Posts Tagged ‘midrange storage’

Show Me the Honey: Sweet VMware Integration with EMC Unity

Brian Henderson

Director, Unity Product Marketing

Catch The Buzz
Those aren’t bees flying around the office.  It’s the buzz created from EMC’s latest storage platform.  Our new entry/midrange all flash Unity system has received great marks in the industry and customers are voting with their wallets for this simple and affordable data storage and services platform.  VMware is even excited about it and we’ve done a blog and a podcast with them.

Slide2

How Sweet Is Unity?

  • Customers love the simple HTML5 interface and how easy we’ve made it to manage one or multiple systems from an intuitive interface that requires no training.
  • Storage geeks love the modern all-flash architecture and how we added data services via Linux and Docker containers (yes, we were doing containers before containers were cool). We support the latest TLC flash drives, the latest Intel processors, and have committed to an aggressive roadmap
  • IT managers love the flexibility of Unity – they can deploy a SW-defined virtual storage appliance, an all flash array, or a converged server/network/storage Vblock 350 – all based on the same operating system. It’s fully unified with file, block, NAS or SAN that lets it professionals store just about anything on these systems. Go Anywhere with Unity!
  • Financial types love the affordability of this system – with a starting price of FREE for the UnityVSA and under $10,000 for a Unity system, it’s a no brainer to at least spin up a copy in your VMware lab and try it out.

(more…)

EMC Unity All-Flash Storage Accelerates Cyber Investigations

Matthew Edman

Ph.D, Director at Berkeley Research Group LLC, and Guest Blogger
Matthew J. Edman, Ph.D., is a Director at Berkeley Research Group LLC where he specializes in cybersecurity and investigations. Dr. Edman previously worked as a lead cybersecurity engineer for a federally funded research and development center, where he provided specialized computer network security research and development to federal law enforcement on a number of high-profile cases, including the investigation into and seizure of Silk Road--the notorious $1.2 billion underground drug market. Dr. Edman has a B.S. in computer science from Baylor University, and an M.S. and Ph.D. in computer science from Rensselaer Polytechnic Institute, where his research areas included novel techniques for cryptographic security and authentication in wireless networks, and the design, implementation, and analysis of anonymous communication systems on the Internet.

Latest posts by Matthew Edman (see all)

Cyber security is on everyone’s mind these days, and for good reason. We’ve all heard or read about high-profile hacks where sensitive personal records were breached or millions of dollars were stolen. The business impact on the targeted companies can be tremendous, ranging from bad press and a tarnished reputation to lost revenue and hefty regulatory fines. The worst cases have even put firms out of business.cyber-investigation

Within BRG’s Global Cyber Security and Investigations practice, we have built a diverse and experienced group that helps organizations assess unique security risks and deploys fast, effective response teams when breaches occur. Our practice includes veteran FBI agents and federal prosecutors who have conducted some of the most high-profile cyber investigations in recent history, computer scientists who have developed innovative and state-of-the-art investigative tools and techniques, and security engineers who have years of experience analyzing and securing corporate IT infrastructure across myriad industries.

We know first-hand from our real-world experience how important it is to systematically analyze the facts and electronic evidence to identify threat actors, mitigate data loss, maintain business continuity, and ultimately mount a legal response. In every case, our response time is one of the most critical client considerations.

Think about it. If your company is in the middle of getting hacked, the management team wants answers, not excuses while their incident response team is still uploading and processing evidence. When we built out our cyber security lab infrastructure, we wanted a storage system that could live up to our clients’ understandably high expectations. That’s why we chose EMC Unity’s all-flash storage platform. We looked at several other vendors and a number of storage technologies, but EMC Unity’s all-flash storage provided superior performance, expandability, and simplicity at a favorable price point.

Blazing-fast storage is critical, especially when we are dealing with massive datasets, but so is expandability. Our work regularly requires analysis of increasingly large amounts of data, including, for example: an analysis of hundreds of millions of database records related to a virtual currency-based money laundering operation; an investigation into criminal activity targeting a popular website that generated nearly 10 terabytes of logs each day; and a collection and review of nearly 20 terabytes of Microsoft Exchange data in connection with the investigation of a case of insider theft. As our practice continues to rapidly expand, we demanded a storage platform that could easily grow along with our evidence storage requirements and still provide us the performance to conduct high-speed investigative analytics for our clients.

Flexibility is also key. A complete incident response will leverage a diverse set of tools depending on the unique circumstances of the investigation. We may be using industry-standard forensic tools such as FTK or EnCase one day, running analytics against multi-terabyte Microsoft SQL Server or Cassandra databases the next, or analyzing evidence with our own in-house investigative tools. Some of our tools require block-level storage, while others need file-level storage—and extremely fast access times are necessary in all cases. Our environment is also highly virtualized, so we required a storage platform that would integrate seamlessly with VMware.

One other major consideration was manageability. We are focused on constantly delivering high-quality, rapid results for our clients, and we are not able to do that effectively if we are distracted supporting our technology. We needed a storage solution with a streamlined user interface that is easy to learn and quick to deploy, and that requires little day-to-day maintenance from our engineers.

EMC Unity provided an affordable solution that met or exceeded our requirements, which is why it is the core storage environment for our lab infrastructure. Ultimately, our cyber security and investigative work comes down to response time and accuracy. The faster we can provide actionable results to our clients, the quicker and more effective they are when responding to security incidents. That’s how we measure success.

 

North Carolina State University Finds IT Efficiency with Unity

Jamie Doherty

Consultant Social Media Engagement Manager, Dell EMC
Jamie brings over 20 years of experience in both traditional and digital marketing and has worked for companies like Direct to Retail Advertising, The Robb Report Magazine and Monster.com. She joined Dell EMC over four years ago to manage the Advanced Software Division’s social media strategy, and since then has taken on the challenge of managing the social media strategy for Dell EMC's Core Technologies Division. Her newest role will be managing Digital Campaigns for the Dell EMC Data Protection Division as well as leading strategy for Social Media in both the Data Protection and Storage Divisions. Jamie is also a Beachbody Coach helping to inspire others to live a healthier and more active lifestyle. When she is not Tweeting on behalf of Dell EMC or working out to Beachbody, you can find her at a live music venue watching her favorite artist or planning her next theme party. Follow her on Twitter @MnkyGrl47 or @CoachFab40

One of the greatest challenges IT can face at any substantial public educational institution is managing large scale environments with limited resources.  Big universities are constantly looking for ways to consolidate resources and manage their environments efficiently.  It is what many people in the IT world face in today’s environment of learning how to do more with less.  As an example, at an institution as large as North Carolina State University they have to deploy a wide range of applications in an environment that must work effectively with different performance and uptime requirements as well as the different needs of their customers.
Male teacher with students at the lecture hall

North Carolina State University was approached earlier this year to become one of EMC’s beta test customers for Unity Storage.  If you haven’t heard about Unity, it is a simple, modern, flexible and affordable storage solution that delivers enterprise capabilities with like simplicity in all-flash, hybrid, converged and software-defined configurations. Joining us at EMC World to tell his Unity beta experience story was Patrick Williams, the IT Infrastructure Architect from North Carolina State University.  I was lucky enough to have been able to sit in several sessions where Patrick spoke.  Here is what I learned about this customer’s experience with Unity Storage: (more…)

What This Year’s Super Bowl and Cloud Data Protection Have in Common

Lori Witzel

Product Marketing Manager, Spanning by EMC
Lori Witzel is a Salesforce MVP, has worked with and for SaaS companies since 2005, and has been sharing info with, listening to, and learning from tech users ever since. She is currently PMM for Spanning Backup for Salesforce, as well as PMM for Spanning Backup for Google Apps. Prior to Spanning Backup, Lori worked for various early-stage Cloud start-ups, mid-sized middleware providers, and ed tech firms, and she’s always eager to learn more. Lori's profile on LinkedIn: https://www.linkedin.com/in/loriwitzel

This year’s Super Bowl could be characterized as “The D-Bowl” – a contest that may be decided by who had the best defense. While the two final contenders are still TBD at the date of this blog’s writing [editor update – the final two are the Denver Broncos and Carolina Panthers], as FiveThirtyEight’s Neil Paine wrote regarding the NFL’s Final Four, “…defensively, this might be the best quartet of teams in any conference championship round.”data protection defense

So what on earth do the Final Four have in common with SaaS and cloud data protection? You guessed it! It’s all about the D, and protecting what’s most valuable in an organization. According to the Merriam-Webster Online Dictionary, one of the definitions of “defense” is a “means or method of defending or protecting oneself, one’s team, or another.” The Super Bowl finalists and EMC’s Cloud Data Protection both have strengths in protecting their teams, and in reducing the risk of loss.

For example, let’s think about Salesforce, a popular SaaS and cloud customer relationship management platform, one we use at EMC. Salesforce data is often used to populate sales pipeline reports, and that data also flows downstream into ERP systems. It contains information vital for executive management planning and resource allocation. Now imagine, if you will, that something happens to cause Salesforce data loss during the last two weeks of a quarter – what would THAT do to the reporting needed within an organization?

I know, you’re skeptical – Salesforce surely provides extensive data protection and recovery for its platform. And I’d agree that Salesforce is redundant, secure, and has a great record for uptime. But Salesforce has no way to distinguish changes made by mistake from changes made on purpose. They cannot protect an organization from admin errors, or third-party application sync errors, or custom misconfigurations that lead to data loss. (more…)

Three New Year’s Resolutions for IT Leaders

Parasar Kodati

Product Marketing Manager
Parasar Kodati has more than ten years of experience in product management and marketing spanning scientific computing, embedded software development, and data acquisition technologies. When not working he may be found plotting with his mischievous daughter, cooking Indian street food or reading eastern philosophy.

The second half of the decade is around the corner. It’s that time of the year to reflect, refresh and even resolve. Weight loss and work out never goes out of fashion but I thought I would put myself in the shoes of IT leadership. There is so much pressure on IT to embrace every new paradigm or fad that sometimes it can be hard to stay focused on fundamentals. These fundamentals don’t change no matter where technology goes. Here is my take on some resolutions for 2016.

Look for opportunities to disrupt yourself
Technology continues to make the competitive arena a level playing field. It is a good time to envision what your business can do with the information you have in terms of acquiring, serving and retaining your customers and employees. Think about the infrastructure that you need for rearchitecting your IT to achieve those goals. What areas need retooling? Where is the biggest bang for the buck?

Spend less time firefighting
In an increasingly digital world the value of information continues to grow and so does the cost of firefighting after an IT infrastructure disaster (caused by man, machine or nature) to minimize data loss and downtime. With the right protection and availability strategy we have heard many customer stories where the business was delighted at the level of availability IT was able to provide in the face of severe natural disasters. (more…)

SUBSCRIBE BELOW

Categories

Archives

Connect with us on Twitter

Click here for the Cloud Chats blog