Data Protection Everywhere For the modern data center
Tale of two worlds You need both for Traditional apps IT centric & Next-gen apps Developer centric On-premise Trust Agility Live in the cloud 3 Copyright 2016 Dell Inc.
Pillars of the modern data center Protection and trust Security/Governance Encryption Data Protection Services/Support Flash Cloud-enabled Scale-out Software-defined Reduce costs (# of drives, power, floor space, etc.) Consistent and predictable performance Policy driven service delivery On/off premises data and/or application mobility Lower entry costs and scale as you grow Manage massive capacity with fewer resources Automated provisioning and business agility Flexible and programmable data services 4 Copyright 2016 Dell Inc.
Journey to digital transformation Are you protected? 5 Copyright 2016 Dell Inc.
Global data protection index NL: 90% Laggards or evaluators pain NL: 42% Unprotected in the cloud more pain Data loss Average cost of data Loss NL: 506K 6 Copyright 2016 Dell Inc. NL: 56% Who use 2 or more data protection vendors experience more data loss & more unplanned down time NL: 66% Unprepared for future business challenges
Dell EMC Data Protection by the numbers World s Largest Data Protection Company Market share position Market Share Leader in Purpose Built Backup Appliances Leaders in Open & Mainframe Systems 3x share our closest competitor 61.4 % Systems Shipped Data Protection and Installed Solution Employees! And Ask Us About Gartner 8 Copyright 2016 Dell Inc.
So, why is this important? A real life story
10
11
Murphy s Law 12
Enabling simplicity - data protection everywhere Where you need it Consumption Models Continuous Availability On-Prem Replication Virtualized R T O & R P O Snaps Backup Converged Infrastructure Archive LTR / Archive Born in the Cloud SaaS Public / Private IRS Air Gap How you want it BEST OF BREED CONVERGED SOFTWARE DEFINED AS-A-SERVICE 13 Copyright 2016 Dell Inc.
Protection storage
Why Dell EMC protection storage backup target Powered by Intel Xeon Processors EFFICIENT RELIABLE FLEXIBLE CLOUD-ENABLED Protect more data faster with industry leading speed and scale Reduce storage required by 10 30x End-to-end data verification, fault detection, and self healing Integrates with leading backup, archiving, enterprise applications and big data applications or directly with primary storage Deploy protection storage however you want it Natively tier deduplicated data to the cloud for modern long-term retention Deliver data protection as a service with logical data isolation 15 Copyright 2016 Dell Inc.
Protection storage - how you want it Powered by Intel Xeon Processors How You Want It BEST OF BREED CONVERGED SOFTWARE DEFINED AS-A-SERVICE 16 Copyright 2016 Dell Inc.
Protection software
Why Dell EMC protection software Powered by Intel Xeon Processors COMPREHENSIVE PROTECTION Delivers protection across the data protection continuum Spans on-premise, virtualized, hybrid and public cloud environments Provides complete protection for cloud- based data and applications FLEXIBLE Includes 5 purpose-built offerings, for the most widely adopted use cases Supports a wide range of protection technologies to meet any service level Delivers application owner visibility and control HIGH PERFORMANCE Industry s tightest integration with Data Domain, yielding deduplication rates nearly 4x that of our competitors - Reduces backup storage by up to 38x - Reduces network traffic by up to 99% - Reduces backup times by up to 50% 18 Copyright 2016 Dell Inc.
Dell EMC protection software how you want it Comprehensive data protection for the modern data center NEW! NEW! Enterprise Edition Backup Applications VMware Archive Data Protection Suite 19
Dell EMC cloud data protection software COMPREHENSIVE PROTECTION Direct-to-cloud backup for desktops, laptops and remote and branch offices (RoBo) Born-in-cloud protection for Office 365, Salesforce and Google Apps Cloud enablement for longterm retention (LTR) to the cloud SECURE End-to-end enterprise-grade encryption Global network of world-class data centers, ensuring data is stored in region according to local laws and regulations Successful attainment of industry leading cloud service audits and certifications FLEXIBLE Deployment time measured in minutes or hours as opposed to weeks or months Doesn t require additional capital expense for hardware Easily scale resources up or down according to demand Per user, utility based pricing plans 20 20 Dell Dell - Internal - Internal Use Use - Confidential - Confidential
Isolated recovery solutions
Impact of cyber attacks Time it takes to compromise an organization, 60% of the time Average cost of 1M breached records Average cost of 1,000 breached records Lost data due to security breach Confirmed data breaches in one year 22 22 Dell Dell - Internal - Internal Use Use - Confidential - Confidential
EMC isolated recovery solutions Solutions and services to safeguard your data Educate & assess Design & build Assess Plan Implement Validate Business application protection requirements Compliance policies requirements Application readiness & requirements Application dependencies IRS architecture & high-level design Technology recommendations Implementation plan & timeline IRS validation test design Program managed implementation Technology deployment & hardening IRS processes & procedures IRS run books Compliance ready test reports Facilitated IRS table top exercises IRS process training Proctored IRS test Workshop format Advisory service Various delivery models Implementation service 23 23 Dell Dell - Internal - Internal Use Use - Confidential - Confidential
Vendor delivers WHY Dell EMC for data protection? DATA PROTECTION EVERYWHERE Simplicity Flexibility Investment protection 24 Copyright 2016 Dell Inc.
Deduplication WHY Dell EMC for data protection? MARKET & TECHNOLOGY LEADERSHIP Combined data protection software & storage Purpose built backup appliances Replication Isolated recovery solutions 25 Copyright 2016 Dell Inc.
WHY Dell EMC for data protection? cumulative R&D investment in technology acquisitions UNPARALLELED INVESTMENT team members dedicated to helping our customers 26 Copyright 2016 Dell Inc.
Helping customers transform 27 Copyright 2016 Dell Inc.
Let s get started 1 Assess 2 Design Identify what you have, biggest problem areas Design architecture that meets your needs and agree on key focus area 3 ROI/TCO Develop ROI/TCO analysis that shows what you are spending today 4 Implement EMC and Partner Services to get solution up, running and maintained whatever you need 5 Validate the value Analysis by EMC and its partners after 6-12 months in production Output: ROI to-date using EMC data protection solutions 6 TCE & customer escalation management 28 Copyright 2016 Dell Inc.
Related resources Demos and vlabs Data Protection Suite Family (lightboard video) Introducing EMC Enterprise Copy Data Management (lightboard video) Case Studies Alpha Bank Customer Profile Infographics GDPI infographic (global) IRS infographic White Papers GDPI summary report IRS solution overview Videos GDPI video IRS video Training Aids Websites, etc. Data Protection Category Page Backup and Protection Storage Web Page Backup and Protection Software Web Page GDPI microsite IRS microsite Spanning Backup Mozy Web Page 30