Author Archive

Data Protection Everywhere: The Dell EMC Data Protection Suite Family

Meredith Soper

Marketing Manager, Dell EMC Data Protection Division
As a former college athlete who never lost her competitive edge, I continuously challenge myself to learn new things and become an expert on others. However, my focus is no longer basketball, but the world of data protection. My MBA and innate passion for technology led me to a career in product marketing at Dell EMC, where I aspire to add some pizazz to the already-exciting world of backup and recovery. Outside of the office, I’m a born and raised Bostonian who has trouble pronouncing her R’s (think “pahk the cah”). I love sports, shopping, and a good glass of red wine. Follow me on Twitter @Meredith_Soper and I promise to #followback!

data protection everywhereData protection is never a one size fits all solution. Over the next few weeks, we will demonstrate, through a series of ‘Data Protection Everywhere’ blog posts, how Dell EMC’s leading data protection portfolio is equipped to deliver complete protection for enterprises of all sizes. To kick off this series, let’s take a look at Dell EMC’s leading software offerings–the Data Protection Suite Family.

 
Dell EMC recognizes that companies are rethinking next generation data protection methods as a result of exponential data growth, strict service-level agreements, and shrinking backup windows, as well as the need to better protect data residing throughout the enterprise. We understand that you probably have multiple roles within the data protection environment who are responding to these challenges within the business – each with their own set of requirements and responsibilities. Dell EMC addresses this reality with the Data Protection Suite Family, which includes our five Suite offerings: Data Protection Suite Enterprise Edition, Data Protection Suite for Backup, Data Protection Suite for VMware, Data Protection Suite for Applications and Data Protection Suite for Archive.

 
We’ve created each Suite as a direct response to the needs of your data owners and the requirements of your business, and each is designed for specific use cases within the most popular data protection environments. Whether your environment is rich with mission critical applications, fully virtualized, focused on backup and recovery with requirements for supporting many different use cases including NAS and tape-out, or a complex assortment of these, the Data Protection Suite Family offers solutions built to satisfy the needs of your business. To put it simply, Dell EMC has simplified data protection, making it easier than ever for you to take advantage of industry-leading replication, backup, recovery and archive solutions. The comprehensive data protection provided by the Suite Family is derived from the combination of components within each offering, which has been put together to meet the requirements of your business. Let’s dive deeper to better understand the unique benefits and capabilities of each of the five Suite offerings:

(more…)

The Perfect Holiday Cookie

Meredith Soper

Marketing Manager, Dell EMC Data Protection Division
As a former college athlete who never lost her competitive edge, I continuously challenge myself to learn new things and become an expert on others. However, my focus is no longer basketball, but the world of data protection. My MBA and innate passion for technology led me to a career in product marketing at Dell EMC, where I aspire to add some pizazz to the already-exciting world of backup and recovery. Outside of the office, I’m a born and raised Bostonian who has trouble pronouncing her R’s (think “pahk the cah”). I love sports, shopping, and a good glass of red wine. Follow me on Twitter @Meredith_Soper and I promise to #followback!

What makes the perfect holiday cookie? Is it the combination of ingredients, or the manner in which they are mixed and baked? A recipe incorporates both of these things- yet data-protection-solution-holiday-cookies
the success of one without the other is never enough. Even with the main ingredients- flour, sugar, eggs-, a forgotten touch of salt or dash of vanilla leads to tasteless dough. And even if the dough is mixed to perfection, a misread oven temperature can ruin the entire baking process. (By now, you may have guessed that I am speaking from experience. I can’t be the only one who’s committed a baking blunder!) The result of these common mistakes is an imperfect holiday cookie.  Although this may not ruin your Christmas party, it surely isn’t ideal.

Fortunately for you, I won’t be baking any cookies this holiday season. However, I am thinking of mixing it up from a data protection perspective. When I think of the perfect data protection solution, I consider it a combination of both software and hardware products. Not only should data be backed up with the utmost speed, performance, and efficiency, but it should also be securely stored on protection storage you can trust. But like the ingredients of the cookie, there cannot be one without the other. In order to benefit from a complete data protection solution, the greatness of the backup application must be matched by the greatness of the protection storage device, and vice versa. And like the baking process, the data protection products must be handled with care, serviced appropriately, and backed by a company you can rely on. (more…)

Purpose-Built Data Protection for Today and Tomorrow

Meredith Soper

Marketing Manager, Dell EMC Data Protection Division
As a former college athlete who never lost her competitive edge, I continuously challenge myself to learn new things and become an expert on others. However, my focus is no longer basketball, but the world of data protection. My MBA and innate passion for technology led me to a career in product marketing at Dell EMC, where I aspire to add some pizazz to the already-exciting world of backup and recovery. Outside of the office, I’m a born and raised Bostonian who has trouble pronouncing her R’s (think “pahk the cah”). I love sports, shopping, and a good glass of red wine. Follow me on Twitter @Meredith_Soper and I promise to #followback!

Buying a car can be challenging. As a buyer, there are certain things you look for and see value in. And those things differ buying personas 1according to your needs. For instance, my ideal car is an SUV with four wheel drive, has a voice-activated GPS system, and is backed by a trusted car brand. From this list of must-haves you can infer my needs; I need a vehicle that is built to withstand New England winters, provides navigation assistance, and is historically known to be reliable. I look for certain features based on my transportation needs. It’s important to note that your list of car requirements is likely different from mine. You may live in a warmer climate where it rarely snows, and therefore prefer an eco-friendly, compact car. Or you may be a NASCAR driver and require a vehicle with a manual transmission and a five-point harness, rather than a traditional seatbelt. I can confidently say your ideal vehicle looks slightly, if not completely, different from mine. Our individual buyer personas are based on each of our distinctive needs.

The same goes for many other aspects of life, as well as business, including the way in which we buy and consume data protection solutions. Each data owner has a distinct set of requirements they need to meet in order to successfully do their job. For instance, the backup admin, database admin and vAdmin each play an important role in the business’ overall data protection strategy. Each individual may be partially, or even solely, responsible for protecting their data and therefore have specific requirements for visibility and control for that protection. And for efficiency and familiarity purposes, each data owner is best empowered through using their native tools and interfaces. The 2016 EMC Global Data Protection Index (GDPI) confirms these points, indicating that management of data protection aligns with environment, meaning that the storage team focuses on storage based protection, the virtualization team on virtual environments, and so forth. And 40% of those surveyed also noted that they prefer a collaborative model, giving both IT and app owners self-service in terms of visibility and management capabilities. Although each individual is working towards the common goal of fully protected and accessible data, the way in which they manage the data protection environment is different. Each situation is unique and every role has unique needs.

In addition, as enterprises engage in implementing more modern approaches to data protection, new requirements will emerge which introduce new buyers. For instance, while self-service in the data center has brought to bear many benefits, it has also contributed largely to copy data sprawl.  The proliferation of copy data leads to increased cost and risk, detracting from an enterprise’s ability to invest in next generation apps and infrastructure. The buyer concerned with controlling copy data is probably the person held accountable for setting SLAs for both protection and storage. They may be an infrastructure or compliance manager and their requirements differ from those of an application, backup, or storage admin, because they have a unique set of needs.
(more…)

Data Protection Everywhere – Why Is It So Important in Today’s Modern Data Center?

Meredith Soper

Marketing Manager, Dell EMC Data Protection Division
As a former college athlete who never lost her competitive edge, I continuously challenge myself to learn new things and become an expert on others. However, my focus is no longer basketball, but the world of data protection. My MBA and innate passion for technology led me to a career in product marketing at Dell EMC, where I aspire to add some pizazz to the already-exciting world of backup and recovery. Outside of the office, I’m a born and raised Bostonian who has trouble pronouncing her R’s (think “pahk the cah”). I love sports, shopping, and a good glass of red wine. Follow me on Twitter @Meredith_Soper and I promise to #followback!

We are entering into a new age. No, it’s not another ice age, so no need to grab your coat and boots. This age brings no snow, but yields an ever-increasing presence of clouds. Let me explain. I am referring to the age of the modern data center. Over the past 15 years, IT has worked in a relatively predictable manner. However, all of this has started to change. Disruptive forces such as cloud computing and the Internet of Things have transformed the way applications are built and utilized.

data protection

The modern data center refers to the future of IT infrastructure. Companies must transform in order to deliver on their customers ever-growing expectations, and data is going to be the competitive differentiator for businesses over the next decade. Something of such importance should be kept safe and protected. This calls for a data protection strategy that acknowledges the current landscape because it is likely that customers will need to continue supporting their current environments, as well as transform for next generation infrastructure initiatives. (more…)

Lead Your Data Protection Transformation

Meredith Soper

Marketing Manager, Dell EMC Data Protection Division
As a former college athlete who never lost her competitive edge, I continuously challenge myself to learn new things and become an expert on others. However, my focus is no longer basketball, but the world of data protection. My MBA and innate passion for technology led me to a career in product marketing at Dell EMC, where I aspire to add some pizazz to the already-exciting world of backup and recovery. Outside of the office, I’m a born and raised Bostonian who has trouble pronouncing her R’s (think “pahk the cah”). I love sports, shopping, and a good glass of red wine. Follow me on Twitter @Meredith_Soper and I promise to #followback!

project rockyAs we transition from summer to fall, I cannot help but reflect on the idea of change. When everything is going right, I see no need for change- or at least nothing drastic. As the saying goes, if it ain’t broke, don’t fix it. However, when things are going wrong and there is clearly room for improvement, change is quite necessary. IT environments are no stranger to the idea of transformation and how important it is to the success of the business.

Take it from Liverpool Heart and Chest Hospital (LHCH)… With day-long RTOs, lengthy backup windows impeding workflows, and time-consuming management, LHCH was experiencing major problems with their tape backup systems. Their backup and disaster recovery processes could not provide the quick failover, continuity, or archiving capabilities necessary to fully protect their data. As a renowned medical facility, LHCH needed accuracy, speed, and reliability in order to deliver on its daily commitment of clinical excellence. After virtualizing and centralizing their IT environment, the hospital recognized that a more comprehensive transformation was needed to achieve its objectives. It was time for a change. (more…)

SUBSCRIBE BELOW

Categories

Archives

Connect with us on Twitter

Click here for the Cloud Chats blog