Upload
others
View
8
Download
0
Embed Size (px)
Citation preview
Dell EMC Data ProtectionInnovation without Compromise
Dell - Internal Use - Confidential2 of Y
M E G A T R E N D S
Protected FastConnectedAlways on
Dell - Internal Use - Confidential
Changing customer expectations requires Digital Transformation 1
Dell - Internal Use - Confidential3 of Y
Data growth & democratization
163ZB*DATA2025
Massive data growth and data distribution require IT Transformation 2
Dell - Internal Use - Confidential
M E G A T R E N D S
Dell - Internal Use - Confidential4 of YDell - Internal Use - Confidential
C H A L L E N G E S R E Q U I R E M E N T S
Cloud extensibilityIncrease in data volumes, users, apps
Do more with less
Simplicity for quick time-to-value
Low cost-to-protect
Efficient cloud enablement
High performance
Data Protection for Mid-size Organizations
Dell - Internal Use - Confidential5 of YDell - Internal Use - Confidential
Today’s Solutions
SimplicityCoverage
PerformanceEfficiencies
H I G H E R C O S T - T O - P R O T E C T
Dell - Internal Use - Confidential6 of Y
Protecting Your Application Consumption Models
Physical VirtualConverged
Hyper-Converged Cloud-born
As the business compute model moves, Dell EMC Data Protection follows
Dell - Internal Use - Confidential7 of Y
Dell EMC Data Protection portfolio
Protection and recovery for cloud
Best of breed & integrated
Data Protection Suite
SOFTWARE
Integrated Data Protection
APPLIANCE
Data Domain
STORAGE SaaS
Dell - Internal Use - Confidential8 of Y
Lowest cost to protect on prem, SDDC and in the cloud
Architecture Matters
Dell EMC TLAs allows consumption flexibility
Simplicity
Whether CapEx or Utility Pricing to meet your financial needs
Flexibility
A single proven technology partner to unify your protection
Reliability
1# – in Data Protection– in De-dup ratios– in Recovery
performance
Best “Cost to protect” in the industry
Why Dell EMC For Data Protection• Dell EMC data Protection delivers it all…..uniquely positioned to help you Modernize, Automate
and Transform protection across what you value MOST….your data
Dell - Internal Use - Confidential9 of Y
Content managementFile shares/serversVirtual machinesDatabases Enterprise applicationsE-mail servers
Backup Arch ive• Database• Mainframe• IBMi
• Big Data• File/E-mail• VMware
• File• E-mail• Big data
• Content management• Storage tiering• Database
• NAS• ROBO
• Protect everything on a single platform
The Ultimate Protection Storage
Disaster recovery Long-term retention
VTL
Inline Encryption
S t a n d a r d n e t w o r k p r o t o c o l sD D B o o s t , C I F S , N F S , V T L , N D M P
Dell - Internal Use - Confidential10 of Y
• Data Domain Data Invulnerability Architecture
Most Reliable Protection Storage
✓ ✓ ✓• Inline data verification
• Continuous fault detection and self-healing
• Recovery/access• Verification
✓✓✓
Recovers correctlyStays correctStored correctly
Dell - Internal Use - Confidential11 of Y
• Encrypts incoming data and store the data on the disk in an encrypted format
Encryption
• Inline Encryption ensures that data does not reside in a vulnerable state on
the disk subsystem
Dell - Internal Use - Confidential12 of Y
• Data Domain Boost
Faster, More Efficient Backup
• Advanced integration with leading backup and enterprise applications
• Speeds backups by up to 50%
• Reduce network utilization by up to 99%
Dell - Internal Use - Confidential13 of Y
• DD Boost for Enterprise Applications
Empowering Application Owners
Mtree replication
WAN
• Native app integration
• Efficientbackup & replication
• Controlledby app team
Faster backup50%
Dell - Internal Use - Confidential14 of Y
App
Ser
ver
Back
up
Serv
er
Avamar NetWorker NetBackup Backup ExecvRanger NetVault
Data Protector RMAN SAP
SAPHANA DB2 SQL &
ExchangeGreenplum
DD Boost Supported over SAN
DD Boost Supported over LAN
VDP Advanced
DD Boost Supported over WAN
Veeam HortonWorks Cloudera
For everything else, use the DD Boost file system plug-in
Data Domain Boost Ecosystem
Dell - Internal Use - Confidential15 of Y
DD Boost Everywhere – Data Domain BoostFSDD Boost File System Plug-in (BoostFS) integrates with homegrown applications and more!
– Commvault– MySQL– MongoDB
– Postgres– SQL– And homegrown applications
Supporting:
The evolution of DD Boost continues; BoostFS now supported for Windows environments!
• For even greater support, BoostFS enables DD Boost for applications that use NFS for data protection.
– Commvault– MySQL– MongoDB
– Postgres– IBM TSM– And homegrown applications
Supporting:
Dell - Internal Use - Confidential16 of Y
• Efficient replication for backup and archive data
Data Domain Replicator
• Reduces bandwidth requirements up to 98%
• Protects sensitive data when replicating over untrusted networks
• Consolidates backup and archive data from hundreds of remote sites
Dell - Internal Use - Confidential17 of Y
Broad EcosystemUse with Any Application and Leverage the Cloud of Your Choice
Long-term Retention
Elastic Cloud Storage
3rd PartyClouds
Dell - Internal Use - Confidential18 of Y
Efficient Data MovementLower TCO
• Send only unique data to the cloud
• Data lands in the cloud already deduplicated
• Reduce storage requirements 10 – 30x
Cloud Unit 1(single dedupe pool)
Only unique data sent/stored
Cloud Unit 2(single dedupe pool)
Metadata Storage
Active Tier
Cloud Tier
Dell EMC Cyber Recovery
Dell - Internal Use - Confidential20 of Y
NIST Cybersecurity Framework
• Asset Management• Business Environment• Governance• Risk Assessment• Risk Management
Strategy• Supply Chain Risk
Management
Protect
• Access Control• Awareness and
Training• Data Security
(Integrity Checking)• Information Protection
Processes and Procedures
• Maintenance• Protective Technology
• Anomalies and Events• Security Continuous
Monitoring• Detection Processes
• Response Planning• Communications• Analysis• Mitigation• Improvements
• Recovery Planning• Improvements• Communications
Identify Detect Respond Recover
Measurement Program
Risk ManagementRSA Incident Discovery Identity Management
RSA NetWitness®
Security Analytics for Early Detection
RSA NetWitness®
Forensics / RSA Archer Recovery Management
Incident Response RetainerAdvanced Cyber Defense
Cyber Recovery Solution
Cyber Recovery Data Protection
Cyber Recovery Malware Analytics
Cyber Recovery Destructive Malware Incident Response
Cyber Recovery Application/Data
Dependency Mapping
Dell Technologies Aligned Solutions & Services
Security Monitoring & Management
Cybersecurity Maturity Assessment & Compliance
Program ManagementManaged Firewall,
IDS, IPSMonitoring, Incident
Response, Forensics Analysis & Investigation
Focus
Is my current backup infrastructure enough?
Traditional Strategies Are Not Enough
Not preventative against attacks
Hacktivists can encrypt your encrypted data
For data protection, not recovery
Potential negative impacts on cost to store, replicate
and protect
Data Encryption Tape Backups Cyber Insurance
Too long to recover
Difficult to validate data
Requires backup infrastructure to recover
May not protect:Backup Catalog
PBBA [Data Domain]Tape Library Meta Data DB
All breaches may not be covered
Policies have baseline security requirements
Monetary limits may not cover all damages
Does not protect:Patient needs
Brand Lost trust
Dell - Internal Use - Confidential23 of Y
Advanced Protection Services• Cyber Recovery Solution • EMC/EY service offerings: assess, plan, implement, and validate• Use of evolving security analytics: RSA & Secureworks
Additional Hardening and Protection Features• Product specific hardening guides• Encryption in flight and/or at rest• Retention lock with separate security officer credentials
Traditional Data Protection Best Practices• Deploy a layered data protection approach (“the continuum”)
for more business critical systems but always include a point in time off array independent backup with DR Replication (N+1)
• Protect “Born in the Cloud” and endpoint Data
Level of ProtectionGood Better Best
Layered Cyber-Security for Data Protection
© Copyright 2017 Dell Inc.23
Dell - Internal Use - Confidential24 of Y
Dell EMC Cyber Recovery
1
Synchronization
Immutable Copies
Sandbox2 3
Cyber Recovery Vault
Metadata
Data
Dell - Internal Use - Confidential25 of Y
SIMPLE CR VAULT MANAGEMENT
Dell - Internal Use - Confidential26 of Y
Proactive Analytics in the CR Vault
Why Analytics in the Vault?
• Increase effectiveness of Prevent/Detect cybersecurity when performed in protected environment.
• Diagnosis of attack vectors can take place within an isolated workbench.
• App restart activities can detect attacks that only occur when application is initially brought up.
Categories of Data
• Transactional Data – dynamic/large (log variances, sentinel records, etc.)
• Intellectual Property – static/large (checkums, file entropy)
• Executables / Config. Files – static/small (checksums, malware scans)
Cyber Recovery Storage System
Management Host
Validation Hosts
CYBER RECOVERY VAULT
Restore Hosts
Dell - Internal Use - Confidential27 of YDell - Internal Use - Confidential
High performance & Ease of growth
High efficiency & Low cost-to-protect
Most Comprehensive Portfolio
Dell EMC Data Protection P R O V E N A N D T R U S T E D
in Data Protection Appliance & Software Market*
Solution-level Simplicity | Single Vendor Worldwide Support
Dell - Internal Use - Confidential28 of Y
CloudDR + LTR
Search & analytics1
Backup servers & storage
NVMeflash
System management
Backup software
Days Hours
2U and 10x1 faster
Easy to deploy & upgrade
Dell - Internal Use - Confidential
Simplicity is a Converged SolutionD E L L E M C D A T A P R O T E C T I O N
Densest 2U appliance—up to 20% more capacity2
24TB–96TB + 192TB withwithout additional HW
Dell - Internal Use - Confidential29 of Y
Reporting
Exception resolutions
Policy management
Dashboards
Simplicity is Easy ManagementD E L L E M C D A T A P R O T E C T I O N
Modern UI
Dell - Internal Use - Confidential
Dell - Internal Use - Confidential30 of Y
Power is Protection EverywhereD E L L E M C D A T A P R O T E C T I O N
Dell - Internal Use - Confidential
Largest application ecosystem1
Any application, multi-hypervisor and cloud Integration with VMware, SQL, Oracle native management tools
Physical VirtualHome grown & custom apps
VM VM VM VM VM VM
Cloud
.
Dell - Internal Use - Confidential31 of Y
Up to
2Xfaster backups1
Boosted application-direct
protection
NVMe flash for instant access
& restore
Powered by 14G PowerEdge Server
Dell - Internal Use - Confidential
Power is Performance & Efficiency D E L L E M C D A T A P R O T E C T I O N
ESG Lab Review Additional information
Source-side deduplication
Up to
98%less bandwidth required1
7Xmore backup streams1
55:1Avg dedup2
Dell - Internal Use - Confidential32 of Y
Long-term retention
Disaster recovery
Elastic Cloud Storage
Dell - Internal Use - Confidential
Power is CloudD E L L E M C D A T A P R O T E C T I O N
U P T O 192 TB i n t h e c l o u dw i t h C l o u d T i e r
Cloud (AWS)
Cloud (AWS)
Automated and efficient data movement Eliminates the need for cloud gatewayAPI extensible for simplified management
Dell - Internal Use - Confidential33 of Y
Integrated Cloud DR Protect in AWS2 clicks to failback3 clicks to failover
Dell - Internal Use - Confidential
EC2 on demandS3 Objects
Cloud (AWS)
Efficient with End-to-End OrchestrationPower is Cloud Disaster Recovery
D E L L E M C D A T A P R O T E C T I O N
Dell - Internal Use - Confidential34 of Y
Simple deployment& management
Local restores for speed & efficiency
Local data protection that’s cost-effective and efficientBuilt for ROBO
D E L L E M C D A T A P R O T E C T I O N
Dell - Internal Use - Confidential
CloudDR + LTR
Easy cloud & datacenter replication
CentralData CenterBranch
OfficeBranch OfficeBranch
OfficeBranch Office
Dell - Internal Use - Confidential35 of Y
Included Offers
Dell - Internal Use - Confidential
R P 4 V M sC L O U D T I E RC L O U D D R
5VMs, 1-yr subscription5TB of licenses1
Grow in 1TB increments
@ Lowest Cost-to-ProtectD E L L E M C D A T A P R O T E C T I O N
Dell - Internal Use - Confidential36 of YDell - Internal Use - Confidential
Up to
@ Lowest Cost-to-ProtectD E L L E M C D A T A P R O T E C T I O N
1ESG Lab Review Additional information
55:1A V G
D E D U P E 2
98%L E S S
B A N D W I D T HR E Q U I R E D 1
Costs up to
80%L E S S T O
P R O T E C T 3
Protect up to
4xM O R E D A T A
I N A 2 U 1
Dell - Internal Use - Confidential37 of YDell - Internal Use - Confidential
Integrated Data Protection Appliance DP4400. Simply Powerful.
I N T R O D U C I N G
@ Lowest cost-to-protect.1
Guaranteed.
Dell - Internal Use - Confidential39 of Y
CloudDR + LTR
Search & analytics2
Backup servers & storage
NVMeflash
System management
Backup software
Dell - Internal Use - Confidential
Complete Backup, Deduplication, Replication, Recovery + Cloud DR & LTRD E L L E M C I N T E G R A T E D D A T A P R O T E C T I O N A P P L I A N C E D P 4 4 0 0
SIMPLY POWERFUL@ Lowest cost-to-protect.1
Guaranteed.
24TB–96TB + 192TB withwithout additional HW
Densest 2U appliance—up to 20% more capacity3
Dell - Internal Use - Confidential40 of Y
1 With DD Extended Retention software option
M I D S I Z E E N T E R P R I S E L A R G E E N T E R P R I S E
Dell - Internal Use - Confidential
Comprehensive IDPA PortfolioD E L L E M C D A T A P R O T E C T I O N
DP4400 DP5300 DP5800 DP8300 DP8800
BACKUPINGEST 9 TB/hr 24 TB/hr 32 TB/hr 41 TB/hr 68 TB/hr
LOGICAL CAPACITY3
240 TB to 4.8 PB1
720 TB to 14.4 PB2 340 TB to 6.5 PB1 960 TB to 14.4 PB1
2.8 to 43.2 PB21.9 to 36 PB1
5.7 to 108 PB26.2 to 50 PB1
18.6 to 150 PB2
USABLE CAPACITY
24 to 96 TBu1
Up to 288 TBu2 34 to 130 TBu1 96 to 288 TBu1
Up to 864 TBu2192 to 720 TBu1
Up to 2.16 PBu2624 TBu to 1 PBu1
Up to 3 PBu2
M I D S I Z E & R O B O
Dell - Internal Use - Confidential41 of Y
Integrated Cloud DR• DR testing & failover to AWS
• Protect directly from on-prem into S3
• Failback on-premises
• Recover in minutes, reducing RTO
EC2 on demandS3 Objects
Protect in AWS• Minimal cost & footprint – pay for EC2 only in
case of failover
• Seamless integration with on-premises DP
• Best-in-class deduplication
• Leverage what you know and own
2 clicks to failback3 clicks to failover
Power is Cloud Disaster RecoveryEfficient with End-to-End Orchestration
D E L L E M C D A T A P R O T E C T I O N
Dell - Internal Use - Confidential
Cloud (AWS)