41
Dell EMC Data Protection Innovation without Compromise

Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

  • Upload
    others

  • View
    8

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell EMC Data ProtectionInnovation without Compromise

Page 2: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential2 of Y

M E G A T R E N D S

Protected FastConnectedAlways on

Dell - Internal Use - Confidential

Changing customer expectations requires Digital Transformation 1

Page 3: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential3 of Y

Data growth & democratization

163ZB*DATA2025

Massive data growth and data distribution require IT Transformation 2

Dell - Internal Use - Confidential

M E G A T R E N D S

Page 4: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential4 of YDell - Internal Use - Confidential

C H A L L E N G E S R E Q U I R E M E N T S

Cloud extensibilityIncrease in data volumes, users, apps

Do more with less

Simplicity for quick time-to-value

Low cost-to-protect

Efficient cloud enablement

High performance

Data Protection for Mid-size Organizations

Page 5: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential5 of YDell - Internal Use - Confidential

Today’s Solutions

SimplicityCoverage

PerformanceEfficiencies

H I G H E R C O S T - T O - P R O T E C T

Page 6: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential6 of Y

Protecting Your Application Consumption Models

Physical VirtualConverged

Hyper-Converged Cloud-born

As the business compute model moves, Dell EMC Data Protection follows

Page 7: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential7 of Y

Dell EMC Data Protection portfolio

Protection and recovery for cloud

Best of breed & integrated

Data Protection Suite

SOFTWARE

Integrated Data Protection

APPLIANCE

Data Domain

STORAGE SaaS

Page 8: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential8 of Y

Lowest cost to protect on prem, SDDC and in the cloud

Architecture Matters

Dell EMC TLAs allows consumption flexibility

Simplicity

Whether CapEx or Utility Pricing to meet your financial needs

Flexibility

A single proven technology partner to unify your protection

Reliability

1# – in Data Protection– in De-dup ratios– in Recovery

performance

Best “Cost to protect” in the industry

Why Dell EMC For Data Protection• Dell EMC data Protection delivers it all…..uniquely positioned to help you Modernize, Automate

and Transform protection across what you value MOST….your data

Page 9: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential9 of Y

Content managementFile shares/serversVirtual machinesDatabases Enterprise applicationsE-mail servers

Backup Arch ive• Database• Mainframe• IBMi

• Big Data• File/E-mail• VMware

• File• E-mail• Big data

• Content management• Storage tiering• Database

• NAS• ROBO

• Protect everything on a single platform

The Ultimate Protection Storage

Disaster recovery Long-term retention

VTL

Inline Encryption

S t a n d a r d n e t w o r k p r o t o c o l sD D B o o s t , C I F S , N F S , V T L , N D M P

Page 10: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential10 of Y

• Data Domain Data Invulnerability Architecture

Most Reliable Protection Storage

✓ ✓ ✓• Inline data verification

• Continuous fault detection and self-healing

• Recovery/access• Verification

✓✓✓

Recovers correctlyStays correctStored correctly

Page 11: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential11 of Y

• Encrypts incoming data and store the data on the disk in an encrypted format

Encryption

• Inline Encryption ensures that data does not reside in a vulnerable state on

the disk subsystem

Page 12: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential12 of Y

• Data Domain Boost

Faster, More Efficient Backup

• Advanced integration with leading backup and enterprise applications

• Speeds backups by up to 50%

• Reduce network utilization by up to 99%

Page 13: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential13 of Y

• DD Boost for Enterprise Applications

Empowering Application Owners

Mtree replication

WAN

• Native app integration

• Efficientbackup & replication

• Controlledby app team

Faster backup50%

Page 14: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential14 of Y

App

Ser

ver

Back

up

Serv

er

Avamar NetWorker NetBackup Backup ExecvRanger NetVault

Data Protector RMAN SAP

SAPHANA DB2 SQL &

ExchangeGreenplum

DD Boost Supported over SAN

DD Boost Supported over LAN

VDP Advanced

DD Boost Supported over WAN

Veeam HortonWorks Cloudera

For everything else, use the DD Boost file system plug-in

Data Domain Boost Ecosystem

Page 15: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential15 of Y

DD Boost Everywhere – Data Domain BoostFSDD Boost File System Plug-in (BoostFS) integrates with homegrown applications and more!

– Commvault– MySQL– MongoDB

– Postgres– SQL– And homegrown applications

Supporting:

The evolution of DD Boost continues; BoostFS now supported for Windows environments!

• For even greater support, BoostFS enables DD Boost for applications that use NFS for data protection.

– Commvault– MySQL– MongoDB

– Postgres– IBM TSM– And homegrown applications

Supporting:

Page 16: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential16 of Y

• Efficient replication for backup and archive data

Data Domain Replicator

• Reduces bandwidth requirements up to 98%

• Protects sensitive data when replicating over untrusted networks

• Consolidates backup and archive data from hundreds of remote sites

Page 17: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential17 of Y

Broad EcosystemUse with Any Application and Leverage the Cloud of Your Choice

Long-term Retention

Elastic Cloud Storage

3rd PartyClouds

Page 18: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential18 of Y

Efficient Data MovementLower TCO

• Send only unique data to the cloud

• Data lands in the cloud already deduplicated

• Reduce storage requirements 10 – 30x

Cloud Unit 1(single dedupe pool)

Only unique data sent/stored

Cloud Unit 2(single dedupe pool)

Metadata Storage

Active Tier

Cloud Tier

Page 19: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell EMC Cyber Recovery

Page 20: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential20 of Y

NIST Cybersecurity Framework

• Asset Management• Business Environment• Governance• Risk Assessment• Risk Management

Strategy• Supply Chain Risk

Management

Protect

• Access Control• Awareness and

Training• Data Security

(Integrity Checking)• Information Protection

Processes and Procedures

• Maintenance• Protective Technology

• Anomalies and Events• Security Continuous

Monitoring• Detection Processes

• Response Planning• Communications• Analysis• Mitigation• Improvements

• Recovery Planning• Improvements• Communications

Identify Detect Respond Recover

Measurement Program

Risk ManagementRSA Incident Discovery Identity Management

RSA NetWitness®

Security Analytics for Early Detection

RSA NetWitness®

Forensics / RSA Archer Recovery Management

Incident Response RetainerAdvanced Cyber Defense

Cyber Recovery Solution

Cyber Recovery Data Protection

Cyber Recovery Malware Analytics

Cyber Recovery Destructive Malware Incident Response

Cyber Recovery Application/Data

Dependency Mapping

Dell Technologies Aligned Solutions & Services

Security Monitoring & Management

Cybersecurity Maturity Assessment & Compliance

Program ManagementManaged Firewall,

IDS, IPSMonitoring, Incident

Response, Forensics Analysis & Investigation

Focus

Page 21: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Is my current backup infrastructure enough?

Page 22: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Traditional Strategies Are Not Enough

Not preventative against attacks

Hacktivists can encrypt your encrypted data

For data protection, not recovery

Potential negative impacts on cost to store, replicate

and protect

Data Encryption Tape Backups Cyber Insurance

Too long to recover

Difficult to validate data

Requires backup infrastructure to recover

May not protect:Backup Catalog

PBBA [Data Domain]Tape Library Meta Data DB

All breaches may not be covered

Policies have baseline security requirements

Monetary limits may not cover all damages

Does not protect:Patient needs

Brand Lost trust

Page 23: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential23 of Y

Advanced Protection Services• Cyber Recovery Solution • EMC/EY service offerings: assess, plan, implement, and validate• Use of evolving security analytics: RSA & Secureworks

Additional Hardening and Protection Features• Product specific hardening guides• Encryption in flight and/or at rest• Retention lock with separate security officer credentials

Traditional Data Protection Best Practices• Deploy a layered data protection approach (“the continuum”)

for more business critical systems but always include a point in time off array independent backup with DR Replication (N+1)

• Protect “Born in the Cloud” and endpoint Data

Level of ProtectionGood Better Best

Layered Cyber-Security for Data Protection

© Copyright 2017 Dell Inc.23

Page 24: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential24 of Y

Dell EMC Cyber Recovery

1

Synchronization

Immutable Copies

Sandbox2 3

Cyber Recovery Vault

Metadata

Data

Page 25: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential25 of Y

SIMPLE CR VAULT MANAGEMENT

Page 26: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential26 of Y

Proactive Analytics in the CR Vault

Why Analytics in the Vault?

• Increase effectiveness of Prevent/Detect cybersecurity when performed in protected environment.

• Diagnosis of attack vectors can take place within an isolated workbench.

• App restart activities can detect attacks that only occur when application is initially brought up.

Categories of Data

• Transactional Data – dynamic/large (log variances, sentinel records, etc.)

• Intellectual Property – static/large (checkums, file entropy)

• Executables / Config. Files – static/small (checksums, malware scans)

Cyber Recovery Storage System

Management Host

Validation Hosts

CYBER RECOVERY VAULT

Restore Hosts

Page 27: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential27 of YDell - Internal Use - Confidential

High performance & Ease of growth

High efficiency & Low cost-to-protect

Most Comprehensive Portfolio

Dell EMC Data Protection P R O V E N A N D T R U S T E D

in Data Protection Appliance & Software Market*

Solution-level Simplicity | Single Vendor Worldwide Support

Page 28: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential28 of Y

CloudDR + LTR

Search & analytics1

Backup servers & storage

NVMeflash

System management

Backup software

Days Hours

2U and 10x1 faster

Easy to deploy & upgrade

Dell - Internal Use - Confidential

Simplicity is a Converged SolutionD E L L E M C D A T A P R O T E C T I O N

Densest 2U appliance—up to 20% more capacity2

24TB–96TB + 192TB withwithout additional HW

Page 29: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential29 of Y

Reporting

Exception resolutions

Policy management

Dashboards

Simplicity is Easy ManagementD E L L E M C D A T A P R O T E C T I O N

Modern UI

Dell - Internal Use - Confidential

Page 30: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential30 of Y

Power is Protection EverywhereD E L L E M C D A T A P R O T E C T I O N

Dell - Internal Use - Confidential

Largest application ecosystem1

Any application, multi-hypervisor and cloud Integration with VMware, SQL, Oracle native management tools

Physical VirtualHome grown & custom apps

VM VM VM VM VM VM

Cloud

.

Page 31: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential31 of Y

Up to

2Xfaster backups1

Boosted application-direct

protection

NVMe flash for instant access

& restore

Powered by 14G PowerEdge Server

Dell - Internal Use - Confidential

Power is Performance & Efficiency D E L L E M C D A T A P R O T E C T I O N

ESG Lab Review Additional information

Source-side deduplication

Up to

98%less bandwidth required1

7Xmore backup streams1

55:1Avg dedup2

Page 32: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential32 of Y

Long-term retention

Disaster recovery

Elastic Cloud Storage

Dell - Internal Use - Confidential

Power is CloudD E L L E M C D A T A P R O T E C T I O N

U P T O 192 TB i n t h e c l o u dw i t h C l o u d T i e r

Cloud (AWS)

Cloud (AWS)

Automated and efficient data movement Eliminates the need for cloud gatewayAPI extensible for simplified management

Page 33: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential33 of Y

Integrated Cloud DR Protect in AWS2 clicks to failback3 clicks to failover

Dell - Internal Use - Confidential

EC2 on demandS3 Objects

Cloud (AWS)

Efficient with End-to-End OrchestrationPower is Cloud Disaster Recovery

D E L L E M C D A T A P R O T E C T I O N

Page 34: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential34 of Y

Simple deployment& management

Local restores for speed & efficiency

Local data protection that’s cost-effective and efficientBuilt for ROBO

D E L L E M C D A T A P R O T E C T I O N

Dell - Internal Use - Confidential

CloudDR + LTR

Easy cloud & datacenter replication

CentralData CenterBranch

OfficeBranch OfficeBranch

OfficeBranch Office

Page 35: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential35 of Y

Included Offers

Dell - Internal Use - Confidential

R P 4 V M sC L O U D T I E RC L O U D D R

5VMs, 1-yr subscription5TB of licenses1

Grow in 1TB increments

@ Lowest Cost-to-ProtectD E L L E M C D A T A P R O T E C T I O N

Page 36: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential36 of YDell - Internal Use - Confidential

Up to

@ Lowest Cost-to-ProtectD E L L E M C D A T A P R O T E C T I O N

1ESG Lab Review Additional information

55:1A V G

D E D U P E 2

98%L E S S

B A N D W I D T HR E Q U I R E D 1

Costs up to

80%L E S S T O

P R O T E C T 3

Protect up to

4xM O R E D A T A

I N A 2 U 1

Page 37: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential37 of YDell - Internal Use - Confidential

Integrated Data Protection Appliance DP4400. Simply Powerful.

I N T R O D U C I N G

@ Lowest cost-to-protect.1

Guaranteed.

Page 38: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption
Page 39: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential39 of Y

CloudDR + LTR

Search & analytics2

Backup servers & storage

NVMeflash

System management

Backup software

Dell - Internal Use - Confidential

Complete Backup, Deduplication, Replication, Recovery + Cloud DR & LTRD E L L E M C I N T E G R A T E D D A T A P R O T E C T I O N A P P L I A N C E D P 4 4 0 0

SIMPLY POWERFUL@ Lowest cost-to-protect.1

Guaranteed.

24TB–96TB + 192TB withwithout additional HW

Densest 2U appliance—up to 20% more capacity3

Page 40: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential40 of Y

1 With DD Extended Retention software option

M I D S I Z E E N T E R P R I S E L A R G E E N T E R P R I S E

Dell - Internal Use - Confidential

Comprehensive IDPA PortfolioD E L L E M C D A T A P R O T E C T I O N

DP4400 DP5300 DP5800 DP8300 DP8800

BACKUPINGEST 9 TB/hr 24 TB/hr 32 TB/hr 41 TB/hr 68 TB/hr

LOGICAL CAPACITY3

240 TB to 4.8 PB1

720 TB to 14.4 PB2 340 TB to 6.5 PB1 960 TB to 14.4 PB1

2.8 to 43.2 PB21.9 to 36 PB1

5.7 to 108 PB26.2 to 50 PB1

18.6 to 150 PB2

USABLE CAPACITY

24 to 96 TBu1

Up to 288 TBu2 34 to 130 TBu1 96 to 288 TBu1

Up to 864 TBu2192 to 720 TBu1

Up to 2.16 PBu2624 TBu to 1 PBu1

Up to 3 PBu2

M I D S I Z E & R O B O

Page 41: Dell EMC Data Protection• Use of evolving security analytics: RSA & Secureworks. Additional Hardening and Protection Features • Product specific hardening guides • Encryption

Dell - Internal Use - Confidential41 of Y

Integrated Cloud DR• DR testing & failover to AWS

• Protect directly from on-prem into S3

• Failback on-premises

• Recover in minutes, reducing RTO

EC2 on demandS3 Objects

Protect in AWS• Minimal cost & footprint – pay for EC2 only in

case of failover

• Seamless integration with on-premises DP

• Best-in-class deduplication

• Leverage what you know and own

2 clicks to failback3 clicks to failover

Power is Cloud Disaster RecoveryEfficient with End-to-End Orchestration

D E L L E M C D A T A P R O T E C T I O N

Dell - Internal Use - Confidential

Cloud (AWS)