0% found this document useful (0 votes)
91 views29 pages

Cloud DR Strategy

This document provides an overview of Dell EMC's data protection solutions. It discusses the need to protect data across traditional and next-gen apps, on-premises and cloud environments. It then summarizes Dell EMC's data protection portfolio including Data Protection software, Protection Storage solutions like Data Domain, and capabilities like protecting data in the cloud and continuous data protection. The document highlights key metrics about Dell EMC's large data protection business and customer impact of data loss and security breaches.

Uploaded by

sunita
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views29 pages

Cloud DR Strategy

This document provides an overview of Dell EMC's data protection solutions. It discusses the need to protect data across traditional and next-gen apps, on-premises and cloud environments. It then summarizes Dell EMC's data protection portfolio including Data Protection software, Protection Storage solutions like Data Domain, and capabilities like protecting data in the cloud and continuous data protection. The document highlights key metrics about Dell EMC's large data protection business and customer impact of data loss and security breaches.

Uploaded by

sunita
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

MT44

Dell EMC Data Protection:


What you need to know about data
protection everywhere
Garrett Van Siclen, Data Protection Evangelist
A tale of two worlds
Traditional Apps Next Gen Apps
IT Developers
On Premise Cloud

You need both


for trust and agility

2
Protecting all consumption models

On premises Virtual Hybrid Cloud-born

Protecting data wherever it lives


3
Dell EMC modern data center strategy
PROTECTION AND TRUST
Security/Governance – Data protection – Services/Support

Reduce costs (# Of Drives, Power, Floor Space. Etc.)


FLASH
Consistent and predictable performance

Lower entry costs and scale as you grow


SCALE-OUT Manage massive capacity with fewer resources

SOFTWARE Automated provisioning and business agility


DEFINED Flexible and programmable data services

CLOUD Policy driven service delivery


ENABLED On/Off premises data and/or application mobility

4
Are you protected?
73%
$914K Unable to keep
Average cost of pace with Flash
data loss
82%
2.36T Unprepared for
Data loss future business
challenges

90% 50%
Laggards or
Evaluators Unprotected in the
Cloud
Global Data Protection Index
5
Dell EMC Data Protection by the numbers
• World’s largest data protection company
• Leader in both Gartner Backup Magic Quadrants
• Share leader in purpose built backup appliances
• 70,000+ systems shipped and installed
• 4,000+ data protection solution employees

6
Dell EMC Data Protection Continuum
Availability, replication, backup and archive

COMPLEMENTARY TIERS TO MEET ANY


RECOVERY REQUIREMENT
DATA AVAILABILITY DATA DURABILITY

Availability Replication Snapshot Backup Archive

Zero Seconds Minutes Hours


7
Meeting recovery objectives
Access anywhere stretched storage volumes
CONTINUOUS
AVAILABILITY

CONTINUOUS Recovery to any point-in-time


PROTECTION
LOCAL OR REMOTE

Recovery points between backups


SNAPSHOTS
HOURLY
12AM 6AM 12PM 6PM 12AM

Isilon
Copies on capacity optimized protection storage
BACKUPS
DAILY
MONDAY TUESDAY

8
Protection Storage
Why Dell EMC Protection Storage
EFFICIENT
• Protect more data, industry-leading speed and scale
• Reduce storage required by 10–30x

RELIABLE
• End-to-end data verification, fault detection, and self healing

FLEXIBLE
• Integrates with industry leading applications
• Integrates directly with primary storage
• Software defined

CLOUD-ENABLED
• Natively tier deduplicated data to the cloud for modern LTR
• Deliver Data Protection as a Service with logical data isolation

11
Transformed Data Domain
New Systems Flash-Enabled Performance and Instant Access

• Category shattering speed and scale


– 7x more scalable and 1.5x faster
– 20x faster instant access and restore of VMs
– High availability from the midmarket to the enterprise

• Data Domain Operating System 6.0


– DD Boost Everywhere, benefits expand to new markets
– Enabled to tier data to cloud storage
– Secure Multi-Tenancy Updates

• Data Domain Virtual Edition 3.0


– Enhanced scale and Hyper-V support
– Qualified with Dell PowerEdge Servers
12
Protection Software
Why Dell EMC Protection Software
COMPREHENSIVE PROTECTION
• Delivers protection across the data protection continuum
• Covers all consumption models
• Backup WITHIN the public cloud or use for secure long-term
retention

FLEXIBLE
• 5 purpose-built offerings, designed for a variety of
requirements
• Supports a wide range of protection technologies
• Delivers application owner and IT visibility & control

HIGH PERFORMANCE
• Up to 20x faster backups, 30x faster image-level recovery
• Industry’s tightest integration with Data Domain
• Reduce backup storage requirements by up to 38x
• Reduces network traffic by up to 99%
• Reduces backup times by up to 50%
14
Dell EMC Protection Software
Packaged To Meet Your Data Protection Requirements

Comprehensive data protection for the modern data center

15
Cloud and Data Protection

EXTEND MOVE BORN


TO CLOUD TO CLOUD IN CLOUD

16
Cloud use cases for data protection
Long Term
Retention Direct to Cloud DR as a Service IaaS Protection

PROTECTION
CLIENT STORAGE

• Extended storage • Back up directly to • Outsource replication to • Protects virtual


provisioning via the cloud, or via edge cache a Service Provider workloads and storage
cloud (ROBO) in the cloud
Benefit
• Intended for small
Benefit • No DR site required Benefit
amounts of data with
• Tape Replacement • Easy fire drills • Prevents cloud work
flexible RTO SLAs
• Infinitely Scalable • Aligns DR readiness to loads against data
• Low Cost Benefit pay as you go model corruption
• Remote manageability
• Direct Restore
• Low On-Prem Footprint

17
Dell EMC Cloud Data Protection Software
COMPREHENSIVE PROTECTION
• Direct-to-cloud backup for desktops, laptops, & remote offices
• Born-in-cloud protection for fast growing enterprise SaaS
applications including Office 365, Salesforce, & Google Apps
• Cloud enablement for Long-Term Retention

SECURE
• End-to-end encryption, including a customer managed key
• Global network of world-class data centers, ensuring data is
stored in region according to local laws and regulations
• Industry-leading cloud service audits and certifications

FLEXIBLE
• Deployment time measured in minutes or hours, not weeks or
months
• Doesn’t require additional capital expense for hardware
• Easily scale resources up or down according to demand
• Per user, utility based pricing plans
18
Data Protection Software & Cloud
What’s New: Expanded Cloud Protection and Manageability

• NetWorker with CloudBoost now protects


applications running on the Microsoft Azure platform

• Natively manage long term retention with Data


Domain Cloud Tier directly from NetWorker 9.1 and
Avamar 7.4

• Spanning Backup for Office 365 now available for


customers within the EU

19
Protection delivered as you want it

Best of Breed Converged Software Defined As-a-Service

20
Isolated Recovery
Solutions
Impact of cyber attacks
6 Minutes $67K
Average cost of
Time it takes to
1,000 breached
compromise an
records
organization, 60%
of the time
36%
Lost data due to
security breach
$1.25M
Average cost of
1M breached 2,122
records Confirmed data
breaches in 2014

22
Layered cyber security for data protection
Traditional Data Protection Best Practices
- Layered data protection Deploy approach (“the
continuum”) for more business critical systems
- Always include a point in time off array independent
backup with DR Replication (N+1)

Additional Hardening & Protection Features


- DPS Product Specific Hardening Guides
- Encryption in Flight and/or at Rest
- Retention Lock w/Separate Security officer credentials

Advanced Protection Services


- Isolated Recovery Solution
- Dell EMC Service Offerings
RISK - RSA Security Analytics

23
Most critical data first
Compute

• Protect the “heartbeat” of


the business first Applications

• Prioritize top applications or


data sets to protect Validate &
Store
• Usually less than 10% of
data (this is NOT DR!)
• Start with a core set and Highest
Priority Data
build from there

24
Why Dell EMC for Data Protection

• Data Protection Everywhere: One vendor delivering simplicity, flexibility, and


investment protection
• Market and technology leadership
– #1 In Deduplication
– #1 In Purpose Built Backup Appliances
– #1 In Combined Data Protection Software & Storage
– #1 In Replication
– Isolated Recovery Solutions for protection against Ransomware
• Unparalleled investment
• $16.5B cumulative R&D investment, $17B in technology acquisitions
• 4,000+ team members dedicated to helping our customers

25
Helping customers transform

26
Let’s get started

Total Customer Experience


Validate
Assess Design TCO/ROI
the Value

Support Management

28
Where to find us at Dell EMC World

• Solution Showcase
– Data Protection in the Data Center Area
– IT Transformation in the Dell Technologies Solutions Center
– Dell Data Security Solution in the Security zone

29
More Dell EMC Data Protection Information

@DellEMCProtect
EMC Storage and Data Protection
Dell EMC Data Protection Community
Data Protection on EMC.com
Core Technologies Blog
Mozy.com
Spanning.com

30

You might also like