Data Protection Everywhere For the modern data center Syed Saleem Advisory Systems Engineer
Pillars of the modern data center Protection and trust Security/Governance Encryption Data Protection Services/Support Flash Cloud-enabled Scale-out Software-defined Reduce costs (# of drives, power, floor space, etc.) Consistent and predictable performance Policy driven service delivery On/off premises data and/or application mobility Lower entry costs and scale as you grow Manage massive capacity with fewer resources Automated provisioning and business agility Flexible and programmable data services 3 Copyright 2016 Dell Inc.
THE EVOLUTION OF DATA PROTECTION A N A L Y T I C S & S E A R C H BACKUP SOFTWARE INTELLIGENT COPY OVERSIGHT BACKUP SERVERS/AGENTS PROTECTION STORAGE SELF-SERVICE (FROM DATA SOURCE) TRADITIONAL BACKUP MODERN DATA MANAGEMENT
Global data protection index Average cost of data Loss Data loss Laggards or evaluators Unable to keep pace with flash Unprepared for future business challenges Unprotected in the cloud 5 Copyright 2016 Dell Inc.
Enabling simplicity - data protection everywhere Where you need it Consumption Models Continuous Availability On-Prem Replication Virtualized R T O & R P O Snaps Backup Converged Infrastructure Archive LTR / Archive Born in the Cloud SaaS Public / Private IRS Air Gap How you want it BEST OF BREED CONVERGED SOFTWARE DEFINED AS-A-SERVICE 6 Copyright 2016 Dell Inc.
Protection Storage and Software
Transformed Data Domain Family Powered by Intel Xeon Processors DD6300 Small & Midmarket Enterprise DD6800 Midmarket Enterprise DD9300 Large Enterprise DD9800 High-End Large Enterprise 1.8X Faster 1.3X Faster 1.4X Faster 1.2x Faster Flash-enabled performance and instant access 8 Copyright 2016 Dell Inc.
DATA DOMAIN CLOUD TIER LONG-TERM RETENTION AUTOMATED, EFFICIENT & SECURE AUTOMATED Native tiering to public, private or hybrid cloud EFFICIENT Send & retrieve only unique data for lower TCO SECURE Encrypt & lock files before sending to the cloud ECS 3 rd Party Clouds
CLOUDBOOST CLOUD ENABLING SOLUTION Cloud for Long Term Retention Direct Backup to Cloud Backup In the Public Cloud Cloud for LTR Direct to Cloud In the Cloud Client Protection storage Backup on-premises and replicate to cloud Backup to the cloud Backup of data and apps in the public cloud
BACKUP IN PUBLIC CLOUD ENTERPRISE-LEVEL PROTECTION FOR CLOUD APPLICATIONS AND DATA DB
DATA DOMAIN CLOUD TIER/CLOUDBOOST WITH ECS Flexibility of cloud with the efficiency of disk Integration with your data protection software Lowest TCO: up to 18% cheaper than tape up to 37% cheaper than AWS
ENABLING THE SOFTWARE-DEFINED DATA CENTER Data Protection Suite and Data Domain Virtual Edition Software-only data protection solution Flexible, efficient target Best in class reliability ROBO + entry market Retain Data Domain benefits Secure multi-tenancy Scalable up to 96 TB protection storage
AVAILABLE FOR DOWNLOAD : TRY AND BUY TRIAL FULL VERSION OF DD VE WITH NO TIME LIMIT Data Domain Virtual Edition TAKE A TEST DRIVE DOWNLOAD DATA DOMAIN VIRTUAL EDITION AT NO CHARGE WITH NO TIME LIMIT Download Now Free download of up to 0.5 TB of DD VE for non production use Simple upgrade to production license through ELMS portal Community Support Available on Data Domain Community
Modern Data Management
COPY PROLIFERATION RUNNING WILD THE $50 BILLION COPY DATA PROBLEM $50B Annual Expense 82% Have 10 Copies Analytics Test/Dev App/DB Owner Backup C O P I E S Replication Protection Admin Snapshots P R O D U C T I O N Production Storage Admin 2013 2018 Source: IDC Copy Data Management InfoBrief, May 2016
EMC ENTERPRISE COPY DATA MANAGEMENT WITH EMC ENTERPRISE COPY DATA ANALYTICS Increases efficiency, streamlines operations to reduce costs via DISCOVERY AUTOMATION OPTIMIZATION
Isolated recovery solutions
Impact of cyber attacks Time it takes to compromise an organization, 60% of the time Average cost of 1M breached records Average cost of 1,000 breached records Lost data due to security breach Confirmed data breaches in 2014 19 19 Copyright 2016 Dell Inc.
Cyber crime gets sophisticated Are you staying ahead of the evolution? Traditional Threats Emerging Threats Cyber Theft Cyber Attack Cyber Extortion Cyber Destruction 20 Copyright 2016 Dell Inc.
Traditional strategies are limited Strong perimeters can fail Focus Is On Protection From The Outside Requires Many Exceptions: DMZ Backups Network Sniffers Ignores Emerging Attack Strategies Email Internal Staff Portable Devices 21 Copyright 2016 Dell Inc.
LAYERED CYBER SECURITY FOR DATA PROTECTION Traditional Data Protection Best Practices - Deploy a layered data protection approach ( the continuum ) for more business critical systems but always include a point in time off array independent backup with DR Replication (N+1) - Endpoints and Born In The Cloud Data Additional Hardening & Protection Features - DPS Product Specific Hardening Guides - Encryption in Flight and/or at Rest - Retention Lock w/separate Security officer credentials 22 Copyright 2016 Dell Inc. RISK Best Advanced Protection Services - Isolated Recovery Solution - EMC Service Offerings - (Assess, Plan, Implement, & Validate) - Use of Evolving Security Analytics - RSA Security Analytics
MODERN APPROACH ISOLATED RECOVERY 1 Planning and Design: Business Critical Applications Technology environment Configuration information Local or Remote Copy 2 3 Isolation-Replication: Network Isolation/Air Gap Dedicated Network Link Enable-replicate-disable link Automated and Scripted Validation of Data: Trusted Copies and Versioning Validate Copy After Replication Customer Tools Used to Validate 4 Restore and Recovery: Standard Restore Processes Scripted and Automated 23 Copyright 2016 Dell Inc.
Let s get started 1 Assess 2 Design Identify what you have, biggest problem areas Design architecture that meets your needs and agree on key focus area 3 ROI/TCO Develop ROI/TCO analysis that shows what you are spending today 4 Implement EMC and Partner Services to get solution up, running and maintained whatever you need 5 Validate the value Analysis by EMC and its partners after 6-12 months in production Output: ROI to-date using EMC data protection solutions 6 TCE & customer escalation management 24 Copyright 2016 Dell Inc.