Posts Tagged ‘avamar’

Data Protection Everywhere: Leading Protection Storage with Data Domain

John Dentinger

Product Marketing Manager, Dell EMC Data Protection Division
John’s passion for creating compelling content and communicating the benefits of great products have aligned as he explores the world of protection storage. Interning in Product Marketing with EMC while pursuing his MBA exposed John to the world of technology and the astounding power of Dell EMC’s data protection offerings. Outside of work, John likes to ski, enjoys gaming & media, and collects vinyl records. John is a graduate of the MBA program at the Boston College Carroll School of Management, where he specialized in Product & Brand Management and Marketing Analytics.

protection-storage

As the introductory Data Protection Everywhere blog post made clear, Dell EMC’s data protection portfolio is equipped to deliver complete protection for enterprises of all sizes. No matter where data lives or what happens in the data center, Dell EMC offers the leading solution to keep your data protected. At the core of this Data Protection Everywhere strategy is Dell EMC Data Domain. Only a month after the Dell EMC deal closed, four new Data Domain systems were introduced – which makes now the ideal time to trust a single data protection vendor with your needs. The advanced defense provided by DD OS-powered solutions are critical to Dell EMC’s strategy of ensuring that your data is protected everywhere.

data-domain-protection-storageWith the near-exponential pace of data growth in recent years, enterprises big and small are recognizing their need for more protection storage. 90% of the world’s data was made in the last two years, after all. As backup administrators find themselves neck deep in backup data, they are demanding a solution that reduces protection storage needs by eliminating redundant data. This is what Data Domain has been known for — deduplication technology that will identify unique data in an incoming stream and store only what is unique. The new systems couple Data Domain’s variable-length deduplication with increased scalability to bring storage efficiency to data protection. The new high-end Data Domain DD9800 is 7 times more scalable than the closest competitor.

In 2016, Data Domain doubled down on Dell EMC’s commitment to protecting data everywhere with the launch of Data Domain Cloud Tier to help customers simplify and automate their path to the cloud. DD Cloud Tier sets Data Domain apart as the only protection storage to natively-tier deduplicated data to the public, private or hybrid cloud for long-term retention. Whether it’s Virtustream, Dell EMC ECS or a 3rd party cloud, DD Cloud Tier helps enterprises ensure that long-term retention data is protected no matter what.

DD Cloud Tier can store up to 2 times the capacity of the active tier on the Data Domain system. The new Data Domain DD9800, DD9300 & DD6800 all support this add-on for long-term retention in the cloud. These systems also support high availability configurations, enabling midmarket and large enterprise customers to achieve business continuity with a second Data Domain controller on standby. (more…)

Expanding the Horizon for Dell EMC Midrange Storage Customers

Guy Churchward

President, Core Technologies Division
Guy Churchward is President of Core Technologies at EMC Corporation. He is responsible for a division that is redefining storage, through a comprehensive portfolio of core storage solutions encompassing the award-winning VMAX, VNX, VNXe, XtremIO, VPLEX, and Data Domain technologies and a cutting-edge software portfolio that delivers simplified storage systems management, continuous availability, replication, backup, and archive solutions. Churchward has more than 27 years of experience in the IT industry, with broad international experience that spans executive management, engineering, sales, marketing and business development capacities. He joined EMC in May 2012, when he served as Senior Vice President of Engineering for the Backup & Recovery Systems Division, before becoming Division President in October 2012. He was appointed to lead the Core Technologies Division in October 2014. Prior to joining EMC, Churchward was President and CEO of LogLogic, an enterprise log and security intelligence platform company. He has also served as Vice President and General Manager of the Data Protection Group at NetApp, where he was responsible for product strategy and development of the company's portfolio of disk-to-disk and disaster recovery products, as well as Vice President and General Manager of BEA's WebLogic Products Group. In addition, he has held senior management positions at Sun Microsystems (formerly Tarantella Inc.), The Santa Cruz Operation (formerly IXI), Accenture (formerly Binder Hamlyn) and Olivetti. Churchward holds an Executive MBA from Stanford Business School and studied computer science at Cambridge Tutors College, England.

Here we are as Dell EMC, and we’re champing at the bit to show our customers, partners and the world what we’re made of as a combined business. We were already recognized as the leader in data storage pre-merger and together we’re going from strong to stronger, now number one across all combined mid-range markets in which we play. If you’re a customer or partner of either company this bodes well for you, as Dell EMC can now offer an even greater choice of world-class products from a single vendor, which has become the largest privately controlled IT company in the world.

Since we started this journey nearly a year ago, we’ve had a number of questions from customers about our plans to support the midrange storage portfolios that are coming together. Let me confirm that we are 100% committed to supporting both EMC Unity and the Dell SC Series (Compellent) going forward. Why? Let’s start with a look at what both product lines have brought to the combined business and then fast forward to see what the future holds.

The Dell EMC midrange businesses represent:

  • Market share of 29.4%, nearly double that of our nearest competitor.
  • Leadership across all price bands. [i]
  • $5 billion in combined revenues [ii] within a total addressable market of more than $17 billion.
  • More than 100,000 existing, passionate storage customers [iii], with the heritage of both EMC technologies well positioned in large enterprises and of Dell’s incredible strength in the entry-level and mid-markets.

entry and midrange

dell emc midrange 2

The Combined Dell EMC Midrange Portfolio – Go Forward from Today
Dell EMC’s midrange portfolio now has a scale and breadth that is without comparison in our industry. Our combined midrange offerings are the strongest they’ve ever been as, this year, we have launched new products such as Unity Flash storage systems and made powerful enhancements to the SC Series OS. This all adds up to a combined portfolio for our customers and partners that is unmatched elsewhere in the industry. (more…)

Ease of Use for Everyone

Aaron Bairos

Product Marketing Manager, Dell EMC, Data Protection
Aaron is currently pursuing a master’s degree at Brandeis University and a Product Marketing Manager at Dell EMC. He’s been with Dell EMC/RSA for over 5 years now across multiple roles in security and data protection. When not working he enjoys being a tourist in new cities and spending time with family and friends. Follow him on Twitter: @AaronBairos

Latest posts by Aaron Bairos (see all)

Protecting Virtualized Environments
I remember being at Marist College a few years ago completing my last assignment as an undergrad student called “capping”. Capping was a required course that all students had to take in order to graduate. It’s designed to bring together everything you’ve learned throughout your time at Marist and bring them to life through real-life scenarios. Graduating with a Finance degree meant I had to come up with a financial business plan and then present to my panel of “sharks”. It consisted of sales forecasts, expense budgets and cash flow statements but before I bore you, I’ll stop there. It was a very tedious course and students all around campus cringe at the thought of having to take it.

As part of this course Adobe Acrobat and Photoshop were required and offered in our lab, however, PCs running the software were antiquated and slow. The university virtualized all essential applications, including Adobe Acrobat and Photoshop.  However, we had no guarantee that our projects were being backed up.  This meant that every student had to put their projects on thumb drives – and hope it was not left behind or in my case ….lost. After looking for days on end and realizing I’d never see that thumb drive again I wasn’t sure which direction to go in next. I had weeks of work I’d never be able to access again simply because of my data being unprotected. Using the thumb drive backup method to control the backup of any project was not ideal.  I’m sure you’ve run into similar constraints either at work or in your personal life.
Virtualization-aug 31

vAdmins and IT managers are struggling to meet their company’s requirements and traditional backup and recovery strategies just aren’t enough to deliver the recovery that businesses now need. In fact, 71% of those surveyed are not confident they could recover systems. (more…)

Security or Protection: Which One?

Vladimir Mandic

Chief Technology Officer & Distinguished Engineer Data Protection Cloud, Core Technologies Division, Dell EMC
Vladimir has been driving technical innovation and change within EMC for the past 10 years, first in the area of data protection software and, currently, in cloud technologies. Prior to that, he’s had rich industry experience as a solution integrator and in the service provider space. When not working on technology innovation, he may be difficult to locate due to his passion for world travel.

Latest posts by Vladimir Mandic (see all)

security-protection-vlad-1Ransomware
A long time ago I heard an anecdote that the highest level of security certification was given to a system that sat in a secure room and was isolated from a network. Today we live in a connected world, and that creates much bigger surface areas for security threats. As much as IT organizations would like to limit exposure, users expect unlimited access to both business and personal email, to be able to work with attachments, to surf the web, and to interact on social media.

Pandora’s Box has been opened security-protection-vlad-2.jpg
Although risk cannot be completely eliminated, it can and should be managed. In parallel, ransomware has emerged as a top cyber threat to business. The number of attacks and their complexity is unparalleled. These are not simple drive-by threats (such as a random user visiting a site that contains malware); instead, they are custom-designed to bypass an organization’s perimeter security and target specific high-value data sets.

The combination of open access and more advanced threats is something that requires far more attention!

Many organizations derive a false level of confidence from their investment in perimeter security: firewalls, authentication/authorization, antivirus solutions and encryption over-the-wire. When assessing security and protection, however, assume that the perimeter has been breached! The breach point is already beyond antivirus software and firewalls; it is now within authenticated systems where encryption becomes transparent. Do you know what your level of protection is?

How big is a Ransomware threat?
• Ransomware has headlined on FBI, DHS, DOJ, and NSA lists in 2016 and triggered multiple US Senate and Homeland Security questions that have resulted in FBI, DHS, and DOJ responses.
• It’s growing fast: At the end of Q1 2016, 93% of all phishing emails contained encryption ransomware. That’s a 763% increase year over year!

First, let’s look at the infrastructure
If you do control the infrastructure, be sure to take advantage of Isolated Recovery Solution (IRS) for systems such as EMC VMAX and Data Domain. IRS ensures that (a) you have a replica of your storage for fastest recovery, and (b) replication is enabled over a link which is air-gapped when replication is not occurring. That way, any corruption of primary data can quickly be recovered from an unaffected replica copy.

If you outsource your infrastructure (for example, by using the public cloud), does that mean security is no longer your responsibility? Remember, an IaaS provider takes responsibility for infrastructure availability and resiliency, but not for data validity. That means protecting your data on your core systems is your responsibility.

Regardless of the location or ownership of the infrastructure, you should be asking yourself these questions:
• Does it matter if we (or the provider) have certification XYZ.123 or not?
• In case of compromise, how do we recover data?
• Do we have a clean copy of the data that is isolated?
• How quickly can we recover?

Second-level safety is provided by having a well-designed data center protection strategy, including a backup solution, which provides an additional level of isolation for your data. That data should be secure and immutable, and it should be available for quick recovery to any point in time. Solutions such as EMC NetWorker or Avamar data protection software together with EMC Data Domain protection storage provide this level of protection. (more…)

Reflection on 2015 Resolutions – When a Triathlon Meets Data Protection

Deanna Hoover

Product Marketing Manager, Dell EMC
Deanna Hoover started her IT career over 30 years ago with a focus on software and hardware engineering. She has had the opportunity to work in a variety of different industries and has built a broad skillset ranging from writing machine code in a factory, migration of mainframe to client server, and storage architecture as well as systems and database administration. In August of 2004 Deanna made the move to EMC as a backup, recovery and archive presales SE. Since that time she has managed a Professional Services team and as of current is in marketing for Dell EMC with a focus on virtualization backup and recovery software. In her spare time Deanna enjoys the outdoors and participates in triathlons.

It’s that time of year to reflect back on 2015 and set new goals.  Are you one of the 45% who chose to set resolution goals?  If so, did you honestly stick to your goals? Congratulations if you did! Only 8% were successful in achieving resolution goals.

triathalon and data protectionI barely managed to meet my goal of improving my rankings as a triathlete. In a moment of insanity, I signed up for a half-ironman.  Several months and a few hundred hours of training later, I was race ready.  However, my race had a few glitches, and I wasn’t prepared for the unexpected.

A Triathlon involves swimming, biking and running – in this order.  Each triathlete is typically stronger at one of the 3 sports. For me it is biking.  It is beneficial to know the strengths of the other athletes before race day.   Let me give you an example of why.

The day before the race, we setup our transition areas, which includes, putting our running gear at the location where we dismount our bikes.  I strategically placed my gear to ensure I had a quick exit for my run. Despite that planning, another athlete had researched my previous race results, and learned biking was my strong sport and moved my running shoes.  I got off the bike in first place but it took me three minutes to find my hidden shoes! This gave her a competitive advantage. She finished a couple of minutes ahead of me and won the race.

I learned a couple of lessons in that race that we can apply to Data Protection.

  • I should have held the athlete accountable by turning her into the officials. Data Protection solution needs to be accountable, ensuring data is recoverable no matter what happens or where it lives.
  • One minor mishap affected the overall outcome of my race. A mishap in your Data Protection solution can be detrimental to your business. Reliable Data Protection is more than backup and recovery. It includes protection across the continuum, continuous data protection, and centralized analysis and monitoring.
  • The other athlete was committed to win, albeit unfairly. It is important that your Data Protection vendor be committed to your success for years to come.

Let me ask you, is your Data Protection solution prepared for whatever might happen? (more…)

SUBSCRIBE BELOW

Categories

Archives

Connect with us on Twitter

Click here for the Cloud Chats blog