MT44
Dell EMC Data Protection:
What you need to know about data
protection everywhere
Garrett Van Siclen, Data Protection Evangelist
A tale of two worlds
Traditional Apps Next Gen Apps
IT Developers
On Premise Cloud
You need both
for trust and agility
2
Protecting all consumption models
On premises Virtual Hybrid Cloud-born
Protecting data wherever it lives
3
Dell EMC modern data center strategy
PROTECTION AND TRUST
Security/Governance – Data protection – Services/Support
Reduce costs (# Of Drives, Power, Floor Space. Etc.)
FLASH
Consistent and predictable performance
Lower entry costs and scale as you grow
SCALE-OUT Manage massive capacity with fewer resources
SOFTWARE Automated provisioning and business agility
DEFINED Flexible and programmable data services
CLOUD Policy driven service delivery
ENABLED On/Off premises data and/or application mobility
4
Are you protected?
73%
$914K Unable to keep
Average cost of pace with Flash
data loss
82%
2.36T Unprepared for
Data loss future business
challenges
90% 50%
Laggards or
Evaluators Unprotected in the
Cloud
Global Data Protection Index
5
Dell EMC Data Protection by the numbers
• World’s largest data protection company
• Leader in both Gartner Backup Magic Quadrants
• Share leader in purpose built backup appliances
• 70,000+ systems shipped and installed
• 4,000+ data protection solution employees
6
Dell EMC Data Protection Continuum
Availability, replication, backup and archive
COMPLEMENTARY TIERS TO MEET ANY
RECOVERY REQUIREMENT
DATA AVAILABILITY DATA DURABILITY
Availability Replication Snapshot Backup Archive
Zero Seconds Minutes Hours
7
Meeting recovery objectives
Access anywhere stretched storage volumes
CONTINUOUS
AVAILABILITY
CONTINUOUS Recovery to any point-in-time
PROTECTION
LOCAL OR REMOTE
Recovery points between backups
SNAPSHOTS
HOURLY
12AM 6AM 12PM 6PM 12AM
Isilon
Copies on capacity optimized protection storage
BACKUPS
DAILY
MONDAY TUESDAY
8
Protection Storage
Why Dell EMC Protection Storage
EFFICIENT
• Protect more data, industry-leading speed and scale
• Reduce storage required by 10–30x
RELIABLE
• End-to-end data verification, fault detection, and self healing
FLEXIBLE
• Integrates with industry leading applications
• Integrates directly with primary storage
• Software defined
CLOUD-ENABLED
• Natively tier deduplicated data to the cloud for modern LTR
• Deliver Data Protection as a Service with logical data isolation
11
Transformed Data Domain
New Systems Flash-Enabled Performance and Instant Access
• Category shattering speed and scale
– 7x more scalable and 1.5x faster
– 20x faster instant access and restore of VMs
– High availability from the midmarket to the enterprise
• Data Domain Operating System 6.0
– DD Boost Everywhere, benefits expand to new markets
– Enabled to tier data to cloud storage
– Secure Multi-Tenancy Updates
• Data Domain Virtual Edition 3.0
– Enhanced scale and Hyper-V support
– Qualified with Dell PowerEdge Servers
12
Protection Software
Why Dell EMC Protection Software
COMPREHENSIVE PROTECTION
• Delivers protection across the data protection continuum
• Covers all consumption models
• Backup WITHIN the public cloud or use for secure long-term
retention
FLEXIBLE
• 5 purpose-built offerings, designed for a variety of
requirements
• Supports a wide range of protection technologies
• Delivers application owner and IT visibility & control
HIGH PERFORMANCE
• Up to 20x faster backups, 30x faster image-level recovery
• Industry’s tightest integration with Data Domain
• Reduce backup storage requirements by up to 38x
• Reduces network traffic by up to 99%
• Reduces backup times by up to 50%
14
Dell EMC Protection Software
Packaged To Meet Your Data Protection Requirements
Comprehensive data protection for the modern data center
15
Cloud and Data Protection
EXTEND MOVE BORN
TO CLOUD TO CLOUD IN CLOUD
16
Cloud use cases for data protection
Long Term
Retention Direct to Cloud DR as a Service IaaS Protection
PROTECTION
CLIENT STORAGE
• Extended storage • Back up directly to • Outsource replication to • Protects virtual
provisioning via the cloud, or via edge cache a Service Provider workloads and storage
cloud (ROBO) in the cloud
Benefit
• Intended for small
Benefit • No DR site required Benefit
amounts of data with
• Tape Replacement • Easy fire drills • Prevents cloud work
flexible RTO SLAs
• Infinitely Scalable • Aligns DR readiness to loads against data
• Low Cost Benefit pay as you go model corruption
• Remote manageability
• Direct Restore
• Low On-Prem Footprint
17
Dell EMC Cloud Data Protection Software
COMPREHENSIVE PROTECTION
• Direct-to-cloud backup for desktops, laptops, & remote offices
• Born-in-cloud protection for fast growing enterprise SaaS
applications including Office 365, Salesforce, & Google Apps
• Cloud enablement for Long-Term Retention
SECURE
• End-to-end encryption, including a customer managed key
• Global network of world-class data centers, ensuring data is
stored in region according to local laws and regulations
• Industry-leading cloud service audits and certifications
FLEXIBLE
• Deployment time measured in minutes or hours, not weeks or
months
• Doesn’t require additional capital expense for hardware
• Easily scale resources up or down according to demand
• Per user, utility based pricing plans
18
Data Protection Software & Cloud
What’s New: Expanded Cloud Protection and Manageability
• NetWorker with CloudBoost now protects
applications running on the Microsoft Azure platform
• Natively manage long term retention with Data
Domain Cloud Tier directly from NetWorker 9.1 and
Avamar 7.4
• Spanning Backup for Office 365 now available for
customers within the EU
19
Protection delivered as you want it
Best of Breed Converged Software Defined As-a-Service
20
Isolated Recovery
Solutions
Impact of cyber attacks
6 Minutes $67K
Average cost of
Time it takes to
1,000 breached
compromise an
records
organization, 60%
of the time
36%
Lost data due to
security breach
$1.25M
Average cost of
1M breached 2,122
records Confirmed data
breaches in 2014
22
Layered cyber security for data protection
Traditional Data Protection Best Practices
- Layered data protection Deploy approach (“the
continuum”) for more business critical systems
- Always include a point in time off array independent
backup with DR Replication (N+1)
Additional Hardening & Protection Features
- DPS Product Specific Hardening Guides
- Encryption in Flight and/or at Rest
- Retention Lock w/Separate Security officer credentials
Advanced Protection Services
- Isolated Recovery Solution
- Dell EMC Service Offerings
RISK - RSA Security Analytics
23
Most critical data first
Compute
• Protect the “heartbeat” of
the business first Applications
• Prioritize top applications or
data sets to protect Validate &
Store
• Usually less than 10% of
data (this is NOT DR!)
• Start with a core set and Highest
Priority Data
build from there
24
Why Dell EMC for Data Protection
• Data Protection Everywhere: One vendor delivering simplicity, flexibility, and
investment protection
• Market and technology leadership
– #1 In Deduplication
– #1 In Purpose Built Backup Appliances
– #1 In Combined Data Protection Software & Storage
– #1 In Replication
– Isolated Recovery Solutions for protection against Ransomware
• Unparalleled investment
• $16.5B cumulative R&D investment, $17B in technology acquisitions
• 4,000+ team members dedicated to helping our customers
25
Helping customers transform
26
Let’s get started
Total Customer Experience
Validate
Assess Design TCO/ROI
the Value
Support Management
28
Where to find us at Dell EMC World
• Solution Showcase
– Data Protection in the Data Center Area
– IT Transformation in the Dell Technologies Solutions Center
– Dell Data Security Solution in the Security zone
29
More Dell EMC Data Protection Information
@DellEMCProtect
EMC Storage and Data Protection
Dell EMC Data Protection Community
Data Protection on EMC.com
Core Technologies Blog
Mozy.com
Spanning.com
30