtect