Transform Data Protection with Cloud and Mobile Infrastructures

Embed Size (px)

DESCRIPTION

At Gartner Catalyst Conference in London, Paul McClure from CommVault discusses the challenges with delivering data protection for mobile workforces. Leveraging private, public, or service provider managed clouds, CommVault provides an endpoint data protection solution that can help organizations empower end-users, ensure compliance, and enable IT staff productivity.

Text of Transform Data Protection with Cloud and Mobile Infrastructures

  • 1. Paul McClure Chief Technologist, Cloud Solutions Group Transform Data Protection with Mobile and Cloud Infrastructures Prepared for:

2. c Introduction Market Dynamics Challenges Key Considerations Summary 3. c Market Dynamics 4. c Market Dynamics Risk Management, BYOD & Access 5. c Source: http://www.gartner.com/newsroom/id/2466615 As enterprise bring your own device (BYOD) programs continue to become more commonplace, 38 percent of companies expect to stop providing devices to workers by 2016 according to a global survey of CIOs by Gartner, Inc.'s Executive Programs Market Dynamics BYOD 6. c Market Dynamics as a Service 7. c Accidental deletion Accidental deletion is a common source of data and productivity losses. Control over corporate data Numerous consumer-grade cloud backup options exist and employees are aware of or using them. Anytime, anywhere worker Workers are increasingly distributed and mobile which means they will save more data locally and they are at a higher risk of losing the device. E-discovery costs The costs associated with searching across distributed PCs would be prohibitive. Operating system upgrades As companies upgrade to Windows 8, they need a way of easily transferring data. Challenges Use Cases 8. c Backup Sync & Share vs Key Considerations Approach 9. Gartner, Inc. | G0023597 1Device/OS diversity Degree of diversity in endpoint devices and endpoint OS platforms supported Content variety Type of local content that can be backed up and restored Heterogeneous restore Ability to restore to a different device and/or a different OS platform Scalability Size of the deployment in the real world, not based on product design Performance Performance-boosting techniques, such as incremental backup, compression, and throttling for network bandwidth and CPU cycles Source: Critical Capabilities for Enterprise Endpoint Backup (Gartner, Inc. | G00235971) Key Considerations Technology / Solution 10. c Data reduction techniques Type of data reduction techniques, such as file-level single-instance restore, or block-level or object-level data deduplication Data capture frequency How frequent the backup data can be captured Security Commonly deployed security features, such as access control methods, encryption, and remote wipe and remote tracking of devices Administrator experience Factors impacting administrator experiences, such as silent deployment of group or companywide policies, task delegation, separation of corporate content from personal content, reporting tools, and so forth Source: Critical Capabilities for Enterprise Endpoint Backup (Gartner, Inc. | G00235971) Key Considerations Technology / Solution 11. c User experience Factors impacting user experiences, such as user interface, self-restore capability, single sign-on and whether there is a mobile app Cloud services support Degree of supporting the vendor's own cloud or third-party cloud E-discovery functions Functions that allow easy e-discovery for compliance, such as full-text indexing and search, federated search, and support of legal hold Source: Critical Capabilities for Enterprise Endpoint Backup (Gartner, Inc. | G00235971) Key Considerations Technology / Solution 12. c 13. c Physical Virtual Public Cloud Applications Servers Network Storage Private Cloud Summary CommVault Simpana Software 14. Summary CommVault EdgeTM (End Point Data Protection including Backup, Sync & Share + eDiscovery) Compliance Search Custodian Hold Add data into the Content Store Upload Sharing Share Files/Folders with others (web) Lock User-Set Access Lock Edge Web console Edge Mobile access File Sync 15. Cloud Solutions Group THANK YOU Paul McClure Chief Technologist, Cloud Solutions Group