Posts Tagged ‘recovery’

Data Protection Everywhere: Droning on about Converged Infrastructure Data Protection

Tom Giuliano

Principal Product Marketing Manager, Data Protection Management Software Solutions
For 17 years, Tom has brought storage, data protection, security and wireless products to market through roles in product marketing, product management and sales. He loves to speak with customers and prospects about their business goals and challenges, their experiences and their needs, and has had a lot of opportunity to do it. Backed with a master’s degree in Engineering and an MBA, Tom is equally comfortable digging into the details with technical personnel as well as translating and delivering the business value story. But honestly – TELLING STORIES is SO much more FUN for him! Tom's current role in product marketing focuses on data protection management solutions and management strategy. He gets to spend his days thinking about how to help you simplify and enhance your experience achieving your data protection objectives. When not driving go-to-market initiatives, identifying unique and creative methods to build product awareness or launching new and innovative offerings, you’ll likely find him cycling, skiing, boating or running. And, who knows, maybe you’ll hear some of more of his interesting experiences in a future post from time to time.

Drones.  Quadcopters.  Small remote-controlled flying vehicles.  Whatever you want to call them, they were THE hot item this holiday season.  I had two orders cancelled by Amazon once they determined they were accepting orders beyond inventory capacity.  It was a miracle I was finally able to find one for my son at a local store.

converged infrastructure drone 1

As an 11 year old, my son was initially challenged with the vehicle controls.  The controller had 2 joysticks, 2 elevation buttons, a start button, a “trick” button, trim/elevation/turning fine-tuning buttons, takeoff and landing buttons and a LCD display.  And learning how to manage the vehicle occurred only after he had manually built much of the tiny aircraft.  That’s a lot for anyone to accomplish in short time before they can get value (fun!) out of it.  And even then, I still needed to be in the flight area to protect pictures, lamps and the cats from being hit.

converged infrastructure drone 2 (more…)

The Perfect Holiday Cookie

Meredith Soper

Marketing Manager, Dell EMC Data Protection Division
As a former college athlete who never lost her competitive edge, I continuously challenge myself to learn new things and become an expert on others. However, my focus is no longer basketball, but the world of data protection. My MBA and innate passion for technology led me to a career in product marketing at Dell EMC, where I aspire to add some pizazz to the already-exciting world of backup and recovery. Outside of the office, I’m a born and raised Bostonian who has trouble pronouncing her R’s (think “pahk the cah”). I love sports, shopping, and a good glass of red wine. Follow me on Twitter @Meredith_Soper and I promise to #followback!

What makes the perfect holiday cookie? Is it the combination of ingredients, or the manner in which they are mixed and baked? A recipe incorporates both of these things- yet data-protection-solution-holiday-cookies
the success of one without the other is never enough. Even with the main ingredients- flour, sugar, eggs-, a forgotten touch of salt or dash of vanilla leads to tasteless dough. And even if the dough is mixed to perfection, a misread oven temperature can ruin the entire baking process. (By now, you may have guessed that I am speaking from experience. I can’t be the only one who’s committed a baking blunder!) The result of these common mistakes is an imperfect holiday cookie.  Although this may not ruin your Christmas party, it surely isn’t ideal.

Fortunately for you, I won’t be baking any cookies this holiday season. However, I am thinking of mixing it up from a data protection perspective. When I think of the perfect data protection solution, I consider it a combination of both software and hardware products. Not only should data be backed up with the utmost speed, performance, and efficiency, but it should also be securely stored on protection storage you can trust. But like the ingredients of the cookie, there cannot be one without the other. In order to benefit from a complete data protection solution, the greatness of the backup application must be matched by the greatness of the protection storage device, and vice versa. And like the baking process, the data protection products must be handled with care, serviced appropriately, and backed by a company you can rely on. (more…)

Rain or Shine… Show Must Go On

Aaron Bairos

Product Marketing Manager, Dell EMC, Data Protection
Aaron is currently pursuing a master’s degree at Brandeis University and a Product Marketing Manager at Dell EMC. He’s been with Dell EMC/RSA for over 5 years now across multiple roles in security and data protection. When not working he enjoys being a tourist in new cities and spending time with family and friends. Follow him on Twitter: @AaronBairos

Latest posts by Aaron Bairos (see all)

Affordable Unified Array-Based Protection and Recovery Solution for the Midrange

Since being announced in May of 2016, the Dell EMC Unity™ family of midrange has been globally adopted by over 1,800 customers across varying markets. More and more, small-to-medium-size businesses (SMBs) are rapidly adopting Unity storage to run their businesses and virtualized workloads. Unity’s main design principles — Simple, Modern, Flexible and Affordable – have strongly resonated with SMBs struggling with reduced budgets and constrained resources that has since given rise to the ‘IT generalist’ – those being called upon inside these organizations to handle a wide array of IT technologies and products without intrinsic specialty skills.

But not to worry – that’s exactly the business profile Unity was designed to address with its unparalleled simplicity across the entire storage lifecycle – acquisition to set-up and install to configuration and management to service and support. And it’s why SMBs – and IT generalists – are energetically jumping on board with Dell EMC Unity.

Let’s spotlight one area where Unity’s simplicity and all-inclusive software model can streamline a relatively complex IT process or specialty – data replication for virtualizedapplications in VMware environments.  First, the new HTML5 management interface gets Unity configured for VMware environments in just a few minutes. And secondly, Unity includes the Dell EMC RecoverPoint for Virtual Machines™ (RP4VMs) software along with 15 free licenses with every Unity system.  RP4VMs running on Unity storage enables IT generalists to simply and efficiently create a disaster recovery solution for VMware virtualized environments. SMBs can affordably establish local and remote protection (and migration) plans for their businesses with this robust hypervisor-based replication solution with continuous data protection for per-VM recovery to any point in time, and built-in automated disaster recovery orchestration.

recoverpoint-unityblog

Let’s look at a couple of scenarios where Unity and RP4VMs can make a significant difference for SMBs and IT generalists trying to provide a full complement of data protection, recovery, and migration services – affordably, efficiently, and easily.

Use Cases
Hypothetically, ABC Capital, Inc. is a major financial institution that accepts deposits, offers checking account services, makes business, personal and mortgage loans. They needed a disaster recovery solution for their large scale VMware environment that they could depend on to hold all of this important information. Their mission critical data base can’t afford to lose a days’ worth of work and they were looking to further invest in protecting their data. Fortunately, with RecoverPoint for Virtual Machines, if there were something to occur at one site, they still have another site to pick up the slack.  RecoverPoint for Virtual Machines reduces WAN bandwidth consumption by up to 90%.  It also ensures replication robustness, sustaining poor WAN conditions with up to 300 milliseconds of latency and up to a 5% packet loss. With the replication capabilities of RP4VMs, ABC Capital, Inc. can ensure that their business is sustained in the event of disaster. RecoverPoint for Virtual Machines running on their Unity all-flash array allows ABC Capital to have a Unity at their primary site and a re-purposed VNX2 on their secondary site. This gives them a replication tool that supports all Dell EMC storage platforms. RecoverPoint for Virtual Machines is the replication tool of choice for Dell EMC across the board and we’re the only vendor that offers remote protection over synchronous distances. (more…)

Data Recovery Versus Restoration: When it comes to SaaS Backup, Restore is Everything

Mat Hamlin

Director of Products for Spanning by Dell EMC
Mat is the Director of Products for Spanning by Dell EMC. He is responsible for the overall direction and strategy for Spanning's suite of SaaS backup and recovery solutions. His career in technology spans five startups and two large organizations, all in Austin, TX. Mat started out in product support and training, then engineering leadership and for the past nine years has been focused on product management and product marketing. Prior to joining Spanning, Mat served as Sr. Product Manager for SailPoint Technologies and Sun Microsystems, contributing to their market-leading enterprise identity management solutions.

As more organizations are moving their critical data to the cloud and leveraging SaaS applications like Google Apps, Office 365, and Salesforce, we’re witnessing a simultaneous evolution in the backup industry. These forward-thinking organizations are focusing not just on creating backup copies of data for safekeeping, but they’re also considering what it takes to maintain all facets of data protection, including business continuity, accessibility, and compliance. These goals require a new breed of backup. As we like to say at Spanning: Backup is one thing. Restore is everything. It won’t do you much good to just have your SaaS data backed up and stored somewhere unless you can get it back into your SaaS applications (along with metadata and customizations) quickly, easily, and accurately.

What’s the difference between recovery and restore?
Recovery simply means you get your data back – not that you get it back exactly the way it was. In the event of a data loss, you may be dismayed to find that your existing backup and recovery solution or provider defines recovery as exporting all versions of your backed-up SaaS application data and delivering them to you in a zipped folder containing nothing but a massive CSV file. That means your IT team will probably have to expend a lot of time and effort manually identifying precisely what data was lost, rebuilding your file structure the way you had it before, importing or restoring the data back into the application, and then validating it so everyone can finally get back to work. Data recovery is like someone handing you a giant stack of photos with a rubberband around it for you to recreate a scrapbook you had lovingly put together in chronological order with notes, decorations, and keepsakes for each photo.

data recovery

data recovery

Restore, on the other hand, means having that scrapbook returned to you in mint condition with all your memories perfectly intact – even if the original copy was completely destroyed. Translation? Data restoration means accurately and automatically returning your data directly back into your SaaS application, exactly the way it was before you lost it. Excellent backup and restore solutions will restore data from any point in time with file structure, metadata, and labels intact, while providing the flexibility to restore exactly what was lost – whether a single file from yesterday or an entire account from last year. Some solutions even make this process easy enough that an end user can do it in a few clicks without IT intervention. (more…)

All Flash Arrays, Don’t Forget Your Helmet!

Alyanna Ilyadis

Product Marketing Manager, Dell EMC
Alyanna is a Product Marketing Manager at Dell EMC working in data protection. She graduated from Bryant University in 2015 and has been working at Dell EMC since then. Outside of work, she enjoys illustrating and putting too much time into video games.

Super flash-blogIf you have a flash environment (Or know flash at all) you’re aware of its high performance. However, that high performance also demands the same level of speed in all aspects of its use. Meaning, you need to consider what you’re using to protect that all flash array, and know that you can’t skimp out on it. Not having the right data protection for your flash array would be like driving a racecar without a helmet – and everyone knows that’s a bad idea. Yet, the wrong protection solution can become a bottleneck to your mission critical workloads on flash, with your backup slowing down or even stopping your application.

When protecting a flash environment, there are some requirements to keep in mind. First, and foremost, is performance. Service Level Agreements are becoming stricter and your array needs the performance to meet these SLAs – which include backup windows, RPO and recovery time. Second is efficiency – flash storage, and the applications stored on them, can’t be impacted by protection. Having your flash array’s performance compromised is never an option. Last, but hardly the least, is agility. Since flash storage is usually a component of an ever evolving data center, it’s important that the data protection solution you implement evolve alongside your business.

There are three main pieces that are critical to consider when protecting an all flash array: Continuous availability, Replication for disaster recovery, and Backup and recovery.

Let’s start our discussion off with continuous availability, and how important it is to flash. All flash arrays give the best performance for the most demanding mission critical applications. These applications most often also need the highest level of availability. As the name suggests continuous availability is about keeping your mission critical applications always on.  Your availability solution should offer zero RTO and zero RPO even in the face of natural disasters and catastrophic hardware failures. In addition that same solution should offer a powerful data mobility engine that can eliminate planned downtime for time consuming storage tech refresh and workload balancing across arrays. (more…)

SUBSCRIBE BELOW

Categories

Archives

Connect with us on Twitter

Click here for the Cloud Chats blog