SlideShare uma empresa Scribd logo
1 de 37
1
Next Generation storage: eliminating the
guesswork and avoiding forklift upgrade!
Florian Malecki – International Product Marketing Director
Some of the challenges
© StorageCraft Technology Corporation. All rights reserved.3
6
Data Doubles Every Year Data Growth Rate Doubles Every 2 Years
IDC: Data growth rates now double every two years*
*IDC: The Digital Universe of Opportunities: Rich Data and the Increasing Value of the Internet of Things
10TB 20TB
40TB
80TB
10TB 20TB
640TB
1 2 3 4
80TB
0 2 4 6
Exponential data growth
© StorageCraft Technology Corporation. All rights reserved.4
Especially unstructured data
© StorageCraft Technology Corporation. All rights reserved.5
Associated risks with unstructured data
Unstructured data can be:
Courses, tests, results, research work, messages, emails, photos, videos or audio
recordings, etc.
There is a lot of confidential & personal information, IP etc. spread across an entire
organization’s infrastructure that is likely to attract hackers….
To better secure your crown jewels, you should look for solutions that protect against
cyber threats, but also safeguard data from those inside the organization.
Among others, key solutions must include:
• sufficient storage (and back up) that is future proofed and easily scalable
• encryption of sensitive data
© StorageCraft Technology Corporation. All rights reserved.6
Cyber threats aren’t going away…
$
Source: SonicWall 2016 Threat report and CSO Online
According to a report published by Gemalto in September 2017,
“the education sector had experienced 118 breaches (13% of all breaches)
that impacted a total of 32 million records. The jump in breaches from the
previous six months was significant at 103%. But the rise in the number of
records involved was monumental at 4,957%, increasing from 641,000
records
Compliance
© StorageCraft Technology Corporation. All rights reserved.8
GDPR –
May 25th
2018
© StorageCraft Technology Corporation. All rights reserved.9
Some of the GDPR Key Features
$
Article 32 of the General Data Protection Regulation (GDPR) requires Data Controllers and Data
Processors to implement technical and organizational measures that ensure a level of data security
appropriate for the level of risk presented by processing personal data.
Data security measures should, at a minimum, allow:
• Pseudonymizing or encrypting personal data
• Maintaining ongoing confidentiality, integrity, availability, access, and resilience of processing
systems and services
• Restoring the availability of and access to personal data, in the event of a physical or technical
security breach
• Testing and evaluating the effectiveness of technical and organization measures
Financial impacts
© StorageCraft Technology Corporation. All rights reserved.11
Large or Small, Downtime Hurts
© StorageCraft Technology Corporation. All rights reserved.12
451 survey: key storage pain points
$
Source: https://451research.com/blog/1659-featured-data
Top three storage pain points
- Data growth
- Meeting disaster-recovery requirements
- High costs
© StorageCraft Technology Corporation. All rights reserved.13
Inherent limitations of legacy RAID Scale-up storage
• Stuck with small or medium or large guestimate decision
• Controllers have fixed performance, capacity and
availability
• Everyone is guaranteed to over provision AND
under provision throughout the storage lifecycle
OR OR
© StorageCraft Technology Corporation. All rights reserved.14
Need to change the storage status-quo
$
BYOD, IoT, AI, ML
Business continuity
Compliance
Ransomware
Legacy storage
limitations
Costs
Need to rethink your existing
storage solutions
© StorageCraft Technology Corporation. All rights reserved.15
The Solution…
© StorageCraft Technology Corporation. All rights reserved.16
OneBlox – Eliminating the Guesswork
$
30 TB
• Complete flexibility to scale-out exactly with your storage needs
• Scale performance, capacity, and availability
• Exactly provision storage resources throughout the lifecycle
© StorageCraft Technology Corporation. All rights reserved.17
Santa Clara University
$
8000 students, 800 faculty
Unstructured data was growing exponentially
Difficult to predict capacity requirements
Expensive quotes from legacy vendors like Dell EMC
Senior Systems Administrator Tom Randazzo
“I was very concerned that we were going to buy a product that I would sell to my manager, my director, my CIO, that
we were going to bring in, it is going to cost $150,000 and 9 months down the road, oops, we undersized it.
Tomorrow you don’t know what is coming down the road”
“OneBlox marketing claims it takes 5mns to set up, and this is true….”
© StorageCraft Technology Corporation. All rights reserved.18
OneBlox’s Unique Scale-out Architecture
Traditional SAN
1 2 3
4 5 6
7 8 9
Block Store
Block Protocols
(iSCSI/FC)
File Protocols
(SMB/NFS)
Object Protocols
(RESTful APIs)
Object Store
Objects
A B C
D E F
G H I
Object Store
File Protocols
(SMB/NFS)
OneBlox
Files & Folders
Objects
A B C
D E F
G H I
Object Store
Traditional NAS
(layered over block store)
1 2 3
4 5 6
7 8 9
Files & Folders
Block Store
© StorageCraft Technology Corporation. All rights reserved.19
How do these objects work?
Data arrives into ring
© StorageCraft Technology Corporation. All rights reserved.20
How do these objects work?
Data arrives into ring
Data divided into objects
© StorageCraft Technology Corporation. All rights reserved.21
How do these objects work?
Data arrives into ring
Data divided into objects
Objects compressed
© StorageCraft Technology Corporation. All rights reserved.22
How do these objects work?
Data arrives into ring
Data divided into objects
Objects deduplicated
Objects distributed
Objects compressed
© StorageCraft Technology Corporation. All rights reserved.23
What happens when a drive fails?
© StorageCraft Technology Corporation. All rights reserved.24
Disk failure
RAID 5 (8+1) ou RAID 6 (8+2)
SpareHDD failure
HDD Failed Rebuild from the spare
Rebuild Time in RAID 5:
• 12 h mini for 1 TB without traffic & 24h with 50% of traffic
• 6 days to rebuild to 6 TB HDD
• 8 days to rebuild a 8 TB HDD
RAID 6 will bring lower performance: 10/20%
Object based – 3 copies compressed and deduplicated
HDD Failed Distributing Objects
Distributing objets:
• 3 copies of each objets
• Inline fixe or variable deduplication
• Compression
RAID OneBlox
© StorageCraft Technology Corporation. All rights reserved.25
Node failure
Failed Node Failed Node
RAID 5 (8+1) ou RAID 6 (8+2)
Spare
RAID OneBlox
Losing 2 nodes, still have to access to the dataFailed node controller will lose data
access to the others nodes
Object based – 3 copies compressed and deduplicatedHDD failure
© StorageCraft Technology Corporation. All rights reserved.26
Adding disks
Adding HDD
Adding HDD
RAID 5 (8+1) ou RAID 6 (8+2)
Spare Mode Objet – 3 copies dédupliquées et compréssées
RAID OneBlox
NO configuration
Immediately use storage when adding HDD
Automatic provisioning and distribution of objects
Multiple Choice:
• Create a new RAID
• Adding HDD to an existing RAID
© StorageCraft Technology Corporation. All rights reserved.27
Guarding Against Ransomware with OneBlox CDP
• Continuous Data Protection (CDP)
– Continuous snapshots every 10 seconds for the first hour
– Then hourly, daily, weekly and monthly—recovery weekly through the
first year and beyond
– Recovery can be as close to the infection as is possible
• OneBlox snapshots are immutable
– Fully protects the unstructured data stored on OneBlox
– Simply cannot be overwritten
• If a ransomware attack were to occur
– Attack would encrypt and corrupt the primary files
– Snapshots are completely unaffected and immune from deletions and
modifications
• Easily recover from Snapshots
– Recover individual files, folder, or complete network share
727
© StorageCraft Technology Corporation. All rights reserved.28
OneSystem
• OneSystem can be installed as a VM for private cloud-based
management
• Globally manage any OneBlox anywhere
• 24x 7 OneBlox proactive monitoring
– Storage health and alerts
– Remote replication
• Simple, yet powerful, storage management
– Zero configuration for adding storage and/or OneBlox
– Remote replication configuration is accomplished with three clicks
• Lights out management
– OneSystem
– web console
– remote management
© StorageCraft Technology Corporation. All rights reserved.29
Products: OneBlox 4312 and 5210
OneBlox 5210, all-flash 1U primary
storage appliance
OneBlox 4312, all-disk 2U secondary
storage appliance
• Scale-out Architecture
• Scale-out Storage for Virtual Environments
• Cloud-managed or onsite, Management Simplicity
• Inline De-duplication
• Continuous Data Protection
• Cost-effective Remote Replication
• 1U form factor
• 10 x 2.5" SDD drive slots
• Supports up to 3.8TB SSD
• Up to 38TB of raw capacity
• 4 x 10GbE and 2 x 1GbE
• 2U form factor
• 12 x 3.5” HDD drive slots
• Supports 1TB-8TB drives(Support
for 10-12TB Coming)
• Up to 96TB of raw capacity
• Mix and match SATA & SAS HDDs
• 2 x 10GbE and 2 x 1 GbE
© StorageCraft Technology Corporation. All rights reserved.30
Pricing - MSRP
OneBlox 4312 2x10GbE SFP+, 2x1GbE, NBD Srvc, 3 Year Warranty $ 15,154.10
OneSystem & OneBlox 4312 7x24 Support, NBD Service, 1 Yr $ 3,062.10
12 x 8TB HDD, 3 Yr Warranty $ 5,216.00
Total in $: 23,432 Gbp 16,500
© StorageCraft Technology Corporation. All rights reserved.31
OneBlox in the education sector
“With OneBlox’s technology we’ve achieved a new level of
data protection, scalability, and peace of mind. We can’t
recreate the data our researchers generate, and it needs to
be stored in perpetuity, so data protection is absolutely
critical for us. Not only are we protecting our Vmware
infrastructure with Veeam and OneBlox, we have been using
OneBlox to protect departments’ primary research data.”
Brandon Savage - MIT’s Plasma Science and Fusion Center
“The amount of time I’ve had to
spend managing storage has
been cut in half because it just
works!”
Brent Bain, Snr. IT coordinator
Unlaska City School District
© StorageCraft Technology Corporation. All rights reserved.32
ENTERPRISE HEALTHCARE TECHNOLOGY FINANCIAL
HIGHER EDUCATION LEGAL ENG & CONSTRUCTION STATE/LOCAL GOVT
OneBlox Marquees customers
About StorageCraft
Analytics
StorageCraft Solutions
 Grow on demand
 Feature rich
 Failure Resilient
 Simple to use
 Reliable Restore
 Instant Recovery
 Flexible Recovery
 DR as a Service
OneBlox Family ShadowProtect Family
©StorageCraft Technology Corporation. All rights reserved34
Powerful ProtectionCentrally Managed
DR as a Service Flexible Recovery
ShadowProtect Data Recovery Solution
 Hardware Independent Restore
 P2P / P2V / V2P / V2V restore
 Complete system recovery
 File/Folder recovery
 Granular Exchange Recovery
 Virtual failover
 Physical and Virtual machines
 Windows and Linux systems
 Application aware
 Complete data and system volume protection
 Full, incremental, continuous, manual backups
 Remote monitor/management
 Discovery and push install
 Policy-based administration
 Roll-up reports and dashboards
 Custom alerts/notifications
 Collapse and consolidate recovery points
 Purpose-built DR cloud solution
 Flexible recovery options
 Complete virtual failover with network support
 Simple, flexible, affordable
 99.999% uptime, 24/7 monitoring
 Tier-3 datacenter security standard
©StorageCraft Technology Corporation. All rights reserved35
End-to-End Data Management Solution
©StorageCraft Technology Corporation. All rights reserved36
Offsite
Cloud Recovery
3RD Party Cloud
Laptop / Desktops
Physical Servers
Virtual Environments
Primary Storage
Secondary Storage
© StorageCraft Technology Corporation. All rights reserved.37
Where Your Data Is:
Always Safe, Always Accessible,
Always Optimized.
©StorageCraft Technology Corporation. All rights reserved37

Mais conteúdo relacionado

Mais procurados

Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud SecurityLora O'Haver
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBlue Coat
 
Extend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureExtend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureFidelis Cybersecurity
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondCloudflare
 
The GDPR and What It Means to You
The GDPR and What It Means to YouThe GDPR and What It Means to You
The GDPR and What It Means to YouDelphix
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Lancope, Inc.
 
Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateWhy Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateDelphix
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPFidelis Cybersecurity
 
Service Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS MitigationService Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS MitigationCorero Network Security
 
Cybersecurity by the numbers
Cybersecurity by the numbersCybersecurity by the numbers
Cybersecurity by the numbersAPNIC
 
DDoS - a Modern Day Opportunity for Service Providers
DDoS - a Modern Day Opportunity for Service ProvidersDDoS - a Modern Day Opportunity for Service Providers
DDoS - a Modern Day Opportunity for Service ProvidersCorero Network Security
 
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE - ATT&CKcon
 
Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)Gerardo Pardo-Castellote
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyNexusguard
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityJisc
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersCloudflare
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chainFidelis Cybersecurity
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365Netskope
 

Mais procurados (20)

Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud Security
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat Protection
 
Extend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureExtend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in Azure
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
 
The GDPR and What It Means to You
The GDPR and What It Means to YouThe GDPR and What It Means to You
The GDPR and What It Means to You
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateWhy Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major Update
 
ION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLSION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLS
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
 
Service Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS MitigationService Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS Mitigation
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cybersecurity by the numbers
Cybersecurity by the numbersCybersecurity by the numbers
Cybersecurity by the numbers
 
DDoS - a Modern Day Opportunity for Service Providers
DDoS - a Modern Day Opportunity for Service ProvidersDDoS - a Modern Day Opportunity for Service Providers
DDoS - a Modern Day Opportunity for Service Providers
 
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
 
Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chain
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365
 

Semelhante a Next generation storage: eliminating the guesswork and avoiding forklift upgrade

BCLOUD: Smart Scale your Storage - festival ICT 2015
BCLOUD: Smart Scale your Storage - festival ICT 2015BCLOUD: Smart Scale your Storage - festival ICT 2015
BCLOUD: Smart Scale your Storage - festival ICT 2015festival ICT 2016
 
Webinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be BackupsWebinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be BackupsStorage Switzerland
 
DDN and Intel: Partnered for Exascale
DDN and Intel: Partnered for ExascaleDDN and Intel: Partnered for Exascale
DDN and Intel: Partnered for ExascaleIntel IT Center
 
Webinar NETGEAR - Storagecraft e Netgear: soluzioni per il backup e il disast...
Webinar NETGEAR - Storagecraft e Netgear: soluzioni per il backup e il disast...Webinar NETGEAR - Storagecraft e Netgear: soluzioni per il backup e il disast...
Webinar NETGEAR - Storagecraft e Netgear: soluzioni per il backup e il disast...Netgear Italia
 
Why 2015 is the Year of Copy Data - What are the requirements?
Why 2015 is the Year of Copy Data - What are the requirements?Why 2015 is the Year of Copy Data - What are the requirements?
Why 2015 is the Year of Copy Data - What are the requirements?Storage Switzerland
 
Denver devops : enabling DevOps with data virtualization
Denver devops : enabling DevOps with data virtualizationDenver devops : enabling DevOps with data virtualization
Denver devops : enabling DevOps with data virtualizationKyle Hailey
 
Webinar: Sizing Up Object Storage for the Enterprise
Webinar: Sizing Up Object Storage for the EnterpriseWebinar: Sizing Up Object Storage for the Enterprise
Webinar: Sizing Up Object Storage for the EnterpriseStorage Switzerland
 
Data core overview - haluk-final
Data core overview - haluk-finalData core overview - haluk-final
Data core overview - haluk-finalHaluk Ulubay
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!MarketingArrowECS_CZ
 
ArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDGaret Keller
 
Data Virtualization: revolutionizing database cloning
Data Virtualization: revolutionizing database cloningData Virtualization: revolutionizing database cloning
Data Virtualization: revolutionizing database cloningKyle Hailey
 
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...Netgear Italia
 
Webinar: SDS is Broken - And How to Fix it
Webinar: SDS is Broken - And How to Fix itWebinar: SDS is Broken - And How to Fix it
Webinar: SDS is Broken - And How to Fix itStorage Switzerland
 
Spectra Logic BlackPearl Developer Summit 2015
Spectra Logic BlackPearl Developer Summit 2015Spectra Logic BlackPearl Developer Summit 2015
Spectra Logic BlackPearl Developer Summit 2015spectralogic
 
S016825 ibm-cos-nola-v1710d
S016825 ibm-cos-nola-v1710dS016825 ibm-cos-nola-v1710d
S016825 ibm-cos-nola-v1710dTony Pearson
 
Agile Data: revolutionizing data and database cloning
Agile Data: revolutionizing data and database cloningAgile Data: revolutionizing data and database cloning
Agile Data: revolutionizing data and database cloningKyle Hailey
 
OpenDrives_-_Product_Sheet_v13D (2) (1)
OpenDrives_-_Product_Sheet_v13D (2) (1)OpenDrives_-_Product_Sheet_v13D (2) (1)
OpenDrives_-_Product_Sheet_v13D (2) (1)Scott Eiser
 
Inter connect2016 yss1841-cloud-storage-options-v4
Inter connect2016 yss1841-cloud-storage-options-v4Inter connect2016 yss1841-cloud-storage-options-v4
Inter connect2016 yss1841-cloud-storage-options-v4Tony Pearson
 
IBM System Storage TS7650G ProtecTIER Deduplication Gateway
IBM System Storage TS7650G ProtecTIER Deduplication GatewayIBM System Storage TS7650G ProtecTIER Deduplication Gateway
IBM System Storage TS7650G ProtecTIER Deduplication GatewayIBM India Smarter Computing
 

Semelhante a Next generation storage: eliminating the guesswork and avoiding forklift upgrade (20)

BCLOUD: Smart Scale your Storage - festival ICT 2015
BCLOUD: Smart Scale your Storage - festival ICT 2015BCLOUD: Smart Scale your Storage - festival ICT 2015
BCLOUD: Smart Scale your Storage - festival ICT 2015
 
Webinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be BackupsWebinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be Backups
 
DDN and Intel: Partnered for Exascale
DDN and Intel: Partnered for ExascaleDDN and Intel: Partnered for Exascale
DDN and Intel: Partnered for Exascale
 
Webinar NETGEAR - Storagecraft e Netgear: soluzioni per il backup e il disast...
Webinar NETGEAR - Storagecraft e Netgear: soluzioni per il backup e il disast...Webinar NETGEAR - Storagecraft e Netgear: soluzioni per il backup e il disast...
Webinar NETGEAR - Storagecraft e Netgear: soluzioni per il backup e il disast...
 
Why 2015 is the Year of Copy Data - What are the requirements?
Why 2015 is the Year of Copy Data - What are the requirements?Why 2015 is the Year of Copy Data - What are the requirements?
Why 2015 is the Year of Copy Data - What are the requirements?
 
Denver devops : enabling DevOps with data virtualization
Denver devops : enabling DevOps with data virtualizationDenver devops : enabling DevOps with data virtualization
Denver devops : enabling DevOps with data virtualization
 
Webinar: Sizing Up Object Storage for the Enterprise
Webinar: Sizing Up Object Storage for the EnterpriseWebinar: Sizing Up Object Storage for the Enterprise
Webinar: Sizing Up Object Storage for the Enterprise
 
Data core overview - haluk-final
Data core overview - haluk-finalData core overview - haluk-final
Data core overview - haluk-final
 
Oracle Storage a ochrana dat
Oracle Storage a ochrana datOracle Storage a ochrana dat
Oracle Storage a ochrana dat
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
ArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUD
 
Data Virtualization: revolutionizing database cloning
Data Virtualization: revolutionizing database cloningData Virtualization: revolutionizing database cloning
Data Virtualization: revolutionizing database cloning
 
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
 
Webinar: SDS is Broken - And How to Fix it
Webinar: SDS is Broken - And How to Fix itWebinar: SDS is Broken - And How to Fix it
Webinar: SDS is Broken - And How to Fix it
 
Spectra Logic BlackPearl Developer Summit 2015
Spectra Logic BlackPearl Developer Summit 2015Spectra Logic BlackPearl Developer Summit 2015
Spectra Logic BlackPearl Developer Summit 2015
 
S016825 ibm-cos-nola-v1710d
S016825 ibm-cos-nola-v1710dS016825 ibm-cos-nola-v1710d
S016825 ibm-cos-nola-v1710d
 
Agile Data: revolutionizing data and database cloning
Agile Data: revolutionizing data and database cloningAgile Data: revolutionizing data and database cloning
Agile Data: revolutionizing data and database cloning
 
OpenDrives_-_Product_Sheet_v13D (2) (1)
OpenDrives_-_Product_Sheet_v13D (2) (1)OpenDrives_-_Product_Sheet_v13D (2) (1)
OpenDrives_-_Product_Sheet_v13D (2) (1)
 
Inter connect2016 yss1841-cloud-storage-options-v4
Inter connect2016 yss1841-cloud-storage-options-v4Inter connect2016 yss1841-cloud-storage-options-v4
Inter connect2016 yss1841-cloud-storage-options-v4
 
IBM System Storage TS7650G ProtecTIER Deduplication Gateway
IBM System Storage TS7650G ProtecTIER Deduplication GatewayIBM System Storage TS7650G ProtecTIER Deduplication Gateway
IBM System Storage TS7650G ProtecTIER Deduplication Gateway
 

Mais de Jisc

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...Jisc
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxJisc
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxJisc
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Jisc
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...Jisc
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptxJisc
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxJisc
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxJisc
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxJisc
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJisc
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxJisc
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 

Mais de Jisc (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptx
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptx
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptx
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 

Último

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Último (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Next generation storage: eliminating the guesswork and avoiding forklift upgrade

  • 1. 1 Next Generation storage: eliminating the guesswork and avoiding forklift upgrade! Florian Malecki – International Product Marketing Director
  • 2. Some of the challenges
  • 3. © StorageCraft Technology Corporation. All rights reserved.3 6 Data Doubles Every Year Data Growth Rate Doubles Every 2 Years IDC: Data growth rates now double every two years* *IDC: The Digital Universe of Opportunities: Rich Data and the Increasing Value of the Internet of Things 10TB 20TB 40TB 80TB 10TB 20TB 640TB 1 2 3 4 80TB 0 2 4 6 Exponential data growth
  • 4. © StorageCraft Technology Corporation. All rights reserved.4 Especially unstructured data
  • 5. © StorageCraft Technology Corporation. All rights reserved.5 Associated risks with unstructured data Unstructured data can be: Courses, tests, results, research work, messages, emails, photos, videos or audio recordings, etc. There is a lot of confidential & personal information, IP etc. spread across an entire organization’s infrastructure that is likely to attract hackers…. To better secure your crown jewels, you should look for solutions that protect against cyber threats, but also safeguard data from those inside the organization. Among others, key solutions must include: • sufficient storage (and back up) that is future proofed and easily scalable • encryption of sensitive data
  • 6. © StorageCraft Technology Corporation. All rights reserved.6 Cyber threats aren’t going away… $ Source: SonicWall 2016 Threat report and CSO Online According to a report published by Gemalto in September 2017, “the education sector had experienced 118 breaches (13% of all breaches) that impacted a total of 32 million records. The jump in breaches from the previous six months was significant at 103%. But the rise in the number of records involved was monumental at 4,957%, increasing from 641,000 records
  • 8. © StorageCraft Technology Corporation. All rights reserved.8 GDPR – May 25th 2018
  • 9. © StorageCraft Technology Corporation. All rights reserved.9 Some of the GDPR Key Features $ Article 32 of the General Data Protection Regulation (GDPR) requires Data Controllers and Data Processors to implement technical and organizational measures that ensure a level of data security appropriate for the level of risk presented by processing personal data. Data security measures should, at a minimum, allow: • Pseudonymizing or encrypting personal data • Maintaining ongoing confidentiality, integrity, availability, access, and resilience of processing systems and services • Restoring the availability of and access to personal data, in the event of a physical or technical security breach • Testing and evaluating the effectiveness of technical and organization measures
  • 11. © StorageCraft Technology Corporation. All rights reserved.11 Large or Small, Downtime Hurts
  • 12. © StorageCraft Technology Corporation. All rights reserved.12 451 survey: key storage pain points $ Source: https://451research.com/blog/1659-featured-data Top three storage pain points - Data growth - Meeting disaster-recovery requirements - High costs
  • 13. © StorageCraft Technology Corporation. All rights reserved.13 Inherent limitations of legacy RAID Scale-up storage • Stuck with small or medium or large guestimate decision • Controllers have fixed performance, capacity and availability • Everyone is guaranteed to over provision AND under provision throughout the storage lifecycle OR OR
  • 14. © StorageCraft Technology Corporation. All rights reserved.14 Need to change the storage status-quo $ BYOD, IoT, AI, ML Business continuity Compliance Ransomware Legacy storage limitations Costs Need to rethink your existing storage solutions
  • 15. © StorageCraft Technology Corporation. All rights reserved.15 The Solution…
  • 16. © StorageCraft Technology Corporation. All rights reserved.16 OneBlox – Eliminating the Guesswork $ 30 TB • Complete flexibility to scale-out exactly with your storage needs • Scale performance, capacity, and availability • Exactly provision storage resources throughout the lifecycle
  • 17. © StorageCraft Technology Corporation. All rights reserved.17 Santa Clara University $ 8000 students, 800 faculty Unstructured data was growing exponentially Difficult to predict capacity requirements Expensive quotes from legacy vendors like Dell EMC Senior Systems Administrator Tom Randazzo “I was very concerned that we were going to buy a product that I would sell to my manager, my director, my CIO, that we were going to bring in, it is going to cost $150,000 and 9 months down the road, oops, we undersized it. Tomorrow you don’t know what is coming down the road” “OneBlox marketing claims it takes 5mns to set up, and this is true….”
  • 18. © StorageCraft Technology Corporation. All rights reserved.18 OneBlox’s Unique Scale-out Architecture Traditional SAN 1 2 3 4 5 6 7 8 9 Block Store Block Protocols (iSCSI/FC) File Protocols (SMB/NFS) Object Protocols (RESTful APIs) Object Store Objects A B C D E F G H I Object Store File Protocols (SMB/NFS) OneBlox Files & Folders Objects A B C D E F G H I Object Store Traditional NAS (layered over block store) 1 2 3 4 5 6 7 8 9 Files & Folders Block Store
  • 19. © StorageCraft Technology Corporation. All rights reserved.19 How do these objects work? Data arrives into ring
  • 20. © StorageCraft Technology Corporation. All rights reserved.20 How do these objects work? Data arrives into ring Data divided into objects
  • 21. © StorageCraft Technology Corporation. All rights reserved.21 How do these objects work? Data arrives into ring Data divided into objects Objects compressed
  • 22. © StorageCraft Technology Corporation. All rights reserved.22 How do these objects work? Data arrives into ring Data divided into objects Objects deduplicated Objects distributed Objects compressed
  • 23. © StorageCraft Technology Corporation. All rights reserved.23 What happens when a drive fails?
  • 24. © StorageCraft Technology Corporation. All rights reserved.24 Disk failure RAID 5 (8+1) ou RAID 6 (8+2) SpareHDD failure HDD Failed Rebuild from the spare Rebuild Time in RAID 5: • 12 h mini for 1 TB without traffic & 24h with 50% of traffic • 6 days to rebuild to 6 TB HDD • 8 days to rebuild a 8 TB HDD RAID 6 will bring lower performance: 10/20% Object based – 3 copies compressed and deduplicated HDD Failed Distributing Objects Distributing objets: • 3 copies of each objets • Inline fixe or variable deduplication • Compression RAID OneBlox
  • 25. © StorageCraft Technology Corporation. All rights reserved.25 Node failure Failed Node Failed Node RAID 5 (8+1) ou RAID 6 (8+2) Spare RAID OneBlox Losing 2 nodes, still have to access to the dataFailed node controller will lose data access to the others nodes Object based – 3 copies compressed and deduplicatedHDD failure
  • 26. © StorageCraft Technology Corporation. All rights reserved.26 Adding disks Adding HDD Adding HDD RAID 5 (8+1) ou RAID 6 (8+2) Spare Mode Objet – 3 copies dédupliquées et compréssées RAID OneBlox NO configuration Immediately use storage when adding HDD Automatic provisioning and distribution of objects Multiple Choice: • Create a new RAID • Adding HDD to an existing RAID
  • 27. © StorageCraft Technology Corporation. All rights reserved.27 Guarding Against Ransomware with OneBlox CDP • Continuous Data Protection (CDP) – Continuous snapshots every 10 seconds for the first hour – Then hourly, daily, weekly and monthly—recovery weekly through the first year and beyond – Recovery can be as close to the infection as is possible • OneBlox snapshots are immutable – Fully protects the unstructured data stored on OneBlox – Simply cannot be overwritten • If a ransomware attack were to occur – Attack would encrypt and corrupt the primary files – Snapshots are completely unaffected and immune from deletions and modifications • Easily recover from Snapshots – Recover individual files, folder, or complete network share 727
  • 28. © StorageCraft Technology Corporation. All rights reserved.28 OneSystem • OneSystem can be installed as a VM for private cloud-based management • Globally manage any OneBlox anywhere • 24x 7 OneBlox proactive monitoring – Storage health and alerts – Remote replication • Simple, yet powerful, storage management – Zero configuration for adding storage and/or OneBlox – Remote replication configuration is accomplished with three clicks • Lights out management – OneSystem – web console – remote management
  • 29. © StorageCraft Technology Corporation. All rights reserved.29 Products: OneBlox 4312 and 5210 OneBlox 5210, all-flash 1U primary storage appliance OneBlox 4312, all-disk 2U secondary storage appliance • Scale-out Architecture • Scale-out Storage for Virtual Environments • Cloud-managed or onsite, Management Simplicity • Inline De-duplication • Continuous Data Protection • Cost-effective Remote Replication • 1U form factor • 10 x 2.5" SDD drive slots • Supports up to 3.8TB SSD • Up to 38TB of raw capacity • 4 x 10GbE and 2 x 1GbE • 2U form factor • 12 x 3.5” HDD drive slots • Supports 1TB-8TB drives(Support for 10-12TB Coming) • Up to 96TB of raw capacity • Mix and match SATA & SAS HDDs • 2 x 10GbE and 2 x 1 GbE
  • 30. © StorageCraft Technology Corporation. All rights reserved.30 Pricing - MSRP OneBlox 4312 2x10GbE SFP+, 2x1GbE, NBD Srvc, 3 Year Warranty $ 15,154.10 OneSystem & OneBlox 4312 7x24 Support, NBD Service, 1 Yr $ 3,062.10 12 x 8TB HDD, 3 Yr Warranty $ 5,216.00 Total in $: 23,432 Gbp 16,500
  • 31. © StorageCraft Technology Corporation. All rights reserved.31 OneBlox in the education sector “With OneBlox’s technology we’ve achieved a new level of data protection, scalability, and peace of mind. We can’t recreate the data our researchers generate, and it needs to be stored in perpetuity, so data protection is absolutely critical for us. Not only are we protecting our Vmware infrastructure with Veeam and OneBlox, we have been using OneBlox to protect departments’ primary research data.” Brandon Savage - MIT’s Plasma Science and Fusion Center “The amount of time I’ve had to spend managing storage has been cut in half because it just works!” Brent Bain, Snr. IT coordinator Unlaska City School District
  • 32. © StorageCraft Technology Corporation. All rights reserved.32 ENTERPRISE HEALTHCARE TECHNOLOGY FINANCIAL HIGHER EDUCATION LEGAL ENG & CONSTRUCTION STATE/LOCAL GOVT OneBlox Marquees customers
  • 34. Analytics StorageCraft Solutions  Grow on demand  Feature rich  Failure Resilient  Simple to use  Reliable Restore  Instant Recovery  Flexible Recovery  DR as a Service OneBlox Family ShadowProtect Family ©StorageCraft Technology Corporation. All rights reserved34
  • 35. Powerful ProtectionCentrally Managed DR as a Service Flexible Recovery ShadowProtect Data Recovery Solution  Hardware Independent Restore  P2P / P2V / V2P / V2V restore  Complete system recovery  File/Folder recovery  Granular Exchange Recovery  Virtual failover  Physical and Virtual machines  Windows and Linux systems  Application aware  Complete data and system volume protection  Full, incremental, continuous, manual backups  Remote monitor/management  Discovery and push install  Policy-based administration  Roll-up reports and dashboards  Custom alerts/notifications  Collapse and consolidate recovery points  Purpose-built DR cloud solution  Flexible recovery options  Complete virtual failover with network support  Simple, flexible, affordable  99.999% uptime, 24/7 monitoring  Tier-3 datacenter security standard ©StorageCraft Technology Corporation. All rights reserved35
  • 36. End-to-End Data Management Solution ©StorageCraft Technology Corporation. All rights reserved36 Offsite Cloud Recovery 3RD Party Cloud Laptop / Desktops Physical Servers Virtual Environments Primary Storage Secondary Storage
  • 37. © StorageCraft Technology Corporation. All rights reserved.37 Where Your Data Is: Always Safe, Always Accessible, Always Optimized. ©StorageCraft Technology Corporation. All rights reserved37

Notas do Editor

  1. Examples of unstructured data Email messages, instant messages, text messages... Text files, including Word documents, PDFs, and other files such as books, letters, written documents, audio and video transcripts... PowerPoints and SlideShare presentations Audio files of music, voicemails, customer service recordings... Video files that include movies, personal videos, YouTube uploads... Images of pictures, illustrations, memes...
  2. Establishing a sophisticated, central repository for the crown jewels, including granular security including authentication, access tiers and controlled permissions Supporting sufficient storage and backup for the crown jewels database Enabling tracking for which employees are placing information in that repository and accessing data stored there Encryption of sensitive documents Implementing Secure Socket Layer (SSL) protocol, which manages authentication and encrypted communication between users in a network Using security information and event management (SIEM) tools to analyze security activity in real-time Password protecting devices and keeping passwords protected and separate from encrypted documents Employing remote access to wipe and locate lost or stolen devices Training employees on policies, procedures and safeguards to ensure widespread adoption and enforcement of programs
  3. I introduce this next step before I click the first time After clicking, it’s good to show them how three copies are written, for redundancy – allowing two drives to fail without losing data. Either here or later, it can be useful to describe how these writes are essentially random, based on the object ID, but are always to three different locations.
  4. I introduce this next step before I click the first time After clicking, it’s good to show them how three copies are written, for redundancy – allowing two drives to fail without losing data. Either here or later, it can be useful to describe how these writes are essentially random, based on the object ID, but are always to three different locations.
  5. I introduce this next step before I click the first time After clicking, it’s good to show them how three copies are written, for redundancy – allowing two drives to fail without losing data. Either here or later, it can be useful to describe how these writes are essentially random, based on the object ID, but are always to three different locations.
  6. I introduce this next step before I click the first time After clicking, it’s good to show them how three copies are written, for redundancy – allowing two drives to fail without losing data. Either here or later, it can be useful to describe how these writes are essentially random, based on the object ID, but are always to three different locations.
  7. The setup is pretty easy, but the first click shows just the drive failure. The data shows as there still, giving an opportunity to stress that the data is gone on the second click. Before the third click, it’s important to stress that it’s only necessary to copy the objects necessary to ensure three copies of them on different devices. Contrast this with the overhead of reading every single sector in a RAID array and then writing to every single sector on a replacement disk. The third click then re-enforces this message. Next comes the drive rebuild. Discuss the drive being replaced as you click the first time here. Then describe how we just need to copy the objects necessary to balance the data and ensure maximum data protection. Once you’ve setup the message, click again to make it visual.
  8. I introduce this next step before I click the first time After clicking, it’s good to show them how three copies are written, for redundancy – allowing two drives to fail without losing data. Either here or later, it can be useful to describe how these writes are essentially random, based on the object ID, but are always to three different locations.
  9. I introduce this next step before I click the first time After clicking, it’s good to show them how three copies are written, for redundancy – allowing two drives to fail without losing data. Either here or later, it can be useful to describe how these writes are essentially random, based on the object ID, but are always to three different locations.
  10. I introduce this next step before I click the first time After clicking, it’s good to show them how three copies are written, for redundancy – allowing two drives to fail without losing data. Either here or later, it can be useful to describe how these writes are essentially random, based on the object ID, but are always to three different locations.
  11. OneBlox 5210 & OneBlox 4312 Scale-out Architecture: OneBlox employs a seamless scale-out Ring architecture supporting multiple OneBlox appliances presenting a single global file system. A Ring may consist of one or multiple OneBlox, scaling from a few TBs to hundreds of TBs of raw flash or multiple PBs of hard-drive storage capacity. As business storage requirements change, OneBlox is extremely agile; simply add any number of drives, at any time, and in any capacity granularity to meet your storage requirements. OneBlox simply grows the global storage pool with zero configuration and no application downtime. Scale-out Storage for Virtual Environments: OneBlox uniquely supports VMware and Hyper-V environments by enabling virtual machines to utilize scale-out NFS datastores. Consolidate multiple NFS datastores in a single OneBlox Ring and scale to hundreds of TBs with OneBlox’s advanced data reduction. Need high performance? OneBlox 5210 is an all-flash array for consolidating performance hungry virtual machines. Need more capacity? Simply scale-out OneBlox by adding drives or OneBlox and the virtual servers instantly see additional storage capacity--with zero configuration. OneBlox 5210 Dynamic Growth: Bring your own drives—HDDs and select SSDs from the compatability guide. No RAID, no LUNs, no volumes. OneBlox delivers the flexibility for organizations to mix-and-match drive types (SATA, SAS) and drive capacity within the same OneBlox and within a OneBlox Ring. Purchase exactly the capacity your organization needs at the beginning and then in the future, increase capacity by mixing and matching any number of additional drives. OneBlox automatically pools the new storage within the existing global storage pool. No disruption to applications or users. No configuration settings to complete. No mouse clicks. No command line entries. No storage PhD required. Flexible Multi-Site Replication: Implement disaster recovery with asynchronous multi-site replication. Employ a flexible one-to-one, one-to-many, many-to-one bi-directional replication architecture with multiple OneBlox rings. Implement exactly the configuration that suits the business needs of geographically distributed environments. Only deduplicated and compressed data is replicated, ensuring the transfer is very bandwidth efficient. Other vendors require the source and target storage infrastructure to be identical. OneBlox by StorageCraft does not impose any such restrictions for the utmost flexibility. Zero Configuration: Ease of use is not an afterthought with OneBlox. OneBlox is easily can be installed in less than 15 minutes, provisioned and available to serve data with zero configuration. Simply insert at least two drives, plug in Ethernet, and power it on. It’s that easy. Need to add more storage? Simply add drives and the capacity is added to the same global storage pool. Need to add availability or performance? With no interruption to applications or users, additional OneBlox nodes can be added and automatically configured, enabling organizations non-disruptive scalability with their business. Always-On Information: OneBlox by StorageCraft’s distributed file system is built on top of a fine-grained content-addressable distributed object store with a hashed ring architecture that has small but variable-sized immutable objects as its foundation. This underlying technology allows OneBlox Ring to fully protect the stored information without legacy RAID technologies. OneBlox transparently replicates and intelligently distributes the data objects across multiple drives within a failure domain and protects against drive or OneBlox failures. In case of failure, data objects are redistributed and rebalanced to ensure full protection. OneBlox 4312 Cloud-based Management: OneSystem is a secure cloud-based management platform that proactively monitors, reports, and manages OneBlox in any location and from any browser. Eliminating the need for dedicated servers and time consuming software upgrades, simply login and gain the necessary insight into your storage infrastructure. Whether you have responsibility for a single location or multiple locations, OneSystem’s administration capabilities empower you to manage the entire storage infrastructure. Simply and securely. Continuous Data Protection: OneBlox’s continuous data protection ensures that all of the information stored is fully protected. By taking continuous and unlimited snapshots of information written to OneBlox, every file can be easily recovered in the event of data corruption, deletion, or other errors. In fact, end users can recover their own information, simply by navigating through Mac Finder or Windows Explorer. No need to restore information from last night’s backup, simply browse and recover. Always-on Information: With its real-time replication, information stored in a OneBlox ring is fully protected. By avoiding legacy RAID technologies, OneBlox is able to transparently replicate and redistribute the data across multiple drives and OneBlox to protect against two drive or OneBlox failures. Additionally, with its advanced architecture, information is protected against an entire ring failure when replication over wide-area distances is implemented. OneBlox grows with your business’ data protection requirements without requiring costly downtime, reconfiguration, or forklift upgrades.